@techreport{li-isis-error-lsp-processing-03, number = {draft-li-isis-error-lsp-processing-03}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-li-isis-error-lsp-processing/03/}, author = {Zhenqiang Li and Yue Qin and Jie Dong}, title = {{Recommendations for LSP Checksum Calculation and Related Processing in multi-vendor Networks using Intermediate System to Intermediate System}}, pagetotal = 15, year = 2010, month = mar, day = 7, abstract = {Recommendations for Interoperable Networks using Intermediate System to Intermediate System (IS-IS) {[}RFC3719{]} highlights a number of differences between the IS-IS protocol as described in ISO 10589 and the protocol as it is deployed today. This document outlines a number of differences found in the China Mobile backbone network, which is constructed using routers from several manufacturers. These differences include LSP checksum calculation, zero checksum LSP processing, zero remaining lifetime LSP processing, and corrupt LSP processing. This document is intended to provide best current practices to facilitate interoperability and maintain network stability.}, }