ISIS
ISIS
ISIS
Modified: 2019-06-10
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States
and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective
owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS IS-IS Feature Guide
Copyright © 2019 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of
that EULA.
Part 1 Overview
Chapter 1 Introduction to IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
IS-IS Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
IS-IS Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
ISO Network Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
IS-IS Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Persistent Route Reachability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
IS-IS Support for Multipoint Network Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Installing a Default Route to the Nearest Routing Device That Operates at
Both IS-IS Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Supported Standards for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
ISIS Fast Reroute Convergence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
no-unicast-topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
overload (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
passive (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
per-interface-per-member-link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
per-sid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
point-to-point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
post-convergence-lfa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
preference (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
prefix-export-limit (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
prefix-segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
priority (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
purge-originator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
reference-bandwidth (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
remote-backup-calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
rib-group (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
routing-instances (Multiple Routing Entities) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
sensor-based-stats (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
shortcuts (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
spf-options (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
static-host-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
source-packet-routing-disable (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . 579
source-packet-routing (Protocols IS-IS and OSPF) . . . . . . . . . . . . . . . . . . . . . . 580
srgb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
te-metric (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
topologies (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584
traceoptions (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
traffic-engineering (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
traffic-statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
update-threshold-max-reservable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
use-source-packet-routing (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
use-post-convergence-lfa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
use-for-post-convergence-lfa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
wide-metrics-only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Chapter 17 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
clear bfd adaptation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
clear bfd session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
clear isis adjacency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
clear isis database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
clear isis overload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
clear isis statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
clear isis spring traffic-statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
ping clns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
show auto-bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
show bfd session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
show isis adjacency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
show isis adjacency holddown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Figure 22: Weighted ECMP Traffic Distribution on One Hop IS-IS Neighbors . . . 222
Chapter 9 Configuring IS-IS Traffic Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Figure 23: Typical SPF Tree, Sourced from Router A . . . . . . . . . . . . . . . . . . . . . . . 247
Figure 24: Modified SPF Tree, Using LSP A–D as a Shortcut . . . . . . . . . . . . . . . . 247
Figure 25: IS-IS Shortcuts Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Figure 26: IS-IS Advertising a Label-Switched Path Topology . . . . . . . . . . . . . . . 264
Figure 27: IS-IS Wide Metrics Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Figure 28: IS-IS and LDP Synchronization Topology . . . . . . . . . . . . . . . . . . . . . . . 278
Figure 29: Configuring Layer 2 Mapping for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . 283
Figure 30: Topology-Independent Loop-Free Alternate with Segment Routing
for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Chapter 10 Configuring IS-IS Scaling and Throttling . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Figure 31: IS-IS Link-State PDU Interval Topology . . . . . . . . . . . . . . . . . . . . . . . . 360
Figure 32: IS-IS CSNP Interval Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Figure 33: IS-IS Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Chapter 12 Configuring IS-IS on Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Figure 34: Logical Systems Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Figure 35: IS-IS on Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Figure 36: IS-IS with a Default Route to an ISP . . . . . . . . . . . . . . . . . . . . . . . . . . 395
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at https://www.juniper.net/books.
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see CLI Explorer.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xviii defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
We encourage you to provide feedback so that we can improve our documentation. You
can use either of the following methods:
• Online feedback system—Click TechLibrary Feedback, on the lower right of any page
on the Juniper Networks TechLibrary site, and do one of the following:
• Click the thumbs-up icon if the information on the page was helpful to you.
• Click the thumbs-down icon if the information on the page was not helpful to you
or if you have suggestions for improvement, and use the pop-up form to provide
feedback.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active Juniper Care or Partner Support
Services support contract, or are covered under warranty, and need post-sales technical
support, you can access our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: https://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://entitlementsearch.juniper.net/entitlementsearch/
• Visit https://myjuniper.juniper.net.
Overview
• Introduction to IS-IS on page 3
Introduction to IS-IS
IS-IS Overview
The IS-IS protocol is an interior gateway protocol (IGP) that uses link-state information
to make routing decisions.
IS-IS is a link-state IGP that uses the shortest-path-first (SPF) algorithm to determine
routes. IS-IS evaluates the topology changes and determines whether to perform a full
SPF recalculation or a partial route calculation (PRC). This protocol originally was
developed for routing International Organization for Standardization (ISO) Connectionless
Network Protocol (CLNP) packets.
Like OSPF routing, IS-IS uses hello packets that allow network convergence to occur
quickly when network changes are detected. IS-IS uses the SPF algorithm to determine
routes. Using SPF, IS-IS evaluates network topology changes and determines if a full or
partial route calculation is required.
IS-IS Terminology
An IS-IS network is a single autonomous system (AS), also called a routing domain, that
consists of end systems and intermediate systems. End systems are network entities that
send and receive packets. Intermediate systems send and receive packets and relay
(forward) packets. (Intermediate system is the Open System Interconnection [OSI] term
for a router.) ISO packets are called network PDUs.
In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into
smaller areas. This organization is accomplished by configuring Level 1 and Level 2
intermediate systems. Level 1 systems route within an area; when the destination is
outside an area, they route toward a Level 2 system. Level 2 intermediate systems route
between areas and toward other ASs. No IS-IS area functions strictly as a backbone.
Level 1 routers share intra-area routing information, and Level 2 routers share interarea
information about IP addresses available within each area. Uniquely, IS-IS routers can
act as both Level 1 and Level 2 routers, sharing intra-area routes with other Level 1 routers
and interarea routes with other Level 2 routers.
The propagation of link-state updates is determined by the level boundaries. All routers
within a level maintain a complete link-state database of all other routers in the same
level. Each router then uses the Dijkstra algorithm to determine the shortest path from
the local router to other routers in the link-state database.
An end system can have multiple NSAP addresses, in which case the addresses differ
only by the last byte (called the n-selector). Each NSAP represents a service that is
available at that node. In addition to having multiple services, a single node can belong
to multiple areas.
Each network entity also has a special network address called a network entity title (NET).
Structurally, an NET is identical to an NSAP address but has an n-selector of 00. Most
end systems and intermediate systems have one NET. Intermediate systems that
participate in multiple areas can have multiple NETs.
49.0001.00a0.c96b.c490.00
49.0001.2081.9716.9018.00
NETs take several forms, depending on your network requirements. NET addresses are
hexadecimal and range from 8 octets to 20 octets in length. Generally, the format consists
of an authority and format Identifier (AFI), a domain ID, an area ID, a system identifier,
and a selector. The simplest format omits the domain ID and is 10 octets long. For
example, the NET address 49.0001.1921.6800.1001.00 consists of the following parts:
• 49—AFI
• 0001—Area ID
• 1921.6800.1001—System identifier
• 00—Selector
The system identifier must be unique within the network. For an IP-only network, we
recommend using the IP address of an interface on the router. Configuring a loopback
NET address with the IP address is helpful when troubleshooting is required on the
network.
The first portion of the address is the area number, which is a variable number from 1
through 13 bytes. The first byte of the area number (49) is the authority and format
indicator (AFI). The next bytes are the assigned domain (area) identifier, which can be
from 0 through 12 bytes. In the examples above, the area identifier is 0001.
The next six bytes form the system identifier. The system identifier can be any six bytes
that are unique throughout the entire domain. The system identifier commonly is the
media access control (MAC) address (as in the first example, 00a0.c96b.c490) or the
IP address expressed in binary-coded decimal (BCD) (as in the second example,
2081.9716.9018, which corresponds to IP address 208.197.169.18). The last byte (00) is
the n-selector.
®
To provide help with IS-IS debugging, the Junos operating system (Junos OS) supports
dynamic mapping of ISO system identifiers to the hostname. Each system can be
configured with a hostname, which allows the system identifier-to-hostname mapping
to be carried in a dynamic hostname type, length, and value (TLV) tuple in IS-IS link-state
PDUs. This enables intermediate systems in the routing domain to learn about the ISO
system identifier of a particular intermediate system.
IS-IS Packets
Each IS-IS PDU shares a common header. IS-IS uses the following PDUs to exchange
protocol information:
• IS-IS hello (IIH) PDUs—Broadcast to discover the identity of neighboring IS-IS systems
and to determine whether the neighbors are Level 1 or Level 2 intermediate systems.
IS-IS hello PDUs establish adjacencies with other routers and have three different
formats: one for point-to-point hello packets, one for Level 1 broadcast links, and one
for Level 2 broadcast links. Level 1 routers must share the same area address to form
an adjacency, while Level 2 routers do not have this limitation. The request for adjacency
is encoded in the Circuit type field of the PDU.
Hello PDUs have a preset length assigned to them. The IS-IS router does not resize
any PDU to match the maximum transmission unit (MTU) on a router interface. Each
interface supports the maximum IS-IS PDU of 1492 bytes, and hello PDUs are padded
to meet the maximum value. When the hello is sent to a neighboring router, the
connecting interface supports the maximum PDU size.
Also included is metric and IS-IS neighbor information. Each link-state PDU must be
refreshed periodically on the network and is acknowledged by information within a
sequence number PDU.
Contained within the CSNP is a link-state PDU identifier, a lifetime, a sequence number,
and a checksum for each entry in the database. Periodically, a CSNP is sent on both
broadcast and point-to-point links to maintain a correct database. Also, the
advertisement of CSNPs occurs when an adjacency is formed with another router. Like
IS-IS hello PDUs, CSNPs come in two types: Level 1 and Level 2.
When a device receives a CSNP, it checks the database entries against its own local
link-state database. If it detects missing information, the device requests specific
link-state PDU details using a partial sequence number PDU (PSNP).
requesting that the missing link-state PDU be transmitted. That routing device, in turn,
forwards the missing link-state PDU to the requesting routing device.
When a device compares a CSNP to its local database and determines that a link-state
PDU is missing, the router issues a PSNP for the missing link-state PDU, which is returned
in a link-state PDU from the router sending the CSNP. The received link-state PDU is
then stored in the local database, and an acknowledgment is sent back to the originating
router.
Installing a Default Route to the Nearest Routing Device That Operates at Both IS-IS Levels
When a routing device that operates as both a Level 1 and Level 2 router (Router B)
determines that it can reach at least one area other than its own (for example, in Area
Y), it sets the ATTACHED bit in its Level 1 link-state PDU. Thereafter, the Level 1 router
(Router A) introduces a default route pointing to the nearest attached routing device
that operates as both a Level 1 and Level 2 router (Router B). See Figure 1 on page 7.
Figure 1: Install Default Route to Nearest Routing Device That Operates at Both Level 1
and Level 2
• ISO 9542, End System to Intermediate System Routing Exchange Protocol for Use in
Conjunction with the Protocol for the Provision of the Connectionless-mode Network
Service
• RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments
• RFC 3847, Restart Signaling for Intermediate System to Intermediate System (IS-IS)
• RFC 5120, M-ISIS: Multi Topology (MT) Routing in Intermediate System to Intermediate
Systems (IS-ISs)
The following RFCs do not define standards, but provide information about IS-IS and
related technologies. The IETF classifies them as “Informational.”
• RFC 3359, Reserved Type, Length and Value (TLV) Codepoints in Intermediate System
to Intermediate System
• RFC 3373, Three-Way Handshake for Intermediate System to Intermediate System (IS-IS)
Point-to-Point Adjacencies
• RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
Sub-second service restoration is a key requirement for MPLS and native IP-based network
service providers. There are many ways to achieve fast reroute with sub optimal next-hop
to reach destination like loop-free alternate and remote loop-free alternate. In these
cases, IGP will download primary and backup next-hop beforehand in FIB. Packet
forwarding engine (PFE) performs local repair when a primary next-hop loses its
reachability to a given destination. Since PFE already has alternative path to reach
destination, sub-second restoration is possible. If destination is reachable via equal cost
multi path (ECMP) then only primary path is downloaded to forwarding information base
(FIB). If few ECMP links go down than the required bandwidth for a destination, fast
reroute convergence is not possible.
To resolve this, the best ECMP links are grouped as unilist of primary next-hops to reach
destination and the sub-optimal ECMP links are grouped as unilist of backup next-hops
to reach the destination. If bandwidth of the primary next-hops falls below the desired
bandwidth, PFE does a local repair and switches traffic to backup unilist next-hops. This
is yet another backup, where the backup path is computed and installed in FIB for ECMP
paths. Here, a set of best ECMP links are grouped as primary next-hops to reach
destination and a set of sub-optimal ECMP links are grouped as backup next-hops to
reach destination. If bandwidth of the primary next-hops falls below desired bandwidth
due to link failure on primary group, PFE should perform local repair and switch the traffic
to backup next-hops.
In the following topology, R1 has three ECMP links to D1 via R2. R1 also has three
sub-optimal ECMP links to D1 via R3 and R2. All ECMP links L1, L2 and L3 can be placed
under one group; a primary group and also group sub-optimal ECMP links L3, L4 and L5
under another group; a backup group.
Figure 2: Topology
IS-IS calculates the shortest path using shortest-path-first (SPF) algorithm and
downloads primary next-hops with appropriate weight in FIB. IS-IS also calculates backup
next-hops and downloads them to FIB with appropriate weight.
Backup next-hops weight will always be greater than primary next-hops. If a link from
primary group goes down, PFE performs a local repair and modifies the weight of the
next-hops. PFE forwards traffic to the destination with least weight next-hops to achieve
sub-millisecond convergence. IS-IS runs SPF and comes up with a set of primary and
backup next-hops. IS-IS then updates the FIB with the updated next hops. PFE resumes
traffic forwarding on new next-hops without any traffic loss.
Configuring IS-IS
• Configuring a Basic IS-IS Network on page 13
• Configuring IS-IS Authentication and Checksums on page 33
• Configuring IS-IS Routing Policy and Route Redistribution on page 45
• Configuring IS-IS Bidirectional Forwarding Detection on page 127
• Configuring IS-IS Flood Groups on page 147
• Configuring IS-IS Multitopology Routing and IPv6 Support on page 153
• Configuring IS-IS Link and Node Link Protection on page 189
• Configuring IS-IS Traffic Engineering on page 245
• Configuring IS-IS Scaling and Throttling on page 359
• Configuring IS-IS CLNS on page 379
• Configuring IS-IS on Logical Systems on page 383
To configure IS-IS, you must enable IS-IS on the interfaces and configure a NET address
on one of the device interfaces (preferably, the lo0 interface) by setting family iso address
net-address on the interface. To create the NET address (also known as the system ID
or the NSAP address), you can use the convention that is dictated by your network design,
or you can follow this convention:
1. Take the router ID, remove the dots (.), and insert leading zeroes where necessary so
that the string is 12 characters long.
If the routing devices are in area 47, the strings would become 47.1921.6800.0004
and 47.0100.1202.3001.
You must configure the ISO family on all interfaces that are supporting the IS-IS protocol
by setting family iso on the interface. This means that IS-IS related frames are not
discarded by the routing devices.
You must enable IS-IS to run on the interfaces by setting interface interface-name in the
protocol configuration. This means that the interfaces are advertised into IS-IS.
Unlike OSPF, when you enable IS-IS on the lo0 interface, you do not need to explicitly
set passive mode. Passive mode means that the interface is advertised into the link-state
protocol, but the interface does not send or receive protocol control packets, such as
IS-IS hello and link-state PDUs. In IS-IS, the lo0 interface is always passive.
When you enable IS-IS on an interface, both levels (Level 1 and Level 2) are enabled by
default. To specify that an interface is on a Level 1 link, disable Level 2. To specify that
an interface is on a Level 2 link, disable Level 1. You can disable a level on the entire device
or per-interface. If two routing devices, R1 and R2, are both in the same IS-IS area, they
communicate at Level 1 if one or both devices have Level 2 disabled.
For security devices only, you must enable IS-IS by setting mode packet-based at the
[edit security forwarding-options family iso] hierarchy level.
• Requirements on page 14
• Overview on page 14
• Configuration on page 15
• Verification on page 17
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
In this example, you configure the two IS-IS routing devices in a single area. The devices
have NET addresses 49.0002.0192.0168.0001.00 and 49.0002.0192.0168.0002.00 on
the lo0 interfaces. Additionally, you configure the ISO family on the IS-IS interfaces.
For Junos OS security devices only, you configure the mode packet-based statement at
the [edit security forwarding-options family iso] hierarchy level.
R1 R2
lo0:192.168.0.1 lo0:192.168.0.2
g041282
“CLI Quick Configuration” on page 15 shows the configuration for both of the devices in
Figure 3 on page 15. The section “Step-by-Step Procedure” on page 15 describes the
steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS:
2. Create the interface that connects to Device R2, and configure the ISO family on
the interface.
3. Create the loopback interface, set the IP address, and set the NET address.
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show security commands. If the output does not display the intended
configuration, repeat the instructions in this example to correct the configuration.
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show isis interface brief command.
Meaning Verify that the output shows the intended configuration of the interfaces on which IS-IS
is enabled.
Action From operational mode, enter the show isis interface detail command.
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 0 64 0 Passive
2 0 64 0 Passive
ge-1/2/0.0
Index: 77, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 9.000 27 R2.02 (not us)
2 1 64 10 9.000 27 R2.02 (not us)
Meaning Check the following output fields and verify that the output shows the intended
configuration of IS-IS-enabled interfaces:
• 1—Level 1 only
• 2—Level 2 only
• L or Level—Type of adjacency:
• 1—Level 1 only
• 2—Level 2 only
Action From operational mode, enter the show isis adjacency brief command.
Action From operational mode, enter the show isis adjacency extensive command.
R2
Interface: ge-1/2/0.0, Level: 1, State: Up, Expires in 6 secs
Priority: 64, Up/Down transitions: 1, Last transition: 00:40:28 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.0.2
Transition log:
When State Event Down reason
Thu May 31 11:18:48 Up Seenself
R2
Interface: ge-1/2/0.0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 00:40:28 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.0.2
Transition log:
When State Event Down reason
Thu May 31 11:18:48 Up Seenself
Meaning Check the following fields and verify the adjacency information about IS-IS neighbors:
• 1—Level 1 only
• 2—Level 2 only
An exclamation point before the level number indicates that the adjacency is missing
an IP address.
• Junos OS Feature Support Reference for SRX Series and J Series Devices
Link-state protocols cannot scale well if a large autonomous system (AS) consists of a
single set of routing devices that all share a common database to compute the best
paths through the AS. Because the shortest-path-first (SPF) algorithm works in an
exponential fashion, the CPU demand can become too heavy when too many routing
devices share their complete routing information with each other. To alleviate this issue,
large ASs are divided into smaller parts called areas.
When ASs are split into areas, the disjointed areas must be connected to route traffic
between the areas. Reachability information at the area borders must be injected into
each other areas.
Level 1 routers share intra-area routing information, and Level 2 routers share interarea
information about IP addresses available within each area. Uniquely, IS-IS routers can
act as both Level 1 and Level 2 routers, sharing intra-area routes with other Level 1 routers
and interarea routes with other Level 2 routers.
The propagation of link-state updates is determined by the level boundaries. All routers
within a level maintain a complete link-state database of all other routers in the same
level. Each router then uses the Dijkstra algorithm to determine the shortest path from
the local router to other routers in the link-state database.
• Requirements on page 21
• Overview on page 21
• Configuration on page 22
• Verification on page 26
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
Like OSPF, the IS-IS protocol supports the partitioning of a routing domain into multiple
areas with levels that control interarea flooding. The use of multiple levels improves
protocol scalability, as Level 2 (backbone) link-state PDUs are normally not flooded into
a Level 1 area.
An IS-IS Level 2 area is analogous to the OSPF backbone area (0), while a Level 1 area
operates much like an OSPF totally stubby area, in that a default route is normally used
to reach both inter-level and AS external routes.
Unlike OSPF, IS-IS area boundaries occur between routers, such that a given routing
device is always wholly contained within a particular area. Level 1 adjacencies can be
formed between routers that share a common area number, while a Level 2 adjacency
can be formed between routers that might or might not share an area number.
S1
fe-1/2/0.42 .42
10.0.0.40/30
49.0002
R3 .21 R6
.30
.17 .33
.22
Level 2 R5 .29
.26
.18 .38 .34
.25 .37
R4 R7
g041256
49.0001
“CLI Quick Configuration” on page 22 shows the configuration for all of the devices in
Figure 4 on page 21. The section “Step-by-Step Procedure” on page 24 describes the
steps on Device R5.
• Loss of any individual interface does not totally disrupt the IS-IS operation.
• The IPv4 lo0 addresses of all routers are reachable through IS-IS.
• The link between Device R3 and Device S1 appears in area 49.0001 as an intra-area
route. No IS-IS adjacencies can be established on this interface. This is accomplished
by configuring the passive statement on Device R3’s interface to Device S1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
Enable IS-IS on the interfaces by Including the ISO address family on each interface.
[edit interfaces]
user@R5# set fe-1/2/0 unit 0 description to-R3
user@R5# set fe-1/2/0 unit 0 family inet address 10.0.0.22/30
user@R5# set fe-1/2/0 unit 0 family iso
user@R5# set fe-1/2/1 unit 0 description to-R4
user@R5# set fe-1/2/1 unit 0 family inet address 10.0.0.26/30
user@R5# set fe-1/2/1 unit 0 family iso
user@R5# set fe-1/2/2 unit 0 description to-R6
user@R5# set fe-1/2/2 unit 0 family inet address 10.0.0.29/30
user@R5# set fe-1/2/2 unit 0 family iso
user@R5# set fe-1/2/3 unit 0 description to-R7
user@R5# set fe-1/2/3 unit 0 family inet address 10.0.0.38/30
user@R5# set fe-1/2/3 unit 0 family iso
The other is for the IS-IS area 49.0002 so that Device R5 can form adjacencies with
the other Level 1 devices in area 49.0002. Even though Device R5’s NET identifies
itself as belonging to the Level 1 area 49.0002, its loopback interface is not
configured as a Level 1 interface. Doing so would cause the route to Device R5’s
loopback to be injected into the Level 1 area.
Device R5 becomes adjacent to the other routing devices on the same level on each
link.
By default, IS-IS is enabled for IS-IS areas on all interfaces on which the ISO protocol
family is enabled (at the [edit interfaces interface-name unit logical-unit-number]
hierarchy level). To disable IS-IS at any particular level on an interface, include the
disable statement.
Device R5’s loopback interface is configured to run Level 2 only. If Level 1 operation
were enabled on lo0.0, Device R5 would include its loopback address in its Level 1
link-state PDU, which is incorrect for this example in which the loopback addresses
of Level 2 devices must not appear in a Level 1 area.
Unlike OSPF, you must explicitly list the router’s lo0 interface at the [edit protocols
isis] hierarchy level, because this interface is the source of the router’s NET, and
therefore must be configured as an IS-IS interface. In IS-IS, the lo0 interface operates
in the passive mode by default, which is ideal because adjacency formation can
never occur on a virtual interface.
Results From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
address 10.0.0.38/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.5/32;
}
family iso {
address 49.0002.0192.0168.0005.00;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the interface-to-area associations are configured as expected.
Action From operational mode, enter the show isis interface command.
Meaning The output shows that Device R5’s interfaces have been correctly configured with the
ISO family, and that the interfaces have been placed into the correct levels.
You can also see that Device R5 has elected itself as the designated intermediate system
(DIS) on its broadcast-capable IS-IS interfaces.
Purpose Verify that the expected adjacencies have formed between Device R5 and its IS-IS
neighbors.
Action From operational mode, enter the show isis adjacency detail command.
R3
Interface: fe-1/2/0.0, Level: 2, State: Up, Expires in 25 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:19:31 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.03, IP addresses: 10.0.0.21
R4
Interface: fe-1/2/1.0, Level: 2, State: Up, Expires in 24 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:19:36 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.02, IP addresses: 10.0.0.25
R6
Interface: fe-1/2/0.0, Level: 1, State: Up, Expires in 6 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:20:24 ago
Circuit type: 1, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R6.02, IP addresses: 10.0.0.30
R7
Interface: fe-1/2/3.0, Level: 1, State: Up, Expires in 21 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:19:29 ago
Circuit type: 1, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.04, IP addresses: 10.0.0.37
Meaning These results confirm that Device R5 has two Level 2 adjacencies and two Level 1
adjacencies.
Purpose Because Device R5 is a Level 1/Level 2 (L1/L2) attached router, examine the Level 1
link-state database associated with area 49.0002 to confirm that loopback addresses
from backbone routers are not being advertised into the Level 1 area.
Action From operational mode, enter the show isis database detail command.
Meaning This display indicates that Device R5’s loopback interface is correctly configured to run
Level 2 only. Had Level 1 operation been enabled on lo0.0, Device R5 would have then
included its loopback address in its Level 1 link-state PDU.
You can also see that Device R5 has Level 2 link-state PDUs, received from its adjacent
neighbors.
Like an OSPF totally stubby area, no backbone (Level 2) or external prefixes are leaked
into a Level 1 area, by default. Level 1 prefixes are leaked up into the IS-IS backbone,
however, as can be seen in Device R5’s Level 2 link-state PDU.
Related • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
Documentation page 20
A router advertises its priority to become a designated router in its hello packets. On all
multiaccess networks (physical networks that support the attachment of more than two
routers, such as Ethernet networks), IS-IS uses the advertised priorities to elect a
designated router for the network. This router is responsible for sending network link-state
advertisements, which describe all the routers attached to the network. These
advertisements are flooded throughout a single area. The priority value is meaningful
only on a multiaccess network. It has no meaning on a point-to-point interface.
A router’s priority for becoming the designated router is indicated by an arbitrary number
from 0 through 127, which you configure on the IS-IS interface. The router with the highest
priority becomes the designated router for the area (Level 1, Level 2, or both), also
configured on the IS-IS interface. If routers in the network have the same priority, then
the router with the highest MAC address is elected as the designated router. By default,
routers have a priority value of 64.
Related • Junos OS Feature Support Reference for SRX Series and J Series Devices
Documentation
• Configuring Designated Router Election Priority for IS-IS on page 30
This example shows how to configure the designated router election priority for IS-IS.
• Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
• Enable IS-IS on the interfaces. See “Example: Configuring IS-IS” on page 14.
In this example, you configure the priority for logical interface ge-0/0/1.0 to be 100 and
the level number to be 1. If this interface has the highest priority value, the router becomes
the designated router for the Level 1 area.
[edit]
user@host# set protocols isis interface ge-0/0/1.0 level 1 priority 100
For IS-IS to operate on the router, you can optionally configure a system identifier (system
ID). The system identifier is commonly the media access control (MAC) address or the
IP address expressed in binary-coded decimal (BCD).
If you do not statically map the hostname, the mapping is generated dynamically, based
on the system host-name. If you omit the static-host-mapping hostname sysid statement,
the IS-IS system ID is dynamically generated from the host portion of the ISO address
configured on the loopback interface (lo0) and is mapped to the host-name statement
configured at the [edit system] hierarchy level. Run the show isis hostname command to
view the mappings.
[edit system]
static-host-mapping {
hostname {
sysid system-identifier;
}
}
hostname is the name specified by the host-name statement at the [edit system] hierarchy
level.
system-identifier is the ISO system identifier. It is the 6-byte system ID portion of the IS-IS
network service access point (NSAP). We recommend that you use the host’s IP address
represented in BCD format. For example, the IP address 192.168.1.77 is 1921.6800.1077 in
BCD.
Related • Example: Configuring the Unique Identity of a Router for Making it Accessible on the
Documentation Network
A default route is the route that takes effect when no other route is available for an IP
destination address.
If a packet is received on a routing device, the device first checks to see if the IP destination
address is on one of the device’s local subnets. If the destination address is not local, the
device checks its routing table. If the remote destination subnet is not listed in the routing
table, the packet is forwarded to the next hop toward the destination using the default
route. The default route generally has a next-hop address of another routing device,
which performs the same process. The process repeats until a packet is delivered to the
destination.
The route evaluation process in each router uses the longest prefix match method to
obtain the most specific route. The network with the longest subnet mask that matches
the destination IP address is the next-hop network gateway.
The default route in IPv4 is designated as 0.0.0.0/0 or simply 0/0. Similarly, in IPv6, the
default route is specified as ::/0. The subnet mask /0 specifies all networks, and is the
shortest match possible. A route lookup that does not match any other route uses this
route if it is configured and active in the routing table. To be active, the configured next-hop
address must be reachable.
Administrators generally point the default route toward the routing device that has a
connection to a network service provider. Therefore, packets with destinations outside
the organization's local area network, typically destinations on the Internet or a wide
area network, are forwarded to the routing device with the connection to that provider.
The device to which the default route points is often called the default gateway.
Related • Example: Configuring an IS-IS Default Route Policy on Logical Systems on page 395
Documentation
• Example: Configuring an OSPF Default Route Policy on Logical Systems
All IS-IS protocol exchanges can be authenticated to guarantee that only trusted routing
devices participate in the autonomous system (AS) routing. By default, IS-IS
authentication is disabled on the routing device.
You can also configure more fine-grained interface-level authentication for hello packets.
authentication-type authentication;
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
authentication-key key;
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
The password can contain up to 255 characters. If you include spaces, enclose all
characters in quotation marks (“ ”).
If you are using the Junos OS IS-IS software with another implementation of IS-IS, the
other implementation must be configured to use the same password for the domain, the
area, and all interfaces that are shared with a Junos OS implementation.
Authentication of hello packets, partial sequence number PDU (PSNP), and complete
sequence number PDU (CSNP) can be suppressed to enable interoperability with the
routing software of different vendors. Different vendors handle authentication in various
ways, and suppressing authentication for different PDU types might be the simplest way
to allow compatibility within the same network.
To configure IS-IS to generate authenticated packets, but not to check the authentication
on received packets, include the no-authentication-check statement:
no-authentication-check;
no-hello-authentication;
no-psnp-authentication;
no-csnp-authentication;
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
loose-authentication-check;
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
IS-IS protocol exchanges can be authenticated to guarantee that only trusted routing
devices participate in routing. By default, authentication is disabled. The authentication
algorithm creates an encoded checksum that is included in the transmitted packet. The
receiving routing device uses an authentication key (password) to verify the packet’s
checksum.
If you configure authentication for all peers, each peer in that group inherits the group’s
authentication.
You can update authentication keys without resetting any IS-IS neighbor sessions. This
is referred to as hitless authentication key rollover.
Hitless authentication key rollover uses authentication keychains, which consist of the
authentication keys that are being updated. The keychain includes multiple keys. Each
key in the keychain has a unique start time. At the next key’s start time, a rollover occurs
from the current key to the next key, and the next key becomes the current key.
You can choose the algorithm through which authentication is established. You can
configure MD5 or SHA-1 authentication. You associate a keychain and the authentication
algorithm with an IS-IS neighboring session. Each key contains an identifier and a secret
password.
The sending peer chooses the active key based on the system time and the start times
of the keys in the keychain. The receiving peer determines the key with which it
authenticates based on the incoming key identifier.
You can configure either RFC 5304-based encoding or RFC 5310-based encoding for the
IS-IS protocol transmission encoding format.
Related • Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 36
Documentation
This example shows how to configure hitless authentication key rollover for IS-IS.
• Requirements on page 36
• Overview on page 36
• Configuration on page 37
• Verification on page 41
Requirements
No special configuration beyond device initialization is required before configuring hitless
authentication key rollover for IS-IS.
Overview
Authentication guarantees that only trusted routers participate in routing updates. This
keychain authentication method is referred to as hitless because the keys roll over from
one to the next without resetting any peering sessions or interrupting the routing protocol.
Junos OS supports both RFC 5304, IS-IS Cryptographic Authentication and RFC 5310,
IS-IS Generic Cryptographic Authentication.
This example includes the following statements for configuring the keychain:
• algorithm—For each key in the keychain, you can specify an encryption algorithm. The
algorithm can be SHA-1 or MD-5.
• key—A keychain can have multiple keys. Each key within a keychain must be identified
by a unique integer value. The range of valid identifier values is from 0 through 63.
• key-chain—For each keychain, you must specify a name. This example defines two
keychains: base-key-global and base-key-inter.
• options—For each key in the keychain, you can specify the encoding for the message
authentication code:isis-enhanced or basic. The basic (RFC 5304) operation is enabled
by default.
When you configure the isis-enhanced option, Junos OS sends RFC 5310-encoded
routing protocol packets and accepts both RFC 5304-encoded and RFC 5310-encoded
routing protocol packets that are received from other devices.
When you configure basic (or do not include the options statement in the key
configuration) Junos OS sends and receives RFC 5304-encoded routing protocols
packets, and drops 5310-encoded routing protocol packets that are received from
other devices.
Because this setting is for IS-IS only, the TCP and the BFD protocols ignore the encoding
option configured in the key.
• secret—For each key in the keychain, you must set a secret password. This password
can be entered in either encrypted or plain text format in the secret statement. It is
always displayed in encrypted format.
• start-time—Each key must specify a start time in UTC format. Control gets passed
from one key to the next. When a configured start time arrives (based on the routing
device’s clock), the key with that start time becomes active. Start times are specified
in the local time zone for a routing device and must be unique within the key chain.
You can apply a keychain globally to all interfaces or more granularly to specific interfaces.
This example includes the following statements for applying the keychain to all interfaces
or to particular interfaces:
A A C A B
SONET
FE/GE/XE R3
g040568
Configuration
CLI Quick To quickly configure the hitless authentication key rollover for IS-IS, copy the following
Configuration commands and paste the commands into the CLI.
[edit]
set interfaces ge-0/0/0 unit 0 description "interface A"
set interfaces ge-0/0/0 unit 0 family inet address 10.0.0.1/30
set interfaces ge-0/0/0 unit 0 family iso
set interfaces ge-0/0/0 unit 0 family inet6 address fe80::200:f8ff:fe21:67cf/128
set interfaces ge-0/0/1 unit 0 description "interface B"
[edit]
user@host# edit interfaces ge-0/0/0 unit 0
[edit interfaces ge-0/0/0 unit 0]
user@host# set description "interface A"
user@host# set family inet address 10.0.0.1/30
user@host# set family iso
user@host# set family inet6 address fe80::200:f8ff:fe21:67cf/128
user@host# exit
[edit]
user@host# edit interfaces ge-0/0/1 unit 0
[edit interfaces ge-0/0/1 unit 0]
user@host# set interfaces ge-0/0/1 unit 0 description "interface B"
user@host# set interfaces ge-0/0/1 unit 0 family inet address 10.0.0.5/30
user@host# set interfaces ge-0/0/1 unit 0 family iso
user@host# set interfaces ge-0/0/1 unit 0 family inet6 address
10FB::C:ABC:1F0C:44DA/128
user@host# exit
[edit]
user@host# edit interfaces ge-0/0/2 unit 0
[edit interfaces ge-0/0/2 unit 0]
user@host# set description "interface C"
user@host# set family inet address 10.0.0.9/30
user@host# set interfaces ge-0/0/2 unit 0 family iso
user@host# set interfaces ge-0/0/2 unit 0 family inet6 address ff06::c3/128
user@host# exit
[edit]
user@host# edit security authentication-key-chains key-chain base-key-global
[edit security authentication-key-chains key-chain base-key-global]
user@host# set key 63 secret "$ABC123"
user@host# set key 63 start-time "2011-8-6.06:54:00-0700"
user@host# set key 63 algorithm hmac-sha-1
user@host# set key 63 options isis-enhanced
user@host# exit
[edit]
user@host# edit security authentication-key-chains key-chain base-key-inter
[edit security authentication-key-chains key-chain base-key-inter]
user@host# set key 0 secret "$ABC123"
user@host# set key 0 start-time "2011-8-6.06:54:00-0700"
user@host# set key 0 algorithm md5
user@host# set key 0 options basic
user@host# exit
3. Apply the base-key-global keychain to all Level 1 IS-IS interfaces on Router R0.
[edit]
user@host# edit protocols isis level 1
[edit protocols isis level 1]
set authentication-key-chain base-key-global
user@host# exit
[edit]
user@host# edit protocols isis interface ge-0/0/0.0 level 1
[edit protocols isis interface ge-0/0/0.0 level 1]
set hello-authentication-key-chain base-key-inter
user@host# exit
[edit]
user@host# commit
Results
Confirm your configuration by entering the show interfaces, show protocols, and show
security commands.
key 0 {
secret "$ABC123”;
start-time "2011-8-6.06:54:00-0700";
algorithm md5;
options basic;
}
}
}
Verification
To verify the configuration, run the following commands:
The checksum enables IS-IS to check at the receiver if the IS-IS protocol frames have
become corrupted while traversing the network.
Sometimes corrupt IS-IS protocol frames can go undetected. If routing control traffic
becomes corrupted, it is likely that user payload traffic might be corrupted, too. This can
lead to unacceptable throughput. To prevent corrupt frames from going undetected, we
recommend enabling checksumming on the IS-IS interfaces.
To review, IS-IS hello (IIH) PDUs establish adjacencies with other routing devices. A
partial sequence number PDU (PSNP) is used by an IS-IS router to request link-state
PDU information from a neighboring router. The complete sequence number PDU (CSNP)
lists all the link-state PDUs in the link-state database.
The original specification for IS-IS does not provide checksums for IIHs, CSNPs, and
PSNPs.
Related • Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking on page 42
Documentation
This example shows how to enable packet checksums for IS-IS interfaces.
• Requirements on page 42
• Overview on page 42
• Configuration on page 42
• Verification on page 43
Requirements
Before you begin, configure IS-IS on both routers. See “Example: Configuring IS-IS” on
page 14 for information about the sample IS-IS configuration.
Overview
Junos OS supports IS-IS checksums as documented in RFC 3358, Optional Checksums
in Intermediate System to Intermediate System (ISIS).
IS-IS protocol data units (PDUs) include link-state PDUs, complete sequence number
PDUs (CSNPs), partial sequence number PDUs (PSNPs), and IS-IS hello (IIH) packets.
These PDUs can be corrupt due to faulty implementations of Layer 2 hardware or lack
of checksums on a specific network technology. Corruption of length or type, length, and
value (TLV) fields can lead to the generation of extensive numbers of empty link-state
PDUs in the receiving node. Because authentication is not a replacement for a checksum
mechanism, you might want to enable the optional checksum TLV on your IS-IS interfaces.
The checksum cannot be enabled with MD5 hello authentication on the same interface.
R1 R2
lo0:192.168.0.1 lo0:192.168.0.2
g041282
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Enable checksums.
Results From configuration mode, confirm your configuration by entering the show protocols
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Checksums
Action From operational mode, enter the show log isis | match checksum command.
Meaning The output shows that checksum information is captured in the IS-IS trace log file.
For some routing platform vendors, the flow of routes occurs between various protocols.
If, for example, you want to configure redistribution from RIP to OSPF, the RIP process
tells the OSPF process that it has routes that might be included for redistribution. In Junos
OS, there is not much direct interaction between the routing protocols. Instead, there are
central gathering points where all protocols install their routing information. These are
the main unicast routing tables inet.0 and inet6.0.
From these tables, the routing protocols calculate the best route to each destination and
place these routes in a forwarding table. These routes are then used to forward routing
protocol traffic toward a destination, and they can be advertised to neighbors.
• When the Routing Engine places the routes of a routing protocol into the routing table,
it is importing routes into the routing table.
• When the Routing Engine uses active routes from the routing table to send a protocol
advertisement, it is exporting routes from the routing table.
NOTE: The process of moving routes between a routing protocol and the
routing table is described always from the point of view of the routing table.
That is, routes are imported into a routing table from a routing protocol and
they are exported from a routing table to a routing protocol. Remember
this distinction when working with routing policies.
As shown in Figure 7 on page 46, you use import routing policies to control which routes
are placed in the routing table, and export routing policies to control which routes are
advertised from the routing table to neighbors.
Neighbors Neighbors
Neighbors Neighbors
Forwarding
Table
g001706
In general, the routing protocols place all their routes in the routing table and advertise
a limited set of routes from the routing table. The general rules for handling the routing
information between the routing protocols and the routing table are known as the routing
policy framework.
The routing policy framework is composed of default rules for each routing protocol that
determine which routes the protocol places in the routing table and advertises from the
routing table. The default rules for each routing protocol are known as default routing
policies.
You can create routing policies to preempt the default policies, which are always present.
A routing policy allows you to modify the routing policy framework to suit your needs.
You can create and implement your own routing policies to do the following:
• Control which active routes a routing protocol advertises from the routing table. An
active route is a route that is chosen from all routes in the routing table to reach a
destination.
• Manipulate the route characteristics as a routing protocol places the route in the routing
table or advertises the route from the routing table.
You can manipulate the route characteristics to control which route is selected as the
active route to reach a destination. The active route is placed in the forwarding table and
is used to forward traffic toward the route’s destination. In general, the active route is
also advertised to a router’s neighbors.
When a protocol is exporting routes from the routing table, it exports active routes only.
This applies to actions specified by both default and user-defined export policies.
When evaluating routes for export, the Routing Engine uses only active routes from the
routing table. For example, if a routing table contains multiple routes to the same
destination and one route has a preferable metric, only that route is evaluated. In other
words, an export policy does not evaluate all routes; it evaluates only those routes that
a routing protocol is allowed to advertise to a neighbor.
NOTE: By default, BGP advertises active routes. However, you can configure
BGP to advertise inactive routes, which go to the same destination as other
routes but have less preferable metrics.
The policy framework software treats direct and explicitly configured routes as if they
are learned through routing protocols; therefore, they can be imported into the routing
table. Routes cannot be exported from the routing table to the pseudoprotocol, because
this protocol is not a real routing protocol. However, aggregate, direct, generated, and
static routes can be exported from the routing table to routing protocols, whereas local
routes cannot.
Dynamic Database
In Junos OS Release 9.5 and later, you can configure routing policies and certain routing
policy objects in a dynamic database that is not subject to the same verification required
by the standard configuration database. As a result, you can quickly commit these routing
policies and policy objects, which can be referenced and applied in the standard
configuration as needed. BGP is the only protocol to which you can apply routing policies
that reference policies configured in the dynamic database. After a routing policy based
on the dynamic database is configured and committed in the standard configuration,
you can quickly make changes to existing routing policies by modifying policy objects in
the dynamic database. Because Junos OS does not validate configuration changes to
the dynamic database, when you use this feature, you should test and verify all
configuration changes before committing them.
Support for IS-IS loop-free alternate (LFA) routes essentially adds IP fast-reroute
capability for IS-IS. Junos OS precomputes multiple loop-free backup routes for all IS-IS
routes. These backup routes are pre-installed in the Packet Forwarding Engine, which
performs a local repair and implements the backup path when the link for a primary next
hop for a particular route is no longer available. The selection of LFA is done randomly
by selecting any matching LFA to progress to the given destination. This does not ensure
best backup coverage available for the network. In order to choose the best LFA, Junos
OS allows you to configure network-wide backup selection policies for each destination
(IPv4 and IPv6) and a primary next-hop interface. These policies are evaluated based
on admin-group, srlg, bandwidth, protection-type, metric, and neighbor information.
During backup shortest-path-first (SPF) computation, each node and link attribute of
the backup path is accumulated by IGP and is associated with every node (router) in the
topology. The next hop in the best backup path is selected as the backup next hop in the
routing table. In general, backup evaluation policy rules are categorized into the following
types:
• Ordering — Rules configured to select the best among the eligible backup paths.
The backup selection policies can be configured with both pruning and ordering rules.
While evaluating the backup policies, each backup path is assigned a score, an integer
value that signifies the total weight of the evaluated criteria. The backup path with the
highest score is selected.
To enforce LFA selection, configure various rules for the following attributes:
• node— A list of loop-back IP addresses of the adjacent nodes to either prefer or exclude
in the backup path selection. The node can be a local (adjacent router) node, remote
node, or any other router in the backup path. The nodes are identified through the
TE-router-ID TLV advertised by a node in the LSP.
• node-tag— A node tag identifies a group of nodes in the network based on criteria such
as the same neighbor tag values for all PE nodes to either prefer or exclude in the a
backup path selection. This is implemented using IS-IS admin-tags. The routers are
not identified with the explicit router-id but with an admin-tag prefix to their lo0 address
prefix. These tags are advertised as part of extended IP reachability with a /32 prefix
length that represents the TE-router _ID or node-ID of a router.
• srlg— A shared risk link group (SRLG) is a set of links sharing a common resource, which
affects all links in the set if the common resource fails. These links share the same risk
of failure and are therefore considered to belong to the same SRLG. For example, links
sharing a common fiber are said to be in the same SRLG because a fault with the fiber
might cause all links in the group to fail. An SRLG is represented by a 32-bit number
unique within an IGP (IS-IS) domain. A link might belong to multiple SRLGs. You can
define the backup selection to either allow or reject the common SRLGs between the
primary and the backup path.
• metric— Metric decides how the LFAs should be preferred. In backup selection path,
root metric and dest-metric are the two types of metrics. root-metric indicates the
metric to the one-hop neighbor or a remote router such as an RSVP backup LSP tail-end
router. The dest-metric indicates the metric from a one-hop neighbor or remote router
such as an RSVP backup LSP tail-end router to the final destination. The metric
evaluation is done either in ascending or descending order. By default, the first
preference is given to backup paths with lowest destination evaluation and then to
backup paths with lowest root metrics.
The evaluation-order allows you to control the order and criteria of evaluating these
attributes in the backup path. You can explicitly configure the evaluation order. Only the
configured attributes influence the backup path selection. The default order of evaluation
of these attributes for the LFA is [ admin-group srlg bandwidth protection-type neighbor
neighbor-tag metric ] .
Related • Example: Configuring Backup Selection Policy for IS-IS Protocol on page 50
Documentation
• backup-selection (Protocols ISIS) on page 459
This example shows how to configure the backup selection policy for the IS-IS protocol.
When you enable backup selection policies, Junos OS allows selection of LFA based on
the policy rules and attributes of the links and nodes in the network. These attributes are
admin-group, srlg, bandwidth, protection-type, metric, neighbor, and neighbor-tag.
• Requirements on page 50
• Overview on page 50
• Configuration on page 51
• Verification on page 72
Requirements
This example uses the following hardware and software components:
2. Configure IS-IS.
Overview
Starting with Junos OS Release 14.1, the default loop free alternative (LFA) selection
algorithm or criteria can be overridden with an LFA policy. These policies are configured
for each destination (IPv4 and IPv6) and a primary next-hop interface . These backup
policies enforce LFA selection based on admin-group, srlg, bandwidth, protection-type,
metric, neighbor, and neighbor-tag attributes of the backup path. During backup
shortest-path-first (SPF) computation, each attribute (both node and link) of the backup
path, stored per backup next-hop, is accumulated by IGP. For the routes created internally
by IGP, the attribute set of every backup path is evaluated against the policy configured
for each destination (IPv4 and IPv6) and a primary next-hop interface. The first or the
best backup path is selected and installed as the backup next hop in the routing table.
To configure the backup selection policy, include the backup-selection configuration
statement at the [edit routing-options] hierarchy level. The show backup-selection
command displays the configured policies for a given interface and destination. The
display can be filtered against a particular destination, prefix, interface, or logical systems.
Topology
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Configuring Device R3
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R3# set ge-1/3/5 unit 0 family inet address 100.2.3.2/24
user@R3# set ge-1/3/5 unit 0 family iso
user@R3# set ge-1/3/5 unit 0 family inet6 address 2001:100:2:3::2/64
user@R3# set ge-1/3/5 unit 0 family mpls
user@R3# set ge-0/3/1 unit 0 family inet address 100.3.4.1/24
user@R3# set ge-0/3/1 unit 0 family iso
user@R3# set ge-0/3/1 unit 0 family inet6 address 2001:100:3:4::1/64
user@R3# set ge-0/3/1 unit 0 family mpls
user@R3# set ge-0/3/6 unit 0 family inet address 100.3.5.1/24
user@R3# set ge-0/3/6 unit 0 family iso
user@R3# set ge-0/3/6 unit 0 family inet6 address 2001:100:3:5::1/64
user@R3# set ge-0/3/6 unit 0 family mpls
user@R3# set ge-2/0/4 unit 0 family inet address 100.3.6.1/24
user@R3# set ge-2/0/4 unit 0 family iso
user@R3# set ge-2/0/4 unit 0 family inet6 address 2001:100:3:6::1/64
user@R3# set ge-2/0/4 unit 0 family mpls
user@R3# set ge-1/1/0 unit 0 family inet address 100.3.7.1/24
user@R3# set ge-1/1/0 unit 0 family iso
user@R3# set ge-1/1/0 unit 0 family inet6 address 2001:100:3:7::1/64
user@R3# set ge-1/1/0 unit 0 family mpls
user@R3# set interfaces lo0 unit 0 family inet address 10.255.102.128/32
user@R3# set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1004.00
user@R3# set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:128/128
user@R3# set interfaces lo0 unit 0 family mpls
[edit policy-options]
user@R3#set policy-statement ecmp term 1 then load-balance per-packet
[edit protocols]
user@R3# set rsvp interface all
[edit routing-options]
user@R3# set srlg srlg1 srlg-value 101
user@R3# set srlg srlg2 srlg-value 102
user@R3# set srlg srlg3 srlg-value 103
user@R3# set srlg srlg4 srlg-value 104
user@R3# set srlg srlg5 srlg-value 105
user@R3# set srlg srlg6 srlg-value 106
user@R3# set srlg srlg7 srlg-value 107
user@R3# set srlg srlg8 srlg-value 108
[edit protocols]
user@R3# set isis interface ge-1/3/5 link-protection
user@R3# set isis interface ge-0/3/1 level 2 metric 21
user@R3# set isis interface ge-0/3/6 level 2 metric 13
user@R3# set isis interface ge-2/0/4 level 2 metric 15
user@R3# set isis interface ge-1/1/0 level 2 metric 22
[edit protocols]
user@R3# set isis interface all level 2 metric 10
11. Apply the routing policy to all equal cost multi paths exported from the routing table
to the forwarding table.
[edit routing-options]
user@R3# set forwarding-table export ecmp
[edit routing-options]
user@R3# set backup-selection destination 0.0.0.0/0 interface all admin-group
include-all c1
user@R3# set backup-selection destination 0.0.0.0/0 interface all admin-group
include-any c2
user@R3# set backup-selection destination 0.0.0.0/0 interface all admin-group
preference c3
user@R3# set backup-selection destination 0.0.0.0/0 interface all srlg loose
user@R3# set backup-selection destination 0.0.0.0/0 interface all
downstream-paths-only
user@R3# set backup-selection destination 0.0.0.0/0 interface all
bandwidth-greater-equal-primary
user@R3# set backup-selection destination 0.0.0.0/0 interface all neighbor
preference 10.255.102.178
user@R3# set backup-selection destination 0.0.0.0/0 interface all neighbor-tag
preference 1004
user@R3# set backup-selection destination 0.0.0.0/0 interface all metric-order
dest
user@R3# set backup-selection destination 0.0.0.0/0 interface all evaluation-order
admin-group
user@R3# set backup-selection destination 0.0.0.0/0 interface all evaluation-order
srlg
user@R3# set backup-selection destination 0.0.0.0/0 interface all evaluation-order
bandwidth
user@R3# set backup-selection destination 100.0.1.0/24 interface all srlg strict
user@R3# set backup-selection destination 100.0.1.0/24 interface all
bandwidth-greater-equal-primary
user@R3# set backup-selection destination 100.0.7.0/24 interface all srlg strict
Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
}
}
ge-0/3/1 {
unit 0 {
family inet {
address 100.3.4.1/24;
}
family iso;
family inet6{
address 2001:100:3:4::1/64;
}
family mpls;
}
}
ge-0/3/6 {
unit 0 {
family inet {
address 100.3.5.1/24;
}
family iso;
family inet6{
address 2001:100:3:5::1/64;
}
family mpls;
}
}
ge-2/0/4 {
unit 0 {
family inet {
address 100.3.6.1/24;
}
family iso;
family inet6{
address 2001:100:3:6::1/64;
}
family mpls;
}
}
ge-1/1/0 {
unit 0 {
family inet {
address 100.3.7.1/24;
}
family iso;
family inet6{
address 2001:100:3:7::1/64;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 10.255.102.128/32;
}
family iso {
address 49.0001.0010.0100.1004.00;
}
family inet6{
address abcd::10:255:102:128/128;
}
family mpls;
}
}
interface ge-0/3/6 {
admin-group [ c1 c2 ];
}
interface ge-2/0/4 {
admin-group [ c1 c2 c5 ];
}
interface ge-1/1/0 {
admin-group [ c2 c12 ];
}
isis {
interface ge-1/3/5 {
link-protection;
}
interface ge-0/3/1 {
level 2 metric 21;
}
interface ge-0/3/6 {
level 2 metric 13;
}
interface ge-2/0/4 {
level 2 metric 15;
}
interface ge-1/1/0 {
level 2 metric 22;
}
interface all {
level 2 metric 10;
}
}
srlg-value 108;
}
srlg9 {
srlg-value 109;
}
srlg10 {
srlg-value 110;
}
srlg111 {
srlg-value 111;
}
srlg112 {
srlg-value 112;
}
}
backup-selection {
destination 0.0.0.0/0 {
interface all {
admin-group {
include-all c1;
include-any c2;
preference c3;
}
srlg loose;
downstream-paths-only;
bandwidth-greater-equal-primary;
neighbor {
preference 10.255.102.178;
}
neighbor-tag {
preference 1004;
}
metric-order dest;
evaluation-order [ admin-group srlg bandwidth ];
}
}
destination 100.0.1.0/24 {
interface all {
srlg strict;
bandwidth-greater-equal-primary;
}
}
destination 100.0.7.0/24 {
interface all {
srlg strict;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Verify that the configuration is working properly.
Action From operational mode, run the show route command for the routing table.
49.0001.0010.0100.1004/72
*[Direct/0] 1w0d 04:14:44
> via lo0.0
abcd::10:255:102:180/128
*[IS-IS/18] 1w0d 04:12:51, metric 32
> to fe80::2a0:a514:0:4949 via ge-1/1/0.0
fe80::/64 *[Direct/0] 1w0d 04:13:00
> via ge-1/3/5.0
[Direct/0] 1w0d 04:12:59
> via ge-0/3/1.0
[Direct/0] 1w0d 04:12:59
> via ge-0/3/6.0
[Direct/0] 1w0d 04:12:59
> via ge-2/0/4.0
[Direct/0] 1w0d 04:12:59
> via ge-1/1/0.0
fe80::2a0:a50f:fc64:7649/128
*[Direct/0] 1w0d 04:14:43
> via lo0.0
fe80::2a0:a514:0:2049/128
*[Local/0] 1w0d 04:13:11
Local via ge-1/3/5.0
fe80::2a0:a514:0:2249/128
*[Local/0] 1w0d 04:13:10
Local via ge-0/3/1.0
fe80::2a0:a514:0:2349/128
*[Local/0] 1w0d 04:13:10
Local via ge-0/3/6.0
fe80::2a0:a514:0:2449/128
*[Local/0] 1w0d 04:13:10
Local via ge-2/0/4.0
fe80::2a0:a514:0:2549/128
*[Local/0] 1w0d 04:13:10
Local via ge-1/1/0.0
Action From operational mode, run the show isis route command for Device R3.
Purpose Verify the potential IS-IS backup SPF roots for Device R3.
Action From operational mode, run the show isis backup spf results command for Device R3.
Meaning The output displays the root calculations through each directly connected router.
Action From operational mode, run the show backup-selection command for Device R3.
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c3
Neighbor preference: 10.255.102.178
Neighbor-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Neighbor,
Metric, Neighbor-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Neighbor,
Metric, Neighbor-Tag
Meaning The output displays the configured policies per prefix per primary next-hop interface.
Support for IS-IS loop-free alternate (LFA) routes essentially adds IP fast-reroute
capability for IS-IS. Junos OS precomputes multiple loop-free backup routes for all IS-IS
routes. These backup routes are pre-installed in the Packet Forwarding Engine, which
performs a local repair and implements the backup path when the link for a primary next
hop for a particular route is no longer available. The selection of LFA is done randomly
by selecting any matching LFA to progress to the given destination. This does not ensure
best backup coverage available for the network. In order to choose the best LFA, Junos
OS allows you to configure network-wide backup selection policies for each destination
(IPv4 and IPv6) and a primary next-hop interface. These policies are evaluated based
on admin-group, srlg, bandwidth, protection-type, metric, and neighbor information.
Before you begin to configure the backup selection policy for the IS-IS protocol:
• Configure the router interfaces. See the Junos OS Network Management Administration
Guide for Routing Devices
• Configure an interior gateway protocol or static routing. See the Junos OS Routing
Protocols Library for Routing Devices
[edit policy-options]
user@host# set policy-statement ecmp term 1 then load-balance per-packet
[edit protocols]
user@host# set rsvp interface all
[edit routing-options]
user@host# set srlg srlg-name srlg-value srlg-value
8. Enable link protection and configure the metric value on all the interfaces.
[edit protocols]
user@host# set isis interface all level 2 metric 10
9. Apply the routing policy to all equal cost multipaths exported from the routing table
to the forwarding table.
[edit routing-options]
user@host# set forwarding-table export ecmp
10. Configure the administrative group of the backup selection policy for an IP address.
You can choose to exclude, include all, include any, or prefer the administrative groups
from the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
admin-group
The backup path is not selected as the loop-free alternate (LFA) or backup nexthop
if any of the links in the path have any one of the listed administrative groups.
• Configure all the administrative groups if each link in the backup path requires all
the listed administrative groups in order to accept the path.
For example, to set all the administrative groups if each link requires all the listed
administrative groups in order to accept the path:
• Configure any administrative group if each link in the backup path requires at least
one of the listed administrative groups in order to select the path.
For example, to set any administrative group if each link in the backup path requires
at least one of the listed administrative groups in order to select the path:
• Define an ordered set of administrative group that specifies the preference of the
backup path.
The leftmost element in the set is given the highest preference.
For example, to set an ordered set of administrative group that specifies the
preference of the backup path:
11. Configure the backup path to allow the selection of the backup next hop only if the
bandwidth is greater than or equal to the bandwidth of the primary next hop.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
bandwidth-greater-equal-primary
12. Configure the backup path to specify the metric from the one-hop neighbor or from
the remote router such as an RSVP backup label-switched-path (LSP) tail-end router
to the final destination.
The destination metric can be either highest or lowest.
• Configure the backup path that has the highest destination metric.
[edit routing-options]
• Configure the backup path that has the lowest destination metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
dest-metric lowest
13. Configure the backup path that is a downstream path to the destination.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
downstream-paths-only
14. Set the order of preference of the root and the destination metric during backup path
selection.
The preference order can be :
• [root dest] — Backup path selection or preference is first based on the root-metric
criteria. If the criteria of all the root-metric is the same, then the selection or
preference is based on the dest-metric.
• [dest root] — Backup path selection or preference is first based on the dest-metric
criteria. If the criteria of all the dest-metric is the same, then the selection is based
on the root-metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
metric-order root
user@host# set backup-selection destination ip-address interface interface-name
metric-order dest
15. Configure the backup path to define a list of loop-back IP addresses of the adjacent
neighbors to either exclude or prefer in the backup path selection.
The neighbor can be a local (adjacent router) neighbor, remote neighbor, or any other
router in the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
neighbor
The backup path that has a router from the list is not selected as the loop-free
alternative or backup next hop.
16. Define the backup path per-neighbor policy, to either exclude or prefer a backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all neighbor-tag
• Configure to not select the backup path as the loop-free alternative or backup-next
hop if any node or router with route-tag is present in the path.
For example, to not select the backup path as the loop-free alternative or
backup-next hop if any node or router with 1004 route-tag is present in the path:
For example, to configure the set of route tags in descending order of preference:
17. Configure the backup path to specify the required protection type of the backup path
to be link, node, or node-link.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
protection-type link
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
protection-type node
• Select the backup path that allows either node or link protection LFA where
node-protection LFA is preferred over link-protection LFA.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
protection-type node-link
18. Specify the metric to the one-hop neighbor or to the remote router such as an RSVP
backup label-switched-path (LSP) tail-end router.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all root-metric
highest
[edit routing-options]
user@host# set backup-selection destination ip-address interface all root-metric
lowest
19. Configure the backup selection path to either allow or reject the common shared risk
link groups (SRLGs) between the primary link and each link in the backup path.
• Configure the backup path to allow common srlgs between the primary link and
each link in the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all srlg loose
• Configure the backup path to reject the backup path that has common srlgs between
the primary link and each link in the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all srlg strict
20. Configure the backup path to control the order and the criteria of evaluating the backup
path based on the administrative group, srlg, bandwidth, protection type, neighbor,
neighbor-tag, and metric. The default order of evaluation is admin-group, srlg,
bandwidth, protection-type, neighbor, neighbor-tag, and metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all evaluation-order
admin-group
user@host# set backup-selection destination ip-address interface all evaluation-order
srlg
user@host# set backup-selection destination ip-address interface all evaluation-order
bandwidth
This example shows how to redistribute OSPF routes into an IS-IS network.
