IP Routing: ISIS Configuration Guide, Cisco IOS Release 12.4
IP Routing: ISIS Configuration Guide, Cisco IOS Release 12.4
IP Routing: ISIS Configuration Guide, Cisco IOS Release 12.4
Americas Headquarters
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL
FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,
network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content
is unintentional and coincidental.
2012 Cisco Systems, Inc. All rights reserved.
CONTENTS
Integrated IS-IS Routing Protocol Overview 1
Finding Feature Information 1
Prerequisites for the Integrated IS-IS Routing Protocol 1
Information About the Integrated IS-IS Routing Protocol 2
IS-IS Functional Overview 2
IS Address Assignment 2
IS-IS PDU Types 3
IIHs 3
LSPs 3
SNPs 4
IS-IS Supported Circuit Types 4
Operation of IS-IS on Point-to-Point Circuits 4
Operation of IS-IS on Multiaccess Circuits 4
IS-IS Election of the Designated Intermediate System 5
IS-IS Overview of LSPDB Synchronization 6
Handling of Newer LSPs 6
Handling of Older LSPs 6
Handling LSPs That Are the Same 7
IS-IS Overview of the Shortest Path Calculation 8
Where to Go Next 9
Additional References 9
Glossary 10
Configuring a Basic IS-IS Network 13
Finding Feature Information 13
Prerequisites for Configuring a Basic IS-IS Network 13
Information About the IS-IS Routing Protocol 14
IS-IS Process and Adjacencies 14
PDU Packet Types in IS-IS Routing 14
How to Create Monitor and Make Changes to a Basic IS-IS Network 15
Contents
Contents
Contents
Contents
Contents
IS Address Assignment
An IS is identified by an address known as a Network Entity Title (NET). The NET is the address of a
Network Service Access Point (NSAP), which identifies an instance of the IS-IS routing protocol running
on an IS. The NET may be 8 to 20 octets in length and consists of three parts:
Note
An IS-IS instance may be assigned multiple area addresses. When this is the case, all area addresses are
considered synonymous. Multiple synonymous area addresses are useful when merging or splitting areas in
the domain. In normal operation, for example, once the merge or split has been completed, there is no need
to assign more than one area address to an IS-IS instance.
Note
Area address--This field is 1 to 13 octets in length and is composed of high-order octets of the address.
System ID--This field is 6 octets long and immediately follows the area address. When the IS operates
at Level 1, the system ID must be unique among all the Level-1 routers in the same area. When the IS
operates at Level 2, the system ID must be unique among all routers in the domain.
NSEL--The N-selector field is 1 octet in length and immediately follows the system ID. It must be set
to "00".
System ID
6 bytes
NSEL
1 byte
127420
Figure 1
IIHs, page 3
LSPs, page 3
SNPs, page 4
IIHs
Intermediate System-to-Intermediate System Hello PDUs (IIHs) are exchanged between IS neighbors on
circuits on which the IS-IS protocol is enabled. IIHs include the system ID of the sender, the assigned area
address(es), and the identity of neighbors on that circuit that are known to the sending IS. Additional
optional information may also be included.
There are three types of IIHs:
LSPs
An IS generates Link-State PDUs (LSPs) to advertise its neighbors and the destination that are directly
connected to the IS. An LSP is uniquely identified by the following:
Database (LSPDB). All Level-2 ISs will have an identical Level-2 LSPDB and will therefore have an
identical connectivity map for the Level-2 subdomain.
SNPs
Sequence Number PDUs (SNPs) contain a summary description of one or more LSPs. There are two types
of SNPs--complete and partial--for both Level 1 and Level 2.
Complete Sequence Number PDUs (CSNPs) are used to send a summary of the LSPDB that an IS has
for a given level.
Partial Sequence Number PDUs (PSNPs) are used to send a summary of a subset of the LSPs for a
given level that an IS either has in its database or needs to obtain.
For more information about how SNPs are used, see the IS-IS Supported Circuit Types, page 4.
Point-to-point circuits
Multiaccess circuits
ISs form separate adjacencies for each level with neighbor ISs on the circuit.
An IS will form a Level-1 adjacency with other ISs that support Level 1 on the circuit and will have a
matching area address. It is a misconfiguration to have two ISs with disjoint sets of area addresses
supporting Level 1 on the same multiaccess circuit.
An IS will form a Level-2 adjacency with other ISs that support Level 2 on the circuit.
The routers in the IS-IS network topology in the figure below perform Level 1, Level 2, or Level 1 and 2
routing along the backbone of the network.
Figure 2
L1-only
L2-only Area 3
L1L2
Area 2
L1L2
L1L2
L1-only
Area 4
L1L2
L1-only
L1L2
L1-only
IS-IS domain
127421
Area 1
Backbone links
The nonzero pseudonode ID is what differentiates a pseudonode LSP from a nonpseudonode LSP and is
chosen by the DIS to be unique among any other LAN circuits for which it is also the DIS at this level.
The DIS is also responsible for sending periodic CSNPs on the circuit. This provides a complete summary
description of the current contents of the LSPDB on the DIS. Other ISs on the circuit can then perform the
following activities:
Flood LSPs that they have that are absent from or are newer than those that are described in the
CSNPs sent by the DIS.
Request an LSP by sending a PSNP for LSPs that are described in the CSNPs sent by the DIS that are
absent from the local database or older than what is described in the CSNP set.
In this way, the LSPDBs of all ISs on a multiaccess circuit are efficiently and reliably synchronized.
At this point, the actions taken are identical to the actions that are described in the previous Handling of
Newer LSPs, page 6, after a new LSP has been added to the local database.
The figure below is applicable to all Level-1 routers in an area or to all Level-2 routers in a Level-2
subdomain.
Figure 3
LSP routerA
for Router A
to B
to B
to C
to A
to E
to
to DD
to
to EE
to
to A
A
LSP for
to A
to A
totoBB
to to
B B
to C
to D
D
to
LSP for Router C
to C
LSP for Router D
170882
Note
The figure below shows each router in the IS-IS network with its fully updated link-state database, after the
adjacencies have been formed among the neighbor routers.
Note
The figure below is applicable to all Level-1 routers in an area or to all Level-2 routers in a Level-2
subdomain.
Figure 4
lspA
lspA
lspA
LSPDB for Router E
lspE
lspD
lspC
lspC
lspB
lspA
lspA
lspE
lspD
lspC
lspE
lspB
lspD
lspE
lspC
lspC
lspB
lspA
lspA
lspE
lspD
lspC
lspC
lspD
170881
lspA
lspA
lspC
lspC
Note
An IS can generate up to 256 LSPs at each level. The LSPs are identified by the numbers 0 through 255.
LPS 0 has special properties, including the significance of the setting of the ATT bit to indicate attachment
to other areas. When LPSs that are numbered 1 though 255 have the ATT bit set, it is not of significance.
Where to Go Next
To initially configure and enable IS-IS, see the "Configuring a Basic IS-IS Network" module.
To customize IS-IS for your network design, see the "Customizing IS-IS for Your Network Design"
module.
To customize IS-IS for achieving fast convergence and scalability, see the following modules:
Additional References
Standards
Standard
Title
ISO 8473
ISO 9542
ISO/IEC 10589
IS-IS Protocol
MIBs
MIB
MIBs Link
RFCs
RFC
Title
RFC 1195
http://www.ietf.org/rfc/rfc1195.txt Use of OSI ISIS for Routing in TCP/IP and Dual Environments
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Glossary
area --A physically connected portion of a routing domain in which all routers are assigned a common area
address. Also known as the Level-1 subdomain. A routing domain may consist of multiple areas that are
reachable by traversing the Level-2 subdomain.
area address --The high-order octets of the Network Entity Title (NET) assigned to an IS. All ISs in the
same Level-1 area are assigned the same area address.
CLNP --ISO Connectionless Network Protocol as defined in ISO 8473.
DIS --Designated Intermediate System. An IS elected by all the ISs operating on a multiaccess circuit at a
given level to represent the multiaccess circuit. The DIS sends pseudonode LSPs on behalf of the circuit
advertising adjacencies to all the ISs operating on that circuit.
domain --The portion of a network on which the IS-IS protocol is configured to operate. The routing
domain consists of all Level-1 areas and the Level-2 subdomain.
ES --end system. An ES is any nonrouting host or node.
Integrated IS-IS --Extended form of IS-IS that supports multiple network protocols. Extensions have been
defined in IETF documents, especially RFC 1195.
IS --intermediate system. OSI term for a router.
IP --Internet Protocol Version 4, also known as IPv4.
IPv6 --Internet Protocol Version 6.
IS-IS --Intermediate System-to-Intermediate System. Routing protocol as defined in ISO/IEC 10589.
Level-1 router --An IS that supports Level-1 routing for its assigned area.
Level-2 router --An IS that supports Level-2 routing.
Level-2 subdomain --All Level-2 capable routers in a domain and the links that interconnect them. Level-1
areas are interconnected via the Level-2 subdomain. For routing in a domain to work properly, the Level-2
subdomain must not be partitioned.
NET --Network Entity Title. An address assigned to an instance of the IS-IS protocol. The NET includes
an area address, a system ID, and an N-selector. When multiple NETs are assigned to an IS-IS instance,
only the area address portion of the NET may differ.
NSEL --N-selector. The least significant octet of a Network Entity Title. It is always assigned the value 00.
system ID --The part of the NET that immediately follows the area address. The field is 6 octets long.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Before performing the tasks in this module, you should be familiar with the concepts described in the
"Integrated IS-IS Routing Protocol Overview" module.
