|
|
![]() |
Note Cisco access servers currently support only End System-to-Intermediate System (ES-IS), but not Intermediate System-to-Intermediate System (IS-IS). |
Addresses in the ISO network architecture are referred to as network service access point (NSAP) addresses and network entity titles (NETs). Each node in an OSI network has one or more NETs. In addition, each node has many NSAP addresses. Each NSAP address differs from one of the NETs for that node in only the last byte. This byte is called the N-selector. Its function is similar to the port number in other protocol suites.
Our implementation supports all NSAP address formats that are defined by ISO 8348/Ad2; however, Cisco provides ISO Interior Gateway Routing Protocol (IGRP) or IS-IS dynamic routing only for NSAP addresses that conform to the address constraints defined in the ISO standard for IS-IS (ISO 10589).
An NSAP address consists of the following two major fields, as shown in Figure 15:

Assign addresses or NETs for your domains and areas. The domain address uniquely identifies the routing domain. All routers within a given domain are given the same domain address. Within each routing domain, you can set up one or more areas, as shown in Figure 16. Determine which routers are to be assigned to which areas. The area address uniquely identifies the routing area and the system ID identifies each node.

The key difference between the ISO IGRP and IS-IS NSAP addressing schemes is in the definition of area addresses. Both use the system ID for Level 1 routing (routing within an area). However, they differ in the way addresses are specified for area routing. An ISO IGRP NSAP address includes three separate fields for routing: the domain, area, and system ID. An IS-IS address includes two fields: a single continuous area field (comprising the domain and area fields) and the system ID.
The ISO IGRP NSAP address is divided into three parts: a domain part, an area address, and a system ID. Domain routing is performed on the domain part of the address. Area routing for a given domain uses the area address. System routing for a given area uses the system ID part. The NSAP address is laid out as follows:
The Cisco ISO IGRP routing implementation interprets the bytes from the AFI up to (but not including) the area field in the DSP as a domain identifier. The area field specifies the area, and the system ID specifies the system.
Figure 17 illustrates the ISO IGRP NSAP addressing structure. The maximum address size is 20 bytes.

An IS-IS NSAP address is divided into two parts: an area address and a system ID. Level 2 routing (routing between areas) uses the area address. Level 1 routing (routing within an area) uses the system ID address. The NSAP address is defined as follows:
The IS-IS routing protocol interprets the bytes from the AFI up to (but not including) the system ID field in the DSP as an area identifier. The system ID specifies the system.
Figure 18 illustrates the IS-IS NSAP addressing structure. The maximum address size is 20 bytes.

All NSAP addresses must obey the following constraints:
The following examples show how to configure OSI network and Government OSI Profile (GOSIP) NSAP addresses using the ISO IGRP implementation.
The following example shows an OSI network NSAP address format:
| Domain|Area| System ID| S| 47.0004.004D.0003.0000.0C00.62E6.00
The following example shows an GOSIP NSAP address structure. This structure is mandatory for addresses allocated from the International Code Designator (ICD) 0005 addressing domain. Refer to the GOSIP document, U.S. Government Open Systems Interconnection Profile (GOSIP), draft version 2.0, April 1989, for more information.
| Domain|Area| System ID| S| 47.0005.80.ffff00.0000.ffff.0004.0000.0c00.62e6.00 | | | | | | AFI IDI DFI AAI Resv RD
You enter static routes by specifying NSAP prefix and next hop NET pairs (by using the clns route command). The NSAP prefix can be any portion of the NSAP address. NETs are similar in function to NSAP addresses.
If an incoming packet has a destination NSAP address that does not match any existing NSAP addresses in the routing table, the Cisco IOS software will try to match the NSAP address with an NSAP prefix to route the packet. In the routing table, the best match means the longest NSAP prefix entry that matches the beginning of the destination NSAP address.
Table 4 shows a sample static routing table in which the next hop NETs are listed for completeness, but are not necessary to understand the routing algorithm. Table 5 offers examples of how the longest matching NSAP prefix can be matched with routing table entries in Table 4.
| Entry | NSAP Address Prefix | Next Hop NET |
|---|---|---|
1 | 47.0005.000c.0001 | 47.0005.000c.0001.0000.1234.00 |
2 | 47.0004 | 47.0005.000c.0002.0000.0231.00 |
3 | 47.0005.0003 | 47.0005.000c.0001.0000.1234.00 |
4 | 47.0005.000c | 47.0005.000c.0004.0000.0011.00 |
5 | 47.0005 | 47.0005.000c.0002.0000.0231.00 |
| Datagram Destination NSAP Address | Table Entry Number Used |
|---|---|
47.0005.000c.0001.0000.3456.01 | 1 |
47.0005.000c.0001.6789.2345.01 | 1 |
47.0004.1234.1234.1234.1234.01 | 2 |
47.0005.0003.4321.4321.4321.01 | 3 |
47.0005.000c.0004.5678.5678.01 | 4 |
47.0005.0001.0005.3456.3456.01 | 5 |
Octet boundaries must be used for the internal boundaries of NSAP addresses and NETs.