• Requirements on page 87
• Overview on page 87
• Configuration on page 88
• Verification on page 94
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
Export policy can be applied to IS-IS to facilitate route redistribution.
Junos OS does not support the application of import policy for link-state routing protocols
like IS-IS because such policies can lead to inconsistent link-state database (LSDB)
entries, which in turn can result in routing inconstancies.
In this example, OSPF routes 192.168.0/24 through 192.168.3/24 are redistributed into
IS-IS area 49.0002 from Device R2.
In addition, policies are configured to ensure that Device R1 can reach destinations on
the 10.0.0.44/30 network, and that Device R3 can reach destinations on the 10.0.0.36/30
network. This enables end-to-end reachability.
IS-IS
49.0002
lo0:172.16.3.5 lo0:172.16.9.7
fe-1/2/0 fe-1/2/1
.38 10.0.0.36/30 .37
R1 R2
.45 fe-1/2/0
10.0.0.44/30
.46 fe-1/2/0
R3
g041258
OSPF
(192.168.0-3/24)
“CLI Quick Configuration” on page 88 shows the configuration for all of the devices in
Figure 9 on page 88. The section “Step-by-Step Procedure” on page 89 describes the
steps on Device R2. “Step-by-Step Procedure” on page 91 describes the steps on Device
R3.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
[edit interfaces]
user@R2# set fe-1/2/1 unit 0 description to-R5
user@R2# set fe-1/2/1 unit 0 family inet address 10.0.0.37/30
user@R2# set fe-1/2/1 unit 0 family iso
user@R2# set fe-1/2/0 unit 0 description to-OSPF-network
user@R2# set fe-1/2/0 unit 0 family inet address 10.0.0.45/30
user@R2# set lo0 unit 0 family inet address 172.16.9.7/32
user@R2# set lo0 unit 0 family iso address 49.0002.0172.0016.0907.00
2. Configure IS-IS on the interface facing Device R1 and the loopback interface.
3. Configure the policy that enables Device R1 to reach the 10.0.0.44/30 network.
4. Apply the policy that enables Device R1 to reach the 10.0.0.44/30 network.
8. Configure the policy that enables Device R3 to reach the 10.0.0.36/30 network.
9. Apply the policy that enables Device R3 to reach the 10.0.0.36/30 network.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R3# set fe-1/2/0 unit 0 family inet address 10.0.0.46/30
user@R3# set lo0 unit 0 family inet address 192.168.1.1/32
user@R3# set lo0 unit 0 family inet address 192.168.2.1/32
user@R3# set lo0 unit 0 family inet address 192.168.3.1/32
user@R3# set lo0 unit 0 family inet address 192.168.0.1/32
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
}
}
policy-statement send-direct-to-isis-neighbors {
from {
protocol direct;
route-filter 10.0.0.44/30 exact;
}
then accept;
}
policy-statement send-direct-to-ospf-neighbors {
from {
protocol direct;
route-filter 10.0.0.36/30 exact;
}
then accept;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the expected routes are advertised by OSPF.
Action From operational mode on Device R2, enter the show route protocol ospf command.
Purpose Make sure that the expected routes are redistributed from OSPF into IS-IS.
Action From operational mode on Device R1, enter the show route protocol isis command.
Verifying Connectivity
Purpose Check that Device R1 can reach the destinations on Device R3.
Meaning These results confirm that Device R1 can reach the destinations in the OSPF network.
Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1 Area
This example shows how to leak prefixes in an IS-IS network from a Level 2 area to a
Level 1 area.
• Requirements on page 96
• Overview on page 96
• Configuration on page 97
• Verification on page 101
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
Every routing protocol passes routing information up or down the routing hierarchy. This
bidirectional flow of routing information is known as route leaking.
By default, IS-IS protocol leaks routing information from a Level 1 area to a Level 2 area.
However, to leak routing information from a Level 2 area to a Level 1 area, an export policy
must be explicitly configured.
Topology
In this example, Devices R3 and R4 are configured in a Level 2 area. Devices R5, R6, and
R7 are configured in a Level 1 area.
LEVEL 2 LEVEL 1
10.0.0.0/30 10.0.0.0/30
192.168.0.3/32 192.168.0.6/32
.21
R3 R6
.17 .33
R5
.22 .29
.26 .38
.18 .34
.25 .37
R4 192.168.0.5/32 R7
192.168.0.4/32 192.168.0.7/32
g040934
49.0001 49.0002
Configuration
CLI Quick To quickly configure route leaking from a Level 2 area to a Level 1 area, copy the following
Configuration commands, paste them into a text file, remove any line breaks, change any details
necessary to match your network configuration, and then copy and paste the commands
into the CLI at the [edit] hierarchy level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
Enable IS-IS on the interfaces by including the ISO address family on each interface.
[edit interfaces]
user@R3# set fe-1/2/0 unit 0 description to-R4
user@R3# set fe-1/2/0 unit 0 family inet address 10.0.0.17/30
user@R3# set fe-1/2/0 unit 0 family iso
user@R3# set fe-1/2/1 unit 0 description to-R5
user@R3# set fe-1/2/1 unit 0 family inet address 10.0.0.21/30
user@R3# set fe-1/2/1 unit 0 family iso
One address is for IPv4, and the other address is to enable the router to form
adjacencies with other routers in the area.
4. Configure a route leaking policy on the routers configured in the Level 2 area to leak
routes into the Level 1 area.
Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols isis, and show policy-options commands.
If the output does not display the intended configuration, repeat the instructions in this
example to correct the configuration.
fe-1/2/0 {
unit 0 {
description to-R4;
family inet {
address 10.0.0.17/30;
}
family iso;
}
}
fe-1/2/1 {
unit 0 {
description to-R5;
family inet {
address 10.0.0.21/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.3/32;
}
family iso {
address 49.0001.0192.0168.0003.00;
}
}
}
export leak-L2-to-L1;
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
}
interface lo0.0 {
level 1 disable;
}
policy-statement leak-L2-to-L1 {
from {
protocol isis;
level 2;
route-filter 192.168.0.0/24 orlonger;
}
to {
protocol isis;
level 1;
}
then accept;
}
Similarly, confirm the configuration on all other routers. If you are done configuring the
routers, enter commit from configuration mode.
Verification
Purpose Verify that IS-IS leaks routes from a Level 2 area to a Level 1 area.
Action To verify that route leaking is taking place, use the following commands:
• show isis adjacency (to verify that the IS-IS network is up and adjacencies have been
established)
• show isis database detail (to verify the presence of leaked routes)
1. From operational mode on Device R3, run the show isis adjacency command.
The output verifies that the interfaces on Device R3 are up and have established
adjacencies with the connecting interfaces on Routers R4 and R5. If you don’t see the
interfaces being functional, see the “Results” on page 100 section for troubleshooting
your configuration.
2. From operational mode on Device R3, run the show isis database detail command.
The Down keyword identifies the routes that have successfully leaked from the Level
2 area to the Level 1 area.
You can assign community tags to non-BGP routes through configuration (for static,
aggregate, or generated routes) or an import routing policy. These tags can then be
matched when BGP exports the routes.
A community value is a 32-bit field that is divided into two main sections. The first 16 bits
of the value encode the AS number of the network that originated the community, while
the last 16 bits carry a unique number assigned by the AS. This system attempts to
guarantee a globally unique set of community values for each AS in the Internet. Junos
OS uses a notation of as-number:community-value, where each value is a decimal number.
The AS values of 0 and 65,535 are reserved, as are all of the community values within
those AS numbers. Each community, or set of communities, is given a name within the
[edit policy-options] configuration hierarchy. The name of the community uniquely
identifies it to the routing device and serves as the method by which routes are categorized.
For example, a route with a community value of 64510:1111 might belong to the community
named AS64510-routes. The community name is also used within a routing policy as a
match criterion or as an action. The command syntax for creating a community is:
policy-options community name members [community-ids]. The community-ids are either
a single community value or multiple community values. When more than one value is
assigned to a community name, the routing device interprets this as a logical AND of the
community values. In other words, a route must have all of the configured values before
being assigned the community name.
The regular community attribute is four octets. Networking enhancements, such as VPNs,
have functionality requirements that can be satisfied by an attribute such as a community.
However, the 4-octet community value does not provide enough expansion and flexibility
to accommodate VPN requirements. This leads to the creation of extended communities.
An extended community is an 8-octet value that is also divided into two main sections.
The first 2 octets of the community encode a type field while the last 6 octets carry a
unique set of data in a format defined by the type field. Extended communities provide
a larger range for grouping or categorizing communities.
When specifying community IDs for standard and extended community attributes, you
can use UNIX-style regular expressions. The only exception is for VPN import policies
(vrf-import), which do not support regular expressions for the extended communities
attribute.
Regular BGP communities attributes are a variable length attribute consisting of a set
of one or more 4-byte values that was split into 16 bit values. The most significant word
is interpreted as an AS number and least significant word is a locally defined value
assigned by the operator of the AS. Since the adoption of 4-byte ASNs, the 4-byte BGP
regular community and 6-byte BGP extended community can no longer support BGP
community attributes. Operators often encode AS number in the local portion of the BGP
community that means that sometimes the format of the community is ASN:ASN. With
the 4-byte ASN , you need 8-bytes to encode it. Although BGP extended community
permits a 4-byte AS to be encoded as the global administrator filed, the local
administrator field has only 2-byte of available space. Thus, 6-byte extended community
attribute is also unsuitable. To overcome this, Junos OS allows you to configure optional
transitive path attribute - a 12-byte BGP large community that provides the most
significant 4-byte value to encode autonomous system number as the global administrator
and the remaining two 4-byte assigned numbers to encode the local values as defined
in RFC 8092. You can configure BGP large community at the [edit policy-options
community community-name members] and [edit routing-options static route ip-address
community] hierarchy levels. The BGP large community attributes format has four fields:
large:global administrator:assigned number:assigned number.
NOTE: The length of the BGP large communities attribute value should be
a non-zero multiple of 12.
This example defines a policy that takes BGP routes from the Edu community and places
them into IS-IS with a metric of 63.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
Figure 11 on page 105 shows the topology used in this example.
Figure 11: Redistributing BGP Routes with a Specific Community Tag into IS-IS
AS 1
IS-IS
A D
.5 .14
10.0.0.4/30 IBGP 10.0.0.12/30 AS 2
fe-1/2/0 .6 .13 fe-1/2/1
.9 10.0.0.8/30 .10 .25 10.0.0.24/30 .26
B C E
fe-1/2/1 IBGP fe-1/2/0 fe-1/2/2 EBGP
10.2/16
10.3/16
g041311
In this example, Device A, Device B, Device C, and Device D are in autonomous system
(AS) 1 and are running IS-IS. All of the AS 1 devices, except Device D, are running internal
BGP (IBGP).
Device E is in AS 2 and has an external BGP (EBGP) peering session with Device C. Device
E has two static routes, 10.2.0.0/16 and 10.3.0.0/16. These routes are tagged with the
Edu 2:5 community attribute and are advertised by way of EBGP to Device C.
Device C accepts the BGP routes that are tagged with the Edu 2:5 community attribute,
redistributes the routes into IS-IS, and applies an IS-IS metric of 63 to these routes.
“CLI Quick Configuration” on page 105 shows the configuration for all of the devices in
Figure 11 on page 105. The section “Step-by-Step Procedure” on page 107 describes the
steps on Device C and Device E.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device E:
[edit interfaces]
user@E# set fe-1/2/0 unit 0 family inet address 10.0.0.26/30
2. Configure the statics policy, which adds the Edu community attribute to the static
routes.
[edit policy-options]
user@E# set policy-statement statics from protocol static
user@E# set policy-statement statics then community add Edu
user@E# set policy-statement statics then accept
user@E# set community Edu members 2:5
[edit routing-options]
user@E# set router-id 192.168.0.5
user@E# set autonomous-system 2
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device C:
[edit interfaces]
user@C# set fe-1/2/0 unit 0 family inet address 10.0.0.10/30
user@C# set fe-1/2/0 unit 0 family iso
user@C# set fe-1/2/1 unit 0 family inet address 10.0.0.13/30
user@C# set fe-1/2/1 unit 0 family iso
2. Configure IBGP.
3. Configure the Edu-to-isis policy, which redistributes the Edu-tagged BGP routes
learned from Device E and applies a metric of 63.
[edit policy-options]
user@C# set policy-statement Edu-to-isis term 1 from protocol bgp
user@C# set policy-statement Edu-to-isis term 1 from community Edu
user@C# set policy-statement Edu-to-isis term 1 then metric 63
user@C# set policy-statement Edu-to-isis term 1 then accept
user@C# set community Edu members 2:5
Without this policy, Device E would not have connectivity to the networks in AS 1.
[edit routing-options]
user@C# set router-id 192.168.0.3
user@C# set autonomous-system 1
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
}
}
then accept;
}
}
community Edu members 2:5;
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the BGP routes from Device E are communicated on the IS-IS network in AS
1.
Action From operational mode, enter the show route protocol isis command.
Meaning As expected, the 10.2.0.0/16 and 10.3.0.0/16 routes are in Device D’s routing table as
IS-IS external routes with a metric of 73. If Device C had not added 63 to the metric,
Device D would have a metric of 10 for these routes.
To control the transmission of routes into IS-IS, or to control transmission of IS-IS routes
between different IS-IS levels, you can tag routes with certain attributes. IS-IS routes
can carry these attributes, which the routing policies can use to export and import routes
between different IS-IS levels. A sub-TLV to the IP prefix TLV is used to carry the tag or
attribute on the routes.
NOTE: Route tagging does not work when IS-IS traffic engineering is disabled.
protocols {
isis {
export tag-lo0;
}
}
policy-options {
policy-statement tag-lo0 {
from {
interface lo0.0;
}
then {
accept;
tag 200;
}
}
}
You can verify that the tag has been correctly applied by using the show isis database
extensive command. In the command output, look for the Administrative tag field.
After verifying that the routes are tagged correctly, you can apply a route leaking policy
to match against the presence of administrative tags, rather than specifying a list of route
filters.
protocols {
isis {
export leak-tagged-L2-to-L1;
}
}
policy-options {
policy-statement leak-tagged-L2-to-L1 {
from {
tag 200;
protocol isis;
level 2;
}
to {
protocol isis;
level 1;
}
then accept;
}
}
Related • Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1 Area on
Documentation page 96
In a network with a large number of IS-IS routes, it can be useful to control the order in
which routes are updated in response to a network topology change. This example shows
how to define a routing policy to prioritize some IS-IS routes over others. In the event of
an IS-IS topology change, high priority prefixes are updated in the routing table first,
followed by medium and then low priority prefixes. Internet Service Providers (ISP) can
use this feature to ensure faster convergence for important customers.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
Beginning with Junos OS Release 17.1, you can prioritize or reject IS-IS routes that are
installed in the routing table. Use the reject policy option to reject routes from a specific
prefix or routes marked with a particular tag.
You can prioritize IS-IS routes for better convergence and to provide differentiated services.
In a network with a large number of IGP prefixes with BGP Layer 3 VPN or label-based
psuedowire service established on top of some IGP prefixes, it is important to control the
order in which routes get updated in the forwarding table. You can configure an import
policy and use a route tag or filter the routes based on their prefix before setting a priority
of high, medium, or low as per your network requirements. The IS-IS protocol downloads
routes to the rpd routing table based on the configured priority. If you do not configure
an import policy, all routes are set to a medium priority by default.
An IS-IS import policy can be used to set priority or to filter IS-IS external routes based
on the following criteria:
Route Tag—Use tag policy option to assign a specific priority for prefixes that contain a
particular tag.
CAUTION: You might see an increase in micro loop traffic as order of route
download changes.
In Figure 12 on page 116, Router R1 is connected to Router R3 via Router R2. We need to
set a high priority to a route to Router R3 to ensure quicker convergence. An import routing
policy is configured on Router R1, which sets a high priority to routes connecting to Router
R3. Routes matching 203.0.113.3/32 are installed first because they have a priority of
high. LDP imports routes and their configure priority from IS-IS. This route is restored first
in the event of a network topology change.
AS 64496
ge-1/0/1 ge-0/0/1 ge-0/0/7 ge-2/0/3
192.0.2.1/24 192.0.2.2/24 198.0.2.1/24 198.0.2.2/24
lo0:
R1 203.0.113.1
g043570
R2
203.0.113.2
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Configuring Router R1
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
NOTE: Repeat this procedure for other routers after modifying the appropriate
interface names, addresses, and other parameters.
[edit interfaces]
user@R1# set ge-1/0/1 unit 0 description R1->R2
user@R1# set ge-1/0/1 unit 0 family inet address 192.0.2.1/24
user@R1# set ge-1/0/1 unit 0 family iso
user@R1# set ge-1/0/1 unit 0 family inet6 address 2001:db8:1:2::1/64
user@R1# set ge-1/0/1 unit 0 family mpls
[edit interfaces]
user@R1# set lo0 unit 0 family inet address 203.0.113.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0103.0000.0010.00
user@R1# set lo0 unit 0 family inet6 address 2001:db8:1:1::1/128
user@R1# set lo0 unit 0 family mpls
3. Configure MPLS.
[edit protocols]
user@R1# set mpls ipv6-tunneling
user@R1# set mpls interface ge-5/0/9.0
user@R1# set mpls interface ge-1/0/1.0
[edit protocols]
user@R1# set isis level 1 disable
user@R1# set isis interface ge-1/0/1.0
user@R1# set isis interface ge-5/0/9.0
[edit protocols]
user@R1# set ldp interface ge-1/0/1.0
user@R1# set ldp interface ge-5/0/9.0
user@R1# set ldp interface lo0.0
[edit policy-options]
user@R1# set policy-statement test_rf term t1 from route-filter 203.0.113.3/32 exact
user@R1# set policy-statement test_rf term t1 then priority high
[edit routing--options]
user@R1# set routing-options router-id 203.0.113.1
user@R1# set routing-options autonomous-system 64496
Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options and show routing-options commands. If the
output does not display the intended configuration, repeat the instructions in this example
to correct the configuration.
[edit]
user@R1> show interfaces
ge-1/0/1 {
unit 0 {
family inet {
address 192.0.2.1/24;
}
family iso;
family inet6 {
address 2001:db8:1:2::1/64;
}
family mpls;
}
}
ge-5/0/9 {
unit 0 {
family inet {
address 192.0.2.1/24;
}
family iso;
family inet6 {
address 2001:db8:1:1::1/64;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 203.0.113.1/32;
}
family iso {
address 49.0002.0103.0000.0010.00;
}
family inet6 {
address 2001:db8:1:1::1/128;
}
family mpls;
}
}
[edit]
user@R1> show protocols
mpls {
ipv6-tunneling;
interface ge-5/0/9.0;
interface ge-1/0/1.0;
}
isis {
import test_rf;
level 1 disable;
interface ge-1/0/1.0;
interface ge-5/0/9.0;
interface lo0.0 {
passive;
}
}
ldp {
interface ge-1/0/1.0;
interface ge-5/0/9.0;
interface lo0.0;
}
[edit]
user@R1> show routing-options
router-id 203.0.113.1;
autonomous-system 64496;
}
then priority high;
}
}
Verification
Purpose Verify that LDP has inherits route 203.0.113.3 from IS-IS protocol.
Action From operational mode, run the show route extensive command on Router R1.
Age: 59 Metric: 1
Validation State: unverified
Task: LDP
Announcement bits (1): 2-Resolve tree 1
AS path: I
Secondary Tables: inet6.3
Meaning The output shows that LDP inherits the route 203.0.113.3, with priority high from IS-IS.
Purpose Verify that the priority is set for route 203.0.113.3 in IS-IS.
Meaning The routes are displayed in the order of the set priorities. Route 203.0.113.3, which is set
with high priority is displayed at the very top followed by routes with medium or low
priority.
Related •
Documentation
The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. Hello packets are sent at a specified, regular interval. A
neighbor failure is detected when the routing device stops receiving a reply after a specified
interval. BFD works with a wide variety of network environments and topologies. The
failure detection timers for BFD have shorter time limits than the failure detection
mechanisms of IS-IS, providing faster detection.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower.
For example, the timers can adapt to a higher value if the adjacency fails, or a neighbor
can negotiate a higher value for a timer than the configured value. The timers adapt to
a higher value when a BFD session flap occurs more than three times in a span of 15
seconds. A back-off algorithm increases the receive (RX) interval by two if the local BFD
instance is the reason for the session flap. The transmission (TX) interval is increased by
two if the remote BFD instance is the reason for the session flap.
You can use the clear bfd adaptation command to return BFD interval timers to their
configured values. The clear bfd adaptation command is hitless, meaning that the
command does not affect traffic flow on the routing device.
NOTE: Starting with Junos OS Release 16.1R1, you can configure IS-IS BFD
sessions for IPv6 by including the bfd-liveness-detection statement at the
[edit protocols isis interface interface-name family inet|inet6] hierarchy level.
• For interfaces that support both IPv4 and IPv6 routing, the
bfd-liveness-detection statement must be configured separately for each
inet family.
• BFD over IPv6 link local address is currently not distributed because IS-IS
uses link local addresses for forming adjacencies.
• BFD sessions over IPv6 must not have the same aggressive detection
intervals as IPv4 sessions.
• BFD IPv6 sessions with detection intervals less than 2.5 seconds are
currently not supported when nonstop active routing (NSR) is enabled.
To detect failures in the network, the set of statements in Table 3 on page 128 are used
in the configuration.
Statement Description
minimum-interval Specify the minimum transmit and receive intervals for failure detection.
milliseconds
This value represents the minimum interval at which the local router transmits hellos packets as
well as the minimum interval at which the router expects to receive a reply from a neighbor with
which it has established a BFD session. You can configure a number from 1 through
255,000 milliseconds. You can also specify the minimum transmit and receive intervals separately.
NOTE: BFD is an intensive protocol that consumes system resources. Specifying a minimum interval
for BFD less than 100 ms for Routing Engine-based sessions and 10 ms for distributed BFD sessions
can cause undesired BFD flapping.
• For large-scale network deployments with a large number of BFD sessions, specify a minimum
interval of 300 ms for Routing Engine-based sessions and 100 ms for distributed BFD sessions.
• For very large-scale network deployments with a large number of BFD sessions, please contact
Juniper Networks customer support for more information.
• For BFD sessions to remain up during a Routing Engine switchover event when nonstop active
routing (NSR) is configured, specify a minimum interval of 2500 ms for Routing Engine-based
sessions. For distributed BFD sessions with nonstop active routing configured, the minimum
interval recommendations are unchanged and depend only on your network deployment.
minimum-receive-interval Specify only the minimum receive interval for failure detection.
milliseconds
This value represents the minimum interval at which the local router expects to receive a reply
from a neighbor with which it has established a BFD session. You can configure a number from 1
through 255,000 milliseconds.
Statement Description
multiplier number Specify the number of hello packets not received by the neighbor that causes the originating
interface to be declared down.
The default is 3, and you can configure a value from 1 through 225.
In Junos OS Release 9.0 and later, you can specify that the BFD sessions not adapt to changing
network conditions.
NOTE: We recommend that you not disable BFD adaptation unless it is preferable not to have
BFD adaptation enabled in your network.
NOTE: The threshold value must be greater than the minimum transmit interval multiplied by the
multiplier number.
NOTE: You can trace BFD operations by including the traceoptions statement
at the [edit protocols bfd] hierarchy level.
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
This example describes how to configure the Bidirectional Forwarding Detection (BFD)
protocol to detect failures in an IS-IS network.
NOTE: BFD is not supported with ISIS for IPV6 on QFX10000 series switches.
Requirements
Before you begin, configure IS-IS on both routers. See “Example: Configuring IS-IS” on
page 14 for information about the required IS-IS configuration.
Overview
This example shows two routers connected to each other. A loopback interface is
configured on each router. IS-IS and BFD protocols are configured on both routers.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Router R1
Router R2
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.
NOTE: To simply configure BFD for IS-IS, only the minimum-interval statement
is required. The BFD protocol selects default parameters for all the other
configuration statements when you use the bfd-liveness-detection statement
without specifying any parameters.
NOTE: You can change parameters at any time without stopping or restarting
the existing session. BFD automatically adjusts to the new parameter value.
However, no changes to BFD parameters take place until the values
resynchronize with each BFD peer.
2. Configure the threshold for the adaptation of the detection time, which must be
greater than the multiplier number multiplied by the minimum interval.
3. Configure the minimum transmit and receive intervals for failure detection.
6. Configure the threshold for the transmit interval, which must be greater than the
minimum transmit interval.
8. Configure the multiplier number, which is the number of hello packets not received
by the neighbor that causes the originating interface to be declared down.
Results
From configuration mode, confirm your configuration by issuing the show protocols isis
interface command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
bfd-liveness-detection {
version automatic;
minimum-interval 2;
minimum-receive-interval 1;
multiplier 2;
no-adaptation;
transmit-interval {
minimum-interval 1;
threshold 3;
}
detection-time {
threshold 5;
}
}
...
bfd-liveness-detection {
version automatic;
minimum-interval 3;
minimum-receive-interval 1;
multiplier 2;
no-adaptation;
transmit-interval {
minimum-interval 1;
threshold 4;
}
detection-time {
threshold 6;
}
}
...
Verification
Confirm that the configuration is working properly.
Purpose Make sure that Routers R1 and R2 are connected to each other.
Action Ping the other router to check the connectivity between the two routers as per the network
topology.
Purpose Make sure that the IS-IS instance is running on both routers.
Action Use the show isis database statement to check if the IS-IS instance is running on both
routers, R1 and R2.
Purpose Make sure that the BFD instance is running on both routers, R1 and R2.
Action Use the show bfd session detail statement to check if BFD instance is running on the
routers.
Detect Transmit
Address State Interface Time Interval Multiplier
10.0.0.2 Up so-0/0/0 2.000 1.000 2
Client ISIS R2, TX interval 0.001, RX interval 0.001
Client ISIS R1, TX interval 0.001, RX interval 0.001
Session down time 00:00:00, previous up time 00:00:15
Local diagnostic NbrSignal, remote diagnostic NbrSignal
1 sessions, 2 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Detect Transmit
Address State Interface Time Interval Multiplier
10.0.0.1 Up so-0/0/0 2.000 1.000 2
Client ISIS R2, TX interval 0.001, RX interval 0.001
Session down time 00:00:00, previous up time 00:00:05
Local diagnostic NbrSignal, remote diagnostic NbrSignal
Remote state AdminDown, version 1
Router 2, routing table index 15
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning BFD is configured on Routers R1 and R2 for detecting failures in the IS-IS network.
• keyed-md5—Keyed Message Digest 5 hash algorithm for sessions with transmit and
receive intervals greater than 100 ms. To authenticate the BFD session, keyed MD5
uses one or more secret keys (generated by the algorithm) and a sequence number
that is updated periodically. With this method, packets are accepted at the receiving
end of the session if one of the keys matches and the sequence number is greater than
or equal to the last sequence number received. Although more secure than a simple
password, this method is vulnerable to replay attacks. Increasing the rate at which the
sequence number is updated can reduce this risk.
• keyed-sha-1—Keyed Secure Hash Algorithm I for sessions with transmit and receive
intervals greater than 100 ms. To authenticate the BFD session, keyed SHA uses one
or more secret keys (generated by the algorithm) and a sequence number that is
updated periodically. The key is not carried within the packets. With this method,
packets are accepted at the receiving end of the session if one of the keys matches
and the sequence number is greater than the last sequence number received.
The authentication keychain contains one or more keychains. Each keychain contains
one or more keys. Each key holds the secret data and the time at which the key becomes
valid. The algorithm and keychain must be configured on both ends of the BFD session,
and they must match. Any mismatch in configuration prevents the BFD session from
being created.
BFD allows multiple clients per session, and each client can have its own keychain and
algorithm defined. To avoid confusion, we recommend specifying only one security
authentication keychain.
Beginning with Junos OS Release 9.6, you can configure authentication for BFD sessions
running over IS-IS. Routing instances are also supported. Only three steps are needed to
configure authentication on a BFD session:
The following sections provide instructions for configuring and viewing BFD authentication
on IS-IS:
[edit]
user@host# set protocols isis interface if1-isis bfd-liveness-detection authentication
algorithm keyed-sha-1
2. Specify the keychain to be used to associate BFD sessions on the specified IS-IS route
or routing instance with the unique security authentication keychain attributes.
This should match the keychain name configured at the [edit security authentication
key-chains] hierarchy level.
[edit]
user@host# set protocols isis interface if1-isis bfd-liveness-detection authentication
keychain bfd-isis
• At least one key, a unique integer between 0 and 63. Creating multiple keys allows
multiple clients to use the BFD session.
[edit security]
user@host# set authentication-key-chains key-chain bfd-sr4 key 53 secret
$9$ggaJDmPQ6/tJgF/AtREVsyPsnCtUHm start-time 2009-06-14.10:00:00
[edit]
user@host> set protocols isis interface if1-isis bfd-liveness-detection authentication
loose-check
5. (Optional) View your configuration using the show bfd session detail or show bfd
session extensive command.
6. Repeat these steps to configure the other end of the BFD session.
The following example shows BFD authentication configured for the if1-isis interface. It
specifies the keyed SHA-1 authentication algorithm and a keychain name of bfd-isis. The
authentication keychain is configured with two keys. Key 1 contains the secret data
“$9$ggaJDmPQ6/tJgF/AtREVsyPsnCtUHm” and a start time of June 1, 2009, at 9:46:02
AM PST. Key 2 contains the secret data “$9$a5jiKW9l.reP38ny.TszF2/9” and a start time
of June 1, 2009, at 3:29:20 PM PST.
If you commit these updates to your configuration, you see output similar to the following.
In the output for the show bfd sessions detail command, Authenticate is displayed to
indicate that BFD authentication is configured. For more information about the
configuration, use the show bfd sessions extensive command. The output for this
command provides the keychain name, the authentication algorithm and mode for each
client in the session, and the overall BFD authentication configuration status, keychain
name, and authentication algorithm and mode.
Detect Transmit
1 sessions, 1 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
1 sessions, 1 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
Requirements
Before you begin, configure IS-IS on both routers. See “Example: Configuring IS-IS” on
page 14 for information about the required IS-IS configuration.
Overview
In this example, a BFD authentication keychain is configured with meticulous keyed MD5
authentication.
R1 R2
lo0:192.168.0.1 lo0:192.168.0.2
g041282
“CLI Quick Configuration” on page 142 shows the configuration for both of the devices in
Figure 14 on page 142. The section “Step-by-Step Procedure” on page 143 describes the
steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
2. Enable BFD.
Results From configuration mode, confirm your configuration by entering the show protocols and
show security commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show bfd session extensive command.
Detect Transmit
Address State Interface Time Interval Multiplier
10.0.0.2 Down ge-1/2/0.0 0.300 1.000 3
Client ISIS L1, TX interval 0.100, RX interval 0.100, Authenticate
keychain secret123, algo meticulous-keyed-md5, mode strict
Client ISIS L2, TX interval 0.100, RX interval 0.100, Authenticate
keychain secret123, algo meticulous-keyed-md5, mode strict
Session down time 00:35:13, previous up time 00:12:17
1 sessions, 2 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 10.0 pps
Meaning The output shows that BFD authentication is enabled on IS-IS Level 1 and Level 2.
IS-IS supports flood-group. This feature limits link-state packet data unit (PDU) flooding
over IS-IS interfaces.
A link-state packet (LSP) that is not self-originated will be flooded only through the
interface belonging to the flood group that has the configured area ID in the LSP. This
helps minimize the routes and topology information, thus ensuring optimal convergence.
You can segregate both Level 1 and Level 2 IS-IS routers into flood groups by using area
IDs as tags to identify a flood group. Configure interfaces with specific area IDs to modify
the flooding behavior as per your requirements. To enable IS-IS flood group, include the
flood-group flood-group-area-ID statement at the [edit protocols isis interface] hierarchy
level.
Requirements
This example uses the following hardware and software components:
2. Configure IS-IS interfaces with specific area IDs to modify the flood behavior as per
your requirements.
Overview
Starting with Junos OS Release 16.2, IS-IS has support for flood-group.
Topology
ge-0/0/1 ge-0/0/1
ge-0/0/0 ge-0/0/0
ge-0/0/8 ge-0/0/8
ge-0/0/2 ge-0/0/2
R1 R2 R3 R4
g043541
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
2. Following is the output before configuring flood-group on R2. You will see
the link-state packets (LSPs) of R1, R2, R3 and R4.
From operational mode, run the show isis database command on router R1.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit protocols]
user@R1# deactivate protocols isis
user@R1# commit
[edit protocols]
user@R2# deactivate protocols isis
user@R2# commit
2. Configure flood-group on interface of router R2: set protocol isis interface interface
flood-group flood-group-area-ID
[edit protocols]
user@R2# set protocols isis interface ge-0/0/8.0 flood-group 49.0001
user@R2# commit
3. Activate protocol IS-IS on routers R1 and R2 and wait until the adjacency comes
up.
[edit protocols]
user@R1# activate protocols isis
user@R1# commit
[edit protocols]
user@R2# activate protocols isis
user@R2# commit
Verification
Action NOTE: Following is the output after configuring flood-group on R2. show isis
database on router R1 will show LSPs from router R1 and router R2 only.
flood-group is applicable to non self-originated LSPs only.
From operational mode, run the show isis database command on router R1.
Most multicast routing protocols perform a reverse-path forwarding (RPF) check on the
source of multicast data packets. If a packet comes in on the interface that is used to
send data to the source, the packet is accepted and forwarded to one or more
downstream interfaces. Otherwise, the packet is discarded and a notification is sent to
the multicast routing protocol running on the interface.
In certain instances, the unicast routing table used for the RPF check is also the table
used for forwarding unicast data packets. Thus, unicast and multicast routing are
congruent. In other cases, where it is preferred that multicast routing be independent of
unicast routing, the multicast routing protocols are configured to perform the RPF check
using an alternate unicast routing table inet.2.
You can configure IS-IS to calculate an alternate IPv4 multicast topology, in addition to
the normal IPv4 unicast topology, and add the corresponding routes to inet.2. The IS-IS
interface metrics for the multicast topology can be configured independently of the
unicast metrics. You can also selectively disable interfaces from participating in the
multicast topology while continuing to participate in the regular unicast topology. This
enables you to exercise control over the paths that multicast data takes through a network
so that it is independent of unicast data paths. You can also configure IS-IS to calculate
an alternate IPv6 multicast topology, in addition to the normal IPv6 unicast topology.
NOTE: IS-IS only starts advertising the routes when the interface routes are
in inet.2.
Table 4 on page 154 lists the various IPv4 statements you can use to configure IS-IS
topologies.
Statement Description
ipv4-multicast-metric number Configures the multicast metric for an alternate IPv4 multicast topology.
Table 5 on page 154 lists the various IPv6 statements you can use to configure IS-IS
topologies.
Statement Description
ipv6-multicast-metric number Configures the multicast metric for an alternate IPv6 multicast topology.
ipv6-unicast-metric number Configures the unicast metric for an alternate IPv6 multicast topology.
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
This example shows how to configure a multicast topology for an IS-IS network.
Requirements
Before you begin, configure IS-IS on all routers. See “Example: Configuring IS-IS” on
page 14 for information about the required IS-IS configuration.
Overview
This example shows an IS-IS multicast topology configuration. Three routers are
connected to each other. A loopback interface is configured on each router.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Router R1
Router R2
Router R3
The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Enable the multicast topology for IS-IS by using the ipv4-multicast statement.
Router R1
Router R2
Router R3
Router R1
Router R2
Router R3
[edit]
user@host# commit
Results From configuration mode, confirm your configuration by using the show protocols isis
statement. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
Router R1
traceoptions {
file isis size 5m world-readable;
flag error;
}
topologies ipv4-multicast;
interface so-0/0/0 {
level 1 {
metric 15;
ipv4-multicast-metric 18;
}
level 2 {
metric 20;
ipv4-multicast-metric 14;
}
}
interface so-1/0/0 {
level 1 {
metric 13;
ipv4-multicast-metric 12;
}
level 2 {
metric 29;
ipv4-multicast-metric 23;
}
}
interface fxp0.0 {
disable;
}
Router R2
traceoptions {
file isis size 5m world-readable;
flag error;
}
topologies ipv4-multicast;
interface so-0/0/0 {
level 1 {
metric 13;
ipv4-multicast-metric 12;
}
level 2 {
metric 29;
ipv4-multicast-metric 23;
}
}
interface so-1/0/0 {
level 1 {
metric 14;
ipv4-multicast-metric 18;
}
level 2 {
metric 32;
ipv4-multicast-metric 26;
}
}
interface fxp0.0 {
disable;
}
Router R3
traceoptions {
file isis size 5m world-readable;
flag error;
}
topologies ipv4-multicast;
interface so-0/0/0 {
level 1 {
metric 19;
ipv4-multicast-metric 11;
}
level 2 {
metric 27;
ipv4-multicast-metric 21;
}
}
interface so-1/0/0 {
level 1 {
metric 16;
ipv4-multicast-metric 26;
}
level 2 {
metric 30;
ipv4-multicast-metric 20;
}
}
interface fxp0.0 {
disable;
}
Verification
Confirm that the configuration is working properly.
• Verifying the Connection Between Routers R1, R2, and R3 on page 160
• Verifying That IS-IS Is Configured on page 162
• Verifying the Configured Multicast Metric Values on page 164
• Verifying the Configuration of the Multicast Topology on page 165
Purpose Make sure that Routers R1, R2, and R3 are connected to each other.
Action Ping the other two routers from any router, to check the connectivity between the three
routers as per the network topology.
^C
--- 10.0.1.9 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.300/1.394/1.499/0.071 ms
Meaning Routers R1, R2, and R3 have a peer relationship with each other.
Purpose Make sure that the IS-IS instance is running on Routers R1, R2, and R3, and that they are
adjacent to each other.
Action Use the show isis adjacency detail command to check the adjacency between the routers.
Router R1
R2
Interface: so-0/0/0, Level: 1, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:23:59 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.10
R2
Interface: so-0/0/0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:23:58 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.10
R3
Interface: so-1/0/0, Level: 1, State: Up, Expires in 7 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:24:20 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.10
R3
Interface: so-1/0/0, Level: 2, State: Up, Expires in 6 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:24:20 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.10
Router R2
R1
Interface: so-0/0/0, Level: 1, State: Up, Expires in 20 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:50 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.9
R1
Interface: so-0/0/0, Level: 2, State: Up, Expires in 26 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:50 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.9
R3
Interface: so-1/0/0, Level: 1, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:22 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.10
R3
Interface: so-1/0/0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:22 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.10
Router R3
R2
Interface: so-0/0/0, Level: 1, State: Up, Expires in 18 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:09 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.9
R2
Interface: so-0/0/0, Level: 2, State: Up, Expires in 22 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:09 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.9
R1
Interface: so-1/0/0, Level: 1, State: Up, Expires in 21 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:59 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
R1
Interface: so-1/0/0, Level: 2, State: Up, Expires in 19 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:59 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.9
Meaning IS-IS is configured on Routers R1, R2, and R3, and they are adjacent to each other.
Purpose Make sure that the SPF calculations are accurate as per the configured multicast metric
values on Routers R1, R2, and R3.
Action Use the show isis spf results command to check the SPF calculations for the network.
Router R1
...
IPV4 Multicast IS-IS level 1 SPF results:
Node Metric Interface NH Via SNPA
R3.03 28 so-1/0/0 IPV4 R3 0:1b:c0:86:54:bd
R2.00 18 so-0/0/0 IPV4 R2 0:1b:c0:86:54:bd
R3.00 17 so-1/0/0 IPV4 R3 0:1b:c0:86:54:bd
R1.00 0
4 nodes
Router R2
...
IPV4 Multicast IS-IS level 1 SPF results:
Node Metric Interface NH Via SNPA
R3.02 29 so-0/0/0 IPV4 R1 0:1b:c0:86:54:bc
R3.00 18 so-1/0/0 IPV4 R3 0:1b:c0:86:54:bd
R1.00 12 so-0/0/0 IPV4 R1 0:1b:c0:86:54:bc
R2.02 12
R2.00 0
5 nodes
Router R3
...
IPV4 Multicast IS-IS level 1 SPF results:
Node Metric Interface NH Via SNPA
R3.02 26
R1.00 23 so-0/0/0 IPV4 R2 0:1b:c0:86:54:bc
R2.02 23 so-0/0/0 IPV4 R2 0:1b:c0:86:54:bc
R2.00 11 so-0/0/0 IPV4 R2 0:1b:c0:86:54:bc
R3.03 11
R3.00 0
6 nodes
Meaning The configured multicast metric values are used in SPF calculations for the IS-IS network.
Purpose Make sure that the multicast topology is configured on Routers R1, R2, and R3.
Action Use the show isis database detail command to verify the multicast topology configuration
on the routers.
Router R1
Router R2
Router R3
Service providers and enterprises are faced with growing their networks using IPv6, while
continuing to serve IPv4 customers.
Increasingly, the public side of network address translation (NAT) devices is IPv6 rather
than IPv4. Service providers cannot continue giving customers globally routable IPv4
addresses, they cannot get new globally routable IPv4 addresses for expanding their
own networks, and yet they must continue to serve both IPv4 customers and new
customers, all of whom are primarily trying to reach IPv4 destinations.
IPv4 and IPv6 must coexist for some number of years, and their coexistence must be
transparent to end users. If an IPv4-to-IPv6 transition is successful, end users should not
even notice it.
A dual-stack device is a device with network interfaces that can originate and understand
both IPv4 and IPv6 packets.
The transition is driven by DNS. If a dual-stacked device queries the name of a destination
and DNS gives it an IPv4 address (a DNS A Record), it sends IPv4 packets. If DNS responds
with an IPv6 address (a DNS AAAA Record), it sends IPv6 packets.
Keep in mind that if you are going to dual stack all of your network devices, the interfaces
need both an IPv6 and an IPv4 address. This raises the issue that the Internet has run
out of IPv4 addresses, which is the main reason IPv6 is needed in the first place. If you
do not have an abundant supply of IPv4 addresses to apply to your devices, you can still
use dual stacking, but you will need to conserve your supply of IPv4 addresses by using
network address translation (NAT). Building dual-stacked networks with a mix of global
IPv6 addresses and NAT-ed IPv4 addresses is quite feasible. Some specific solutions
include carrier-grade NAT (CGN), NAT44(4), NAT64, NAT464, and dual-stack lite.
Table 6 on page 171 describes at a high level how to pick a network addressing technique.
In reality, a complete solution might include a set of techniques to satisfy multiple service
needs. It is important to understand the backbone technology being used on the network
and also to know if the provider has control over the access customer premises equipment
(CPE).
• Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses on
page 171
Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses
This example shows how to configure IPv4 and IPv6 dual stacking in IS-IS.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
You can use IPv4 and IPv6 dual stacking to begin your migration from IPv4 to IPv6 by
implementing IPv6 alongside IPv4 in your existing networks. This allows you to implement
IPv6 so that you can provide the same services over IPv6—for example, video, voice,
high-quality data—that you currently provide in your IPv4 networks. You can then perform
incremental upgrades to IPv6 and avoid service disruptions while migrating from IPv4 to
IPv6.
Unlike RIP and OSPF, IS-IS does not require a distinct protocol or a new version to support
IPv6. Because IS-IS uses ISO addresses, the configuration for IPv6 and IPv4 is identical
in the Junos OS implementation of IS-IS. For IS-IS to carry IPv6 routes, you only need to
add IPv6 addresses to IS-IS enabled interfaces or include other IPv6 routes in your IS-IS
export policy.
The only explicit configuration needed in IS-IS with regard to IPv6 is if you want to disable
it. Alternatively, you can disable IPv4 routing and use IS-IS with IPv6 only. An example
of each is provided here:
IPv6
IPv4
fe-1/2/0 R1
.1 fe-1/2/1
.17
10.0.0.0/30 2001:db8:0:1::/64
10.0.0.16/30
fe-1/2/0 .2 fe-1/2/0
2001:db8:0:5::/64
.18
R2 R3
g041305
“CLI Quick Configuration” on page 172 shows the configuration for all of the devices in
Figure 17 on page 172. The section “Step-by-Step Procedure” on page 173 describes the
steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the Junos OS CLI User Guide.
1. Configure the interfaces, including both IPv4 and IPv6 addresses on each interface.
Optionally, include the eui-64 statement to automatically generate the host number
portion of interface addresses.
[edit interfaces]
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set fe-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
user@R1# set fe-1/2/1 unit 0 family inet address 10.0.0.17/30
user@R1# set fe-1/2/1 unit 0 family iso
user@R1# set fe-1/2/1 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
user@R1# set lo0 unit 0 family inet6 address 2001:db8::1/128
Results From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show isis adjacency detail command.
R2
Interface: fe-1/2/0.0, Level: 3, State: Up, Expires in 24 secs
Priority: 0, Up/Down transitions: 1, Last transition: 18:34:08 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.2
IPv6 addresses: fe80::2a0:a514:0:24c
R3
Interface: fe-1/2/1.0, Level: 3, State: Up, Expires in 21 secs
Priority: 0, Up/Down transitions: 1, Last transition: 18:33:41 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.18
IPv6 addresses: fe80::2a0:a514:0:124c
Meaning As expected, the output shows that the two neighbors support both IPv4 and IPv6. The
IPv4 address and the IPv6 link-local address are also shown.
Purpose Make sure that you can ping the remote IPv6 interfaces.
Action From operational mode, enter the ping command to ping from Device R2 to Device R3.
If you use EUI-64 addressing as shown in the example, the host portion of the IPv6
addresses is assigned automatically. To determine what addresses are assigned, use
the show interfaces terse command on Device R3.
2. From Device R2, ping the Device R3 fe-1/2/0.0 IPv6 interface address and the lo0.0
IPv6 interface address.
Meaning This test confirms that IS-IS has learned the IPv6 routes.
Purpose Verify that the expected routes are in the IPv6 routing table.
Meaning The output shows the IPv6 interface routes (direct and local) and the IPv6 routes learned
through IS-IS.
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
You can configure IS-IS to calculate an alternate IPv6 unicast topology, in addition to
the normal IPv4 unicast topology, and add the corresponding routes to inet6.0. The IS-IS
interface metrics for the IPv4 topology can be configured independently of the IPv6
metrics. You can also selectively disable interfaces from participating in the IPv6 topology
while continuing to participate in the IPv4 topology. This enables you to exercise control
over the paths that unicast data takes through a network.
A topology is the set of joined nodes. IS-IS evaluates all the paths in a single topology
for each IS-IS level and uses the shortest-path-first (SPF) algorithm to determine the
best path among all the feasible paths. Topology discovery and SPF calculation is
The additional CPU load associated with multiple runs of the SPF algorithm is generally
not an issue with the processing power available on today’s routing device control planes.
The multitopology extensions alter existing type, length, and value (TLV) tuples by adding
a topology ID. Each routing device in a given topology maintains its adjacencies and runs
a per-topology SPF calculation.
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
This example shows how to configure IS-IS to calculate an alternate IPv6 unicast topology,
in addition to the normal IPv4 unicast topology.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
This example focuses on IPv4 and IPv6 unicast topologies. The IS-IS interface metrics
for the IPv4 topology can be configured independently of the IPv6 metrics. You can also
selectively disable interfaces from participating in the IPv6 topology while continuing to
participate in the IPv4 topology. This enables you to exercise control over the paths that
unicast data takes through a network.
To enable an IPv6 unicast topology for IS-IS, include the ipv6-unicast statement:
isis {
topologies {
ipv6-unicast;
}
}
To configure a metric for the IPv6 unicast topology, include the ipv6-unicast-metric
statement:
isis {
interface interface-name {
level level-number {
ipv6-unicast-metric number;
}
}
}
To exclude an interface from the IPv6 unicast topologies for IS-IS, include the
no-ipv6-unicast statement:
isis {
interface interface-name {
no-ipv6-unicast;
}
}
Figure 18 on page 180 shows the topology used in this example. The black lines indicate
link membership in the IPv6 topology. The gray lines indicate membership to the IPv4
topology. Using regular TLVs, it would not be possible to build multiple topologies and
run an SPF calculation based on them. The multitopology extensions describe an
extension to carry the set of supported protocols in the hello packet. After activating
multitopology routing support on a link, the link carries all the topologies that the
underlying circuit is able to relay.
so-1/2/0 R1
.1 so-1/2/2
.13 .17
10.0.0.0/30 2001:db8:0:1::/64
10.0.0.16/30
so-1/2/0 .2 so-1/2/0
2001:db8:0:5::/64
.18
R2 R3
g041296
IPv6
IPv4
“CLI Quick Configuration” on page 180 shows the configuration for all of the devices in
Figure 18 on page 180. The section “Step-by-Step Procedure” on page 182 describes the
steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R1# set so-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set so-1/2/0 unit 0 family iso
user@R1# set so-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
user@R1# set so-1/2/1 unit 0 family inet address 10.0.0.13/30
user@R1# set so-1/2/1 unit 0 family iso
user@R1# set so-1/2/2 unit 0 family inet address 10.0.0.17/30
user@R1# set so-1/2/2 unit 0 family iso
user@R1# set so-1/2/2 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
user@R1# set lo0 unit 0 family inet6 address 2001:db8::1/128
If you do not want to run multitopology IS-IS routing for IPv6 on a given interface,
you can disable multitopology routing by including the no-ipv6-unicast statement
in the IS-IS interface configuration.
Results From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
so-1/2/2 {
unit 0 {
family inet {
address 10.0.0.17/30;
}
family iso;
family inet6 {
address 2001:db8:0:1::/64 {
eui-64;
}
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
family inet6 {
address 2001:db8::1/128;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show isis adjacency detail command.
R2
Interface: so-1/2/0.0, Level: 3, State: Up, Expires in 24 secs
Priority: 0, Up/Down transitions: 1, Last transition: 05:28:16 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast, IPV6-Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.2
IPv6 addresses: fe80::2a0:a514:0:24c
R5
Interface: so-1/2/1.0, Level: 3, State: Up, Expires in 21 secs
Priority: 0, Up/Down transitions: 1, Last transition: 05:27:47 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.14
R3
Interface: so-1/2/2.0, Level: 3, State: Up, Expires in 22 secs
Priority: 0, Up/Down transitions: 1, Last transition: 05:27:25 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast, IPV6-Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.18
IPv6 addresses: fe80::2a0:a514:0:124c
Meaning As expected, the adjacency with Device R5 only supports the IPv4 unicast topology, while
the adjacencies with Device R2 and Device R3 support both the IPv4 and IPv6 topologies.
Purpose Verify that separate SPF calculations are being run for IPv4 and IPv6.
Action From operational mode, enter the show isis spf brief command.
Meaning As expected, SPF calculations are being performed for IPv4 and IPv6 topologies.
Purpose Verify that the link can be a member of both the IPv4 unicast topology and the IPv6
unicast topology.
[...]
Meaning The IS-IS hello (IIH) packet shows that IPv4 and IPv6 are supported. The hello packet
lists valid IPv4 and IPv6 addresses, and therefore the routing device can create valid
next-hop entries. The supported protocols are listed in the multitopology TLV #229.
Related • Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses on
Documentation page 171
In Junos OS Release 9.5 and later, support for IS-IS loop-free alternate routes enables
IP fast-reroute capability for IS-IS. Junos OS precomputes loop-free backup routes for
all IS-IS routes. These backup routes are preinstalled in the Packet Forwarding Engine,
which performs a local repair and implements the backup path when the link for a primary
next hop for a particular route is no longer available. With local repair, the Packet
Forwarding Engine can correct a path failure before it receives recomputed paths from
the Routing Engine. Local repair reduces the amount of time needed to reroute traffic to
less than 50 milliseconds. In contrast, global repair can take up to 800 milliseconds to
compute a new route. Local repair and global repair are thus complementary. Local repair
enables traffic to continue to be routed using a backup path until global repair is able to
calculate a new route.
A loop-free path is one that does not forward traffic back through the routing device to
reach a given destination. That is, a neighbor whose shortest path to the destination
traverses the routing device is not used as a backup route to that destination. To determine
loop-free alternate paths for IS-IS routes, Junos OS runs shortest-path-first (SPF)
calculations on each one-hop neighbor. You can enable support for alternate loop-free
routes on any IS-IS interface. Because it is common practice to enable LDP on an interface
for which IS-IS is already enabled, this feature also provides support for LDP
label-switched paths (LSPs).
The level of backup coverage available through IS-IS routes depends on the actual
network topology and is typically less than 100 percent for all destinations on any given
routing device. You can extend backup coverage to include RSVP LSPs.
Junos OS provides two mechanisms for route redundancy for IS-IS through alternate
loop-free routes: link protection and node-link protection. When you enable link protection
or node-link protection on an IS-IS interface, Junos OS creates a single alternate path to
the primary next hop for all destination routes that traverse a protected interface. Link
protection offers per-link traffic protection. Use link protection when you assume that
only a single link might become unavailable but that the neighboring node on the primary
path would still be available through another interface.
In Figure 19 on page 191, Case 2 shows how link protection allows source Router A to
switch to Link B when the primary next hop Link A to destination Router C fails. However,
if Router B fails, Link B also fails, and the protected Link A is lost. If node-link protection
is enabled, Router A is able to switch to Link D on Router D and bypass the failed Router
B altogether. As shown in Case 1, with node-link protection enabled, Router A has a
node-link protection alternate path available through Router D to destination Router C.
That means that if Router B fails, Router A can still reach Router C because the path from
Router A to Link D remains available as an alternate backup path.
Figure 19: Link Protection and Node-Link Protection Comparison for IS-IS Routes
The Junos OS implementation of support for loop-free alternate paths for IS-IS routes
is based on the following standards:
To enable link protection, include the link-protection statement at the [edit protocols isis
interface interface-name] hierarchy level:
[edit]
protocols {
isis {
interface interface-name {
link-protection;
}
}
}
[edit]
protocols {
isis {
interface interface-name {
node-link-protection;
}
}
}
[edit]
protocols {
isis {
interface interface-name {
no-eligible-backup;
}
}
}
[edit]
protocols {
mpls {
label-switched-path lsp-name {
backup;
to ip-address;
}
}
}
When configuring an LSP, you must specify the IP address of the egress routing device
with the to statement. For detailed information about configuring LSPs and RSVP, see
the Junos OS MPLS Applications Library for Routing Devices.
• show isis backup label-switched-path—Displays which MPLS LSPs have been designated
as backup paths and the current status of those LSPs.
• show isis backup spf results—Displays SPF calculations for each neighbor for a given
destination. Indicates whether a specific interface or node has been designated as a
backup path and why. Use the no-coverage option to display only those nodes that do
not have backup coverage.
• show isis backup coverage—Displays the percentage of nodes and prefixes for each
type of address family that is protected.
• show isis interface detail—Displays the type of protection (link or node-link) applied
to each protected interface.
Related • Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 193
Documentation
no longer available. Junos OS calculates a backup path that avoids the primary next-hop
routing device.
Requirements
This example requires Junos OS Release 9.5 or later.
Overview
In this example, core-facing interfaces are enabled for IS-IS Level 2, LDP, and RSVP.
Node-link protection is enabled on all the core-facing interfaces, which means that if the
primary next hop for any destination that traverses the interfaces becomes unavailable,
Junos OS uses a backup link that avoids the next-hop router altogether if necessary.
You also need to configure a routing policy that requires all traffic to use per-packet load
balancing in order to enable Packet Forwarding Engine local repair. With local repair, the
Packet Forwarding Engine can correct a path failure and implement a backup loop-free
alternate route before it receives recomputed paths from the Routing Engine.
PE2 10.255.5.5
CE2 10.255.6.6
On Device PE1, an RSVP LSP is configured as a backup path for IS-IS. Relying on the
shortest-path-first (SPF) calculation of backup paths for one-hop neighbors might result
in less than 100 percent backup coverage for a specific network topology. You can enhance
coverage of IS-IS and LDP LSPs by configuring RSVP LSPs as backup paths. To configure
a specific RSVP LSP as a backup path, include the backup statement at the [edit protocols
mpls label-switched-path lsp-name] hierarchy level.
“CLI Quick Configuration” on page 195 shows the configuration for all of the devices in
Figure 20 on page 194. The section “Step-by-Step Procedure” on page 198 describes the
steps on Device P1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Device CE1 set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces lo0 unit 0 family inet address 10.255.1.1/32
Device PE1 set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.2/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.5/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.21/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.2.2/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0202.00
set protocols rsvp interface fe-1/2/2.0
set protocols rsvp interface fe-1/2/1.0
set protocols rsvp interface lo0.0
set protocols rsvp interface fxp0.0 disable
set protocols mpls label-switched-path to-p2 backup
set protocols mpls label-switched-path to-p2 to 10.255.4.4
set protocols mpls label-switched-path to-p2 ldp-tunneling
set protocols mpls interface fe-1/2/2.0
set protocols mpls interface fe-1/2/1.0
set protocols mpls interface lo0.0
set protocols mpls interface fxp0.0 disable
set protocols bgp group l3vpn type internal
set protocols bgp group l3vpn local-address 10.255.2.2
set protocols bgp group l3vpn family inet-vpn unicast
set protocols bgp group l3vpn peer-as 65534
set protocols bgp group l3vpn local-as 65534
set protocols bgp group l3vpn neighbor 10.255.5.5
set protocols isis spf-options delay 1000
set protocols isis interface all node-link-protection
set protocols isis interface all level 2 metric 10
set protocols isis interface all level 1 disable
set protocols isis interface fxp0.0 disable
set protocols isis interface lo0.0 level 2 metric 0
set protocols ldp deaggregate
set protocols ldp interface fe-1/2/1.0
set protocols ldp interface fe-1/2/2.0
set protocols ldp interface fxp0.0 disable
set protocols ldp interface lo0.0
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-instances VPN-A instance-type vrf
set routing-instances VPN-A interface fe-1/2/0.0
Device PE2 set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.14/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.29/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.5.5/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0505.00
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/2.0
set protocols rsvp interface lo0.0
set protocols rsvp interface fxp0.0 disable
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/2.0
set protocols mpls interface lo0.0
set protocols mpls interface fxp0.0 disable
set protocols bgp group l3vpn type internal
set protocols bgp group l3vpn local-address 10.255.5.5
Device CE2 set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30
set interfaces lo0 unit 0 family inet address 10.255.6.6/32
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@P1# set fe-1/2/0 unit 0 family inet address 10.0.0.6/30
user@P1# set fe-1/2/0 unit 0 family iso
user@P1# set fe-1/2/0 unit 0 family mpls
user@P1# set fe-1/2/1 unit 0 family inet address 10.0.0.9/30
user@P1# set fe-1/2/1 unit 0 family iso
user@P1# set fe-1/2/1 unit 0 family mpls
user@P1# set fe-1/2/2 unit 0 family inet address 10.0.0.25/30
user@P1# set fe-1/2/2 unit 0 family iso
user@P1# set fe-1/2/2 unit 0 family mpls
user@P1# set lo0 unit 0 family inet address 10.255.3.3/32
user@P1# set lo0 unit 0 family iso address 49.0001.0010.0000.0303.00
[edit protocols]
user@P1# set isis interface all level 2 metric 10
user@P1# set isis interface all level 1 disable
user@P1# set isis interface fxp0.0 disable
user@P1# set isis interface lo0.0 level 2 metric 0
3. Enable IS-IS node-link protection, which also automatically extends backup coverage
to all LDP LSPs.
[edit protocols]
user@P1# set isis interface all node-link-protection
[edit protocols]
user@P1# set isis spf-options delay 1000
5. Configure MPLS to use both RSVP and LDP label-switched paths (LSPs).
[edit protocols]
user@P1# set mpls interface all
user@P1# set mpls interface fxp0.0 disable
user@P1# set rsvp interface all
user@P1# set rsvp interface fxp0.0 disable
user@P1# set ldp interface all
user@P1# set ldp interface fxp0.0 disable
[edit protocols]
user@P1# set ldp deaggregate
7. To enable Packet Forwarding Engine local repair, establish a policy that forces the
routing protocol process to install all the next hops for a given route.
This policy ensures that the backup route is installed in the forwarding table used
by the Packet Forwarding Engine to forward traffic to a given destination.
8. Apply the policy to the forwarding table of the local router with the export statement.
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
disable;
}
}
isis {
spf-options delay 1000;
interface all {
node-link-protection;
level 2 metric 10;
level 1 disable;
}
interface fxp0.0 {
disable;
}
interface lo0.0 {
level 2 metric 0;
}
}
ldp {
deaggregate;
interface all;
interface fxp0.0 {
disable;
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Display information about the MPLS label-switched-paths (LSPs) designated as the
backup route for the IS-IS routes.
Action On Device PE1, from operational mode, enter the show isis backup label-switched-path
command.
