Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Example: Configuring IS-IS Route Leaking From a Level 2 Area to a Level 1 Area

This example shows how to leak prefixes in an IS-IS network from a Level 2 area to a Level 1 area.

Requirements

No special configuration beyond device initialization is required before configuring this example.

Overview

Every routing protocol passes routing information up or down the routing hierarchy. This bidirectional flow of routing information is known as route leaking.

By default, IS-IS protocol leaks routing information from a Level 1 area to a Level 2 area. However, to leak routing information from a Level 2 area to a Level 1 area, an export policy must be explicitly configured.

Topology

In this example, Devices R3 and R4 are configured in a Level 2 area. Devices R5, R6, and R7 are configured in a Level 1 area.

Figure 1 shows the topology used in this example.

Figure 1: Route Leaking From a Level 2 Area to a Level 1 Area

Route Leaking From a Level 2 Area to
a Level 1 Area

Configuration

Configuring Route Leaking From a Level 2 Area to a Level 1 Area

CLI Quick Configuration

To quickly configure route leaking from a Level 2 area to a Level 1 area, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy level.

Device R3

set interfaces fe-1/2/0 unit 0 description to-R4set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.17/30set interfaces fe-1/2/0 unit 0 family isoset interfaces fe-1/2/1 unit 0 description to-R5set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.21/30set interfaces fe-1/2/1 unit 0 family isoset interfaces lo0 unit 0 family inet address 192.168.0.3/32set interfaces lo0 unit 0 family iso address 49.0001.0192.0168.0003.00set policy-options policy-statement leak-L2-to-L1 from route-filter 192.168.0.0/24 orlongerset policy-options policy-statement leak-L2-to-L1 from protocol isisset policy-options policy-statement leak-L2-to-L1 from level 2set policy-options policy-statement leak-L2-to-L1 to protocol isisset policy-options policy-statement leak-L2-to-L1 to level 1set policy-options policy-statement leak-L2-to-L1 then acceptset protocols isis interface fe-1/2/0.0 level 1 disableset protocols isis interface fe-1/2/1.0 level 1 disableset protocols isis interface lo0.0 level 1 disableset protocols isis export leak-L2-to-L1

Device R4

set interfaces fe-1/2/0 unit 0 description to-R3set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30set interfaces fe-1/2/0 unit 0 family isoset interfaces fe-1/2/1 unit 0 description to-R5set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.25/30set interfaces fe-1/2/1 unit 0 family isoset interfaces lo0 unit 0 family inet address 192.168.0.4/32set interfaces lo0 unit 0 family iso address 49.0001.0192.0168.0004.00set policy-options policy-statement leak-L2-to-L1 from route-filter 192.168.0.0/24 orlongerset policy-options policy-statement leak-L2-to-L1 from protocol isisset policy-options policy-statement leak-L2-to-L1 from level 2set policy-options policy-statement leak-L2-to-L1 to protocol isisset policy-options policy-statement leak-L2-to-L1 to level 1set policy-options policy-statement leak-L2-to-L1 then acceptset protocols isis interface fe-1/2/0.0 level 1 disableset protocols isis interface fe-1/2/1.0 level 1 disableset protocols isis interface lo0.0 level 1 disableset protocols isis export leak-L2-to-L1

Device R5

set interfaces fe-1/2/0 unit 0 description to-R3set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.22/30set interfaces fe-1/2/0 unit 0 family isoset interfaces fe-1/2/1 unit 0 description to-R4set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.26/30set interfaces fe-1/2/1 unit 0 family isoset interfaces fe-1/2/2 unit 0 description to-R6set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.29/30set interfaces fe-1/2/2 unit 0 family isoset interfaces fe-1/2/3 unit 0 description to-R7set interfaces fe-1/2/3 unit 0 family inet address 10.0.0.38/30set interfaces fe-1/2/3 unit 0 family isoset interfaces lo0 unit 0 family inet address 192.168.0.5/32set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0005.00set protocols isis interface fe-1/2/0.0 level 1 disableset protocols isis interface fe-1/2/1.0 level 1 disableset protocols isis interface fe-1/2/2.0 level 2 disableset protocols isis interface fe-1/2/3.0 level 2 disableset protocols isis interface lo0.0 level 1 disable

