Before improving IS-IS network security, configure basic IS-IS functions.
You can perform the following configuration tasks (excluding the task of Verifying the IS-IS Network Security Optimization Configuration) in any sequence.