You should know your network design and how you want traffic to flow through it before configuring
IS-IS. Define areas, prepare an addressing plan for the routers (including defining the NETs), and
determine the interfaces that will run Integrated IS-IS. To facilitate verification, a matrix of
adjacencies should be prepared before you configure your routers, showing what neighbors should be
expected in the adjacencies table. For more information on verifying IS-IS configuration and formed
adjacencies, see "Monitoring IS-IS".
Note
On point-to-point links, IIH PDUs will be the same for Level 1 and Level 2. Both Level-1 and Level-2 IIH
use the same type of PDU, but they carry different circuit types.
PSNP--partial sequence numbers protocol data unit (PDU). Used to acknowledge and request linkstate information.
CSNP--complete sequence number protocol data unit (PDU). Used to distribute the complete link-state
database of a router.
IS-IS LSPs include specific information about the routers attachments. The following information is
included in multiple TLV fields in the main body of the LSP:
The links to neighbor router intermediate systems (ISs), including the metrics of those interfaces
The links to the neighbor end systems (ESs)
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Purpose
Example:
Router(config)# router isis
Example:
Router(config-router)# net
49.0001.0000.0000.000b.00
Step 5 end
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Step 2 configure terminal
Purpose
Enters global configuration mode.
Example:
Router# configure terminal
Example:
Router(config)# interface ethernet 4/0
Example:
Router(config-if)# ip address
172.16.1.27 255.255.255.0
Example:
Router(config-if)# ip router isis
company1
Step 6 end
Enables IS-IS on the interfaces that are to use IS-IS to distribute their
IP information (and additionally that might be used to establish IS-IS
adjacencies).
Example:
Router(config-if)# end
Monitoring IS-IS
How to Create Monitor and Make Changes to a Basic IS-IS Network
Monitoring IS-IS
SUMMARY STEPS
1. enable
2. configure terminal
3. isis display delimiter [return count | character count]
4. exit
5. show ip protocols
6. show clns is area-tag neighbors [type number] [detail]
7. show clns interface [type number]
8. show clns area-tag neighbors [type number] [area] [detail]
9. show clns area-tag traffic
10. show ip route [ip-address [mask]] [[longer-prefixes] | protocol [process-id] | list [access-list-number |
access-list-name] | static download]]
11. show isis [process-tag] database [level-1] [level-2] [l1] [l2] [detail] [lspid]
12. show isis database verbose
13. show isis lsp-log
14. show isis [area-tag] [ipv6 | *] spf-log
15. show isis [process-tag] [ipv6 | *] topology
16. show isis [area-tag] neighbors[detail]
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# isis display
delimiter return 15
Command or Action
Step 4 exit
Purpose
Returns to privileged EXEC mode.
Example:
Router(config)# exit
Example:
Router# show ip protocols
Displays the parameters and current state of the active routing protocol
process.
You can use this command to learn what protocols are active, what
interfaces they are active on, what networks they are routing for, and
other parameters that relate to the routing protocols.
Example:
Router# show clns is tag3 neighbors
detail
Example:
Router# show clns interface
Step 8 show clns area-tag neighbors [type number] Displays both ES and IS neighbors.
[area] [detail]
The show clns neighbor command output verifies that the right
adjacencies have established. A matrix of adjacencies should be
prepared before you configure your routers, showing what neighbors
Example:
should be expected in the adjacencies table, to facilitate verification.
Router# show clns area3 neighbors
Command or Action
Step 9 show clns area-tag traffic
Example:
Router# show clns area3 traffic
Purpose
Displays traffic statistics.
To monitor IS-IS for stability once it has been deployed across your
network, enter the show clns traffic command to check the following
important statistics: high numbers of SPFs, checksum errors, and
retransmissions. To troubleshoot IS-IS behavior, you can use the output
from the show clns traffic command to check for the following
indicators:
The number of link-state PDUs (LSPs) can help you determine the
stability of the IS-IS network. The number of LSPs should never be
zero. However, an LSP count that keeps increasing over a short time
period indicates a network issue.
LSP retransmissions should stay low. A later execution of the show
clns traffic command that shows an increase in LSP
retransmissions, as compared to an earlier execution of the
command, can indicate instability or traffic problems.
To check for partial route calculations (PRCs), enter the show clns
traffic command. PRCs are flooded when a change that does not
affect topology is reported through an LSP; typical examples include
the addition or removal of a prefix or metric changes for external or
passive interfaces. A PRC update queue that remains full or
increases to the maximum value for long periods of time indicates
network instability.
LSP checksum errors indicate a problem.
The update queue should not stay full and should not drop much.
Step 10 show ip route [ip-address [mask]] [[longer- Displays the current state of the routing table.
prefixes] | protocol [process-id] | list [accesslist-number | access-list-name] | static
download]]
Example:
Router# show ip route 172.16.0.21
Example:
Router# show isis database detail
Command or Action
Step 12 show isis database verbose
Purpose
Displays additional information about the IS-IS database such as the
sequence number, checksum, and holdtime for LSPs.
Example:
Router# show isis database verbose
Example:
Router# show isis lsp-log
Displays how often and why the router has run a full shortest path first
(SPF) calculation.
Example:
Router# show isis spf-log
Example:
Router# show isis topology
Example:
Router# show isis neighbors detail
The show isis neighbor detailcommand output verifies that the right
adjacencies have established. A matrix of adjacencies should be
prepared before you configure your routers, showing what neighbors
should be expected in the adjacencies table, to facilitate verification.
Example
When the show isis neighbors command is entered with the detail keyword, the output provides
information on the IS-IS adjacencies that have formed.
Router1# show isis neighbors detail
System Id
Type Interface IP Address
Router2
L2
Et1/0
10.1.1.0
Area Address(es): 32
SNPA: aabb.cc00.2001
State Changed: 00:00:14
LAN Priority: 64
Format: Phase V
Troubleshooting Tips
You can use the following two system debugging commands to check your IS-IS IPv4 implementation.
If adjacencies are not coming up properly, use the debug isis adj-packets command.
To display a log of significant events during an IS-IS SPF calculation, use the debug isis spf-events
command.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Step 2 configure terminal
Purpose
Enters global configuration mode.
Example:
Router# configure terminal
Example:
Router(config)# interface Ethernet 0
Example:
Router(config-if)# isis protocol shutdown
Step 5 end
Example:
Router(config-if)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Purpose
Example:
Router# configure terminal
Example:
Router(config)# router isis 1
Prevents IS-IS from forming any adjacency on any interface and clears
the IS-IS LSP database, without actually removing the IS-IS
configuration.
Example:
Router(config-router)# protocol shutdown
Step 5 end
Example:
Router(config-router)# end
Router B Configuration
router isis
net 49.0001.0000.0000.000b.00
interface ethernet0/0
ip router isis
ip address 172.17.1.1 255.255.255.0
interface serial2/0
ip router isis
ip address 192.168.1.1 255.255.255.0
interface serial5/0
ip router isis
ip address 172.21.1.1 255.255.255.0
Router C Configuration
router isis
net 49.0001.0000.0000.000c.00
interface ethernet2/0
ip router isis
ip address 172.21.1.2 255.255.255.0
interface serial5/0
ip router isis
ip address 172.22.1.1 255.255.255.0
The show isis topology command displays the following information about how the routers are connected
within the IS-IS network:
RouterB# show isis topology
IS-IS paths to level-1 routers
System Id
Metric
RouterA
10
RouterB
-RouterC
10
IS-IS paths to level-2 routers
System Id
Metric
RouterA
10
RouterB
-RouterC
10
Next-Hop
RouterA
Interface
Se2/0
SNPA
*HDLC*
RouterC
Se5/0
*HDLC*
Next-Hop
RouterA
Interface
Se2/0
SNPA
*HDLC*
RouterC
Se5/0
*HDLC*
The show isis database command displays following information for the Level 1 and Level 2 LSPs for
each router in the IS-IS network.
RouterB# show isis database
IS-IS Level-1 Link State Database:
LSPID
LSP Seq Num LSP Checksum
RouterA.00-00
0x00000005
0x1A1D
RouterB.00-00
* 0x00000006
0xD15B
RouterC.00-00
0x00000004
0x3196
IS-IS Level-2 Link State Database:
LSPID
LSP Seq Num LSP Checksum
RouterA.00-00
0x00000008
0x0BF4
RouterB.00-00
* 0x00000008
0x1701
RouterC.00-00
0x00000004
0x3624
LSP Holdtime
1063
1118
1133
ATT/P/OL
0/0/0
0/0/0
1/0/0
LSP Holdtime
1136
1137
1133
ATT/P/OL
0/0/0
0/0/0
0/0/0
The show ip route command displays information about the interfaces of each router, including their IP
addresses and how they are connected to Router B:
RouterB# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
172.17.0.0/24 is subnetted, 1 subnets
The show isis spf-log command displays logs of Level 1 and Level 2 LSPs including time of occurrence,
duration, count, and the event that triggered the LSP.
RouterB## show isis spf-log
level 1 SPF log
When
Duration Nodes Count
00:01:30
0
3
7
level 2 SPF log
When
Duration Nodes Count
00:01:31
0
3
7
Figure 5
IS-IS Routing
E0
E0
S 2/0
Router A
IS-IS
Router B
S 5/0
Router C
E2
230125
IS-IS
State
Up
Up
Holdtime
25
29
Type
L1L2
L1L2
Protocol
IS-IS
IS-IS
When the isis protocol shutdown command is entered for Ethernet interface 3/1, the IS-IS protocol will be
disabled for the specified interface:
Router# configure terminal
Enter configuration commands, one per line.
