Monday, March 11, 2013

ISIS Route Leaking In IOS-XR... Coming Soon



RP/0/0/CPU0:XR1#sh route isis | i 3.3.3.3
i L2 3.3.3.3/32 [115/30] via 20.6.19.6, 00:29:27, GigabitEthernet0/1/0/0.619
RP/0/0/CPU0:XR1#sh route isis | i 4.4.4.4
i L2 4.4.4.4/32 [115/20] via 20.6.19.6, 00:29:36, GigabitEthernet0/1/0/0.619

Step 1: Create Route Policy
=====================

RP/0/0/CPU0:XR1#sh run route-policy ISIS
route-policy ISIS
  if destination in (3.3.3.3/32, 4.4.4.4/32) then
    pass
  endif
end-policy

!

Step 2: Map The Policy To ISIS Process
==============================

RP/0/0/CPU0:XR1#sh run router isis
router isis 1
 net 49.1920.0000.0000.0019.00
 address-family ipv4 unicast
  propagate level 2 into level 1 route-policy ISIS
 !
 interface Loopback0
  passive
  circuit-type level-2-only
  address-family ipv4 unicast
  !
 !
 interface GigabitEthernet0/1/0/0.519
  circuit-type level-2-only
  address-family ipv4 unicast
  !
 !
 interface GigabitEthernet0/1/0/0.619
  circuit-type level-2-only
  address-family ipv4 unicast
  !
 !
 interface POS0/6/0/0
  circuit-type level-1
  address-family ipv4 unicast
  !
 !
!


Verification
=========

Before on XR2
===========
RP/0/3/CPU0:XR2#sh ip route isis

i*L1 0.0.0.0/0 [115/10] via 10.19.20.19, 00:23:22, POS0/7/0/0


After on XR2
==========

RP/0/3/CPU0:XR2#sh ip route isis


i*L1 0.0.0.0/0 [115/10] via 10.19.20.19, 00:23:46, POS0/7/0/0
i ia 3.3.3.3/32 [115/40] via 10.19.20.19, 00:00:05, POS0/7/0/0
i ia 4.4.4.4/32 [115/30] via 10.19.20.19, 00:00:05, POS0/7/0/0

 

Other Relevant Configuration
======================

RP/0/3/CPU0:XR2#sh run router isis

router isis 1
 is-type level-1
 net 49.1920.0000.0000.0020.00
 interface Loopback0
  passive
  address-family ipv4 unicast
  !
 !
 interface POS0/7/0/0
  address-family ipv4 unicast
  !
 !
!
  
Deepak Arora
Evil CCIE

No comments:

Post a Comment