The basic function of a router is to forward packets: receive a packet in one interface and send it out another (or the same) interface to the proper destination. All routers forward packets by looking up the destination address in a table. The tables can be built either dynamically or statically. If you are configuring all the entries in the table yourself, you are using static routing. If you use a routing process to build the tables, you are using dynamic routing. It is possible, and sometimes necessary, to use both static and dynamic routing simultaneously.
When you configure only ISO CLNS and not routing protocols, the Cisco IOS software only makes forwarding decisions. It does not perform other routing-related functions. In such a configuration, the software compiles a table of adjacency data, but does not advertise this information. The only information that is inserted into the routing table is the NSAP and NET addresses of this router, static routes, and adjacency information.
You can route ISO CLNS on some interfaces and transparently bridge it on other interfaces simultaneously. To enable this type of routing, you must enable concurrent routing and bridging by using the bridge crb command. For more information on bridging, refer to the "Configuring Transparent Bridging" chapter in the Cisco IOS Bridging and IBM Networking Configuration Guide.
Cisco supports the following two dynamic routing protocols for ISO CLNS networks:
When dynamically routing, you can choose either ISO IGRP or IS-IS, or you can enable both routing protocols at the same time. Both routing protocols support the concept of areas. Within an area, all routers know how to reach all the system IDs. Between areas, routers know how to reach the proper area.
ISO IGRP supports three levels of routing: system routing, area routing, and interdomain routing. Routing across domains (interdomain routing) can be done either statically or dynamically with ISO IGRP. IS-IS supports two levels of routing: station routing (within an area) and area routing (between areas).
Some intermediate systems (ISs) keep track of how to communicate with all the end systems (ESs) in their areas and thereby function as Level 1 routers (also referred to as local routers). Other ISs keep track of how to communicate with other areas in the domain, functioning as Level 2 routers (sometimes referred to as area routers). Cisco routers are always Level 1 and Level 2 routers when routing ISO IGRP; they can be configured to be Level 1 only, Level 2 only, or both Level 1 and Level 2 routers when routing IS-IS.
ESs communicate with ISs using the ES-IS protocol. Level 1 and Level 2 ISs communicate with each other using either ISO IS-IS or the Cisco ISO IGRP protocol.
Static routing is used when it is not possible or desirable to use dynamic routing. The following are some instances of when you would use static routing:
![]() |
Note An interface that is configured for static routing cannot reroute around failed links. |
A Connectionless Network Protocol (CLNP) packet sent to any of the defined NSAP addresses or NETs will be received by the router. The Cisco IOS software uses the following algorithm to select which NET to use when it sends a packet:
To configure ISO CLNS, you must configure the routing processes, associate addresses with the routing processes, and customize the routing processes for your particular network.
You must use some combination of the tasks in the following sections to configure the ISO CLNS protocol:
See the "ISO CLNS Configuration Examples" section at the end of this chapter for configuration examples.
The ISO IGRP is a dynamic distance-vector routing protocol designed by Cisco for routing an autonomous system that contains large, arbitrarily complex networks with diverse bandwidth and delay characteristics.
To configure ISO IGRP, perform the tasks in the following sections. The tasks in the "Configuring ISO IGRP Parameters" section are optional, although you might be required to to perform them depending upon your specific application.
In addition, you can configure the following miscellaneous features described later in this chapter:
To configure ISO IGRP dynamic routing, you must enable the ISO IGRP routing process, identify the address for the router, and specify the interfaces that are to route ISO IGRP. Optionally, you can set a level for your routing updates when you configure the interfaces. CLNS routing is enabled by default on routers when you configure ISO IGRP. You can specify up to ten ISO IGRP routing processes.
To configure ISO IGRP dynamic routing on the router, use the following commands in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step 1 | router iso-igrp [tag] | Enable the ISO IGRP routing process and enter router configuration mode. |
Step2 | net network-entity-title | Configure the NET or address for the routing process. |
Although IS-IS allows you to configure multiple NETs, ISO IGRP allows only one NET per routing process.
You can assign a meaningful name for the routing process by using the tag option. You can also specify a name for a NET in addition to an address. For information on how to assign a name, see the "Specifying Shortcut NSAP Addresses" section later in this chapter.
You can configure an interface to advertise Level 2 information only. This option reduces the amount of router-to-router traffic by telling the Cisco IOS software to send out only Level 2 routing updates on certain interfaces. Level1 information is not passed on the interfaces for which the Level 2 option is set.
To configure ISO IGRP dynamic routing on the interface, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
clns router iso-igrp tag [level2] | Enable ISO IGRP on specified interfaces; also set the level type for routing updates. |
See the sections "Dynamic Routing in Overlapping Areas Example," "Dynamic Interdomain Routing Example," and "ISO CLNS over X.25 Example" at the end of this chapter for examples of configuring dynamic routing.
The Cisco ISO IGRP implementation allows you to customize certain ISO IGRP parameters. You can perform the optional tasks discussed in the following sections:
You have the option of altering the default behavior of ISO IGRP routing and metric computations. Altering the default behavior enables, for example, the tuning of system behavior to allow for transmissions via satellite. Although ISO IGRP metric defaults were carefully selected to provide excellent operation in most networks, you can adjust the metric.