Router(config)# interface ethernet3/1
Router(config-if)# isis protocol shutdown
Router(config-if)# end
The following router output shows that the adjacency for Ethernet interface 3/1 has not formed:
Router# show clns neighbors
System Id Interface SNPA
second
Et3/2
0004.6d25.c056
State
Up
Holdtime
27
Type
L1L2
Protocol
IS-IS
State
Up
Up
Holdtime
29
28
Type
L1L2
L1L2
Protocol
IS-IS
IS-IS
The protocol shutdown command is entered so that IS-IS is disabled and no adjacencies will be formed on
any interface:
Router# configure terminal
Enter configuration commands, one per line.
Router(config)# router isis area1
Router(config-router)# protocol shutdown
Router(config-router)# end
The following router output now shows that both adjacencies are gone.
Router# show clns neighbors
System Id Interface SNPA
State
Holdtime
Type
Protocol
When the no protocol shutdown command is entered, the adjacencies will again be formed on both
interfaces:
Router(config)# router isis area1
Router(config-router)# no protocol shutdown
Router(config-router)# end
Router# show clns neighbors
System Id Interface SNPA
State
south
Et3/1
0002.7dd6.1c21 Up
north
Et3/2
0004.6d25.c056 Up
Holdtime
24
24
Type
L1L2
L1L2
Protocol
IS-IS
IS-IS
Where to Go Next
To customize IS-IS for your network design, see the "Customizing IS-IS for Your Network Design"
module.
To customize IS-IS for achieving fast convergence and scalability, see the following modules:
Additional References
Related Documents
Related Topic
Document Title
Standards
Standard
Title
--
MIBs
MIB
MIBs Link
CISCO-IETF-IP-FORWARD-MIB
CISCO-IETF-IP-MIB
RFCs
RFC
Title
RFC 1195
http://www.ietf.org/rfc/rfc1195.txt Use of OSI ISIS for Routing in TCP/IP and Dual Environments
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Feature Name
Releases
Feature Information
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Before performing the tasks in this module, you should be familiar with the concepts described in the
"Integrated IS-IS Routing Protocol Overview" module.
You should understand the concept of IP addressing. For more information on IP addressing, see the
"Configuring IPv4 Addresses" module of the Cisco IOS IP Addressing Services Configuration Guide.
You should know your network design and how you want traffic to flow through it before configuring
IS-IS. Define areas, prepare an addressing plan for the routers (including defining the network entity
titles [NETs]), and determine the interfaces that will run Integrated IS-IS.
IS-IS must be enabled.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# interface ethernet 0
Example:
Router(config-if)# isis metric 15 level-1
all interfaces. If you do not do so, all links will have the
same cost and the cost to reach any node in the network
will be logically equivalent to the number of hops.
Command or Action
Purpose
Step 5 end
Example:
Router(config-if)# end
Step 6 show isis [process-tag] database [level-1] [level-2] [l1] (Optional) Displays the IS-IS link-state database.
[l2] [detail] [lspid]
To display information about each LSP and the link-state
database, enter the detail keyword.
Example:
Router# show isis database detail
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Purpose
Example:
Router(config)# interface ethernet 0/3
Example:
Router(config-if)# ip priority 2 level-1
Step 5 end
Example:
Router(config-if)# end
Example:
The command output will display the DIS for both Level 1 and
Level 2.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router isis
Configures the routing level for an instance of the IS-IS routing process.
Example:
Step 5 end
Example:
Router(config-router)# end
Example:
Example
The following example shows output from the show isis topology command for a router within a dual
CLNS-IP network. In this example, because neither the level-1 nor level-2 optional keywords were entered,
information is displayed for both Level 1 and Level 2 routers.
Router# show isis topology
Tag L2BB:
IS-IS paths to level-2 routers
System Id
Metric Next-Hop
0000.0000.0005 -0000.0000.0009 10
0000.0000.0009
0000.0000.0017 20
0000.0000.0009
0000.0000.0053 30
0000.0000.0009
0000.0000.0068 20
0000.0000.0009
Tag A3253-01:
IS-IS paths to level-1 routers
System Id
Metric Next-Hop
0000.0000.0003 10
0000.0000.0003
0000.0000.0005 -0000.0000.0053 10
0000.0000.0053
Interface
SNPA
Tu529
Tu529
Tu529
Tu529
*Tunnel*
*Tunnel*
*Tunnel*
*Tunnel*
Interface
Et1
SNPA
0000.0c03.6944
Et1
0060.3e58.ccdb
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router isis
Command or Action
Purpose
Example:
Router(config-router)# summary-address
10.1.0.0 255.255.0.0 level-2
Step 5 end
Example:
Router(config-router)# end
Example:
Router# show isis database verbose
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Step 2 configure terminal
Purpose
Enters global configuration mode.
Example:
Router# configure terminal
Example:
Router(config)# router isis
Example:
Use the route map to identify the level into which the default
route is to be announced, whether a particular non-default
prefix must be reachable, etc.
Router(config-router)# default-information
originate
Step 5 end
Example:
Router(config-router)# end
Example:
Router# show ip route
DETAILED STEPS
Command or Action
Purpose
Step 1 enable
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router isis 1
Globally sets a new default metric value for all IS-IS interfaces.
Example:
The value 25 shown in the example will apply only to Level 2 IS-IS
interfaces. If you do not enter the level-1 or level-2 keyword, the
metric will be applied to both Level 1 and Level 2 IS-IS interfaces.
Router(config-router)# metric 25
level-2
Step 5 end
Example:
Router(config-router)# end
Example:
Enter this command if you want to verify the IS-IS global default
metric that is set for the interface.
In the following example, the show clns interface command confirms that the IS-IS IPv4 interface metric
for both Level 1 and Level 2 interfaces is assigned the new default metric value 111:
Router# show clns interface
Ethernet3/1 is up, line protocol is up
Checksums enabled, MTU 1497, Encapsulation SAP
ERPDUs enabled, min. interval 10 msec.
CLNS fast switching enabled
CLNS SSE switching disabled
DEC compatibility mode OFF for this interface
Next ESH/ISH in 39 seconds
Routing Protocol: IS-IS
Circuit Type: level-1-2
Interface number 0x0, local circuit ID 0x1
Level-1 Metric: 111, Priority: 64, Circuit ID: mekong.01
Level-1 IPv6 Metric: 10
Number of active level-1 adjacencies: 0
Level-2 Metric: 111, Priority: 64, Circuit ID: mekong.01
Level-2 IPv6 Metric: 10
Number of active level-2 adjacencies: 0
Next IS-IS LAN Level-1 Hello in 922 milliseconds
Next IS-IS LAN Level-2 Hello in 1 seconds
Ethernet3/2 is up, line protocol is up
Checksums enabled, MTU 1497, Encapsulation SAP
ERPDUs enabled, min. interval 10 msec.
CLNS fast switching enabled
CLNS SSE switching disabled
DEC compatibility mode OFF for this interface
Next ESH/ISH in 20 seconds
Routing Protocol: IS-IS
Circuit Type: level-1-2
Interface number 0x1, local circuit ID 0x2
Level-1 Metric: 111, Priority: 64, Circuit ID: mekong.02
Level-1 IPv6 Metric: 10
Number of active level-1 adjacencies: 1
Level-2 Metric: 111, Priority: 64, Circuit ID: mekong.02
Level-2 IPv6 Metric: 10
Number of active level-2 adjacencies: 1
Next IS-IS LAN Level-1 Hello in 2 seconds
Next IS-IS LAN Level-2 Hello in 1 seconds
In the following example, the isis metric command is entered so that it will assign a metric value of 10.
The metric value that is set with the isis metric command for Ethernet interface 3/1 will take precedence
over the metric value that was previously set with the metric command.
interface Ethernet3/1
ip address 172.30.10.2 255.255.0.0
When the show clns interfacecommand is entered, the router output confirms that the interface has an
assigned IS-IS IPv4 metric value of 10:
Router# show clns interface
Ethernet3/1 is up, line protocol is up
Checksums enabled, MTU 1497, Encapsulation SAP
ERPDUs enabled, min. interval 10 msec.
CLNS fast switching enabled
CLNS SSE switching disabled
DEC compatibility mode OFF for this interface
Next ESH/ISH in 53 seconds
Routing Protocol: IS-IS
Circuit Type: level-1-2
Interface number 0x0, local circuit ID 0x1
Level-1 Metric: 10, Priority: 64, Circuit ID: mekong.01
Level-1 IPv6 Metric: 10
Number of active level-1 adjacencies: 0
Level-2 Metric: 10, Priority: 64, Circuit ID: mekong.01
Level-2 IPv6 Metric: 10
Number of active level-2 adjacencies: 0
Next IS-IS LAN Level-1 Hello in 4 seconds
Next IS-IS LAN Level-2 Hello in 4 seconds
Ethernet3/2 is up, line protocol is up
Checksums enabled, MTU 1497, Encapsulation SAP
ERPDUs enabled, min. interval 10 msec.
CLNS fast switching enabled
CLNS SSE switching disabled
DEC compatibility mode OFF for this interface
Next ESH/ISH in 30 seconds
Routing Protocol: IS-IS
Circuit Type: level-1-2
Interface number 0x1, local circuit ID 0x2
Level-1 Metric: 111, Priority: 64, Circuit ID: mekong.02
Level-1 IPv6 Metric: 10
Number of active level-1 adjacencies: 1
Level-2 Metric: 111, Priority: 64, Circuit ID: mekong.02
Level-2 IPv6 Metric: 10
Number of active level-2 adjacencies: 1
Next IS-IS LAN Level-1 Hello in 2 seconds
Next IS-IS LAN Level-2 Hello in 922 milliseconds
Where to Go Next
To customize IS-IS for achieving fast convergence and scalability, see the "Overview of IS-IS Fast
Convergence" module.
