You are on page 1of 20
1910512028, 2328 ISIS Route Leaking Search Q © IS-IS Route Leaking ISAS routers in a level 1 area only know the prefixes in their own area. If they want to reach something in another area, they have to use a default route to a level 1-2 router. If there are multiple level 1-2 routers, then IS-IS picks the closest level 1-2 router to exit the area. This sometimes causes sub-optimal routing, We can deal with this by leaking prefixes from level 2 into level 1 Alevel 1-2 router has access to the local area and also knows all prefixes because of its level 2 database, We can redistribute one or more prefixes from level 2 into the local area so that level 1 routers can select the most optimal path in the network. This is best explained with an example, so in this lesson, I'll show you what route leaking is and © solves sub-optimal routing, This is the topology we will use: hitpstnetworklessons.comfie-isliee-route-leaking 120 1910812029, 2328 ISIS Route Leaking a 192.168.12.0/24 2 0/1 i0/1 wt ae 138 ee Ei 3 8 B a Area 1234 ; B \rea 8 a8 28 38 ge 3 65 m2 Lt2 Li-L2 a ee 388 488 a ras B S | 2 5 & 3 =o = se sg SES 788 192.168.56.0/24 192.168.67.0/24 U-12 Gi0/2——Gi0 1. 10/2 ——i0/2 © crriem 5 6 6 7) FC ‘2 L112 738 a 8 Area 5678 | y sg age rt 3| 3 u 3 3 We have a bunch of IS-IS routers. R8 has a loopback interface that we will try to reach from R1. All interfaces are Gigabit Ethernet with the default metric of 10. Configurations Want to take a look for yourself? Here you will find the startup configuration of each device hps:inetworklessons.comis-iti-is-route-leaking 1910512028, 2328 ISIS Route Leaking hostname R1. ! ip cef 1 interface Gigabitethernet®/1 ip address 192.168.12.1 255.255.255.0 ip router isis ! interface Gigabitetherneto/2 ip address 192.168.13.1 255.255.255.0 ip router isis ! router isis net 49.1234.000.0000.0001.00 Log-adjacency-changes ! end R2 hostname R2 ip cef interface Gigabitethernet@/1 ip address 192.168.12.2 255.255.255.0 ip router isis ' interface Gigabitethernet@/2 ip address 192.168.24.2 255.255.255.0 ip router isis router isis net 49.1234.0000.0000.0002.00 is-type level-1 log-adjacency-changes hitpstnetworklessons.comie-isliee-route-leaking 320 1910512028, 2328 ISIS Route Leaking R3 hostname R3 ' ip cef ' interface Gigabitetherneto/1 ip address 192.168.13.3 255.255.255.0 ip router isis ' interface Gigabitetherneto/2 ip address 192.168.35.3 255.255.255.0 ip router isis ' router isis net 49.1234.0080.0000.0003.00 log-adjacency-changes ! end R4 hostname Ra ! ip cef ! interface Gigabitetherneto/1 ip address 192.168.24.4 255.255.255.0 ip router isis ! interface Gigabitetherneto/2 ip address 192.168.47.4 255.255.2550 ip router isis ! router isis net 49.1234.0000.0000.0004.00 hitpstnetworklessons.comie-isliee-route-leaking 4120 1910512028, 2328 ISIS Route Leaking end RS hostname RS ! ip cef ' interface Gigabitethernet@/1 ip address 192.168.35.5 255.255.255.0 ip router isis interface Gigabitethernet®/2 ip address 192.168.56.5 255.255.255.0 ip router isis ' router isis net 49.5678 .0000.0000.0005.00 Log-adjacency-changes end R6é hostname R6 ip cef interface Gigabitethernet@/1 ip address 192.168.56.6 255.255.255.0 ip router isis interface Gigabitetherneto/2 ip address 192.168.67.6 255.255.255.0 ip router isis router isis hitpstnetworklessons.comie-isliee-route-leaking 520 1910512028, 2328 ISIS Route Leaking end R7 ~ hostname R7 ' ip cef ! interface Gigabitetherneto/1 ip address 192.168.47.7 255.255.2550 ip router isis ' interface Gigabitetherneto/2 ip address 192.168.67.7 255.255.255.0 ip router isis ' interface Gigabitetherneto/3 @ ip address 192.168.78.7 255.255.255.0 ip router isis ' router isis net 49.5678 .2000.0000.0007.00 log-adjacency-changes ! end R8 ~ hostname RB ! ip cef ! interface Loopback@ ip address 8.8.8.8 255.255.255.255 ip router isis ! hitpstnetworklessons.comie-isliee-route-leaking 620 1910512028, 2328 a ip router isis