Meaning The output shows that the backup path is up and operational.
Purpose Display SPF calculations for each neighbor for a given destination.
Action On Device PE1, from operational mode, enter the show isis backup spf results command.
track-item: P3.00-00
track-item: P2.00-00
track-item: P1.00-00
Eligible, Backup next-hop: fe-1/2/1.0, LSP, to-p2
Root: P3, Root Metric: 10, Metric: 0, Root Preference: 0x0
Not eligible, Reason: Interface is already covered
Root: P1, Root Metric: 10, Metric: 10, Root Preference: 0x0
track-item: P3.00-00
Not eligible, Reason: Interface is already covered
P1.00
Primary next-hop: fe-1/2/1.0, IPV4, P1, SNPA: 0:5:85:8f:c8:bd
Root: P2, Root Metric: 20, Metric: 10, Root Preference: 0x0
track-item: P2.00-00
track-item: P1.00-00
Not eligible, Reason: Primary next-hop link fate sharing
Root: P1, Root Metric: 10, Metric: 0, Root Preference: 0x0
Not eligible, Reason: Primary next-hop link fate sharing
Root: P3, Root Metric: 10, Metric: 10, Root Preference: 0x0
track-item: P1.00-00
Eligible, Backup next-hop: fe-1/2/2.0, IPV4, P3, SNPA: 0:5:85:8f:c8:bd
4 nodes
Meaning The output indicates whether a specific interface or node has been designated as a
backup path and why.
Action From operational mode, enter the show isis backup coverage command.
Backup Coverage:
Topology Level Node IPv4 IPv6 CLNS
IPV4 Unicast 1 0.00% 0.00% 0.00% 0.00%
IPV4 Unicast 2 75.00% 87.50% 0.00% 0.00%
Backup Coverage:
Topology Level Node IPv4 IPv6 CLNS
IPV4 Unicast 1 0.00% 0.00% 0.00% 0.00%
IPV4 Unicast 2 75.00% 71.43% 0.00% 0.00%
Backup Coverage:
Topology Level Node IPv4 IPv6 CLNS
IPV4 Unicast 1 0.00% 0.00% 0.00% 0.00%
IPV4 Unicast 2 50.00% 37.50% 0.00% 0.00%
Backup Coverage:
Topology Level Node IPv4 IPv6 CLNS
IPV4 Unicast 1 0.00% 0.00% 0.00% 0.00%
IPV4 Unicast 2 75.00% 71.43% 0.00% 0.00%
Backup Coverage:
Topology Level Node IPv4 IPv6 CLNS
IPV4 Unicast 1 0.00% 0.00% 0.00% 0.00%
IPV4 Unicast 2 50.00% 37.50% 0.00% 0.00%
Meaning The level of backup coverage available through IS-IS routes depends on the actual
network topology and is typically less than 100 percent for all destinations on any given
routing device. You can extend backup coverage to include RSVP LSPs.
Purpose On all nodes in the IS-IS domain, check the type and percentage of protected nodes and
prefixes.
Action From operational mode, enter the show isis interface detail command.
Meaning The output shows that node-link protection is configured on the interfaces.
In an IS-IS network, a loop free alternate (LFA) is a directly connected neighbor that
provides precomputed backup paths to the destinations reachable through the protected
link on the point of local repair (PLR). A remote LFA is not directly connected to the PLR
and provides precomputed backup paths using dynamically created LDP tunnels to the
remote LFA node. The PLR uses this remote LFA backup path when the primary link fails.
The primary goal of the remote LFA is to increase backup coverage for the IS-IS networks
and provide protection for Layer 1 metro-rings.
LFAs do not provide full backup coverage for IS-IS networks. This is a major setback for
metro Ethernet networks that are often shaped as ring topologies. To overcome this
setback, Resource Reservation Protocol - Traffic Engineering (RSVP-TE) backup tunnels
are commonly used to extend the backup coverage. However, a majority of network
providers have already implemented LDP as the MPLS tunnel setup protocol and do not
want to implement the RSVP-TE protocol merely for backup coverage. LDP automatically
brings up transport tunnels to all potential destinations in an IS-IS network and hence is
the preferred protocol. The existing LDP implemented for the MPLS tunnel setup can be
reused for protection of IS-IS networks and subsequent LDP destinations, thereby
eliminating the need for RSVP-TE backup tunnels for backup coverage.
To calculate the remote LFA backup path, the IS-IS protocol determines the remote LFA
node in the following manner:
1. Calculates the reverse shortest path first from the adjacent router across the protected
link of a PLR. The reverse shortest path first uses the incoming link metric instead of
the outgoing link metric to reach a neighboring node.
The result is a set of links and nodes, which is the shortest path from each leaf node
to the root node.
2. Calculates the shortest path first (SPF) on the remaining adjacent routers to find the
list of nodes that can be reached without traversing the link being protected.
The result is another set of links and nodes on the shortest path from the root node
to all leaf nodes.
3. Determines the common nodes from the above results, These nodes are the remote
LFAs.
IS-IS listens to the advertised labels for the LDP routes. For each advertised LDP route,
IS-IS checks whether it contains an LDP supplied next hop. If the corresponding IS-IS
route does have a backup next hop, then IS-IS runs the backup policy and adds an
additional tracking route with the corresponding LDP label-switched path next hop as
the backup next hop. If there are no backup next hops, LDP builds a dynamic LDP tunnel
to the remote LFA, and LDP establishes a targeted adjacency between the remote LFA
node and the PLR node. This backup route has two LDP labels. The top label is the IS-IS
route, which denotes the backup path from the PLR to the remote LFA route. The bottom
label is the LDP MPLS label-switched path that denotes the route for reaching the ultimate
destination from the remote LFA. When an LDP session goes down and a remote tunnel
is no longer available, IS-IS changes all the routes that have been using this backup LDP
tunnel.
NOTE: Currently, Junos OS supports only IPv4 transport LSPs. If you need to
reuse IPv4 transport LSPs for IPv6 IGP networks, add an IPv6 explicit NULL
label to the label stack of the tracking route. The system automatically
converts the IPv4 LSP to an IPv6 LSP.
LDP might be vulnerable by an automatically targeted adjacency, and these threats can
be mitigated using all or some of the following mechanisms:
• Remote LFAs that are several hops away use extended hello messages to indicate
willingness to establish a targeted LDP session. A remote LFA can reduce the threat
of spoofed extended hellos by filtering them and accepting only those originating at
sources permitted by an access or filter list.
• There is a need to authenticate with TCP-MD5 all auto-targeted LDP sessions in the
given IGP/LDP domain using apply groups or LDP global-level authentication.
• As an added security measure, the repair or remote tunnel endpoint routers should be
assigned from a set of addresses that are not reachable from outside of the routing
domain.
Related • auto-targeted-session
Documentation
• no-eligible-remote-backup on page 544
• Configuring Remote LFA Backup over LDP Tunnels in an IS-IS Network on page 206
• Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks on page 208
Starting in Junos OS Release 14.2, the primary goal of a remote loop-free alternate (LFA)
is to increase backup coverage for IS-IS routes and provide protection especially for Layer
1 metro-rings. The existing LDP implemented for the MPLS tunnel setup can be reused
for protection of IS-IS networks and subsequent LDP destinations. The IS-IS protocol
creates a dynamic LDP tunnel to reach the remote LFA node from the point of local repair
(PLR). The PLR uses this remote LFA backup path when the primary link fails.
Before you configure remote LFA over LDP tunnels in an IS-IS network, you must do the
following:
2. Make sure that remote LFA allows asymmetric remote neighbor discovery—that is, it
must send periodic targeted hello messages to the router that initiated the remote
neighbor for LDP auto-targeted adjacency.
1. Enable remote LFA backup to determine the backup next hop using dynamic LDP
label-switched path.
The device uses the configured link protection LFA as the backup for the primary link.
3. Enable automatically targeted LDP sessions using the loopback addresses between
the PLR and the remote LFA node.
4. Specify a time interval for which the targeted LDP sessions are kept up even after the
remote LFA node goes down.
14.2 Starting in Junos OS Release 14.2, the primary goal of a remote loop-free
alternate (LFA) is to increase backup coverage for IS-IS routes and provide
protection especially for Layer 1 metro-rings.
Related • auto-targeted-session
Documentation
• remote-backup-calculation on page 571
• Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks on page 208
• Understanding Remote LFA over LDP Tunnels in IS-IS Networks on page 205
This example shows how to configure remote LFA for LDP tunnels in an IS-IS network
for extending backup protection.
Requirements
This example uses the following hardware and software components:
• Six MX Series routers with IS-IS protocol and LDP enabled on the connected interfaces.
Before you configure remote LFA over LDP tunnels in IS-IS networks, make sure of the
following:
• LDP is enabled on the loopback interface. Without a loopback interface, LDP targeted
adjacency cannot be formed. Remote LFA cannot be configured without LDP targeted
adjacency.
• Remote LFA must allow asymmetric remote neighbor discovery, that is, it must send
periodic targeted hellos to the router that initiated the remote neighbor for LDP auto
targeted adjacency.
• Link protection or node-link protection must be configured on the point of local repair
(PLR).
Overview
The example includes six routers in a ring topology. Configure the IS-IS protocol on the
directly connected interfaces. Device R1 is the PLR. This example verifies that Junos OS
updates the routing table of Device R1 with LDP next-hop routes as the backup route.
Topology
Figure 21: Configuring Remote LFA over LDP Tunnels in IS-IS Networks
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Configuring Device R1
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
NOTE: Repeat this procedure except Step 4 and 5 for every Juniper Networks
router in the IGP domain, modifying the appropriate interface names,
addresses, and any other parameters.
[edit interfaces]
user@R1# set ge-1/0/0 unit 1 description R1->R2
user@R1# set ge-1/0/0 unit 1 family inet address 1.1.1.1/24
user@R1# set ge-1/0/0 unit 1 family iso
user@R1# set ge-1/0/0 unit 1 family mpls
3. Configure the IS-IS interface for level 2 and the metric value on all the interfaces,
and enable link protection on the protected interface.
4. Enable IS-IS node-link protection, which also automatically extends backup coverage
to all LDP label-switched paths.
5. Enable remote LFA backup which calculates the backup next hop using dynamic
LDP label-switched path.
(Optional) When you include the node link degradation statement even if node
protection LFA is not configured for a given destination, the device uses the
configured link protection LFA as the backup for the primary link.
6. Configure MPLS to use LDP label-switched paths for all interfaces on the device.
[edit protocols]
user@R1# set mpls interface all
user@R1# set mpls interface fxp0.0 disable
user@R1# set ldp interface all
user@R1# set ldp interface fxp0.0 disable
7. Specify a time interval for which the targeted LDP sessions are kept up when the
remote LFA goes down, and specify a maximum number of automatically, targeted
LDP sessions to optimize the use of memory.
9. To enable Packet Forwarding Engine local repair, establish a policy that forces the
routing protocol process to install all the next hops for a given route.
This policy ensures that the backup route is installed in the forwarding table used
by the Packet Forwarding Engine to forward traffic to a given destination.
[edit policy-options]
user@R1# set policy-options policy-statement ecmp term 1
user@R1# set then load-balance per-packet
10. Apply the policy to the forwarding table of the local router with the export statement.
Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the
output does not display the intended configuration, repeat the instructions in this example
to correct the configuration.
remote-backup-calculation;
node-link-degradation;
}
interface ge-1/0/0.1;
interface ge-1/5/0.12; {
link-protection;
}
interface all {
node-link-protection;
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.12 {
passive;
}
}
ldp {
auto-targeted-session {
teardown-delay 60;
maximum-sessions 20;
}
deaggregate;
interface all;
interface fxp0.0 {
disable;
}
}
If you are done configuring the device, enter commit from the configuration mode.
Verification
Confirm that the configuration is working properly.
Action On Device R1, from operational mode, run the show route command to display the routes
in the routing table.
Meaning The output shows all the routes in the routing table of Device R1.
Purpose Display all the LDP backup routes in the IS-IS routing table of Device R1.
Action On Device R1, from operational mode, run the show isis route command to display the
routes in the IS-IS routing table.
lt-1/2/0.1 LSP
LDP->tp3-R4(10.255.102.156)
1.1.5.0/24 1 558 20 int lt-1/2/0.12 IPV4 tp3-R6
lt-1/2/0.1 LSP
LDP->tp3-R4(10.255.102.156)
10.255.102.136/32 1 558 10 int lt-1/2/0.12 IPV4 tp3-R6
lt-1/2/0.1 LSP
LDP->tp3-R4(10.255.102.156)
10.255.102.146/32 1 558 20 int lt-1/2/0.1 IPV4 tp3-R2
lt-1/2/0.1 LSP
LDP->tp3-R4(10.255.102.156)
10.255.102.178/32 1 558 10 int lt-1/2/0.1 IPV4 tp3-R2
Meaning The output shows all the LDP backup routes in the IS-IS routing table of Device R1.
Action From operational mode, enter the show ldp session auto-targeted detail command.
Purpose Display the remote LFA next hop determined for a given destination.
Action From operational mode, enter the show isis backup spf results command.
Meaning The output indicates whether a specific interface or node has been designated as a
remote backup path and why.
Related • Understanding Remote LFA over LDP Tunnels in IS-IS Networks on page 205
Documentation
• auto-targeted-session
In figure 1, Router R1 has 5 links to Router R2, four of them are part of the aggregated
Ethernet bundle. Both L3 links have the same cost. To reach the destination network N,
Router R1, load balances traffic between L3 links. The distribution between the two links
is equal in normal conditions and link utilization is the same. However, if AE bundle
capacity changes, equal distribution results in the imbalance of link utilization. Weighted
ECMP feature enables load balancing between equal cost paths in proportion to the
capacity of the local inks. In this example, if AE bundle has three active links, traffic is
distributed in 30/40 proportion between AE bundle and a single link.
Starting in Junos OS Release 17.1R1, weighted ECMP feature also supports IS-IS SPRING
based next hop addresses.
NOTE: This feature provides weighted ECMP routing to IS-IS neighbors that
are one hop away. Junos OS supports this feature on immediately connected
routers only and does not support weighted ECMP on multihop routers, that
is, on routers that are more than one hop away.
You must configure per-packet load balancing policy before configuring this
feature. WECMP will be operational if per-packet load balancing policy is in
place,
17.1R1 Starting in Junos OS Release 17.1R1, weighted ECMP feature also supports
IS-IS SPRING based next hop addresses.
This example shows how to configure weighted equal cost multipath (ECMP) routing
for distributing traffic to IS-IS neighbors that are one hop away to ensure optimal load
balancing. Weighted ECMP routing distributes traffic unequally over multiple paths for
better load balancing. However, weighted ECMP routing is more efficient than equal
distribution of traffic during per-packet load balancing.
Requirements
This example uses the following hardware and software components:
Before you configure weighted ECMP in an IS-IS network, make sure you :
2. Configure IS-IS.
Overview
Beginning with Junos OS Release 15.1F4, you can configure the IS-IS protocol to get the
logical interface bandwidth information associated with the gateways of equal-cost
multipath (ECMP) next hop. During per-packet load balancing, traffic distribution is based
on the available bandwidth to facilitate optimal bandwidth usage for incoming traffic
on an ECMP path of one hop distance. The Packet Forwarding Engine does not distribute
the traffic equally, but considers the balance values and distributes the traffic according
to the bandwidth availability. However, this feature is not available for ECMP paths that
are more than one hop away.
Topology
In Figure 22 on page 222, three aggregated Ethernet bundles ae0, ae1, and ae2 with four
links each, are configured between Router R0 and Router R1. The Packet Forwarding
Engine distributes traffic unequally between the three Ethernet bundles when one of the
links goes down, depending on the available bandwidth.
Figure 22: Weighted ECMP Traffic Distribution on One Hop IS-IS Neighbors
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Configuring Router R0
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
NOTE: Repeat this procedure for Router R1 after modifying the appropriate
interface names, addresses, and other parameters.
1. Specify the maximum number of weighted ECMP interfaces that you want to
configure. Enable graceful switchover and specify the number of aggregated Ethernet
interfaces to be created.
[edit chassis]
user@R0# set maximum-ecmp 64
user@R0# set redundancy graceful-switchover
user@R0# set aggregated-devices ethernet device-count 64
2. Configure the interfaces with multiple links to the same destination for load
balancing traffic.
[edit interfaces]
user@R0# set ge-1/1/4 description "LinkID: R0R1-1"
user@R0# set ge-0/0/0 description "LinkID: R0R1-2"
user@R0# set ge-1/2/1 description "LinkID: R0R1-3"
user@R0# set ge-1/2/2 description "LinkID: R0R1-4"
user@R0# set ge-1/2/0 description "LinkID: R0R1-5"
user@R0# set ge-1/2/3 description "LinkID: R0R1-6"
user@R0# set ge-0/1/6 description "LinkID: R0R1-7"
user@R0# set ge-1/1/6 description "LinkID: R0R1-8"
user@R0# set ge-1/1/5 description "LinkID: R0R1-9"
user@R0# set ge-1/3/3 description "LinkID: R0R1-10"
user@R0# set ge-1/2/8 description "LinkID: R0R1-11"
user@R0# set ge-0/1/8 description "LinkID: R0R1-12"
user@R0# set ge-0/1/7 description "LinkID: R0R1-13"
user@R0# set ge-0/0/1 description "LinkID: R0RT0"
4. Configure IP addresses on the interfaces with either IPv4 or IPv6 addresses, as per
your network requirements.
[edit interfaces]
user@R0# set ge-0/0/1 unit 0 family inet address 21.1.1.1/24
user@R0# set ge-0/0/1 unit 0 family iso
user@R0# set ge-0/1/7 unit 0 family inet address 10.3.1.1/24
user@R0# set ge-0/1/7 unit 0 family iso
5. Configure the four member links of the ae0 aggregated Ethernet bundle.
[edit interfaces]
user@R0# set ge-1/1/4 gigether-options 802.3ad ae0
user@R0# set ge-0/0/0 gigether-options 802.3ad ae0
user@R0# set ge-1/2/1 gigether-options 802.3ad ae0
user@R0# set ge-1/2/2 gigether-options 802.3ad ae0
6. Configure the four member links of the ae1 aggregated Ethernet bundle.
[edit interfaces]
user@R0# set ge-1/2/0 gigether-options 802.3ad ae1
user@R0# set ge-1/2/3 gigether-options 802.3ad ae1
user@R0# set ge-0/1/6 gigether-options 802.3ad ae1
user@R0# set ge-1/1/6 gigether-options 802.3ad ae1
7. Configure the four member links of the ae2 aggregated Ethernet bundle.
[edit interfaces]
user@R0# set ge-1/1/5 gigether-options 802.3ad ae2
user@R0# set ge-1/3/3 gigether-options 802.3ad ae2
user@R0# set ge-1/2/8 gigether-options 802.3ad ae2
user@R0# set ge-0/1/8 gigether-options 802.3ad ae2
8. Configure IP address and the Link Aggregation Control Protocol (LACP) for ae0
aggregated Ethernet interface.
[edit interfaces]
user@R0# set ae0 aggregated-ether-options minimum-links 1
user@R0# set ae0 aggregated-ether-options lacp active
user@R0# set ae0 unit 0 family inet address 10.0.1.1/24
user@R0# set ae0 unit 0 family iso
9. Configure IP address and the Link Aggregation Control Protocol (LACP) for ae1
aggregated Ethernet interface.
[edit interfaces]
user@R0# set ae1 aggregated-ether-options minimum-links 1
user@R0# set ae1 aggregated-ether-options lacp active
user@R0# set ae1 unit 0 family inet address 10.1.1.1/24
user@R0# set ae1 unit 0 family iso
10. Configure IP address and the Link Aggregation Control Protocol (LACP) for ae2
aggregated Ethernet interface.
[edit interfaces]
user@R0# set ae2 aggregated-ether-options minimum-links 2
user@R0# set ae2 aggregated-ether-options lacp active
user@R0# set ae2 unit 0 family inet address 10.2.1.1/24
11. Configure the loopback interface address and iso family address.
[edit interfaces]
user@R0# set lo0 unit 0 family inet address 10.168.0.4/32
user@R0# set lo0 unit 0 family iso address 49.0001.0102.5516.3127.00
[edit protocols]
user@R0# set isis interface ge-0/0/1.0
user@R0# set isis interface ge-0/1/7.0 level 1 metric 20
user@R0# set isis interface ge-0/1/7.0 level 2 metric 20
user@R0# set isis interface ae0.0 node-link-protection
user@R0# set isis interface ae1.0
user@R0# set isis interface ae2.0
user@R0# set isis interface lo0.0
[edit policy-options]
user@R0# set policy-statement pplb then load-balance per-packet
[edit routing-options]
user@R0# set forwarding-table
user@R0# set export pplb
15. Enable weighted ECMP traffic distribution on directly connected IS-IS neighbors.
Results
From configuration mode, confirm your configuration by entering the show chassis, show
interfaces, show protocols, show policy-options, and show routing-options commands. If
the output does not display the intended configuration, repeat the instructions in this
example to correct the configuration.
[edit]
user@R0# show chassis
maximum-ecmp 64;
redundancy graceful-switchover;
[edit]
user@R0# show interfaces
ge-0/0/0 {
description "LinkID: R0R1-2";
gigether-options {
802.3ad ae0;
}
}
ge-0/0/1 {
description "LinkID: R0RT0";
unit 0 {
family inet {
address 21.1.1.1/24;
}
family iso;
}
}
ge-0/1/6 {
description "LinkID: R0R1-7";
gigether-options {
802.3ad ae1;
}
}
ge-0/1/7 {
description "LinkID: R0R1-13";
unit 0 {
family inet {
address 10.3.1.1/24;
}
family iso;
}
}
ge-0/1/8 {
description "LinkID: R0R1-12";
gigether-options {
802.3ad ae2;
}
}
ge-1/1/4 {
description "LinkID: R0R1-1";
gigether-options {
802.3ad ae0;
}
}
ge-1/1/5 {
description "LinkID: R0R1-9";
gigether-options {
802.3ad ae2;
}
}
ge-1/1/6 {
description "LinkID: R0R1-8";
gigether-options {
802.3ad ae1;
}
}
ge-1/2/0 {
description "LinkID: R0R1-5";
gigether-options {
802.3ad ae1;
}
}
ge-1/2/1 {
description "LinkID: R0R1-3";
gigether-options {
802.3ad ae0;
}
}
ge-1/2/2 {
description "LinkID: R0R1-4";
gigether-options {
802.3ad ae0;
}
}
ge-1/2/3 {
description "LinkID: R0R1-6";
gigether-options {
802.3ad ae1;
}
}
ge-1/2/8 {
description "LinkID: R0R1-11";
gigether-options {
802.3ad ae2;
}
}
ge-1/3/3 {
description "LinkID: R0R1-10";
gigether-options {
802.3ad ae2;
}
}
ae0 {
aggregated-ether-options {
minimum-links 1;
lacp {
active;
}
}
unit 0 {
family inet {
address 10.0.1.1/24;
}
family iso;
}
}
ae1 {
vlan-tagging;
aggregated-ether-options {
minimum-links 3;
lacp {
active;
}
}
unit 0 {
family inet {
address 10.1.1.1/24;
}
family iso;
}
unit 1 {
bandwidth 1g;
vlan-id 1;
family inet {
address 13.1.1.1/24;
}
family iso;
}
unit 2 {
bandwidth 1g;
vlan-id 2;
family inet {
address 13.2.1.1/24;
}
family iso;
}
unit 3 {
bandwidth 1g;
vlan-id 3;
family inet {
address 13.3.1.1/24;
}
family iso;
}
unit 4 {
bandwidth 1g;
vlan-id 4;
family inet {
address 13.4.1.1/24;
}
family iso;
}
unit 5 {
bandwidth 1g;
vlan-id 5;
family inet {
address 13.5.1.1/24;
}
family iso;
}
unit 6 {
bandwidth 1g;
vlan-id 6;
family inet {
address 13.6.1.1/24;
}
family iso;
}
unit 7 {
bandwidth 1g;
vlan-id 7;
family inet {
address 13.7.1.1/24;
}
family iso;
}
unit 8 {
bandwidth 1g;
vlan-id 8;
family inet {
address 13.8.1.1/24;
}
family iso;
}
unit 9 {
bandwidth 1g;
vlan-id 9;
family inet {
address 13.9.1.1/24;
}
family iso;
}
unit 10 {
bandwidth 1g;
vlan-id 10;
family inet {
address 13.10.1.1/24;
}
family iso;
}
}
ae2 {
aggregated-ether-options {
minimum-links 2;
lacp {
active;
}
}
unit 0 {
family inet {
address 10.2.1.1/24;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.4/32;
}
family iso {
address 49.0001.0102.5516.3127.00;
}
}
}
[edit]
user@R0# show protocols
isis {
spf-options {
multi-path {
weighted {
one-hop;
}
}
}
}
[edit]
user@R01# show policy-options
policy-statement pplb {
then {
load-balance per-packet;
}
}
[edit]
user@R0# show routing-options
forwarding-table {
export pplb;
}
Verification
Confirm that the configuration is working properly.
• Verifying Equal Distribution of Traffic Over Equal-Cost Multiple Paths on page 234
• Verifying Unequal Traffic Distribution Over Available Bandwidth on page 239
• Verifying Unequal Traffic Distribution onLogical Interfaces on page 243
Purpose To verify that traffic is equally distributed over the aggregated Ethernet bundles.
Action From operational mode, enter the show route 198.0.0.1 extensive command.
Logical interface ae0.0 (Index 335) (SNMP ifIndex 625) (Generation 825)
Flags: Up SNMP-Traps 0x4004000 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 702 4 207265 4320
Output: 870567 33801 95801535 29746416
Adaptive Statistics:
Adaptive Adjusts: 0
Adaptive Scans : 0
Adaptive Updates: 0
Link:
ge-0/0/0.0
Input : 149 1 17924 992
Output: 218927 8586 24081728 7556344
ge-1/1/4.0
Input : 134 1 16616 992
Output: 201384 7781 22152240 6847320
ge-1/2/1.0
Input : 136 1 16864 992
Output: 212760 8238 23443069 7250056
ge-1/2/2.0
Input : 283 1 155861 1344
Output: 237496 9196 26124498 8092696
Logical interface ae1.0 (Index 336) (SNMP ifIndex 666) (Generation 826)
Flags: Up SNMP-Traps 0x4004000 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 707 4 206275 3968
Output: 849981 32979 93602009 29023264
Adaptive Statistics:
Adaptive Adjusts: 0
Adaptive Scans : 0
Adaptive Updates: 0
Link:
ge-0/1/6.0
Input : 148 1 17800 992
Output: 198301 7819 21812806 6880984
ge-1/1/6.0
Input : 134 1 16616 992
Output: 209149 8088 23006390 7117728
ge-1/2/0.0
Input : 136 1 16864 992
Output: 215518 8291 23811445 7296528
ge-1/2/3.0
Logical interface ae2.0 (Index 337) (SNMP ifIndex 961) (Generation 827)
Flags: Up SNMP-Traps 0x4004000 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 702 4 224128 3968
Output: 855472 33229 94215862 29243664
Adaptive Statistics:
Adaptive Adjusts: 0
Adaptive Scans : 0
Adaptive Updates: 0
Link:
ge-0/1/8.0
Input : 137 1 16988 992
Output: 213214 8377 23453540 7372232
ge-1/1/5.0
Input : 137 1 16988 992
Output: 212174 8244 23339050 7255368
ge-1/2/8.0
Input : 135 1 16740 992
Output: 210583 8144 23164099 7167296
ge-1/3/3.0
Input : 293 1 173412 992
Output: 219501 8464 24259173 7448768
Meaning IS-IS distributes traffic equally when the three aggregated Ethernet bundles have the
same bandwidth available.
Purpose To verify that IS-IS distributes traffic unevenly when one of the aggregated link is down
during per-packet load balancing depending on the available bandwidth.
Action Disable one of the links on the ae0 bundle so that the available bandwidth is 3g on ae0
and 4g on ae1and ae2. From operational mode, enter the show route 198.0.0.1 extensive
command.
Logical interface ae0.0 (Index 335) (SNMP ifIndex 625) (Generation 825)
Flags: Up SNMP-Traps 0x4004000 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 793 3 218290 2976
Output: 1617811 27223 178003101 23957320
Adaptive Statistics:
Adaptive Adjusts: 0
Adaptive Scans : 0
Adaptive Updates: 0
Link:
ge-0/0/0.0
Input : 182 1 21794 992
Output: 461045 9423 50717650 8292776
ge-1/1/4.0 <-- down
Input : 139 0 17236 0
Output: 241334 0 26546740 0
ge-1/2/1.0
Input : 162 1 20088 992
Output: 444340 8979 48918653 7901976
ge-1/2/2.0
Logical interface ae1.0 (Index 336) (SNMP ifIndex 666) (Generation 826)
Flags: Up SNMP-Traps 0x4004000 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 817 5 219555 4672
Output: 1756031 35775 193270683 31483104
Adaptive Statistics:
Adaptive Adjusts: 0
Adaptive Scans : 0
Adaptive Updates: 0
Link:
ge-0/1/6.0
Input : 174 1 21024 992
Output: 411469 8414 45261286 7404544
ge-1/1/6.0
Input : 159 1 19716 992
Output: 433700 8893 47707000 7826296
ge-1/2/0.0
Input : 161 1 19964 992
Output: 447338 9190 49314819 8087408
ge-1/2/3.0
Logical interface ae2.0 (Index 337) (SNMP ifIndex 961) (Generation 827)
Flags: Up SNMP-Traps 0x4004000 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 813 4 237569 3968
Output: 1786258 37008 196605473 32568272
Adaptive Statistics:
Adaptive Adjusts: 0
Adaptive Scans : 0
Adaptive Updates: 0
Link:
ge-0/1/8.0
Input : 163 1 20212 992
Output: 446715 9282 49138650 8168408
ge-1/1/5.0
Input : 162 1 20088 992
Output: 443846 9209 48822970 8104224
ge-1/2/8.0
Input : 161 1 19964 992
Output: 443943 9341 48833699 8220624
ge-1/3/3.0
Input : 327 1 177305 992
Output: 451754 9176 49810154 8075016
Meaning IS-IS infers that the ae0 bundle has only 3g of bandwidth available. Therefore, modifies
per-packet load balancing according to the available bandwidth. As per the output, only
27 percent of the bandwidth is available on ae0 because one of the aggregated Ethernet
links is down. Thus IS-IS distributes traffic unequally depending on the available
bandwidth.
Purpose To verify that IS-IS distributes traffic unevenly on logical interfaces based on the
configured logical bandwidth.
15.1F4 Beginning with Junos OS Release 15.1F4, you can configure the IS-IS protocol
to get the logical interface bandwidth information associated with the
gateways of equal-cost multipath (ECMP) next hop.
To help provide traffic engineering and MPLS with information about network topology
and loading, extensions have been added to the Junos OS implementation of IS-IS.
Specifically, IS-IS supports new type, length, and value (TLV) tuples that specify link
attributes. These TLVs are included in the IS-IS link-state PDUs. The link-attribute
information is used to populate the traffic engineering database, which is used by the
Constrained Shortest Path First (CSPF) algorithm to compute the paths that MPLS
label-switched paths (LSPs) take. This path information is used by RSVP to set up LSPs
and reserve bandwidth for them.
NOTE: Whenever possible, use IS-IS interior gateway protocol (IGP) shortcuts
instead of traffic engineering shortcuts.
The traffic engineering extensions are defined in RFC 5305, IS-IS Extensions for Traffic
Engineering.
Related • Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 246
Documentation
• Example: Enabling IS-IS Traffic Engineering Support on page 248
Link-state protocols, such as OSPF and IS-IS, use the shortest-path-first (SPF) algorithm
to compute the shortest-path tree to all nodes in the network. The results of such
computations can be represented by the destination node, next-hop address, and output
interface, where the output interface is a physical interface. Label-switched paths (LSPs)
can be used to augment the SPF algorithm.
IGP typically performs two independent computations. The first is performed without
considering any LSP. The result of the computation is stored in the inet.0 table. This step
is no different from traditional SPF computations and is always performed even if IGP
shortcut is disabled.
The second computation is performed considering only LSPs as a logical interface. Each
LSP’s egress router is considered. The list of destinations whose shortest path traverses
the egress router (established during the first computation) is placed in the inet.3 routing
table. These destinations are given the egress router of the LSP as a next hop, enabling
BGP on the local router to use these LSPs to access BGP next hops beyond the egress
router. Normally, BGP can use only LSPs that terminate at the BGP next hop.
As an illustration, begin with a typical SPF tree (see Figure 23 on page 247).
If an LSP connects Router A to Router D and if IGP shortcuts are enabled on Router A,
you might have the SPF tree shown in Figure 24 on page 247.
When computing the shortest path to reach Router D, Router A has two choices:
Router A decides between the two choices by comparing the IGP metrics for path A–B–D
with the LSP metrics for LSP A–D. If the IGP metric is lower, path A–B–D is chosen
(Figure 23 on page 247). This path A–B–D is valid only when node D is not the tail-end of
the LSP. If node D is the tail end of the LSP, even if the LSP metric is lower or both IGP
and LSP metrics are equal, LSP A–D is used (Figure 24 on page 247).
Note that Router E is reachable through LSP A–D and Router F will take the IGP path.
This example shows how to configure IS-IS so that it uses label-switched paths as
shortcuts.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
MPLS traffic engineering maps certain data flows to established label-switched paths
(LSPs) rather than to data links calculated by the interior gateway protocol (IGP) to be
part of the best (shortest) path. Fundamental to this function is the determination of
what traffic is to be mapped to an LSP. Traffic is mapped to an LSP at the tunnel's ingress
label switching router (LSR) by designating the egress LSR as the next-hop router for
certain destination prefixes.
It is important to understand that the LSP does not constitute an entire route to a
destination. Rather, the LSP is a next-hop segment of the route. Therefore, packets can
only be mapped to an LSP if the egress LSR is considered to be a feasible next-hop
candidate during the route resolution process.
lo0:
A 192.168.0.1 Prefixes AS 2
G
B 192.168.0.2 10.2.0.0/16
C 192.168.0.3 10.3.0.0/16
D 192.168.0.4 .26
E 192.168.0.5
F 192.168.0.6
G 192.168.0.7 10.0.0.24/30
.25
10.0.0.4/30 10.0.0.8/30 10.0.0.12/30
.5 .6 .9 .10
A B C D
fe-1/2/1 .13 .14
fe-1/2/0 .1 .29
LSP A-C
10.0.0.0/30 10.0.0.28/30
.2 .30
.17 .18
E F
AS 1
g041306
10.0.0.16/30
In this example, Device C has an external BGP (EBGP) peer session with Device G in
autonomous system (AS) 2. In order to enable its internal BGP (IBGP) peers to access
subnets in AS 2, Device C runs IS-IS passively on its interface connecting to Device G.
IS-IS has information about the external subnets and enters routes to these subnets in
the inet.0 routing table. BGP, when resolving the next-hop addresses of AS-external
routes, uses the IGP route.
Device A has an LSP to Device C. The path is configured to always go through Device E,
rather than going through Device B.
When you use traffic-engineering bgp (which is the default) and IGP shortcuts, the traffic
engineering solution is used for BGP AS-external route resolution only. However, traffic
to AS-internal destinations can also be mapped to LSPs. To accomplish this,
traffic-engineering bgp-igp is enabled. Thus, RSVP installs the MPLS prefixes into the
inet.0 table rather than the inet.3 table. As a result, the MPLS LSPs are installed in the
forwarding table.
This approach finds practical application whenever heavy traffic is routed to specific
destinations within an AS, such as server farms.
An important point about IGP shortcuts, whether used alone or in conjunction with
traffic-engineering BGP-IGP, is that IGP adjacencies are never formed across the LSPs.
The IGP sees the LSP as a single data link, but does not view the egress router as a
potential peer and does not forward hello messages across the LSP. Also, RSVP messages
are never forwarded over LSPs, preventing the possibility of an LSP being inadvertently
built within another LSP.
“CLI Quick Configuration” on page 250 shows the configuration for all of the devices in
Figure 25 on page 249. The section “Step-by-Step Procedure” on page 254 describes the
steps on Device A.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@A# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@A# set fe-1/2/0 unit 0 family iso
user@A# set fe-1/2/0 unit 0 family mpls
user@A# set fe-1/2/1 unit 0 family inet address 10.0.0.5/30
user@A# set fe-1/2/1 unit 0 family iso
user@A# set fe-1/2/1 unit 0 family mpls
user@A# set lo0 unit 0 family inet address 192.168.0.1/32
user@A# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
A single LSP, named test_path, is configured from Device A to Device C. The LSP
explicit route object (ERO) is specified to use a strict hop through Device E, so that
the LSP takes a different path from the OSPF shortest path of A–B–C. The LSP is
signaled using RSVP, but no CSPF is running.
When IGP shortcuts are also enabled, the IGP can use the LSP in its calculations.
The results of the calculations are entered into the inet.0 table.
8. Configure IS-IS to use MPLS LSPs as next hops for the IPv4 address family.
It is only necessary to enable IGP shortcuts on the ingress router because that is the
router performing the shortest-path-first (SPF) calculations.
It is important to understand how IGP shortcuts affect the protocol and routing
table relationship. The IGP performs SPF calculations to subnets downstream of
LSP egress points, but the results of these calculations are entered into the inet.3
table only. At the same time, the IGP performs its traditional SPF calculations and
enters the results of these calculations into the inet.0 table. The result is that
although the IGP is making entries into the inet.3 table, BGP is still the only protocol
with visibility into that table for the purposes of route resolution. Therefore,
forwarding to AS-internal destinations still uses the inet.0 IGP routes, and the LSPs
are only used for BGP next-hop resolution. If you want the LSPs to be used for IGP
next-hop resolution, you must configure traffic-engineering bgp-igp.
[edit routing-options]
user@A# set router-id 192.168.0.1
user@A# set autonomous-system 1
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
neighbor 192.168.0.6;
neighbor 192.168.0.2;
neighbor 192.168.0.3;
}
}
isis {
traffic-engineering {
family inet {
shortcuts;
}
}
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
}
interface lo0.0;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the MPLS LSP is used as the next hop in the expected routes.
49.0002.0192.0168.0001/72
*[Direct/0] 4d 09:08:47
> via lo0.0
Meaning IS-IS chooses the LSP as the shortest path to destinations downstream of the LSP egress
device. Additionally, because the IGP uses the LSP to reach external subnet 10.0.0.24/30,
BGP also uses the LSP in its routes to 10.2.0.0 and 10.3.0.0.
If next-hop self were used at Device C, BGP would still choose the LSP over the IGP path.
Action From operational mode, enter the show rsvp session brief command.
Meaning On all four routing devices, the ingress and egress IP addresses of the LSP are shown.
The path is shown as an ingress path at Device A, and packets forwarded on the LSP are
assigned a label of 299776. At Device E, the LSP is transit, and packets arriving with a
label of 299776 are given an outgoing label of 299808. The labels have significance only
between neighboring label-switched routers (LSRs). Device F swaps incoming label
299808 for outgoing label 3. Device C, the egress, pops label 3 and routes the received
packet by standard IP longest-match route lookup.
Purpose Check the paths used for IGP and BGP routes when traffic-engineering bgp-igp is used
and when traffic-engineering bgp (the default) is used.
This removes traffic-engineering bgp-igp from the configuration because only one
MPLS traffic engineering setting can be configured in each routing instance.
2. Use the show route forwarding-table command to check the paths when
traffic-engineering bgp (the default) is configured.
3. Use the traceroute command to check the paths when traffic-engineering bgp (the
default) is configured.
This removes traffic-engineering bgp from the configuration because only one MPLS
traffic engineering setting can be configured in each routing instance.
5. Use the show route forwarding-table command to check the paths when
traffic-engineering bgp-igp is configured.
6. Use the traceroute command to check the paths when traffic-engineering bgp-igp is
configured.
Meaning When traffic-engineering bgp is configured, the first trace is to a destination belonging to
the BGP-learned 10.2.0.0/16 prefix, and follows the LSP. The second trace is to the
IS-IS-learned 192.168.0.3 route (Device C’s loopback interface address), and follows the
IS-IS route. These results correspond to what we observe in the forwarding table. The
forwarding table is built based on routes in inet.0 only. BGP can look into inet.3 and select
an LSP as the best path to the next hop of a BGP prefix, and can add a route into inet.0
utilizing that LSP. An entry is then made to the forwarding table from the inet.0 route.
No other protocol, by default, can consult inet.3, and the inet.3 routes are not entered
into inet.0. Therefore, the forwarding entry for 192.168.0.3 is created from the only route
to that destination in inet.0: the IS-IS route.
When traffic-engineering bgp-igp is configured, the first trace to 10.2.1.1 continues to follow
the LSP. The second trace to 192.168.0.3 also follows the LSP. These results correspond
to what we observe in the forwarding table, which shows that the LSP is used for IGP
next-hop resolution.
When you set up MPLS traffic-engineering tunnels between sites, by default the IGP does
not consider those tunnels for traffic forwarding. Forwarding adjacencies allow you to
treat a traffic engineering LSP tunnel as a link in an IGP topology. The link is used in the
shortest-path-first (SPF) algorithm and is advertised to the IGP peers. A forwarding
adjacency can be created between routing devices regardless of their location in the
network.
This example shows how to advertise label-switched paths (LSPs) into IS-IS as
point-to-point links (sometimes referred to as forwarding adjacencies) so that the LSPs
can be used in SPF calculations. The advertisement contains a local address (the from
address of the LSP), a remote address (the to address of the LSP), and a metric.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
Figure 26 on page 264 shows the topology used in this example.
10 10.0.0.0/30 15
10.0.0.20/30 10
LSP E-D
.2
20 .21
E F
.17 10.0.0.16/30 .18
Lo0:
A 192.168.0.1
B 192.168.0.2
C 192.168.0.3
D 192.168.0.4
g041304
E 192.168.0.5
F 192.168.0.6
The example shows how to configure the LSP from Device E to Device D and then
advertise this path through IS-IS. The configuration is verified by performing a traceroute
operation from Device A to Device D and making sure that the LSP is used for forwarding.
“CLI Quick Configuration” on page 264 shows the configuration for all of the devices in
Figure 26 on page 264. The section “Step-by-Step Procedure” on page 267 describes the
steps on Device E.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@E# set fe-1/2/0 unit 0 family inet address 10.0.0.2/30
user@E# set fe-1/2/0 unit 0 family iso
user@E# set fe-1/2/0 unit 0 family mpls
user@E# set fe-1/2/1 unit 0 family inet address 10.0.0.17/30
user@E# set fe-1/2/1 unit 0 family iso
user@E# set fe-1/2/1 unit 0 family mpls
user@E# set lo0 unit 0 family inet address 192.168.0.5/32
user@E# set lo0 unit 0 family iso address 49.0002.0192.0168.0005.00
Make sure that you configure the reverse LSP on the endpoint, in this case on Device
D.
5. Configure internal BGP (IBGP) peering among the devices that must run MPLS.
IS-IS Level 1 and Level 2 are enabled when you include the interface at [edit protocols
isis]. By disabling Level 1, you are in effect creating a Level 2 IS-IS interface.
Make sure that you advertise the LSP on the endpoint, in this case on Device D.
[edit routing-options]
user@E# set router-id 192.168.0.5
user@E# set autonomous-system 1
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
family iso {
address 49.0002.0192.0168.0005.00;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that another neighbor is listed and is reachable over the LSP. The interface field
indicates the name of the LSP.
Action From operational mode, enter the show isis adjacency detail command.
D
Interface: E-D, Level: 2, State: One-way, Expires in 0 secs
Priority: 0, Up/Down transitions: 1, Last transition: 1d 00:34:58 ago
Circuit type: 3, Speaks: IP
Topologies: Unicast
Restart capable: No, Adjacency advertisement: Advertise
IP addresses: 192.168.0.4
F
Interface: fe-1/2/1.0, Level: 2, State: Up, Expires in 7 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 01:16:22 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: F.02, IP addresses: 10.0.0.18
A
Interface: fe-1/2/0.0, Level: 2, State: Up, Expires in 20 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 01:17:20 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: E.02, IP addresses: 10.0.0.1
Meaning As expected, Interface: E-D is shown in the output, and the state is shown as One-way.
Purpose Verify that the LSP is being used in the SPF calculations.
Action From operational mode, enter the show isis spf brief command.
Purpose Verify that a traceroute operation from Device A to Device D uses the LSP.
All OSPF and IS-IS interfaces have a cost, which is a routing metric that is used in the
link-state calculation. Routes with lower total path metrics are preferred over those with
higher path metrics. Unlike OSPF, in which the link metric is calculated automatically
based on bandwidth, there is no automatic calculation for IS-IS. All IS-IS links use a metric
of 10 by default.
Normally, IS-IS metrics can have values up to 63. The total cost to a destination is the
sum of the metrics on all outgoing interfaces along a particular path from the source to
the destination. By default, the total path metric is limited to 1023. This metric value is
insufficient for large networks and provides too little granularity for traffic engineering,
especially with high-bandwidth links. A wider range of metrics is also required if route
leaking is used.
IS-IS generates two type, length, and value (TLV) tuples, one for an IS-IS adjacency and
the second for an IP prefix. To allow IS-IS to support traffic engineering, a second pair of
TLVs has been added to IS-IS, one for IP prefixes and the second for IS-IS adjacency and
traffic engineering information. With these TLVs, IS-IS metrics can have values up
24
to 16,777,215 (2 – 1).
By default, Junos OS supports the sending and receiving of wide metrics. Junos OS allows
a maximum metric value of 63 and generates both pairs of TLVs. To configure IS-IS to
generate only the new pair of TLVs and thus to allow the wider range of metric values,
you must include the wide-metrics-only statement in the IS-IS configuration.
The combination of wide-metrics-only and traffic-engineering disable configuration options
under IS-IS protocols suppresses the combination of the TLVs 2, 22, 128, 134, and 135
IS-IS routing information for that level. That means that the local server will not send
the TLVs but accepts them when received. The effect of the configuration options on
TLVs 2, 22, 128, 134, and 135 will be individually evaluated.
Related • Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 272
Documentation
This example shows how to allow a wide range of metric values on IS-IS interfaces.
Requirements
Before you begin, configure IS-IS on both routers. See “Example: Configuring IS-IS” on
page 14 for information about the sample IS-IS configuration.
Overview
Figure 27 on page 273 shows the topology used in this example.
R1 R2
lo0:192.168.0.1 lo0:192.168.0.2
g041282
This example describes the steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
Results From configuration mode, confirm your configuration by entering the show protocols
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the interface has the expected metric.
Action From operational mode, enter the show isis interface extensive command.
Meaning The output shows that the metric is set to 100, as expected, at both Level 1 and Level 2.
Synchronization between the Label Distribution Protocol (LDP) and the underlying interior
gateway protocol (IGP) ensures that LDP is fully established before the IGP path is used
for forwarding traffic.
LDP is often used to establish MPLS label-switched paths (LSPs) throughout a complete
network domain using an IGP such as OSPF or IS-IS. In such a network, all links in the
domain have IGP adjacencies as well as LDP adjacencies. LDP establishes the LSPs on
the shortest path to a destination as determined by IP forwarding.
If the IGP and LDP are not synchronized, packet loss can occur. This issue is especially
significant for applications such as a core network that does not employ BGP. Another
example is an MPLS VPN where each provider edge (PE) router depends on the availability
of a complete MPLS forwarding path to the other PE devices for each VPN that it serves.
This means that along the shortest path between the PE routers, each link must have
an operational hello adjacency and an operational LDP session, and MPLS label bindings
must have been exchanged over each session.
LDP establishes MPLS LSPs along the shortest path to the destination as determined
by IP forwarding. In a Layer 2 VPN or Layer 3 VPN scenario, if the LSP is not yet formed
between the PE devices, services depending on MPLS forwarding fail. When LDP has not
completed exchanging label bindings with an IGP next hop, traffic is discarded if the head
end of the LSP forwards traffic because the LSP is assumed to be in place.
There are various reasons that the LSP fails to come up, as follows:
• When an LDP hello adjacency or an LDP session with a peer is lost due to some error
while the IGP still points to that peer. IP forwarding of traffic continues on the IGP link
associated with the LDP peer rather than being shifted to another IGP link with which
LDP is synchronized.
• When a new IGP link comes up, causing the next hop to a certain destination to change
in the IGP’s shortest-path-first (SPF) calculations. Although the IGP might be up on
the new link, LDP might not have completed label exchange for all the routes. This
condition might be transient or due to a misconfiguration.
LDP-IGP synchronization discourages a link from being used while the LDP sessions are
not fully established. When LDP is not fully operational on a link, the IGP advertises a
maximum cost for the link, thus preventing traffic from flowing through it. The IGP does
not advertise the original cost or metric for the link until either LDP label exchange has
been completed with the peer on the link or a configured amount of time has passed
(the holddown period).
When synchronization is configured, LDP notifies the IGP to advertise the maximum cost
for the link when one of the following triggering events takes place:
If the holddown timer has been configured, the timer starts when the triggering event
takes place. When the timer expires, LDP notifies the IGP to resume advertising the original
cost.
If the holddown timer has not been configured, the IGP waits (endlessly) until bindings
have been received from downstream routers for all the forwarding equivalence classes
(FECs) that have a next hop on that interface. Only after that takes place does LDP notify
the IGP to bring down the cost on the interface.
LDP-IGP synchronization is supported only for directly connected peers and links with
the platform label space.
• LDP is not yet operational on the link and no holddown timer has been configured.
During LDP graceful restart, no synchronization operations are done. If the LDP graceful
restart is terminated, LDP notifies the IGPs to advertise the links with the maximum
metric.
Related • Example: Configuring Synchronization Between IS-IS and LDP on page 277
Documentation
This example shows how to enable synchronization between IS-IS and LDP.
Requirements
Before you begin, configure IS-IS and LDP. For an example, see Example: Configuring a
Layer 3 VPN with Route Reflection and AS Override.
Overview
LDP distributes labels in non-traffic-engineered applications. Labels are distributed along
the best path determined by IS-IS. If the synchronization between LDP and IS-IS is lost,
the label-switched path (LSP) goes down. Therefore, LDP and IS-IS synchronization is
beneficial. When LDP synchronization is configured and when LDP is not fully operational
on a given link (a session is not established and labels are not exchanged), IS-IS advertises
the link with the maximum cost metric. The link is not preferred but remains in the network
topology.
To advertise the maximum cost metric until LDP is operational for LDP synchronization,
include the ldp-synchronization statement:
ldp-synchronization {
disable;
hold-time seconds;
}
To disable synchronization, include the disable statement. To configure the time period
to advertise the maximum cost metric for a link that is not fully operational, include the
hold-time statement.
NOTE: When an interface has been in the holddown state for more than
3 minutes, a system log message with a warning level is sent. This message
appears in both the messages file and the trace file.
AS 65534
AS 64512
10.0.0.0/30 10.0.0.4/30 10.0.0.8/30 10.0.0.12/30
.1 .2 .5 .6 .9 .10 .13 .14
CE1 PE1 P1 P2 PE2
.21 .25
.29 .17
lo0,0 Addresses
10.0.0.24/30
CE1 10.255.1.1 10.0.0.16/30
PE1 10.255.2.2
P1 10.255.3.3 .26 .18
P2 10.255.4.4 10.0.0.20/30 .22 .30
P3 10.255.7.7 P3 CE2
PE2 10.255.5.5 10.0.0.28/30
CE2 10.255.6.6 AS
64512
g041274
This example describes the steps on Device P1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
Results From configuration mode, confirm your configuration by entering the show protocols
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
If you are done configuring the device, enter commit from configuration mode. Repeat
the configuration on Device R2.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show isis interface extensive command.
IS-IS is a Layer 2 protocol that uses the Ethernet logical link control (LLC) encapsulation
format for exchanging information. IS-IS Layer 2 mapping ensures that forwarding
next-hop resolution is topology-driven rather than traffic-driven, which results in minimal
traffic loss while activating an Ethernet link.
Typically, IS-IS installs Layer 3 routes that point to Layer 2 next hops into the forwarding
table. Junos OS uses a Layer 3 anchor address notation to standardize the description
of a next hop. IS-IS uses Address Resolution Protocol (ARP) to map these IPv4 Layer 3
next-hop anchors to a Layer 2 Media Access Control (MAC) address and installs the
Layer 2 MAC addresses in the forwarding table for an Ethernet network. For IPv6 routes,
Junos OS uses neighbor discovery to resolve IPv6 Layer 3 next-hop anchors. The Routing
Engine installs a Layer 3 prefix along with the set of Layer 3 next-hop anchors for a route
in the forwarding table. This method of referencing a Layer 2 next hop using its Layer 3
anchor address in IS-IS networks has the following undesired ramifications:
• When a new route is added to the kernel, its forwarding next hop might not have been
resolved yet.
The advantages of address resolution using IS-IS Hello messages are as follows:
• Less Layer 2 resolution on core links because IS-IS already carries this information.
This example shows how to configure Layer 2 mapping for IS-IS, that is, mapping a Layer
2 MAC address to the IPv4 address of the forwarding next hop. Layer 2 mapping minimizes
traffic loss, provides better security, and reduces Layer 2 resolution processing on core
links while activating an Ethernet link.
Requirements
This example uses the following hardware and software components:
Overview
Layer 2 mapping ensures that the forwarding next-hop resolution is topology-driven
rather than traffic-driven. IS-IS LAN and point-to-point Hellos supply all relevant Layer
2 and Layer 3 binding address information for address resolution. The device at the
receiving end can use the information to populate the ARP or neighbor discovery cache
of the kernel even before the route installation time. When Layer 2 mapping is enabled,
IS-IS installs ARP or neighbor discovery next-hop entries into the forwarding table.
Because this provides Layer 2 next-hop bindings ahead of time, IS-IS networks do not
experience traffic loss while bringing up a link.
Topology
In Figure 29 on page 283, Router R1 is connected to Router R2. Layer 2 mapping is enabled
on Router R1. Router R2 receives the Layer 2 information from Router R1 and updates the
forwarding table.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
NOTE: Repeat this procedure for Router 2 after modifying the appropriate
interface names, addresses, and other parameters.
[edit interfaces]
user@R1# set ge-1/0/3 description R0–>R1_1
user@R1# set ge-1/0/3 unit 0 family inet address 192.10.1.1/24
user@R1# set ge-1/0/3 unit 0 family iso
user@R1# set ge-1/0/3 unit 0 family inet6 address
0000:0000:0000:0000:192:10:1:1/120
user@R1# set ge-1/0/3 unit 0 family mpls
[edit interfaces]
user@R1# set lo0 unit 0 family inet address 10.255.162.100/32
[edit routing-options]
user@R1# set router-id 10.255.162.100
4. Configure RSVP, MPLS, and LDP on all interfaces excluding the management
interface.
[edit protocols]
user@R1# set rsvp interface all
user@R1# set rsvp interface lo0.0
user@R1# set rsvp interface fxp0.0 disable
[edit protocols]
user@R1# set isis layer2-map
[edit protocols]
user@R1# set isis interface ge-1/0/3.0 level 2 disable
Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
[edit]
user@R1# show interfaces
ge-1/0/3 {
description 0–>R1_1;
unit 0 {
family inet {
address 192.10.1.1/24;
}
family iso;
family inet6 {
address 0000:0000:0000:0000:192:10:1:1/120;
}
family mpls;
}
}
ge-1/0/7 {
description R0–>RT0;
unit 0 {
family inet {
address 193.1.1.1/30;
}
family iso;
family inet6 {
address 0000:0000:0000:0000:193:1:1:1/120;
}
family mpls;
}
}
ge-1/1/1 {
description R0–>R1_2;
unit 0 {
family inet {
address 192.10.2.1/30;
}
family iso;
family inet6 {
address 0000:0000:0000:0000:192:10:2:1/120;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 10.255.162.100/32;
}
}
[edit]
user@R1# show protocols
rsvp {
interface all;
interface lo0.0;
interface fxp0.0 {
disable;
}
}
mpls {
interface all;
interface lo0.0;
interface fxp0.0 {
disable;
}
}
isis {
layer2-map;
}
ldp {
interface all;
interface fxp0.0 {
disable;
}
interface lo0.0;
}
[edit]
user@R1# show routing-options
router-id 10.255.162.100;
user@R1# commit
Verification
Confirm that the configuration is working properly.
Purpose Verify that the expected adjacencies have formed between Router R1 and Router R2.
Action From operational mode, run the show isis adjacency command on Router R1.
Meaning The interface ge-1/0/3.0 on Router R1 has established adjacency with Router R2.
Action From operational mode, run the show isis interface detail command on Router R1.
Meaning The output confirms that Layer 2 mapping is enabled on Router R1.
Purpose Display Layer 3 next hop and the mapped data link address in the kernel for the routing
instances.
Action From operational mode, run the show isis layer2-map command on Router R1.
IPv4 records: 1
IPv6 records: 1
Meaning The Layer 2 MAC address of the next hop is mapped to the IP address of interface
ge-1/0/3.0 in the kernel.
Starting with Junos OS Release 17.3R1, segment routing for IS-IS and OSPFv2 is supported
on QFX5110 and QFX5200 switches.
Essentially segment routing engages IGPs like IS-IS and OSPF for advertising two types
of network segments or tunnels:
• First, a strict forwarded single-hop tunnel that carries packets over a specific link
between two nodes, irrespective of the link cost, referred to as adjacency segments.
• Second, a multihop tunnel using shortest path links between two specific nodes,
referred to as node segments.
Ingress routers can steer a packet through a desired set of nodes and links by
pre-appending the packet with an appropriate combination of tunnels.
Segment routing leverages the source routing paradigm. A node steers a packet through
an ordered list of instructions, called segments. A segment can represent any instruction,
topological or service-based. A segment can have a local semantic to a segment routing
node or to a global node within a segment routing domain. Segment routing enforces a
flow through any topological path and service chain while maintaining per-flow state
only at the ingress node to the segment routing domain. Segment routing can be directly
applied to the MPLS architecture with no change on the forwarding plane. A segment is
encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels.
The segment to process is on the top of the stack. Upon completion of a segment, the
related label is popped from the stack. Segment routing can be applied to the IPv6
architecture, with a new type of routing extension header. A segment is encoded as an
IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses
in the routing extension header. The segment to process is indicated by a pointer in the
routing extension header. Upon completion of a segment, the pointer is incremented.
Traffic engineering shortcuts are enabled for labeled IS-IS segment routes, when you
configure shortcuts at the following hierarchy levels:
When source packet routing is deployed in the network, the data center, backbone, and
peering devices, switch MPLS packets with a label stack built by the source of the traffic;
for example, data center servers. In Junos OS Release 17.4R1, the source-routed traffic
co-exists with traffic taking RSVP signaled paths, and source routing is implemented as
regular label switching through mpls.0 table using the label operations – pop, swap (to
the same label value), and swap-push (for interface protection). In all the cases, traffic
can be load balanced between multiple Layer 3 interfaces, or within an aggregate
interface. Starting in Junos OS Release 17.4R1, the traffic statistics in a segment routing
network can be recorded in an OpenConfig compliant format for the Layer 3 interfaces.
The statistics is recorded for the Source Packet Routing in Networking (SPRING) traffic
only, excluding RSVP and LDP-signaled traffic, and the family MPLS statistics per interface
is accounted for separately. The SR statistics also includes SPRING traffic statistics per
link aggregation group (LAG) member, and per segment identifier (SID). To enable
recording of segment routing statistics, include sensor-based-stats statement at the
[edit protocol isis source-packet-routing] hierarchy level.
Prior to Junos OS Release 19.1R1, sensors were available for collecting segment routing
statistics for MPLS transit traffic only, which is MPLS-to-MPLS in nature. Starting in Junos
OS Release 19.1R1, on MX Series routers with MPC and MIC interfaces and PTX Series
routers, additional sensors are introduced to collect segment routing statistics for MPLS
ingress traffic, which is IP-to-MPLS in nature. With this feature, you can enable sensors
for label IS-IS segment routing traffic only, and stream the statistics to a gRPC client.
You can enable the segment routing statistics for MPLS ingress traffic using the egress
option under the per-sid configuration statement. The resource name for the per-sid
egress functionality is:
/junos/services/segment-routing/sid/egress/usage/
You can view the label IS-IS route association with the sensors using the show isis spring
sensor info command output. This command does not display counter values of the
actual sensors.
The segment routing statistics records are exported to a server. You can view segment
routing statistics data from the following the OpenConfig paths:
• /mpls/signaling-protocols/segment-routing/aggregate-sid-counters/aggregate-sid-counter[ip-addr='L-ISIS-1.1.1.1']/state/counters[name='oc-xxx']/out-pkts
• /mpls/signaling-protocols/segment-routing/aggregate-sid-counters/aggregate-sid-counter[ip-addr='L-ISIS-1.1.1.1']/state/counters[name='oc-xxx']/out-pkts
NOTE:
• Graceful Routing Engine switchover (GRES) is not supported for segment
routing statistics.