To enhance IS-IS network security, see the "Enhancing Security in an IS-IS Network" module.
Additional References
Related Documents
Related Topic
Document Title
Configuring IPv6
RFCs
RFCs
Title
RFC 1195
http://www.ietf.org/rfc/rfc1195.txt Use of OSI ISIS for Routing in TCP/IP and Dual Environments
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 2
Feature Name
Releases
Feature Information
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Network Convergence
Convergence is the process of all routers coming to agreement on optimal routes in a network. When a
network event causes routes to become available or unavailable, routers send routing update messages
through the network that cause routing algorithms to recalculate optimal routes. Eventually all the routers
agree on the routes as well as the network topology. Fast convergence benefits network performance.
Routing algorithms that converge slowly may cause temporary routing loops or temporary network
unavailability.
The process of network convergence can be divided into three separate stages:
1 Routing change detection: The speed at which a device on the network can detect and react to the
failure or modification of one of its own components, or to a topology change caused by the failure or
modification of a component on a routing protocol peer.
2 Routing change notification: The speed at which the failure or topology change in the previous stage
can be communicated to other devices in the network.
3 Alternate path calculation: The speed at which all devices on the network, having been notified of the
failure or topology change, can process the information and calculate an alternate path through which
data can flow.
An improvement in any one of these stages provides an improvement in overall convergence. In addition to
a basic configuration task that is recommended as a first step in configuring an IS-IS router with best
practice parameters for achieving fast convergence, several recommended configuration tasks are grouped
according to the stage of network convergence they can improve. For more information, see the following
modules:
Note
For the Cisco 12000 series Internet routers, we recommend that you when you configure the process-maxtime command, do not use a value lower than 60 milliseconds.
Where to Go Next
To configure features to improve IS-IS network convergence times, complete the optional tasks in one or
more of the following modules:
To enhance IS-IS network security, see the "Enhancing Security in an IS-IS Network" module.
Additional References
Related Documents
Related Topic
Document Title
Standards
Standard
Title
ISO 8473
ISO 9542
ISO/IEC 10589
IS-IS Protocol
MIBs
MIB
MIBs Link
RFCs
RFC
Title
None
--
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
General Steps for Improving Convergence Time in the IS-IS Network, page 50
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Configures the routing level for an instance of the IS-IS routing process.
Example:
Router(config-router)# is-type level-1
Note You can also set the IS-IS level type on the interface by entering the
Example:
Router(config-router)# metric-style
wide
Setting the overload bit gives the router enough time to build its BGP
and CEF tables prior to the router being used as a transit node.
Example:
Router(config-router)# set-overloadbit on-startup 360
Example Enabling IS-IS on a Router and Setting Best Practice Parameters for IS-IS Fast Convergence
Configuration Examples for Setting Best Practice Parameters for IS-IS Fast Convergence
Command or Action
Step 7 no hello padding
Purpose
Disables IS-IS hello padding at the router level.
Example:
Router(config-router)# no hello
padding
Step 8 end
By default the IS-IS Hello PDUs are padded to the full MTU size,
possibly having a negative impact on time-sensitive application traffic
that travels across low-bandwidth interfaces or on interface buffer
resources when frequent hellos are configured. It is recommended to
globally disable hello padding.
Example:
Router(config-router)# end
Lists the protocol-specific information for each ISO IGRP or IS-IS routing
process in the router.
Example:
Router(config-if)# show clns protocol
Where to Go Next
To configure features to improve IS-IS network convergence times, complete the optional tasks in one or
more of the following modules:
Additional References
Related Documents
Related Topic
Document Title
Standards
Standard
Title
--
MIBs
MIB
MIBs Link
RFCs
RFC
Title
--
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Feature Information for Setting Best Practice Parameters for IS-IS Fast Convergence
Feature Name
Software Releases
Feature Information
--
--
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Example Enabling IS-IS on a Router and Setting Best Practice Parameters for IS-IS Fast Convergence
You can enable BFD for all of the interfaces for which IS-IS is routing by using the bfd all-interfaces
command in router configuration mode. You can then disable BFD for one or more of those interfaces
using the isis bfd disable command in interface configuration mode.
You can enable BFD for a subset of the interfaces for which IS-IS is routing by using the isis bfd
command in interface configuration mode.
IP event dampening introduces a configurable exponential delay mechanism to suppress the effects of
excessive interface flapping events on routing protocols and routing tables in the network. This feature
allows the network operator to configure a router to automatically identify and selectively dampen a local
interface that is flapping, removing it from the network until it becomes stable again. Thus, the network
becomes more stable, with a faster convergence time.
Tuning hello parameters should be considered only when the link type does not offer fast enough link
failure detection. The standard default values for the hello interval and hello multiplier are 10 seconds and
3 seconds. Therefore, the multiplier times the interval will give a default hold-time of 30 seconds.
Although a slower hello interval saves bandwidth and CPU usage, there are some situations when a faster
hello interval is preferred. In the case of a large configuration that uses Traffic Engineering (TE) tunnels, if
the TE tunnel uses ISIS as the Interior Gateway Protocol (IGP), and the IP routing process is restarted at
the router at the ingress point of the network (headend), then all the TE tunnels get resignaled with the
default hello interval. A faster hello interval prevents this resignaling. To configure a faster hello interval,
you need to decrease the ISIS hello interval manually using the isis hello-intervalcommand.
Configuring a point-to-point adjacency over a broadcast media can improve convergence times of a
customers network because it prevents the system from electing a designated router (DR), prevents
flooding from using CSNPs for database synchronization, and simplifies shortest path first (SPF)
computations.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Purpose
Example:
Router# configure terminal
Example:
Example:
Router(config-if)# bfd interval 50 min_rx 50
multiplier 5
Step 5 end
Example:
Router(config-if)# end
Prerequisites, page 60
Configuring BFD Support for IS-IS for All Interfaces, page 60
Configuring BFD Support for IS-IS for One or More Interfaces, page 62
Prerequisites
IS-IS must be running on all participating routers.
The baseline parameters for BFD sessions on the interfaces that you want to run BFD sessions to BFD
neighbors over must be configured. See the Configuring BFD Session Parameters on the Interface, page 59
for more information.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. bfd all-interfaces
5. exit
6. interface type number
7. isis bfd [disable]
8. end
9. show bfd neighbors [details]
10. show clns interface
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router isis tag1
Enables BFD globally on all interfaces associated with the IS-IS routing
process.
Example:
Router(config-router)# bfd allinterfaces
Step 5 exit
Example:
Router(config-router)# exit
Command or Action
Step 6 interface type number
Purpose
(Optional) Enters interface configuration mode.
Example:
Router(config)# interface
fastethernet 6/0
Example:
of the interfaces that IS-IS is associated with using the bfd allinterfaces command in router configuration mode.
Step 8 end
Example:
Router(config-if)# end
Example:
details command on a Cisco 12000 series router, you must enter the
command on the line card. Enter the attach slot-number command
to establish a CLI session with a line card. The registered protocols
are not shown in the output of the show bfd neighbors
detailscommandwhen it is entered on a line card.
Displays information that can be used to verify if BFD for IS-IS has been
enabled for a specific IS-IS interface that is associated.
Example:
Router# show clns interface
enable
configure terminal
interface type number
isis bfd [disable]
end
show bfd neighbors [details]
show clns interface
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# interface
fastethernet 6/0
Example:
Router(config-if)# isis bfd
Step 5 end
of the interfaces that IS-IS is associated with using the bfd allinterfaces command in router configuration mode.
Returns the router to privileged EXEC mode.
Example:
Router(config-if)# end
Example:
Router# show bfd neighbors details
Displays information that can help verify if the BFD neighbor is active and
displays the routing protocols that BFD has registered.
Note In order to display the full output of the show bfd neighbors details
Command or Action
Step 7 show clns interface
Purpose
Displays information that can help verify if BFD for IS-IS has been enabled
for a specific IS-IS interface that is associated.
Example:
Router# show clns interface
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# interface FastEthernet 0/1
Command or Action
Step 4 dampening [half-life-period reuse-threshold]
[suppress-threshold max-suppress-time [restartpenalty]]
Example:
Purpose
Enables interface dampening.
Router(config-if)# dampening
Step 5 end
Example:
Router(config-if)# end
Example:
Router# show dampening interface
Example:
Router# show interface dampening
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables higher privilege levels, such as privileged EXEC mode.
Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 interface interface-type interface-number Configures an interface type and enters interface configuration mode.
Example:
Router(config)# interface
Ethernet 0/1
Specifies the length of time between the sending of IS-IS hello PDUs.
Example:
Router(config-if)# isis hellointerval 5 level-1
The default value is 10. The hello interval multiplied by the hello
multiplier equals the hold time. If the minimal keyword is specified, the
hold time is 1 second and the system computes the hello interval based on
the hello multiplier.
The hello interval can be configured independently for Level 1 and Level
2, except on serial point-to-point interfaces. (Because only a single type
of hello PDU is sent on serial links, it is independent of Level 1 or Level
2.) The level-1 and level-2 keywords are used on X.25, SMDS, and Frame
Relay multiaccess networks or LAN interfaces.
Note A faster hello interval gives faster convergence, but increases bandwidth
and CPU usage. It might also add to instability in the network, due to
false failure detection events. A slower hello interval saves bandwidth
and CPU. Especially when used in combination with a higher hello
multiplier, this configuration may increase overall network stability, but
has typical slower network convergence as a consequence.
