IS-IS TroubleShooting Guide Draft
IS-IS TroubleShooting Guide Draft
Customer Engineering
Version: 16
Version 1.0
Document Acceptance
I have reviewed this document and it is approved for use effective from the signing date below.
Revision History
Table of Contents
1 Introduction...............................................................................................................2
2 Topology....................................................................................................................2
4 Summary..................................................................................................................30
1 Introduction
This document is intended to provide for troubleshooting steps to be taken for debugging IS-IS related
issues. This document is supposed to be generic troubleshooting guide, for specific feature related
information other resources should be considered.
2 Topology
Common IS-IS routing problems fall under the following two broad categories:
In Intermediate System-to-Intermediate System (IS-IS) Protocol, there are two types of networks: point-to-
point and broadcast. Unlike Open Shortest Path First (OSPF) Protocol, IS-IS does not have other network
types like non-broadcast and point-to-multipoint. For each type of network, a different type of IS-IS Hello
(IIH) packet is exchanged to establish adjacency. On point-to-point networks, point-to-point IIHs are
exchanged; and on broadcast networks (such as LAN), Level 1 or Level 2 LAN IIHs are exchanged.
During normal operation, IS-IS routers form and maintain adjacencies with each other by using hello
packets. Routing information is then exchanged by flooding LSPs, which are stored in appropriate Link-
State databases (Level 1 or Level 2). Sequence number packets (CSNPs and PSNPs) provide control for
the flooding process and ensure database synchronization. All these processes need to occur
successfully to ensure accurate dissemination of routing information in the IS-IS domain. Any failures
Adjacency formation problems are common IS-IS failures. They mainly occur as a result of router
misconfiguration, hardware and software failures, and interoperability problems between routers from
different vendors. Adjacency problems are easier to isolate than routing problems. The following list of
adjacency problems are discussed in this section:
Misconfigured NSAPs
Mismatch Authentication
The default mode of operation for SmartEdge routers running IS-IS is Level 1-2. In this mode, a router
can form both Level 1 and Level 2 adjacencies with neighbors in the same area and form only Level 2
adjacencies with neighbors in different areas. Below topology diagrams such a configuration. R2 forms
only a L2 adjacency with R3, which is in area 49.0002. The default Level 1-2 mode can be modified for all
interfaces on the router by using the router isis configuration-level command IS-type or for a specific
interface with the interface-level configuration command circuit-type level [level-1 | level-2]. If R2 is
misconfigured as a Level 1 only on 9/2 using any of the previously mentioned commands, it loses the
adjacency with R3. Consequently, the domain will be partitioned and there will be no communication
between area 49.0001 and area 49.0002.
Current configuration:
context local
!
router isis csc
net 49.0001.0000.0000.0001.00 >>>>>>>>>>>>>> by default, SE use L1-L2
address-family ipv4 unicast
!
interface 9/2
! bind to ethernet 9/2
circuit type level-1
address-family ipv4 unicast
!
Current configuration:
context local
!
router isis csc
net 49.0002.0000.0000.0002.00 >>>>>>>>>>>>>> by default, SE use L1-L2
address-family ipv4 unicast
!
interface 10/10
! bind to ethernet 10/10 >>>>>>>>>>>>>>>> by default, SE use L1-L2
address-family ipv4 unicast
!
interface loBB
address-family ipv4 unicast
!
end
[local]R3.16.121#
[local]R2.17.145(config)#context local
[local]R2.17.145(config-ctx)#router isis csc
[local]R2.17.145(config-isis)#interface 9/2
[local]R2.17.145(config-isis-if)#circuit type level-2-only
[local]R2.17.145(config-isis-if)#end
[local]R2.17.145#sh isis adjacency
Each IS-IS node must have at least one NSAP address (NET) to identify it as a network node. This NET
consists of the area ID of the node, the System ID, and a 0-value NSEL. The system ID is required to be
unique within the area; the NSEL value is fixed at 0x00. The area ID (also referred to as the area prefix)
must be the same for all nodes in the same area. For nodes with multiple NETs, the system ID must be
the same in all of them, and at least one of the area prefixes must be shared with another node in the
same area. The effect of misconfiguring a NET is illustrated in below. In this example, R2, R3, and R4 are
meant to be together in area 49.0001. They are also meant to form both Level 1 and Level 2
adjacencies.