Nonstop active routing (NSR) is not supported for label IS-IS. During a
Routing Engine switchover, a new sensor is created in the new master
Routing Engine, replacing the sensor created by the previous master Routing
Engine. As a result, at the time of a Routing Engine switchover, the segment
routing statistics counter start from zero.
In case of graceful restart, the existing sensor is deleted and a new sensor
is created during IS-IS initialization. The segment routing statistics counter
restarts from zero.
19.1R1 Starting in Junos OS Release 19.1R1, on MX Series routers with MPC and MIC
interfaces and PTX Series routers, additional sensors are introduced to collect
segment routing statistics for MPLS ingress traffic, which is IP-to-MPLS in nature.
With this feature, you can enable sensors for label IS-IS segment routing traffic
only, and stream the statistics to a gRPC client.
17.4R1 Starting in Junos OS Release 17.4R1, the traffic statistics in a segment routing
network can be recorded in an OpenConfig compliant format for the Layer 3
interfaces.
17.3R1 Starting with Junos OS Release 17.3R1, segment routing for IS-IS and OSPFv2 is
supported on QFX5110 and QFX5200 switches.
17.2R1 Starting with Junos OS Release 17.2R1, segment routing for IS-IS and OSPFv2 is
supported on QFX5100 and QFX10000 switches.
Starting in Junos OS Release 17.2R1, you can define the SRGB for the IS-IS protocol, and
provide prefix anycast segments in addition to node segments to prefixes that are
advertised by the IS-IS protocol through policy configuration. Junos OS also extends
support to SPRING anycast segments and configurable adjacency segment indexes for
the IS-IS protocol.
• Benefits of Anycast Segments, Adjacency Segments, and Configurable SRGB on page 293
• Configurable Segment Routing Global Block on page 293
• Adjacency Segments and Prefix Segments on page 294
• Configuring the adjacency hold time helps retain segments for a specified period of
time after a link flaps and ensures faster convergence after a link fails.
• Configuring the SRGB label range ensures that the labels are more predictable across
segment routing domain.
• Adjacency segments—A strict forwarded single-hop tunnel that carries packets over
a specific link between two nodes, irrespective of the link cost.
• Prefix segments—A multihop tunnel that uses equal cost multi-hop aware shortest
path links to reach a prefix. The prefix SID supports both IPv4 and IPv6 prefixes. A node
segment is a special case of prefix segment that uses shortest path links between two
specific nodes. An anycast segment is also a type of prefix segment that identifies a
set of routers to advertise the same prefix with the same SID value.
The IS-IS protocol creates adjacency segments per adjacency, level, and address family
(one each for IPv4 and IPv6). An MPLS label is allocated for each adjacency segment
that gets created. These labels are allocated after the adjacency status of the segment
changes to the up state. Starting in Junos OS Release 17.2R1, you can configure a hold
time to ensure that IS-IS does not release the segments immediately after a link flaps
or goes down, but retains them for the configured hold time duration.
The OSPF protocol creates adjacency segments per adjacency. To ensure adjacency
segments are retained during adjacency or link flaps, the adjacency segments are not
released immediately during the link down. The default hold time for adjacency segments
is 180 seconds.
Currently, Junos OS enables you to configure a SPRING node SID for IPv4 and IPv6 address
families for each routing instance. This node SID is attached to an IPv4 and IPv6 router ID
if the router ID is configured on the loopback interface. Otherwise, the lowest IP address
assigned to the loopback interface is chosen as the node SID. Configuring a node SID
through policy allows you to choose the loopback address that gets the node SID. If the
node SID configuration exists and a policy is defined for node SID selection for the same
prefix, then the policy configuration takes precedence.
Starting in Junos OS Release 17.2R1, you can designate prefix segment indexes to prefix
SIDs, both anycast and node SIDs, that are advertised in IS-IS through policy configuration.
Remote routers use this index to consolidate prefixes into respective SRGBs and to derive
the segment identifier and forward the traffic destined for a specific prefix. After the
prefix segment indexes are provisioned, the devices running Junos OS advertise them in
one or more of the following IS-IS TLV types by using a new Prefix-SID Sub-TLV (type
3):
Starting in Junos OS Release 19.1, you can similarly designate prefix segment indexes to
prefix SIDs, both anycast and node SIDs, that are advertised in OSPF through policy
configuration. Remote routers use this index to consolidate prefixes into respective SRGBs
and to derive the segment identifier and forward the traffic destined for a specific prefix.
Anycast Segments
An IGP anycast segment is an IGP prefix segment that identifies a set of routers. An
anycast segment enforces forwarding based on the equal-cost multipath-aware
shortest-path toward the closest node of the anycast set. Within an anycast group, all
the routers advertise the same prefix with the same SID value, which facilitates load
balancing.
17.2R1 Starting in Junos OS Release 17.2R1, you can define the SRGB for the IS-IS protocol,
and provide prefix anycast segments in addition to node segments to prefixes that
are advertised by the IS-IS protocol through policy configuration. Junos OS also
extends support to SPRING anycast segments and configurable adjacency segment
indexes for the IS-IS protocol.
17.2R1 Starting in Junos OS Release 17.2R1, you can configure a hold time to ensure that
IS-IS does not release the segments immediately after a link flaps or goes down,
but retains them for the configured hold time duration.
Related • Configuring Anycast and Prefix segments in SPRING for IS-IS Protocol on page 327
Documentation
• Configuring Segment Routing Global Blocks Label Ranges in SPRING for IS-IS Protocol
on page 325
• Example: Configuring Segment Routing Global Blocks in SPRING for IS-IS to Increase
Network Speed on page 295
Example: Configuring Segment Routing Global Blocks in SPRING for IS-IS to Increase
Network Speed
This example shows how to define the segment routing label block (SRGB) label range
for segment packet routing in networking (SPRING) or segment routing (SR) for the IS-IS
protocol. This configuration ensures that the labels are more predictable across the
segment routing domain and thereby increasing the speed of the network.
Requirements
This example uses the following hardware and software components:
Before you configure the SRGB label range for SPRING in the IS-IS domain, be sure you
configured the routing and signaling protocols.
Overview
Currently, Junos OS allows you to configure only node segment indices. The value of the
start label depends on the dynamic label available in the system. Because there is no
predictability of the dynamic label range being allocated to the SRGB, Junos OS allows
you to configure the SRGB label range used by SPRING. The labels in the SRGB range
are used for SPRING in the IS-IS domain. This means the labels advertised are more
predictable and deterministic across the SPRING domain.
Topology
R1 R2
ge-0/0/0 ge-0/0/0
192.0.2.1/24 192.0.2.2/24
lo0:
g043721
198.51.100.1/24
198.51.100.2/24
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Configuring Device R1
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
NOTE: Repeat this procedure for device R2 after modifying the appropriate
interface names, addresses, and other parameters.
[edit interfaces]
user@R1# set ge-0/0/0 unit 0 family inet address 192.0.2.1/24
user@R1# set ge-0/0/0 unit 0 family iso
user@R1# set ge-0/0/0 unit 0 family inet6 address 2001:db8:1:1::1/128
user@R1# set ge-0/0/0 unit 0 family mpls
7. Disable level 1, configure the IS-IS protocol on the interface, and configure loopback
interface lo0.0 as passive..
Results
From configuration mode, confirm your configuration by entering the show chassis, show
interfaces, and show protocols commands. If the output does not display the intended
configuration, repeat the instructions in this example to correct the configuration.
network-services enhanced-ip;
Verification
Confirm that the configuration is working properly.
Action From operational mode, run the show isis adjacency command to display the IS-IS neighbor
information.
Meaning The output displays the IS-IS neighbor information of device R1.
Action From operational mode, run the show isis overview command to display the IS-IS overview
information.
Instance: master
Router ID: 198.51.100.1
Hostname: R1
Sysid: 0010.0100.1001
Areaid: 49.0001
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled, SPRING based MPLS is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Layer2-map: Disabled
Source Packet Routing (SPRING): Enabled
SRGB Config Range:
SRGB Start-Label : 400000, SRGB Index-Range : 4000
SRGB Block Allocation: Success
SRGB Start Index : 400000, SRGB Size : 4000, Label-Range: [ 400000, 403999
]
Node Segments: Enabled
Ipv4 Index : 2001, Ipv6 Index : 3001
Level 1
Internal route preference: 15
External route preference: 160
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Source Packet Routing is enabled
Level 2
Internal route preference: 18
External route preference: 165
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Source Packet Routing is enabled
Meaning The output displays the IS-IS overview information along with SPRING information.
Action From operational mode, run the show route protocol isis command to display the IS-IS
route information.
2400:20:20:20::1/128
*[L-ISIS/14] 00:17:23, metric 10
> to 2001:db8:0000:205:86ff:fe7e:cc00 via ge-0/0/0.0
Meaning The output displays the IS-IS route information along with segment routing information.
Purpose Verify the route information of SRGB label 402002 of IPv4 node 2002.
Action From operational mode, run the show route label 402002 extensive command to display
the route information of label 402002 of IPv4 node 2002.
Meaning The output displays the details of the SRGB label 402002 of IPv4 node 2002.
Meaning The output displays forwarding table information of SRGB label 402002 of IPv4 node
2002.
Meaning The output displays forwarding table information of SRGB label 403002 of IPv6 node
3002.
Meaning The output displays forwarding table information of SRGB label 403002 of IPv6 node
3002.
• Configuring Segment Routing Global Blocks Label Ranges in SPRING for IS-IS Protocol
on page 325
Example: Configuring Anycast and Prefix Segments in SPRING for IS-IS to Increase
Network Speed
This example shows how to configure prefix segments, segment-routing global blocks
(SRGBs), adjacency segments hold time, and explicit null flag for prefix segments in
source packet routing in networking (SPRING) or segment routing (SR).This configuration
helps in simplifying the network thereby increasing the speed of the network.
Requirements
This example uses the following hardware and software components:
Before you configure prefix segments in SPRING, be sure you configure routing and
signaling protocols.
Overview
In Junos OS Release 17.2 or later, you can provide prefix segment identifier (SID) and node
SID to prefixes that are advertised in IS-IS by configuring policies. Prefix segment index
is the index assigned to a specific prefix. This is used by all other remote routers in the
network to index the prefix into respective segment-routing global blocks (SRGBs) to
derive the segment identifier and to forward the traffic destined for this prefix. The prefix
SID supports both IPv4 and IPv6 prefixes. An IGP anycast segment is an IGP prefix segment
that identifies a set of routers. An anycast segment or anycast SID enforces forwarding
based on the equal-cost multipath-aware shortest-path towards the closest node of
the anycast set. Within an anycast group, all the routers advertise the same prefix with
the same SID value. The IS-IS protocol creates adjacency segments per adjacency, level,
and address family (one each for IPv4 and IPv6).
Topology
Figure 1 shows SRGBs, prefix segments, and adjacency hold time configured in SPRING
on routers R0 to R7.
R1 R2 R3
ge-0/0/0 ge-0/0/1 ge-0/0/0 ge-0/0/1 ge-0/0/0 ge-0/0/1
192.0.2.2/24 10.0.2.1/24 10.0.2.2/24 10.0.3.1/24 10.0.3.2/24 10.0.4.1/24
ge-0/0/2 ge-0/0/1
192.0.2.1/24 10.0.4.2/24
R0 R7
ge-0/0/0 ge-0/0/2
10.0.1.1/24 10.0.7.1/24
R4 R5 R6
ge-0/0/1 ge-0/0/0 ge-0/0/1 ge-0/0/0 ge-0/0/0 ge-0/0/1
10.0.1.2/24 10.0.6.1/24 10.0.6.2/24 10.0.5.2/24 10.0.5.1/24 10.0.7.2/24
lo0:
203.0.113.1/24
203.0.113.2/24
203.0.113.3/24
203.0.113.4/24
203.0.113.5/24
g043727
203.0.113.6/24
203.0.113.7/24
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
NOTE: This topology demonstrates IPv4 prefixes. The same is applicable for
IPv6 prefixes.
Configuring Router R4
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
NOTE: Repeat this procedure for every router in the SPRING domain, after
modifying the appropriate interface names, addresses, and any other
parameters for each router.
1. Configure enhanced IP mode on the MX Series router because the SRGB functionality
is supported on routers with MPCs and MIC interfaces only. A system reboot is
required after you commit this configuration.
[edit chassis]
user@R4# set network-services enhanced-ip
[edit interfaces]
user@R4# set ge-0/0/0 vlan-tagging
user@R4# set ge-0/0/0 unit 1 vlan-id 1
user@R4# set ge-0/0/0 unit 1 family inet address 10.0.6.2/24
user@R4# set ge-0/0/0 unit 1 family iso
user@R4# set ge-0/0/0 unit 1 family mpls
[edit routing-options]
user@R4# set router-id 203.0.113.5
[edit routing-options]
user@R4# set forwarding-table export pplb
9. Configure adjacency segment hold time in SPRING for the IS-IS protocol.
10. Configure the start label and index range for segment routing global blocks (SRGBs)
in SPRING for the IS-IS protocol.
12. Configure the interfaces to protect from both link and node faults.
13. Disable the management interface and configure the loopback address as passive
for the IS-IS protocol.
14. Configure per packet load balancing for the routing policy.
15. Configure the route filter for the routing policy term.
16. Configure the index and node segment of the prefix segment for the routing policy
term.
Results
From configuration mode, confirm your configuration by entering the show chassis, show
interfaces, show protocols, show policy-options, and show routing-options commands.
If the output does not display the intended configuration, repeat the instructions in this
example to correct the configuration.
isis {
export prefix-sid;
backup-spf-options {
remote-backup-calculation;
use-source-packet-routing;
}
source-packet-routing {
adjacency-segment hold-time 240000;
srgb start-label 800000 index-range 40000;
explicit-null;
}
interface ge-0/0/0.1 {
node-link-protection;
}
interface ge-0/0/1.1 {
node-link-protection;
}
interface all {
node-link-protection;
}
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show isis adjacency detail command.
R5
Interface: ge-0/0/0.0, Level: 1, State: Up, Expires in 25 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 23:55:22 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:86:e:2b:0
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.02, IP addresses: 10.0.6.2
Level 1 IPv4 Adj-SID: 16
R5
Interface: ge-0/0/0.0, Level: 2, State: Up, Expires in 25 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 23:55:22 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:86:e:2b:0
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.02, IP addresses: 10.0.6.2
Level 2 IPv4 Adj-SID: 17
R0
Interface: ge-0/0/1.0, Level: 1, State: Up, Expires in 7 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 23:49:06 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:86:5e:8e:1
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R1.02, IP addresses: 10.0.1.1
Level 1 IPv4 Adj-SID: 18
R0
Interface: ge-0/0/1.0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 23:49:06 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:86:5e:8e:1
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R1.02, IP addresses: 10.0.1.1
Level 2 IPv4 Adj-SID: 19
Meaning The output shows the IS-IS adjacency details of Router R4 with Router R0 and R5.
Action From operational mode, enter the show isis overview command.
Instance: master
Router ID: 203.0.113.5
Hostname: R4
Sysid: 0100.0404.0404
Areaid: 47.0005.80ff.f800.0000.0108.0001
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled, SPRING based MPLS is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Layer2-map: Disabled
Source Packet Routing (SPRING): Enabled
SRGB Config Range:
SRGB Start-Label : 800000, SRGB Index-Range : 40000
SRGB Block Allocation: Success
SRGB Start Index : 800000, SRGB Size : 40000, Label-Range: [ 800000, 839999
]
Node Segments: Disabled
Level 1
Internal route preference: 15
External route preference: 160
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Source Packet Routing is enabled
Level 2
Internal route preference: 18
External route preference: 165
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Source Packet Routing is enabled
Meaning The output displays the IS-IS overview information of the routing instance along with
the SPRING details of Router R4.
Verifying the Segment Routing Route Entries for the IS-IS Protocol
Purpose Verify the segment routing route entries of the routing table inet.3 for the IS-IS protocol.
Action From operational mode, enter the show route table inet.3 protocol isis command.
Meaning The output shows the segment routing routes of routing table inet.3 for the IS-IS protocol.
Verifying the MPLS Segment Routing Route Entries for the IS-IS Protocol
Purpose Verify the MPLS segment routing route entries for the IS-IS protocol.
Action From operational mode, enter the show route table mpls.0 protocol isis command.
Meaning The output shows the MPLS segment routing route entries for protocol IS-IS.
Related • Configuring Anycast and Prefix segments in SPRING for IS-IS Protocol on page 327
Documentation
• Configuring Segment Routing Global Blocks Label Ranges in SPRING for IS-IS Protocol
on page 325
• Example: Configuring Segment Routing Global Blocks in SPRING for IS-IS to Increase
Network Speed on page 295
Configuring Segment Routing Global Blocks Label Ranges in SPRING for IS-IS Protocol
Before you configure SPRING SRGB for ISIS protocol, you must:
• Configure ISIS.
1. Configure the start-label and index-range of SRGB. The start label value indicates
the start of the SPRING label block and the index range along with the start label
indicate the end of the label block.
NOTE: The default value for the index range is 4096. This causes chunks
of 256 label blocks being dynamically allocated by the label manager
depending on the availability.
For example, configure SRGB with start-label 800,000 and index-range 40,000. The
start label of the SPRING label block is 800,000 and the end of the label block is
840,000.
NOTE: Ensure that the labels in the SRGB label range are not used by any
other applications. If a label in the configured label range is used by another
application, then a syslog error message RPD_ISIS_SRGBALLOCATIONFAIL
is logged to indicate that the label manager is unable to allocate the
requested SRGB label range. To free up the configured label range, check
the label ranges configured at the [edit protocol mpls label-range] hierarchy
level and re-configure the SRGB label range with a label range that is
available and restart the routing protocol process (RPD).
• Example: Configuring Segment Routing Global Blocks in SPRING for IS-IS to Increase
Network Speed on page 295
Before you configure SPRING SRGB, prefix SID, and anycast SID for the IS-IS protocol,
you must:
• Configure IS-IS.
To configure device R1 with SPRING SRGB, prefix SID, and anycast SID for IS-IS protocols:
For example, configure SRGB with start-label 800000 and index-range 40000 .
2. Configure the routing policy to match a route (IPv4 or IPv6 ) exactly. Configure the
index and the node segment of the prefix segment for a given term and accept the
routing policy.
For example, configure the routing policy to match the IPv4 route exactly. Configure
the index and the node segment of the prefix segment for a given term and accept
the routing policy.
For example, configure the routing policy to match the IPv6 route exactly. Configure
the index and the node segment of the prefix segment for a given term and accept
the routing policy.
3. Configure the index and the node segment of the prefix segment for a given term and
accept the routing policy.
For example, configure the prefix segment with index 1004 and the node segment for
term 1 of policy statement prefix SID and accept the routing policy.
4. Configure the routing policy with the same prefix (IPv4 or IPv6 )and same prefix
segment on more than one routers for anycast SID.
NOTE: For anycast prefix SID, configure prefix SID on loopback interface(
lo0.0).
For example, configure IPv4 prefix 198.51.100.1/32 with prefix segment 1000 on two
routers R0 and R1 for anycast SID.
For example, configure IPv6 prefix 2001:db8::/32 with prefix segment 1000 on two
routers R0 and R1 for anycast SID.
8. Configure explicit NULL to enable E and P bits in all prefix SID advertisements.
For example, configure adjacency segments with 240,000 milliseconds hold time.
Segment routing enables a router to send a packet along a specific path in the network
by imposing a label stack that describes the path. The forwarding actions described by
a segment routing label stack do not need to be established on a per-path basis. Therefore,
an ingress router can instantiate an arbitrary path using a segment routing label stack
and use it immediately without any signaling.
In segment routing, each node advertises mappings between incoming labels and
forwarding actions. A specific forwarding action is referred to as a segment and the label
that identifies that segment is referred to as a segment identifier (SID). The backup paths
created by TI-LFA use the following types of segments:
• Node segment—A node segment forwards packets along the shortest path or paths
to a destination node. The label representing the node segment (the node SID) is
swapped until the destination node is reached.
A router can send a packet along a specific path by creating a label stack that uses a
combination of node SIDs and adjacency SIDs. Typically, node SIDs are used to represent
parts of the path that correspond to the shortest path between two nodes. An adjacency
SID is used wherever a node SID cannot be used to accurately represent the desired path.
Loop-free alternate (LFA) and remote LFA (RLFA) have been used to provide fast-reroute
protection for several years. With LFA, a point of local repair (PLR) determines whether
or not a packet sent to one of its direct neighbors reaches its destination without looping
back through the PLR. In a typical network topology, approximately 40 to 60 percent of
the destinations can be protected by LFA. Remote LFA expands on the concept of LFA
by allowing the PLR to impose a single label to tunnel the packet to a repair tunnel
endpoint from which the packet can reach its destination without looping back through
the PLR. Using remote LFA, more destinations can be protected by the PLR compared
to LFA. However, depending on the network topology, the percentage of destinations
protected by remote LFA is usually less than 100 percent.
Topology-independent LFA (TI-LFA) extends the concept of LFA and remote LFA by
allowing the PLR to use deeper label stacks to construct backup paths. In addition, the
TI-LFA imposes the constraint that the backup path used by the PLR be the same path
that a packet takes once the interior gateway protocol (IGP) has converged for a given
failure scenario. This path is referred to as the post-convergence path.
Using the post-convergence path as the backup path has some desirable characteristics.
For some topologies, a network operator only needs to make sure that the network has
enough capacity to carry the traffic along the post-convergence path after a failure. In
these cases, a network operator does not need to allocate additional capacity to deal
with the traffic pattern immediately after the failure while the backup path is active,
because the backup path follows the post-convergence path.
TI-LFA provides protection against link failure, node failure, and fate-sharing failures. In
link failure mode, the destination is protected if the link fails. In node protection mode,
the destination is protected if the neighbor connected to the primary link fails. To
determine the node-protecting post-convergence path, the cost of all the links leaving
the neighbor is assumed to increase by a configurable amount.
With fate-sharing protection, a list of fate-sharing groups are configured on each PLR
with the links in each fate-sharing group identified by their respective IP addresses. The
PLR associates a cost with each fate-sharing group. The fate-sharing-aware
post-convergence path is computed by assuming that the cost of each link in the same
fate-sharing group as the failed link has increased the cost associated with that group.
In order to construct a backup path that follows the post-convergence path, TI-LFA uses
several labels in the label stack that define the backup path. If the number of labels
required to construct a particular post-convergence backup path exceeds a certain
amount, it is useful in some circumstances to not install that backup path. You can
configure the maximum number of labels that a backup path can have in order to be
installed. The default value is 3, with a range of 2 through 5.
It is often the case that the post-convergence path for a given failure is actually a set of
equal-cost paths. TI-LFA attempts to construct the backup paths to a given destination
using multiple equal-cost paths in the post-failure topology. Depending on the topology,
TI-LFA might need to use different label stacks to accurately construct those equal-cost
backup paths. By default, TI-LFA only installs one backup path for a given destination.
However, you can configure the value in the range from 1 through 8.
Starting in Junos OS Release 19.1R1, you can configure a point of local repair (PLR) to
create a topology independent loop-free alternate backup path for prefix-SIDs derived
from LDP mapping server advertisements in an IS-IS network. In a network configured
with segment routing, IS-IS uses the LDP mapping server advertisements to derive
prefix-SIDs. LDP mapping server advertisements for IPv6 are currently not supported.
To attach flags to LDP mapping server advertisements, include the attached,
domain-wide-flooding, and no-node-segment statements at the [edit routing-options
source-packet-routing mapping-server-entry mapping-server-name] hierarchy level.
The backup path for prefix-SIDs from LDP mapping server advertisements are not created
in the following scenarios:
• If the segment routing node is advertising a prefix and a prefix-SID index directly, then
Junos OS uses the prefix-SID index and disregards the mapping server advertisement
for that prefix.
• If a backup path requires an adjacency-SID from the LDP domain then the backup path
cannot be installed.
NOTE: Currently you cannot configure remote LFA and TI-LFA on a SR-LDP
stitching node in the same instance. Therefore, you cannot configure both
post-convergence-lfa and link-protection on the same device.
Set the following mapping server advertisement flags to indicate the origin of the
advertised prefix:
D Label Binding TLV 0, 1 1 Set by a border node when readvertising a SID or Label Binding
TLV to indicate that the SID or Label Binding TLV is leaked
default value is 0 from level 2 to level 1.
19.1R1 Starting in Junos OS Release 19.1R1, you can configure a point of local repair
(PLR) to create a topology independent loop-free alternate backup path for
prefix-SIDs derived from LDP mapping server advertisements in an IS-IS
network.
Loop-free alternate (LFA) and remote LFA have been used to provide fast-reroute
protection for several years. With LFA, a point of local repair (PLR) determines whether
or not a packet sent to one of its direct neighbors will reach its destination without looping
back through the PLR. In a typical network topology, perhaps 40-60 percent of
destinations can be protected by LFA. Remote LFA expands on the concept of LFA by
allowing the PLR to impose a single label to tunnel the packet to a repair tunnel endpoint
from which the packet can reach its destination without looping back through the PLR.
Using remote LFA, more destinations can be protected by the PLR compared to LFA.
However, depending on the network topology, the percentage of destinations protected
by remote LFA usually less than 100 percent.
Using the post-convergence path as the backup path has some desirable characteristics.
For some topologies, a network operator only needs to make sure that the network has
enough capacity to carry the traffic along the post-convergence path after a failure. In
these cases, a network operator does not need to allocate additional capacity to deal
with the traffic pattern immediately after the failure while the backup path is active,
because the backup path follows the post-convergence path.
Before you configure TI-LFA for IS-IS, be sure you configure SPRING or segment routing.
To configure TI-LFA using SPRING for IS-IS, you must do the following:
2. (Optional) Configure backup shortest path first (SPF) attributes such as maximum
equal-cost multipath (ECMP) backup paths and maximum labels for TI-LFA for the
IS-IS protocol.
3. Configure the computation and installation of a backup path that follows the
post-convergence path on the given interface and level for the IS-IS protocol.
4. (Optional) Enable fate-sharing protection for a given interface and level. Specify the
fate-sharing group to use as a constraint for the post-convergence path.
NOTE: TI-LFA supports protection of routes for both IPv4 and IPv6 prefixes.
This example demonstrates protection of routes for IPv4 prefixes.
Requirements
This example uses the following hardware and software components:
Before you configure TI-LFA routes using SPRING for IS-IS, be sure you configure SPRING
or segment routing.
Overview
Junos OS allows you to enable TI-LFA for IS-IS by configuring the use-post-convergence-lfa
statement at the [edit protocols isis backup-spf-options] hierarchy level. TI-LFA provides
protection against link failure, node failure, and failures of fate-sharing groups. You can
enable the creation of post-convergence backup paths for a given interface by configuring
the post-convergence-lfa statement at the [edit protocols isis interface interface-name
level level] hierarchy level. The post-convergence-lfa statement enables link-protection
mode. You can enable node-protection mode, or fate-sharing-protection mode ,or both
modes, for a given interface at the [edit protocols isis interface interface-name level level
post-convergence-lfa] hierarchy level. To ensure that the fate-sharing protection is
enabled for a given fate-sharing group, you need to configure the
use-for-post-convergence-lfa statement at the [edit routing-options fate-sharing group
group-name] hierarchy level
Topology
Figure 30 on page 338 shows TI-LFA with segment routing for IS-IS configured on Device
R1.
Figure 30: Topology-Independent Loop-Free Alternate with Segment Routing for IS-IS
R24 R3 R34
ge-0/0/0 ge-0/0/0 ge-0/0/1 10 ge-0/0/1
10.10.60.2/30 10 10.10.60.1/30 10.10.70.1/30 10.10.70.2/30
ge-0/0/2 ge-0/0/3 ge-0/0/0
10.10.100.2/30 10.10.40.2/30 10.10.110.2/30
20 10
ge-0/0/2 ge-0/0/3
10.10.100.1/30 10.10.40.1/30
ge-0/0/1 10 ge-0/0/1
R23 R2
10.10.50.2/30 10.10.50.1/30
ge-0/0/0 ge-0/0/2
10.10.90.2/30 10.10.10.2/30
90 500
ge-0/0/0
10.10.90.1/30
R22 10
ge-0/0/1
10.10.80.2/30
10
lo0:
R1 192.168.0.1/32
R2 192.168.0.2/32
R3 192.168.0.3/32
R21 192.168.0.21/32
R22 192.168.0.22/32
R23 192.168.0.23/32
R24 192.168.0.24/32
g043651
R31 192.168.0.31/32
R34 192.168.0.34/32
Configuration
CLI Quick To quickly configure link-protection in this example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
Configuring R1
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R1# set ge-0/0/0 unit 0 family inet address 10.10.20.1/30
user@R1# set ge-0/0/0 unit 0 family iso
user@R1# set ge-0/0/0 unit 0 family mpls
[edit routing-options]
user@R1# set router-id 192.168.0.1
4. Configure the maximum number of labels for segment routing routed paths for
protection of backup shortest-path-first attributes.
5. Configure IPv4 index and index range for node segments in segment routing for the
IS-IS protocol.
6. Configure wide metrics attribute of global level for the IS-IS protocol.
7. Configure the interfaces to be point to point. Configure to install backup route along
the link-protecting post-convergence path on the interface ge-0/0/2. .
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
address 49.0000.2222.0001.00;
}
family mpls;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
• Verify the Link-protecting Backup Path for an Ingress Route on page 346
• Verify the Adjacency SID used in the Link-protecting Backup Path on page 346
• Verify the Link-protecting Backup Path for a Node SID label on page 347
• Verify the Link-protecting Backup Path for an Adjacency SID Label on page 347
Purpose Verify the link-protecting backup path for primary next hops on interface ge-0/0/2 for
Device R1 and verify if the backup path to reach 192.168.0.3/32 has been created and has
the correct label stack.
Action From operational mode, run the show route table inet.3 192.168.0.3 command to display
the routing table information.
Meaning The primary path to reach 198.162.0.3/32 (corresponding to Device R3) is through the
interface ge-0/0/2 with a label of 800003, corresponding to the node-SID of Device R3.
If the interface ge-0/0/2 fails, the backup path using the interface ge-0/0/0 using the
label stack [800022, 299792, 800003] becomes active. The link-protecting
post-convergence path is R1-R21-R22-R23-R2-R3. The top label on the label stack is
800022 and corresponds to the node SID to reach R22 on the shortest path R1-R2-R22.
The next label (299792) corresponds to the adjacency SID for the interface R22-R23.
The last label (800003) corresponds to the node SID on R23 to reach R3 on the shortest
path R23-R2-R3.
Purpose Verify that the adjacency SID 299792 corresponds to the interface between R22-R23.
Action From operational mode, run the show isis adjacency detail R23 command to display the
adjacency information.
R23
Interface: ge-0/0/0, Level: 2, State: Up, Expires in 23 secs
Priority: 0, Up/Down transitions: 1, Last transition: 00:24:28 ago
Circuit type: 2, Speaks: IP
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.10.90.2
Level 2 IPv4 Adj-SID: 299792
Meaning The Device R22 has assigned the value of 299792 to represent the level 2 adjacency to
Device R23 for IPv4 traffic.
Purpose Verify that the transit route in mpls.0 corresponding to the node SID to reach Device R3
has a link-protecting backup path.
Action From operational mode, run the show route table mpls.0 label 800003 command to
display the adjacency information.
Meaning An incoming label of 800003 corresponds to the node SID for Device R3. The primary
route entry in mpls.0 corresponds to the swap of the incoming label 800003 with the
outgoing label 800003 on interface ge-0/0/2, corresponding to the shortest path from
Device R1 to Device R3 in the pre-failure topology. If interface ge-0/0/2 fails, the backup
route entry causes a packet with the incoming label 800003 to leave interface ge-0/0/0
with that incoming label replaced by the label stack [800022, 299776, 800003]. This
corresponds to the link-protecting post-convergence path to reach R3
(R1-R21-R22-R23-R2-R3). The top label on the label stack is 800022 and corresponds
to the node SID to reach Device R22 on the shortest path R1-R2-R22. The next label
(299792) corresponds to the adjacency SID for the interface on R22-R23. The last label
(800003) corresponds to the node SID on Device R23 to reach Device R3 on the shortest
path R23-R2-R3.
Purpose Verify that the route in mpls.0 corresponding to the adjacency SID from Device R1 to
Device R2 has a link-protecting backup path.
Action From operational mode, run the show route table mpls.0 label 299808 command to
display the adjacency information.
Meaning An incoming label of 299808 corresponds to the adjacency SID from Device R1 to Device
R2. The primary route entry in mpls.0 corresponds to popping the incoming label 299808
and sending the packet out interface ge-0/0/2. If interface ge-0/0/2 fails, the backup
route entry causes a packet with the incoming label 299808 to leave on interface
ge-0/0/0 with that incoming label replaced by the label stack [800022, 299776,
800002]. This corresponds to the link-protecting post-convergence path to reach Device
R2 (R1-R21-R22-R23-R2). The top label on the label stack is 800022 and corresponds
to the node SID to reach Device R22 on the shortest path R1-R2-R22. The next label
(299792) corresponds to the adjacency SID for the interface on R22-R23. The last label
(800002) corresponds to the node SID on Device R23 to reach Device R2 on the shortest
path R23-R2.
CLI Quick To quickly add node-protection for interface ge-0/0/2 to the above example configuration
Configuration on Device R1, copy the following commands, paste them into a text file, remove any line
breaks, change any details necessary to match your network configuration, and then
copy and paste the commands into the CLI at the [edit] hierarchy level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
}
}
source-packet-routing {
node-segment {
ipv4-index 1;
index-range 512;
}
}
level 2 wide-metrics-only;
interface ge-0/0/0 {
point-to-point;
level 2 {
metric 10;
}
}
interface ge-0/0/1 {
point-to-point;
level 2 {
metric 10;
}
}
interface ge-0/0/2 {
point-to-point;
level 2 {
post-convergence-lfa {
node-protection cost 20000;
}
metric 10;
}
}
interface lo0.0;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Purpose Verify that the backup route to reach 192.168.0.3 passes through R1-R31-R34-R3. This
shows that the node-protection is enabled.
Action From operational mode, run the show route table inet.3 192.168.0.3 command to display
the routing table information.
Meaning The backup path to reach 192.168.0.3 now uses the interface ge-0/0/1 (the interface to
reach R31). The top label on the stack (299776) corresponds to the adjacency SID on
Device R31 to reach Device R34. The bottom label (800003) takes the packet from R34
. This ensures that node-protection is enabled.
CLI Quick To quickly configure define fate-sharing protection on Device R1, copy the following
Configuration commands, paste them into a text file, remove any line breaks, change any details
necessary to match your network configuration, and then copy and paste the commands
into the CLI at the [edit] hierarchy level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
2. Configure the fate-sharing group to indicate that link from Device R1 to Device R2
and the link from Device R21 to Device R22 share fate and allow it to be used for
post-convergence-lfa.
Results From configuration mode, confirm your configuration by entering the show protocols and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
level 2 {
post-convergence-lfa {
fate-sharing-protection;
metric 10;
}
}
}
interface lo0.0;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Purpose Verify that the backup route to reach 192.168.0.3 is through path R1-R31-R34-R3. This
shows that fate-sharing is enabled.
Action From operational mode, run the show route table inet.3 192.168.0.3 command to display
the routing table information.
Meaning The backup path to reach 192.168.0.3 now uses ge-0/0/1 (the interface to reach R31).
The top label on the stack (299776) corresponds to the adjacency-SID on Device R31 to
reach Device R34. The bottom label (800003) takes the packet from Device R34 to
Device R3.
Adjacency segment is a strict forwarded single-hop tunnel that carries packets over a
specific link between two nodes, irrespective of the link cost. You can configure static
adjacency segment identifier (SID) labels for an interface or an interface group.
For static adjacency SIDs, the labels are picked from either a static reserved label pool
or from an ISIS segment routing global block (SRGB).
You can reserve a label range to be used for static allocation of labels using the following
configuration:
The static pool can be used by any protocol to allocate a label in this range. You need to
ensure that no two protocols use the same static label. ISIS adjacency SIDs can be
allocated from this label block through the configuration using keyword label. The label
value for the specific adjacency SIDs need to be explicitly configured. The specific label
is advertised as the adjacency SIDs for that interface for the specific level and address
family. The following is a sample configuration:
SRGB is a global label space that is allocated for the protocol based on configuration.
The labels in the entire SRGB is available for ISIS to use and are not allocated to other
applications/protocols. Prefix SIDs (and Node SIDs) are indexed from this SRGB.
ISIS Adj-SIDs can be allocated from ISIS SRGB using keyword ‘index’ in the configuration.
In such cases, it should be ensured that the Adj-SID index does not conflict with any other
prefix SID in the domain. Like Prefix-SIDs, Adj-SIDs will also be configured by mentioning
the index with respect to the SRGB. However, the Adj-SID subtlv will still have the SID
as a value and the L and V flags are set. The following is a sample configuration:
user@host# set protocols isis source-packet-routing srgb start-label 800000 index-range 4000;
user@host# set protocols isis interface ge-0/0/0.1 level 1 ipv4-adjacency-segment unprotected
index 1;
Static adjacency SIDs can be configured per address family and also based on whether
the protection is required or not. Adjacency SIDs should be configured per level per
interface at the [edit protocols isis interface interface-name level level-num] hierarchy
level.
• Protected—Ensures adjacency SID is eligible to have a backup path and a B-flag is set
in an adjacency SID advertisement.
You can use the same adjacent SID for multiple interfaces by grouping a set of interfaces
under an interface group and configuring the adjacency SID for that interface group and
traffic can be load balanced among the interfaces under the interface group using weight.
This can be configured under the [edit protocols isis interface-group interface_group_name]
hierarchy level.
When segment routing is used in LAN subnetworks, each router in the LAN may advertise
the adjacency SID of each of its neighbors. To configure adjacency SID for a LAN interface
to a specific neighbor, you should configure the adjacency SIDs under the lan-neighbor
configuration at the [edit protocols isis interface interface_name level level_num lan-neighbor
neighbor-sysid] hierarchy level. The following is a sample configuration:
[edit ]
protocols {
isis {
interface <interface_name> {
level <level_num> {
ipv4-adjacency-segment {
protected {
dynamic;
label <value>
index <index> {
global;
}
}
unprotected {
dynamic;
label <value>
index <index> {
global;
}
}
}
ipv6-adjacency-segment {
protected {
dynamic;
label <value>
index <index> {
global;
}
}
unprotected {
dynamic;
label <value>
index <index> {
global;
}
}
}
}
}
interface <interface_name> {
level <level_num> {
lan-neighbor <neighbor-sysid>{
ipv4-adjacency-segment {
protected {
dynamic;
label <value>
index <index> {
global;
}
}
unprotected {
dynamic;
label <value>
index <index> {
global;
}
}
}
ipv6-adjacency-segment {
protected {
dynamic;
label <value>
index <index> {
global;
}
}
unprotected {
dynamic;
label <value>
index <index> {
global;
}
}
}
}
}
}
interface-group <interface_group_name> {
interface <interface_1> weight <weight>
...
interface <interface_n> weight <weight>
level <level_num> {
ipv4-adjacency-segment {
protected {
dynamic;
label <value>
index <index>
}
unprotected {
dynamic;
label <value>
index <index>
}
}
ipv6-adjacency-segment {
protected {
dynamic;
label <value>
index <index>
}
unprotected {
dynamic;
label <value>
index <index>
}
}
}
}
}
}
The following sample output displays the details of configured and dynamic adjacency
SID.
r1
Interface: ge-0/0/2.1, Level: 1, State: Up, Expires in 19 secs
Priority: 64, Up/Down transitions: 1, Last transition: 01:23:38 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:86:48:49:0
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: r0.03, IP addresses: 11.1.1.2
IPv6 addresses: fe80::205:8600:148:4900
Level 1 IPv4 protected Adj-SID: 4138, Flags: BVL
Level 1 IPv6 unprotected Adj-SID: 4139, Flags: FVL
The following sample output displays the details of LAN/PTP adjacency SID.
…
TLVs:
Area address: 49.00 (2)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 10.10.10.10
IP address: 10.10.10.10
Hostname: r0
IS neighbor: r0.03, Internal, Metric: default 10
IS neighbor: r4.00, Internal, Metric: default 10
IS extended neighbor: r0.03, Metric: default 10
IP address: 11.1.1.1
Local interface index: 342, Remote interface index: 0
Current reservable bandwidth:
Priority 0 : 1000Mbps
Priority 1 : 1000Mbps
Priority 2 : 1000Mbps
Priority 3 : 1000Mbps
Priority 4 : 1000Mbps
Priority 5 : 1000Mbps
Priority 6 : 1000Mbps
Priority 7 : 1000Mbps
Maximum reservable bandwidth: 1000Mbps
Maximum bandwidth: 1000Mbps
Administrative groups: 0 <none>
LAN IPV4 Adj-SID: 4138, Weight:0, Neighbor:r1, Flags: BVL
LAN IPV6 Adj-SID: 4139, Weight:0, Neighbor:r1, Flags: FBVL
IS extended neighbor: r4.00, Metric: default 10
IP address: 21.1.1.1
Neighbor's IP address: 21.1.1.2
Local interface index: 334, Remote interface index: 335
Current reservable bandwidth:
Priority 0 : 1000Mbps
Priority 1 : 1000Mbps
Priority 2 : 1000Mbps
Priority 3 : 1000Mbps
Priority 4 : 1000Mbps
Priority 5 : 1000Mbps
Priority 6 : 1000Mbps
Priority 7 : 1000Mbps
Maximum reservable bandwidth: 1000Mbps
Maximum bandwidth: 1000Mbps
Administrative groups: 0 <none>
P2P IPV4 Adj-SID - Flags: BVL, Weight:0, Label: 4125
P2P IPV6 Adj-SID - Flags: FBVL, Weight:0, Label: 4126
The following sample output displays the status information about the specified interface
group.
Interface-group: r1r2ig
ge-0/0/1.1, 1000Mbps, Up, Non-Degraded, Weight: 1
ge-0/0/1.3, 1000Mbps, Up, Non-Degraded, Weight: 1
ge-0/0/1.5, 1000Mbps, Up, Non-Degraded, Weight: 1
Total Nominal Bandwidth: 3Gbps, Total Actual Bandwidth: 3Gbps
Level 1 IPv4 protected Adj-SID: Label 4138
Level 1 IPv6 unprotected Adj-SID: Label 4139
Related
Documentation
Control traffic (link-state PDU and related packets) might cause delays in user traffic
(information packets) because control traffic always has precedence in terms of
scheduling on the interface cards.
Unfortunately, the control traffic transmission rate does not get lower on low-bandwidth
interfaces such as DS-0 or fractional T1/E1 lines. Control traffic stays the same, regardless
of line bandwidth.
Junos OS does not support automated calculation of link-state PDU throttling based on
available bandwidth because the lowest-speed interface cards on a Juniper Networks
routing device starts at T1/E1 speeds (1.5 and 2 Mbps). It is assumed that even with
link-state PDU pacing of 20 ms, the control traffic will not consume more than half of
the interface bandwidth.
However, there might be fractional T1/E1 circuits (less than the full bandwidth) configured
as well, where link-state PDU pacing might have to be adjusted.
Thus, the lsp-interval statement helps to resolve two issues: regulating the
control-traffic-to-user-traffic ratio, and protecting neighbors during transient situations.
The traffic subject to this pacing is non-self-originated traffic, which is traffic that has
been originated by other routers, not the local router. Junos OS has hard-coded rate
limiting for locally generated link-state PDUs. All the link-state PDUs are paced using a
20 ms timer. Additionally, there is logic that makes sure that the adjacency is reliably up
for some time before advertising the adjacency.
Related • Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS
Documentation Interfaces on page 360
This example shows how to modify the link-state PDU interval time.
Requirements
Before you begin, configure IS-IS. See “Example: Configuring IS-IS” on page 14 for
information about the sample IS-IS configuration.
Overview
To keep reachability information in the network current, link-state protocols need to
originate, distribute, and revoke or time-out topology information. In IS-IS, topology
information is encoded in link-state PDUs.
By default, the routing device sends one link-state PDU out an interface every
100 milliseconds. To modify this interval, include the lsp-interval statement:
lsp-interval milliseconds;
Link-state PDU throttling by use of the lsp-interval statement controls the flooding pace
to neighboring routing devices in order to not overload them and also to ensure that user
traffic is not delayed on low-bandwidth links.
In this example, an IS-IS routing device on a LAN segment is configured to send link-state
PDUs every 1000 milliseconds.
R1 R2
lo0:192.168.0.1 lo0:192.168.0.2
g041282
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R1# set fe-1/2/0 unit 0 description to-R2
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
Results From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
If you are done configuring the device, enter commit from configuration mode. Repeat
the configuration on Device R2.
Verification
Confirm that the configuration is working properly.
Purpose Check the link-state PDU interval setting on the IS-IS interface.
Action From operational mode, enter the show isis interface extensive command.
fe-1/2/0.0
Index: 70, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 1000 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: R2.02 (not us)
Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: R2.02 (not us)
Meaning The output shows that the link-state PDU interval is set to 1000 milliseconds.
Action From operational mode, enter the show isis statistics command.
Meaning The output shows the number of link-state PDUs sent and received on Device R1 and
Device R2.
Purpose Check the IS-IS trace log to view the interval between packets.
Action From operational mode, enter the show log isis-trace | match lsp command.
Meaning The output shows that Level 1 and Level 2 link-state PDUs are being sent and received
roughly every 1000 milliseconds (1 second).
Related • Understanding Link-State PDU Throttling for IS-IS Interfaces on page 359
Documentation
• Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
on page 365
The complete sequence number PDU (CSNP) interval controls the frequency at which
a routing device sends a directory of its link-state database.
When IS-IS is activated on a routing device’s interface, the device first sends some IS-IS
hello packets (IIHs) to its neighbors to ensure that the circuit is capable of transporting
packets in both directions. In the IIHs, the router embeds information about the designated
router (also called the designated intermediate system or DIS). One of the designated
router roles on an IS-IS broadcast circuit is to synchronize the link-state databases on
LANs. The designated router does this by periodically sending a directory of its link-state
database, which is received by all the routing devices on a LAN.
If the routing device is the designated router on a LAN, IS-IS sends CSNPs every
10 seconds. If the routing device is on a point-to-point interface, it sends CSNPs every
5 seconds. The general recommendation is to use the default values or to increase the
CSNP interval if there are a large number of broadcast circuits that need to be supplied
with fresh CSNPs. Increasing the interval can help protect against CSNP flooding.
Related • Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
Documentation on page 365
Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
This example shows how to modify the complete sequence number PDU (CSNP) interval
on IS-IS interfaces.
Requirements
Before you begin, configure IS-IS. See “Example: Configuring IS-IS” on page 14 for
information about the sample IS-IS configuration.
Overview
CSNPs contain a complete list of all link-state PDUs in the IS-IS database. CSNPs are
sent periodically on all links, and the receiving systems use the information in the CSNP
to update and synchronize their link-state PDU databases. The designated router
multicasts CSNPs on broadcast links in place of sending explicit acknowledgments for
each link-state PDU.
If the routing device is the designated router on a LAN, IS-IS sends CSNPs every
10 seconds. You might want to modify the default interval to protect against CSNP
flooding.
csnp-interval seconds;
To configure the interface not to send any CSNPs, specify the disable option:
csnp-interval disable;
In this example, an IS-IS routing device on a LAN segment is configured to send CSNPs
every 30 seconds.
R1 R2
lo0:192.168.0.1 lo0:192.168.0.2
g041282
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R1# set fe-1/2/0 unit 0 description to-R2
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
Results From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
If you are done configuring the device, enter commit from configuration mode. Repeat
the configuration on Device R2.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show isis interface extensive command.
Meaning The output shows that the CSNP interval is set to 30 seconds.
Action From operational mode, enter the show isis statistics command.
Meaning The output shows the number of CSNPs sent and received on Device R1 and Device R2.
Purpose Check the IS-IS trace log to view the interval between packets.
Action From operational mode, enter the show log isis-trace | match csn command.
Meaning The output shows that Level 1 and Level 2 CSNPs are being received roughly every 30
seconds.
Related • Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 365
Documentation
• Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS
Interfaces on page 360
A mesh group is a set of routing devices that are fully connected. That is, they have a fully
meshed topology.
Junos OS supports IS-IS mesh groups as documented in RFC 2973, IS-IS Mesh Groups.
When link-state PDUs are being flooded throughout an area, each router within a mesh
group receives only a single copy of a link-state PDU instead of receiving one copy from
each neighbor, thus minimizing the overhead associated with the flooding of link-state
PDUs.
Mesh groups provide a scaling method for the flooding subsystem. We recommend that
you deploy mesh groups when your network design has a dense flooding topology. For
example, consider the classical overlay topologies of the 1990s where 200 routers were
fully meshed using permanent virtual circuits (PVCs) over an ATM core, because ATM
was the only high-speed technology at the time. A PVC is a software-defined logical
connection in a network such as a Frame Relay network.
What has changed since the 1990s is that IP and MPLS technology have reduced the
ATM layer and removed the need for overlay meshing. The flooding graphs have become
sparse in almost all practical deployments. In service provider networks, overlay networks
are no longer used.
In enterprise networks, dense flooding graphs that, for example, lease a Layer 2 VPN
service (an overlay network) to fully mesh its WAN routers might continue to be a useful
architecture. In such cases, mesh groups might be useful.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
When link-state PDUs are being flooded throughout an area, each router within a mesh
group receives only a single copy of a link-state PDU instead of receiving one copy from
each neighbor, thus minimizing the overhead associated with the flooding of link-state
PDUs.
To create a mesh group and designate that an interface be part of the group, assign a
mesh-group number to all the routing device interfaces in the group:
mesh-group value;
To prevent an interface in the mesh group from flooding link-state PDUs, configure
blocking on that interface:
mesh-group blocked;
g041287
fe-1/2/2 fe-1/2/1
10.0.0.16/30
“CLI Quick Configuration” on page 372 shows the configuration for all of the devices in
Figure 33 on page 372. The section “Step-by-Step Procedure” on page 373 describes the
steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R1# set fe-1/2/0 unit 0 description to-R2
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set fe-1/2/1 unit 0 description to-R4
user@R1# set fe-1/2/1 unit 0 family inet address 10.0.0.5/30
Results From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the mesh group is enabled on the IS-IS interfaces.
Action From operational mode, enter the show isis interface extensive command.
Meaning Mesh group: 1 in the output shows that the mesh group is enabled as expected.
Purpose Verify that the number of link-state PDUs received and sent is less than what it would
be if the mesh group were not enabled.
Action From operational mode, enter the show isis statistics command.
Meaning After the adjacencies have been up for about 38 minutes, the output shows that Device
R1 has received 73 link-state PDUs and sent 37 link-state PDUs. In the same topology in
the same amount of time without the mesh group enabled, Device R1 would have received
roughly 156 link-state PDUs and sent roughly 117 link-state PDUs.
IS-IS extensions provide the basic interior gateway protocol (IGP) support for collecting
intradomain routing information for Connectionless Network Service (CLNS) destinations
within a CLNS network. Routers that learn host addresses through End
System-to-Intermediate System (ES-IS) can advertise the addresses to other routers
(intermediate systems) by using IS-IS.
For more information about IS-IS, see the ISO 10589 standard.
This example shows how to create a routing instance and enable IS-IS protocol on all
interfaces.
Requirements
Before you begin, configure the network interfaces. See Interfaces Feature Guide for
Security Devices.
Overview
The configuration instructions in this topic describe how to create a routing-instance
called aaaa, enable IS-IS on all interfaces, and define BGP export policy name (dist-bgp),
family (ISO), and protocol (BP), and apply the export policy to IS-IS.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit routing-instances aaaa
4. (Optional) Disable IPv4 and IPv6 routing to configure a pure CLNS network .
[edit policy-options]
user@host# set policy-statement dist-bgp from family iso protocol bgp
[edit policy-options]
user@host# set policy-statement dist-bgp then accept
Results From configuration mode, confirm your configuration by entering the show
routing-instances command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show routing-instances
aaaa {
protocols {
isis {
export dist-bgp;
no-ipv4-routing;
no-ipv6-routing;
clns-routing;
interface all;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the policy options are enabled for the routing instance.
For many years, engineers have combined power supplies, routing hardware and software,
forwarding hardware and software, and physical interfaces into a networking device
known as a router. Networking vendors have created large routers and small routers, but
all routers have been placed into service as individual devices. As a result, the router has
been considered a single physical device for most of its history.
®
The concept of logical systems breaks with this tradition. With the Junos operating
system (Junos OS), you can partition a single router into multiple logical devices that
perform independent routing tasks. Because logical systems perform a subset of the
tasks once handled by the main router, logical systems offer an effective way to maximize
the use of a single routing or switching platform.
NOTE: Beginning with Junos OS Release 9.3, the logical router feature has
been renamed logical system.
Traditionally, service provider network design requires multiple layers of switches and
routers. These devices transport packet traffic between customers. As seen on the left
side of Figure 34 on page 384, access devices are connected to edge devices, which are
in turn connected to core devices.
Router 1
g016932
Release History Table Release Description
9.3 Beginning with Junos OS Release 9.3, the logical router feature has been
renamed logical system.
This example shows how to configure an IS-IS network by using multiple logical systems
that are running on a single physical router. The logical systems are connected by logical
tunnel interfaces.
Requirements
You must connect the logical systems by using logical tunnel (lt) interfaces. See Example:
Connecting Logical Systems Within the Same Device Using Logical Tunnel Interfaces on
MX Series Routers and EX Series Switches.
Overview
This example shows an IS-IS configuration with three logical systems running on one
physical router. Each logical system has its own routing table. The configuration enables
the protocol on all logical tunnel interfaces that participate in the IS-IS domain.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Configure the logical tunnel interface on Logical System LS1 connecting to Logical
System LS2.
2. Configure the logical tunnel interface on Logical System LS1 connecting to Logical
System LS3.
3. Configure the logical tunnel interface on Logical System LS2 connecting to Logical
System LS1.
4. Configure the logical tunnel interface on Logical System LS2 connecting to Logical
System LS3.
5. Configure the logical tunnel interface on Logical System LS3 connecting to Logical
System LS2.
6. Configure the logical tunnel interface on Logical System LS3 connecting to Logical
System LS1.
7. Configure the ISO address on the loopback interface for the three logical systems.
[edit]
user@host# commit
Results
From configuration mode, confirm your configuration by issuing the show logical-systems
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
LS1 {
interfaces {
lt-0/1/0 {
unit 0 {
description LS1->LS3;
encapsulation ethernet;
peer-unit 5;
family inet {
address 10.0.1.2/30;
}
family iso;
}
unit 2 {
description LS1->LS2;
encapsulation ethernet;
peer-unit 1;
family inet {
address 10.0.0.1/30;
}
family iso;
}
}
lo0 {
unit 1 {
family iso {
address 49.0001.1720.1600.1001.00;
}
}
}
}
protocols {
isis {
interface lt-0/1/0.0;
interface lt-0/1/0.2;
interface lo0.1 {
passive;
}
}
}
}
LS2 {
interfaces {
lt-0/1/0 {
unit 1 {
description LS2->LS1;
encapsulation ethernet;
peer-unit 2;
family inet {
address 10.0.0.2/30;
}
family iso;
}
unit 4 {
description LS2->LS3;
encapsulation ethernet;
peer-unit 3;
family inet {
address 10.0.2.2/30;
}
family iso;
}
}
lo0 {
unit 2 {
family iso {
address 49.0001.1720.1600.2002.00;
}
}
}
}
protocols {
isis {
interface lt-0/1/0.1;
interface lt-0/1/0.4;
interface lo0.2 {
passive;
}
}
}
}
LS3 {
interfaces {
lt-0/1/0 {
unit 3 {
description LS3->LS2;
encapsulation ethernet;
peer-unit 4;
family inet {
address 10.0.2.1/30;
}
family iso;
}
unit 5 {
description LS3->LS1;
encapsulation ethernet;
peer-unit 0;
family inet {
address 10.0.1.1/30;
}
family iso;
}
}
lo0 {
unit 3 {
family iso {
address 49.0001.1234.1600.2231.00;
}
}
}
}
protocols {
isis {
interface lt-0/1/0.3;
interface lt-0/1/0.5;
interface lo0.3 {
passive;
}
}
}
}
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the IS-IS adjacencies are established by checking the logical system
routing entries and by pinging the logical systems.
49.0001.1720.1600.1001/72
*[Direct/0] 3w0d 01:37:52
> via lo0.1
49.0001.1720.1600.2002/72
*[Direct/0] 3w0d 01:38:01
> via lo0.2
49.0001.1234.1600.2231/72
*[Direct/0] 3w0d 01:38:11
> via lo0.3
This example shows logical systems configured on a single physical router and explains
how to configure a default route on one logical system.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
This example shows a logical system redistributing a default route to other logical systems.
All logical systems are running IS-IS. A common reason for a default route is to provide
a path for sending traffic destined outside the IS-IS domain.
In this example, the default route is not used for forwarding traffic. The no-install
statement prevents the route from being installed in the forwarding table of Logical
System LS3. If you configure a route so it is not installed in the forwarding table, the route
is still eligible to be exported from the routing table to other protocols. The discard
statement silently drops packets without notice.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit]
user@R1# commit
Results
From configuration mode, confirm your configuration by issuing the show logical-systems
LS3 command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
family iso;
}
unit 5 {
description LS3->LS1;
encapsulation ethernet;
peer-unit 0;
family inet {
address 10.0.1.1/30;
}
family iso;
}
}
lo0 {
unit 3 {
family iso {
address 49.0001.1234.1600.2231.00;
}
}
}
}
protocols {
isis {
export isis-default;
interface lt-1/2/0.3;
interface lt-1/2/0.5;
interface lo0.3 {
passive;
}
}
}
policy-options {
policy-statement isis-default {
from {
protocol static;
route-filter 0.0.0.0/0 exact;
}
then accept;
}
}
routing-options {
static {
route 0.0.0.0/0 {
discard;
no-install;
}
}
}
}
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the IS-IS policy is working by checking the routing tables.
49.0001.1234.1600.2231/72
*[Direct/0] 1w0d 10:17:19
> via lo0.3
49.0001.1720.1600.2002/72
*[Direct/0] 1w0d 10:18:12
> via lo0.2
49.0001.1720.1600.1001/72
*[Direct/0] 1w0d 10:18:35
> via lo0.1
Meaning The routing table on Logical System LS3 contains the default 0.0.0.0/0 route from
protocol IS-IS. The routing tables on Logical System LS1 and Logical System LS2 contain
the default 0.0.0.0/0 route from protocol IS-IS. If Logical System LS1 and Logical System
LS2 receive packets destined for networks not specified in their routing tables, those
packets will be sent to Logical System LS3 for further processing. This configuration
assumes that Logical System LS3 has a connection to an ISP or another external network.
Monitoring Networks
This example shows how to list and view files that are created when you enable global
routing trace operations.
Requirements
You must have the view privilege.
Overview
To configure global routing protocol tracing, include the traceoptions statement at the
[edit routing-options] hierarchy level:
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <disable>;
}
The flags in a traceoptions flag statement are identifiers. When you use the set command
to configure a flag, any flags that might already be set are not modified. In the following
example, setting the timer tracing flag has no effect on the already configured task flag.
Use the delete command to delete a particular flag.
flag timer;
user@host# delete traceoptions flag task
user@host# show
flag timer;
This example shows how to configure and view a trace file that tracks changes in the
routing table. The steps can be adapted to apply to trace operations for any Junos OS
hierarchy level that supports trace operations.
TIP: To view a list of hierarchy levels that support tracing operations, enter
the help apropos traceoptions command in configuration mode.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit]
user@host# commit
/var/log:
...
routing-table-changes
...
4. View the tracing operations in real time by running the monitor start command with
an optional match condition.
6. Halt the monitor command by pressing Enter and typing monitor stop.
[Enter]
user@host> monitor stop
7. When you are finished troubleshooting, consider deactivating trace logging to avoid
any unnecessary impact to system resources.
[edit routing-options]
user@host# deactivate traceoptions
user@host# commit
[edit routing-options]
user@host# show
inactive: traceoptions {
file routing-table-changes size 10m files 10;
flag route;
}
static {
inactive: route 1.1.1.2/32 next-hop 10.0.45.6;
}
[edit routing-options]
user@host# activate traceoptions
user@host# commit
Results
From configuration mode, confirm your configuration by entering the show routing-options
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that events are being written to the log file.