Device R6

set interfaces fe-1/2/0 unit 0 description to-R5set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.30/30set interfaces fe-1/2/0 unit 0 family isoset interfaces fe-1/2/1 unit 0 description to-R7set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.33/30set interfaces fe-1/2/1 unit 0 family isoset interfaces lo0 unit 0 family inet address 192.168.0.6/32set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0006.00set protocols isis interface fe-1/2/0.0 level 2 disableset protocols isis interface fe-1/2/1.0 level 2 disableset protocols isis interface lo0.0 level 2 disable

Device R7

set interfaces fe-1/2/0 unit 0 description to-R6set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.34/30set interfaces fe-1/2/0 unit 0 family isoset interfaces fe-1/2/1 unit 0 description to-R5set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.37/30set interfaces fe-1/2/1 unit 0 family isoset interfaces lo0 unit 0 family inet address 192.168.0.7/32set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0007.00set protocols isis interface fe-1/2/0.0 level 2 disableset protocols isis interface fe-1/2/1.0 level 2 disableset protocols isis interface lo0.0 level 2 disable

Step-by-Step Procedure

Configuring Route Leaking From a Level 2 Area to a Level 1 Area

Step-by-Step Procedure

The following example requires that you navigate various levels in the configuration hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration Mode in the CLI User Guide.

To configure route leaking from a Level 2 area to a Level 1 area:

  1. Configure the network interfaces.

    Enable IS-IS on the interfaces by including the ISO address family on each interface.

    [edit interfaces]user@R3# set fe-1/2/0 unit 0 description to-R4user@R3# set fe-1/2/0 unit 0 family inet address 10.0.0.17/30user@R3# set fe-1/2/0 unit 0 family isouser@R3# set fe-1/2/1 unit 0 description to-R5user@R3# set fe-1/2/1 unit 0 family inet address 10.0.0.21/30user@R3# set fe-1/2/1 unit 0 family iso

    Similarly, configure other routers.

  2. Configure two loopback interface addresses.

    One address is for IPv4, and the other address is to enable the router to form adjacencies with other routers in the area.

    [edit interfaces lo0 unit 0]user@R3# set family inet address 192.168.0.3/32user@R3# set family iso address 49.0001.0192.0168.0003.00
  3. Specify the IS-IS level on a per-interface basis.
    [edit protocols isis interface]user@R3# set fe-1/2/0.0 level 1 disableuser@R3# set fe-1/2/1.0 level 1 disableuser@R3# set lo0.0 level 1 disable
  4. Configure a route leaking policy on the routers configured in the Level 2 area to leak routes into the Level 1 area.
    [edit policy-options policy-statement leak-L2-to-L1] user@R3# set from route-filter 192.168.0.0/24 orlongeruser@R3# set from protocol isisuser@R3# set from level 2user@R3# set to protocol isisuser@R3# set to level 1user@R3# set then accept
    [edit protocols isis]user@R3# set export leak-L2-to-L1

    Similarly, configure Router R4.

Results

From configuration mode, confirm your configuration by entering the show interfaces, show protocols isis, and show policy-options commands.

If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration.

user@R3# show interfaces
fe-1/2/0 {
        unit 0 {
            description to-R4;
            family inet {
                address 10.0.0.17/30;
            }
            family iso;
        }
    }
fe-1/2/1 {
        unit 0 {
            description to-R5;
            family inet {
                address 10.0.0.21/30;
            }
            family iso;
        }
    }
lo0 {
        unit 0 {
            family inet {
                address 192.168.0.3/32;
            }
            family iso {
                address 49.0001.0192.0168.0003.00;
            }
        }
    }
user@R3# show protocols isis
export leak-L2-to-L1;
        interface fe-1/2/0.0 {
            level 1 disable;
        }
        interface fe-1/2/1.0 {
            level 1 disable;
        }
        interface lo0.0 {
            level 1 disable;
        }
    
user@R3# show policy-options
policy-statement leak-L2-to-L1 {
        from {
            protocol isis;
            level 2;
            route-filter 192.168.0.0/24 orlonger;
        }
        to {
            protocol isis;
            level 1;
        }
        then accept;
    }

Similarly, confirm the configuration on all other routers. If you are done configuring the routers, enter commit from configuration mode.

