Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
56 views
20 pages
IS-IS Route Leaking
Uploaded by
Abhishek garg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save IS-IS Route Leaking For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
56 views
20 pages
IS-IS Route Leaking
Uploaded by
Abhishek garg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save IS-IS Route Leaking For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save IS-IS Route Leaking For Later
You are on page 1
/ 20
Search
Fullscreen
1910512028, 2328 ISIS Route Leaking Search Q © IS-IS Route Leaking ISAS routers in a level 1 area only know the prefixes in their own area. If they want to reach something in another area, they have to use a default route to a level 1-2 router. If there are multiple level 1-2 routers, then IS-IS picks the closest level 1-2 router to exit the area. This sometimes causes sub-optimal routing, We can deal with this by leaking prefixes from level 2 into level 1 Alevel 1-2 router has access to the local area and also knows all prefixes because of its level 2 database, We can redistribute one or more prefixes from level 2 into the local area so that level 1 routers can select the most optimal path in the network. This is best explained with an example, so in this lesson, I'll show you what route leaking is and © solves sub-optimal routing, This is the topology we will use: hitpstnetworklessons.comfie-isliee-route-leaking 1201910812029, 2328 ISIS Route Leaking a 192.168.12.0/24 2 0/1 i0/1 wt ae 138 ee Ei 3 8 B a Area 1234 ; B \rea 8 a8 28 38 ge 3 65 m2 Lt2 Li-L2 a ee 388 488 a ras B S | 2 5 & 3 =o = se sg SES 788 192.168.56.0/24 192.168.67.0/24 U-12 Gi0/2——Gi0 1. 10/2 ——i0/2 © crriem 5 6 6 7) FC ‘2 L112 738 a 8 Area 5678 | y sg age rt 3| 3 u 3 3 We have a bunch of IS-IS routers. R8 has a loopback interface that we will try to reach from R1. All interfaces are Gigabit Ethernet with the default metric of 10. Configurations Want to take a look for yourself? Here you will find the startup configuration of each device hps:inetworklessons.comis-iti-is-route-leaking1910512028, 2328 ISIS Route Leaking hostname R1. ! ip cef 1 interface Gigabitethernet®/1 ip address 192.168.12.1 255.255.255.0 ip router isis ! interface Gigabitetherneto/2 ip address 192.168.13.1 255.255.255.0 ip router isis ! router isis net 49.1234.000.0000.0001.00 Log-adjacency-changes ! end R2 hostname R2 ip cef interface Gigabitethernet@/1 ip address 192.168.12.2 255.255.255.0 ip router isis ' interface Gigabitethernet@/2 ip address 192.168.24.2 255.255.255.0 ip router isis router isis net 49.1234.0000.0000.0002.00 is-type level-1 log-adjacency-changes hitpstnetworklessons.comie-isliee-route-leaking 3201910512028, 2328 ISIS Route Leaking R3 hostname R3 ' ip cef ' interface Gigabitetherneto/1 ip address 192.168.13.3 255.255.255.0 ip router isis ' interface Gigabitetherneto/2 ip address 192.168.35.3 255.255.255.0 ip router isis ' router isis net 49.1234.0080.0000.0003.00 log-adjacency-changes ! end R4 hostname Ra ! ip cef ! interface Gigabitetherneto/1 ip address 192.168.24.4 255.255.255.0 ip router isis ! interface Gigabitetherneto/2 ip address 192.168.47.4 255.255.2550 ip router isis ! router isis net 49.1234.0000.0000.0004.00 hitpstnetworklessons.comie-isliee-route-leaking 