Starting in Junos OS release 16.2R1, when the IS-IS protocol purges entries from IS-IS
link-state database, there is no way to identify the origin of the purge. If there is a need
to investigate the cause of the purge, it is difficult to determine the Intermediate system
(IS) that initiated the purge. RFC 6232, Purge Originator Identification TLV for IS-IS defines
a type, length, and value (TLV) that can be added to the purges, to record the system ID
of the IS that had initiated the purge. If an IS generates a purge, this TLV is included in
the purge, which also has the system ID of the IS. If an IS receives a purge, the Link State
Protocol Data Unit (LSP) flooding does not change the LSP contents, and the TLV is
propagated with the purge itself. If an IS receives a purge that does not include this TLV,
it adds this TLV with both its own system ID and the system ID of the IS from which it
received the purge. This allows the IS that receives this purge to log the system ID of the
originator, or the upstream source of the purge. This makes it easier to locate the origin
of the purge and its cause. This TLV is also helpful in lab environments.
There is a possibility that during a network attack, a low lifetime is generated maliciously
for an LSP, which can initiate a purge on timeout. These LSPs with low lifetime need to
be filtered out to avoid purges triggered by a low lifetime LSP.
16.1 Starting in Junos OS release 16.2R1, when the IS-IS protocol purges entries
from IS-IS link-state database, there is no way to identify the origin of the
purge.
Problem Description: This checklist provides links to troubleshooting basics, an example network,
and includes a summary of the commands you might use to diagnose problems with the
router and network.
Table 7: Checklist
Solution
for Working with Problems on Your Network
2. Isolating the Causes of a Network Problem on page 414 show < configuration | interfaces | protocols | route >
4. Evaluating the Solution to Check Whether the Network Problem show route (ip-address | hostname)
Is Resolved on page 416 ping (ip-address | hostname) count 3
traceroute (ip-address | hostname)
By applying the standard four-step process illustrated in Figure 37 on page 412, you can
isolate a failed node in the network. Note that the functionality described in this section
is not supported in versions 15.1X49, 15.1X49-D30, or 15.1X49-D40.
Before you embark on the four-step process, however, it is important that you are prepared
for the inevitable problems that occur on all networks. While you might find a solution
to a problem by simply trying a variety of actions, you can reach an appropriate solution
more quickly if you are systematic in your approach to the maintenance and monitoring
of your network. To prepare for problems on your network, understand how the network
functions under normal conditions, have records of baseline network activity, and carefully
observe the behavior of your network during a problem situation.
Figure 38 on page 412 shows the network topology used in this topic to illustrate the
process of diagnosing problems in a network.
so-0/0/0–.12.2 so-0/0/1–.23.1
R1 R2 R3
so-0/0/0–.12.1 so-0/0/1–.23.2
so-0/0/1–.15.2
so-0/0/2–.26.2 so-0/0/3–.36.2
R5 R6
g003255
lo0: .5 lo0: .6
I-BGP
Key:
so-0/0/X: 10.1.x.x/30 E-BGP
lo0: 10.0.0.x/32
The network in Figure 38 on page 412 consists of two autonomous systems (ASs). AS
65001 includes two routers, and AS 65002 includes three routers. The border router (R1)
in AS 65001 announces aggregated prefixes 100.100/24 to the AS 65002 network. The
problem in this network is that R6 does not have access to R5 because of a loop between
R2 and R6.
To isolate a failed connection in your network, follow the steps in these topics:
• Taking Appropriate Action for Resolving the Network Problem on page 415
• Taking Appropriate Action for Resolving the Network Problem on page 415
• Evaluating the Solution to Check Whether the Network Problem Is Resolved on page 416
Problem Description: The symptoms of a problem in your network are usually quite obvious, such
as the failure to reach a remote host.
Solution To identify the symptoms of a problem on your network, start at one end of your network
and follow the routes to the other end, entering all or one of the following Junos OS
command-line interfaces (CLI) operational mode commands:
Sample Output
^C
--- 10.0.0.5 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Meaning
The sample output shows an unsuccessful ping command in which the packets are being
rejected because the time to live is exceeded. The output for the show route command
shows the interface (10.1.26.1) that you can examine further for possible problems. The
traceroute command shows the loop between 10.1.26.1 (R2) and 10.1.26.2 (R6), as indicated
by the continuous repetition of the two interface addresses.
Problem Description: A particular symptom can be the result of one or more causes. Narrow down
the focus of your search to find each individual cause of the unwanted behavior.
Solution To isolate the cause of a particular problem, enter one or all of the following Junos OS
CLI operational mode command:
user@host> show < configuration | bgp | interfaces | isis | ospf | route >
Your particular problem may require the use of more than just the commands listed
above. See the appropriate command reference for a more exhaustive list of commonly
used operational mode commands.
Sample Output
Meaning
The sample output shows that all interfaces on R6 are up. The output from R2 shows
that a static route [Static/5] configured on R2 points to R6 (10.1.26.2) and is the preferred
route to R5 because of its low preference value. However, the route is looping from R2
to R6, as indicated by the missing reference to R5 (10.1.15.2).
Problem Description: The appropriate action depends on the type of problem you have isolated.
In this example, a static route configured on R2 is deleted from the [routing-options]
hierarchy level. Other appropriate actions might include the following:
To resolve the problem in this example, enter the following Junos OS CLI commands:
[edit]
user@R2# delete routing-options static route destination-prefix
user@R2# commit and-quit
user@R2# show route destination-prefix
Sample Output
[edit]
user@R2# delete routing-options static route 10.0.0.5/32
[edit]
user@R2# commit and-quit
commit complete
Exiting configuration mode
Meaning
The sample output shows the static route deleted from the [routing-options] hierarchy
and the new configuration committed. The output for the show route command now
shows the BGP route as the preferred route, as indicated by the asterisk (*).
Problem Description: If the problem is solved, you are finished. If the problem remains or a new
problem is identified, start the process over again.
You can address possible causes in any order. In relation to the network in “Isolating a
Broken Network Connection” on page 412, we chose to work from the local router toward
the remote router, but you might start at a different point, particularly if you have reason
to believe that the problem is related to a known issue, such as a recent change in
configuration.
Solution To evaluate the solution, enter the following Junos OS CLI commands:
Sample Output
Meaning
The sample output shows that there is now a connection between R6 and R5. The show
route command shows that the BGP route to R5 is preferred, as indicated by the asterisk
(*). The ping command is successful and the traceroute command shows that the path
from R6 to R5 is through R2 (10.1.26.1), and then through R1 (10.1.12.1).
Troubleshooting IS-IS
Purpose
If your MPLS network is configured with IS-IS as the interior gateway protocol (IGP), and
the output of the show mpls lsp extensive command shows that there is a problem, check
the IP and IS-IS layers. Because IS-IS and IP are independent of each other, you can check
either layer first. For more information about checking the IP layer, see Verifying the IP
Layer.
After you have checked the IP layer and determined that there is still a problem, check
the IS-IS layer, verify that IS-IS adjacencies are up, and make sure that the interfaces
and IS-IS protocol are configured correctly.
Purpose Confirm that interfaces are configured for IS-IS, that the IS-IS protocol is configured
correctly, and that adjacencies are established.
Action To verify the label-switched path (LSP), enter the following command on the ingress,
transit, and egress routers:
Sample Output 1
10.0.0.6
From: 10.0.0.1, State: Dn, ActiveRoute: 0 , LSPname: R1-to-R6
ActivePath: (none)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
Primary State: Dn
24 Oct 21 13:48:01 No Route toward dest [3 times]
23 Oct 21 13:47:44 Deselected as active
Sample Output 2
Sample Output 3
10.0.0.1
From: 10.0.0.6, State: Dn, ActiveRoute: 0 , LSPname: R6-to-R1
ActivePath: (none)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
Primary State: Dn
Will be enqueued for recomputation in 3 second(s).
13 Oct 21 14:23:33 CSPF failed: no route toward 10.0.0.1[90 times]
12 Oct 21 13:39:56 Deselected as active
11 Oct 21 13:39:56 CSPF: could not determine self
[...Output truncated...]
Created: Tue Oct 19 22:28:30 2004
Total 1 displayed, Up 0, Down 1
Meaning The sample output shows that LSP R1-to-R6 and the reverse LSP R6-to-R1 are down,
and there are no LSP sessions on transit router R3.
Purpose When you check the IS-IS layer, you verify that IS-IS adjacencies are up and that the IS-IS
interfaces are included at the protocol level.
Action To verify the functioning of adjacent interfaces, enter the following commands from the
relevant routers:
Sample Output 1
Sample Output 2
Meaning Sample Output 1 shows that ingress router R1 has established adjacencies with the
relevant routers. Transit router R3 does not have an adjacency with egress router R6, and
egress router R6 has no adjacencies established in the network shown in MPLS Network
Broken at the IP and IGP Layers, indicating that the problem might be at the IS-IS protocol
level.
Sample Output 2 shows that R1 and R2 are Level 2 routers, in contrast to R6 which is a
Level 1 router. When a router is configured explicitly as a Level 1 or Level 2 router, it does
not communicate with routers configured at a different level. Level 1 routers communicate
with other Level 1 routers within their area, while Level 2 routers communicate with other
Level 2 routers, and toward other autonomous systems. Because all the routers in this
network are configured for Level 2, they cannot form an adjacency with R6, which is
incorrectly configured as a Level 1 router.
See Also • Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on
page 21
Purpose When you have determined that the problem is probably at the IS-IS protocol level, check
the IS-IS configuration of the routers in your network.
Action To verify the IS-IS configuration, enter the following command from the relevant routers:
Sample Output
interface fxp0.0 {
disable;
}
interface lo0.0; {
passive
Meaning The sample output shows that R6 has Level 2 disabled, while R1 and R3 have Level 1
disabled. For IS-IS adjacencies to establish, routers need to be at the same level. Another
common configuration error is to omit the loopback interface (lo0) from the configuration
at the [edit protocols isis] hierarchy level. IS-IS does not function correctly if the loopback
interface (lo0) is not configured at this level. In addition, including the passive statement
ensures that protocols are not run over the loopback interface (lo0) and that the loopback
interface (lo0) is advertised correctly throughout the network.
Problem Description: Depending on the error you encountered in your investigation, you must take
the appropriate action to correct the problem. In the example below, the routers are
configured to function at different levels of the IS-IS protocol.
Solution To correct the error in this example, enter the following commands:
Sample Output
Meaning
The sample output shows that the configuration error on egress router R6 has been
corrected, and IS-IS adjacencies are now established.
Purpose After taking the appropriate action to correct the error, the label-switched path (LSP)
needs to be checked again to confirm that the problem in the RSVP layer has been
resolved.
Action To verify that the LSP is up and traversing the network as expected, enter the following
command from the ingress, egress, and transit routers:
Sample Output 1
10.0.0.6
From: 10.0.0.1, State: Up, ActiveRoute: 1 , LSPname: R1-to-R6
ActivePath: (primary)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 20)
10.1.13.2 S 10.1.36.2 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt):
10.1.13.2 10.1.36.2
5 Oct 21 15:52:07 Selected as active path
4 Oct 21 15:52:07 Record Route: 10.1.13.2 10.1.36.2
3 Oct 21 15:52:07 Up
2 Oct 21 15:52:07 Originate Call
1 Oct 21 15:52:07 CSPF: computation result accepted
Created: Thu Oct 21 15:52:06 2004
Total 1 displayed, Up 1 , Down 0
10.0.0.1
From: 10.0.0.6, LSPstate: Up, ActiveRoute: 0
LSPname: R6-to-R1 , LSPpath: Primary
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: -
Resv style: 1 FF, Label in: 3, Label out: -
Time left: 142, Since: Thu Oct 21 15:41:59 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 2 receiver 39082 protocol 0
PATH rcvfrom: 10.1.13.2 (so-0/0/2.0) 17 pkts
Adspec: received MTU 1500
PATH sentto: localclient
RESV rcvfrom: localclient
Record route: 10.1.36.2 10.1.13.2 <self>
Total 1 displayed, Up 1 , Down 0
Sample Output 2
10.0.0.1
From: 10.0.0.6, LSPstate: Up, ActiveRoute: 1
LSPname: R6-to-R1 , LSPpath: Primary
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 3
Resv style: 1 FF, Label in: 100528, Label out: 3
Time left: 125, Since: Thu Oct 21 15:29:26 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 2 receiver 39082 protocol 0
10.0.0.6
From: 10.0.0.1, LSPstate: Up, ActiveRoute: 1
LSPname: R1-to-R6 , LSPpath: Primary
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 3
Resv style: 1 FF, Label in: 100544, Label out: 3
Time left: 147, Since: Thu Oct 21 15:39:33 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 47963 protocol 0
PATH rcvfrom: 10.1.13.1 (so-0/0/2.0) 4 pkts
Adspec: received MTU 1500 sent MTU 1500
PATH sentto: 10.1.36.2 (so-0/0/3.0) 4 pkts
RESV rcvfrom: 10.1.36.2 (so-0/0/3.0) 4 pkts
Explct route: 10.1.36.2
Record route: 10.1.13.1 <self> 10.1.36.2
Total 2 displayed, Up 2, Down 0
Sample Output 3
10.0.0.1
From: 10.0.0.6, State: Up, ActiveRoute: 1, LSPname: R6-to-R1
ActivePath: (primary)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 20)
10.1.36.1 S 10.1.13.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt):
10.1.36.1 10.1.13.1
18 Oct 21 15:34:18 Selected as active path
17 Oct 21 15:34:17 Record Route: 10.1.36.1 10.1.13.1
16 Oct 21 15:34:17 Up
15 Oct 21 15:34:17 Originate Call
14 Oct 21 15:34:17 CSPF: computation result accepted
[...Output truncated...]
Created: Tue Oct 19 22:28:30 2004
Total 1 displayed, Up 1, Down 0
10.0.0.6
From: 10.0.0.1, LSPstate: Up, ActiveRoute: 0
LSPname: R1-to-R6 , LSPpath: Primary
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: -
Resv style: 1 FF, Label in: 3, Label out: -
Time left: 126, Since: Thu Oct 21 15:44:25 2004
Meaning Sample Outputs 1 and 3 from ingress router R1 and egress router R6 show that the LSP
is now traversing the network along the expected path, from R1 through R3 to R6, and
the reverse LSP, from R6 through R3 to R1. In addition, Sample Output 2 from transit
router R3 shows that there are two transit LSP sessions, one from R1 to R6, and the other
from R6 to R1.
Purpose
For IS-IS to run on a router (intermediate system) in your network, you must enable IS-IS
on the router, configure a network entity title (NET) on the loopback interface (lo0), and
configure family iso on all interfaces on which you want to run IS-IS. When you enable
IS-IS on a router, Level 1 and Level 2 are enabled by default.
The network in Figure 40 on page 429 is organized hierarchically and consists of Level 2,
Level 1/Level 2, and Level 1 routers in one autonomous system (AS) divided into four
areas: 49.0001, 49.0002, 49.0003, and 49.0004. The Level 2 routers route toward other
autonomous systems. The Level 1/Level 2 routers route between areas and to other
autonomous systems. The Level 1 routers route within an area, and when the destination
is outside the local area, they route toward a Level1/Level2 system.
In the following topics, the configuration of the various types of routers is examined.
Figure 41 on page 430 provides more details about the IS-IS network topology in
Figure 40 on page 429 so that you can verify the configuration output of the various routers.
To verify that IS-IS is configured correctly on routers at different levels, follow these
steps:
Action To verify the IS-IS configuration of a Level 1/Level 2 router in your network, enter the
following Junos OS command-line interface (CLI) commands:
The following output is for an IS-IS configuration on R2, a Level 1/Level 2 router in the
network shown.
Sample Output
}
family iso {
address 49.0002.1000.0000.0002.00;
}
}
}
Meaning The sample output shows a basic configuration of IS-IS on R2, a Level 1/Level 2 router.
The basic configuration is at the [edit protocols isis] and [edit interfaces] hierarchy levels.
At the [edit protocols isis] level, five interfaces are included: so-0/0/0, so-0/0/1, so-0/0/2,
fxp0, and the loopback interface (lo0). Two interfaces, so-0/0/0.0 and so-0/0/2.0,
have Level 1 disabled, making them Level 2 interfaces. One interface, so-0/0/1.0, has
Level 2 disabled, making it a Level 1 interface. The management interface (fxp0) is
disabled so that IS-IS packets are not sent over it, and the loopback interface (lo0) is
included because it becomes a point of connection from the router to the IS-IS network.
At the [edit interfaces] hierarchy level, all of the interfaces included in the [edit protocols
isis] hierarchy level are configured with family iso, and the loopback interface (lo0) is
configured with the NET address 49.0002.1000.0000.0002.00. Every router in an IS-IS
network must have at least one NET address that identifies a point of connection to the
IS-IS network. The NET address is generally configured on the loopback interface (lo0).
Routers that participate in multiple areas can have multiple NET addresses.
See Also • Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on
page 21
Action To check the configuration of a Level 1 router, enter the following CLI commands:
The following sample output is for R4, a Level 1 router in the network shown in The
following output is for an IS-IS configuration on R2, a Level 1/Level 2 router in the network
shown.
Sample Output
user@R4# show
level 2 disable;
interface so-0/0/2.0 {
level 1 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.0;
[edit protocols isis]
Meaning The sample output shows a basic configuration of IS-IS on R4, a Level 1 router. The basic
configuration is at the [edit protocols isis] and [edit interfaces] hierarchy levels.
At the [edit protocols isis] hierarchy level, three interfaces are included: so-0/0/2.0, fxp0,
and the loopback interface (lo0). Level 2 is disabled on the router, making it a Level 1
router that sends packets within its local area, 49.0001. When a packet destination is
outside the local area, R4 establishes an adjacency with the nearest Level 1/Level 2 router
(R5) that forwards the packets. For more information about adjacencies, see “Displaying
the Status of IS-IS Adjacencies” on page 435.
One interface, so-0/0/2.0, is configured for IS-IS. The management interface (fxp0) is
disabled so that IS-IS packets are not sent over it, and the loopback interface (lo0) is
included because it becomes a point of connection from the router to the IS-IS network.
At the [edit interfaces] hierarchy level, the interface included in the [edit protocols isis]
hierarchy level is also configured with family iso, and the loopback interface (lo0) is
configured with the NET address of 49.0001.1000.0000.0004.00. Every router in an
IS-IS network must have at least one NET address that identifies a point of connection
to the IS-IS network. The NET address is generally configured on the loopback interface
(lo0). Routers that participate in multiple areas can have multiple NET addresses.
Action To check the configuration of a Level 2 router, enter the following CLI commands:
The following sample output is for R6, a Level 2 router in the network shown.
Sample Output
[edit interfaces]
user@R6# show
so-0/0/0 {
unit 0 {
family inet {
address 10.1.56.2/30;
}
family iso;
}
}
so-0/0/2 {
unit 0 {
family inet {
address 10.1.26.2/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 10.0.0.6/32;
}
family iso {
address 49.0003.1000.0000.0006.00;
}
}
}
Meaning The sample output shows a basic configuration of IS-IS on R6, a Level 2 router. The basic
configuration is at the [edit protocols isis] and [edit interfaces] hierarchy levels.
At the [edit protocols isis] level, four interfaces are included: so-0/0/0.0, so-0/0/2.0,
fxp0, and the loopback interface (lo0). Level 1 is disabled on the two SONET/SDH
interfaces, making this a Level 2 router that routes between areas and toward other ASs.
The management interface (fxp0) is disabled so that IS-IS packets are not sent over it,
and the loopback interface (lo0) is included because it becomes a point of connection
from the router to the IS-IS network.
At the [edit interfaces] hierarchy level, the interfaces included in the [edit protocols isis]
hierarchy level are also configured with family iso, and the loopback interface (lo0) is
configured with the NET address of 49.0003.1000.0000.0006.00. Every router in an
IS-IS network must have at least one NET address that identifies a point of connection
to the IS-IS network. The NET address is generally configured on the loopback interface
(lo0). Routers that participate in multiple areas can have multiple NET addresses.
Related • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
Documentation page 20
Purpose
Assuming that all the routers are correctly configured for IS-IS, you can verify which
neighbors are adjacent and able to exchange IS-IS data. In addition, you can examine
the set of routes installed in the forwarding table to verify that the routing protocol process
(rpd) has relayed the correct information into the forwarding table.
Figure 42 on page 436 illustrates the example IS-IS topology used for the procedures in
this topic.
The network consists of Level 1 and Level 2 adjacencies. Level 1 adjacencies are within
areas 49.0001 and 49.0002. Level 2 adjacencies occur between all directly connected
Level 2 routers regardless of which area they are in. For example, R5 is in area 49.0001,
R6 is in area 49.0003, R1 is in area 49.0004, and R2 is in area 49.0002. The network in
Figure 42 on page 436 should have the following adjacencies:
• Level 2 adjacencies between all directly connected Level 2 routers (R1, R2, R5, and R6).
• Level 1 adjacencies between routers in area 49.0001 (R4 and R5) and between routers
in area 49.0002 (R2 and R3).
To verify that routers are adjacent and able to exchange IS-IS data, follow these steps:
Purpose Verify that routers are adjacent and able to exchange IS-IS data.
Action To verify that routers are adjacent and able to exchange IS-IS data, enter the following
CLI operational mode command:
The following sample output shows the adjacencies that formed for all routers shown
in “Displaying the Status of IS-IS Adjacencies” on page 435.
Sample Output
Meaning The sample output shows the adjacencies that formed in the network illustrated in
“Displaying the Status of IS-IS Adjacencies” on page 435. The Level 1/Level 2 routers (R2
and R5) formed Level 1 adjacencies with Level 1 routers (R3 and R4), and Level 2
adjacencies with the Level 2 routers (R1 and R6). To view the status of the adjacency,
examine the State column. In this example, all adjacencies in the network are up.
If the state is not Up for a particular neighbor, you must first examine the IS-IS
configuration for the particular interface. Make sure that the NET address is correct and
that the loopback interface (lo0) is configured. Use the show isis interface or show isis
interface detail command to display the IS-IS parameters for all interfaces configured
with IS-IS. With these two commands, you can see which interfaces are configured for
IS-IS, whether they are configured for Level 1 or Level 2, the IS-IS metric, and other IS-IS
information.
See Also • Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on
page 21
Purpose You can display the set of routes installed in the forwarding table to verify that the routing
protocol process (rpd) has relayed the correct information into the forwarding table. This
is especially important when there are network problems, such as connectivity. In this
procedure, you verify that the routes displayed in Step 2 appear in the forwarding table
for Router R5.
Action To examine the forwarding table for a router, enter the following CLI command:
Sample Output
Meaning The sample output shows the selected next hop between Routers R5 and R3 sent from
the inet routing table and installed into the forwarding table. The first instance shows
the route through Router R1, and the second instance shows the route through Router
R6. In both instances, the preferred route displayed in Step 2 is installed in the forwarding
table.
In general, the sample output includes the destination address and destination type, the
next-hop address and next-hop type, the number of references to the next hop, an index
number into an internal next-hop database, and the interface used to reach the next hop.
See Also • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
page 20
user@host# show
For example:
user@host# commit
For example:
Meaning Table 8 on page 440 lists tracing flags that can be configured specific to IS-IS and presents
example output for some of the flags.
csn Complete sequence Nov 28 20:02:48 Sending L2 CSN on interface so-1/1/0.0Nov 28 20:02:48 Sending L2 CSN
number PDU (CSNP) on interface so-1/1/1.0
hello Hello packet Nov 28 20:13:50 Sending PTP IIH on so-1/1/1.0Nov 28 20:13:50 Received PTP IIH, source
id abc-core-01 on so-1/1/0.0Nov 28 20:13:53 Received PTP IIH, source id abc-core-02 on
so-1/1/1.0Nov 28 20:13:57 Sending PTP IIH on so-1/1/0.0Nov 28 20:13:58 Received PTP IIH,
source id abc-core-01 on so-1/1/0.0Nov 28 20:13:59 Sending PTP IIH on so-1/1/1.0
lsp Link-state PDUs Nov 28 20:15:46 Received L2 LSP abc-edge-01.00-00, interface so-1/1/0.0Nov 28 20:15:46
(LSPs) from abc-core-01Nov 28 20:15:46 sequence 0x1617, checksum 0xd92a, lifetime 1197Nov
28 20:15:46 Updating L2 LSP abc-edge-01.00-00 in TEDNov 28 20:15:47 Received L2 LSP
abc-edge-01.00-00, interface so-1/1/1.0Nov 28 20:15:47 from abc-core-02Nov 28 20:15:47
sequence 0x1617, checksum 0xd92a, lifetime 1197
lsp-generation Link-state PDU Nov 28 20:21:24 Regenerating L1 LSP abc-edge-03.00-00, old sequence 0x682Nov 28
generation packets 20:21:27 Rebuilding L1, fragment abc-edge-03.00-00Nov 28 20:21:27 Rebuilt L1 fragment
abc-edge-03.00-00, size 59Nov 28 20:31:52 Regenerating L2 LSP abc-edge-03.00-00,
old sequence 0x689Nov 28 20:31:54 Rebuilding L2, fragment abc-edge-03.00-00Nov 28
20:31:54 Rebuilt L2 fragment abc-edge-03.00-00, size 256Nov 28 20:34:05 Regenerating
L1 LSP abc-edge-03.00-00, old sequence 0x683Nov 28 20:34:08 Rebuilding L1, fragment
abc-edge-03.00-00Nov 28 20:34:08 Rebuilt L1 fragment abc-edge-03.00-00, size 59
psn Partial sequence Nov 28 20:40:39 Received L2 PSN, source abc-core-01, interface so-1/1/0.0Nov 28 20:40:39
number PDU (PSNP) Received L2 PSN, source abc-core-02, interface so-1/1/1.0Nov 28 20:41:36 Sending L2 PSN
packets on interface so-1/1/1.0Nov 28 20:41:36 Sending L2 PSN on interface so-1/1/0.0Nov 28
20:42:35 Received L2 PSN, source abc-core-02, interface so-1/1/1.0Nov 28 20:42:35 LSP
abc-edge-03.00-00 lifetime 1196Nov 28 20:42:35 sequence 0x68c checksum 0x746dNov
28 20:42:35 Received L2 PSN, source abc-core-01, interface so-1/1/0.0Nov 28 20:42:35
LSP abc-edge-03.00-00 lifetime 1196Nov 28 20:42:35 sequence 0x68c checksum
0x746dNov 28 20:42:49 Sending L2 PSN on interface so-1/1/1.0Nov 28 20:42:49 LSP
abc-core-01.00-00 lifetime 1197Nov 28 20:42:49 sequence 0x1c4fb checksum 0x9becNov
28 20:42:49 Sending L2 PSN on interface so-1/1/0.0Nov 28 20:42:49 LSP
abc-core-01.00-00 lifetime 1197Nov 28 20:42:49 sequence 0x1c4fb checksum 0x9bec
spf Shortest-path-first Nov 28 20:44:01 Scheduling SPF for L1: ReconfigNov 28 20:44:01 Scheduling multicast
(SPF) calculations SPF for L1: ReconfigNov 28 20:44:01 Scheduling SPF for L2: ReconfigNov 28 20:44:01
Scheduling multicast SPF for L2: ReconfigNov 28 20:44:02 Running L1 SPFNov 28 20:44:02
L1 SPF initialization complete: 0.000099s cumulative timeNov 28 20:44:02 L1 SPF primary
processing complete: 0.000303s cumulative timeNov 28 20:44:02 L1 SPF result
postprocessing complete: 0.000497s cumulative timeNov 28 20:44:02 L1 SPF RIB
postprocessing complete: 0.000626s cumulative timeNov 28 20:44:02 L1 SPF routing
table postprocessing complete: 0.000736s cumulative time
Related • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
Documentation page 20
user@host# show
For example:
user@host# commit
For example:
Related • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
Documentation page 20
To configure the tracing for only sent or received IS-IS protocol packets, follow these
steps:
1. Configure the flag to display sent, received, or both sent and received packets.
or
or
user@host# show
For example:
or
or
user@host# commit
For example:
Related • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
Documentation page 20
Configuration Statements
admin-group
Syntax admin-group {
exclude [ group-name ];
include-all [ group-name ];
include-any [ group-name ];
preference [ group-name ];
}
Description Define the administrative groups criteria for the selection of the backup path.
Options exclude [ group-name ]— Specify the administrative groups to be excluded. The backup
path is not selected as the loop-free alternate (LFA) or backup next hop if any of
the links in the path have any one of the listed administrative groups.
group-name— Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
include-all [ group-name ]— Require each link in the backup path to have all the listed
administrative groups in order to accept the path.
group-name— Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
include-any [ group-name ]— Require each link in the backup path to have at least one
of the listed administrative groups in order to select the path.
group-name— Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
group-name— Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
adjacency-segment
Syntax adjacency-segment {
hold-time hold-time;
}
Release Information Statement introduced in Junos OS Release 17.2R1 for MX Series routers, PTX Series
routers, QFX5100 switches, and QFX10000 switches.
Statement introduced in Junos OS Release 17.3R1 for QFX5110 and QFX5200 switches.
Description Configure attributes for adjacency segments in source packet routing in networking
(SPRING), or configure segment routing (SR) to ensure that the adjacency segment
identifiers are retained during adjacency or link flaps. The adjacency segments are not
released immediately and are retained for the configured hold time duration.
• Configuring Anycast and Prefix segments in SPRING for IS-IS Protocol on page 327
Description Authentication key (password). Neighboring routing devices use the password to verify
the authenticity of packets sent from this interface. For the key to work, you also must
include the authentication-type statement.
All routing devices must use the same password. If you are using the Junos OS IS-IS
software with another implementation of IS-IS, the other implementation must be
configured to use the same password for the domain, the area, and all interfaces adjacent
to the Juniper Networks routing device.
Default If you do not include this statement and the authentication-type statement, IS-IS
authentication is disabled.
Related • Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 36
Documentation
• Example: Configuring Router Authentication for BGP
• Configuring the Authentication Key Update Mechanism for BGP and LDP Routing Protocols
Description Enable authentication and specify the authentication scheme for IS-IS. If you enable
authentication, you must specify a password by including the authentication-key
statement.
Default If you do not include this statement and the authentication-key statement, IS-IS
authentication is disabled.
auto-bandwidth
Syntax auto-bandwidth {
template name {
adjust-interval adjust-interval;
adjust-threshold adjust-threshold;
auto-bandwidth-subscription auto-bandwidth-subscription;
statistic-collection-interval statistic-collection-interval;
}
traceoptions {
file filename <files files> <size size> <(world-readable | no-world-readable)>;
flag (all | state | timer) {
detail detail;
disable disable;
receive receive;
send send;
}
}
}
Release Information Statement introduced in Junos OS Release 17.3R1 for MX Series and PTX Series.
Description Configure an auto-bandwidth template to define parameters that measure the available
bandwidth and periodically trigger updates to RSVP and IGP. You can configure this
option both at the IS-IS protocol level or at the IS-IS interface level.
Traffic samples are collected periodically at each statistics interval and the average
SPRING bandwidth utilization is calculated. If this average value increases beyond the
configured adjust threshold percentage, that is the last reported SPRING bandwidth,
then RSVP adjusts the subscription percentage accordingly. which might cause RSVP
LSP preemption, IGP updates, and further re-routing of RSVP LSPs. However, if the
SPRING bandwidth utilization drops below the configured threshold, the RSVP
subscription percentage is modified to reflect the increase. You can configure parameters
such as the threshold, the collection interval, and the adjust interval as per your
requirements.
Options template name— Specify an auto-bandwidth template name with a maximum length
of 64 characters.
adjust-interval— Specify the time interval after which the average bandwidth utilization
is measured.
Range: 30 through 3600 seconds
Default: 900 seconds
statistic-collection-interval— Specify the time interval after which the traffic statistics
is collected from the line cards.
Range: 10 through 300 seconds
Default: 60 seconds
Syntax backup-selection {
destination prefix {
interface (interface-name| all){
admin-group {
exclude [ group-name ];
include-all [ group-name ];
include-any [ group-name ];
preference [ group-name ];
}
bandwidth-greater-equal-primary;
dest-metric (highest | lowest);
downstream-paths-only;
metric-order [ root dest ];
node {
exclude [ node-address ];
preference [ node-address ];
}
node-tag {
exclude [ route-tag ];
preference [ route-tag ];
}
protection-type (link | node | node-link);
root-metric (highest | lowest);
srlg (loose | strict);
evaluation-order [ admin-group srlg bandwidth protection-type node node-tag metric
];
}
}
}
Description Define backup selection policies, per prefix per primary next-hop interface, to enforce
loop-free alternate (LFA) selection based on admin-group, srlg, bandwidth,
protection-type, node, node-tag, and metric attributes of the backup path.
Description Configure options for running the shortest-path-first (SPF) algorithm for backup next
hops for protected interfaces. Use these options to override the default behavior of having
Junos OS calculate backup paths for all the topologies in an instance when at least one
interface is configured with link protection or node-link protection.
Related • Example: Configuring MPLS Egress Protection for Layer 3 VPN Services
Documentation
• Example: Configuring Layer 3 VPN Egress Protection with RSVP and LDP
• link-protection
• node-link-protection
Syntax bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
NOTE: Starting with Junos OS Release 16.1, you can configure IS-IS BFD
sessions for the IPv6 address family. Therefore, this configuration statement
is also available under the [edit protocols isis interface interface-name family
inet|inet6] hierarchy level.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower.
For example, the timers can adapt to a higher value if the adjacency fails, or a neighbor
can negotiate a higher value for a timer than the configured value. The timers adapt to
a higher value when a BFD session flap occurs more than three times in a span of 15
seconds. A back-off algorithm increases the receive (RX) interval by two if the local BFD
instance is the reason for the session flap. The transmission (TX) interval is increased by
two if the remote BFD instance is the reason for the session flap.
You can use the clear bfd adaptation command to return BFD interval timers to their
configured values. The clear bfd adaptation command does not affect traffic flow on the
routing device.
Syntax checksum;
The checksum cannot be enabled with MD5 hello authentication on the same interface.
clns-routing
Syntax clns-routing;
Description Enable IS-IS to exchange Connectionless Network Service (CLNS) routes. CLNS is a
Layer 3 protocol, similar to IPv4. CLNS uses network service access points (NSAPs) to
address end systems and intermediate systems.
clns-updown-compatibility
Syntax clns-updown-compatibility;
Description When you enable IS-IS to exchange Connectionless Network Service (CLNS) routes,
Junos OS sets the reserved (R) bit in the default metric field inside type, length, and value
(TLV) type-3 (ES-Neighbor) as a marker for routing loop prevention. Junos OS uses the
up/down bit for marking prefixes on the Level 2-to-Level 1 boundary as being propagated
Down, such that any router in that area never propagates it Up on a Level 1-to-Level 2
boundary. For detailed information about how this works in IP routing environments, see
RFC 2966, Domain-wide Prefix Distribution with Two-Level IS-IS.
Some other vendors’ platforms might not support up/down bit setting in CLNS route
TLVs. If one of these vendors’ platforms receives this TLV with the R bit set, the platform
discards the information.
When you use the clns-updown-compatibility statement in the IS-IS configuration, the
R bit is set to 0, and the issue is resolved. The clns-updown-compatibility statement
causes Junos OS to use the Internal/External metric-type bit in the TLV header instead
of using the R bit as the up/down bit marker. This has the advantage that older end
system (ES) equipment does not receive TLV headers with the R bit set.
CAUTION: Not using the R bit can lead to potential routing loops. You can
use the site-of-origin (SoO) extended community to prevent a looped BGP
update from being injected back to IS-IS when received from a remote provider
edge (PE) device. The receiving PE device can check against the SoO
community, and if the value matches its own, the NLRI is not accepted.
Options identifier—IPv4 address that defines a protection pair. The context identifier is manually
configured on both primary and protector PEs.
csnp-interval
Description Configure the interval between complete sequence number PDUs (CSNPs) on a LAN
interface.
If the routing device is the designated router on a LAN, IS-IS sends CSN packets every
10 seconds.
To configure the interface not to send any CSNPs, specify the disable option.
Default By default, IS-IS sends CSNPs periodically. If the routing device is the designated router
on a LAN, IS-IS sends CSNPs every 10 seconds.
Related • Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
Documentation on page 365
• Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 365
destination
Description Define the backup selection policy for a particular destination prefix or for all the prefixes.
Options prefix— Destination prefix name and prefix length. You can specify 0/0 for the IPv4
least-specific prefix or 0::0/0 for the IPv6 least-specific prefix.
Syntax disable;
At the [edit protocols isis traffic-engineering] hierarchy level, disable IS-IS support for
traffic engineering.
Enabling IS-IS on an interface (by including the interface statement at the [edit protocols
isis] or the [edit routing-instances routing-instance-name protocols isis] hierarchy level),
disabling it (by including the disable statement), and not actually having IS-IS run on an
interface (by including the passive statement) are mutually exclusive states.
Default IS-IS is enabled for Level 1 and Level 2 routers on all interfaces on which family iso is
enabled.
Syntax disable;
export
Description Apply one or more policies to routes being exported from the routing table into IS-IS.
All routing protocols store the routes that they learn in the routing table. The routing table
uses this collected route information to determine the active routes to destinations. The
routing table then installs the active routes into its forwarding table and exports them
into the routing protocols. It is these exported routes that the protocols advertise.
For each protocol, you control which routes the protocol stores in the routing table and
which routes the routing table exports into the protocol from the routing table by defining
a routing policy for that protocol.
NOTE: For IS-IS, you cannot apply routing policies that affect how routes are
imported into the routing table; doing so with a link-state protocol can easily
lead to an inconsistent topology database.
Related
Documentation
Description Configure the address family for traffic engineering IS-IS interior gateway protocol (IGP)
shortcuts.
Syntax flood-group;
Description IS-IS supports flood-group. This feature limits link-state packet data unit (PDU) flooding
over IS-IS interfaces.
Syntax graceful-restart {
disable;
helper-disable;
restart-duration seconds;
}
Graceful restart allows a routing device to restart with minimal effects to the network,
and is enabled for all routing protocols at the [edit routing-options] hierarchy level. When
graceful restart is enabled, the restarting routing device is not removed from the network
topology during the restart period. The adjacencies are reestablished after restart is
complete.
On LAN interfaces where IS-IS is configured on a transit router that serves as the
designated router (DR), a graceful restart causes:
• The ingress router of the label-switched path (LSP), which passes through the DR, to
break the LSP.
hello-authentication-key
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level number],
[edit protocols isis interface interface-name level number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
number]
Description Configure an authentication key (password) for hello packets. Neighboring routing devices
use the password to verify the authenticity of packets sent from an interface. For the key
to work, you also must include the hello-authentication-type statement.
hello-authentication-key-chain
Hierarchy Level [edit logical-systems name protocols isis interface interface-name level level-number],
[edit logical-systems name routing-instances instance-name protocols isis interface
interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances instance-name protocols isis interface interface-name level
level-number]
hello-authentication-type
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level number],
[edit protocols isis interface interface-name level number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
number]
Description Enable authentication on an interface for hello packets. If you enable authentication on
hello packets, you must specify a password by including the hello-authentication-key
statement.
You can configure authentication for a given IS-IS level on an interface. On a point-to-point
link, if you enable hello authentication for both IS-IS levels, the password configured for
Level 1 is used for both levels.
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Modify the frequency with which the routing device sends hello packets out of an interface,
in seconds.
Routing devices send hello packets at a fixed interval on all interfaces to establish and
maintain neighbor relationships. This interval is advertised in the hello interval field in the
hello packet.
You can send out hello packets in subsecond intervals. To send out hello packets every
333 milliseconds, set the hold-time value to 1.
• Set the hello and hold time interval for LAN adjacencies to 30 seconds and
90 seconds respectively on both the DIS and a neighboring router.
hello-padding
This helps to prevent a premature adjacency Up state when one routing device’s MTU
does not meet the requirements to establish the adjacency.
As an OSI Layer 2 protocol, IS-IS does not support data fragmentation. Therefore,
maximum packet sizes must be established and supported between two routers. During
adjacency establishment, the IS-IS protocol makes sure that the link supports a packet
size of 1492 bytes by padding outgoing hello packets up to the maximum packet size of
1492 bytes.
This is the default behavior of the Junos OS IS-IS implementation. However, Junos OS
provides an option to disable hello padding that can override this behavior.
• Adaptive padding—On point-to-point connections, the hello packets are padded from
the initial detection of a new neighbor until the neighbor verifies the adjacency as Up
in the adjacency state type, length, and value (TLV) tuple. If the neighbor does not
support the adjacency state TLV, then padding continues. On LAN connections, padding
starts from the initial detection of a new neighbor until there is at least one active
adjacency on the interface. Adaptive padding has more overhead than loose padding
and is able to detect MTU asymmetry from one side of the connection. This one-sided
detection can result in generation of extra link-state PDUs that are flooded throughout
the network. Specify the adaptive option to configure enough padding to establish an
adjacency to neighbors.
• Loose padding (the default)—The hello packet is padded from the initial detection of
a new neighbor until the adjacency transitions to the Up state. Loose padding might
not be able to detect certain situations such as asymmetrical MTUs between the
routing devices. Specify the loose option to configure enough padding to initialize an
adjacency to neighbors.
• Strict padding—Padding is done on all interface types and for all adjacency states, and
is continuous. Strict padding has the most overhead. The advantage is that strict
padding detects MTU issues on both sides of a link. Specify the strict option to configure
padding to allow all adjacency states with neighbors.
Options adaptive—Configure padding until the neighbor adjacency is established and active.
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Set the length of time a neighbor considers this router to be operative (up) after receiving
a hello packet. If the neighbor does not receive another hello packet within the specified
time, it marks this routing device as inoperative (down). The hold time itself is advertised
in the hello packets.
The hold time specifies how long a neighbor should consider this routing device to be
operative without receiving another hello packet. If the neighbor does not receive a hello
packet from this routing device within the hold time, it marks the routing device as being
unavailable.
For systems configured with graceful routing switchover (GRES) with Graceful Restart,
the hold time for Master and Backup Routing Engines should be set to a value higher
than 40 seconds. This ensures that adjacencies between the Routing Engine and the
neighboring peer 'helper' routers do not time out, stopping graceful restart, and all traffic.
• Set the hello and hold time interval for LAN adjacencies to 30 seconds and
90 seconds respectively on both the DIS router and a neighboring router.
Description Configure the time period to advertise the maximum cost metric for a link that is not fully
operational.
NOTE: When an interface has been in the holddown state for more than
3 minutes, a system log message with a warning level is sent. This message
appears in both the messages file and the trace file.
Related • Example: Configuring Synchronization Between IS-IS and LDP on page 277
Documentation
• Understanding LDP-IGP Synchronization on page 275
ignore-attached-bit
Syntax ignore-attached-bit;
Description Ignore the attached bit on IS-IS Level 1 routers. Configuring this statement enables the
routing device to ignore the attached bit on incoming Level 1 link-state PDUs. If the
attached bit is ignored, no default route, which points to the routing device which has set
the attached bit, is installed.
There might be times, such as during a denial-of-service (DoS) attack, that you do not
want a Level 1 router to be able to forward traffic based on a default route.
To prevent a routing device from being able to reach interarea destinations, you can
prevent the routing device from installing the default route without affecting the status
of its IS-IS adjacencies. The ignore-attached-bit statement is used to tell the routing
device to ignore the presence of the attached bit in Level 1 link-state PDUs, which blocks
the installation of the IS-IS default route.
Syntax ignore-lsp-metrics;
Description Ignore the metrics for RSVP label-switched paths (LSPs) in IS-IS traffic engineering
shortcut calculations or when you configure LDP over RSVP LSPs.
If you are using RSVP for traffic engineering, you can run LDP simultaneously to eliminate
the distribution of external routes in the core. The LSPs established by LDP are tunneled
through the LSPs established by RSVP. LDP effectively treats the traffic-engineered LSPs
as single hops. Ignoring the metric of RSVP LSPs avoids mutual dependency between
IS-IS and RSVP, eliminating the time period when the RSVP metric used for tunneling
traffic is not up to date.
• Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 272
Description Apply one or more routing policies to routes being imported into the Junos OS routing
table from IS-IS. You can import a routing policy to filter or restrict routes.
Related • Example: Configuring a Routing Policy to Prioritize IS-IS Routes on page 115
Documentation
• Understanding Routing Policies
priority number;
te-metric metric;
}
}
Description Configure interface-specific IS-IS properties. To configure more than one interface, include
the interface statement multiple times.
Enabling IS-IS on an interface (by including the interface statement at the [edit protocols
isis] or the [edit routing-instances routing-instance-name protocols isis] hierarchy level),
disabling it (by including the disable statement), and not actually having IS-IS run on an
interface (by including the passive statement) are mutually exclusive states.
Options all—Have Junos OS create IS-IS interfaces automatically. If you include this option, disable
IS-IS on the management interface (fxp0).
interface-group-holddown-delay
Description Configure the time interval that the IS-IS takes before replacing the metric with the new
metric value and before flooding the new metric to the labeled-switched paths (LSPs).
When the bundle changes from a worse bandwidth based metric to a better metric the
system waits for the configured time before switching to the new metric. The system
also uses this time delay when a link status changes from down to up or when a member
link changes status from degrade to non-degrade.
Options seconds—Number of seconds before the routing device replaces the bandwidth based
metric.
Default: 20 seconds
Description Define the backup selection policy for a specific primary next hop.
dest-metric (highest | lowest)—Specifiy the metric from the one-hop neighbor or from
the remote router such as an RSVP backup label-switched-path (LSP) tail-end
router to the final destination.
highest— Select the backup path that has the highest destination metric.
lowest— Select the backup path that has the lowest destination metric.
NOTE: For the explicitly configured evaluation order, only the listed
attributes influence the selection of the backup path.
metric-order [ root dest ]— Specify the order of preference of the root and the destination
metric during the backup path selection. The preference order can be:
• [root dest] — Backup path selection or preference is first based on the root-metric
criteria. If the criteria of all the root-metric is the same, then the selection or
preference is based on the dest-metric.
• [dest root] — Backup path selection or preference is first based on the dest-metric
criteria. If the criteria of all the dest-metric is the same, then the selection is based
on the root-metric.
dest— The metric from a one-hop neighbor or remote router to the final destination.
node-link— Allow either node or link protection LFA where node-protection LFA is
preferred over link-protection LFA.
srlg (loose | strict)—Define the backup selection to either allow or reject the common
shared risk link groups (SRLGs) between the primary link and any link in the backup
path.
loose— Allow the backup path that has common srlgs between the primary link and
any link in the backup path. A backup path with a fewer number of srlg collisions
is preferred.
strict— Reject the backup path that has common srlgs between the primary link and
each link in the backup path.
ipv4-multicast
Syntax ipv4-multicast;
NOTE: The IS-IS interface metrics for the IPv4 topology can be configured
independently of the IPv6 metrics. You can also selectively disable interfaces
from participating in the IPv6 topology while continuing to participate in the
IPv4 topology. This lets you exercise control over the paths that unicast data
takes through a network.
ipv4-multicast-metric
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Specify the multicast topology metric value for the level.
ipv6-multicast
Syntax ipv6-multicast;
ipv6-multicast-metric
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Specify the IPv6 alternate multicast topology metric value for the level.
ipv6-unicast
Syntax ipv6-unicast;
This statement causes IS-IS to calculate an alternate IPv6 unicast topology, in addition
to the normal IPv4 unicast topology, and add the corresponding routes to inet6.0.
NOTE: The IS-IS interface metrics for the IPv4 topology can be configured
independently of the IPv6 metrics. You can also selectively disable interfaces
from participating in the IPv6 topology while continuing to participate in the
IPv4 topology. This lets you exercise control over the paths that unicast data
takes through a network.
Related • Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 177
Documentation
• Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
ipv6-unicast-metric
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Specify the IPv6 unicast topology metric value for the level. The IS-IS interface metrics
for the IPv4 topology can be configured independently of the IPv6 metrics.
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
• Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 177
isis
Description Enable IS-IS routing on the routing device or for a routing instance.
The isis statement is the one statement you must include in the configuration to run IS-IS
on the routing device or in a routing instance.
Description Advertise label-switched paths (LSPs) into IS-IS as point-to-point links. The LSP is
advertised in the appropriate IS-IS levels as a point-to-point link and contains a local
address and a remote address.
When you advertise LSPs into IS-IS as point-to-point links, the LSPs are used in SPF
calculations. The advertisement contains a local address (the from address of the LSP),
a remote address (the to address of the LSP), and a metric.
Before a single-hop LSP between a multiaccess link can be announced as up and used
in SPF calculations, you must configure an LSP in both directions between two
label-switched routers.
metric—Metric value.
Range: 1 through 63, or 1 through 16,777,215 (if you have configured wide metrics)
Default: 0 (for lo0), 10 (for all other interfaces)
layer2-map
Syntax layer2-map;
Release Information Statement introduced in Junos OS Release 16.1 for the MX Series and PTX Series.
Description Enable Layer 2 mapping of ARP or neighbor discovery next hops in the kernel for the
specified instance or interface. IS-IS Layer 2 mapping ensures that forwarding next-hop
resolution is topology-driven rather than traffic-driven, which results in minimal traffic
loss while activating an Ethernet link.
IS-IS LAN and point-to-point Hellos supply all relevant Layer 2 and Layer 3 binding address
information for address resolution. The device at the receiving end can extract the
information and populate the ARP or neighbor discovery cache of the kernel even before
the route installation time. When Layer 2 mapping is enabled, IS-IS installs ARP or neighbor
discovery next-hop entries into the forwarding table. Because this provides Layer 2
next-hop bindings ahead of time, IS-IS networks do not experience traffic loss while
bringing up a link.
Default The default setting is no-layer2-map for both instances and interfaces.
ldp-synchronization
Syntax ldp-synchronization {
disable;
hold-time seconds;
}
Description Enable synchronization by advertising the maximum cost metric until LDP is operational
on the link.
To advertise the maximum cost metric until LDP is operational for LDP synchronization,
include the ldp-synchronization statement.
You can administratively divide a single AS into smaller groups called areas. You configure
each routing device interface to be in an area. Any interface can be in any area. The area
address applies to the entire routing device. You cannot specify one interface to be in
one area and another interface in a different area. To route between areas, you must
have two adjacent Level 2 routers that communicate with each other.
Level 1 routers can only route within their IS-IS area. To send traffic outside their area,
Level 1 routers must send packets to the nearest intra-area Level 2 router. A routing device
can be a Level 1 router, a Level 2 router, or both. You specify the router level on a
per-interface basis, and a routing device becomes adjacent to other routing devices on
the same level on that link only.
You can configure one Level 1 routing process and one Level 2 routing process on each
interface, and you can configure the two levels differently.
Description Configure the IS-IS level. You can configure one instance of Level 1 routing and one
instance of Level 2 routing on each interface, and you can configure the two levels
differently.
Syntax link-group-protection {
minimum-bandwidth rate;
revert-bandwidth rate;
}
Release Information Statement introduced in Junos OS Release 16.1 for the MX Series.
Description Configure link group protection. This enables Packet Forwarding Engine-based local
repair by pre-downloading suboptimal backup paths with appropriate weights in the
Packet Forwarding Engine.
Syntax link-protection;
Description Enable link protection on the specified IS-IS interface. Junos OS creates a backup loop-free
alternate path to the primary next hop for all destination routes that traverse the protected
interface.
loose-authentication-check
Syntax loose-authentication-check;
Description Allow the use of MD5 authentication without requiring network-wide deployment.
lsp-equal-cost
Syntax lsp-equal-cost;
Description Configure label-switched paths (LSPs) to be retained as equal cost paths for load
balancing when a better path metric is found during the IS-IS internal routing table
calculation.
When a route with an improved metric is added to the IS-IS internal routing table, IS-IS
flushes all next-hop information (including LSP next-hop information) for a route. This
is undesirable, because certain equal-cost multipath (ECMP) combinations can be lost
during route calculation. To override this default IS-IS behavior, include the lsp-equal-cost
statement for load balancing, so that the equal cost path information is retained in the
routing table.
Related • Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 246
Documentation
• Example: Enabling IS-IS Traffic Engineering Support on page 248
lsp-interval
By default, the routing device sends one link-state PDU packet out an interface every
100 milliseconds. To disable the transmission of all link-state PDUs, set the interval to 0.
Link-state PDU throttling by use of the lsp-interval statement controls the flooding pace
to neighboring routing devices in order to not overload them.
Also, consider that control traffic (such as link-state PDUs and related packets) might
delay user traffic (information packets) because control traffic always has precedence
in terms of scheduling on the routing device interface cards. Unfortunately, the control
traffic transmission rate is not decreased on low-bandwidth interfaces, such as DS-0 or
fractional T1 and E1 interface. Line control traffic stays the same. On a low-bandwidth
circuit that is transmitting 30 full-MTU-sized packets, there is not much bandwidth left
over for other types of packets.
Default By default, the routing device sends one link-state PDU out an interface every
100 milliseconds.
Related • Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS
Documentation Interfaces on page 360
• Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
on page 365
• Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 365
lsp-lifetime
Description Specify how long a link-state PDU originating from the routing device should persist in
the network. The routing device sends link-state PDUs often enough so that the link-state
PDU lifetime never expires.
Because link-state PDUs have a maximum lifetime, they need to be refreshed. Refreshing
means that a routing device needs to re-originate its link-state PDUs periodically. The
re-origination interval must be less than the link-state PDU’s lifetime. For example, if the
link-state PDU is valid for 1200 seconds, the routing device needs to refresh the link-state
PDU in less than 1200 seconds to avoid removal of the link-state PDU from the link-state
database by other routing devices. The recommended maximum link-state PDU origination
interval is the lifetime minus 300 seconds. So, in a default environment this would be
900 seconds. In Junos OS, the refresh interval is derived from the lifetime and is equal
to the lifetime minus 317 seconds. You can change the lifetime to a higher value to reduce
the number of refreshes in the network. (You would rarely want to increase the number
of refreshes.) Often theses periodic link-state PDU refreshes are referred to as refresh
noise, and network administrators want to reduce this noise as much as possible.
The show isis overview command displays the link-state PDU lifetime.
Default By default, link-state PDUs are maintained in network databases for 1200 seconds
(20 minutes) before being considered invalid. This length of time, called the LSP lifetime,
normally is sufficient to guarantee that link-state PDUs never expire.
Related • Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
Documentation on page 365
• Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 365
• https://www.juniper.net/us/en/training/certification/JNCIP_studyguide.pdf
max-areas
This value is included in the Maximum Address Area field of the IS-IS common PDU
header included in all outgoing PDUs.
The maximum number of areas you can advertise is restricted to 36 to ensure that the
IIH PDUs have enough space to include other type, length, and value (TLV) fields, such
as the Authentication and IPv4 and IPv6 Interface Address TLVs.
Options number—Maximum number of areas to include in the IS-IS hello (IIH) PDUs and link-state
PDUs.
Range: 3 through 36
Default: 3
Related • Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on
Documentation page 20
max-hello-size
Description Modify the maximum size of IS-IS hello packets. IS-IS sends hello packets out of all IS-IS
enabled interfaces to discover neighbors and form adjacencies between the devices.
Based on the actual MTU of the physical interface, you can configure upto 16000 bytes
as the maximum size for IS-IS packets.
max-lsp-size
Description Modify the maximum size of IS-IS link-state PDUs. IS-IS sends link-state PDUs out of
IS-IS enabled interfaces to distribute routing information between the IS-IS nodes.
max-snp-size
Description Modify the maximum size of partial or complete IS-IS sequence number PDUs. IS-IS
sends sequence number packets out of IS-IS enabled interfaces to control the distribution
of link-state PDUs between the IS-IS nodes. Sequence number packets provide a
mechanism to synchronize the link-state databases of routers in the same area.
Options size—Maximum size allocated for sequence number of partial or complete IS-IS packets.
Range: 512 through 1400 bytes
Default: 1400 bytes
Description Configure an interface to be part of a mesh group, which is a set of fully connected nodes.
A mesh group is a set of routing devices that are fully connected. That is, they have a fully
meshed topology. When link-state PDUs are being flooded throughout an area, each
router within a mesh group receives only a single copy of a link-state PDU instead of
receiving one copy from each neighbor, thus minimizing the overhead associated with
the flooding of link-state PDUs.
To create a mesh group and designate that an interface be part of the group, assign a
mesh-group number to all the routing device interfaces in the group. To prevent an
interface in the mesh group from flooding link-state PDUs, configure blocking on that
interface.
Options blocked—Configure the interface so that it does not flood link-state PDUs.
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Specify the IPv4 unicast topology metric value for the level. The IS-IS interface metrics
for the IPv6 topology can be configured independently of the IPv4 metrics.
All IS-IS routes have a cost, which is a routing metric that is used in the IS-IS link-state
calculation. The cost is an arbitrary, dimensionless integer that can be from 1 through 63,
24
or from 1 through 16,777,215 (2 – 1) if you are using wide metrics.
Similar to other routing protocols, IS-IS provides a way of exporting routes from the
routing table into the IS-IS network. When a route is exported into the IS-IS network
without a specified metric, IS-IS uses default metric values for the route, depending on
the protocol that was used to learn the route.
Table 9 on page 527 depicts IS-IS route export metric default values.
Direct 10
Static Same as reported by the protocol used for exporting the route
Aggregate 10
Generate 10
RIP Same as reported by the protocol used for exporting the route
OSPF Same as reported by the protocol used for exporting the route
BGP 10
The default metric values behavior can be customized by using routing policies.
Related • Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 272
Documentation
• Understanding Wide IS-IS Metrics for Traffic Engineering on page 272
multicast-rpf-routes
Syntax multicast-rpf-routes;
Hierarchy Level [edit logical-systems logical-system-name protocols isis traffic-engineering family inet
shortcuts],
[edit logical-systems logical-system-name routing-instances traffic-engineering family inet
shortcuts],
[edit protocols isis traffic-engineering family inet shortcuts],
[edit routing-instances routing-instance-name protocols isis traffic-engineering family inet
shortcuts]
Description Install unicast IPv4 routes into the multicast routing table (inet.2) for multicast
reverse-path-forwarding (RPF) checks.
Traffic engineering shortcuts must be enabled. IPv4 multicast topology must not be
enabled. Label-switched paths (LSPs) must not be advertised into IS-IS.
Syntax multipath {
lsp-equal-cost;
}
Options lsp-equal-cost—Configure LSPs to be retained as equal cost paths for load balancing
when a better route metric is added to the routing table.
When a route with an improved metric is added to the IS-IS internal routing table,
IS-IS flushes all next-hop information (including LSP next-hop information) for a
route. This is undesirable, because certain equal-cost multipath (ECMP) path
combinations can be lost during route calculation. To override this default IS-IS
behavior, include the lsp-equal-cost statement for load balancing, so that the equal
cost path information is retained in the routing table.
Related • Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 246
Documentation
• Example: Enabling IS-IS Traffic Engineering Support on page 248
Syntax multipath [
weighted {
one-hop;
}
}
Release Information Statement introduced in Junos OS Release 15.1F4 for the MX Series.
Description Enable weighted equal-cost multipath (ECMP) for load-sharing data based on the
bandwidth for incoming traffic destined to IS-IS neighbors that are at a one-hop distance.
The IS-IS protocol gets the logical interface bandwidth information associated with the
gateways of ECMP next hop and shares this information with the routing protocol process
(rpd) and the Packet Forwarding Engine.
Instead of distributing traffic equally over multiple paths, weighted equal-cost multipath
(ECMP) routing distributes traffic based on the total available bandwidth for each gateway
of a next hop. It thereby distributes traffic unequally over multiple paths and utilizes
available bandwidth more efficiently for better load balancing.
one-hop—Enable weighted ECMP load balancing on IS-IS neighbors that are just one
hop away based on the interface bandwidth.
Syntax no-adjacency-down-notification;
Description Disable adjacency down notification for IS-IS to allow for migration from IS-IS to OSPF
without disruption of the RSVP neighbors and associated RSVP-signaled label-switched
paths (LSPs).
Whenever IS-IS is deactivated, the IS-IS adjacencies are brought down. IS-IS signals to
RSVP to bring down any RSVP neighbors associated with the IS-IS adjacencies, and this
further causes the associated LSPs signaled by RSVP to go down as well.
A similar process occurs whenever OSPF is deactivated. The OSPF neighbors are brought
down. OSPF signals to RSVP to bring down any of the RSVP neighbors associated with
the OSPF neighbors, and this further causes the associated LSPs signaled by RSVP to
go down as well.
