< Home

Configuring IS-IS IPv6 Route Leaking

Context

If multiple Level-1-2 devices in a Level-1 area are connected to devices in the Level-2 area, a Level-1 LSP sent by each Level-1-2 device carries an ATT flag bit of 1. This Level-1 area will have multiple routes to the Level-2 area and to other Level-1 areas.

By default, routes in a Level-1 area can be leaked into the Level-2 area so that Level-1-2 and Level-2 devices can learn about the topology of the entire network. Devices in a Level-1 area are unaware of the entire network topology because they only maintain LSDBs in the local Level-1 area. Therefore, a device in a Level-1 area can forward traffic to a Level-2 device only through the nearest Level-1-2 device. The route used may not be the optimal route to the destination.

To enable a device in a Level-1 area to select the optimal route, configure IS-IS IPv6 route leaking so that specified routes in the Level-2 area can be leaked into the local Level-1 area.

Routes of services deployed only in the local Level-1 area do not need to be leaked into the Level-2 area. A policy can be configured to leak only desired routes into the Level-2 area.

Procedure

  • Specify IS-IS IPv6 routes in the Level-2 area and other Level-1 areas that can be leaked into the local Level-1 area.
    1. Run system-view

      The system view is displayed.

    2. Run isis [ process-id ]

      The IS-IS view is displayed.

    3. Run ipv6 import-route isis level-2 into level-1 [ tag tag | filter-policy { acl6-number | acl6-name acl6-name | ipv6-prefix ipv6-prefix-name | route-policy route-policy-name } | direct { allow-filter-policy | allow-up-down-bit } * ] *

      IS-IS IPv6 routes in the Level-2 area and other Level-1 areas that meet the specified conditions are leaked into the local Level-1 area.

      By default, IS-IS IPv6 routes in the Level-2 area are not leaked into Level-1 areas.

      The command in Step 3 is run on the Level-1-2 device that is connected to an external area.

  • Configure IS-IS IPv6 routes in Level-1 areas to leak into the Level-2 area.
    1. Run system-view

      The system view is displayed.

    2. Run isis [ process-id ]

      The IS-IS view is displayed.

    3. Run ipv6 import-route isis level-1 into level-2 [ tag tag | filter-policy { acl6-number | acl6-name acl6-name | ipv6-prefix ipv6-prefix-name | route-policy route-policy-name }| direct allow-filter-policy ] *

      IS-IS IPv6 routes that meet the specified conditions in Level-1 areas are leaked into the Level-2 area.

      By default, all Level-1 IS-IS IPv6 routing information, excluding information about default routes, is leaked to Level-2 areas.

      The command in Step 3 is run on the Level-1-2 device that is connected to an external area.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >