Before you activate ISR connections throughout the network, establish a plan for processing data in the ISR capable environments. Consider the following factors:
When data exchange takes place using ISR, the following rules apply:
This protection is applied to avoid the possibility of one or more messages being continually sent from region to region in a message loop.
However, in some configurations, a message, sourced from outside a group of connected regions, could bypass the rules and enter a message loop. Always be aware of this possibility when planning your ISR connections. Some conversations provide additional protection against such an occurrence.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |