Before improving IS-IS network security, configure basic IPv6 IS-IS functions.
You can perform the following configuration tasks (excluding the task of Verifying the IPv6 IS-IS Network Security Optimization Configuration) in any sequence.