Step 5 isis hello-multiplier multiplier [level-1 |
level-2]
Specifies the number of IS-IS hello PDUs a neighbor must miss before the
router should declare the adjacency as down.
Example:
Configuring an IS-IS Point-to-Point Adjacency over Broadcast Media to Reduce Link Failure Detection Times
Configuring BFD Support for IS-IS for One or More Interfaces
Command or Action
Step 6 end
Purpose
Returns to privileged EXEC mode.
Example:
Router(config-if)# end
Perform this task for IS-IS networks that consist of only two networking devices connected to broadcast
media. Such networks are usually configured as a point-to-point link rather than a broadcast link. In this
case, it is recommended to follow this task to decrease the link failure detection time.
Having a multipoint interface instead of the point-to-point interfaces will cause the creation of a
pseudonode on the network. The addition of the pseudonode means that the router must retain information
about it. To decrease the size of the topology database of the router, thereby reducing the memory
requirement of the router and increasing the efficiency of the SPF calculation since there is one less node
involved, configure point-to-point interfaces when possible.
>
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-type interface-number
4. isis network point-to-point
5. end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables higher privilege levels, such as privileged EXEC mode.
Enter your password if prompted.
Example:
Router> enable
Command or Action
Step 2 configure terminal
Purpose
Enters global configuration mode.
Example:
Router# configure terminal
Example:
Router(config)# interface Fastethernet 4/0
Example:
Router(config-if)# isis network point-to-point
Step 5 end
Example:
Router(config-if)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 isis display delimiter [return count | character count] Makes output from multiarea displays easier to read by
specifying the delimiter to use to separate displays of
information.
Example:
Router(config)# isis display delimiter return
2
Step 4 exit
Example:
Router(config)# exit
Example:
Router# show isis database detail
Example:
Router# show isis financetag routes
Displays how often and why the router has run a full SPF
calculation.
Example:
Router# show isis spf-log
Command or Action
Step 8 show isis [process-tag] topology
Purpose
Displays a list of all connected routers in all areas.
Example:
Router# show isis financetag topology
bfd all-interfaces
!
The output from the show bfd neighbors detailscommand from Router A verifies that a BFD session has
been created and that IS-IS is registered for BFD support:
Router A
RouterA# show bfd neighbors details
OurAddr
NeighAddr
LD/RD RH Holdown(mult) State
Int
172.16.10.1
172.16.10.2
1/8 1
536 (3 )
Up
Fa0/1
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 200000, MinRxInt: 200000, Multiplier: 5
Received MinRxInt: 1000, Received Multiplier: 3
Holdown (hits): 600(0), Hello (hits): 200(23543)
Rx Count: 13877, Rx Interval (ms) min/max/avg: 200/448/335 last: 64 ms ago
Tx Count: 23546, Tx Interval (ms) min/max/avg: 152/248/196 last: 32 ms ago
Registered protocols: ISIS
Uptime: 01:17:09
Last packet: Version: 0
- Diagnostic: 0
I Hear You bit: 1
- Demand bit: 0
Poll bit: 0
- Final bit: 0
Multiplier: 3
- Length: 24
My Discr.: 8
- Your Discr.: 1
Min tx interval: 50000
- Min rx interval: 1000
Min Echo interval: 0
The output from the show bfd neighbors detailscommand from the line card on Router B verifies that a
BFD session has been created:
Note
Router B is a Cisco 12000 series router. The show bfd neighbors detailscommand must be run on the line
cards. The show bfd neighbors detailscommand will not display the registered protocols when it is entered
on a line card.
Router B
RouterB# attach 6
Entering Console for 8 Port Fast Ethernet in Slot: 6
Type "exit" to end this session
Press RETURN to get started!
LC-Slot6> show bfd neighbors details
Cleanup timer hits: 0
OurAddr
NeighAddr
LD/RD RH Holdown(mult) State
Int
172.16.10.2
172.16.10.1
8/1 1
1000 (5 )
Up
Fa6/0
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 50000, MinRxInt: 1000, Multiplier: 3
Received MinRxInt: 200000, Received Multiplier: 5
Holdown (hits): 1000(0), Hello (hits): 200(5995)
Rx Count: 10126, Rx Interval (ms) min/max/avg: 152/248/196 last: 0 ms ago
Tx Count: 5998, Tx Interval (ms) min/max/avg: 204/440/332 last: 12 ms ago
Last packet: Version: 0
- Diagnostic: 0
I Hear You bit: 1
- Demand bit: 0
Poll bit: 0
- Final bit: 0
Multiplier: 5
- Length: 24
My Discr.: 1
- Your Discr.: 8
Min tx interval: 200000
- Min rx interval: 200000
Min Echo interval: 0
Uptime: 00:33:13
SSO Cleanup Timer called: 0
SSO Cleanup Action Taken: 0
Pseudo pre-emptive process count: 239103 min/max/avg: 8/16/8 last: 0 ms ago
IPC Tx Failure Count: 0
IPC Rx Failure Count: 0
Total Adjs Found: 1
Example Configuring IS-IS to Achieve Fast Convergence by Reducing Failure Detection Times
Where to Go Next
Where to Go Next
To configure additional features to improve IS-IS network convergence times, complete the optional tasks
in one or more of the following modules:
Additional References
Related Documents
Related Topic
Document Title
Standards
Standard
Title
--
RFCs
RFC
Title
--
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Table 4
Feature Name
Software Releases
Feature Information
12.4(4)T
Bidirectional Forwarding
Detection (BFD) is a detection
protocol designed to provide fast
forwarding path failure detection
times for all media types,
encapsulations, topologies, and
routing protocols. In addition to
fast forwarding path failure
detection, BFD provides a
consistent failure detection
method for network
administrators. Because the
network administrator can use
BFD to detect forwarding path
failures at a uniform rate, rather
than the variable rates for
different routing protocol hello
mechanisms, network profiling
and planning will be easier, and
reconvergence time will be
consistent and predictable.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
LSP --An LSP is a PDU that is sent between two IS-IS neighbors. The LSP contains information about
neighbors and path costs, including adjacencies to neighbors, connected IP prefixes, Open Systems
Interconnection (OSI) end systems, and area addresses. LSPs are used by the receiving routers to
maintain their routing tables.
IIH --An IS-IS Hello PDU is used to establish and maintain adjacencies. By default, an Intermediateto-Intermediate Hello (IIH) is padded to the maximum transmission unit (MTU) size.
PSNP --A partial sequence number PDU (PSNP) contains summaries of only a subset of known LSPs.
A PSNP is used to acknowledge and request link-state information by soliciting newer versions of a
complete LSP, or acknowledging receipt of an updated LSP, respectively.
CSNP --A complete sequence number PDU (CSNP) contains summaries of all LSPs known by the
issuing router.
Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
Information About Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
LSP refresh interval --Specifies the number of seconds (0 to 65535) the router will wait before
refreshing (re-creating and reflooding) its own LSP.
Maximum LSP lifetime --Specifies the value of the lifetime in the LSP header. Lifetime is used by all
IS-IS routers in order to age out and purge old LSPs.
The following exponential backoff timers have been implemented in IS-IS to control the events of SPF
calculation, Partial Route Calculations (PRC) computation, and LSP generation:
PRC interval --Specifies the number of seconds between two consecutive PRCs. When changes that
do not affect the topology, such as advertised external prefixes, are detected, the PRC is triggered.
LSP generation interval --Specifies the number of seconds between creating new versions of a given
LSP on a per-node basis.
SPF interval --Specifies the number of seconds between two consecutive SPF calculations.
The purpose of these exponential backoff timers is to react quickly to the first events but, under constant
churn, to slow down in order to prevent the CPU of the router from collapsing. The exponential backoff
algorithm operates as follows:
1 An initial event triggers the SPF, PRC, or LSP generation.
2 The initial wait time that is configured for the interval determines the time between the initial event and
the start of the SPF, PRC, or LSP generation.
3 The incremental wait time that is configured for the interval determines the amount of time that the
router will wait in between the consecutive SPF execution, PRC execution, or LSP generation. This
incremental value will increase exponentially between the incremental events until the maximum value
is reached. For example, the incremental value will be (1x incremental value) between the first and
second events, (2 x incremental value) between the second and third event, (4 x incremental value)
between the third and fourth event, (8 x incremental value) between the fourth and fifth event, and so
on, until the configured maximum interval--amount of time in seconds that the router will wait in
between consecutive SPF execution, PRC execution, or LSP generation--has been reached.
4 If no new triggers have been received after two times the configured maximum wait-interval value, the
network stabilizes, returning to a steady state and fast behavior. The initial wait-time interval will be
reinstated.
See the to configure the recommended settings for the SPF, PRC and LSP generation timers.
IS-IS Hello PDU Timers
The different IS-IS Hello timers need to be adapted according to the adjacency convergence time required
for each subnet. Where a rapid adjacency loss has been detected, the timers need to be reduced. These
timers should be modified if necessary after deployment and after an accurate monitoring of the network
stability and convergence has occurred.
Hello interval --Number of seconds during two consecutive transmissions of IIH PDUs.
Hello interval minimum --When the hello interval is configured, the hold time is set to one second.
The significance of the hello multiplier changes if Fast Hellos are used; the hello multiplier becomes
the number of hellos that will be sent per second.
Hello multiplier --An integer from 1 to 300 that is used to calculate the hold time. The hold time is
the number of seconds during which the router will wait for an IIH before declaring that its neighbor is
lost. The router multiplies the hello interval by the hello multiplier to determine the hold time. To
avoid unnecessary adjacency resets, increase the default value of 3 on interfaces where frequent losses
of IIH PDUs are detected.