The outputs of the show isis adjacency command from R2, R3, and R4 indicate R4 formed only Level 2
adjacencies with R2 and R3. However, R2 and R3 formed Level 1-2 adjacencies with each other as
expected. This creates a suspicion about the configuration and operation of R4.
Further inspection of the NET configured on R4 shows that it was misconfigured with
47.1000.0000.0000.0003.00 00 rather than 49.1000.0000.0000.0003.00. This area ID mismatch resulted
in R2 and R3 forming only Level 2 adjacencies with R4.
[local2]R2.17.145#
[local2]R2.17.145#terminal monitor
[local2]R2.17.145#debug isis adjacency interface 12/5
[local2]R2.17.145#Feb 3 16:03:22: [0004]: %ISIS-7-ADJ: send L2 LAN IIH on intf
12/5
Feb 3 16:03:26: [0004]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8800.2b40 seq
321 on intf 12/5
Feb 3 16:03:27: [0004]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8800.2b40 seq
316 on intf 12/5
Feb 3 16:03:27: [0004]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8800.3345 seq
213 on intf 12/5
Feb 3 16:03:30: [0004]: %ISIS-7-ADJ: send L1 LAN IIH on intf 12/5
Feb 3 16:03:31: [0004]: %ISIS-7-ADJ: send L2 LAN IIH on intf 12/5
Feb 3 16:03:31: [0004]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8800.3345 seq
211 on intf 12/5
Feb 3 16:03:31: [0004]: %ISIS-7-ADJ: rcvd L1 LAN IIH with area mismatch from
0030.8800.3345 on intf 12/5
Feb 3 16:03:35: [0004]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8800.2b40 seq
322 on intf 12/5
Feb 3 16:03:35: [0004]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8800.3345 seq
214 on intf 12/5
All IS-IS nodes in an area must have the same area prefix and a unique system ID. If a node has multiple
NETs configured, each address must retain the same system ID. This is a critical protocol requirement,
especially because the system ID forms part of the LSPID, and uniqueness is required to identify the
owners of LSPs flooded within the area. When different nodes in the area are erroneously configured with
the same system ID, the problem is detected and each node logs appropriate error messages to that
effect. If the nodes are directly connected, each router immediately detects the problem as it exchanges
hellos to establish adjacency. Consequently, the adjacency fails. If they are not directly connected,
however, they overwrite each other's LSP for some time until the IS-IS process determines, based on the
frequency of occurrence, that the problem is because of duplicate system IDs and logs appropriate error
messages. Below shows the output of the debug isis adjacency command for a duplicate system ID
situation between directly connected neighbors within same broadcast domain that was mis-configured as
duplicate System IDs in same area.
Feb 3 16:01:53: [0008]: %ISIS-7-ADJ: rcvd LAN L1 IIH duplicate system ID from
0030.8810.49a0 on intf 14/5
Feb 3 16:01:55: [0008]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8810.49a0 seq
351 on intf 14/5
Feb 3 16:01:55: [0008]: %ISIS-7-ADJ: rcvd LAN L2 IIH duplicate system ID from
0030.8810.49a0 on intf 14/5
Feb 3 16:02:00: [0008]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8800.2b40 seq
354 on intf 14/5
Feb 3 16:02:01: [0008]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8800.2b40 seq
348 on intf 14/5
Feb 3 16:02:03: [0008]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8810.49a0 seq
352 on intf 14/5
Feb 3 16:02:03: [0008]: %ISIS-7-ADJ: rcvd LAN L2 IIH duplicate system ID from
0030.8810.49a0 on intf 14/5
Feb 3 16:02:03: [0008]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8810.49a0 seq
357 on intf 14/5
Feb 3 16:02:03: [0008]: %ISIS-7-ADJ: rcvd LAN L1 IIH duplicate system ID from
0030.8810.49a0 on intf 14/5
Originally, the IS-IS protocol relied on only IS-IS hellos to form and maintain adjacencies, using a three-
way handshake on broadcast links and a two-way handshake on point-to-point links, all independent of
the IP configuration. The increasing popularity of IS-IS for routing IP has promoted various enhancements
both within the IETF and in vendor-specific implementations through feature introductions.
The effect of IP address misconfiguration is illustrated in the following debugging and show command
output. In Example below the IP address of R3’s interface 10/10is changed to 201.1.1.2/24. This
erroneous entry causes adjacency to be invalidated at R3 and logging of an adjacency change message.
The debugging output shown in below includes an error, “rcvd L2 LAN IIH with no common IP subnets fro
m 0030.8810.10fd on intf 10/10”
[local]R3.16.121#config
Enter configuration commands, one per line, 'end' to exit
[local]R3.16.121(config)#context local
[local]R3.16.121(config-ctx)#int 10/10
[local]R3.16.121(config-if)#no ip address
[local]R3.16.121(config-if)# ip address 201.1.1.2/24
[local]R3.16.121(config-if)#commit
Transaction committed.
[local]R3.16.121(config-if)#end
[local]R3.16.121#terminal monitor
IS-IS specifications (ISO 10589 [1] and RFC 1195 [2]) provide a simple password scheme for
authentication.
When authentication is configured, a clear-text password is inserted into IS-IS packets, such as LSPs,
CSNPs, and PSNPs, as are also hellos (link authentication only). The password is verified before a
packet is accepted for processing. Clearly, a password mismatch between the source of the packet and
the recipient could create both adjacency and routing maintenance problems, depending on the type of
authentication enabled. Output below shows a debug isis adj output for a link authentication failure.
Configures Intermediate System-to-Intermediate System (IS-IS) routing packet authentication using the
simple or Hash-Based Message Authentication Code-Message Digest 5 (HMAC-MD5) authentication
scheme for the IS-IS interface or IS-IS instance.
Use the authentication command in IS-IS interface configuration mode to configure IS-IS routing packet
authentication using the simple or HMAC-MD5 authentication scheme for an IS-IS interface.
Use the authentication command in IS-IS router configuration mode to configure IS-IS routing packet
authentication using the simple or HMAC-MD5 authentication scheme for an IS-IS instance. To use a
different key for a specific interface, use the authentication command in IS-IS interface configuration
mode.
The following example demonstrates adjacency cannot be established between R2 and R3. R2
configured with IS-IS authentication and R3 without authentication.
Current configuration:
context local
!
router isis csc
net 49.0001.0000.0000.0001.00
authentication key-chain jyu type simple
address-family ipv4 unicast
!
interface 9/2
! bind to ethernet 9/2
hello padding never
address-family ipv4 unicast
!
interface loBB
passive-interface
address-family ipv4 unicast
!
End
[local]R2.17.145#terminal monitor
[local]R2.17.145#debug isis adjacency
[local]R2.17.145#Feb 2 12:23:10: [0001]: %ISIS-7-ADJ: send L2 LAN IIH on intf
9/2
Feb 2 12:23:11: [0001]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8802.1f44 seq
25878 on intf 9/2
Feb 2 12:23:11: [0001]: %ISIS-7-ADJ: authentication failed on rcvd L2 LAN IIH
from 0030.8802.1f44 on interface 9/2
Feb 2 12:23:15: [0001]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8802.1f44 seq
25877 on intf 9/2
Feb 2 12:23:15: [0001]: %ISIS-7-ADJ: authentication failed on rcvd L1 LAN IIH
from 0030.8802.1f44 on interface 9/2
Created by: Jerry Yu on: 05/02/2009 Page 19 of 34
Updated by: jerryyu on: 2/4/2009 08:09:00 PM /conversion/tmp/activity_task_scratch/647234987.doc
Copyright 2009 Redback Networks Inc. All rights reserved.
Proprietary and Confidential.
No part of this publication may be used or reproduced in any form by any means without prior written permission from Redback Networks Inc.
IS-IS Troubleshooting Guide
CE-TG-0007 1.1
Feb 2 12:23:16: [0001]: %ISIS-7-ADJ: send L1 LAN IIH on intf 9/2
Feb 2 12:23:19: [0001]: %ISIS-7-ADJ: send L2 LAN IIH on intf 9/2
Feb 2 12:23:22: [0001]: %ISIS-7-ADJ: rcvd L2 LAN IIH from 0030.8802.1f44 seq
25879 on intf 9/2
Feb 2 12:23:22: [0001]: %ISIS-7-ADJ: authentication failed on rcvd L2 LAN IIH
from 0030.8802.1f44 on interface 9/2
Feb 2 12:23:23: [0001]: %ISIS-7-ADJ: rcvd L1 LAN IIH from 0030.8802.1f44 seq
25878 on intf 9/2
Feb 2 12:23:23: [0001]: %ISIS-7-ADJ: authentication failed on rcvd L1 LAN IIH
from 0030.8802.1f44 on interface 9/2
Feb 2 12:23:24: [0001]: %ISIS-7-ADJ: send L1 LAN IIH on intf 9/2
Current configuration:
context local
!
