isis-3----Page:8
1  2  3  4  5  6  7  8  9  10  11  12  13  14 

Flooding Procedures
Each GENAPP TLV describes exactly one application
Information with different flooding scopes requires different TLVs
S-bit => domain-wide flooding
D-bit set indicates L2->L1 leaking has occurred – do NOT leak back into L2
Do NOT use information in the LSP of an unreachable system – could be stale
Updates SHOULD be advertised in the same LSP # whenever possible
PPT Version