If you need to migrate from IS-IS to OSPF or from OSPF to IS-IS, the internal gateway
protocol (IGP) notification to RSVP for an adjacency or neighbor down event needs to
be ignored. Using the no-adjacency-down-notification or no-neighbor-down-notification
statements, you can disable IS-IS adjacency down notification or OSPF neighbor down
notification, respectively, until the migration is complete. The network administrator is
responsible for configuring the statements before the migration, and then removing them
from the configuration afterward, so that IGP notification can function normally.
Related • no-neighbor-down-notification
Documentation
no-adjacency-holddown
Syntax no-adjacency-holddown;
A hold-down timer delays the advertising of adjacencies by waiting until a time period
has elapsed before labeling adjacencies in the up state. You can disable this hold-down
timer, which labels adjacencies up faster. However, disabling the hold-down timer creates
more frequent link-state PDU updates and SPF computation.
Syntax no-authentication-check;
Description Generate authenticated packets and check the authentication on received packets, but
do not reject packets that cannot be authenticated.
Syntax no-advertise-adjacency-segment;
Release Information Statement introduced in Junos OS Release 16.2 for MX Series routers and PTX Series
routers.
Statement introduced in Junos OS Release 17.2R1 for QFX5100 and QFX10000 switches.
Statement introduced in Junos OS Release 17.3R1 for QFX5100 and QFX5200 switches.
Description Disable advertising of the adjacency segment on all levels for the specified interface.
Default Enabled
no-csnp-authentication
Syntax no-csnp-authentication;
Description Suppress authentication check on complete sequence number PDU (CSNP) packets.
node
Syntax node {
exclude [ node-address ];
preference [ node-address ];
}
Description Define a list of loop-back IP addresses of the adjacent nodes to either prefer or exclude
in the backup path selection. The node can be a local (adjacent router) node, remote
node, or any other router in the backup path.
NOTE: The nodes are identified through the TE-router-ID TLV advertised by
a node in the LSP.
Options exclude [ node-address ]— Specify the list of nodes to be excluded. The backup path
that has a router from the list is not selected as the loop-free alternative or backup
next hop.
node-protection
Hierarchy Level [edit logical-systems name protocols isis interface name level number post-convergence-lfa
],
[edit logical-systems name routing-instances name protocols isis interface name level
number post-convergence-lfa ],
[edit protocols isis interface name level number post-convergence-lfa ],
[edit routing-instances name protocols isis interface name level number post-convergence-lfa
]
Release Information Statement introduced in Junos OS Release 17.4R1 for MX Series, PTX Series, and QFX
Series.
Description Enable node protection mode for topology-independent loop-free alternate (TI-LFA)
routes for IS-IS. You can configure the cost of all the links used for calculating the TI-LFA
post-convergence failure path cost. If node protection is enabled without configuring a
cost value, then the cost is set to the maximum cost.
Syntax node-segment {
index-range index range;
ipv4-index index;
ipv6-index index;
}
Release Information Statement introduced in Junos OS Release 16.2R1 for MX Series routers.
Statement introduced in Junos OS Release 16.1X65 for the PTX1000 routers.
Statement introduced in Junos OS Release 17.2R1 for QFX5100 and QFX10000 switches.
Statement introduced in Junos OS Release 17.3R1 for QFX5110 and QFX5200 switches.
Description Enable source packet routing in networking (SPRING) at all levels. SPRING or segment
routing is a control-plane architecture that enables an ingress router to steer a packet
through a specific set of nodes and links in the network without relying on the intermediate
nodes in the network to determine the actual path it should take.
NOTE: Provisioning the IPv4 and IPv6 node segment index is allowed per
routing-instance, and will NOT be allowed per IS-IS level. Node segment
index is attached to the IPv4 and IPv6 router-id, if the router-ids are configured
on the loopback interface. Else, lowest IP address on the loopback is chosen
to attach the node-sid.
NOTE: Starting with Junos OS Release 17.2, the maximum index for IPv4
node segment index is 199999.
NOTE: Starting with Junos OS Release 17.2, the maximum index for IPv6
node segment index is 199999.
node-tag
Syntax node-tag {
exclude [ route-tag ];
preference [ route-tag ];
}
Options exclude [ route-tag ]— Specify that the backup path which has any node or router with
route-tag from this list is not selected as the loop-free alternative or backup-next
hop.
preference [ route-tag ]— Specify the set of route tags in descending order of preference.
Syntax node-link-protection;
Description Enable node-link protection on the specified IS-IS interface. Junos OS creates an alternate
loop-free path to the primary next hop for all destination routes that traverse a protected
interface. This alternate path avoids the primary next-hop routing device altogether and
establishes a path through a different routing device.
Syntax no-eligible-backup;
Description Exclude the specified interface as a backup interface for IS-IS interfaces on which link
protection or node-link protection is enabled.
no-eligible-remote-backup
Syntax no-eligible-remote-backup;
Description Disable remote LFA backup calculation for the specified interface. If remote LFA is
disabled, Junos OS does not consider the interface for calculating the remote LFA next
hop.
Related • auto-targeted-session
Documentation
• backup-spf-options on page 461
no-hello-authentication
Syntax no-hello-authentication;
no-ipv4-multicast
Syntax no-ipv4-multicast;
no-ipv4-routing
Syntax no-ipv4-routing;
• The routing device does not advertise the network layer protocol identifier (NLPID) for
IPv4 in the Junos OS link-state PDU fragment zero.
• The routing device does not advertise any IPv4 prefixes in Junos OS link-state PDUs.
• The routing device does not advertise the NLPID for IPv4 in Junos OS hello packets.
• The routing device does not advertise any IPv4 addresses in Junos OS hello packets.
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
• Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 177
no-ipv6-multicast
Syntax no-ipv6-multicast;
no-ipv6-routing
Syntax no-ipv6-routing;
• The routing device does not advertise the network layer protocol identifier (NLPID) for
IPv6 in the Junos OS link-state PDU fragment zero.
• The routing device does not advertise any IPv6 prefixes in Junos OS link-state PDUs.
• The routing device does not advertise the NLPID for IPv6 in Junos OS hello packets.
• The routing device does not advertise any IPv6 addresses in Junos OS hello packets.
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
• Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 177
no-ipv6-unicast
Syntax no-ipv6-unicast;
Description Exclude an interface from the IPv6 unicast topologies. This enables you to exercise control
over the paths that unicast data takes through a network.
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
• Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 177
no-psnp-authentication
Syntax no-psnp-authentication;
Description Suppress authentication check on partial sequence number PDU (PSNP) packets.
no-unicast-topology
Syntax no-unicast-topology;
Syntax overload {
advertise-high-metrics;
allow-route-leaking;
external-prefixes;
internal-prefixes;
timeout seconds;
}
Description Configure the local routing device so that it appears to be overloaded. This statement
causes the routing device to continue participating in IS-IS routing, but prevents it from
being used for transit traffic. Traffic destined to immediately attached subnets continues
to transit the routing device.
You can also advertise maximum link metrics in network layer reachability information
(NLRI) instead of setting the overload bit.
You configure or disable overload mode in IS-IS with or without a timeout. Without a
timeout, overload mode is set until it is explicitly deleted from the configuration. With a
timeout, overload mode is set if the time elapsed since the IS-IS instance started is less
than the specified timeout.
A timer is started for the difference between the timeout and the time elapsed since the
instance started. If the time elapsed after the IS-IS instance is enabled is less than the
specified timeout, overload mode is set. When the timer expires, overload mode is cleared.
In overload mode, the routing device IS-IS advertisements are originated with the overload
bit set. This causes the transit traffic to take paths around the routing device. However,
the overloaded routing device’s own links are still accessible.
1. When the overload bit has already been set to a given value and the routing process
is restarted: Link-state PDUs are regenerated with the overload bit cleared.
2. When the overload bit is reset to a lesser value while the routing process is running:
Link-state PDUs are regenerated with the overload bit cleared.
3. When the overload bit is reset to a greater value while the routing process is running:
Link-state PDUs are regenerated with the overload bit set to the difference between
the old and new value.
In overload mode, the routing device advertisement is originated with all the transit routing
device links (except stub) set to a metric of 0xFFFF. The stub routing device links are
advertised with the actual cost of the interfaces corresponding to the stub. This causes
the transit traffic to avoid the overloaded routing device and take paths around the routing
device.
To understand the reason for setting the overload bit, consider that BGP converges slowly.
It is not very good at detecting that a neighbor is down because it has slow-paced
keepalive timers. Once the BGP neighbor is determined to be down, it can take up to 2
minutes for a BGP router to declare the neighbor down. IS-IS is much quicker. IS-IS only
takes 10-30 seconds to detect absent peers. It is the slowness of BGP, more precisely
the slowness of internal BGP (IBGP), that necessitates the use of the overload bit. IS-IS
and BGP routing are mutually dependent on each other. If both do not converge at the
same time, traffic is dropped without notification (black holed).
You might want to configure the routing device so that it appears to be overloaded when
you are restarting routing on the device. Setting the overload bit for a fixed amount of
time right after a restart of the routing protocol process (rpd) ensures that the router
does not receive transit traffic while the routing protocols (especially IBGP) are still
converging.
Setting the overload bit is useful when performing hardware or software maintenance
work on a routing device. After the maintenance work, clear the overload bit to carry on
forwarding transit traffic. Manual clearing of the overload bit is not always possible. What
is needed is an automated way of clearing the overload bit after some amount of time.
Most networks use a time value of 300 seconds. This 5-minute value provides a good
balance, allowing time to bring up even large internal IBGP meshes, while still relatively
quick.
Another appropriate application for setting for the overload bit is on dedicated devices
such as BGP route reflectors, which are intentionally not meant to carry any transit traffic.
In this case, you would not use the timer.
You can verify that the overload bit is set by running the show isis database command.
The advertise-high-metric setting is only valid while the routing device is in overload mode.
When advertise-high-metric is configured, IS-IS does not set the overload bit. Rather,
it sets the metric to 63 or 16,777,214, depending whether wide metrics are enabled.
This allows the overloaded routing device to be used for transit as a last resort.
An L1-L2 router in overload mode stops leaking route information between L1 and L2
levels and clears its attached bit. This is also true when advertise-high-metrics is
configured.
NOTE: The allow-route-leaking option does not work if the routing device is
in dynamic overload mode. Dynamic overload can occur if the device has
exceeded its resource limits, such as the prefix limit.
Syntax passive {
remote-node-id address;
remote-node-iso iso-id;
}
Description Advertise the direct interface addresses on an interface or into a level on the interface
without actually running IS-IS on that interface or level.
This statement effectively prevents IS-IS from running on the interface. To enable IS-IS
on an interface, include the interface statement at the [edit protocols isis] or the [edit
routing-instances routing-instance-name protocols isis] hierarchy level. To disable it,
include the disable statement at those hierarchy levels. The three states—enabling,
disabling, or not running IS-IS on an interface—are mutually exclusive.
If neither passive mode nor the family iso option is configured on the IS-IS interface, then
the routing device treats the interface as not being operational, and no direct IPv4/IPv6
routes are exported into IS-IS. (You configure the family iso option at the [edit interfaces
interface-name unit logical-unit-number] hierarchy level.)
Default By default, IS-IS must be configured on an interface or a level for direct interface addresses
to be advertised into that level.
per-interface-per-member-link
Sensor-based statistics is the traffic statistics in a segment routing (SR) network that
can be recorded in an OpenConfig compliant format for Layer 3 interfaces. The statistics
is recorded for the Source Packet Routing in Networking (SPRING) traffic only, excluding
RSVP and LDP-signaled traffic, and the family MPLS statistics per interface is accounted
for separately. The SR statistics also includes SPRING traffic statistics per link aggregation
group (LAG) member, and per segment identifier (SID).
NOTE: On PTX Series Routers, the sensor based statistics for SPRING
traffic is recorded at the ingress interface only.
per-sid
Syntax per-sid {
egress;
ingress;
}
Description Configure sensor based statistics per Source Packet Routing in Networking (SPRING)
route.
Sensor-based statistics is the traffic statistics in a segment routing (SR) network that
can be recorded in an OpenConfig compliant format for Layer 3 interfaces. The statistics
is recorded for SPRING traffic only, excluding RSVP and LDP-signaled traffic, and the
family MPLS statistics per interface is accounted for separately. The SR statistics also
includes SPRING traffic statistics per link aggregation group (LAG) member, and per
segment identifier (SID).
Options egress—Enable sensor based statistics for IP-MPLS egress accounting. This is supported
only for segment routing label IS-IS egress routes at the ingress provider edge (PE)
device.
point-to-point
Syntax point-to-point;
You can use the point-to-point statement to configure a LAN interface to act like a
point-to-point interface for IS-IS. You do not need an unnumbered LAN interface, and it
has no effect if configured on an interface that is already point-to-point.
The point-to-point statement affects only IS-IS protocol procedures on that interface.
All other protocols continue to treat the interface as a LAN interface. Only two IS-IS
routing devices can be connected to the LAN interface, and both must be configured as
point-to-point.
post-convergence-lfa
Hierarchy Level [edit logical-systems name protocols isis interface name level number],
[edit logical-systems name routing-instances name protocols isis interface name level
number],
[edit protocols isis interface name level number ],
[edit routing-instances name protocols isis interface name level number]
Release Information Statement introduced in Junos OS Release 17.4R1 for MX Series, PTX Series, and QFX
Series.
The remaining statements are explained separately. Search for a statement in CLI Explorer
or click a linked statement in the Syntax section for details.
Route preferences (also known as administrative distances) are used to select which
route is installed in the forwarding table when several protocols calculate routes to the
same destination. The route with the lowest preference value is selected.
To change the preference values, include the preference statement (for internal routes)
or the external-preference statement.
By default, there is no limit to the number of prefixes that can be exported into IS-IS. To
configure a limit to the number of prefixes that can be exported into IS-IS, include the
prefix-export-limit statement. The prefix-export-limit statement protects the rest of the
network from a malicious policy by applying a threshold filter for exported routes.
The number of prefixes depends on the size of your network. Good design advice is to
set it to double the total number of IS-IS Level 1 and Level 2 routing devices in your
network.
If the number of prefixes exported into IS-IS exceeds the configured limit, the overload
bit is set and the overload state is reached. When other routers detect that this bit is set,
they do not use this routing device for transit traffic, but they do use it for packets destined
to the overloaded routing device’s directly connected networks and IP prefixes. The
overload state can be cleared by using the clear isis overload command.
The show isis overview command displays the prefix export limit when it is configured.
prefix-segment
Syntax prefix-segment {
index index;
node-segment;
}
Release Information Statement introduced in Junos OS Release 17.2 for the MX Series routers, PTX Series
routers, QFX5100 switches, and QFX10000 switches.
Statement introduced in Junos OS Release 17.3R1 for the QFX5110 and QFX5200 switches.
Statement introduced under [edit protocols ospf source-packet-routing] hierarchy in
Junos OS Release 19.1R1 for MX Series.
Description Configure prefix segment attributes such as index and node segment. Prefix segment
index is the index assigned to a specific prefix. This is used by all other remote routers in
the network to index the prefix into respective segment routing global blocks (SRGB) to
derive the segment identifier and to forward the traffic destined for the current prefix.
Prefix segment index is provisioned through policy for each prefix along with the option
to mark it as a node segment.
• Configuring Anycast and Prefix segments in SPRING for IS-IS Protocol on page 327
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Configure the interface’s priority for becoming the designated router. The interface with
the highest priority value becomes that level’s designated router.
A routing device advertises its priority to become a designated router in its hello packets.
On all multiaccess networks, IS-IS uses the advertised priorities to elect a designated
router for the network. This routing device is responsible for sending network link-state
advertisements, which describe all the routing devices attached to the network. These
advertisements are flooded throughout a single area.
A routing device’s priority for becoming the designated router is indicated by an arbitrary
number from 0 through 127. Routing devices with a higher value are more likely to become
the designated router.
protocols
Syntax protocols {
bgp {
... bgp-configuration ...
}
isis {
... isis-configuration ...
}
ldp {
... ldp-configuration ...
}
mpls {
... mpls -configuration ...
}
msdp {
... msdp-configuration ...
}
mstp {
... mstp-configuration ...
}
ospf {
domain-id domain-id;
domain-vpn-tag number;
route-type-community (iana | vendor);
traffic-engineering {
<advertise-unnumbered-interfaces>;
<credibility-protocol-preference>;
ignore-lsp-metrics;
multicast-rpf-routes;
no-topology;
shortcuts {
lsp-metric-into-summary;
}
}
... ospf-configuration ...
}
ospf3 {
domain-id domain-id;
domain-vpn-tag number;
route-type-community (iana | vendor);
traffic-engineering {
<advertise-unnumbered-interfaces>;
<credibility-protocol-preference>;
ignore-lsp-metrics;
multicast-rpf-routes;
no-topology;
shortcuts {
lsp-metric-into-summary;
}
}
... ospf3-configuration ...
}
pim {
... pim-configuration ...
}
rip {
... rip-configuration ...
}
ripng {
... ripng-configuration ...
}
rstp {
rstp-configuration;
}
rsvp{
... rsvp-configuration ...
}
vstp {
vstp configuration;
}
vpls {
vpls configuration;
}
}
Description Specify the protocol for a routing instance. You can configure multiple instances of many
protocol types. Not all protocols are supported on the switches. See the switch CLI.
ldp—Specify LDP as the protocol for a routing instance or for a virtual router instance.
msdp—Specify the Multicast Source Discovery Protocol (MSDP) for a routing instance.
mstp—Specify the Multiple Spanning Tree Protocol (MSTP) for a virtual switch routing
instance.
pim—Specify the Protocol Independent Multicast (PIM) protocol for a routing instance.
ripng—Specify RIP next generation (RIPng) as the protocol for a routing instance.
rstp—Specify the Rapid Spanning Tree Protocol (RSTP) for a virtual switch routing
instance.
vstp—Specify the VLAN Spanning Tree Protocol (VSTP) for a virtual switch routing
instance.
purge-originator
Syntax purge-originator {
empty|self;
}
Release Information Statement introduced in Junos OS Release 15.1 F4 and 16.2R1 for the MX Series and PTX
Series.
Description Enable purge originator identification (POI) by adding the type, length and value (TLV)
with the Intermediate System (IS) identification to the LSPs that do not contain POI
information. If an IS generates a purge, Junos adds this TLV with the system ID of the IS
to the purge.
If an IS receives a purge that does not include this TLV, it adds this TLV with both its own
system ID and the system ID of the IS from which it received the purge. This allows the
IS that receives this purge to log the system ID of the originator, or the upstream source
of the purge and makes it easier to locate the origin of the purge.
Options empty—(Optional) Add POI to a purge received from an IS that does not contain POI
information
Description Optimize routing based on bandwidth by setting the reference bandwidth used in
calculating the default interface cost.
All IS-IS interfaces have a cost, which is a routing metric that is used in the IS-IS link-state
calculation. Routes with lower total path metrics are preferred over those with higher
path metrics. When there are several equal-cost routes to a destination, traffic is
distributed equally among them. Tweak the reference bandwidth to route traffic across
the fastest interface.
The cost of a route is described by a single dimensionless metric that is determined using
the following formula:
cost = reference-bandwidth/bandwidth
For example, if you set the reference bandwidth to 1 Gbps (that is, reference-bandwidth
is set to 1,000,000,000), a 100-Mbps interface has a routing metric of 10.
All IS-IS interfaces have a cost, which is a routing metric that is used in the IS-IS link-state
calculation. Routes with lower total path metrics are preferred over those with higher
path metrics. By default, IS-IS has a metric of 10. Modify the configured reference
bandwidth to increase the cost of an interface in order to avoid a slow route or you can
modify the reference bandwidth value to decrease the cost of a preferred interface. A
route that has a lower cost is selected over a high cost route. Note that fractional metric
values are not allowed. Therefore, if you configure a reference bandwidth that is higher
than the actual bandwidth, which results in a fractional metric value then IS-IS takes the
metric value as 1 because fractional metric values are not allowed.
• https://www.juniper.net/us/en/training/certification/JNCIP_studyguide.pdf
remote-backup-calculation
Syntax remote-backup-calculation;
Description Determine the remote LFA backup paths from the point of local repair (PLR) in an IS-IS
network. For every protected link on the PLR, Junos OS creates a dynamic LDP
label-switched path to reach the remote LFA node. When the primary link fails, the PLR
uses these remote LFA backup paths to reach all the destinations reachable via the
primary-link.
Related • auto-targeted-session
Documentation
• backup-spf-options on page 461
Syntax rib-group {
inet group-name;
inet6 group-name;
}
Description Install routes learned from IS-IS routing instances into routing tables in the IS-IS routing
table group. You can install IPv4 routes or IPv6 routes.
Support for IPv6 routing table groups in IS-IS enables IPv6 routes that are learned from
IS-IS routing instances to be installed into other routing tables defined in an IS-IS routing
table group.
Related • Example: Exporting Specific Routes from One Routing Table Into Another Routing Table
Documentation
• Example: Importing Direct and Static Routes Into a Routing Instance
Description Configure an additional routing entity for a router. You can create multiple instances of
BGP, IS-IS, OSPF, OSPFv3, and RIP for a router. You can also create multiple routing
instances for separating routing tables, routing policies, and interfaces for individual
wholesale subscribers (retailers) in a Layer 3 wholesale network.
Each routing instance has a unique name and a corresponding IP unicast table. For
example, if you configure a routing instance with the name my-instance, its corresponding
IP unicast table is my-instance.inet.0. All routes for my-instance are installed into
my-instance.inet.0.
Routes are installed into the default routing instance inet.0 by default, unless a routing
instance is specified.
In Junos OS Release 9.0 and later, you can no longer specify a routing-instance name of
master, default, or bgp or include special characters within the name of a routing instance.
In Junos OS Release 9.6 and later, you can include a slash (/) in a routing-instance name
only if a logical system is not configured. That is, you cannot include the slash character
in a routing-instance name if a logical system other than the default is explicitly configured.
Routing-instance names, further, are restricted from having the form __.*__ (beginning
and ending with underscores). The colon : character cannot be used when multitopology
routing (MTR) is enabled.
Description Configure traffic statistics in a segment routing (SR) network that can be recorded in an
OpenConfig compliant format for Layer 3 interfaces. The statistics is recorded for the
Source Packet Routing in Networking (SPRING) traffic only, excluding RSVP and
LDP-signaled traffic, and the family MPLS statistics per interface is accounted for
separately. The SR statistics also includes SPRING traffic statistics per link aggregation
group (LAG) member, and per segment identifier (SID).
Syntax shortcuts {
multicast-rpf-routes;
}
Hierarchy Level [edit logical-systems logical-system-name protocols isis traffic-engineering family (inet |
inet6)],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis traffic-engineering family (inet | inet6)],
[edit protocols isis traffic-engineering family (inet | inet6)],
[edit routing-instances routing-instance-name protocols isis traffic-engineering family (inet
| inet6)]
Description Configure IS-IS to use MPLS label-switched paths (LSPs) as next hops if possible when
installing routing information into the inet.3 or inet6.3 routing table. Internal gateway
protocol (IGP) shortcuts allow the IGP to install prefixes in inet.3 or inet6.3.
It is only necessary to enable IGP shortcuts on the ingress router because that is the router
performing the shortest-path-first (SPF) calculations.
It is important to understand how IGP shortcuts affect the protocol and routing table
relationship. The IGP performs SPF calculations to subnets downstream of LSP egress
points, but the results of these calculations are entered into the inet.3 table only. At the
same time, the IGP performs its traditional SPF calculations and enters the results of
these calculations into the inet.0 table. The result is that although the IGP is making
entries into the inet.3 table, BGP is still the only protocol with visibility into that table for
the purposes of route resolution. Therefore, forwarding to AS-internal destinations still
uses the inet.0 IGP routes, and the LSPs are only used for BGP next-hop resolution. If
you want the LSPs to be used for IGP next-hop resolution, you must configure
traffic-engineering bgp-igp.
Syntax spf-options {
delay milliseconds;
holddown milliseconds;
rapid-runs number;
}
Running the SPF algorithm is usually the beginning of a series of larger system-wide
events. For example, the SPF algorithm can lead to interior gateway protocol (IGP) prefix
changes, which then lead to BGP nexthop resolution changes. Consider what happens
if there are rapid link changes in the network. The local routing device can become
overwhelmed. This is why it sometimes makes sense to throttle the scheduling of the
SPF algorithm.
• The delay in the time between the detection of a topology change and when the SPF
algorithm actually runs.
• The maximum number of times that the SPF algorithm can run in succession before
the hold-down timer begins.
• The time to hold down, or wait, before running another SPF calculation after the SPF
algorithm has run in succession the configured maximum number of times.
If the network stabilizes during the hold-down period and the SPF algorithm does not
need to run again, the system reverts to the configured values for the delay and rapid-runs
statements.
Options delay milliseconds—Time interval between the detection of a topology change and when
the SPF algorithm runs.
Range: 50 through 1000 milliseconds
Default: 200 milliseconds
rapid-runs number—Maximum number of times the SPF algorithm can run in succession.
After the maximum is reached, the holddown interval begins.
Range: 1 through 5
Default: 3
static-host-mapping
Syntax static-host-mapping {
hostname {
alias [ aliases ];
inet [ addresses ];
inet6 [ addresses];
sysid system-identifier;
}
}
Description (Optional) Statically map a hostname to one or more IP addresses and aliases, and
configure an International Organization for Standardization (ISO) system identifier
(system ID).
Default If you do not statically map the hostname, the mapping is generated dynamically, based
on the system configuration. For instance, if you omit the static-host-mapping hostname
sysid statement, the IS-IS system ID is dynamically generated from the host portion of
the ISO address configured on the loopback interface (lo0) and is mapped to the
host-name statement configured at the [edit system] hierarchy level.
inet address—IP address. You can specify one or more IP addresses for the host.
sysid system-identifier—ISO system identifier (system ID). This is the 6-byte portion of
the Intermediate System-to-Intermediate System (IS-IS) network service access
point (NSAP). We recommend that you use the host’s IP address represented in
binary-coded decimal (BCD) format. For example, the IP address 208.197.169.18 is
2081.9716.9018 in BCD.
Syntax source-packet-routing {
disable;
}
Release Information Statement introduced in Junos OS Release 16.2R1 for MX Series routers.
Statement introduced in Junos OS Release 16.1X65 for the PTX1000 routers.
Statement introduced in Junos OS Release 17.2R1 for QFX5100, QFX5110, and QFX10000
switches.
Statement introduced in Junos OS Release 17.3R1 for QFX5110 and QFX5200 switches.
Statement introduced in Junos OS Release 18.4R1 for ACX5448 routers.
Description Disable source packet routing in networking (SPRING) feature at a specific level.
Syntax source-packet-routing {
adjacency-segment {
hold-time hold-time;
}
disable;
explicit-null;
node-segment {
index-range index range;
ipv4-index index;
ipv6-index index;
}
srgb {
start-label start-label;
index-range index range;
}
}
Release Information Statement introduced in Junos OS Release 16.2R1 for MX Series routers.
Statement introduced in Junos OS Release 16.1X65 for the PTX1000 routers.
Statement introduced in Junos OS Release 17.2R1 for QFX5100 switches and QFX10000
switches.
Support for explicit-null and adjacency-segment statements introduced in Junos OS
Release 17.2R1 for MX Series routers, PTX Series routers, QFX5100 switches and QFX10000
switches.
Statement introduced in Junos OS Release 17.3R1 for QFX5110 and QFX5200 switches.
Statement introduced in Junos OS Release 18.4R1 for ACX5448 routers.
Description Enable source packet routing in networking (SPRING) feature on IS-IS levels or OSPF
areas.
NOTE: Source packet routing for IPv6 is supported only for IS-IS. The
adjacency-segment, explicit-null, and srgb statements are supported only for
IS-IS.
Default Disabled.
• Configuring Anycast and Prefix segments in SPRING for IS-IS Protocol on page 327
srgb
Syntax srgb {
start-label start-label-value;
index-range index range-value;
}
Release Information Statement introduced in Junos OS Release 17.2 for the MX Series routers in Enhanced-IP
mode, PTX Series routers, QFX5100 switches, and QFX10000 switches.
Statement introduced in Junos OS Release 17.3 for QFX5110 and QFX5200 switches.
Description Configure the segment routing global block (SRGB) in source packet routing in networking
(SPRING) or segment routing (SR). The SRGB label range is based on the start label and
the index range. The value of the start label indicates the start of the label range, and
the value of the index range along with the value of the start label indicate the end of
the label range.
• Configuring Segment Routing Global Blocks Label Ranges in SPRING for IS-IS Protocol
on page 325
• Example: Configuring Segment Routing Global Blocks in SPRING for IS-IS to Increase
Network Speed on page 295
Hierarchy Level [edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]
Description Set the metric value used by traffic engineering for information injected into the traffic
engineering database. The value of the traffic engineering metric does not affect normal
IS-IS forwarding.
When traffic engineering is enabled on the routing device, you can use this statement to
configure an IS-IS metric that is used exclusively for traffic engineering.
Syntax topologies {
ipv4-multicast;
ipv6-multicast;
ipv6-unicast;
}
Related • Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 178
Documentation
• Example: Configuring IS-IS Multicast Topology on page 155
Syntax traceoptions {
file name <size size> <files number> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
Description Configure IS-IS protocol-level tracing options. To specify more than one tracing operation,
include multiple flag statements.
Default The default IS-IS protocol-level tracing options are those inherited from the routing
protocols traceoptions statement included at the [edit routing-options] hierarchy level.
Options disable—(Optional) Disable the tracing operation. You can use this option to disable a
single operation when you have defined a broad group of tracing operations, such
as all.
file name—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks (“ ”). All files are placed in the directory /var/log. We
recommend that you place IS-IS tracing output in the file isis-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then, the oldest trace file
is overwritten.
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
Range: 2 through 1000 files
Default: 10 files
flag flag—Tracing operation to perform. To specify more than one flag, include multiple
flag statements.
• hello—Hello packets
• lsp—Link-state PDUs
• spf—Shortest-path-first calculations
Default: If you do not specify this option, only unusual or abnormal operations are traced.
• state—State transitions
flag-modifier—(Optional) Modifier for the tracing flag. You can specify one or more of
these modifiers:
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then, the oldest trace file is
overwritten. Note that if you specify a maximum file size, you also must specify a
maximum number of trace files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
Related • Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
Documentation on page 365
• Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking on page 42
• Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 365
Syntax traffic-engineering {
disable;
credibility-protocol-preference;
igp-topology;
family inet {
shortcuts {
multicast-rpf-routes;
}
}
family inet-mpls {
shortcuts;
}
family inet6 {
shortcuts;
}
family inet6-mpls {
shortcuts;
}
multipath {
lsp-equal-cost;
}
}
on the ingress router, contains the host address of each MPLS label-switched path (LSP)
egress router. BGP uses this routing table to resolve next-hop addresses.
If you enable IS-IS traffic engineering shortcuts and if there is a label-switched path to
a point along the path to that prefix, IS-IS installs the prefix in the inet.3 routing table
and uses the LSP as a next hop. The net result is that for BGP egress routers for which
there is no LSP, BGP automatically uses an LSP along the path to reach the egress router.
In Junos OS Release 9.3 and later, IS-IS traffic engineering shortcuts support IPv6 routes.
LSPs to be used for shortcuts continue to be signaled using IPv4. However, by default,
shortcut routes calculated through IPv6 routes are added to the inet6.3 routing table.
The default behavior is for only BGP to use LSPs in its calculations. If you configure MPLS
so that both BGP and interior gateway protocols use LSPs for forwarding traffic, shortcut
routes calculated through IPv6 are added to the inet6.0 routing table. IS-IS ensures that
the IPv6 routes running over the IPv4 MPLS LSP are correctly de-encapsulated at the
tunnel egress by pushing an extra IPv6 explicit null label between the IPv6 payload and
the IPv4 transport label.
RSVP LSPs with a higher preference than IS-IS routes are not considered during the
computation of traffic engineering shortcuts.
To configure IS-IS so that it uses LSPs as shortcuts when installing information in the
inet.3 or inet6.3 routing table, include the following statements:
family inet {
shortcuts {
multicast-rpf-routes;
}
}
family inet6 {
shortcuts;
}
For IPv4 traffic, include the inet statement. For IPv6 traffic, include the inet6 statement.
To configure IPv4 MPLS or IPv6 MPLS shortcuts explicitly for segment routing, include
the inet-mpls statement for IPv4 MPLS traffic and the inet6-mpls statement for IPv6
MPLS traffic.
To configure load balancing across multiple LSPs, include the multipath statement.
When traffic engineering shortcuts are used, RSVP first looks at the metric2 value, which
is derived from the IGP cost. After this, RSVP considers the LSP metric value. So, if a
certain path changes for an LSP and the cost changes, not all LSPs are used to load-
balance the network.
When a route with an improved metric is added to the IS-IS internal routing table, IS-IS
flushes all next-hop information (including LSP next-hop information) for a route. This
is undesirable, because certain equal-cost multipath (ECMP) combinations can be lost
during route calculation. To override this default behavior for load balancing, include the
lsp-equal-cost statement to retain the equal cost path information in the routing table.
multipath {
lsp-equal-cost;
}
Because the inet.3 routing table is present only on ingress routers, you can configure LSP
shortcuts only on these routers.
By default, IS-IS supports traffic engineering by exchanging basic information with the
traffic engineering database. To disable this support, and to disable IS-IS shortcuts if
they are configured, include the disable statement.
The traffic engineering database assigns a credibility value to each IGP and prefers
the routes of the IGP with the highest credibility value. In Junos OS Release 9.4 and
later, you can configure IS-IS to take protocol preference into account to determine
the traffic engineering database credibility value. When protocol preference is used
to determine the credibility value, IS-IS routes are not automatically preferred by
the traffic engineering database, depending on your configuration. For example,
OSPF routes have a default preference value of 10, whereas IS-IS Level 1 routes have
a default preference value of 15. When protocol preference is enabled, the credibility
value is determined by deducting the protocol preference value from a base value
of 512. Using default protocol preference values, OSPF has a credibility value of 502,
whereas IS-IS has a credibility value of 497. Because the traffic engineering database
prefers IGP routes with the highest credibility value, OSPF routes are now preferred.
• traffic-engineering (OSPF)
• Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 246
traffic-statistics
Release Information Statement introduced in Junos OS Release 17.3R1 for the MX Series and PTX Series.
Description Enable traffic measuring on the SPRING link. RSVP-TE needs to measure the bandwidth
utilized by SPRING and estimate the available bandwidth at its disposal for traffic
engineering. Traffic statistics are collected at a configured interval. The average of the
measured SPRING bandwidth is reported to RSVP only when a set threshold is breached.
RSVP then passes on this information to the IGP for reallocation of bandwidth.
update-threshold-max-reservable
Release Information Statement introduced in Junos OS Release 17.3R1 for MX Series and PTX Series.
percent option introduced in Junos OS Release 17.4R1 for MX Series and PTX Series.
Description Configure a threshold in bits per second. When SPRING bandwidth utilization exceeds
this threshold, Resource Reservation Protocol (RSVP) reports this event to IGP and
preempts the labeled switched paths (LSPs). However, if this threshold is not exceeded,
RSVP does not make any changes to the bandwidth allocation.
Note that the changes are not applied by modifying the subscription percentage at the
[edit protocols rsvp interface interface-name] hierarchy level.
Syntax use-source-packet-routing;
Release Information Statement introduced in Junos OS Release 16.2 for the M, MX, and PTX Series.
Statement introduced in Junos OS Release 17.2R1 for QFX5100 and QFX10000 switches.
Statement introduced in Junos OS Release 17.3R1 for QFX5110 and QFX5200 switches.
Statement introduced in Junos OS Release 18.4R1 for ACX5448 routers.
Description Enable use of source packet routing node segment labels for computing backup paths
for normal IPv4 or IPv6 IS-IS prefixes and primary IS-IS source packet routing node
segments.
use-post-convergence-lfa
Release Information Statement introduced in Junos OS Release 17.4R1 for MX Series, PTX Series, and QFX
Series.
Description Calculate post-convergence MPLS fast reroute (FRR) backup next hops for the IS-IS
protocol using segment routing (SR). Topology-independent loop-free alternate (TI-LFA)
provides protection against link failure, node failure, and fate-sharing failures. By default,
Junos OS provides link protection. Junos OS allows you to control the maximum number
of equal-cost multipath (ECMP) backup paths installed for a given destination. Junos
OS also allows you to control the maximum number of labels in the installed backup
paths. Configure the use-source-packet-routing statement at [edit protocols isis
backup-spf-options] hierarchy level to allow the backup paths to be available for inet.0
routing table along with inet.3 routing table.
Default: 3
Range: 2-5
use-for-post-convergence-lfa
Syntax use-for-post-convergence-lfa;
Hierarchy Level [edit logical-systems name routing-instances name routing-options fate-sharing group
group-name],
[edit logical-systems name routing-options fate-sharing group group-name],
[edit routing-instances name routing-options fate-sharing group group-name],
[edit routing-options fate-sharing group group-name]
Release Information Statement introduced in Junos OS Release 17.4R1 for MX Series, PTX Series, and QFX
Series.
Description Use this fate-sharing group as a constraint for the backup path computed by
topology-independent loop-free alternate (TI-LFA).
wide-metrics-only
Syntax wide-metrics-only;
Description Configure IS-IS to generate metric values greater than 63 on a per IS-IS level basis.
Normally, IS-IS metrics can have values up to 63, and IS-IS generates two type, length,
and value (TLV) tuples, one for an IS-IS adjacency and the second for an IP prefix. To
allow IS-IS to support traffic engineering, a second pair of TLVs has been added to IS-IS,
one for IP prefixes and the second for IS-IS adjacency and traffic engineering information.
24
With these TLVs, IS-IS metrics can have values up to 16,777,215 (2 – 1).
To configure IS-IS to generate only the new pair of TLVs and thus to allow the wider
range of metric values, include the wide-metrics-only statement.
Default By default, Junos OS supports the sending and receiving of wide metrics. Junos OS allows
a maximum metric value of 63 and generates both pairs of TLVs.
Operational Commands
Description Clear adaptation for Bidirectional Forwarding Detection (BFD) sessions. BFD is a simple
hello mechanism that detects failures in a network. Configured BFD interval timers can
change, adapting to network situations. Use this command to return BFD interval timers
to their configured values.
The clear bfd adaptation command is hitless, meaning that the command does not affect
traffic flow on the routing device.
Additional Information For more information, see the description of the bfd-liveness-detection configuration
statement in the Junos Routing Protocols Configuration Guide.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
discriminator discr-number—(Optional) Drop the local BFD session matching the specified
discriminator.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Output Fields See show isis adjacency for an explanation of output fields.
Sample Output
The following sample output displays IS-IS adjacency database information before and
after the clear isis adjacency command is entered:
Description Remove the entries from the IS-IS link-state database, which contains prefixes and
topology information.
Options all—Remove all entries from the IS-IS link-state database for all routing instances.
instance instance-name—(Optional) Clear all entries for the specified routing instance.
Output Fields See show isis database for an explanation of output fields.
Sample Output
The following sample output displays IS-IS link-state database information before and
after the clear isis database all command is entered:
Description Reset the IS-IS dynamic overload bit. This command can appear to not work, continuing
to display overload after execution. The bit is reset only if the root cause is corrected by
configuration remotely or locally.
When other routers detect that the overload bit is set, they do not use this routing device
for transit traffic, but they do use it for packets destined to the overloaded routing device’s
directly connected networks and IP prefixes.
instance instance-name—(Optional) Reset the IS-IS dynamic overload bit for the specified
routing instance.
Output Fields See show isis database for an explanation of output fields.
Sample Output
The following sample output displays IS-IS database information before and after the
clear isis overload command is entered:
1 LSPs
IS-IS level 2 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
pro3-c.00-00 0x5 0x429f 1185 L1 L2 Overload
Options none—Set IS-IS traffic statistics to zero for all routing instances.
instance instance-name—(Optional) Set IS-IS traffic statistics to zero for the specified
routing instance only.
Output Fields See show isis statistics for an explanation of output fields.
Sample Output
The following sample output displays IS-IS statistics before and after the
clear isis statistics command is entered:
SPF runs: 0
Fragments rebuilt: 0
LSP regenerations: 0
Purges initiated: 0
Release Information Command introduced in Junos OS Release 17.3R1 on the MX Series and PTX Series.
Description Clear all IS-IS SPRING traffic statistics. The Packet Forwarding Engine (PFE) does not
support clearing the counters. The IS-IS routing protocol must maintain the traffic counters
corresponding to the time when clear was issued and subtract it from the next sample.
Use this command when the routing protocol process (rpd) restarts and the IS-IS time
stamps are lost. The existing clear statistics command might not clear all SPRING traffic
statistics.
all— (Optional) Clear IS-IS SPRING traffic statistics for all interfaces.
interface interface— (Optional) Clear all IS-IS SPRING traffic statistics for an interface
ping clns
Description Check the reachability of a remote Connectionless Network Service (CLNS) node. Type
Ctrl+c to interrupt a ping clns command.
detail—(Optional) Include in the output the interface on which the ping reply was received.
interval seconds—(Optional) How often to send ping requests. The range of values, in
seconds, is 1 through infinity. The default value is 1.
pattern string—(Optional) Specify a hexadecimal fill pattern to include in the ping packet.
rapid—(Optional) Send ping requests rapidly. The results are reported in a single message,
not in individual messages for each ping request. By default, five ping requests are
sent before the results are reported. To change the number of request, include the
count option.
size bytes—(Optional) Size of ping request packets. The range of values, in bytes, is 0
through 65,468. The default value is 56, which is effectively 64 bytes because 8
bytes of ICMP header data are added to the packet.
ttl value—(Optional) Time-to-live (TTL) value to include in the ping request (IPv6). The
range of values is 0 through 255.
wait seconds—(Optional) Maximum wait time, in seconds, after the final packet is sent.
If this option is not specified, the default delay is 10 seconds. If this option is used
without the count option, a default count of 5 packets is used.
Output Fields When you enter this command, you are provided feedback on the status of your request.
An exclamation point (!) indicates that an echo reply was received. A period (.) indicates
that an echo reply was not received within the timeout period. An x indicates that an
echo reply was received with an error code. Packets with an error code are not counted
in the received packets count. They are accounted for separately.
Sample Output
ping clns
user@host> ping clns 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00
PING 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00
(47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00): 55 data bytes
64 bytes from 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00: seq=0 ttl=30
time=15.051 ms
64 bytes from 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00: seq=1 ttl=30
time=10.370 ms
64 bytes from 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00: seq=2 ttl=30
time=10.367 ms
--- ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 10.367/11.929/15.051/2.207 ms
restart
Syntax restart
<adaptive-services |ancpd-service | application-identification |audit-process |
auto-configuration |captive-portal-content-delivery |ce-l2tp-service |chassis-control |
class-of-service |clksyncd-service |database-replication|datapath-trace-service
|dhcp-service | diameter-service | disk-monitoring | dynamic-flow-capture |
ecc-error-logging | ethernet-connectivity-fault-management
|ethernet-link-fault-management |event-processing | firewall |
general-authentication-service | gracefully | iccp-service |idp-policy | immediately
|interface-control | ipsec-key-management | kernel-health-monitoring | kernel-replication
| l2-learning | l2cpd-service | l2tp-service | l2tp-universal-edge | lacp | license-service
|link-management |local-policy-decision-function |mac-validation |mib-process |
mountd-service |mpls-traceroute |mspd | multicast-snooping |named-service | nfsd-service
| packet-triggered-subscribers |peer-selection-service |pgm | pic-services-logging |
pki-service |ppp | ppp-service | pppoe | protected-system-domain-service |
redundancy-interface-process | remote-operations | root-system-domain-service | routing
<logical-system logical-system-name> | sampling | sbc-configuration-process | sdk-service
|service-deployment | services | snmp |soft |static-subscribers |statistics-service|
subscriber-management | subscriber-management-helper | tunnel-oamd |usb-control|
vrrp |web-management>
<gracefully | immediately | soft>
• sfc and all-sfc for the TX Matrix Router in Junos OS Release 9.6.
all-chassis—(TX Matrix and TX Matrix Plus routers only) (Optional) Restart the software
process on all chassis.
all-lcc—(TX Matrix and TX Matrix Plus routers only) (Optional) For a TX Matrix router,
restart the software process on all T640 routers connected to the TX Matrix router.
For a TX Matrix Plus router, restart the software process on all T1600 routers
connected to the TX Matrix Plus router.
all-members—(MX Series routers only) (Optional) Restart the software process for all
members of the Virtual Chassis configuration.
all-sfc—(TX Matrix Plus routers only) (Optional) For a TX Matrix Plus router, restart the
software processes for the TX Matrix Plus router (or switch-fabric chassis).
ce-l2tp-service—(M10, M10i, M7i, and MX Series routers only) (Optional) Restart the
Universal Edge Layer 2 Tunneling Protocol (L2TP) process, which establishes L2TP
tunnels and Point-to-Point Protocol (PPP) sessions through L2TP tunnels.
dhcp—(EX Series switches only) (Optional) Restart the software process for a Dynamic
Host Configuration Protocol (DHCP) server. A DHCP server allocates network IP
addresses and delivers configuration settings to client hosts without user intervention.
dialer-services—(EX Series switches only) (Optional) Restart the ISDN dial-out process.
dlsw—(QFX Series only) (Optional) Restart the data link switching (DLSw) service.
isdn-signaling—(QFX Series only) (Optional) Restart the ISDN signaling process, which
initiates ISDN connections.
l2tp-service— (M10, M10i, M7i, and MX Series routers only) (Optional) Restart the Layer 2
Tunneling Protocol (L2TP) process, which sets up client services for establishing
Point-to-Point Protocol (PPP) tunnels across a network and negotiating Multilink
PPP if it is implemented.
lacp—(Optional) Restart the Link Aggregation Control Protocol (LACP) process. LACP
provides a standardized means for exchanging information between partner systems
on a link to allow their link aggregation control instances to reach agreement on the
identity of the LAG to which the link belongs, and then to move the link to that LAG,
and to enable the transmission and reception processes for the link to function in
an orderly manner.
lcc number—(TX Matrix and TX Matrix Plus routers only) (Optional) For a TX Matrix
router, restart the software process for a specific T640 router that is connected to
the TX Matrix router. For a TX Matrix Plus router, restart the software process for a
specific router that is connected to the TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
link-management— (TX Matrix and TX Matrix Plus routers and EX Series switches only)
(Optional) Restart the Link Management Protocol (LMP) process, which establishes
and maintains LMP control channels.
lldpd-service—(EX Series switches only) (Optional) Restart the Link Layer Discovery
Protocol (LLDP) process.
local—(MX Series routers only) (Optional) Restart the software process for the local
Virtual Chassis member.
mac-validation— (Optional) Restart the Media Access Control (MAC) validation process,
which configures MAC address validation for subscriber interfaces created on demux
interfaces in dynamic profiles on MX Series routers.
member member-id—(MX Series routers only) (Optional) Restart the software process
for a specific member of the Virtual Chassis configuration. Replace member-id with
a value of 0 or 1.
nfsd-service—(Optional) Restart the Remote NFS Server process, which provides remote
file access for applications that need NFS-based transport.
pgm—(Optional) Restart the process that implements the Pragmatic General Multicast
(PGM) protocol for assisting in the reliable delivery of multicast packets.
pic-services-logging—(Optional) Restart the logging process for some PICs. With this
process, also known as fsad (the file system access daemon), PICs send special
logging information to the Routing Engine for archiving on the hard disk.
routing—(ACX Series routers, QFX Series, EX Series switches, and MX Series routers only)
(Optional) Restart the routing protocol process.
scc—(TX Matrix routers only) (Optional) Restart the software process on the TX Matrix
router (or switch-card chassis).
sdk-service—(Optional) Restart the SDK Service process, which runs on the Routing
Engine and is responsible for communications between the SDK application and
Junos OS. Although the SDK Service process is present on the router, it is turned off
by default.
sfc number—(TX Matrix Plus routers only) (Optional) Restart the software process on
the TX Matrix Plus router (or switch-fabric chassis). Replace number with 0.
sflow-service—(EX Series switches only) (Optional) Restart the flow sampling (sFlow
technology) process.
snmp—(Optional) Restart the SNMP process, which enables the monitoring of network
devices from a central location and provides the router's or switch’s SNMP master
agent.
tunnel-oamd—(Optional) Restart the Tunnel OAM process, which enables the Operations,
Administration, and Maintenance of Layer 2 tunneled networks. Layer 2 protocol
tunneling (L2PT) allows service providers to send Layer 2 protocol data units (PDUs)
across the provider’s cloud and deliver them to Juniper Networks EX Series Ethernet
Switches that are not part of the local broadcast domain.
vrrp—(ACX Series routers, EX Series switches, and MX Series routers only) (Optional)
Restart the Virtual Router Redundancy Protocol (VRRP) process, which enables
hosts on a LAN to make use of redundant routing platforms on that LAN without
requiring more than the static configuration of a single default route on the hosts.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
show auto-bandwidth
Release Information Command introduced in Junos OS Release 17.3R1 for MX Series and PTX Series.
Description Display the auto-bandwidth information. You can view the traffic or the history log
information in the output.
Options history-log— Display the log of the sensor in the threshold activation period.
traffic (sensor-name brief | detail)—Display the traffic details and the configured
auto-bandwidth parameters.
Output
Collection IntervalFields Time in seconds between two traffic sample collections.
Adjust Interval Time interval after which the average bandwidth utilization is measured.
Average Average bandwidth utilization across the SPRING traffic samples collected.
Last Report Traffic statistics that was last reported indicating the number of packets received in the
last report.
Byte Bucket Count of bytes sent on the link measured periodically as per the configured collection
interval.
Packet Bucket Count of packets sent on the link measured periodically as per the configured collection
interval.
Sample Output
ge-0/0/0.0:
Collection Interval: 10, Adjust Interval : 200, Adjust threshold : 10
Adjust Subscription : 100
Pkt Recv: 1536 Byte Recv: 135168 Poll Count:29 Average:0
Last Report: 2829 Last Report time:Mon Jan 2 11:07:59 2017
Byte Bucket:
0 0 0 0 0
0 0 0 0 0
0 0 0 0 0
0 0 0 0 0
Packet Bucket:
0 0 0 0 0
0 0 0 0 0
0 0 0 0 0
0 0 0 0 0
2000000 0 0 0
Tue Jan 3 18:39:46
ge-0/0/0.0:
Threshold crossed early, waiting for 5sec
Byte Recv:6M Poll Count:2 Average:1Mbps
Last Report:0
Last Report time:Tue Jan 3 18:39:26 2017
Chronological order: First bucket is the most recent
2000000 2000000 0 0
Tue Jan 3 18:39:56
ge-0/0/0.0:
Threshold crossed early, waiting for 5sec
Byte Recv:8M Poll Count:3 Average:1.5Mbps
Last Report:0
Last Report time:Tue Jan 3 18:39:26 2017
Chronological order: First bucket is the most recent
Description Display information about active Bidirectional Forwarding Detection (BFD) sessions.
address address—(Optional) Display information about the BFD session for the specified
neighbor address.
client rsvp-oam
(brief | detail | extensive | summary)
| vpls-oam
(brief | detail | extensive | instance instance-name | summary)—(Optional) Display
information about RSVP-OAM or VPLS-OAM BFD sessions in the specified level of
output. For VPLS-OAM, display the specified level of output or display information
about all of the BFD sessions for the specified VPLS routing instance.
• Example: Configuring BFD for Static Routes for Faster Network Failure Detection
Output Fields Table 10 on page 631 describes the output fields for the show bfd session command.
Output fields are listed in the approximate order in which they appear.
Address Address on which the BFD session is active. brief detail extensive
none
State State of the BFD session: Up, Down, Init (initializing), or Failing. brief detail extensive
none
Interface Interface on which the BFD session is active. brief detail extensive
none
Detect Time Negotiated time interval, in seconds, used to detect BFD control packets. brief detail extensive
none
Transmit Interval Time interval, in seconds, used by the transmitting system to send BFD control brief detail extensive
packets. none
Multiplier Negotiated multiplier by which the time interval is multiplied to determine the detail extensive
detection time for the transmitting system.
Session up time How long a BFD session has been established. detail extensive
Client Protocol or process for which the BFD session is active: ISIS, OSPF, DHCP, Static, detail extensive
or VGD.
TX interval Time interval, in seconds, used by the host system to transmit BFD control brief detail extensive
packets. none
RX interval Time interval, in seconds, used by the host system to receive BFD brief detail extensive
control packets. none
keychain Name of the security authentication keychain being used by a specific client. extensive
algo BFD authentication algorithm being used for a specific client: keyed-md5, extensive
keyed-sha-1, meticulous-keyed-md5, meticulous-keyed-sha-1, or simple-password.
mode Level of BFD authentication enforcement being used by a specific client: strict extensive
or loose. Strict enforcement indicates that authentication is configured at both
ends of the session (the default). Loose enforcement indicates that one end of
the session might not be authenticated.
Local diagnostic Local diagnostic information about failing BFD sessions. detail extensive
Following are the expected values for Local Diagnostic output field:
• None—No diagnostic
• CtlExpire—Control detection time expired
• EchoExpire—Echo detection time expired
• NbrSignal—Neighbor signalled session down
• FwdPlaneReset—Forwarding plane reset
• PathDown—Path down
• ConcatPathDown—Concatenated path down
• AdminDown—Administratively down
Remote diagnostic Remote diagnostic information about failing BFD sessions. detail extensive
Following are the expected values for Remote Diagnostic output field:
• None—No diagnostic
• CtlExpire—Control detection time expired
• EchoExpire—Echo detection time expired
• NbrSignal—Neighbor signalled session down
• FwdPlaneReset—Forwarding plane reset
• PathDown—Path down
• ConcatPathDown—Concatenated path down
• AdminDown—Administratively down
Remote state Reports whether the remote system's BFD packets have been received and detail extensive
whether the remote system is receiving transmitted control packets.
Replicated The replicated flag appears when nonstop routing or graceful Routing Engine detail extensive
switchover is configured and the BFD session has been replicated to the backup
Routing Engine.
Min async interval Minimum amount of time, in seconds, between asynchronous control packet extensive
transmissions across the BFD session.
Min slow interval Minimum amount of time, in seconds, between synchronous control packet extensive
transmissions across the BFD session.
Local min TX Minimum amount of time, in seconds, between control packet transmissions extensive
interval on the local system.
Local min RX Minimum amount of time, in seconds, between control packet detections on extensive
interval the local system.
Remote min TX Minimum amount of time, in seconds, between control packet transmissions extensive
interval on the remote system.
Remote min TX Minimum amount of time, in seconds, between control packet detections on extensive
interval the remote system.
Threshold for Threshold for notification if the detection time increases. extensive
detection time
Local discriminator Authentication code used by the local system to identify that BFD session. extensive
Remote Authentication code used by the remote system to identify that BFD session. extensive
discriminator
Echo mode Information about the state of echo transmissions on the BFD session. extensive
Prefix LDP FEC address associated with the BFD session. All levels
Egress, Destination Displays the LDP FEC destination address. This field is displayed only on a router All levels
at the egress of an LDP FEC, where the BFD session has an LDP Operation,
Administration, and Maintenance (OAM) client.
Remote is The BFD session on the remote peer is running on its Packet Forwarding Engine. extensive
control-plane In this case, when the remote node undergoes a graceful restart, the local peer
independent can help the remote peer with the graceful restart.
The following BFD sessions are not distributed to the Packet Forwarding Engine:
tunnel-encapsulated sessions, and sessions over integrated routing and bridging
(IRB) interfaces.
Session ID The BFD session ID number that represents the protection using MPLS fast detail extensive
reroute (FRR) and loop-free alternate (LFA).
clients Total number of clients that are hosting active BFD sessions. All levels
Cumulative Total number of BFD control packets transmitted per second on all All levels
transmit rate active sessions.
Cumulative receive Total number of BFD control packets received per second on all active sessions. All levels
rate
Multi-hop, Minimum time to live (TTL) accepted if the session is configured for multihop. extensive
min-recv-TTL
route table Route table used if the session is configured for multihop. extensive
local address Local address of the source used if the session is configured for multihop. extensive
The source IP address for outgoing BFD packets from the egress side of an
MPLS BFD session is based on the outgoing interface IP address.
Sample Output
Transmit
Address State Interface Detect Time Interval Multiplier
10.9.1.33 Up so-7/1/0.0 0.600 0.200 3
10.9.1.29 Up ge-4/0/0.0 0.600 0.200 3
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
The output for the show bfd session brief command is identical to that for the show bfd
session command.
Transmit
Address State Interface Detect Time Interval Multiplier
10.9.1.33 Up so-7/1/0.0 0.600 0.200 3
Client OSPF, TX interval 0.200, RX interval 0.200, multiplier 3
Session up time 3d 00:34:02
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Replicated
10.9.1.29 Up ge-4/0/0.0 0.600 0.200 3
Client ISIS L2, TX interval 0.200, RX interval 0.200, multiplier 3
Session up time 3d 00:29:04, previous down time 00:00:01
Local diagnostic NbrSignal, remote diagnostic AdminDown
Remote state Up, version 1
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
Transmit
Address State Interface Detect Time Interval Multiplier
10.9.1.33 Up so-7/1/0.0 0.600 0.200 3
Client OSPF, TX interval 0.200, RX interval 0.200, multiplier 3, Authenticate
Session up time 3d 00:34:18
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Replicated
10.9.1.29 Up ge-4/0/0.0 0.600 0.200 3
Client ISIS L2, TX interval 0.200, RX interval 0.200, multiplier 3
Session up time 3d 00:29:12, previous down time 00:00:01
Local diagnostic NbrSignal, remote diagnostic AdminDown
Remote state Up, version 1
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
Transmit
Address State Interface Detect Time Interval Multiplier
10.255.245.212 Up 1.200 0.400 3
Client Static, TX interval 0.400, RX interval 0.400, multiplier 3
1 sessions, 1 clients
Cumulative transmit rate 2.5 pps, cumulative receive rate 2.5 pps
Detect Transmit
Address State Interface Time Interval Multiplier
Detect Transmit
Address State Interface Time Interval Multiplier
Detect Transmit
Address State Interface Time Interval Multiplier
10.31.1.2 Up ge-2/1/8.0 0.030 0.010 3
Client OSPF realm ospf-v2 Area 0.0.0.0, TX interval 0.010, RX interval 0.010
2 sessions, 2 clients
Cumulative transmit rate 200.0 pps, cumulative receive rate 200.0 pps
Detect Transmit
Address State Interface Time Interval Multiplier
192.168.208.26 Up so-1/0/0.0 2.400 0.800 10
Client Static, TX interval 0.600, RX interval 0.600, Authenticate
keychain bfd, algo keyed-md5, mode loose
Session up time 00:18:07
Local diagnostic None, remote diagnostic NbrSignal
Remote state Up, version 1
Replicated
Min async interval 0.600, min slow interval 1.000
Adaptive async TX interval 0.600, RX interval 0.600
Local min TX interval 0.600, minimum RX interval 0.600, multiplier 10
Remote min TX interval 0.800, min RX interval 0.800, multiplier 3
Local discriminator 2, remote discriminator 3
Echo mode disabled/inactive
Authentication enabled/active, keychain bfd, algo keyed-md5, mode loose
1 sessions, 1 clients
Cumulative transmit rate 1.2 pps, cumulative receive rate 1.2 pps
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.2 Up ae0.0 90.000 30.000 3
1.0.0.6 Up ae0.1 90.000 30.000 3
1.0.0.10 Up ae0.2 90.000 30.000 3
1.0.0.14 Up ae0.3 90.000 30.000 3
1.0.0.18 Up ae0.4 90.000 30.000 3
20 sessions, 20 clients
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.2 Up ae0.0 90.000 30.000 3
1 sessions, 1 clients
Cumulative transmit rate 5.0 pps, cumulative receive rate 5.0 pps
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.2 Up ae0.0 90.000 30.000 3
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.6 Up ae0.1 90.000 30.000 3
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.2 Up ae0.0 90.000 30.000 3
1 sessions, 1 clients
Cumulative transmit rate 5.0 pps, cumulative receive rate 5.0 pps
Options none—Display standard information about IS-IS neighbors for all routing instances.
system id—(Optional) Display information about IS-IS neighbors for the specified
intermediate system.
Output Fields Table 11 on page 641 describes the output fields for the show isis adjacency command.
Output fields are listed in the approximate order in which they appear.
• 1—Level 1 only
• 2—Level 2 only
• 3—Level 1 and Level 2
An exclamation point (!) preceding the level number indicates that the adjacency
is missing an IP address.
State State of the adjacency: Up, Down, New, One-way, Initializing, or Rejected. All levels
SNPA Subnetwork point of attachment (MAC address of the next hop). brief
Up/Down Count of adjacency status changes from Up to Down or from Down to Up. detail
transitions
Circuit type Bit mask of levels on this interface: 1=Level 1 router; 2=Level 2 router; 3=both detail
Level 1 and Level 2 router.