This section focuses on route maintenance problems. The adjacency formation problems discussed in the
preceding section are much easier to troubleshoot and resolve than router maintenance problems, which
are normally not obvious in very large networks until a specific address or subnet becomes unreachable.
Obviously, most IS-IS problems relate to adjacency problems. When no adjacency issues exist, it
becomes challenging to isolate routing problems; however, the routing table might be fed with routing
information from multiple sources. Most routers connected to the Internet are configured with two IP
routing protocols, typically BGP for inter-domain routing and IS-IS or OSPF for intra-domain routing.
Frequently in these situations, little overlap occurs in prefixes advertised by each protocol, so there is
practically no contention in populating the routing table.
Even though very rare, route maintenance problems might relate to problems in the lookup mechanism
rather than the actual source of the route. This section focuses on only IS-IS-related causes. The
Created by: Jerry Yu on: 05/02/2009 Page 21 of 34
Updated by: jerryyu on: 2/4/2009 08:09:00 PM /conversion/tmp/activity_task_scratch/647234987.doc
Copyright 2009 Redback Networks Inc. All rights reserved.
Proprietary and Confidential.
No part of this publication may be used or reproduced in any form by any means without prior written permission from Redback Networks Inc.
IS-IS Troubleshooting Guide
CE-TG-0007 1.1
following are the most common causes of routing inconsistencies in IS-IS and are discussed in detail in
the following sections:
Route flaps
If a route is not being heard in the rest of the area or domain, the first step in troubleshooting the problem
is to make sure the procedure for introducing the route into the IS-IS process has been properly
configured.
If the first method is used, the ip router isis command must be applied to the appropriate interface. Note
that IS-IS does not use a network statement for advertising an IP route as is commonly done for other
protocols. Instead, enabling IS-IS on an interface triggers the formation of adjacencies on that interface
and also advertises the attached IP subnet in an LSP to all neighbors. The show ip interface brief
command confirms the interface on which the route is connected, followed by a show isis interface
command. The actual configuration of the interface can also be verified with the command show
running-config | begin interface <type and number>, as shown in Example 10-38.
If the interface is properly configured, the next step might be to take a look at the IP reachability
information fields of the router's LSP with the command show isis database level detail LSPID. This
command provides insight into the information in the LSP that is advertised to other neighbors. It is
assumed that there are no adjacency problems with any of the neighbors in the direction of the network
where the route is missing. The level-1 keyword is used if the route is missing in only the local area, and
the level-2 keyword is used if the route is not present in other areas within the same domain. If no
adjacency problems exist, IS-IS routing is enabled correctly on the interface where the route should be
taken from, and the prefix is seen in the LSP of the local router; then the problem is complex and requires
more insight. The show isis database level detail LSPID command should be used on the remote
routers to check the presence and currency of the LSP in question. The debug isis update-packet
command assists with debugging any issues with periodic database synchronization on LANs. Note that
synchronization issues are absent on point-to-point links because of the reliable flooding process used on
such links.
The passive-interface command is normally used when the subnet on an interface needs to be
advertised without forming adjacency or sending redundant hello messages over that interface. For
example, a loopback interface is normally defined as a passive interface so that its address will be
advertised without wasting CPU cycles to generate unnecessary hellos to nonexistent neighbors. If a
loopback address is not advertised, the configuration should be checked to make sure it is specified as a
passive interface.
Current configuration:
context local
!
router isis csc
net 49.0001.0000.0000.0001.00
address-family ipv4 unicast
!
interface 9/2
! bind to ethernet 9/2
hello padding never
address-family ipv4 unicast
!
interface loBB
passive-interface
address-family ipv4 unicast
!
end
[local]R2.17.145#sh isis in
[local]R2.17.145#sh isis interfaces
IS-IS interface(s) for tag csc:
Interface L MT Stat Level-1-DR Level-2-DR Metric
9/2 3 U Up R2.17.145.01 R2.17.145.01 10
loBB 3 U Up 1
Route installation problems involve situations where an LSP from a remote router is properly received, but
a route in the LSP is not installed in the routing table as expected. IS-IS does not have any complicated
schemes for installing routes that are determined by the SPF process to be the best path. For example,
OSPF external link-state advertisements have a forwarding address when non-zero has to be learned
through OSPF for a routing bit that controls insertion into the routing table to be set appropriately. IS-IS
has no concept of a routing bit. The most plausible reason why an IS-IS route should not make it into the
routing table is because there is a similar route from another routing source with a better administrative
distance than IS-IS. Route installation problems are rare in IS-IS, and when they do occur, the reason is
most certainly a software failure or an interoperability issue.