41201910512028, 2328 ISIS Route Leaking end RS hostname RS ! ip cef ' interface Gigabitethernet@/1 ip address 192.168.35.5 255.255.255.0 ip router isis interface Gigabitethernet®/2 ip address 192.168.56.5 255.255.255.0 ip router isis ' router isis net 49.5678 .0000.0000.0005.00 Log-adjacency-changes end R6é hostname R6 ip cef interface Gigabitethernet@/1 ip address 192.168.56.6 255.255.255.0 ip router isis interface Gigabitetherneto/2 ip address 192.168.67.6 255.255.255.0 ip router isis router isis hitpstnetworklessons.comie-isliee-route-leaking 5201910512028, 2328 ISIS Route Leaking end R7 ~ hostname R7 ' ip cef ! interface Gigabitetherneto/1 ip address 192.168.47.7 255.255.2550 ip router isis ' interface Gigabitetherneto/2 ip address 192.168.67.7 255.255.255.0 ip router isis ' interface Gigabitetherneto/3 @ ip address 192.168.78.7 255.255.255.0 ip router isis ' router isis net 49.5678 .2000.0000.0007.00 log-adjacency-changes ! end R8 ~ hostname RB ! ip cef ! interface Loopback@ ip address 8.8.8.8 255.255.255.255 ip router isis ! hitpstnetworklessons.comie-isliee-route-leaking 6201910512028, 2328 a ip router isis router isis net 49.5678 .0000.0000.0008.00 is-type level-1 log-adjacency-changes ! end Let's take a look at the routing table of R1 Ristshow ip route isis SL1 @.0.0.0/@ [115/10] via 192.168.13.3, 4 LL 192,168.24.0/24 [115/20] via 192.168. ALL 192,168.35.0/24 [115/20] via 192.168. ALL 192,168.47.0/24 [115/30] via 192.168. R3 is the closest level 1-2 router for R1 so R1 generates a default route to R3. When we try to reach 8.8.8.8, this is the path we use: Ritraceroute 8.8.8.8 Type escape sequence to abort. Tracing the route to 8.8.8.8 VRF info: (vrf in name/id, vrf out name/id) 1 192,168.13.3 5 msec 18 msec 5 msec 2 192.168.35.5 7 msec 11 msec 7 msec 3 192.168.56.6 11 msec 13 msec 16 msec 4 192.168.67.7 11 msec 16 msec 11 msec 5 192.168.78.8 12 msec 10 msec * Ri uses R3 to get to 8.8.8.8. This makes sense since R3 is the closest level 1-2 router.To reach any network: outside of area 1234, R1 will use the default route from R3. Its not the shortest path however since R6 is in between RS and R’ hitpstnetworklessons.comfie-isliee-route-leaking ISIS Route Leaking 00:04: 12.2, 13.3, -12.2, ) @1, Gigabitetherneto/2 00:04:21, Gigabitethernet@/1 00:04:11, Gigabitetherneto/2 00:04:11, Gigabitetherneto/1 7201910812029, 2328 ISIS Route Leaking 192.168.12.0/24 2 0/1: Area 1234 0/1 ——
uy 1943 Lm1KA VoMaIN KOUTeINg LnTormation Exchange ProtocoL ¥ ISO 19589 ISIS Link State Protocol Data Unit PDU length: 98 Remaining lifetime: 1199 LSP-1D: @800.¢000.0004.00-00 Sequence number: @x90009005 Checksum: axcada [correct] [Checksum Status: Good] Type block(@xeb): Partition Repair:e, attached bits:1, overload bit:e, Ts type: Area address(es) (t=1, 1=a) Protocols supported (t=129, 1=1) Hostname (t=137, 1-2) Is Reachability (t-2, 1-12) IP Interface address(es) (t=132, 1-4) ¥ IP Internal reachability (t=128, 1-36) Type: 128 Length: 36 Ipv4 prefi v apva prefi: 192.168.24.0/24 192.168.47.0/24 +400 1010 = Default Metric: 10 Default Metric TE: Internal Delay Metric: @ © belay Metric: Not supported Delay Metric: Internal Expense Metric: @ Expense Metric: Not Supported Expense Metric: Internal Error Metric: @ Error Metric: Not Supported Error Metric: Internal 8.8.8,8/32 ++01 1110 = Default Metric: 30 Default Metric II Internal Delay Metric: @ Delay Metric: Not Supported Delay Metric: Internal Expense Metric: @ Expense metric: Not supported Expense metric: Internal Error Metric: @ = Error Metric: Not Supported = Error Metric: Internal hps:inetworklessons.comis-ii-ie-route-leaking 121201910512028, 2328 ISIS Route Leaking a back into the level 2 database. Want to take a look for yourself? Here you wil find the final configuration of each device, R1 ~ hostnane Rt 1 tp cet 1 interface Gigabitethernet0/t kp address 192.168.12.1 255.255.255.0 ip router isis 1 interface Gigabitethernet/2 ip address 192.168.13.1 255.255.255.0 © ip router isis 1 router isis net 49.1734.0000.0000.0001.00 is-type level-1 Joe-adjaceney-changes end R2 ~ hostname R2 ! ip cef interface Gigabitetherneto/1 ip address 192.168.12.2 255.255.255.0 ip router isis hitpstnetworklessons.comie-isliee-route-leaking 131201910512028, 2328 ISIS Route Leaking a ip address 192.168.24.2 255.255.255.0 ip router isis ! router isis net 49.1234, 0000 .0000.002.00 is-type level-1 og-adjacency-changes end R3 hostname R3 ! ip cef ' interface Gigabitetherneto/1 ip address 192.168.13.3 255.255.255.0 ip router isis interface Gigabitethernet®/2 ip address 192.168.35.3 255.255.255.0 ip router isis ! router isis net 49.1234.000.0000.0003.00 log-adjacency-changes end R4 hostname Ra ip cef interface Gigabittthernet@/1 hitpstnetworklessons.comie-isliee-route-leaking 41201910512028, 2328 ISIS Route Leaking a ! interface Gigabitetherneto/2 ip address 192.168.47.4 255.255.255.0 ip router isis ! router isis net 49.1234,0000.0000.0004.00 og-adjacency-changes redistribute isis ip level-2 into level-1 route-map ROUTE_LEAKING ip access-list extended RB_L permit ip host 8.8.8.8 any ! route-map ROUTE_LEAKING permit 10 match ip address R8_L@ end RS hostname RS ! ip cef ! interface Gigabitethernet@/1 ip address 192.168.35.5 255.255.255.0 ip router isis interface Gigabitethernet®/2 ip address 192.168.56.5 255.255.255.0 ip router isis ' router isis net 49.5678 .2000.0000.0005.00 Log-adjacency-changes end hitpstnetworklessons.comfie-isliee-route-leaking 16:201910512028, 2328 ISIS Route Leaking hostname R6 ! ip cef 1 interface Gigabitethernet®/1 ip address 192.168.56.6 255.255.255.0 ip router isis ! interface Gigabitetherneto/2 ip address 192.168.67.6 255.255.255.0 ip router isis ! router isis net 49.5678.000.0000.0006.00 is-type level-1 log-adjacency-changes end © R7 ~ hostname R7 ! ip cef ! interface Gigabitetherneto/1 ip address 192.168.47.7 255.255.255.0 ip router isis ! interface Gigabitetherneta/2 ip address 192.168.67.7 255.255.255.0 ip router isis 1 interface Gigabitetherneto/3 ip address 192.168.78.7 255.255.255.0 ip router isis hitpstnetworklessons.comie-isliee-route-leaking 161201910512028, 2328 ISIS Route Leaking a net
[email protected]