Restart capable Whether a neighbor is capable of graceful restart: Yes or No. detail extensive
Adjacency This routing device has signaled to advertise this interface to its neighbors in detail extensive
advertisement: their link-state PDUs.
Advertise
Adjacency This neighbor has signaled not to advertise the interface in the routing device's detail extensive
advertisement: outbound link-state PDUs.
Suppress
Level 1 IPv4 Level 1 IPv4 node-SID of the adjacent neighbor. detail extensive
Adj-SID
Level 2 IPv4 Level 2 IPv4 node-SID of the adjacent neighbor. detail extensive
Adj-SID
Level 2 IPv6 Level 2 IPv6 node-SID of the adjacent neighbor. detail extensive
Adj-SID
Sample Output
The output for the show isis adjacency brief command is identical to that for the show
isis adjacency command. For sample output, see show isis adjacency on page 643.
ranier
Interface: at-2/3/0.0, Level: 3, State: Up, Expires in 21 secs
Priority: 0, Up/Down transitions: 1, Last transition: 00:01:09 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast, IPV6-Unicast Restart capable: Yes, Adjacency advertisement:
Advertise
LAN id: pro-bng3-c-F.02, IP addresses: 11.1.1.2
IPv6 addresses: fe80::2a0:a514:0:4745
Level 1 IPv4 Adj-SID: 299808, IPv6 Adj-SID: 299824
ranier
Interface: at-2/3/0.0, Level: 3, State: Up, Expires in 22 secs
Priority: 0, Up/Down transitions: 1, Last transition: 00:01:16 ago
Circuit type: 3, Speaks: IP, IPv6
Release Information Command introduced in Junos OS Release 16.1 for the MX Series and PTX Series.
Description Display holddown status and time when IS-IS adjacencies are being formed. Adjacency
holddown process takes place on an IS-IS level basis. When adjacency holdown is
enabled, IS-IS adjacencies are formed sequentially. There is a holddown time between
each adjacency and the process is completed when all IS-IS adjacencies are formed.
This holddown time might cause network instability.
This command is useful to verify whether the adjacency holddown is enabled and
facilitates troubleshooting when there are adjacency issues due to IS-IS adjacency
holddown .
Options none—Display standard overview information about IS-IS adjacency holddown for all
routing instances.
level—(Optional) Display information about IS-IS neighbors for the specified IS-IS level.
• 1—Level 1 information
• 2—Level 2 information
reason The reason for change in the IS-IS adjacency holddown state.
Sample Output
Level status
1 active
2 active
Level: 1
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Transition log:
When State Event reason
Mon Jun 22 05:35:03 Active Seenself
Tue Jun 23 02:13:30 Active Seenself
Tue Jun 23 02:14:40 Inactive Status change holddown complete
Tue Jun 23 02:15:52 Active Seenself
Level: 2
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Transition log:
When State Event reason
Mon Jun 22 05:35:03 Active Seenself
Level: 1
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Level: 2
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Output Fields Table 12 on page 649 describes the output fields for the show isis authentication command.
Output fields are listed in the approximate order in which they appear.
Displays the name of the active keychain if hitless authentication key rollover
is configured.
Sample Output
Options none—Display information about the level of backup coverage available for all the nodes
and prefixes in the network.
Output Fields Table 13 on page 650 lists the output fields for the show isis backup coverage command.
Output fields are listed in the approximate order in which they appear.
• 1—Level 1
• 2—Level 2
Node By topology, the percentage of all routes configured on the node that
are protected through backup coverage.
IPv4 Percentage of IPv4 unicast routes that are protected through backup
coverage.
IPv6 Percentage of IPv6 unicast routes that are protected through backup
coverage.
Sample Output
Backup Coverage:
Topology Level Node IPv4 IPv6 CLNS
IPV4 Unicast 2 28.57% 22.22% 0.00% 0.00%
IPV6 Unicast 2 0.00% 0.00% 0.00% 0.00%
Options none—Display information about MPLS LSPs designated as backup routes for IS-IS
routes.
Output Fields Table 14 on page 652 lists the output fields for the show isis backup label-switched-path
command. Output fields are listed in the approximate order in which they appear.
Backup MPLS LSPs List of MPLS LSPs designated as backup paths for IS-IS routes.
• Up—The routing device can detect RSVP hello messages from the neighbor.
• Down—The routing device has received one of the following indications:
• Communication failure from the neighbor.
• Communication from IGP that the neighbor is unavailable.
• Change in the sequence numbers in the RSVP hello messages sent by the neighbor.
Last change Time elapsed since the neighbor state changed either from up to down or from down to up. The format
is hh:mm:ss.
Sample Output
show backup-selection
Description Display the configured policies for each destination (IPv4 and IPv6) and a primary
next-hop interface.
Options instance instance-name—(Optional) Display configured policy for the routing instance.
Output Fields Table 15 on page 654 describes the output fields for the show backup-selection command.
Output fields are listed in the approximate order in which they appear.
• all — All the interfaces on the router which requires backup path.
• <interface-name> — Specific primary interface in the backup path.
admin-group exclude Specifies the administrative groups to be excluded. The backup path is not selected as the
loop free alternative or backup next hop if any of the links in the path have any one of the listed
administrative groups.
admin-group include-all Requires each link in the backup path to have all the listed administrative groups in order to
accept the path.
admin-group include-any Requires each link in the backup path to have at least one of the listed administrative groups
in order to select the path.
admin-group preference Defines an ordered set of administrative groups that specifies the preference of the backup
path. The leftmost element in the set is given the highest preference.
nodes excluded Specifies the list of nodes to be excluded. The backup path that has a router from the list is
not selected as the loop free alternative or backup next hop.
nodes preference Defines an ordered set of nodes to be preferred. The backup path having the leftmost node
is selected.
node-tags excluded Specifies the backup selection to exclude the set of route tags in the backup path selection.
node-tags preference Specifies the set of route tags in descending order of preference.
downstream paths only Selects the backup path that is a downstream path to the destination.
srlg Evaluates common srlgs between the primary link and each link in the backup path.
• strict — Rejects the backup path that has common srlgs between the primary link and any
link in the backup path.
• loose — Allows the backup path that has common srlgs between the primary link and any
link in the backup path. The backup path with the fewer number of srlg collisions is preferred.
B/W >= primary Uses backup next hop only if the bandwidth is greater than or equal to the primary next hop.
root-metric Metric to one-hop node or remote router such as an RSVP backup label switched path (LSP)
tail-end router.
dest-metric Metric from one-hop node or remote router such as an RSVP backup label switched path
(LSP) tail-end router to the final destination.
metric evaluation order Defines the evaluation order of the metric (root and dest metrics) results.
policy evaluation order Defines the evaluation order of the backup policy.
Sample Output
show backup-selection
user@host> show backup-selection
Prefix: 0.0.0.0/0
Interface: all
Admin-group exclude: c6
Admin-group include-all: c1 c2
Admin-group include-any: c3 c4
Admin-group preference: c8
Nodes excluded: 100.0.7.2
Node preference: 100.2.6.2
Node-tags excluded: 1004
Node-tag preference: 1007
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Node-Tag, Metric
Interface: ge-1/2/5.0
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c4
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection
Prefix: 10.150.0.0/16
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c5
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Node-tags excluded: 1004
Node-tag preference: 1007
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: ::/0
Interface: all
Admin-group exclude: c2
Admin-group include-all: c1 c3
Admin-group include-any: c4 c5
Admin-group preference: c6
Node preference: 100.0.1.2
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-any: c4
Admin-group preference: c6 c0
Nodes excluded: 100.0.4.2
Node preference: 100.4.5.1
Node-tags excluded: 1007
Node-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 0.0.0.0/0
Interface: ge-1/2/5.0
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c4
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection
Prefix: 10.150.0.0/16
Prefix: ::/0
logical-system: R0
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
-----
logical-system: R5
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
-----
logical-system: R1
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
-----
logical-system: R4
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Loose, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
-----
logical-system: R3
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c3
Node preference: 10.255.102.178
Node-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
-----
logical-system: R7
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
-----
logical-system: R2
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
logical-system: R6
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
-----
logical-system: default
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c3
Node preference: 10.255.102.178
Node-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Prefix: 10.150.0.0/16
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c5
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Node-tags excluded: 1004
Node-tag preference: 1007
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Description Display information about IS-IS shortest-path-first (SPF) calculations for backup paths.
Options none—Display information about IS-IS SPF calculations for all backup paths for all
destination nodes.
instance instance-name—(Optional) Display SPF calculations for backup paths for the
specified routing instance.
level (1 | 2)—(Optional) Display SPF calculations for the backup paths for the specified
IS-IS level.
no-coverage—(Optional) Display SPF calculations only for destinations that do not have
backup coverage.
Related • Example: Configuring Link and Node Protection for IS-IS Routes
Documentation
• show isis backup coverage on page 650
• Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 193
List of Sample Output show isis backup spf results on page 662
show isis backup spf results no-coverage on page 663
Output Fields Table 16 on page 662 lists the output fields for the show isis backup spf results command.
Output fields are listed in the approximate order in which they appear.
Primary next-hop Interface and name of the node of the primary next hop to reach the
destination.
Eligible Indicates that the next-hop neighbor has been designated as a backup
path to the destination node.
Not eligible Indicates that the next-hop neighbor cannot function as a backup path
to the destination.
Sample Output
Output Fields Table 17 on page 665 lists the output fields for the show isis context-identifier command.
Output fields are listed in the approximate order in which they appear.
Context IPv4 address that defines a protection pair. The context is manually detail
configured on both primary and protector PEs.
Sample Output
Description Display the entries in the Intermediate System-to-Intermediate System (IS-IS) link-state
database, which contains data about PDU packets.
Options none—Display standard information about IS-IS link-state database entries for all routing
instances.
system id—(Optional) Display IS-IS link-state database entries for the specified
intermediate system.
level (1 | 2)—(Optional) Display IS-IS link-state database entries for the specified IS-IS
level.
Output Fields Table 18 on page 668 describes the output fields for the show isis database command.
Output fields are listed in the approximate order in which they appear. Fields that contain
internal IS-IS information useful only in troubleshooting obscure problems are not
described in the table. For more details about these fields, contact your customer support
representative.
Interface name Name of the interface on which the link-state PDU has been received; always All levels
IS-IS for this command.
Lifetime (secs) Remaining lifetime of the link-state PDU, in seconds. All levels
Attributes Attributes of the specified database: L1, L2, Overload, or Attached (L1 only). none brief
# LSPs Total number of link-state PDUs in the specified link-state database. none brief
TLVs • Area Address—Area addresses that the routing device can reach. extensive
• Speaks—Supported routing protocols.
• IP router id—ID of the routing device (usually the IP address).
• IP address—IPv4 address.
• Hostname—Assigned name of the routing device.
• IP prefix—IP prefix of the routing device.
• Metric—IS-IS metric that measures the cost of the adjacency between the
originating routing device and the advertised routing device.
• IP extended prefix—Extended IP prefix of the routing device.
• IS neighbor—Directly attached neighbor’s name and metric.
• IS extended neighbor—Directly attached neighbor’s name, metric, IP address,
local interface index, and remote interface index.
The interface indexes enable Junos OS to support unnumbered extensions
for IS-IS, as described in RFC 4205.
• Router Capability—ID of the routing device and flag.
Sample Output
The output for the show isis database brief command is identical to that for the show isis
database command. For sample output, see show isis database on page 669.
Packet: LSP ID: sisira.00-00, Length: 336 bytes, Lifetime : 1198 secs
Checksum: 0x10fc, Sequence: 0x11, Attributes: 0xb L1 L2 Attached
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 18, Packet version: 1, Max area: 0
TLVs:
Area address: 60.0006.80ff.f800.0000.0108.0001 (13)
Speaks: IP
Speaks: IPV6
Speaks: CLNP
Hostname: sisira
ES neighbor TLV: Internal, Metric: default 0, Up
ES: sisira
IS neighbor: hemantha-CE3.02, Internal, Metric: default 10
IS extended neighbor: hemantha-CE3.02, Metric: default 10
ES neighbor TLV: External, Metric: default 10, Down
ES: 0040.0040.0040
ES neighbor TLV: External, Metric: default 10, Down
ES: 0025.0025.0025
Packet: LSP ID: Router-A.00-00, Length: 208 bytes, Lifetime : 1198 secs
Checksum: 0x3196, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.1
IP address: 192.168.0.1
Hostname: Router-A
IP prefix: 192.168.0.1/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.4/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.0/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.1/32 metric 0 up
IP extended prefix: 10.0.0.4/30 metric 10 up
Packet: LSP ID: Router-B.00-00, Length: 208 bytes, Lifetime : 1196 secs
Checksum: 0xf8f, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.2
IP address: 192.168.0.2
Hostname: Router-B
IP prefix: 192.168.0.2/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.4/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.8/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.2/32 metric 0 up
IP extended prefix: 10.0.0.4/30 metric 10 up
IP extended prefix: 10.0.0.8/30 metric 10 up
IS neighbor: Router-B.02, Internal, Metric: default 10
IS neighbor: Router-C.02, Internal, Metric: default 10
IS extended neighbor: Router-B.02, Metric: default 10
IP address: 10.0.0.6
Local interface index: 108, Remote interface index: 0
IS extended neighbor: Router-C.02, Metric: default 10
IP address: 10.0.0.9
Local interface index: 109, Remote interface index: 0
No queued transmissions
TLVs:
IS neighbor: Router-B.00, Internal, Metric: default 0
IS neighbor: Router-A.00, Internal, Metric: default 0
IS extended neighbor: Router-B.00, Metric: default 0
IS extended neighbor: Router-A.00, Metric: default 0
No queued transmissions
Packet: LSP ID: Router-C.00-00, Length: 208 bytes, Lifetime : 1196 secs
Checksum: 0x255b, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.3
IP address: 192.168.0.3
Hostname: Router-C
IP prefix: 192.168.0.3/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.8/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.12/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.3/32 metric 0 up
IP extended prefix: 10.0.0.8/30 metric 10 up
IP extended prefix: 10.0.0.12/30 metric 10 up
IS neighbor: Router-C.02, Internal, Metric: default 10
IS neighbor: Router-D.03, Internal, Metric: default 10
IS extended neighbor: Router-C.02, Metric: default 10
IP address: 10.0.0.10
Local interface index: 105, Remote interface index: 0
TLVs:
IS neighbor: Router-C.00, Internal, Metric: default 0
IS neighbor: Router-B.00, Internal, Metric: default 0
IS extended neighbor: Router-C.00, Metric: default 0
IS extended neighbor: Router-B.00, Metric: default 0
No queued transmissions
Packet: LSP ID: Router-D.00-00, Length: 208 bytes, Lifetime : 1192 secs
Checksum: 0x8ab7, Sequence: 0x4, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.4
IP address: 192.168.0.4
Hostname: Router-D
IP prefix: 192.168.0.4/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.12/30, Internal, Metric: default 10, Up
TLVs:
IS neighbor: Router-D.00, Internal, Metric: default 0
IS neighbor: Router-F.00, Internal, Metric: default 0
IS extended neighbor: Router-D.00, Metric: default 0
IS extended neighbor: Router-F.00, Metric: default 0
No queued transmissions
TLVs:
IS neighbor: Router-D.00, Internal, Metric: default 0
IS neighbor: Router-C.00, Internal, Metric: default 0
IS extended neighbor: Router-D.00, Metric: default 0
IS extended neighbor: Router-C.00, Metric: default 0
No queued transmissions
Packet: LSP ID: Router-E.00-00, Length: 208 bytes, Lifetime : 1185 secs
Checksum: 0x9da9, Sequence: 0x4, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.5
IP address: 192.168.0.5
Hostname: Router-E
IP prefix: 192.168.0.5/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.16/30, Internal, Metric: default 20, Up
IP prefix: 10.0.0.0/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.5/32 metric 0 up
IP extended prefix: 10.0.0.16/30 metric 20 up
IP extended prefix: 10.0.0.0/30 metric 10 up
IS neighbor: Router-E.02, Internal, Metric: default 10
IS neighbor: Router-F.02, Internal, Metric: default 20
IS extended neighbor: Router-E.02, Metric: default 10
IP address: 10.0.0.2
Local interface index: 112, Remote interface index: 0
IS extended neighbor: Router-F.02, Metric: default 20
IP address: 10.0.0.17
Local interface index: 111, Remote interface index: 0
No queued transmissions
TLVs:
IS neighbor: Router-E.00, Internal, Metric: default 0
IS neighbor: Router-A.00, Internal, Metric: default 0
IS extended neighbor: Router-E.00, Metric: default 0
IS extended neighbor: Router-A.00, Metric: default 0
No queued transmissions
Packet: LSP ID: Router-F.00-00, Length: 208 bytes, Lifetime : 1183 secs
Checksum: 0x94bd, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.6
IP address: 192.168.0.6
Hostname: Router-F
IP prefix: 192.168.0.6/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.16/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.20/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.6/32 metric 0 up
IP extended prefix: 10.0.0.16/30 metric 10 up
IP extended prefix: 10.0.0.20/30 metric 10 up
IS neighbor: Router-D.02, Internal, Metric: default 10
IS neighbor: Router-F.02, Internal, Metric: default 10
IS extended neighbor: Router-D.02, Metric: default 10
IP address: 10.0.0.21
Local interface index: 94, Remote interface index: 0
IS extended neighbor: Router-F.02, Metric: default 10
IP address: 10.0.0.18
Local interface index: 93, Remote interface index: 0
No queued transmissions
TLVs:
IS neighbor: Router-E.00, Internal, Metric: default 0
IS neighbor: Router-A.00, Internal, Metric: default 0
IS extended neighbor: Router-E.00, Metric: default 0
IS extended neighbor: Router-A.00, Metric: default 0
No queued transmissions
Packet: LSP ID: Router-F.00-00, Length: 208 bytes, Lifetime : 1183 secs
Checksum: 0x94bd, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.6
IP address: 192.168.0.6
Hostname: Router-F
IP prefix: 192.168.0.6/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.16/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.20/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.6/32 metric 0 up
IP extended prefix: 10.0.0.16/30 metric 10 up
IP extended prefix: 10.0.0.20/30 metric 10 up
IS neighbor: Router-D.02, Internal, Metric: default 10
IS neighbor: Router-F.02, Internal, Metric: default 10
IS extended neighbor: Router-D.02, Metric: default 10
IP address: 10.0.0.21
Local interface index: 94, Remote interface index: 0
TLVs:
IS neighbor: Router-F.00, Internal, Metric: default 0
IS neighbor: Router-E.00, Internal, Metric: default 0
IS extended neighbor: Router-F.00, Metric: default 0
IS extended neighbor: Router-E.00, Metric: default 0
No queued transmissions
This command displays the system ID-to-name cache. The output shows if the mapping
has been learned by receipt of a Hostname TLV #137 (type dynamic) configured in Junos
OS with the set system host-name command, or a static mapping defined in Junos OS
with the set system static-host-mapping hostname sysid command (type static). The
local router always has its type set to static even if static-host-mapping is not configured.
Output Fields Table 19 on page 681 describes the output fields for the show isis hostname command.
Output fields are listed in the approximate order in which they appear.
Sample Output
NOTE: If the configured metric for an IS-IS level is above 63, and the
wide-metrics-only statement is not configured, the show isis interface detail
command and the show isis interface extensive command display 63 as the
metric value for that level. Configure the wide-metrics-only statement to
generate metric values greater than 63 on a per IS-IS level basis.
The show isis interface command displays the configured metric value for an
IS-IS level irrespective of whether is configured or not.
Related • Understanding Wide IS-IS Metrics for Traffic Engineering on page 272
Documentation
• Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 272
Output Fields Table 20 on page 684 describes the output fields for the show isis interface command.
Output fields are listed in the approximate order in which they appear.
Designated router Routing device selected by other routers that is responsible for sending link-state detail
advertisements that describe the network. Used only on broadcast networks.
NOTE: Each IS-IS interface is assigned a circuit ID value to identify the interface
within the linkstate database. All interfaces (loopback, broadcast, and so on)
and all point-to-point links share the locally significant value of 0x01, and this
value is not incremented.
• 1—Level 1 only
• 2—Level 2 only
• 3—Level 1 and Level 2
LSP interval Interval between link-state PDUs sent from the interface. detail
CSNP interval Interval between complete sequence number PDUs sent from the interface. detail extensive
• 1—Level 1 only
• 2—Level 2 only
• 3—Level 1 and Level 2
NOTE: The default IS-IS level on loopback interfaces are always same as the
IS-IS level configured on other IS-IS interfaces in a router. You can also configure
IS-IS level on loopback interfaces per your requirement.
L1/L2 Metric Interface's metric for Level 1 and Level 2. If there is no information, the metric none brief
is 0.
Adjacency This routing device has signaled to advertise this interface to its neighbors in detail extensive
advertisement: their label-switched paths (LSPs).
Advertise
Adjacency This neighbor has signaled not to advertise this interface in the routing device’s detail extensive
advertisement: outbound LSPs.
Suppress
Designated Router Router responsible for sending network link-state advertisements, which describe detail
all the routing devices attached to the network.
LDP sync state Current LDP synchronization state: in sync, in holddown, or not supported. extensive
remaining If the state is not in sync and the hold time is not infinity, then this field displays extensive
the remaining hold time in seconds.
Sample Output
The output for the show isis interface brief command is identical to that for the show isis
interface command. For sample output, see show isis interface on page 686.
Release Information Command introduced in Junos OS Release 16.1 for the M Series and MX Series.
Options none— Display standard status information about the interface group.
instance— Display the status information about the interface group for the specified
instance.
Output Fields Table 21 on page 688 describes the output fields for the show isis interface-group command.
Output fields are listed in the approximate order in which they appear.
Interface-group Name of the interface group followed by the interfaces that belong to the specified group and their
status.
Total Nominal Bandwidth Minimum bandwidth reserved for this interface group.
• 1—Level 1
• 2—Level 2
Address family Address family can have one of the following values:
• IPv6 Unicast
• IPv6 Multicast
Bandwidth Treshold The maximum bandwidth allowed for this interface group.
Sample Output
Interface-group: R2-B
et-8/0/0.0, 100Gbps, Up
et-9/0/0.0, 100Gbps, Up
Total Nominal Bandwidth: 200Gbps, Total Actual Bandwidth: 200Gbps
Level 1
IPV6 Unicast, Metric: 30
Bandwidth Threshold: 100Gbps, Metric: 1000
Bandwidth Threshold: 200Gbps, Metric: 30
IPV6 Multicast, Metric: 30
Bandwidth Threshold: 100Gbps, Metric: 1000
Bandwidth Threshold: 200Gbps, Metric: 30
Release Information Command introduced in Junos OS Release 16.1 for the MX Series and PTX Series.
Description Display the details of the Layer 2 ARP or neighbor discovery next hops and the mapped
data link address in the kernel for the routing instances.
Options none— Display all the Layer 2 mappings in the kernel for all supported address families
for all routing instances.
destination— (Optional) Display the Layer 2 mapping for a specified destination address.
instance instance-name— (Optional) Display the Layer 2 mapping for the specified
routing instance only.
Output Fields Table 21 on page 688 describes the output fields for the show isis layer2-map command.
Output fields are listed in the approximate order in which they appear.
SNPA The subnetwork point of attachment (SNPA) indicates the data link address of the next hop.
State State of the next hop. This field can have one of the following values:
Sample Output
logical-system: r2
Layer2 mapping database for instance master
IPv4 records: 1
IPv6 records: 0
-----
logical-system: r1
IPv4 records: 1
IPv6 records: 0
Options none—Display standard overview information about IS-IS for all routing instances.
Output Fields Table 23 on page 692 lists the output fields for the show isis overview command. Output
fields are listed in the approximate order in which they appear.
Maximum Areas Maximum number of IS-IS areas advertised by the routing device.
Filter low life time LSPs LSPs with a lifetime lower than this value are filtered out.
up to
SPF holddown Delay before performing additional SPF calculations after the maximum number of consecutive SPF
calculations is reached.
SPF rapid runs Maximum number of SPF calculations that can be performed in succession before the holddown timer
begins.
Allow internal prefix Allow internal prefixes to be advertised with high metric: enabled or disabled
overloading
Allow external prefix Allow external prefixes to be advertised with high metric: enabled or disabled
overloading
Overload timeout Time period after which overload is reset and the time that remains before the timer is set to expire.
• 1—Level 1 information
• 2—Level 2 information
Micro-loop avoidance Micro-loop avoidance is enabled. Generally adjacent nodes converge faster than neighboring nodes
causing traffic to loop. A route convergence delay is configured to avoid such micro loops.
Prefix export limit Number of prefixes allowed to be exported, as configured by the prefix-export-limit statement.
Adjacency holddown is IS-IS adjacencies come up one after another when adjacency holddown is enabled.
active
Sample Output
Instance: master
Router ID: 10.255.107.183
Hostname: pro-bng3-a
Sysid: 0192.0168.0001
Areaid: 49.0002
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Filter low life time LSPs up to: 300
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
Overload bit at startup is set
Overload high metrics: disabled
Allow route leaking: disabled
Allow internal prefix overloading: enabled
Allow external prefix overloading: enabled
Overload timeout: 60 sec
IPv4 is enabled, IPv6 is enabled
Micro-loop avoidance: Enabled
Method: Route Convergence Delay, Route convergence delay: 5000 msec
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Level 1
Instance: master
Router ID: 192.168.0.2
Hostname: pro-bng3-a-R2
Sysid: 0192.0168.0002
Areaid: 49.0002
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Instance: master
Router ID: 192.168.0.3
Hostname: pro-bng3-a-R3
Sysid: 0192.0168.0003
Areaid: 49.0002
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Release Information Command introduced in Junos OS Release 16.2R1 for the MX Series and PTX Series.
Description Displays the purge log history received from adjacent devices. The purge log can include
the type, length and value (TLV) details and the Intermediate System (IS) identification.
Use this command to identify the purge originator and view other details of recent purges.
You can display the last 50 entries in the IS-IS purge log and filter the log history based
on the IS-IS level or by routing instance.
level level—(Optional) Display purge log of IS-IS routers that belong to the specified
level.
Output Fields Table 24 on page 697 describes the output fields for the show isis purge log command.
Output fields are listed in the approximate order in which they appear.
• 1—Level 1 only
• 2—Level 2 only
• 3—Level 1 and Level 2
An exclamation point (!) preceding the level number indicates that the adjacency
is missing an IP address.
Time Date and time in hours, minutes, and seconds when the purge occurred.
Sample Output
Options none—Display all routes in the IS-IS routing table for all supported address families for
all routing instances.
Output Fields Table 25 on page 700 describes the output fields for the show isis route command. Output
fields are listed in the approximate order in which they appear.
Current version Number of the current version of the IS-IS routing table.
L IS-IS level:
• 1—Level 1 only
• 2—Level 2 only
• 3—Level 1 and Level 2
Sample Output
MPLS Routes
-----------
Label L Version Metric Type Interface NH Via
300032 /52 2 38 0 int lt-1/2/0.13 MPLS Direct forward
to 10.0.7.60(pro-bng3-c-E)
300048 /52 1 27 0 int lt-1/2/0.12 MPLS Direct forward
to 10.0.6.60(pro-bng3-c-E)
300064 /52 1 27 0 int lt-1/2/0.12 MPLS Direct forward
to 10.0.6.60(pro-bng3-c-E)
300080 /52 2 38 0 int lt-1/2/0.12 MPLS Direct forward
to 10.0.6.60(pro-bng3-c-E)
300096 /52 2 38 0 int lt-1/2/0.12 MPLS Direct forward
to 10.0.6.60(pro-bng3-c-E)
299920 /52 1 27 0 int lt-1/2/0.14 MPLS Direct forward
to 10.0.10.70(pro-bng3-c-F)
299936 /52 1 27 0 int lt-1/2/0.14 MPLS Direct forward
to 10.0.10.70(pro-bng3-c-F)
299952 /52 2 38 0 int lt-1/2/0.14 MPLS Direct forward
to 10.0.10.70(pro-bng3-c-F)
299968 /52 2 38 0 int lt-1/2/0.14 MPLS Direct forward
to 10.0.10.70(pro-bng3-c-F)
299984 /52 1 27 0 int lt-1/2/0.13 MPLS Direct forward
to 10.0.7.60(pro-bng3-c-E)
Description Display the routes in the IS-IS routing table in the sequence of set priority. IS-IS routes
set with a high priority are displayed first followed by medium and low priority prefixes.
Internet Service Providers (ISP) can configure route priority to ensure faster convergence
for important customers.
Configure a routing policy to assign a priority to IS-IS routes. These routes are updated
in the routing table in the order of their priority. In the event of an IS-IS topology change,
high priority prefixes are updated in the routing table first followed by medium and then
low priority prefixes.
Options none—Display all routes in the IS-IS routing table in order of their priority for all supported
address families for all routing instances.
destination—(Optional) Destination address for the route for which you want to display
the priority.
inet | inet6—(Optional) Display IS-IS route priority for inet (IPv4) or inet6 (IPv6) routes,
respectively.
Output Fields Table 25 on page 700 describes the output fields for the show isis route command. Output
fields are listed in the approximate order in which they appear.
Current version Number of the current version of the IS-IS routing table.
L IS-IS level:
• 1—Level 1 only
• 2—Level 2 only
• 3—Level 1 and Level 2
Sample Output
level (1 | 2)—(Optional) Display SPF calculations for the specified IS-IS level.
Output Fields Table 27 on page 708 describes the output fields for the show isis spf command. Output
fields are listed in the approximate order in which they appear.
Start time (log option only) Time that the SPF computation started.
Elapsed (secs) (log option only) Length of time, in seconds, required to complete
the SPF computation.
Count (log option only) Number of times the SPF was triggered.
Reason (log option only) Reason that the SPF computation was completed.
Sample Output
10 10.9.6.0/30
4 nodes
pro1-a.02 10
pro1-a.00 0
0 10.255.245.1/32
10 192.168.37.64/29
0 1921.6800.4211
3 nodes
Release Information Command introduced in Junos OS Release 17.3R1 for MX Series and PTX Series.
Description Display the traffic statistics of an IS-IS SPRING link. SPRING traffic is measured to
recalculate the actual available bandwidth to RSVP for traffic engineering.
List of Sample Output show isis spring interface traffic-statistics on page 712
Sample Output
Release Information Command introduced in 19.1R1 on MX Series routers with MPC and MIC interfaces, and
PTX series routers.
Description Displays a list of sensors associated with the label IS-IS route and next hops for segment
routing traffic. The command only displays the information related to the sensors and
not the traffic statistics.
List of Sample Output show isis spring sensor info on page 713
Output Fields Table 1 describes the output fields for the show isis spring sensor info command. Output
fields are listed in the approximate order in which they appear.
Sensor-name Represents the router or interface that the sensor is associated with.
Sample Output
aggr_ingress_intf_sensor 3221225484
Output Fields Table 29 on page 716 describes the output fields for the show isis statistics command.
Output fields are listed in the approximate order in which they appear.
• CSNP—Complete sequence number PDUs contain a complete list of all link-state PDUs in the IS-IS
database. CSNPs are sent periodically on all links, and the receiving systems use the information
in the CSNP to update and synchronize their link-state PDU databases. The designated router
multicasts CSNPs on broadcast links in place of sending explicit acknowledgments for each
link-state PDU.
• IIH—IS-IS hello packets are broadcast to discover the identity of neighboring IS-IS systems and to
determine whether the neighbors are Level 1 or Level 2 intermediate systems.
• LSP—Link-state PDUs contain information about the state of adjacencies to neighboring IS-IS
systems. Link-state PDUs are flooded periodically throughout an area.
• PSNP—Partial sequence number PDUs are sent multicast by a receiver when it detects that it is
missing a link-state PDU (when its link-state PDU database is out of date). The receiver sends a
PSNP to the system that transmitted the CSNP, effectively requesting that the missing link-state
PDU be transmitted. That routing device, in turn, forwards the missing link-state PDU to the
requesting routing device.
• Unknown—The PDU type is unknown.
Received Number of PDUs received since IS-IS started or since the statistics were set to zero.
Sent Number of PDUs transmitted since IS-IS started or since the statistics were set to zero.
Rexmit Number of PDUs retransmitted since IS-IS started or since the statistics were set to zero.
Total packets Total number of PDUs received and transmitted since IS-IS started or since the statistics were set to
received/sent zero.
SNP queue length Number of CSPN and PSNP packets currently waiting in the queue for processing. This value is almost
always 0.
LSP queue length Number of link-state PDUs waiting in the queue for processing. This value is almost always 0.
SPF runs Number of shortest-path-first (SPF) calculations that have been performed. If this number is
incrementing rapidly, it indicates that the network is unstable.
Fragments rebuilt Number of link-state PDU fragments that the local system has computed.
LSP regenerations Number of link-state PDUs that have been regenerated. A link-state PDU is regenerated when it is
nearing the end of its lifetime and it has not changed.
Purges initiated Number of purges that the system initiated. A purge is initiated if the software decides that a link-state
PDU must be removed from the network.
Sample Output
show policy
statistics—(Optional) Use in conjunction with the test policy command to show the
length of time (in microseconds) required to evaluate a given policy and the number
of times it has been executed. This information can be used, for example, to help
structure a policy so it is evaluated efficiently. Timers shown are per route; times are
not cumulative. Statistics are incremented even when the router is learning (and
thus evaluating) routes from peering routers.
Output Fields Table 30 on page 719 lists the output fields for the show policy command. Output fields
are listed in the approximate order in which they appear.
term Name of the user-defined policy term. The term name unnamed is
used for policy elements that occur outside of user defined terms
Sample Output
show policy
user@host> show policy
Configured policies:
__vrf-export-red-internal__
__vrf-import-red-internal__
red-export
rf-test-policy
multicast-scoping
Policy vrf-import-red-internal:
from
203.0.113.0/28 accept
203.0.113.32/28 accept
then reject
Policy iBGP-v4-RR-Import:
[1243328] Term Lab-Infra:
from [1243328 0] proto BGP
[28 0] route filter:
10.11.0.0/8 orlonger
10.13.0.0/8 orlonger
then [28 0] accept
[1243300] Term External:
from [1243300 1] proto BGP
[1243296 0] community Ext-Com1 [64496:1515 ]
[1243296 0] prefix-list-filter Customer-Routes
[1243296 0] aspath AS6221
[1243296 1] route filter:
172.16.49.0/12 orlonger
172.16.50.0/12 orlonger
172.16.51.0/12 orlonger
172.16.52.0/12 orlonger
172.16.56.0/12 orlonger
172.16.60.0/12 orlonger
then [1243296 2] community + Ext-Com2 [64496:2000 ] [1243296 0] accept
[4] Term Final:
then [4 0] reject
Policy multicast-scoping:
from
multicast-scope == 8
then
accept
Policy rf-test-policy:
Term term1:
from source-address-filter-list saf-list-1
source-address filter:
192.0.2.0/29 longer
192.0.2.64/28 exact
192.0.2.128/28 exact
192.0.2.160/28 orlonger
Term term2:
from route-filter-list rf-list-1
route filter:
198.51.100.0/29 upto 198.51.100.0/30
198.51.100.8/29 upto 198.51.100.8/30 accept
Term unnamed:
then reject
Description Display all the configured conditions as well as the routing tables with which the
configuration manager is interacting. If the detail keyword is included, the output also
displays dependent routes for each condition.
Output Fields Table 31 on page 721 lists the output fields for the show policy conditions command. Output
fields are listed in the approximate order in which they appear.
event Condition type. If the if-route-exists option is configured, the event type is: All levels
Existence of a route in a specific routing table.
Dependent routes List of routes dependent on the condition, along with the latest generation detail
number.
Condition tables List of routing tables associated with the condition, along with the latest All levels
generation number and number of dependencies.
If-route-exists List of conditions configured to look for a route in the specified table. All levels
conditions
Sample Output
Configured conditions:
Condition cond1, event: Existence of a route in a specific routing table
Dependent routes:
172.16.4.4/32, generation 3
6.6.6.6/32, generation 3
10.10.10.10/32, generation 3
Condition tables:
Table inet.0, generation 4, dependencies 3, If–route-exists conditions: cond1
(static) cond2 (static)
show route
Options none—Display brief information about all active entries in the routing tables.
all—(Optional) Display information about all routing tables, including private, or internal,
routing tables.
private—(Optional) Display information only about all private, or internal, routing tables.
Output Fields Table 32 on page 724 describes the output fields for the show route command. Output
fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
destination-prefix Route destination (for example:10.0.0.1/24). Sometimes the route information is presented in another
format, such as:
[ protocol, preference ] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
weeks:days How long the route been known (for example, 2w4d 13:11:14, or 2 weeks, 4 days, 13 hours, 11 minutes,
hours:minutes:seconds and 14 seconds).
metric Cost value of the indicated route. For routes within an AS, the cost is determined by the IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the local AS number associated with the AS path if more than one AS number
is configured on the routing device, or if AS path prepending is configured.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
encapsulated Extended next-hop encoding capability enabled for the specified BGP community for routing IPv4
traffic over IPv6 tunnels. When BGP receives routes without the tunnel community, IPv4-0ver IPv6
tunnels are not created and BGP routes are resolved without encapsulation.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that the origin of the prefix is not verified against the database. This is because
the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
to Next hop to the destination. An angle bracket (>) indicates that the route is the selected route.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
interface that is actually used is followed by the word Selected. This field can also contain the following
information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
• lsp-path-name—Name of the LSP used to reach the next hop.
• label-action—MPLS label and operation occurring at the next hop. The operation can be pop (where
a label is removed from the top of the stack), push (where another label is added to the label stack),
or swap (where a label is replaced by another label). For VPNs, expect to see multiple push
operations, corresponding to the inner and outer labels required for VPN routes (in the case of a
direct PE-to-PE connection, the VPN route would have the inner label push only).
Private unicast (Enhanced subscriber management for MX Series routers) Indicates that an access-internal route is
managed by enhanced subscriber management. By contrast, access-internal routes not managed
by enhanced subscriber management are displayed with associated next-hop and media access
control (MAC) address information.
balance Distribution of the load based on the underlying operational interface bandwidth for equal-cost
multipaths (ECMP) across the nexthop gateways in percentages.
Sample Output
show route
user@host> show route
1:65500:1:10.0.0.20/240
*[MVPN/70] 19:53:41, metric2 1
Indirect
1:65500:1:10.0.0.40/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
[BGP/170] 19:53:26, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
1:65500:1:10.0.0.60/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
[BGP/170] 19:53:25, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
The following sample output shows a VPN route with composite next hops enabled. The
first Push operation corresponds to the outer label. The second Push operation
corresponds to the inner label.
*IS-IS Preference: 15
Level: 1
Next hop type: Router, Next hop index: 1048577
Address: 0xXXXXXXXXXX
Next-hop reference count: YY
Next hop: 198.51.100.2 via ae1.0 balance 43%, selected
Session Id: 0x141
Next hop: 192.0.2.2 via ae0.0 balance 57%
2001:db8::10:255:185:19/128
*[Direct/0] 05:11:27
> via lo0.0
2001:db8::11:11:11:0/120
*[BGP/170] 00:28:58, localpref 100
AS path: 2000 I, validation-state: unverified
> to 2001:db8::13:14:2:2 via ge-1/1/4.0
2001:db8::13:14:2:0/120*[Direct/0] 00:45:07
> via ge-1/1/4.0
2001:db8::13:14:2:1/128*[Local/0] 00:45:18
Local via ge-1/1/4.0
fe80::2a0:a50f:fc71:71d5/128
*[Direct/0] 05:11:27
> via lo0.0
fe80::5e5e:abff:feb0:933e/128
*[Local/0] 00:45:18
Local via ge-1/1/4.0
2001:db8::11:11:11:10/128,*,proto=6,dstport=80,srcport=65535/term:1
*[BGP/170] 00:28:58, localpref 100, from 2001:db8::13:14:2:2
AS path: 2000 I, validation-state: unverified
Fictitious
2001:db8::11:11:11:30/128,*,icmp6-type=128,len=100,dscp=10/term:2
*[BGP/170] 00:20:54, localpref 100, from 2001:db8::13:14:2:2
AS path: 2000 I, validation-state: unverified
Fictitious
State: <FlashAll>
*BGP-Static Preference: 5/-101
Next hop type: Indirect, Next hop index: 0
Address: 0xa5c2af8
Next-hop reference count: 2
Next hop type: Router, Next hop index: 1641
Next hop: 192.0.2.1 via ge-2/1/1.0, selected
Session Id: 0x160
Protocol next hop: 192.0.2.1
Indirect next hop: 0xa732cb0 1048621 INH Session ID: 0x17e
State: <Active Int Ext AlwaysFlash NSR-incapable Programmed>
Age: 3:13 Metric2: 0
Validation State: unverified
Announcement bits (3): 0-KRT 5-LDP 6-Resolve tree 3
AS path: I
Client id: 1, Cookie: 1
*[IS-IS/18] 00:01:01
Fictitious
*IS-IS Preference: 18
Level: 2
Next hop type: Fictitious, Next hop index: 0
Address: 0xa1a2ac4
Next-hop reference count: 298
Next hop:
State: <Active NotInstall>
Local AS: 64496
Age: 7:58
Validation State: unverified
Task: IS-IS
AS path: I
Prefix SID: 1000, Flags: 0xe0, Algo: 0
Fictitious
PREFIX { Node { AS:64496 ISO:0100.0a0a.0a0a.00 } { IPv4:10.6.6.6/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:05:20
Fictitious
PREFIX { Node { AS:64496 ISO:0100.0a0a.0a0a.00 } { IPv4:10.7.7.7/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:05:20
Fictitious
PREFIX { Node { AS:64496 ISO:0100.0a0a.0a0a.00 } { IPv4:10.10.10.10/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:05:20
Fictitious
Age: 6:54
Validation State: unverified
Task: IS-IS
AS path: I
Prefix SID: 1000, Flags: 0x40, Algo: 0
*IS-IS Preference: 18
Level: 2
Next hop type: Fictitious, Next hop index: 0
Address: 0xa1a2ac4
Next-hop reference count: 283
Next hop:
State: <Active NotInstall>
Local AS: 64496
Age: 6:54
Validation State: unverified
Task: IS-IS
AS path: I
Prefix SID: 1000, Flags: 0x40, Algo: 0
Description Display all active routes for destinations. An active route is a route that is selected as the
best path. Inactive routes are not displayed.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
The output for the show route active-path brief command is identical to that for the show
route active-path command. For sample output, see show route active-path on page 745.
AS path: I
AS path: I
Age: 21:39:47
Task: IF
Announcement bits (3): 2-IS-IS 5-Resolve tree 2 6-Resolve tree 3
AS path: I
AS path: I
Description Display the routing information as it has been prepared for advertisement to a particular
neighbor of a particular dynamic routing protocol.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output.
Additional Information Routes displayed are routes that the routing table has exported into the routing protocol
and that have been filtered by the associated protocol's export routing policy statements.
Starting with Junos OS Release 13.3, you can display the routing instance table foo for
any address family, on a VPN route reflector, or a VPN AS boundary router that is
advertising local VPN routes. However, If you do not specify the table in the command,
the output displays each VRF prefix twice.
Related • Example: Configuring the MED Attribute That Determines the Exit Point in an AS
Documentation
List of Sample Output show route advertising-protocol bgp (Layer 3 VPN) on page 753
show route advertising-protocol bgp detail on page 753
Output Fields Table 33 on page 751 lists the output fields for the show route advertising-protocol
command. Output fields are listed in the approximate order in which they appear.
number Number of destinations for which there are routes in the routing table. All levels
destinations
number routes Number of routes in the routing table and total number of routes in the following All levels
states:
destination-prefix Destination prefix. The entry value is the number of routes for this destination, detail extensive
(entry , announced) and the announced value is the number of routes being announced for this
destination.
BGP group and type BGP group name and type (Internal or External). detail extensive
Route Distinguisher Unique 64-bit prefix augmenting each IP subnet. detail extensive
Advertised Label Incoming label advertised by the Label Distribution Protocol (LDP). When an detail extensive
IP packet enters a label-switched path (LSP), the ingress router examines the
packet and assigns it a label based on its destination, placing the label in the
packet's header. The label transforms the packet from one that is forwarded
based on its IP routing information to one that is forwarded based on information
associated with the label.
Label-Base, range First label in a block of labels and label block size. A remote PE router uses this detail extensive
first label when sending traffic toward the advertising PE router.
VPN Label Virtual private network (VPN) label. Packets are sent between CE and PE routers detail extensive
by advertising VPN labels. VPN labels transit over either a Resource Reservation
Protocol (RSVP) or a Label Distribution Protocol (LDP) label-switched path
(LSP) tunnel.
Nexthop Next hop to the destination. An angle bracket (>) indicates that the route is the All levels
selected route.
If the next-hop advertisement to the peer is Self, and the RIB-out next hop is a
specific IP address, the RIB-out IP address is included in the extensive output.
See show route advertising-protocol bgp extensive all (Next Hop Self with RIB-out
IP Address) on page 755.
Lclpref or Localpref Local preference value included in the route. All levels
Queued When BGP route prioritization is enabled and a route is present in a priority All levels except brief
queue, this shows which priority queue the route is in.
AS path AS path through which the route was learned. The letters at the end of the AS All levels
path indicate the path origin, providing an indication of the state of the route at
the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an
unrecognized attribute and associated hexadecimal value if BGP receives
attribute 128 (attribute set) and you have not configured an independent domain
in any routing instance.
Route Labels Stack of labels carried in the BGP route update. detail extensive
Cluster list (For route reflected output only) Cluster ID sent by the route reflector. detail extensive
Originator ID (For route reflected output only) Address of routing device that originally sent detail extensive
the route to the route reflector.
Communities Community path attribute for the route. See the output field table for the show detail extensive
route detail command for all possible values for this field.
AIGP Accumulated interior gateway protocol (AIGP) BGP attribute. detail extensive
Attrset AS Number, local preference, and path of the autonomous system (AS) that detail extensive
originated the route. These values are stored in the Attrset attribute at the
originating router.
mtu Maximum transmission unit (MTU) of the Layer 2 circuit. detail extensive
Sample Output
AIGP 210
AttrSet AS: 100
Localpref: 100
AS path: I
...
show route advertising-protocol bgp extensive all (Next Hop Self with RIB-out IP Address)
user@host> show route advertising-protocol bgp 200.0.0.2 170.0.1.0/24 extensive all
Description Display information about all routes in all routing tables, including private, or internal,
tables.
Options none—Display information about all routes in all routing tables, including private, or
internal, tables.
Output Fields In Junos OS Release 9.5 and later, only the output fields for the show route all command
display all routing tables, including private, or hidden, routing tables. The output field
table of the show route command does not display entries for private, or hidden, routing
tables in Junos OS Release 9.5 and later.
Sample Output
The following example displays a snippet of output from the show route command and
then displays the same snippet of output from the show route all command:
Description Display the route in the routing table that is the best route to the specified address or
range of addresses. The best route is the longest matching route.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
The output for the show route best extensive command is identical to that for the show
route best detail command. For sample output, see show route best detail on page 759.
Description Display brief information about the active entries in the routing tables.
Output Fields For information about output fields, see the Output Field table of the show route
command.
Sample Output
Discard
10.255.245.51/32 *[Direct/0] 2w4d 13:11:14
> via lo0.0
172.16.0.0/12 *[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
192.168.0.0/18 *[Static/5] 1w5d 20:30:29
> to 192.168.167.254 via fxp0.0
192.168.40.0/22 *[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
192.168.64.0/18 *[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
192.168.164.0/22 *[Direct/0] 2w4d 13:11:14
> via fxp0.0
192.168.164.51/32 *[Local/0] 2w4d 13:11:14
Local via fxp0.0
207.17.136.192/32 *[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
green.inet.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
100.101.0.0/16 *[Direct/0] 1w5d 20:30:28
> via fe-0/0/3.0
100.101.2.3/32 *[Local/0] 1w5d 20:30:28
Local via fe-0/0/3.0
172.16.233.5/32 *[OSPF/10] 1w5d 20:30:29, metric 1
MultiRecv
Description Display detailed information about the active entries in the routing tables.
Options none—Display all active entries in the routing table on all systems.
Output Fields Table 34 on page 763 describes the output fields for the show route detail command.
Output fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
route-destination Route destination (for example:10.0.0.1/24). The entry value is the number of routes for this destination,
(entry, announced) and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:
label stacking (Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the
label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.
• S=0 route indicates that a packet with an incoming label stack depth of 2 or more exits this routing
device with one fewer label (the label-popping operation is performed).
• If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).
[protocol, preference] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value.
Preference2 values are signed integers, that is, Preference2 values can be either positive or negative
values. However, Junos OS evaluates Preference2 values as unsigned integers that are represented
by positive values. Based on the Preference2 values, Junos OS evaluates a preferred route differently
in the following scenarios:
• Route A = 4294967096
• Route B = 200
Here, Junos OS considers the lesser Preference2 value and Route B with a Preference2 value of 200
is preferred because it is less than 4294967096.
• Combination of signed and unsigned Preference2 values
When Preference2 values of two routes are compared, and for one route the Preference2 is a signed
value, and for the other route it is an unsigned value, Junos OS prefers the route with the positive
Preference2 value over the negative Preference2 value. For example, consider the following signed
and unsigned Preference2 values:
• Route A = -200
• Route B = 200
In this case, Route B with a Preference2 value of 200 is preferred although this value is greater than
-200, because Junos OS evaluates only the unsigned value of the Preference2 value.
Level (IS-IS only). In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into smaller areas.
This organization is accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1
systems route within an area. When the destination is outside an area, they route toward a Level 2
system. Level 2 intermediate systems route between areas and toward other ASs.
Next-hop type Type of next hop. For a description of possible values for this field, see Table 35 on page 769.
Flood nexthop branches Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
exceed maximum only a subset of the flood next-hop branches were installed in the kernel.
message
Next hop Network layer address of the directly reachable neighboring system.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
Label operation MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).
Protocol next hop Network layer address of the remote routing device that advertised the prefix. This address is used
to derive a forwarding next hop.
Indirect next hop Index designation used to specify the mapping between protocol next hops, tags, kernel export policy,
and the forwarding next hops.
State State of the route (a route can be in more than one state). See Table 36 on page 771.
Metricn Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
MED-plus-IGP Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.
TTL-Action For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
Announcement bits The number of BGP peers or protocols to which Junos OS has announced this route, followed by the
list of the recipients of the announcement. Junos OS can also announce the route to the KRT for
installing the route into the Packet Forwarding Engine, to a resolve tree, a L2 VC, or even a VPN. For
example, n-Resolve inet indicates that the specified route is used for route resolution for next hops
found in the routing table.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• Recorded—The AS path is recorded by the sample process (sampled).
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the number that precedes the AS path. This number represents the number
of ASs present in the AS path, when calculated as defined in RFC 4271. This value is used in the
AS-path merge process, as defined in RFC 4893.
• [ ]—If more than one AS number is configured on the routing device, or if AS path prepending is
configured, brackets enclose the local AS number associated with the AS path.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that the origin of the prefix is not verified against the database. This is because
the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
ORR Generation-ID Displays the optimal route reflection (ORR) generation identifier. ISIS and OSPF interior gateway
protocol (IGP) updates filed whenever any of the corresponding ORR route has its metric valued
changed, or if the ORR route is added or deleted.
FECs bound to route Point-to-multipoint root address, multicast source address, and multicast group address when
multipoint LDP (M-LDP) inband signaling is configured.
Primary Upstream When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, the primary upstream
path. MoFRR transmits a multicast join message from a receiver toward a source on a primary path,
while also transmitting a secondary multicast join message from the receiver toward the source on
a backup path.
RPF Nexthops When multipoint LDP with MoFRR is configured, the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.
Label Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.
weight Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.
Prefixes bound to route Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.
Communities Community path attribute for the route. See Table 37 on page 773 for all possible values for this field.
Label-Base, range First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.
status vector Layer 2 VPN and VPLS network layer reachability information (NLRI).
Accepted The LongLivedStale flag indicates that the route was marked LLGR-stale by this router, as part of the
LongLivedStale operation of LLGR receiver mode. Either this flag or the LongLivedStaleImport flag may be displayed
for a route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accepted The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
LongLivedStaleImport from a peer, or by import policy. Either this flag or the LongLivedStale flag may be displayed for a
route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and import into the inet.0 routing table
ImportAccepted Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
LongLivedStaleImport configured neighbors and imported into the inet.0 routing table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy.
Primary Routing Table In a routing table group, the name of the primary routing table in which the route resides.
Secondary Tables In a routing table group, the name of one or more secondary tables in which the route resides.
Table 35 on page 769 describes all possible values for the Next-hop Types output field.
Indirect (indr) Used with applications that have a protocol next hop
address that is remote. You are likely to see this next-hop
type for internal BGP (IBGP) routes when the BGP next
hop is a BGP neighbor that is not directly connected.
Unilist (ulst) List of unicast next hops. A packet sent to this next hop
goes to any next hop in the list.
Table 36 on page 771 describes all possible values for the State output field. A route can
be in more than one state (for example, <Active NoReadvrt Int Ext>).
Value Description
Always Compare MED Path with a lower multiple exit discriminator (MED) is
available.
Cisco Non-deterministic MED Cisco nondeterministic MED is enabled, and a path with a
selection lower MED is available.
Cluster list length Length of cluster list sent by the route reflector.
Ex Exterior route.
Value Description
IGP metric Path through next hop with lower IGP metric is available.
Inactive reason Flags for this route, which was not selected as best for a
particular destination.
Int Ext BGP route received from an internal BGP peer or a BGP
confederation peer.
Interior > Exterior > Exterior via Direct, static, IGP, or EBGP path is available.
Interior
Next hop address Path with lower metric next hop is available.
NotBest Route not chosen because it does not have the lowest MED.
Not Best in its group Incoming BGP AS is not the best of a group (only one AS can
be the best).
Value Description
Route Metric or MED comparison Route with a lower metric or MED is available.
Unusable path Path is not usable because of one of the following conditions:
ProtectionPath Indicates the route entry that can be used as a protection path.
Table 37 on page 773 describes the possible values for the Communities output field.
Value Description
area-number 4 bytes, encoding a 32-bit area number. For AS-external routes, the value is 0. A nonzero value
identifies the route as internal to the OSPF domain, and as within the identified area. Area
numbers are relative to a particular OSPF domain.
bandwidth: local AS Link-bandwidth community value used for unequal-cost load balancing. When BGP has
number:link-bandwidth-number several candidate paths available for multipath purposes, it does not perform unequal-cost
load balancing according to the link-bandwidth community unless all candidate paths have
this attribute.
domain-id-vendor Unique configurable number that further identifies the OSPF domain.
options 1 byte. Currently this is only used if the route type is 5 or 7. Setting the least significant bit in
the field indicates that the route carries a type 2 metric.
Value Description
origin (Used with VPNs) Identifies where the route came from.
ospf-route-type 1 byte, encoded as 1 or 2 for intra-area routes (depending on whether the route came from a
type 1 or a type 2 LSA); 3 for summary routes; 5 for external routes (area number must be0);
7 for NSSA routes; or 129 for sham link endpoint addresses.
route-type-vendor Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x8000. The format is
area-number:ospf-route-type:options.
rte-type Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x0306. The format is
area-number:ospf-route-type:options.
target Defines which VPN the route participates in; target has the format 32-bit IP address:16-bit
number. For example, 10.19.0.0:100.
unknown IANA Incoming IANA codes with a value between 0x1 and 0x7fff. This code of the BGP extended
community attribute is accepted, but it is not recognized.
unknown OSPF vendor Incoming IANA codes with a value above 0x8000. This code of the BGP extended community
community attribute is accepted, but it is not recognized.
Sample Output
AS path: I
OSPF Preference: 10
Next-hop reference count: 1
Next hop: via so-0/3/0.0, selected
State: <Int>
Inactive reason: Route Preference
Local AS: 69
Age: 1:30:17 Metric: 1
ORR Generation-ID: 1
Area: 0.0.0.0
Task: OSPF
AS path: I
...
...
...
Age: 1:31:43
Task: IGMP
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
...
...
*L2CKT Preference: 7
Next hop: via so-1/1/2.0 weight 1, selected
Label-switched-path my-lsp
Label operation: Push 100000[0]
Protocol next hop: 10.245.255.63 Indirect next hop: 86af000 296
State: <Active Int>
Local AS: 99
Age: 10:21
Task: l2 circuit
Announcement bits (1): 0-LDP
AS path: I
VC Label 100000, MTU 1500, VLAN ID 512
Source: 10.1.1.2
Next hop: 10.1.1.2 via ge-0/3/0.1, selected
Next hop: 10.1.1.6 via ge-0/3/0.5
State: <Active Ext>
Local AS: 1 Peer AS: 2
Age: 5:04:43
Validation State: unverified
Task: BGP_2.10.1.1.2+59955
Announcement bits (1): 0-KRT
AS path: 2 I
Accepted Multipath
Localpref: 100
Router ID: 172.16.1.2
BGP Preference: 170/-101
Next hop type: Router, Next hop index: 678
Address: 0x8f97520
Next-hop reference count: 9
Source: 10.1.1.6
Next hop: 10.1.1.6 via ge-0/3/0.5, selected
State: <NotBest Ext>
Inactive reason: Not Best in its group - Active preferred
Local AS: 1 Peer AS: 2
Age: 5:04:43
Validation State: unverified
Task: BGP_2.10.1.1.6+58198
AS path: 2 I
Accepted MultipathContrib
Localpref: 100
Router ID: 172.16.1.3
show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint LSPs)
user@host> show route label 299872 detail
show route label detail (Multipoint LDP with Multicast-Only Fast Reroute)
user@host> show route label 301568 detail
...
CUSTOMER_0001.inet.0: 5618 destinations, 6018 routes (5618 active, 0 holddown, 0
hidden)
Description Display only the routes that exactly match the specified address or range of addresses.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Description Display policy-based route export information. Policy-based export simplifies the process
of exchanging route information between routing instances.
Options none—(Same as brief.) Display standard information about policy-based export for all
instances and routing tables on all systems.
Output Fields Table 38 on page 787 lists the output fields for the show route export command. Output
fields are listed in the approximate order in which they appear.
Table or table-name Name of the routing tables that either import or export routes. All levels
Routes Number of routes exported from this table into other tables. If a particular route brief none
is exported to different tables, the counter will only increment by one.
Export Whether the table is currently exporting routes to other tables: Y or N (Yes or No). brief none
Import Tables currently importing routes from the originator table. (Not displayed for detail
tables that are not exporting any routes.)
Flags (instance keyword only) Flags for this feature on this instance: detail
• config auto-policy—The policy was deduced from the configured IGP export
policies.
• cleanup—Configuration information for this instance is no longer valid.
• config—The instance was explicitly configured.
Options (instance keyword only) Configured option displays the type of routing tables the detail
feature handles:
• unicast—Indicates instance.inet.0.
• multicast—Indicates instance.inet.2.
• unicast multicast—Indicates instance.inet.0 and instance.inet.2.
Import policy (instance keyword only) Policy that route export uses to construct the import-export detail
matrix. Not displayed if the instance type is vrf.
Type (instance keyword only) Type of routing instance: forwarding, non-forwarding, or detail
vrf.
Sample Output
inet.0 Routes: 0
black.inet.0 Routes: 3
Import: [ inet.0 ]
red.inet.0 Routes: 4
Import: [ inet.0 ]
Description Display extensive information about the active entries in the routing tables.
Output Fields Table 39 on page 789 describes the output fields for the show route extensive command.
Output fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
route-destination Route destination (for example: 10.0.0.1/24). The entry value is the number of route for this destination,
(entry, announced) and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:
label stacking (Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the
label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.
• S=0 route indicates that a packet with an incoming label stack depth of two or more exits this router
with one fewer label (the label-popping operation is performed).
• If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).
[protocol, preference] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
Level (IS-IS only). In IS-IS, a single autonomous system (AS) can be divided into smaller groups called
areas. Routing between areas is organized hierarchically, allowing a domain to be administratively
divided into smaller areas. This organization is accomplished by configuring Level 1 and Level 2
intermediate systems. Level 1 systems route within an area. When the destination is outside an area,
they route toward a Level 2 system. Level 2 intermediate systems route between areas and toward
other ASs.
Next-hop type Type of next hop. For a description of possible values for this field, see the Output Field table in the
show route detail command.
Flood nexthop branches Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
exceed maximum only a subset of the flood next-hop branches were installed in the kernel.
message
Next hop Network layer address of the directly reachable neighboring system.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
Label operation MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).
Offset Whether the metric has been increased or decreased by an offset value.
Protocol next hop Network layer address of the remote routing device that advertised the prefix. This address is used
to recursively derive a forwarding next hop.
label-operation MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).
