Assignment 09 Lab Manual - IS-IS
Assignment 09 Lab Manual - IS-IS
Module 9: IS-IS
1. Introduction and Learning Outcomes
2. Lab Exercises
3. Deliverables
IS-IS works similarly to OSPF where all the routes have visibility to the entire network and can relay any
changes to the network to each other.
IS-IS is a single AS implementation and it contains of End systems and Intermediate Systems. Routing
between areas is achieved hierarchically by configuring Level 1 and Level 2 affiliations. Level 1 systems
route within an area and Level 2 is used to route traffic between areas. Hence in IS-IS, there is essentially
no backbone area.
In the OSI model, the routers are called as “Intermediate Systems” and the PC/machines are called “End
systems”. IS-IS protocol uses ISO network addresses which point to a router interface called NSAP
(Network Service Access Points).While assigning these addresses, care needs to be taken as they are
totally different from the IP addressing schemes.
The NET addresses (can be a combination of your area id, System-ID/loopback address, and N-Selector)
For example, Area 49.0001 and loopback address: 192.168.0.1 It will be: 49.0001.0192.0168.0001.00
This has been a popular protocol for the ISP (Internet Service Providers) for a long time as it is
predominantly a layer 2 protocol and is not susceptible to layer 3 attacks.
Another reason why it is widely used in the ISP networks is that it is easier to scale as it doesn’t need
each area to be connected to the backbone area. We only need to change the levels on the Routers and
then we can expand it in any direction we like a string.
2. Lab Exercises
2.1 Addressing Table
● For the following tasks, X = Last 2 digits of your student ID.
2.2 Topology
2.3 Tasks
2.3.1 Basic Configuration
Note: The following tasks are applicable for both IPv4 and IPv6. Hosts must not participate in IS-IS
process. Using Aggregated Routes instead of routes to each subnet is subjected to point deduction.
3. Deliverables
3.1 Draw a network diagram illustrating interfaces with IP addresses, VLANs and other necessary
information. Mention the EVE-NG Server IP which was used to perform this exercise. (Do not
copy/capture the network/lab topology simply from EVE-NG Server)
3.2 Issue the following commands and copy the configurations from the following devices in plain text
after completing all tasks, and put the configured text in bold. DELETE all default and not configured
configuration lines, wherever applicable.
3.3 Issue the following commands on all hosts and capture outputs
a. show ip int br
b. show ipv6 int br
c. show ip route
d. show ipv6 route
3.4 Issue the following commands on Cisco Routers (R1, R2, R4, R6) and capture outputs
a. show ip int br
b. show ipv6 int br
c. show ip route isis
d. show ipv6 route isis
e. show clns neighbor
f. show isis database
g. show isis protocol
3.5 Issue the following commands on R3-Juniper Router and capture outputs
3.6 Issue the following commands on R5-Alcatel Router and capture outputs
3.7 Issue both IPv4 and IPv6 ping with option source from the following devices and capture outputs
a. Loopback 6 to Host A
b. Loopback 6 to Host B
c. Loopback 6 to Loopback 1
d. Loopback 6 to Loopback 2
e. Loopback 6 to Loopback 3
f. Loopback 6 to Loopback 4
g. Loopback 6 to Loopback 5
h. Host A to Host B
3.8 Issue both IPv4 and IPv6 traceroute from the following devices and capture outputs
a. Host A to Host B
b. Host A to Loopback 1
c. Host A to Loopback 2
d. Host A to Loopback 3
e. Host B to Loopback 4
f. Host B to Loopback 5
g. Host B to Loopback 6