log-adjacency-changes ! end R8 ~ hostname R& ! ip cef ' interface Loopback@ ip address 8.8.8.8 255.255.255.255 ip router isis ' interface Gigabitetherneto/1 ip address 192.168.78.8 255.255.255.0 ip router isis ' ° 9 router isis net 49.5678 .2000.0000. 0008.00 is-type level-1 Log-adjacency-changes ! end 1. Conclusion In this lesson, you have learned how to use route leaking to ensure level 1 routers pick the most optimal path in the network: * level 1 routers generate a default route to the closest level 1-2 router to reach prefixes outside of their own area, * level 1-2 routers can redistribute prefixes from level 2 to level 1 so that level 1 routes can choose the most optimal path * prefixes that were redistributed from level 2 to level 1 have their distribution up/down bit set to up so that they are not redistributed back into level 2 by another level 1-2 router, hitpstnetworklessons.comfie-isliee-route-leaking wri201910812029, 2328 ISIS Route Leaking a =* [Ss Filtering ® Tags: IP Routing, Redistribution Forum Replies [O) waneabeunanes HiRene, thanks a lot for your helpful explanation, | simulated your lab and found something that | need your explanation for it. when I leaked 8.8.8.8 at R4, R2 calculated the metric of 8.8.8.8 with 168 as below: Rash ip route isis 1 8,0.0.0/32 is subnetted, 1 subnets iia 8.8.8.8 [135/168] via 192.168.26.4, 08:24:47, Etherneto/2 © ctri+m although Ra calculated itwith 30 : Ratsh ip route isis 8,0.0.0/32 1s subnetted, 1 subnets 112 8.8.8.8 [115/30] vie 192.168.47.7, 00:50:55, Ethernete/1 the metric calculated with 40 at R2 when | configured the .- Continue reading in our forum HiWalid, That's a good question. | just booted this topology again and I see a metric of 40 on R2: Raushow ip route isis 18120 hps:inetworklessons.comis-iti--route-leaking1910812029, 2328 ISIS Route Leaking a A*L. 0.0.0.0/0 [115/10] via 192.168.24.4, @0: 8.0.0.0/32 is subnetted, 1 subnets ja 8.8.8.8 [115/40] vie 192.168.24.4, 00:14:23, Gigabitéthernet9/2 Lt 192.168.13.0/24 [225/28] via 192.168.12.1, 00:15:16, Gigabitethernete/1 L1 192,168.35.0/24 [115/30] via 192.168.12.1, 00:15:18, Gigabitéthernete/1 11 192.168.47.0 223, Gigabitethernete/2 « Continue reading in our forum YG, vrrryzorcu HiRene, Ristraceroute 8.8.8.8 this command result RI uses R3 Why do you write: Ri uses R2 YB, o>revs0rau q HiRene why we will configure on Ré, not on R2,, is there a reason or first level-1-2 router 2 ReneMolenaar HiBahni, ‘Thanks, this sa typo yes, Just fixed it Rene $2 15 more replies! Ask a question or join the discussion by visiting our Community Forum hps:inetworklessons.comis-iti-is-route-leaking1910812023, 2328 a Disclaimer Privacy Policy Support About hps:inetworklessons.comis-iti-is-route-leaking ISIS Route Leaking © 2013 - 2023 NetworkLessons.com 52189 © ctr+m 20720
You might also like
Rest Api
PDF
No ratings yet
Rest Api
13 pages
Cisco Press - IS-IS Network Design Solutions
PDF
No ratings yet
Cisco Press - IS-IS Network Design Solutions
352 pages
PSTN
PDF
No ratings yet
PSTN
134 pages
Fiber Optic Cable
PDF
No ratings yet
Fiber Optic Cable
41 pages
Sonetsdh
PDF
No ratings yet
Sonetsdh
66 pages
Rack Mounted Equipment
PDF
No ratings yet
Rack Mounted Equipment
64 pages
SANOG26 - Tutorial - Ipv4 - Ipv6 - Routing - Sreenath
PDF
No ratings yet
SANOG26 - Tutorial - Ipv4 - Ipv6 - Routing - Sreenath
318 pages
S6700 Series Switches Hardware Description
PDF
No ratings yet
S6700 Series Switches Hardware Description
579 pages
MA5600T (N63E-22) Quick Installation Guide 07
PDF
No ratings yet
MA5600T (N63E-22) Quick Installation Guide 07
31 pages
Adda Ad
PDF
No ratings yet
Adda Ad
39 pages
Lec-11 Multicast PIM Prune Override
PDF
No ratings yet
Lec-11 Multicast PIM Prune Override
16 pages
Activity# 1 - Do We Really Need A Map?: Objectives