Indirect next hops When present, a list of nodes that are used to resolve the path to the next-hop destination, in the
order that they are resolved.
When BGP PIC Edge is enabled, the output lines that contain Indirect next hop: weight follow next
hops that the software can use to repair paths where a link failure occurs. The next-hop weight has
one of the following values:
State State of the route (a route can be in more than one state). See the Output Field table in the show
route detail command.
Session ID The BFD session ID number that represents the protection using MPLS fast reroute (FRR) and loop-free
alternate (LFA).
Weight Weight for the backup path. If the weight of an indirect next hop is larger than zero, the weight value
is shown.
Inactive reason If the route is inactive, the reason for its current state is indicated. Typical reasons include:
Metric Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
MED-plus-IGP Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.
TTL-Action For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
Announcement bits List of protocols that are consumers of the route. Using the following output as an example,
Announcement bits (3): 0-KRT 5-Resolve tree 2 8-BGP RT Background there are (3) announcement
bits to reflect the three clients (protocols) that have state for this route: Kernel (0-KRT), 5 (resolution
tree process 2), and 8 (BGP).
The notation n-Resolve inet indicates that the route is used for route resolution for next hops found
in the routing table. n is an index used by Juniper Networks customer support only.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• Recorded—The AS path is recorded by the sample process (sampled).
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the local AS number associated with the AS path if more than one AS number
is configured on the routing device, or if AS path prepending is configured.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
FECs bound to route Point-to-multipoint root address, multicast source address, and multicast group address when
multipoint LDP (M-LDP) inband signaling is configured.
AS path: I <Originator> (For route reflected output only) Originator ID attribute set by the route reflector.
Primary Upstream When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, the primary upstream
path. MoFRR transmits a multicast join message from a receiver toward a source on a primary path,
while also transmitting a secondary multicast join message from the receiver toward the source on
a backup path.
RPF Nexthops When multipoint LDP with MoFRR is configured, the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.
Label Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.
weight Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.
Cluster list (For route reflected output only) Cluster ID sent by the route reflector.
Originator ID (For route reflected output only) Address of router that originally sent the route to the route reflector.
Prefixes bound to route Forwarding Equivalent Class (FEC) bound to this route. Applicable only to routes installed by LDP.
Communities Community path attribute for the route. See the Output Field table in the show route detail command
for all possible values for this field.
Label-Base, range First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.
status vector Layer 2 VPN and VPLS network layer reachability information (NLRI).
Primary Routing Table In a routing table group, the name of the primary routing table in which the route resides.
Secondary Tables In a routing table group, the name of one or more secondary tables in which the route resides.
Originating RIB Name of the routing table whose active route was used to determine the forwarding next-hop entry
in the resolution database. For example, in the case of inet.0 resolving through inet.0 and inet.3, this
field indicates which routing table, inet.0 or inet.3, provided the best path for a particular prefix.
Forwarding nexthops Number of forwarding next hops. The forwarding next hop is the network layer address of the directly
reachable neighboring system (if applicable) and the interface used to reach it.
Sample Output
...
...
...
...
0 (1 entry, 1 announced)
TSI:
KRT in-kernel 0 /36 -> {}
*MPLS Preference: 0
Next hop type: Receive
Next-hop reference count: 6
...
TSI:
KRT in-kernel 800010 /36 -> {vt-3/2/0.32769}
*VPLS Preference: 7
Next-hop reference count: 2
Next hop: via vt-3/2/0.32769, selected
Label operation: Pop
State: <Active Int>
Age: 1:31:53
Task: Common L2 VC
Announcement bits (1): 0-KRT
AS path: I
Push 800012
Indirect next hop: 87272e4 1048574
State: <Active Int>
Age: 1:31:53 Metric2: 2
Task: Common L2 VC
Announcement bits (2): 0-KRT 1-Common L2 VC
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Indirect next hops: 1
Protocol next hop: 203.0.113.103 Metric: 2
Push 800012
Indirect next hop: 87272e4 1048574
Indirect path forwarding next hops: 1
Next hop: 203.0.113.216 via ge-3/1/0.0 weight 0x1
*PIM Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS: 64496
Age: 1:34:08
Task: PIM Recv6
Announcement bits (1): 0-KRT
AS path: I
...
TSI:
IS-IS Preference: 15
Level: 1
Next hop type: Router, Next hop index: 1048577
Address: 0xXXXXXXXXXX
Next-hop reference count: YY
Next hop: 203.0.113.22 via ae1.0 balance 43%, selected
Session Id: 0x141
Next hop: 203.0.113.22 via ae0.0 balance 57%
TSI:
KRT in-kernel 203.0.113.0/8 -> {indirect(40)}
*BGP Preference: 170/-101
Source: 192.168.4.214
Protocol next hop: 198.51.100.192 Indirect next hop: 84ac908 40
State: <Active Int Ext>
Local AS: 65548 Peer AS: 65548
Age: 3:09 Metric: 0 Metric2: 0
Task: BGP_65548.192.168.4.214+1033
Announcement bits (2): 0-KRT 4-Resolve inet.0
AS path: 65544 64507 I <Originator>
Cluster list: 198.51.100.1
Originator ID: 203.0.113.88
Communities: 7777:7777
Localpref: 100
Router ID: 203.0.113.4
Indirect next hops: 1
Protocol next hop: 203.0.113.192 Metric: 0
Indirect next hop: 84ac908 40
Indirect path forwarding next hops: 0
Next hop type: Discard
show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint LSPs)
user@host> show route label 299872 detail
show route label detail (Multipoint LDP with Multicast-Only Fast Reroute)
user@host> show route label 301568 detail
...
CUSTOMER_0001.inet.0: 5618 destinations, 6018 routes (5618 active, 0 holddown, 0
hidden)
Description Display the Routing Engine's forwarding table, including the network-layer prefixes and
their next hops. This command is used to help verify that the routing protocol process
has relayed the correction information to the forwarding table. The Routing Engine
constructs and maintains one or more routing tables. From the routing tables, the Routing
Engine derives a table of active routes, called the forwarding table.
NOTE: The Routing Engine copies the forwarding table to the Packet
Forwarding Engine, the part of the router that is responsible for forwarding
packets. To display the entries in the Packet Forwarding Engine's forwarding
table, use the show pfe route command.
Options none—Display the routes in the forwarding tables. By default, the show route
forwarding-table command does not display information about private, or internal,
forwarding tables.
all—(Optional) Display routing table entries for all forwarding tables, including private,
or internal, tables.
family family—(Optional) Display routing table entries for the specified family: bridge
(ccc | destination | detail | extensive | interface-name | label | learning-vlan-id | matching
| multicast | summary | table | vlan | vpn), ethernet-switching, evpn, fibre-channel,
fmembers, inet, inet6, iso, mcsnoop-inet, mcsnoop-inet6, mpls, satellite-inet,
satellite-inet6, satellite-vpls, tnp, unix, vpls, or vlan-classification.
lcc number—(TX Matrix and TX matrix Plus routers only) (Optional) On a routing matrix
composed of a TX Matrix router and T640 routers, display information for the
specified T640 router (or line-card chassis) connected to the TX Matrix router. On
a routing matrix composed of the TX Matrix Plus router and T1600 or T4000 routers,
display information for the specified router (line-card chassis) connected to the TX
Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
table —(Optional) Display route entries for all the routing tables in the main routing
instance or for the specified routing instance. If your device supports logical systems,
you can also display route entries for the specified logical system and routing instance.
To view the routing instances on your device, use the show route instance command.
vlan (all | vlan-name)—(Optional) Display information for all VLANs or for the specified
VLAN.
show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM)
hashing is enabled) on page 821
show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM)
hashing is enabled with MAC Statistics) on page 821
show route forwarding-table family vpls extensive on page 822
show route forwarding-table table default on page 823
show route forwarding-table table
logical-system-name/routing-instance-name on page 824
show route forwarding-table vpn on page 825
Output Fields Table 40 on page 811 lists the output fields for the show route forwarding-table command.
Output fields are listed in the approximate order in which they appear. Field names might
be abbreviated (as shown in parentheses) when no level of output is specified, or when
the detail keyword is used instead of the extensive keyword.
Logical system Name of the logical system. This field is displayed if you specify the table All levels
logical-system-name/routing-instance-name option on a device that is configured
for and supports logical systems.
Routing table Name of the routing table (for example, inet, inet6, mpls). All levels
Enabled protocols The features and protocols that have been enabled for a given routing table. All levels
This field can contain the following values:
Address family Address family (for example, IP, IPv6, ISO, MPLS, and VPLS). All levels
Route Type (Type) How the route was placed into the forwarding table. When the detail keyword All levels
is used, the route type might be abbreviated (as shown in parentheses):
Next hop IP address of the next hop to the destination. detail extensive
NOTE: For static routes that use point-to-point (P2P) outgoing interfaces, the
next-hop address is not displayed in the output.
Next hop Type Next-hop type. When the detail keyword is used, the next-hop type might be detail extensive
(Type) abbreviated (as indicated in parentheses):
• broadcast (bcst)—Broadcast.
• deny—Deny.
• discard (dscd) —Discard.
• hold—Next hop is waiting to be resolved into a unicast or multicast type.
• indexed (idxd)—Indexed next hop.
• indirect (indr)—Indirect next hop.
• local (locl)—Local address on an interface.
• routed multicast (mcrt)—Regular multicast next hop.
• multicast (mcst)—Wire multicast next hop (limited to the LAN).
• multicast discard (mdsc)—Multicast discard.
• multicast group (mgrp)—Multicast group member.
• receive (recv)—Receive.
• reject (rjct)—Discard. An ICMP unreachable message was sent.
• resolve (rslv)—Resolving the next hop.
• unicast (ucst)—Unicast.
• unilist (ulst)—List of unicast next hops. A packet sent to this next hop goes
to any next hop in the list.
Index Software index of the next hop that is used to route the traffic for a given prefix. detail extensive none
Route Logical interface index from which the route is learned. For example, for interface extensive
interface-index routes, this is the logical interface index of the route itself. For static routes, this
field is zero. For routes learned through routing protocols, this is the logical
interface index from which the route is learned.
Reference (NhRef) Number of routes that refer to this next hop. detail extensive none
Next-hop interface Interface used to reach the next hop. detail extensive none
(Netif)
Weight Value used to distinguish primary, secondary, and fast reroute backup routes. extensive
Weight information is available when MPLS label-switched path (LSP) link
protection, node-link protection, or fast reroute is enabled, or when the standby
state is enabled for secondary paths. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible (see the Balance
field description).
Balance Balance coefficient indicating how traffic of unequal cost is distributed among extensive
next hops when a router is performing unequal-cost load balancing. This
information is available when you enable BGP multipath load balancing.
RPF interface List of interfaces from which the prefix can be accepted. Reverse path forwarding extensive
(RPF) information is displayed only when rpf-check is configured on the interface.
Sample Output
...
...
...
...
Destination: 3.4.2.1/32
Route type: user
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Next-hop type: unilist Index: 262143 Reference: 1
Nexthop: 172.16.4.4
Next-hop type: unicast Index: 335 Reference: 2
Next-hop interface: so-1/1/0.0 Weight: 22 Balance: 3
Nexthop: 145.12.1.2
Next-hop type: unicast Index: 337 Reference: 2
Next-hop interface: so-0/1/2.0 Weight: 33 Balance: 33
Destination: default
Route type: user
Route reference: 2 Route interface-index: 0
Flags: sent to PFE
Nexthop: 00:00:5E:00:53:1b
Next-hop type: unicast Index: 132 Reference: 4
Next-hop interface: fxp0.0
Destination: default
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: none
Next-hop type: reject Index: 14 Reference: 1
Destination: 127.0.0.1/32
Route type: interface
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Nexthop: 127.0.0.1
Next-hop type: local Index: 320 Reference: 1
...
Destination: default
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Next-hop type: reject Index: 46 Reference: 1
Destination: 10.0.0.0/8
Route type: interface
Route reference: 0 Route interface-index: 3
Flags: sent to PFE
Next-hop type: resolve Index: 136 Reference: 1
Next-hop interface: fxp1.0
...
Destination: default
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Next-hop type: reject Index: 38 Reference: 1
Destination: default
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Next-hop type: reject Index: 22 Reference: 1
Destination: ff00::/8
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Next-hop type: multicast discard Index: 21 Reference: 1
...
Destination: default
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Next-hop type: reject Index: 54 Reference: 1
Destination: fe80::2a0:a5ff:fe3d:375/128
Route type: interface
Route reference: 0 Route interface-index: 0
Flags: sent to PFE
Nexthop: fe80::2a0:a5ff:fe3d:375
Next-hop type: local Index: 75 Reference: 1
...
The next example is based on the following configuration, which enables an RPF check
on all routes that are learned from this interface, including the interface route:
so-1/1/0 {
unit 0 {
family inet {
rpf-check;
address 192.0.2.2/30;
}
}
}
Destination: 198.51.100.0/24
Route type: user
Route reference: 0 Route interface-index: 335
Multicast RPF nh index: 0
P2mpidx: 0
Flags: cached, check incoming interface , accounting, sent to PFE, rt nh
decoupled
Next-hop type: indirect Index: 1048575 Reference: 4
Nexthop:
Next-hop type: composite Index: 627 Reference: 1
Next-hop type: unicast Index: 1048574 Reference: 2
Next-hop interface: st0.1, 192.0.2.0
The show route forwarding table output shows the two next hop elements for a
multihomed EVPN destination.
MPLS:
Destination: 299952
Route type: user
Route reference: 0 Route interface-index: 0
Multicast RPF nh index: 0
P2mpidx: 0
Flags: sent to PFE, rt nh decoupled
Next-hop type: indirect Index: 1048575 Reference: 2
Nexthop:
Next-hop type: composite Index: 601 Reference: 2
Next-hop type: indirect Index: 1048574 Reference: 3
Nexthop: 1.0.0.4
Next-hop type: Push 301632, Push 299776(top) Index: 600 Reference: 2
Load Balance Label: None
After one of the PE router has been disabled in the EVPN multihomed network, the same
show route forwarding table output command shows one next hop element and one
empty next hop element.
Destination: 299952
Route type: user
Route reference: 0 Route interface-index: 0
Multicast RPF nh index: 0
P2mpidx: 0
Flags: sent to PFE, rt nh decoupled
Next-hop type: indirect Index: 1048575 Reference: 2
Nexthop:
Next-hop type: composite Index: 601 Reference: 2
Next-hop type: indirect Index: 1048577 Reference: 3
Nexthop: 1.0.0.4
Next-hop type: Push 301344, Push 299792(top) Index: 619 Reference: 2
Load Balance Label: None
Next-hop interface: ge-0/0/1.0
vt-0/3/0.32770 (VPLS)
user 0 indr 351 4
Push 800000, Push 100002(top)
so-0/0/0.0
comp 755 3
comp 756 3
show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM) hashing is enabled)
user@host> show route forwarding-table vpls
show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM) hashing is enabled with
MAC Statistics)
user@host> show route forwarding-table vpls
ge-3/0/0.0
00:19:e2:25:d0:01/48 user 0 ucst 590 5 ge-2/3/9.0
0x30003/51 user 0 comp 630 2
ge-2/3/9.0 intf 0 ucst 590 5 ge-2/3/9.0
ge-3/1/3.0 intf 0 ucst 591 4 ge-3/1/3.0
0x30002/51 user 0 comp 627 2
0x30001/51 user 0 comp 624 2
Destination: default
Route type: dynamic
Route reference: 0 Route interface-index: 72
Flags: sent to PFE
Next-hop type: flood Index: 289 Reference: 1
Next-hop type: unicast Index: 291 Reference: 3
Next-hop interface: fe-0/1/3.0
Next-hop type: unicast Index: 290 Reference: 3
Next-hop interface: fe-0/1/2.0
Destination: default
Route type: permanent
Route reference: 0 Route interface-index: 0
Flags: none
Next-hop type: discard Index: 341 Reference: 1
Destination: fe-0/1/2.0
Route type: dynamic
Route reference: 0 Route interface-index: 69
Flags: sent to PFE
Next-hop type: flood Index: 293 Reference: 1
Next-hop type: indirect Index: 363 Reference: 4
Next-hop type: Push 800016
Next-hop interface: at-1/0/1.0
Next-hop type: indirect Index: 301 Reference: 5
Next hop: 10.31.3.2
Next-hop type: Push 800000
Next-hop interface: fe-0/1/1.0
Next-hop type: unicast Index: 291 Reference: 3
Next-hop interface: fe-0/1/3.0
Destination: fe-0/1/3.0
Route type: dynamic
Route reference: 0 Route interface-index: 70
Flags: sent to PFE
Next-hop type: flood Index: 292 Reference: 1
Next-hop type: indirect Index: 363 Reference: 4
Next-hop type: Push 800016
Next-hop interface: at-1/0/1.0
Next-hop type: indirect Index: 301 Reference: 5
Next hop: 10.31.3.2
Next-hop type: Push 800000
Next-hop interface: fe-0/1/1.0
Next-hop type: unicast Index: 290 Reference: 3
Next-hop interface: fe-0/1/2.0
Destination: 00:00:5E:00:53:01/48
Route type: dynamic
Route reference: 0 Route interface-index: 70
Flags: sent to PFE, prefix load balance
Next-hop type: unicast Index: 291 Reference: 3
Next-hop interface: fe-0/1/3.0
Route used as destination:
Packet count: 6640 Byte count: 675786
Route used as source
Packet count: 6894 Byte count: 696424
Destination: 00:00:5E:00:53:04/48
Route type: dynamic
Route reference: 0 Route interface-index: 69
Flags: sent to PFE, prefix load balance
Next-hop type: unicast Index: 290 Reference: 3
Next-hop interface: fe-0/1/2.0
Route used as destination:
Packet count: 96 Byte count: 8079
Route used as source:
Packet count: 296 Byte count: 24955
Destination: 00:00:5E:00:53:05/48
Route type: dynamic
Route reference: 0 Route interface-index: 74
Flags: sent to PFE, prefix load balance
Next-hop type: indirect Index: 301 Reference: 5
Next hop: 10.31.3.2
Next-hop type: Push 800000
Next-hop interface: fe-0/1/1.0
...
Logical system: R4
Routing table: vpn-red.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
default perm 0 rjct 563 1
0.0.0.0/32 perm 0 dscd 561 2
172.16.0.1/32 user 0 dscd 561 2
172.16.2.0/24 intf 0 rslv 771 1 ge-1/2/0.3
172.16.2.0/32 dest 0 172.16.2.0 recv 769 1 ge-1/2/0.3
172.16.2.1/32 intf 0 172.16.2.1 locl 770 2
172.16.2.1/32 dest 0 172.16.2.1 locl 770 2
172.16.2.2/32 dest 0 0.4.80.3.0.1b.c0.d5.e4.bd.0.1b.c0.d5.e4.bc.8.0
ucst 789 1 ge-1/2/0.3
172.16.2.255/32 dest 0 172.16.2.255 bcst 768 1 ge-1/2/0.3
172.16.233.0/4 perm 1 mdsc 562 1
172.16.233.1/32 perm 0 172.16.233.1 mcst 558 1
255.255.255.255/32 perm 0 bcst 559 1
Logical system: R4
Routing table: vpn-red.iso
ISO:
Destination Type RtRef Next hop Type Index NhRef Netif
default perm 0 rjct 608 1
Logical system: R4
Routing table: vpn-red.inet6
Internet6:
Destination Type RtRef Next hop Type Index NhRef Netif
default perm 0 rjct 708 1
Logical system: R4
Routing table: vpn-red.mpls
MPLS:
Destination Type RtRef Next hop Type Index NhRef Netif
default perm 0 dscd 638
Description Display only hidden route information. A hidden route is unusable, even if it is the best
path.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field table for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
...
The output for the show route hidden extensive command is identical to that of the show
route hidden detail command. For sample output, see show route hidden detail on
page 827.
Description Display routes for destinations that have no active route. An inactive route is a route that
was not selected as the best path.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
The output for the show route inactive-path extensive command is identical to that of
the show route inactive-path detail command. For sample output, see show route
inactive-path detail on page 830.
Options none—(Same as brief) Display standard information about all routing instances.
brief | detail | summary—(Optional) Display the specified level of output. If you do not
specify a level of output, the system defaults to brief. (These options are not available
with the operational keyword.)
Related • Example: Transporting IPv6 Traffic Across IPv4 Using Filter-Based Tunneling
Documentation
• Example: Configuring the Helper Capability Mode for OSPFv3 Graceful Restart
Output Fields Table 41 on page 834 lists the output fields for the show route instance command. Output
fields are listed in the approximate order in which they appear.
Operational Routing Instances (operational keyword only) Names of all operational routing —
instances.
Type Type of routing instance: forwarding, l2vpn, no-forwarding, vpls, All levels
virtual-router, or vrf.
State State of the routing instance: active or inactive. brief detail none
Interfaces Name of interfaces belonging to this routing instance. brief detail none
Restart State Status of graceful restart for this instance: Pending or Complete. detail
Path selection timeout Maximum amount of time, in seconds, remaining until graceful detail
restart is declared complete. The default is 300.
Tables Tables (and number of routes) associated with this routing instance. brief detail none
Route-distinguisher Unique route distinguisher associated with this routing instance. detail
Vrf-import VPN routing and forwarding instance import policy name. detail
Vrf-export VPN routing and forwarding instance export policy name. detail
Vrf-import-target VPN routing and forwarding instance import target community detail
name.
Vrf-export-target VPN routing and forwarding instance export target community name. detail
Fast-reroute-priority Fast reroute priority setting for a VPLS routing instance: high, medium, detail
or low. The default is low.
Primary rib Primary table for this routing instance. brief none summary
Sample Output
Instance Type
Primary RIB Active/holddown/hidden
master forwarding
inet.0 16/0/1
iso.0 1/0/0
mpls.0 0/0/0
inet6.0 2/0/0
l2circuit.0 0/0/0
__juniper_private1__ forwarding
__juniper_private1__.inet.0 12/0/0
__juniper_private1__.inet6.0 1/0/0
master:
Router ID: 10.255.14.176
Type: forwarding State: Active
Restart State: Complete Path selection timeout: 300
Tables:
inet.0 : 17 routes (15 active, 0 holddown, 1 hidden)
Restart Complete
inet.3 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
iso.0 : 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
mpls.0 : 19 routes (19 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l3vpn.0 : 10 routes (10 active, 0 holddown, 0 hidden)
Restart Complete
inet6.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l2vpn.0 : 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
BGP-INET:
Router ID: 10.69.103.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.103
Route-distinguisher: 10.255.14.176:103
Vrf-import: [ BGP-INET-import ]
Vrf-export: [ BGP-INET-export ]
Tables:
BGP-INET.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
BGP-L:
Router ID: 10.69.104.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.104
Route-distinguisher: 10.255.14.176:104
Vrf-import: [ BGP-L-import ]
Vrf-export: [ BGP-L-export ]
Tables:
BGP-L.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
BGP-L.mpls.0 : 3 routes (3 active, 0 holddown, 0 hidden)
Restart Complete
L2VPN:
Router ID: 0.0.0.0
Type: l2vpn State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.512
Route-distinguisher: 10.255.14.176:512
Vrf-import: [ L2VPN-import ]
Vrf-export: [ L2VPN-export ]
Tables:
L2VPN.l2vpn.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
LDP:
Router ID: 10.69.105.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.105
Route-distinguisher: 10.255.14.176:105
Vrf-import: [ LDP-import ]
Vrf-export: [ LDP-export ]
Tables:
LDP.inet.0 : 5 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
OSPF:
Router ID: 10.69.101.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.101
Route-distinguisher: 10.255.14.176:101
Vrf-import: [ OSPF-import ]
Vrf-export: [ OSPF-export ]
Vrf-import-target: [ target:11111
Tables:
OSPF.inet.0 : 8 routes (7 active, 0 holddown, 0 hidden)
Restart Complete
RIP:
Router ID: 10.69.102.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.102
Route-distinguisher: 10.255.14.176:102
Vrf-import: [ RIP-import ]
Vrf-export: [ RIP-export ]
Tables:
RIP.inet.0 : 6 routes (6 active, 0 holddown, 0 hidden)
Restart Complete
STATIC:
Router ID: 10.69.100.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.100
Route-distinguisher: 10.255.14.176:100
Vrf-import: [ STATIC-import ]
Vrf-export: [ STATIC-export ]
Tables:
STATIC.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
master:
Router ID: 10.255.14.176
Type: forwarding State: Active
Restart State: Pending Path selection timeout: 300
Tables:
inet.0 : 17 routes (15 active, 1 holddown, 1 hidden)
Restart Pending: OSPF LDP
inet.3 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Pending: OSPF LDP
iso.0 : 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
mpls.0 : 23 routes (23 active, 0 holddown, 0 hidden)
Restart Pending: LDP VPN
bgp.l3vpn.0 : 10 routes (10 active, 0 holddown, 0 hidden)
Restart Pending: BGP VPN
inet6.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l2vpn.0 : 1 routes (1 active, 0 holddown, 0 hidden)
Restart Pending: BGP VPN
BGP-INET:
Router ID: 10.69.103.1
Type: vrf State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.103
Route-distinguisher: 10.255.14.176:103
Vrf-import: [ BGP-INET-import ]
Vrf-export: [ BGP-INET-export ]
Tables:
BGP-INET.inet.0 : 6 routes (5 active, 0 holddown, 0 hidden)
Restart Pending: VPN
BGP-L:
Router ID: 10.69.104.1
Type: vrf State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.104
Route-distinguisher: 10.255.14.176:104
Vrf-import: [ BGP-L-import ]
Vrf-export: [ BGP-L-export ]
Tables:
BGP-L.inet.0 : 6 routes (5 active, 0 holddown, 0 hidden)
Restart Pending: VPN
BGP-L.mpls.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Pending: VPN
L2VPN:
Router ID: 0.0.0.0
Type: l2vpn State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.512
Route-distinguisher: 10.255.14.176:512
Vrf-import: [ L2VPN-import ]
Vrf-export: [ L2VPN-export ]
Tables:
L2VPN.l2vpn.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Pending: VPN L2VPN
LDP:
Router ID: 10.69.105.1
Type: vrf State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.105
Route-distinguisher: 10.255.14.176:105
Vrf-import: [ LDP-import ]
Vrf-export: [ LDP-export ]
Tables:
LDP.inet.0 : 5 routes (4 active, 1 holddown, 0 hidden)
Restart Pending: OSPF LDP VPN
OSPF:
Router ID: 10.69.101.1
Type: vrf State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.101
Route-distinguisher: 10.255.14.176:101
Vrf-import: [ OSPF-import ]
Vrf-export: [ OSPF-export ]
Tables:
OSPF.inet.0 : 8 routes (7 active, 1 holddown, 0 hidden)
Restart Pending: OSPF VPN
RIP:
Router ID: 10.69.102.1
Type: vrf State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.102
Route-distinguisher: 10.255.14.176:102
Vrf-import: [ RIP-import ]
Vrf-export: [ RIP-export ]
Tables:
RIP.inet.0 : 8 routes (6 active, 2 holddown, 0 hidden)
Restart Pending: RIP VPN
STATIC:
Router ID: 10.69.100.1
Type: vrf State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.100
Route-distinguisher: 10.255.14.176:100
Vrf-import: [ STATIC-import ]
Vrf-export: [ STATIC-export ]
Tables:
STATIC.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Pending: VPN
test-vpls:
Router ID: 0.0.0.0
Type: vpls State: Active
Interfaces:
lsi.1048833
lsi.1048832
fe-0/1/0.513
Route-distinguisher: 10.255.37.65:1
Vrf-import: [ __vrf-import-test-vpls-internal__ ]
Vrf-export: [ __vrf-export-test-vpls-internal__ ]
Vrf-import-target: [ target:300:1 ]
Vrf-export-target: [ target:300:1 ]
Vrf-edge-protection-id: 166.1.3.1 Fast-reroute-priority: high
Tables:
test-vpls.l2vpn.0 : 3 routes (3 active, 0 holddown, 0 hidden)
master
default
BGP-L.inet6.0 0/0/0
L2VPN l2vpn
L2VPN.inet.0 0/0/0
L2VPN.iso.0 0/0/0
L2VPN.inet6.0 0/0/0
L2VPN.l2vpn.0 2/0/0
LDP vrf
LDP.inet.0 4/0/0
LDP.iso.0 0/0/0
LDP.mpls.0 0/0/0
LDP.inet6.0 0/0/0
LDP.l2circuit.0 0/0/0
OSPF vrf
OSPF.inet.0 7/0/0
OSPF.iso.0 0/0/0
OSPF.inet6.0 0/0/0
RIP vrf
RIP.inet.0 6/0/0
RIP.iso.0 0/0/0
RIP.inet6.0 0/0/0
STATIC vrf
STATIC.inet.0 4/0/0
STATIC.iso.0 0/0/0
STATIC.inet6.0 0/0/0
Description Display the entries in the routing table that are being sent to the specified next-hop
address.
Options brief | detail | extensive | terse—(Optional) Display the specified level of ouput.
next-hop—Next-hop address.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Syntax (EX Series show route output (address ip-address | interface interface-name)
Switches) <brief | detail | extensive | terse>
Description Display the entries in the routing table learned through static routes and interior gateway
protocols that are to be sent out the interface with either the specified IP address or
specified name.
To view routes advertised to a neighbor or received from a neighbor for the BGP protocol,
use the show route advertising-protocol bgp and show route receive-protocol bgp
commands instead.
Options address ip-address—Display entries in the routing table that are to be sent out the
interface with the specified IP address.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
interface interface-name—Display entries in the routing table that are to be sent out the
interface with the specified name.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or
the show route terse command.
Sample Output
The output for the show route output address extensive command is identical to that of
the show route output address detail command. For sample output, see show route
output address detail on page 848.
The output for the show route output interface extensive command is identical to that of
the show route output interface detail command. For sample output, see show route
output interface detail on page 850.
>so-0/1/2.0
so-0/3/2.0
* 172.16.16.0/24 O 10 2 >so-0/1/2.0
* 172.16.36.0/24 D 0 >so-0/1/2.0
O 10 1 >so-0/1/2.0
Description Display the route entries in the routing table that were learned from a particular protocol.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
• ccc—Circuit cross-connect
• frr—Precomputed protection route or backup route used when a link goes down
• l2circuit—Layer 2 circuit
• local—Local address
• tunnel—Dynamic tunnel
NOTE: EX Series switches run a subset of these protocols. See the switch
CLI for details.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or
the show route terse command.
Sample Output
inet.0: 335832 destinations, 335833 routes (335383 active, 0 holddown, 450 hidden)
+ = Active Route, - = Last Active, * = Both
inet.0: 335805 destinations, 335806 routes (335356 active, 0 holddown, 450 hidden)
66.117.63.0/24 (1 entry, 1 announced)
*BGP Preference: 170/-101
Next hop type: Indirect
Next-hop reference count: 1006436
Source: 192.168.69.71
Next hop type: Router, Next hop index: 324
Next hop: 192.168.167.254 via fxp0.0, selected
Protocol next hop: 192.168.69.71
Indirect next hop: 8e166c0 342
State: <Active Ext>
Local AS: 69 Peer AS: 10458
Age: 6d 10:42:42 Metric2: 0
Task: BGP_10458.192.168.69.71+179
Announcement bits (3): 0-KRT 2-BGP RT Background 3-Resolve tree
1
inet.0: 335827 destinations, 335828 routes (335378 active, 0 holddown, 450 hidden)
192.168.64.0/21 (1 entry, 1 announced)
TSI:
KRT in-kernel 1.9.0.0/16 -> {indirect(342)}
Page 0 idx 1 Type 1 val db31a80
Nexthop: Self
AS path: [69] 10458 14203 2914 4788 4788 I
Communities: 2914:410 2914:2403 2914:3400
Path 1.9.0.0 from 192.168.69.71 Vector len 4. Val: 1
*BGP Preference: 170/-101
Next hop type: Indirect
Next-hop reference count: 1006502
Source: 192.168.69.71
Next hop type: Router, Next hop index: 324
Next hop: 192.168.167.254 via fxp0.0, selected
Protocol next hop: 192.168.69.71
Indirect next hop: 8e166c0 342
State: <Active Ext>
inet.0: 335843 destinations, 335844 routes (335394 active, 0 holddown, 450 hidden)
+ = Active Route, - = Last Active, * = Both
47.0005.80ff.f800.0000.0108.0001.0102.5516.5001/152
*[Direct/0] 25w4d 04:13:21
> via lo0.0
2001:db8::10:255:165:1/128
*[Direct/0] 25w4d 04:13:21
> via lo0.0
fe80::2a0:a5ff:fe12:ad7/128
*[Direct/0] 25w4d 04:13:21
> via lo0.0
*LDP Preference: 9
Next-hop reference count: 3
Next hop: via t1-4/0/0.0, selected
State: <Active Int>
Local AS: 64500
Age: 1d 23:03:58 Metric: 1
Task: LDP
Announcement bits (2): 0-Resolve tree 1 2-Resolve tree 2
AS path: I
...
Description Display the routing information as it was received through a particular neighbor using a
particular dynamic routing protocol.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output.
protocol neighbor-address—Protocol transmitting the route (bgp, dvmrp, msdp, pim, rip,
or ripng) and address of the neighboring router from which the route entry was
received.
Additional Information The output displays the selected routes and the attributes with which they were received,
but does not show the effects of import policy on the routing attributes.
Output Fields Table 42 on page 867 describes the output fields for the show route receive-protocol
command. Output fields are listed in the approximate order in which they appear.
number Number of destinations for which there are routes in the routing table. All levels
destinations
number routes Number of routes in the routing table and total number of routes in the following All levels
states:
• active
• holddown (routes that are in pending state before being declared inactive)
• hidden (routes that are not used because of a routing policy)
MED Multiple exit discriminator value included in the route. none brief
destination-prefix Destination prefix. The entry value is the number of routes for this destination, detail extensive
(entry, announced) and the announced value is the number of routes being announced for this
destination.
Accepted The LongLivedStale flag indicates that the route was marked LLGR-stale by detail extensive
LongLivedStale this router, as part of the operation of LLGR receiver mode. Either this flag or
the LongLivedStaleImport flag may be displayed for a route. Neither of these
flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accepted The LongLivedStaleImport flag indicates that the route was marked LLGR-stale detail extensive
LongLivedStaleImport when it was received from a peer, or by import policy. Either this flag or the
LongLivedStale flag may be displayed for a route. Neither of these flags are
displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale
routes learned from configured neighbors and import into the inet.0 routing
table
ImportAccepted Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale detail extensive
LongLivedStaleImport routes learned from configured neighbors and imported into the inet.0 routing
table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale
when it was received from a peer, or by import policy.
Route Distinguisher 64-bit prefix added to IP subnets to make them unique. detail extensive
Label-Base, range First label in a block of labels and label block size. A remote PE routing device detail extensive
uses this first label when sending traffic toward the advertising PE routing device.
VPN Label Virtual private network (VPN) label. Packets are sent between CE and PE routing detail extensive
devices by advertising VPN labels. VPN labels transit over either an RSVP or an
LDP label-switched path (LSP) tunnel.
Next hop Next hop to the destination. An angle bracket (>) indicates that the route is the All levels
selected route.
Localpref or Lclpref Local preference value included in the route. All levels
AS path Autonomous system (AS) path through which the route was learned. The letters All levels
at the end of the AS path indicate the path origin, providing an indication of the
state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the number that precedes the AS path. This number
represents the number of ASs present in the AS path, when calculated as
defined in RFC 4271. This value is used the AS-path merge process, as defined
in RFC 4893.
• [ ]—If more than one AS number is configured on the router, or if AS path
prepending is configured, brackets enclose the local AS number associated
with the AS path.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the
order does not matter. A set commonly results from route aggregation. The
numbers in each AS set are displayed in ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an
unrecognized attribute and associated hexadecimal value if BGP receives
attribute 128 (attribute set) and you have not configured an independent domain
in any routing instance.
Route Labels Stack of labels carried in the BGP route update. detail extensive
Cluster list (For route reflected output only) Cluster ID sent by the route reflector. detail extensive
Originator ID (For route reflected output only) Address of routing device that originally sent detail extensive
the route to the route reflector.
Communities Community path attribute for the route. See the Output Field table in the show detail extensive
route detail command for all possible values for this field.
AIGP Accumulated interior gateway protocol (AIGP) BGP attribute. detail extensive
Attrset AS Number, local preference, and path of the AS that originated the route. These detail extensive
values are stored in the Attrset attribute at the originating routing device.
mtu Maximum transmission unit (MTU) of the Layer 2 circuit. detail extensive
Sample Output
Accepted
Route Label: 300112
Nexthop: 10.0.0.9
AS path: 13979 7018 I
AIGP: 25
Options brief | detail | extensive | terse—(Optional) Display the specified level of output.
routing-table-name—Display route entries for all routing tables whose names begin with
this string (for example, inet.0 and inet6.0 are both displayed when you run the show
route table inet command).
Output Fields Table 32 on page 724 describes the output fields for the show route table command.
Output fields are listed in the approximate order in which they appear.
Restart complete All protocols have restarted for this routing table.
Restart state:
• Pending:protocol-name—List of protocols that have not yet completed graceful restart for this
routing table.
• Complete—All protocols have restarted for this routing table.
This indicates that OSPF, LDP, and VPN protocols did not restart for the LDP.inet.0 routing table.
• vpls_1.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
This indicates that all protocols have restarted for the vpls_1.l2vpn.0 routing table.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
route-destination Route destination (for example:10.0.0.1/24). The entry value is the number of routes for this destination,
(entry, announced) and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:
• inclusive multicast Ethernet tag route—Type of route destination represented by (for example,
3:100.100.100.10:100::0::10::100.100.100.10/384):
• route distinguisher—(8 octets) Route distinguisher (RD) must be the RD of the EVPN instance
(EVI) that is advertising the NLRI.
• Ethernet tag ID—(4 octets) Identifier of the Ethernet tag. Can set to 0 or to a valid Ethernet tag
value.
• IP address length—(1 octet) Length of IP address in bits.
• originating router’s IP address—(4 or 16 octets) Must set to the provider edge (PE) device’s IP
address. This address should be common for all EVIs on the PE device, and may be the PE device's
loopback address.
label stacking (Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the
label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.
• S=0 route indicates that a packet with an incoming label stack depth of 2 or more exits this routing
device with one fewer label (the label-popping operation is performed).
• If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).
[protocol, preference] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
Level (IS-IS only). In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into smaller areas.
This organization is accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1
systems route within an area. When the destination is outside an area, they route toward a Level 2
system. Level 2 intermediate systems route between areas and toward other ASs.
Next-hop type Type of next hop. For a description of possible values for this field, see Table 35 on page 769.
Flood nexthop Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
branches exceed only a subset of the flood next-hop branches were installed in the kernel.
maximum message
Next hop Network layer address of the directly reachable neighboring system.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
Label operation MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).
Protocol next hop Network layer address of the remote routing device that advertised the prefix. This address is used
to derive a forwarding next hop.
Indirect next hop Index designation used to specify the mapping between protocol next hops, tags, kernel export policy,
and the forwarding next hops.
State State of the route (a route can be in more than one state). See Table 36 on page 771.
Metricn Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
MED-plus-IGP Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.
TTL-Action For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
Announcement bits The number of BGP peers or protocols to which Junos OS has announced this route, followed by the
list of the recipients of the announcement. Junos OS can also announce the route to the kernel routing
table (KRT) for installing the route into the Packet Forwarding Engine, to a resolve tree, a Layer 2 VC,
or even a VPN. For example, n-Resolve inet indicates that the specified route is used for route resolution
for next hops found in the routing table.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• Recorded—The AS path is recorded by the sample process (sampled).
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the number that precedes the AS path. This number represents the number
of ASs present in the AS path, when calculated as defined in RFC 4271. This value is used in the
AS-path merge process, as defined in RFC 4893.
• [ ]—If more than one AS number is configured on the routing device, or if AS path prepending is
configured, brackets enclose the local AS number associated with the AS path.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that the origin of the prefix is not verified against the database. This is because
the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
FECs bound to route Indicates point-to-multipoint root address, multicast source address, and multicast group address
when multipoint LDP (M-LDP) inband signaling is configured.
Primary Upstream When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, indicates the primary
upstream path. MoFRR transmits a multicast join message from a receiver toward a source on a
primary path, while also transmitting a secondary multicast join message from the receiver toward
the source on a backup path.
RPF Nexthops When multipoint LDP with MoFRR is configured, indicates the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.
Label Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.
weight Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.
Prefixes bound to route Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.
Communities Community path attribute for the route. See Table 37 on page 773 for all possible values for this field.
Label-Base, range First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.
status vector Layer 2 VPN and VPLS network layer reachability information (NLRI).
Accepted The LongLivedStale flag indicates that the route was marked LLGR-stale by this router, as part of the
LongLivedStale operation of LLGR receiver mode. Either this flag or the LongLivedStaleImport flag might be displayed
for a route. Neither of these flags is displayed at the same time as the Stale (ordinary GR stale) flag.
Accepted The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
LongLivedStaleImport from a peer, or by import policy. Either this flag or the LongLivedStale flag might be displayed for a
route. Neither of these flags is displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and import into the inet.0 routing table
ImportAccepted Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
LongLivedStaleImport configured neighbors and imported into the inet.0 routing table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy.
Primary Routing Table In a routing table group, the name of the primary routing table in which the route resides.
Secondary Tables In a routing table group, the name of one or more secondary tables in which the route resides.
Table 35 on page 769 describes all possible values for the Next-hop Types output field.
Indirect (indr) Used with applications that have a protocol next hop
address that is remote. You are likely to see this next-hop
type for internal BGP (IBGP) routes when the BGP next
hop is a BGP neighbor that is not directly connected.
Unilist (ulst) List of unicast next hops. A packet sent to this next hop
goes to any next hop in the list.
Table 36 on page 771 describes all possible values for the State output field. A route can
be in more than one state (for example, <Active NoReadvrt Int Ext>).
Value Description
Always Compare MED Path with a lower multiple exit discriminator (MED) is
available.
Cisco Non-deterministic MED Cisco nondeterministic MED is enabled, and a path with a
selection lower MED is available.
Cluster list length Length of cluster list sent by the route reflector.
Ex Exterior route.
IGP metric Path through next hop with lower IGP metric is available.
Inactive reason Flags for this route, which was not selected as best for a
particular destination.
Int Ext BGP route received from an internal BGP peer or a BGP
confederation peer.
Interior > Exterior > Exterior via Direct, static, IGP, or EBGP path is available.
Interior
Value Description
Next hop address Path with lower metric next hop is available.
NotBest Route not chosen because it does not have the lowest MED.
Not Best in its group Incoming BGP AS is not the best of a group (only one AS can
be the best).
Route Metric or MED comparison Route with a lower metric or MED is available.
Unusable path Path is not usable because of one of the following conditions:
Table 37 on page 773 describes the possible values for the Communities output field.
Value Description
area-number 4 bytes, encoding a 32-bit area number. For AS-external routes, the value is 0. A nonzero value
identifies the route as internal to the OSPF domain, and as within the identified area. Area
numbers are relative to a particular OSPF domain.
bandwidth: local AS Link-bandwidth community value used for unequal-cost load balancing. When BGP has
number:link-bandwidth-number several candidate paths available for multipath purposes, it does not perform unequal-cost
load balancing according to the link-bandwidth community unless all candidate paths have
this attribute.
domain-id-vendor Unique configurable number that further identifies the OSPF domain.
options 1 byte. Currently this is only used if the route type is 5 or 7. Setting the least significant bit in
the field indicates that the route carries a type 2 metric.
origin (Used with VPNs) Identifies where the route came from.
ospf-route-type 1 byte, encoded as 1 or 2 for intra-area routes (depending on whether the route came from a
type 1 or a type 2 LSA); 3 for summary routes; 5 for external routes (area number must be0);
7 for NSSA routes; or 129 for sham link endpoint addresses.
route-type-vendor Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x8000. The format is
area-number:ospf-route-type:options.
rte-type Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x0306. The format is
area-number:ospf-route-type:options.
target Defines which VPN the route participates in; target has the format 32-bit IP address:16-bit
number. For example, 10.19.0.0:100.
unknown IANA Incoming IANA codes with a value between 0x1 and 0x7fff. This code of the BGP extended
community attribute is accepted, but it is not recognized.
unknown OSPF vendor Incoming IANA codes with a value above 0x8000. This code of the BGP extended community
community attribute is accepted, but it is not recognized.
evpn-mcast-flags Identifies the value in the multicast flags extended community and whether snooping is
enabled. A value of 0x1 indicates that the route supports IGMP proxy.
Value Description
evpn-l2-info Identifies whether Multihomed Proxy MAC and IP Address Route Advertisement is enabled.
A value of 0x20 indicates that the proxy bit is set. .
Use the show bridge mac-ip-table extensive statement to determine whether the MAC and IP
address route was learned locally or from a PE device.
Sample Output
192.168.24.1:1:4:1/96
*[BGP/170] 01:08:58, localpref 100, from 192.168.24.1
AS path: I
> to 10.0.16.2 via fe-0/0/1.0, label-switched-path am
10.255.71.15:100:10.255.71.17/32
*[BGP/170] 00:03:59, MED 1, localpref 100, from
10.255.71.15
AS path: I
> via so-2/1/0.0, Push 100020, Push 100011(top)
10.255.71.15:200:10.255.71.18/32
*[BGP/170] 00:03:59, MED 1, localpref 100, from
10.255.71.15
AS path: I
> via so-2/1/0.0, Push 100021, Push 100011(top)
6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100
Router ID: 10.255.245.12
Push 182465
Indirect next hop: 86bd210 330
State: <Active Int Ext>
Local AS: 35 Peer AS: 35
Age: 12:19 Metric2: 1
Task: BGP_35.10.255.245.12+179
Announcement bits (1): 0-BGP.0.0.0.0+179
AS path: 30 10458 14203 2914 11853 11853 11853 6496 6496 6496 6496 6496
6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100
show route table bgp.rtarget.0 (When Proxy BGP Route Target Filtering Is Configured)
user@host> show route table bgp.rtarget.o
100:100:100/96
*[RTarget/5] 00:03:14
Type Proxy
for 10.255.165.103
for 10.255.166.124
Local
2:100.100.100.2:100::0::00:26:88:5f:67:b0/304
*[BGP/170] 11:00:05, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
2:100.100.100.2:100::0::00:51:51:51:51:51/304
*[BGP/170] 11:00:05, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
2:100.100.100.3:100::0::00:52:52:52:52:52/304
*[BGP/170] 10:59:58, localpref 100, from 100.100.100.3
AS path: I, validation-state: unverified
> to 100.64.13.3 via ge-2/0/8.0, label-switched-path R0toR2
2:100.100.100.3:100::0::a8:d0:e5:5b:01:c8/304
*[BGP/170] 10:59:58, localpref 100, from 100.100.100.3
AS path: I, validation-state: unverified
> to 100.64.13.3 via ge-2/0/8.0, label-switched-path R0toR2
3:100.100.100.2:100::1000::100.100.100.2/304
*[BGP/170] 11:00:16, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
3:100.100.100.2:100::2000::100.100.100.2/304
*[BGP/170] 11:00:16, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
3:100.100.100.10:100::0::10::100.100.100.10/384
*[EVPN/170] 01:37:09
Indirect
3:100.100.100.2:100::2000::100.100.100.2/304
*[EVPN/170] 01:37:12
Indirect
::10.255.245.195/128
*[LDP/9] 00:00:22, metric 1
> via so-1/0/0.0
::10.255.245.196/128
*[LDP/9] 00:00:08, metric 1
> via so-1/0/0.0, Push 100008
Age: 4
Task: BGP_64500.10.12.99.5+3792
Announcement bits (1): 0-Flow
AS path: 64500 I
Communities: traffic-rate:0:0
Validation state: Accept, Originator: 10.12.99.5
Via: 10.12.44.0/24, Active
Localpref: 100
Router ID: 10.255.71.161
Communities: redirect-to-nexthop
Action(s): accept,count
*Flow Preference: 5
Next hop type: Indirect, Next hop index: 0
Address: 0xa2b931c
Next-hop reference count: 1
Next hop:
State: <Active>
Local AS: 69
Age: 2
Validation State: unverified
Task: RT Flow
Announcement bits (1): 0-Flow
AS path: I
Communities: redirect-to-nexthop
[email protected]> show route table inetflow.0 extensive
inetflow.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
4.4.4.4,*/term:1 (1 entry, 1 announced)
TSI:
KRT in dfwd;
Action(s): accept,count
*BGP Preference: 170/-101
Next hop type: Fictitious, Next hop index: 0
Address: 0xc5e3c30
Next-hop reference count: 3
Next hop: 21.1.4.5
State: <Active Int Ext>
Local AS: 100 Peer AS: 100
Age: 10
Validation State: unverified
Task: BGP_100.1.1.1.1+179
Announcement bits (1): 0-Flow
AS path: I
Communities: redirect-to-nexthop
Accepted
Localpref: 100
Router ID: 1.1.1.1
AS path: [4170512532] I
Communities:
Path PREFIX { Node { AS:4170512532 BGP-LS ID:4170512532 ISO:3245.3412.3456.00 }
{ IPv4:128.220.11.197/32 } ISIS-L1:0 } Vector len 4. Val: 0
*IS-IS Preference: 15
Level: 1
Next hop type: Fictitious, Next hop index: 0
Address: 0x95dfc64
Next-hop reference count: 9
State:<Active NotInstall>
Local AS: 4170512532
Age: 6:05
Validation State: unverified
Task: IS-IS
Announcement bits (1): 0-BGP_RT_Background
AS path: I
Prefix SID: 67, Flags: 0x40, Algo: 0
10.1.1.195:NoCtrlWord:1:1:Local/96
*[L2CKT/7] 00:50:47
> via so-0/1/2.0, Push 100049
via so-0/1/3.0, Push 100049
10.1.1.195:NoCtrlWord:1:1:Remote/96
*[LDP/9] 00:50:14
Discard
10.1.1.195:CtrlWord:1:2:Local/96
*[L2CKT/7] 00:50:47
> via so-0/1/2.0, Push 100049
via so-0/1/3.0, Push 100049
10.1.1.195:CtrlWord:1:2:Remote/96
*[LDP/9] 00:50:14
Discard
LINK { Local { AS:4 BGP-LS ID:100 IPv4:4.4.4.4 }.{ IPv4:4.4.4.4 } Remote { AS:4
BGP-LS ID:100 IPv4:7.7.7.7 }.{ IPv4:7.7.7.7 } Undefined:0 }/1152
*[BGP-LS-EPE/170] 00:20:56
Fictitious
LINK { Local { AS:4 BGP-LS ID:100 IPv4:4.4.4.4 }.{ IPv4:4.4.4.4 IfIndex:339 }
Remote { AS:4 BGP-LS ID:100 IPv4:7.7.7.7 }.{ IPv4:7.7.7.7 } Undefined:0 }/1152
*[BGP-LS-EPE/170] 00:20:56
Fictitious
LINK { Local { AS:4 BGP-LS ID:100 IPv4:4.4.4.4 }.{ IPv4:50.1.1.1 } Remote { AS:4
BGP-LS ID:100 IPv4:5.5.5.5 }.{ IPv4:50.1.1.2 } Undefined:0 }/1152
*[BGP-LS-EPE/170] 00:20:56
Fictitious
Task: Common L2 VC
Announcement bits (2): 0-KRT 2-Common L2 VC
AS path: I
1:1:0:10.255.14.216:232.1.1.1/144
*[MVPN/70] 01:23:05, metric2 1
Indirect
1:1:1:10.255.14.218:232.1.1.1/144
*[BGP/170] 00:57:49, localpref 100, from 10.255.14.218
AS path: I
> via so-0/0/0.0, label-switched-path r0e-to-r1
1:1:2:10.255.14.217:232.1.1.1/144
*[BGP/170] 00:57:49, localpref 100, from 10.255.14.217
AS path: I
> via so-0/0/1.0, label-switched-path r0-to-r2
1:10.255.2.202:65536:10.255.2.202/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.202
AS path: I
> via so-0/1/3.0
1:10.255.2.203:65536:10.255.2.203/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.203
AS path: I
> via so-0/1/0.0
1:10.255.2.204:65536:10.255.2.204/432
*[MVPN/70] 00:57:23, metric2 1
Indirect
5:10.255.2.202:65536:128:::192.168.90.2:128:ffff::1/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.202
AS path: I
> via so-0/1/3.0
6:10.255.2.203:65536:64500:128:::10.12.53.12:128:ffff::1/432
*[PIM/105] 00:02:37
Multicast (IPv6)
7:10.255.2.202:65536:64500:128:::192.168.90.2:128:ffff::1/432
*[MVPN/70] 00:02:37, metric2 1
Indirect
AS path: I
user@host> show route table green.l2vpn.0 (VPLS Multihoming with FEC 129)
10.1.1.2:100:10.1.1.2/96 AD
*[VPLS/170] 1d 03:11:03, metric2 1
Indirect
10.1.1.4:100:10.1.1.4/96 AD
*[BGP/170] 1d 03:11:02, localpref 100, from 10.1.1.4
AS path: I, validation-state: unverified
> via ge-1/2/1.5
10.1.1.2:100:1:0/96 MH
*[VPLS/170] 1d 03:11:03, metric2 1
Indirect
10.1.1.4:100:1:0/96 MH
*[BGP/170] 1d 03:11:02, localpref 100, from 10.1.1.4
AS path: I, validation-state: unverified
> via ge-1/2/1.5
10.1.1.4:NoCtrlWord:5:100:100:10.1.1.2:10.1.1.4/176
*[VPLS/7] 1d 03:11:02, metric2 1
> via ge-1/2/1.5
10.1.1.4:NoCtrlWord:5:100:100:10.1.1.4:10.1.1.2/176
*[LDP/9] 1d 03:11:02
Discard
Nexthop: Self
AS path: [2] I
Communities: target:2:1
Path 10.0.0.0 from 10.3.0.0 Vector len 4. Val: 1
@BGP Preference: 170/-1
Route Distinguisher: 2:1
Next hop type: Indirect
Address: 0x258059e4
Communities: target:2:1
Import Accepted
VPN Label: 16
Localpref: 0
Router ID: 10.3.0.0
Primary Routing Table bgp.l3vpn.0
Composite next hops: 1
Protocol next hop: 10.3.0.0 Metric: 70
Push 16
Composite next hop: 0x93463a0 1048575 INH Session ID:
0x17da
Indirect next hop: 0x91e8800 1048574 INH Session ID:
0x17da
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.1.4.2 via ge-1/0/0.0
Session Id: 0x17d9
10.3.0.0/32 Originating RIB: inet.3
Metric: 70 Node path count: 1
Forwarding nexthops: 1
Nexthop: 10.1.4.2 via ge-1/0/0.0
#Multipath Preference: 255
Next hop type: Indirect
Address: 0x24afca30
Next-hop reference count: 1
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0, selected
Label operation: Push 707633
Label TTL action: prop-ttl
Session Id: 0x17d8
Next hop type: Router, Next hop index: 702
Next hop: 10.1.4.2 via ge-1/0/0.0
Label operation: Push 634278
Label TTL action: prop-ttl
Session Id: 0x17d9
Protocol next hop: 10.2.0.0
Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c Weight 0x1
Forwarding nexthops: 2
Nexthop: 10.92.78.102 via em0.0
Import Accepted
Localpref: 100
Router ID: 10.2.3.4
Secondary Tables: default-switch.evpn.0
Indirect next hops: 1
Protocol next hop: 10.2.3.4 Metric: 1
Indirect next hop: 0x2 no-forward INH Session ID: 0x0
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.10.10.1 via xe-0/0/1.0
Session Id: 0x2
10.2.3.4/32 Originating RIB: inet.0
Metric: 1 Node path count: 1
Forwarding nexthops: 2
Nexthop: 10.92.78.102 via em0.0
The following shows the partial output listing for the EVPN VNI table.
The following shows the output listing for the multicast information used by the rpd and
mcsnoopd.
The following shows a partial output listing for an EVPN instance. This indicates when
Multihomed Proxy MAC and IP Address Route Advertisement is enabled.
NOTE: For BGP routes, the show route terse command displays the local
preference attribute and MED instead of the metric1 and metric2 values. This
is mostly due to historical reasons.
To display the metric1 and metric2 value of a BGP route, use the show route
extensive command.
Output Fields Table 47 on page 919 describes the output fields for the show route terse command. Output
fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
• ?—Not evaluated. Indicates that the route was not learned through BGP.
• I—Invalid. Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• N—Unknown. Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• V—Valid. Indicates that the prefix and autonomous system pair are found in the database.
• A—Aggregate
• B—BGP
• C—CCC
• D—Direct
• G—GMPLS
• I—IS-IS
• L—L2CKT, L2VPN, LDP, Local
• K—Kernel
• M—MPLS, MSDP
• O—OSPF
• P—PIM
• R—RIP, RIPng
• S—Static
• T—Tunnel
Prf Preference value of the route. In every routing metric except for the BGP LocalPref attribute, a lesser
value is preferred. In order to use common comparison routines, Junos OS stores the 1's complement
of the LocalPref value in the Preference2 field. For example, if the LocalPref value for Route 1 is 100,
the Preference2 value is -101. If the LocalPref value for Route 2 is 155, the Preference2 value is -156.
Route 2 is preferred because it has a higher LocalPref value and a lower Preference2 value.
Metric 1 First metric value in the route. For routes learned from BGP, this is the MED metric.
Metric 2 Second metric value in the route. For routes learned from BGP, this is the IGP metric.
Next hop Next hop to the destination. An angle bracket (>) indicates that the route is the selected route.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
Sample Output
Description Display information about authentication keychains configured for the Border Gateway
Protocol (BGP), the Label Distribution Protocol (LDP) routing protocols, the Bidirectional
Forwarding Detection (BFD) protocol, and the Intermediate System-to-Intermediate
System (IS-IS) protocol.
Output Fields Table 12 on page 649 describes the output fields for the show security keychain command.
Output fields are listed in the approximate order in which they appear.
Active-ID Send Number of routing protocols packets sent with the active key. All levels
Active-ID Receive Number of routing protocols packets received with the active key. All levels
Next-ID Send Number of routing protocols packets sent with the next key. All levels
Next-ID Receive Number of routing protocols packets received with the next key. All levels
Transition Amount of time until the current key will be replaced with the next key All levels
in the keychain.
Tolerance Configured clock-skew tolerance, in seconds, for accepting keys for a All levels
key chain.
• receive
• send
• send-receive
For the active key, the State can be send-receive, send, or receive. For
keys that have a future start time, the State is inactive. Compare the
State field to the Mode field.
Option For IS-IS only, the option determines how Junos OS encodes the detail
message authentication code in routing protocol packets.
The default value is basic. When you configure the isis-enhanced option,
Junos OS sends RFC 5310-encoded routing protocol packets and
accepts both RFC 5304-encoded and RFC 5310-encoded routing
protocol packets that are received from other devices.
When you configure basic (or do not include the options statement in
the key configuration) Junos OS sends and receives RFC 5304-encoded
routing protocols packets, and drops 5310-encoded routing protocol
packets that are received from other devices.
Because this setting is for IS-IS only, the TCP and the BFD protocol
ignore the encoding option configured in the key.
• receive
• send
• send-receive
Sample Output
test policy
Description Test a policy configuration to determine which prefixes match routes in the routing table.
NOTE: If you are using the test policy command on a logical system, you must
first set the CLI to the logical system context. For example, if you want to test
a routing policy that is configured on logical system R2, first run the set cli
logical-system R2 command.
Additional Information All prefixes in the default unicast routing table (inet.0) that match prefixes that are the
same as or longer than the specific prefix are processed by the from clause in the specified
policy. All prefixes accepted by the policy are displayed. The test policy command
evaluates a policy differently from the BGP import process. When testing a policy that
contains an interface match condition in the from clause, the test policy command uses
the match condition. In contrast, BGP does not use the interface match condition when
evaluating the policy against routes learned from internal BGP (IBGP) or external BGP
(EGBP) multihop peers.
When testing a policy, you can see the length of time (in microseconds) required to
evaluate the policy and the number of times it has been executed by running the show
policy policy-name statistics command.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or
the show route terse command.
Sample Output
test policy
user@host> test policy test-statics 172.16.0.1/8
traceroute clns
ttl value—CLNP maximum time-to-live value. The range of values is 1 through 255.
wait seconds—Number of seconds to wait for a response. The range of values is 1 second
through 1 day.
Output Fields Table 49 on page 927 describes the output fields for the traceroute clns command. Output
fields are listed in the approximate order in which they appear.
Sample Output
traceroute clns
user@host>traceroute clns <ISO address of the destination> source <ISO address of the source>