IS-IS retransmit interval --Specifies the number of seconds between the resending of IS-IS link-state
PDU transmissions for point-to-point links.
CSNP Interval
TheCSNP interval specifies the number of seconds between the two consecutive transmissions of CSNP
PDUs. CSNP are generated by the designated router (DIS) in order for all routers connected to a broadcast
media to synchronize their databases and by adjacent routers on a point-to-point network while setting up
an adjacency. CSNPs are used to keep all router databases up to date. The lower the value of the CSNP
interval, the faster the speed of the sychronization. However, a CSNP interval that is too low will trigger
intensive PSNP PDU transmissions. All routers that are not synchronized with the DIS (Designated
Intermediate System) and that, therefore, need additional LSPs in their database send PSNPs.
SPF, PRC, and LSP generation exponential backoff timers need to be tuned according to the level of
stability of the network and the stability required in the routing domain. For instance, setting low values
will trigger a fast convergence with a potential risk of high resource utilization if flapping routes cause
network churn. Setting high values will keep the network stable with slower convergence.
It is recommended to leave the default value for the LSP generation interval at 5 seconds and also to
increase the maximum lifetime for LSPs to 65,535 seconds, in order to conserve CPU usage for generation
and refreshing of LSPs.
If you are using a routing algorithm based on SPF and if you use values for the initial required delay that
are fewer than 40 milliseconds, SPF may start before the LSP that triggered SPF is flooded to neighbors.
The router should always flood, at least, the LSP that triggered SPF before the router runs the SPF
computation. LSP flooding is required in order to guarantee that the network update in the LSP is
propagated around the network as quickly as possible.
Tuning SPF PRC and LSP Generation Exponential Backoff Timers, page 78
Enabling IS-IS Fast-Flooding of LSPs, page 80
Monitoring IS-IS Network Convergence Time, page 81
Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
How to Reduce Link Failure and Topology Change Notification Times in IS-IS Networks
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Step 4 spf-interval [level-1 | level-2] spf-max-wait [spf-initial- Customizes IS-IS throttling of SPF calculations.
wait spf-second-wait]
Note The recommended values for the spf-max-wait, spfinitial-wait, and spf-second-wait arguments are 5, 1, and
20, respectively.
Example:
Router(config-router)# spf-interval 5 1 20
Step 5 prc-interval prc-max-wait [prc-initial-wait prc-second- Customizes IS-IS throttling of PRC calculations.
wait]
Note The recommended values for the prc-max-wait, prcinitial-wait, and prc-second-wait arguments are 5, 1, and
20, respectively.
Example:
Router(config)# prc-interval 5 1 20
Example:
Router(config-router)# lsp-gen-interval 5 1 20
Example:
Sets the maximum time for which LSPs persist without being
refreshed.
Command or Action
Purpose
Example:
Router(config-router)# lsp-refresh-interval
65535
Step 9 end
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Step 3 router isis [area-tag]
Purpose
Enables IS-IS as an IP routing protocol and assigns a tag to a process, if
required, and enters router configuration mode.
Example:
Router(config)# router isis
Fast-floods LSPs.
Example:
Keep the default values for the isis retransmit-interval and isis
retransmit-throttle-interval commands when you configure the fastflood command.
Router(config-router)# fast-flood 20
Step 5 end
Example:
Router(config-router)# end
Example:
Router# show running-config
Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
How to Reduce Link Failure and Topology Change Notification Times in IS-IS Networks
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# isis display delimiter return
2
Step 4 exit
Example:
Router(config)# exit
Step 5 show isis database [level-1] [level-2] [l1] [l2] [detail] (Optional) Displays the IS-IS link-state database.
[lspid]
Example:
Router# show isis database detail
Example:
Router# show isis financetag routes
Example:
Router# show isis spf-log
(Optional) Displays how often and why the router has run a full
SPF calculation.
Command or Action
Purpose
Example:
Router# show isis financetag topology
Where to Go Next
To configure features to improve IS-IS network convergence times and scalability, complete the optional
tasks in one or more of the following modules:
Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
Additional References
Additional References
Related Documents
Related Topic
Document Title
RFCs
RFC
Title
--
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 5
Feature Information for Reducing Link Failure and Topology Change Notification Times in IS-IS
Networks
Feature Name
Software Releases
Feature Information
12.0(27)S 12.3(7)T
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Route Redistribution
IS-IS Priority-Driven IP Prefix RIB Installation
with routes to IP networks. When changes occur, the entire SPT is recomputed. In many cases, the entire
SPT need not be recomputed because most of the tree remains unchanged. Incremental SPF allows the
system to recompute only the affected part of the tree. Recomputing only a portion of the tree rather than
the entire tree results in faster IS-IS convergence and saves CPU resources.
Incremental SPF computes only the steps needed to apply the changes in the network topology diagram.
That process requires that the system keep more information about the topology in order to apply the
incremental changes. Also, more processing must be done on each node for which the system receives a
new LSP. However, incremental SPF typically reduces demand on CPU.
Route Redistribution, page 88
IS-IS Caching of Redistributed Routes, page 88
Prioritizing the Update of IP Prefixes in the RIB to Reduce Alternate-Path Calculation Time, page
88
Tagging IS-IS Routes to Control Their Redistribution, page 89
Limiting the Number of Routes That Are Redistributed into IS-IS, page 90
Streamlining the Routing Table Update Process by Excluding Connected IP Prefixes from LSP
Advertisements, page 91
Route Redistribution
Routers are allowed to redistribute external prefixes, or routes, that are learned from any other routing
protocol, static configuration, or connected interfaces. The redistributed routes are allowed in either a Level
1 router or a Level 2 router. When Level 2 routes are injected as Level 1 routes, this is called route leaking.
flooding updated routing information (in the form of link-state PDUs) to other routers. All routers,
including the router that detected the topology change, must utilize the updated topology information to
recompute shortest paths (run an SPF), providing the updated output of the SPF calculation to the routers
RIB, which will eventually cause the updated routing information to be used to forward packets. Until all
routers have performed these basic steps, some destinations may be temporarily unreachable. Faster
convergence benefits the network performance by minimizing the period of time during which stale
topology information--the previous routing information that will be obsoleted by the updated routing
information--is used to forward packets.
After performing an SPF, IS-IS must install updated routes in the RIB. If the number of prefixes advertised
by IS-IS is large, the time between the installation of the first prefix and the last prefix is significant.
Priority-driven IP prefix RIB installation allows a subset of the prefixes advertised by IS-IS to be
designated as having a higher priority. Updates to the paths to these prefixes will be installed before
updates to prefixes that do not have this designation. This reduces the convergence time for the important
IS-IS IP prefixes and results in faster updating for routes that are dependent on these prefixes. This in turn
shortens the time during which stale information is used for forwarding packets to these destinations.
Prefixes are characterized as having one of three levels of importance:
1 High priority prefixes--prefixes that have been tagged with a tag designated for fast convergence.
2 Medium priority prefixes--any /32 prefixes that have not been designated as high priority prefixes.
3 Low priority prefixes--all other prefixes.
When IS-IS updates the RIB, prefixes are updated in the order based on the associated level of importance.
When you assign a high priority tag to some IS-IS IP prefixes, those prefixes with the higher priority are
updated in the routing tables before prefixes with lower priority. In some networks, the high priority
prefixes will be the provider edge (PE) loopback addresses. The convergence time is reduced for the
important IS-IS IP prefixes and results in reduced convergence time for the update processes that occur in
the global RIB and Cisco Express Forwarding (CEF).
The IS-IS Support for Route Tags feature allows you to tag IP addresses of an interface and use the tag
to apply administrative policy with a route map.
You can tag IS-IS routes to control their redistribution. You can configure a route map to set a tag for
an IS-IS IP prefix (route) and/or match on the tag (perhaps on a different router) to redistribute IS-IS
routes. Although the match tag and set tag commands existed for other protocols before this feature,
they were not implemented for IS-IS, so they did nothing when specified in an IS-IS network until
now.
You can tag a summary route and then use a route map to match the tag and set one or more attributes
for the route.
Streamlining the Routing Table Update Process by Excluding Connected IP Prefixes from LSP Advertisements
Small-Scale Method to Reduce IS-IS Convergence Time
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Purpose
Example:
Example:
Router(config-router)# ispf level-1-2 60
Step 5 end
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Step 2 configure terminal
Purpose
Enters global configuration mode.
Example:
Router# configure terminal
Example:
Router(config)# interface
Ethernet 0
Example:
process is referenced with a null tag. This name must be unique among
all IP or Connectionless Network Service (CLNS) router processes for a
given router.
Example:
Sets a tag on the IP address configured for an interface when this IP prefix is
put into an IS-IS LSP.
Step 6 exit
Example:
Router(config-if)# exit
Example:
Enables the IS-IS routing protocol and specifies an IS-IS process. Enters
router configuration mode.
Note If the area-tag argument is not specified, a null tag is assumed and the
process is referenced with a null tag. This name must be unique among
all IP or CLNS router processes for a given router.
Assigns a high priority to prefixes associated with the specified tag value.
Example:
Router(config-router)# ip route
priority high tag 17
Command or Action
Step 9 end
Purpose
(Optional) Saves configuration commands to the running configuration file
and returns to privileged EXEC mode.
Example:
Router(config-router)# end
Example:
Router# show isis rib
255.255.255.0
Displays paths for a specific route in the IP Version 4 IS-IS local RIB.
IS-IS maintains a local database for all IS-IS routing information. This
local database is referred to as the IS-IS local RIB. It contains additional
attributes that are not maintained in the global IP routing table. Access to
the contents of the local RIB is used to support the show isis rib
command, which is used here to verify routing information related to the
Priority-Driven IP Prefix RIB Installation feature.