PDF
0% (1)
Activity# 1 - Do We Really Need A Map?: Objectives
13 pages
Cisco NetFlow
PDF
No ratings yet
Cisco NetFlow
10 pages
Chapter 1 (Part 2) : Computer Networking: A Top Down Approach
PDF
No ratings yet
Chapter 1 (Part 2) : Computer Networking: A Top Down Approach
25 pages
IPv6 Redistribution Between RIPNG and OSPFv3
PDF
No ratings yet
IPv6 Redistribution Between RIPNG and OSPFv3
7 pages
Linux Routing: Presented by Kishor Panth
PDF
No ratings yet
Linux Routing: Presented by Kishor Panth
35 pages
Lec-12 Multicast PIM Register Message
PDF
No ratings yet
Lec-12 Multicast PIM Register Message
8 pages
IPv6 Address Types
PDF
No ratings yet
IPv6 Address Types
6 pages
Clase 4. ISIS
PDF
No ratings yet
Clase 4. ISIS
51 pages
IS-IS Metric
PDF
No ratings yet
IS-IS Metric
9 pages
SNMP
PDF
No ratings yet
SNMP
12 pages
Stateless Autoconfiguration For IPv6
PDF
No ratings yet
Stateless Autoconfiguration For IPv6
5 pages
IPv6 Solicited Node Multicast Address
PDF
No ratings yet
IPv6 Solicited Node Multicast Address
5 pages
11-Upload Other Images in EVE
PDF
No ratings yet
11-Upload Other Images in EVE
6 pages
Network Layer: Introduction To Networks
PDF
No ratings yet
Network Layer: Introduction To Networks
52 pages
Ipv6 Summarization Example
PDF
No ratings yet
Ipv6 Summarization Example
4 pages
Shortening of Ipv6
PDF
No ratings yet
Shortening of Ipv6
4 pages
Protocolo ISIS
PDF
No ratings yet
Protocolo ISIS
49 pages
IS-IS Route Leaking
PDF
No ratings yet
IS-IS Route Leaking
12 pages
WROU02
PDF
No ratings yet
WROU02
343 pages
IS-IS Filtering
PDF
No ratings yet
IS-IS Filtering
9 pages
Troubleshooting OSPF (2206!7!5)
PDF
100% (1)
Troubleshooting OSPF (2206!7!5)
42 pages
Hierfdbarchical and BGP
PDF
No ratings yet
Hierfdbarchical and BGP
40 pages
Introduction To Routing
PDF
No ratings yet
Introduction To Routing
39 pages
ECSE-4670: Computer Communication Networks (CCN)
PDF
No ratings yet
ECSE-4670: Computer Communication Networks (CCN)
35 pages
Lec-8 Multicast PIM Designated Router
PDF
No ratings yet
Lec-8 Multicast PIM Designated Router
10 pages
The Routing Table Part 1 - Understanding The Routing Table Structure
PDF
No ratings yet
The Routing Table Part 1 - Understanding The Routing Table Structure
17 pages
Net Lec8
PDF
No ratings yet
Net Lec8
34 pages
Chapter 4.1 Networking
PDF
No ratings yet
Chapter 4.1 Networking
32 pages
08 Installing+EVE NG
PDF
No ratings yet
08 Installing+EVE NG
10 pages
Ipv4/Ipv6 Routing: - Veerakumar M - 25-03-2019
PDF
No ratings yet
Ipv4/Ipv6 Routing: - Veerakumar M - 25-03-2019
18 pages
Static Routing: Routing Protocols and Concepts
PDF
No ratings yet
Static Routing: Routing Protocols and Concepts
41 pages
E2 Lab 8 4 2 Instructor
PDF
No ratings yet
E2 Lab 8 4 2 Instructor
8 pages
Chapter 9 2 NE 6e
PDF
No ratings yet
Chapter 9 2 NE 6e
39 pages
62-Introduction AAA
PDF
No ratings yet
62-Introduction AAA
4 pages
Routing Basics
PDF
No ratings yet
Routing Basics
91 pages
68-Web Filter Lab
PDF
No ratings yet
68-Web Filter Lab
12 pages
IS-IS Filtering
PDF
No ratings yet
IS-IS Filtering
12 pages
IS-IS Summarization
PDF
No ratings yet
IS-IS Summarization
12 pages
3.1.7 - IP Routing
PDF
No ratings yet
3.1.7 - IP Routing
53 pages
IS-IS Redistribution
PDF
No ratings yet
IS-IS Redistribution
12 pages
Does The Internet "End" at 500K Routes?