You can use the following commands to isolate route installation problems:
If a route is not in the routing table as expected, the show isis database command specifying the routing
level, the LSPID of the source LSP, and the detail keyword should be used to probe further into the
contents of the LSP.
Route instability means that the route is available only intermittently. This is usually described as a route
flap. Route flap might result just from an unstable link or possibly because of a more complex underlying
condition, such as an intermittent routing loop.
Typically, at the point where the flap is seen, the LSP that contains the route is periodically advertised and
withdrawn, or newer versions are continuously being received. Route flaps can also have a devastating
effect on the routing environment if a large number of LSPs and routers are affected. This might cause
the SPF process to run for prolonged periods, resulting in potentially dangerous levels of CPU utilization
on the affected routers.
If the network changes affect only IP prefixes, only partial route calculation (PRC) might be performed by
the IS-IS SPF process. Other situations might require scheduling of a "full" SPF. The latter is more CPU-
intensive.
Created by: Jerry Yu on: 05/02/2009 Page 27 of 34
Updated by: jerryyu on: 2/4/2009 08:09:00 PM /conversion/tmp/activity_task_scratch/647234987.doc
Copyright 2009 Redback Networks Inc. All rights reserved.
Proprietary and Confidential.
No part of this publication may be used or reproduced in any form by any means without prior written permission from Redback Networks Inc.
IS-IS Troubleshooting Guide
CE-TG-0007 1.1
By far, the most common causes of route flaps are unstable links. In a large network, the display-route-
detail command discussed in the preceding section can determine the LSP associated with the unstable
route . The focus of problem isolation can then be placed on the source of the LSP.
In most cases, a route flap problem can be quickly confirmed by looking at the sequence numbers of
LSPs in the same link state database. The show isis database output features a far higher sequence
number for the LSP with ID R2 than for the other known LSPs. The huge discrepancy signals either
problems at the source or somewhere in between the source and the point of observation. If the source
and the router at which the problem is being observed are directly connected, you can use standard
procedures to troubleshoot the physical and data link layers. The show interface or show isis interface
command can provide link status information and some leads might be available in the logs. Because the
problem might be adjacency related, the debug isis adj-packet debugging option can be enabled to
observe the problem further. At the source of the LSP, the debug isis spf-log command provides
information regarding events affecting the locally sourced LSP and, therefore, some clues to the problem.
IS-IS requires the Level 2 backbone that interconnects the various areas to be contiguous. This condition
can easily be violated by bad network design or router misconfiguration, as shown in below. SmartEdge
routers function as Level 1-2 by default and caution should be exercised in turning off Level 2 routing until
the impact is well understood. The Level 1-only router in area 49.0002 disrupts the continuity of the Level
2 path, preventing areas 49.0001 and 49.0003 from reaching each other.
The most complicated routing maintenance problems involve redistribution. Redistribution of static routes
is manageable and related problems are easy to troubleshoot.
Problems that relate to redistribution of a dynamically learned route are far more complicated. This is
primarily because no inherent loop-prevention mechanisms are associated with route redistribution. The
safest way to redistribute routes without establishing loops and route feedback is to limit the points where
redistribution occurs. When problems occur in such situations, it is best to troubleshoot at the points of
redistribution (border routers). Redistributed IP routes are entered as externals into the LSP. The show
isis database level detail LSPID command can be used to inspect the LSPs of the border routers to
ensure the external reachability information reaches the LSPs correctly. When the IS-IS domain has
multiple points of redistribution, more than one LSP can introduce the external routes into the IS-IS
domain, requiring care to be taken so that the border routers do not point to each other as the best exit
from the domain to the external destinations.