router isis net 49.5678 .0000.0000.0008.00 is-type level-1 log-adjacency-changes ! end Let's take a look at the routing table of R1 Ristshow ip route isis SL1 @.0.0.0/@ [115/10] via 192.168.13.3, 4 LL 192,168.24.0/24 [115/20] via 192.168. ALL 192,168.35.0/24 [115/20] via 192.168. ALL 192,168.47.0/24 [115/30] via 192.168. R3 is the closest level 1-2 router for R1 so R1 generates a default route to R3. When we try to reach 8.8.8.8, this is the path we use: Ritraceroute 8.8.8.8 Type escape sequence to abort. Tracing the route to 8.8.8.8 VRF info: (vrf in name/id, vrf out name/id) 1 192,168.13.3 5 msec 18 msec 5 msec 2 192.168.35.5 7 msec 11 msec 7 msec 3 192.168.56.6 11 msec 13 msec 16 msec 4 192.168.67.7 11 msec 16 msec 11 msec 5 192.168.78.8 12 msec 10 msec * Ri uses R3 to get to 8.8.8.8. This makes sense since R3 is the closest level 1-2 router.To reach any network: outside of area 1234, R1 will use the default route from R3. Its not the shortest path however since R6 is in between RS and R’ hitpstnetworklessons.comfie-isliee-route-leaking ISIS Route Leaking 00:04: 12.2, 13.3, -12.2, ) @1, Gigabitetherneto/2 00:04:21, Gigabitethernet@/1 00:04:11, Gigabitetherneto/2 00:04:11, Gigabitetherneto/1 720 1910812029, 2328 ISIS Route Leaking 192.168.12.0/24 2 0/1: Area 1234 0/1 ——uy 1943 Lm1KA VoMaIN KOUTeINg LnTormation Exchange ProtocoL ¥ ISO 19589 ISIS Link State Protocol Data Unit PDU length: 98 Remaining lifetime: 1199 LSP-1D: @800.¢000.0004.00-00 Sequence number: @x90009005 Checksum: axcada [correct] [Checksum Status: Good] Type block(@xeb): Partition Repair:e, attached bits:1, overload bit:e, Ts type: Area address(es) (t=1, 1=a) Protocols supported (t=129, 1=1) Hostname (t=137, 1-2) Is Reachability (t-2, 1-12) IP Interface address(es) (t=132, 1-4) ¥ IP Internal reachability (t=128, 1-36) Type: 128 Length: 36 Ipv4 prefi v apva prefi: 192.168.24.0/24 192.168.47.0/24 +400 1010 = Default Metric: 10 Default Metric TE: Internal Delay Metric: @ © belay Metric: Not supported Delay Metric: Internal Expense Metric: @ Expense Metric: Not Supported Expense Metric: Internal Error Metric: @ Error Metric: Not Supported Error Metric: Internal 8.8.8,8/32 ++01 1110 = Default Metric: 30 Default Metric II Internal Delay Metric: @ Delay Metric: Not Supported Delay Metric: Internal Expense Metric: @ Expense metric: Not supported Expense metric: Internal Error Metric: @ = Error Metric: Not Supported = Error Metric: Internal hps:inetworklessons.comis-ii-ie-route-leaking 12120 1910512028, 2328 ISIS Route Leaking a back into the level 2 database. Want to take a look for yourself? Here you wil find the final configuration of each device, R1 ~ hostnane Rt 1 tp cet 1 interface Gigabitethernet0/t kp address 192.168.12.1 255.255.255.0 ip router isis 1 interface Gigabitethernet/2 ip address 192.168.13.1 255.255.255.0 © ip router isis 1 router isis net 49.1734.0000.0000.0001.00 is-type level-1 Joe-adjaceney-changes end R2 ~ hostname R2 ! ip cef interface Gigabitetherneto/1 ip address 192.168.12.2 255.255.255.0 ip router isis hitpstnetworklessons.comie-isliee-route-leaking 13120 1910512028, 2328 ISIS Route Leaking a ip address 192.168.24.2 255.255.255.0 ip router isis ! router isis net 49.1234, 0000 .0000.002.00 is-type level-1 og-adjacency-changes end R3 hostname R3 ! ip cef ' interface Gigabitetherneto/1 ip address 192.168.13.3 255.255.255.0 ip router isis interface Gigabitethernet®/2 ip address 192.168.35.3 255.255.255.0 ip router isis ! router isis net 49.1234.000.0000.0003.00 log-adjacency-changes end R4 hostname Ra ip cef interface Gigabittthernet@/1 hitpstnetworklessons.comie-isliee-route-leaking 4120 1910512028, 2328 ISIS Route Leaking a ! interface Gigabitetherneto/2 ip address 192.168.47.4 255.255.255.0 ip router isis ! router isis net 49.1234,0000.0000.0004.00 og-adjacency-changes redistribute isis ip level-2 into level-1 route-map ROUTE_LEAKING ip access-list extended RB_L permit ip host 