Troubleshooting Tips
You can enter the debug isis rib local command to verify whether the IP prefixes that are advertised by ISIS link-state PDUs (LSPs) are being updated correctly in the IS-IS local RIB.
Because the IS-IS route tag will be used in a route map, you must understand how to configure a route
map.
In order to use the route tag, you must configure the metric-style wide command. (The metric-style
narrowcommand is configured by default). The tag value is set into sub-TLV 1 for TLV (Type
Length Value) Type 135.
You must understand the task for which you are using the route tag, such as route redistribution, route
summarization, or route leaking.
Before you tag any IS-IS routes, you need to decide on the following:
1
2
3
4
Your goal to set values for routes or redistribute routes (or both).
Where in your network you want to tag routes.
Where in your network you want to reference the tags.
Which tagging method you will use, which determines which task in this section to perform.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. ip address ip-address mask secondary
6. isis tag tag-value
7. end
8. show isis database verbose
9. show ip route [ip-address [mask] [longer-prefixes] | protocol [process-id] | list [access-list-number |
access-list-name]]
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Configures an interface.
Example:
Router(config)# interface ethernet 0
Example:
Router(config-if)# ip address 10.1.1.1
255.255.255.0
Command or Action
Purpose
Example:
Router(config-if)# ip address 10.2.2.1
255.255.255.0 secondary
Example:
Step 7 end
Example:
Router(config-if)# end
Example:
Example:
Router# show ip route 10.1.1.1 255.255.255.0
What to Do Next
Applying the tag does nothing of value for your network until you use the tag by referencing it in a route
map, either to set values, to redistribute routes, or to do both. Proceed to the section, "Using the Tag to Set
Values and or Redistribute Routes, page 101."
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 route-map map-tag [permit | deny] [sequence-number] Defines the conditions for redistributing routes from one
routing protocol into another or from one IS-IS level to
another.
Example:
Example:
Router(config-route-map)# match tag 15
If you are setting a tag for the first time, you cannot match
on tag; this step is an option if you are changing tags.
Command or Action
Step 5 Use an additional match command for each match
criterion that you want.
Purpose
(Optional) See the appropriate match commands in the Cisco
IOS IP Routing: Protocol-Independent Command Reference
Repeat this step for each match criterion you that want.
Example:
Router(config-route-map)# set tag 10
set level
set metric
set metric-type
Step 8 Repeat Step 7 for each value that you want to set.
(Optional)
(Optional)
Step 10 end
Example:
Router(config-route-map)# end
Example:
Example:
Router# show ip route 10.1.1.1 255.255.255.0
What to Do Next
Applying the tag does nothing of value for your network until you use the tag by referencing it in a route
map, either to set values, to redistribute routes, or to do both. Proceed to the Using the Tag to Set Values
and or Redistribute Routes, page 101.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Example:
Router(config-router)# metric-style wide
Command or Action
Purpose
Example:
Router(config-router)# summary-address
192.168.0.0 255.255.0.0 tag 12345 metric 321
Step 6 end
Example:
Router(config-router)# end
Example:
Example:
Router# show ip route 10.1.1.1 255.255.255.0
What to Do Next
Applying the tag does nothing of value for your network until you use the tag by referencing it in a route
map to set values. It is unlikely that you will redistribute summary routes. Proceed to the "Using the Tag to
Set Values and/or Redistribute Routes" section.
SUMMARY STEPS
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match tag tag-value
5. Specify a match command for each match criterion that you want.
6. Set a value, depending on what you want to do with the tagged routes.
7. Repeat Step 6 for each value that you want to set.
8. Repeat Steps 3 through 7 for each route-map statement that you want.
9. exit
10. router isis
11. metric-style wide
12. redistribute protocol [process-id] [level-1| level-1-2 | level-2] [metric metric-value] [metric-type
type-value] [route-map map-tag]
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# route-map static-color permit 15
Example:
Router(config-route-map)# match tag 120
Step 5 Specify a match command for each match criterion that you (Optional) Reference the appropriate match commands in
want.
the Cisco IOS IP Routing: Protocol-Independent
Command Reference.
Command or Action
Step 6 Set a value, depending on what you want to do with the
tagged routes.
Purpose
(Optional) See the following set commands in the Cisco
IOS IP Routing: Protocol-Independent Command
Reference.
Step 7 Repeat Step 6 for each value that you want to set.
set level
set metric
set metric-type
(Optional)
Step 8 Repeat Steps 3 through 7 for each route-map statement that (Optional)
you want.
Step 9 exit
Example:
Router(config-route-map)# exit
Example:
Router(config)# router isis
Example:
Router(config-router)# metric-style wide
Example:
Router(config-router)# redistribute static ip
metric 2 route-map static-color
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Example:
Router(config-router)# redistribute eigrp
10 level-1
Command or Action
Purpose
Example:
Router(config-router)# redistribute maximumprefix 1000 80
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Command or Action
Step 2 configure terminal
Purpose
Enters global configuration mode.
Example:
Router# configure terminal
Example:
Example:
Router(config-router)# redistribute
eigrp 10 level-1
Example:
Router(config-router)# redistribute
maximum-prefix 1000 80 warning-only
Example:
Router(config-router)# lsp-full
suppress external interlevel
(Optional) Controls which routes are suppressed when the link-state PDU
becomes full.
Command or Action
Step 7 end
Purpose
Exits router configuration mode.
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Step 3 interface type number
Purpose
Configures an interface type and enters interface
configuration mode.
Example:
Router(config)# interface Ethernet 0
Example:
Step 5 no ip directed-broadcast
Example:
Router(config-if)# no ip directed-broadcast
Example:
Router(config-if)# ip router isis
Example:
Router(config-if)# no isis advertise-prefix
Step 8 exit
Example:
Router(config-if)# exit
(Optional)
Example:
Router(config)# router isis
Command or Action
Step 11 net network-entity-title
Purpose
Configures an IS-IS network entity title (NET) for the
routing process.
Example:
Router(config-router)# net 47.0004.004d.
0001.0001.0c11.1111.00
Step 12 end
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# interface loopback 0
Example:
Step 5 no ip directed-broadcast
Example:
Router(config-if)# no ip directed-broadcast
Step 6 exit
Example:
Router(config-if)# exit
Example:
Router(config)# interface Ethernet 0
Command or Action
Step 8 ip address ip-address netmask
Purpose
Sets a primary IP address for an interface.
Example:
Step 9 no ip directed-broadcast
Example:
Router(config-if)# no ip directed-broadcast
Example:
Router(config-if)# ip router isis
Step 11 exit
Example:
Router(config-if)# exit
Example:
Example:
Router(config-router)# passive-interface
loopback 0
Example:
Router(config-router)# net 47.0004.004d.
0001.0001.0c11.1111.00
Command or Action
Purpose
Step 15 advertise-passive-only
Example:
Router(config-router)# advertise-passive-only
Step 16 end
Example:
Router(config-router)# end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Step 3 isis display delimiter [return count | character count]
Purpose
Makes output from multiarea displays easier to read by
specifying the delimiter to use to separate displays of
information.
Example:
Router(config)# isis display delimiter return 2
Step 4 exit
Example:
Router(config)# exit
Example:
Router# show isis database detail
Example:
Router# show isis financetag routes
Displays how often and why the router has run a full SPF
calculation.
Example:
Router# show isis spf-log
Example:
Router# show isis financetag topology
Examples
The following sample output from the show isis spf-log command displays the following important
information:
Router#
When
Duration
Nodes
Count
Triggers
00:15:46
3124
40
milles.00-00
TLVCODE
00:15:24
3216
41
milles.00-00
TLVCODE NEWLSP
00:15:19
3096
41
deurze.00-00
TLVCODE
00:14:54
3004
41
milles.00-00
ATTACHFLAG LSPHEADER
00:14:49
3384
41
milles.00-01
TLVCODE
00:14:23
2932
41
milles.00-00
TLVCODE
00:05:18
3140
41
00:03:54
3144
41
milles.01-00
TLVCODE
00:03:49
2908
41
milles.01-00
TLVCODE
00:03:28
3148
41
bakel.00-00
00:03:15
3054
41
milles.00-00
TLVCODE
00:02:53
2958
41
mortel.00-00
TLVCODE
PERIODIC
TLVCODE TLVCONTENT
BGP
Router A
Router B
95614
Static routes
The figure above illustrates a flat Level 2 IS-IS area. On the left edge are static routes from Router A to
reach some IP prefixes. Router A redistributes the static routes into IS-IS. Router B runs BGP and
redistributes IS-IS routes into BGP and then uses the tag to apply different administrative policy based on
different tag values.
Router A
router isis
net 49.0000.0000.0001.00
metric-style wide
redistribute static ip route-map set-tag
!
route-map set-tag permit 5
set tag 10
Router B
router bgp 100
redistribute isis level-2 route-map tag-policy
route-map tag-policy permit 20
match tag 10
set metric 1000
Router A
Router B
Level-1
Level-1
L1L2
L1L2
Level-2
Summarize routes
and apply tag.
Router A
router isis
net 49.0001.0001.0001.00
metric-style wide
summary-address 10.0.0.0 255.0.0.0 tag 100
Router B
router isis
net 49.0002.0002.0002.0002.0
metric-style wide
redistribute isis ip level-2 into level-1 route-map match-tag
95615
Figure 7
Example Filtering and Redistributing IS-IS Routes Using an Access List and a Route Map
Configuration Examples for Reducing Alternate-Path Calculation Times in IS-IS Networks
Example Filtering and Redistributing IS-IS Routes Using an Access List and
a Route Map
In this example, the first redistribute isis ip command controls the redistribution of Level 1 routes into
Level 2. Only the routes with the tag of 90 and whose IP prefix is not 192.168.130.5/24 will be
redistributed from Level 1 into Level 2.