The router-level display-route-detail command provides knowledge about which LSPs are responsible for
specific routes in the routing table. This is a useful tool for troubleshooting routing problems and tracking
where the entries in the routing table originate from. Figure 10-8 demonstrates the operation of this
command, and the command output is shown in Example 10-39. A partial configuration of RT1 and the
output of the show ip route isis command executed on RT1 are included in Example 10-39. Also shown is
a show isis database command from the same router. Each IS-IS entry in the routing table of RT1
indicates the number of the LSP from which it came. The LSP numbers are shown in brackets in the show
isis database output. For example, 10.1.2.0/24 is learned from LSP number 4, which is RT2.00-00. The
display-route-detail command also displays backup paths for routes, which are alternative, less-
preferred paths. The following backup entry is provided for this route:
Created by: Jerry Yu on: 05/02/2009 Page 29 of 34
Updated by: jerryyu on: 2/4/2009 08:09:00 PM /conversion/tmp/activity_task_scratch/647234987.doc
Copyright 2009 Redback Networks Inc. All rights reserved.
Proprietary and Confidential.
No part of this publication may be used or reproduced in any form by any means without prior written permission from Redback Networks Inc.
IS-IS Troubleshooting Guide
CE-TG-0007 1.1
[local]R3.16.121(config)#context local
[local]R3.16.121(config-ctx)#router isis csc
[local]R3.16.121(config-isis)#address-family ipv4 unicast
[local]R3.16.121(config-isis-af)#redistribute connected
Created by: Jerry Yu on: 05/02/2009 Page 30 of 34
Updated by: jerryyu on: 2/4/2009 08:09:00 PM /conversion/tmp/activity_task_scratch/647234987.doc
Copyright 2009 Redback Networks Inc. All rights reserved.
Proprietary and Confidential.
No part of this publication may be used or reproduced in any form by any means without prior written permission from Redback Networks Inc.
IS-IS Troubleshooting Guide
CE-TG-0007 1.1
[local]R3.16.121(config-isis-af)#end
[local]R3.16.121#
Frequently, network operators attempt to summarize routing information by representing a set of routes
with one or a fewer number of prefixes than in the original set. This is good practice and helps save on
system resources, such as memory and network bandwidth. If many smaller prefixes are summarized into
one prefix, less space is required in the LSP to advertise those prefixes, and, therefore, less bandwidth is
needed to flood the smaller LSP throughout the area. When routes are summarized, they might become
part of an aggregate. Therefore, troubleshooting missing routes in such environments should involve
checking whether they are represented accurately by the summaries as intended.
Enable the generation of IS-IS LSP debug messages. debug isis lsp-packets
Enable the generation of debug messages for events relating to interaction debug isis routes
between the
Routing Information Base (RIB) and IS-IS.
Enable the generation of debug messages related to IS-IS complete debug isis snp-packets
sequence number
protocol data units (CSNPs) and partial sequence number protocol data units
(PSNPs).
Enable the generation of debug messages for events related to SPF debug isis spf-events
computation within IS-IS.
Enable the generation of debug messages for events related to the causes debug isis spf-triggers
of triggered SPF
runs within IS-IS.
Display information about the IS-IS link-state database. show isis database
Display IS-IS protocol summary information. show isis protocol-
summary
Display IS-IS routes. show isis routes
Display a history of the IS-IS SPF calculation results. show isis spf-log
Display information about IS-IS IP summary addresses show isis summary-
address
Display IS-IS topology information. show isis topology
4 Summary
The network engineer should have a good understanding of the concepts behind a network protocol and
be able to apply that knowledge in troubleshooting scenarios, logical and practical, in the real world. This
guideline document focuses on troubleshooting IS-IS routing problems. The material presented
categorizes IS-IS failures into two main groups: adjacency problems and route maintenance problems.
The discussion about troubleshooting tools, such as show commands and debug commands, show you
how to review specific problems and examples. The various command and debug output examples
Created by: Jerry Yu on: 05/02/2009 Page 33 of 34
Updated by: jerryyu on: 2/4/2009 08:09:00 PM /conversion/tmp/activity_task_scratch/647234987.doc
Copyright 2009 Redback Networks Inc. All rights reserved.
Proprietary and Confidential.
No part of this publication may be used or reproduced in any form by any means without prior written permission from Redback Networks Inc.
IS-IS Troubleshooting Guide
CE-TG-0007 1.1
enable you to build up expertise in troubleshooting IS-IS routing problems and also serve as an excellent
reference source.