8.8.8.8 any ! route-map ROUTE_LEAKING permit 10 match ip address R8_L@ end RS hostname RS ! ip cef ! interface Gigabitethernet@/1 ip address 192.168.35.5 255.255.255.0 ip router isis interface Gigabitethernet®/2 ip address 192.168.56.5 255.255.255.0 ip router isis ' router isis net 49.5678 .2000.0000.0005.00 Log-adjacency-changes end hitpstnetworklessons.comfie-isliee-route-leaking 16:20 1910512028, 2328 ISIS Route Leaking hostname R6 ! ip cef 1 interface Gigabitethernet®/1 ip address 192.168.56.6 255.255.255.0 ip router isis ! interface Gigabitetherneto/2 ip address 192.168.67.6 255.255.255.0 ip router isis ! router isis net 49.5678.000.0000.0006.00 is-type level-1 log-adjacency-changes end © R7 ~ hostname R7 ! ip cef ! interface Gigabitetherneto/1 ip address 192.168.47.7 255.255.255.0 ip router isis ! interface Gigabitetherneta/2 ip address 192.168.67.7 255.255.255.0 ip router isis 1 interface Gigabitetherneto/3 ip address 192.168.78.7 255.255.255.0 ip router isis hitpstnetworklessons.comie-isliee-route-leaking 16120 1910512028, 2328 ISIS Route Leaking a net 49.5678.008@.0000.0007.00 log-adjacency-changes ! end R8 ~ hostname R& ! ip cef ' interface Loopback@ ip address 8.8.8.8 255.255.255.255 ip router isis ' interface Gigabitetherneto/1 ip address 192.168.78.8 255.255.255.0 ip router isis ' ° 9 router isis net 49.5678 .2000.0000. 0008.00 is-type level-1 Log-adjacency-changes ! end 1. Conclusion In this lesson, you have learned how to use route leaking to ensure level 1 routers pick the most optimal path in the network: * level 1 routers generate a default route to the closest level 1-2 router to reach prefixes outside of their own area, * level 1-2 routers can redistribute prefixes from level 2 to level 1 so that level 1 routes can choose the most optimal path * prefixes that were redistributed from level 2 to level 1 have their distribution up/down bit set to up so that they are not redistributed back into level 2 by another level 1-2 router, hitpstnetworklessons.comfie-isliee-route-leaking wri20 1910812029, 2328 ISIS Route Leaking a =* [Ss Filtering ® Tags: IP Routing, Redistribution Forum Replies [O) waneabeunanes HiRene, thanks a lot for your helpful explanation, | simulated your lab and found something that | need your explanation for it. when I leaked 8.8.8.8 at R4, R2 calculated the metric of 8.8.8.8 with 168 as below: Rash ip route isis 1 8,0.0.0/32 is subnetted, 1 subnets iia 8.8.8.8 [135/168] via 192.168.26.4, 08:24:47, Etherneto/2 © ctri+m although Ra calculated itwith 30 : Ratsh ip route isis 8,0.0.0/32 1s subnetted, 1 subnets 112 8.8.8.8 [115/30] vie 192.168.47.7, 00:50:55, Ethernete/1 the metric calculated with 40 at R2 when | configured the .- Continue reading in our forum HiWalid, That's a good question. | just booted this topology again and I see a metric of 40 on R2: Raushow ip route isis 18120 hps:inetworklessons.comis-iti--route-leaking 1910812029, 2328 ISIS Route Leaking a A*L. 0.0.0.0/0 [115/10] via 192.168.24.4, @0: 8.0.0.0/32 is subnetted, 1 subnets ja 8.8.8.8 [115/40] vie 192.168.24.4, 00:14:23, Gigabitéthernet9/2 Lt 192.168.13.0/24 [225/28] via 192.168.12.1, 00:15:16, Gigabitethernete/1 L1 192,168.35.0/24 [115/30] via 192.168.12.1, 00:15:18, Gigabitéthernete/1 11 192.168.47.0 223, Gigabitethernete/2 « Continue reading in our forum YG, vrrryzorcu HiRene, Ristraceroute 8.8.8.8 this command result RI uses R3 Why do you write: Ri uses R2 YB, o>revs0rau q HiRene why we will configure on Ré, not on R2,, is there a reason or first level-1-2 router 2 ReneMolenaar HiBahni, ‘Thanks, this sa typo yes, Just fixed it Rene $2 15 more replies! Ask a question or join the discussion by visiting our Community Forum hps:inetworklessons.comis-iti-is-route-leaking 1910812023, 2328 a Disclaimer Privacy Policy Support About hps:inetworklessons.comis-iti-is-route-leaking ISIS Route Leaking © 2013 - 2023 NetworkLessons.com 52189 © ctr+m 20720

You might also like