Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1 Area

This example shows how to leak prefixes in an IS-IS network from a Level 2 area to a Level 1 area.

Requirements

No special configuration beyond device initialization is required before configuring this example.

Overview

Every routing protocol passes routing information up or down the routing hierarchy. This bidirectional flow of routing information is known as route leaking.

By default, IS-IS protocol leaks routing information from a Level 1 area to a Level 2 area. However, to leak routing information from a Level 2 area to a Level 1 area, an export policy must be explicitly configured.

Topology

In this example, Devices R3 and R4 are configured in a Level 2 area. Devices R5, R6, and R7 are configured in a Level 1 area.

Figure 1 shows the topology used in this example.

Figure 1: Route Leaking from a Level 2 Area to a Level 1 AreaRoute Leaking from a Level 2 Area to a Level 1 Area

Configuration

Configuring Route Leaking from a Level 2 Area to a Level 1 Area

CLI Quick Configuration

To quickly configure route leaking from a Level 2 area to a Level 1 area, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy level.

Device R3

Device R4

Device R5

Device R6

Device R7

Step-by-Step Procedure

Configuring Route Leaking from a Level 2 Area to a Level 1 Area

Step-by-Step Procedure

The following example requires that you navigate various levels in the configuration hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration Mode in the Junos OS CLI User Guide.

To configure route leaking from a Level 2 area to a Level 1 area:

  1. Configure the network interfaces.

    Enable IS-IS on the interfaces by including the ISO address family on each interface.

    Similarly, configure other routers.

  2. Configure two loopback interface addresses.

    One address is for IPv4, and the other address is to enable the router to form adjacencies with other routers in the area.

  3. Specify the IS-IS level on a per-interface basis.

  4. Configure a route leaking policy on the routers configured in the Level 2 area to leak routes into the Level 1 area.

    Similarly, configure Device R4.

Results

From configuration mode, confirm your configuration by entering the show interfaces, show protocols isis, and show policy-options commands.

If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration.

Similarly, confirm the configuration on all other routers. If you are done configuring the routers, enter commit from configuration mode.

Verification

Verifying Route Leaking from a Level 2 Area to a Level 1 Area

Purpose

Verify that IS-IS leaks routes from a Level 2 area to a Level 1 area.

Action

To verify that route leaking is taking place, use the following commands:

  • show isis adjacency (to verify that the IS-IS network is up and adjacencies have been established)

  • show isis database detail (to verify the presence of leaked routes)

  1. From operational mode on Device R3, run the show isis adjacency command.

    The output verifies that the interfaces on Device R3 are up and have established adjacencies with the connecting interfaces on Routers R4 and R5. If you don’t see the interfaces being functional, see the Results section for troubleshooting your configuration.

  2. From operational mode on Device R3, run the show isis database detail command.

    The Down keyword identifies the routes that have successfully leaked from the Level 2 area to the Level 1 area.

Meaning

Route leaking from a Level 2 to a Level 1 area is functioning as expected.