Verification

Verifying Route Leaking From a Level 2 Area to a Level 1 Area

Purpose

Verify that IS-IS leaks routes from a Level 2 area to a Level 1 area.

Action

To verify that route leaking is taking place, use the following commands:

  1. From operational mode on Router R3, run the show isis adjacency command.
    user@R3> show isis adjacency
    Interface            System     L State        Hold (secs) SNPA
    fe-1/2/0.0           R4         2  Up          7           0:5:85:8f:94:bd
    fe-1/2/1.0           R5         2  Up          7           0:5:85:8f:94:bd

    The output verifies that the interfaces on Router R3 are up and have established adjacencies with the connecting interfaces on Routers R4 and R5. If you don’t see the interfaces being functional, see the Results section for troubleshooting your configuration.

  2. From operational mode on Router R3, run the show isis database detail command.
    user@R3> show isis database detail
    IS-IS level 1 link-state database:
    
    R3.00-00 Sequence: 0x19, Checksum: 0x3453, Lifetime: 1078 secs
       IP prefix: 192.168.0.4/32                  Metric:       10 Internal Down
       IP prefix: 192.168.0.5/32                  Metric:       10 Internal Down
       IP prefix: 192.168.0.6/32                  Metric:       20 Internal Down
       IP prefix: 192.168.0.7/32                  Metric:       20 Internal Down
    
    IS-IS level 2 link-state database:
    
    R3.00-00 Sequence: 0x1c, Checksum: 0xc657, Lifetime: 1078 secs
       IS neighbor: R4.02                     Metric:       10
       IS neighbor: R5.02                     Metric:       10
       IP prefix: 10.0.0.16/30                    Metric:       10 Internal Up
       IP prefix: 10.0.0.20/30                    Metric:       10 Internal Up
       IP prefix: 192.168.0.3/32                  Metric:        0 Internal Up
    
    R4.00-00 Sequence: 0x19, Checksum: 0xea13, Lifetime: 1076 secs
       IS neighbor: R4.02                     Metric:       10
       IS neighbor: R5.03                     Metric:       10
       IP prefix: 10.0.0.16/30                    Metric:       10 Internal Up
       IP prefix: 10.0.0.24/30                    Metric:       10 Internal Up
       IP prefix: 192.168.0.4/32                  Metric:        0 Internal Up
    
    R4.02-00 Sequence: 0x17, Checksum: 0xecab, Lifetime: 1076 secs
       IS neighbor: R3.00                     Metric:        0
       IS neighbor: R4.00                     Metric:        0
    
    R5.00-00 Sequence: 0x12, Checksum: 0xf4e5, Lifetime: 1076 secs
       IS neighbor: R5.02                     Metric:       10
       IS neighbor: R5.03                     Metric:       10
       IP prefix: 10.0.0.20/30                    Metric:       10 Internal Up
       IP prefix: 10.0.0.24/30                    Metric:       10 Internal Up
       IP prefix: 10.0.0.28/30                    Metric:       10 Internal Up
       IP prefix: 10.0.0.32/30                    Metric:       20 Internal Up
       IP prefix: 10.0.0.36/30                    Metric:       10 Internal Up
       IP prefix: 192.168.0.5/32                  Metric:        0 Internal Up
       IP prefix: 192.168.0.6/32                  Metric:       10 Internal Up
       IP prefix: 192.168.0.7/32                  Metric:       10 Internal Up
    
    R5.02-00 Sequence: 0xb, Checksum: 0x2d74, Lifetime: 1076 secs
       IS neighbor: R3.00                     Metric:        0
       IS neighbor: R5.00                     Metric:        0
    
    R5.03-00 Sequence: 0xb, Checksum: 0x6c32, Lifetime: 1076 secs
       IS neighbor: R4.00                     Metric:        0
       IS neighbor: R5.00                     Metric:        0
    

    The Down keyword identifies the routes that have successfully leaked from the Level 2 area to the Level 1 area.

Meaning

Route leaking from a Level 2 to a Level 1 area is functioning as expected.

Published: 2013-02-04

Supported Platforms

Published: 2013-02-04