PDF
No ratings yet
Does The Internet "End" at 500K Routes?
5 pages
Packet Filtering: CS-480b Dick Steflik
PDF
No ratings yet
Packet Filtering: CS-480b Dick Steflik
25 pages
72-Application Control
PDF
No ratings yet
72-Application Control
2 pages
CCNA 2 v503 v60 Chapter 1 Exam Answers 2018 100 Full
PDF
No ratings yet
CCNA 2 v503 v60 Chapter 1 Exam Answers 2018 100 Full
23 pages
6.2.2.8 Lab - Viewing Host Routing Tables D.sandoval
PDF
100% (1)
6.2.2.8 Lab - Viewing Host Routing Tables D.sandoval
6 pages
Routing Introduction in BGP
PDF
No ratings yet
Routing Introduction in BGP
48 pages
Routing 2007
PDF
No ratings yet
Routing 2007
21 pages
71-DNS Filter
PDF
No ratings yet
71-DNS Filter
8 pages
EROU01 Routing Basics
PDF
No ratings yet
EROU01 Routing Basics
37 pages
ROUTING
PDF
No ratings yet
ROUTING
23 pages
IS-IS Filtering
PDF
No ratings yet
IS-IS Filtering
7 pages
How Subnets Work in Practice
PDF
No ratings yet
How Subnets Work in Practice
7 pages
Lab 8.4.2: Show IP Route Challenge Lab: (Instructor Version)
PDF
No ratings yet
Lab 8.4.2: Show IP Route Challenge Lab: (Instructor Version)
7 pages
14-Cisco ISE Lab
PDF
No ratings yet
14-Cisco ISE Lab
4 pages
Integrated IS-IS Configuration On Cisco IOS
PDF
No ratings yet
Integrated IS-IS Configuration On Cisco IOS
21 pages
Unit 7 Notes
PDF
No ratings yet
Unit 7 Notes
15 pages
Lab 1 - Using Windows PowerShell
PDF
No ratings yet
Lab 1 - Using Windows PowerShell
6 pages
Packet Tracer Multiarea Ospf Exploration Physical Mode Part 1sabordo
PDF
No ratings yet
Packet Tracer Multiarea Ospf Exploration Physical Mode Part 1sabordo
9 pages
Chapter 2 Case Study
PDF
No ratings yet
Chapter 2 Case Study
9 pages
Ip Basics: Steven Vandevender Hervey Allen
PDF
No ratings yet
Ip Basics: Steven Vandevender Hervey Allen
30 pages
MANRS IETF Fellows-Routing
PDF
No ratings yet
MANRS IETF Fellows-Routing
18 pages
02 Architecture
PDF
No ratings yet
02 Architecture
37 pages
06 Handout 1
PDF
No ratings yet
06 Handout 1
6 pages
Ch06 Routing
PDF
No ratings yet
Ch06 Routing
75 pages
Day 3 - Networking
PDF
No ratings yet
Day 3 - Networking
7 pages
CNCH 2
PDF
No ratings yet
CNCH 2
18 pages
Router Hardening Result
PDF
No ratings yet
Router Hardening Result
8 pages
15 Ip Routing
PDF
No ratings yet
15 Ip Routing
31 pages
10CCN NetworkLayer Routing
PDF
No ratings yet
10CCN NetworkLayer Routing
57 pages
Data Communication Group Assignment
PDF
No ratings yet
Data Communication Group Assignment
107 pages
Group Assignment
PDF
No ratings yet
Group Assignment
111 pages
n10 009 Module 2
PDF
No ratings yet
n10 009 Module 2
280 pages
Tissemsilt University Faculty of Science and Technologie Department of Mathematics and Computer Science Practical Work (TP4) : Static and Routing
PDF
No ratings yet
Tissemsilt University Faculty of Science and Technologie Department of Mathematics and Computer Science Practical Work (TP4) : Static and Routing
3 pages