The second redistribute isis ip command controls the route leaking from Level 2 into the Level 1 domain.
Only the routes tagged with 60 or 50 will be redistributed from Level 2 into Level 1.
interface ethernet 1
ip address 192.168.130.5 255.255.255.0
ip router isis
isis tag 60
!
interface ethernet 2
ip address 192.168.130.15 255.255.255.0
ip router isis
isis tag 90
!
interface ethernet 3
ip address 192.168.130.25 5 255.255.255.0
ip router isis
isis tag 50
!
router isis
net 49.0001.0001.0001.0001.00
metric-style wide
redistribute isis ip level-1 into level-2 route-map redist1-2
redistribute isis ip level-2 into level-1 route-map leak2-1
!
access-list 102 deny ip host 192.168.130.5 host 255.255.255.255
access-list 102 permit ip any any
!
route-map leak2-1 permit 10
match tag 60
!
route-map leak2-1 permit 20
match tag 50
!
route-map redist1-2 permit 10
match ip address 102
match tag 90
generated if the number of redistributed prefixes reaches 600. However, the number of redistributed
prefixes is not limited. If the LSPFULL state occurs, external prefixes will be suppressed.
router isis 1
redistribute maximum-prefix 600 85 warning-only
lsp-full suppress external
Where to Go Next
To configure features to improve IS-IS network convergence times, complete the optional tasks in one or
more of the following modules:
Additional References
Related Documents
Related Topic
Document Title
RFCs
RFC
Title
--
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 6
Feature Name
Releases
Feature Information
Feature Name
Releases
Feature Information
12.0(26)S 12.2(18)SXE
12.2(25)S 12.3(4)T Cisco IOS
XE 3.1.0 SG
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Before performing the tasks in this module, you should be familiar with the concepts described in the
"Integrated IS-IS Routing Protocol Overview" and "Configuring a Basic IS-IS Network" modules.
It is assumed you already have IS-IS running on your network.
Importance of Preventing Unauthorized Information from Entering an IS-IS Network, page 124
Configuring IS-IS Authentication, page 124
Migrating to a New Authentication Type, page 125
Whether to configure authentication for the IS-IS instance and/or for individual IS-IS interfaces (both
tasks are included in this section).
At what level(s) authentication is to be used.
What type of authentication (IS-IS HMAC-MD5 or clear text) is to be used.
IS-IS has five PDU types: link state PDU (LSP), LAN Hello, Point-to-Point Hello, complete sequence
number PDU (CSNP), and partial sequence number PDU (PSNP). IS-IS HMAC-MD5 authentication or
clear text password authentication can be applied to all five PDU types. The authentication can be enabled
on different IS-IS levels independently. The interface-related PDUs (LAN Hello, Point-to-Point Hello,
CSNP, and PSNP) can be enabled with authentication on different interfaces, with different levels and
different passwords.
Either authentication mode or old password mode may be configured on a given scope (IS-IS instance or
interface) and level--bit not both. However, different modes may be configured for different modes mat be
configured for different scopes or levels. If mixed modes are intended, different keys should be used for
different modes in order not to compromise the encrypted password in the PDUs.
IS-IS now supports MD5 authentication, which is more secure than clear text authentication. IS-IS
HMAC-MD5 authentication adds an HMAC-MD5 digest to each IS-IS protocol data unit (PDU).
HMAC is a mechanism for message authentication codes (MACs) using cryptographic hash functions.
The digest allows authentication at the IS-IS routing protocol level, which prevents unauthorized
routing messages from being injected into the network routing domain.
MD5 authentication or clear text authentication can be enabled on Level 1 or Level 2 independently.
Passwords can be rolled over to new passwords without disrupting routing messages.
For the purpose of network transition, you can configure the networking device to accept PDUs without
authentication or with wrong authentication information, yet send PDUs with authentication. Such
transition might be because you are migrating from no authentication to some type of authentication, you
are changing authentication type, or you are changing keys.
Migration from Old Clear Text Authentication to HMAC-MD5 Authentication, page 125
Migration from Old Clear Text Authentication to the New Clear Text Authentication, page 125
Migration from Old Clear Text Authentication to the New Clear Text Authentication
The benefits of migrating from the old method of clear text authentication to the new method of clear text
authentication are as follows:
The password is exchanged as plain text and thus provides only limited security.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. isis password password [level-1| level-2]
5. Repeat Step 4 for each interface password that you want to set.
6. end
7. show ip interface [type number] [brief]
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Command or Action
Step 3 interface type number
Purpose
Enters interface configuration mode.
Example:
Router(config)# interface ethernet 0
Example:
Step 5 Repeat Step 4 for each interface password that you want to
set.
--
Step 6 end
Example:
Router(config-if)# end
Example:
Router# show ip interface serial 1
This password is exchanged as plain text, and, thus, this feature provides only limited security.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis [area- tag ]
4. area-password password
5. end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Example:
Router(config-router)# area-password
companyz
Step 5 end
This password is inserted in Level 1 protocol data unit (PDU) linkstate PDUs (LSPs), complete sequence number PDUs (CSNPs),
and partial sequence number PDUs (PSNPs).
Example:
Router(config-router)# end
This password is exchanged as plain text, and, thus, this feature provides only limited security.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis [area-tag]
4. domain-password password [authenticate snp {validate | send-only}]
5. end
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Example:
Router(config-router)# domainpassword company2
Configuring HMAC-MD5 Authentication or Clear Text Authentication for the First Time
Configuring HMAC-MD5 or Clear Text Authentication for the IS-IS Instance
Command or Action
Purpose
Step 5 end
Example:
Router(config-router)# end
Configuring HMAC-MD5 or Clear Text Authentication for the IS-IS Instance, page 130
Configuring HMAC-MD5 or Clear Text Authentication for an IS-IS Interface, page 132
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string text
6. exit
7. exit
8. router isis [area- tag ]
9. authentication send-only [level-1 | level-2]
10. Repeat Steps 1 through 9 on each router that will communicate.
11. authentication mode {md5 | text}[level-1 | level-2]
12. authentication key-chain name-of-chain [level-1 | level-2]
13. Repeat Steps 11 and 12 on each router that will communicate.
14. no authentication send-only
15. Repeat Step 14 on each router that will communicate.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# key chain remote3754
Example:
Router(config-keychain)# key 100
Example:
Router(config-keychain-key)# key-string
mno172
Step 6 exit
Example:
Router(config-keychain-key)# exit
Step 7 exit
Example:
Router(config-keychain)# exit
Command or Action
Step 8 router isis [area- tag ]
Purpose
Enables IS-IS as an IP routing protocol and assigns a tag to a
process, if required.
Example:
Example:
Router(config-router)# authentication sendonly
Step 11 authentication mode {md5 | text}[level-1 | level-2] Specifies the type of authentication used in IS-IS PDUs for the ISIS instance.
Example:
Example:
Router(config-router)# authentication keychain remote3754
--
Example:
Router(config-router)# no authentication
send-only
--
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string text
6. exit
7. exit
8. interface type number
9. isis authentication send-only [level-1 | level-2]
10. Repeat Steps 1 through 9 on each router that will communicate.
11. isis authentication mode {md5 | text}[level-1 | level-2]
12. isis authentication key-chain name-of-chain [level-1 | level-2]
13. Repeat Steps 11 and 12 on each router that will communicate.
14. no isis authentication send-only
15. Repeat Step 14 on each router that will communicate.
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# key chain multistate87723
Example:
Router(config-keychain)# key 201
Command or Action
Step 5 key-string text
Purpose
Specifies the authentication string for a key.
Example:
Step 6 exit
Example:
Router(config-keychain-key)# exit
Step 7 exit
Example:
Router(config-keychain)# exit
Configures an interface.
Example:
Router(config)# interface ethernet 0
Example:
Router(config-if)# isis authentication send-only
Example:
Example:
Router(config-if)# isis authentication key-chain
multistate87723
Command or Action
Purpose
--
Example:
Router(config-if)# no isis authentication sendonly
--
DETAILED STEPS
Step 1
Load all routers with the image required to support the new, desired authentication method.
Step 2
Configure the new authentication mode on both the interface and the IS-IS area by following the appropriate tasks in
the Configuring HMAC-MD5 Authentication or Clear Text Authentication for the First Time, page 130.
Configuring Authentication on a New Router Being Added to a Network That Already Has Authentication Configured
Configuring HMAC-MD5 or Clear Text Authentication for an IS-IS Interface
DETAILED STEPS
Command or Action
Step 1 enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# key chain multistate87723
Example:
Router(config-keychain)# key 201
Command or Action
Step 5 key-string text
Purpose
Specifies the authentication string for a key.
Example:
Step 6 exit
Example:
Router(config-keychain-key)# exit
Step 7 exit
Example:
Router(config-keychain)# exit
Configures an interface.
Example:
Router(config)# interface ethernet 0
Example:
Example:
Router(config-if)# isis authentication key-chain
multistate87723
Additional References
Related Documents
Related Topic
Document Title
Related Topic
Document Title
Standards
Standard
Title
None
--
RFCs
RFC
Title
RFC 1321
RFC 2104
RFC 3567
Technical Assistance
Description
Link
http://www.cisco.com/cisco/web/support/
index.html
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 7
Feature Name
Releases
Feature Information
IS-IS HMAC-MD5
Authentication and Enhanced
Clear Text Authentication
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.