![]() |
NoteAdjusting the ISO IGRP metric can dramatically affect network performance, so ensure that all metric adjustments are made carefully. Because of the complexity of this task, it is not recommended unless it is done with guidance from an experienced system designer. |
You can use different metrics for the ISO IGRP routing protocol on CLNS. To configure the metric constants used in the ISO IGRP composite metric calculation of reliability and load, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
metric weights qos k1 k2 k3 k4 k5 | Adjust the ISO IGRP metric. |
Two additional ISO IGRP metrics can be configured: the bandwidth and delay associated with an interface. Refer to the Cisco IOS Interface Command Reference publication for details about the bandwidth (interface) and delay interface configuration commands used to set these metrics.
![]() |
NoteUsing the bandwidth (interface) and delay commands to change the values of the ISO IGRP metrics also changes the values of IP IGRP metrics. |
To adjust ISO IGRP timing parameters, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
timers basic update-interval holddown-interval invalid-interval | Adjust the ISO IGRP timers (in seconds). |
Split horizon blocks information about routes from being advertised out the interface from which that information originated. This feature usually optimizes communication among multiple routers, particularly when links are broken.
To either enable or disable split horizon for ISO IGRP updates, use the following commands in interface configuration mode:
| Command | Purpose |
|---|---|
clns split-horizon | Enable split horizon for ISO IGRP updates. |
no clns split-horizon | Disable split horizon for ISO IGRP updates. |
The default for all LAN interfaces is for split horizon to be enabled; the default for WAN interfaces on X.25, Frame Relay, or Switched Multimegabit Data Service (SMDS) networks is for split horizon to be disabled.
IS-IS is an ISO dynamic routing specification. IS-IS is described in ISO 10589. The Cisco implementation of IS-IS allows you to configure IS-IS as an ISO CLNS routing protocol.
To configure IS-IS, perform the tasks in the following sections. Enabling IS-IS is required; the remainder of the tasks are optional, although you might be required to perform them depending upon your specific application.
In addition, you can configure the following miscellaneous features described later in this chapter:
Unlike other routing protocols, enabling IS-IS requires that you create an IS-IS routing process and assign it to a specific interface, rather than to a network. You can specify more than one IS-IS routing process per Cisco unit, using the multiarea IS-IS configuration syntax. You then configure the parameters for each instance of the IS-IS routing process.
Small IS-IS networks are built as a single area that includes all the routers in the network. As the network grows larger, it is usually reorganized into a backbone area made up of the connected set of all Level2 routers from all areas, which is in turn connected to local areas. Within a local area, routers know how to reach all system IDs. Between areas, routers know how to reach the backbone, and the backbone routers know how to reach other areas.
Routers establish Level1 adjacencies to perform routing within a local area (intra-area routing). Routers establish Level2 adjacencies to perform routing between Level1 areas (interarea routing).
Some networks use legacy equipment that supports only Level1 routing. These devices are typically organized into many small areas that cannot be aggregated due to performance limitations. Cisco routers are used to interconnect each area to the Level2 backbone.
A single Cisco router can participate in routing in up to 29 areas and can perform Level 2 routing in the backbone. In general, each routing process corresponds to an area. By default, the first instance of the routing process configured performs both Level 1and Level2 routing. You can configure additional router instances, which are automatically treated as Level1 areas. You must configure the parameters for each instance of the IS-IS routing process individually.
For IS-IS multiarea routing, you can configure only one process to perform Level2 routing, although you can define up to 29 Level 1 areas for each Cisco unit. If Level 2 routing is configured on any process, all additional processes are automatically configured as Level1. You can configure this process to perform Level 1 routing at the same time. If Level2 routing is not desired for a router instance, remove the Level2 capability using the is-type command. Use the is-type command also to configure a different router instance as a Level2 router.
To enable IS-IS, use the following commands in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router#router isis [area tag] | Enables IS-IS routing for the specified routing process, and places you in router configuration mode. Use the area tag argument to identify the area to which this IS-IS router instance is assigned. A value for tag is required if you are configuring multiple IS-IS areas. The first IS-IS instance configured is Level1-2 by default. Later instances are automatically Level1. You can change the level of routing to be performed by a particular routing process using the is-type command. |
Step2 | Router(config)#net network-entity-title | Configures NETs for the routing process. Specify an NET for each routing process if you are configuring multiarea IS-IS. You can specify a name for a NET and for an address. |
You can assign a meaningful name for the routing process by using the tag option. You can also specify a name for a NET in addition to an address. For information on how to assign a name, see the "Specifying Shortcut NSAP Addresses" section later in this chapter.
See the "IS-IS Routing Configuration Examples" section at the end of this chapter for examples of configuring IS-IS routing.
To enable CLNS routing and specify the area for each instance of the IS-IS routing process, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router#interface type number | Enters interface configuration mode. |
Step2 | Router(config-if)#clns router isis [area tag] | Specifies that the interface actively routing IS-IS when the network protocol is ISO-CLNS, and identifies the area associated with this routing process on this interface. |
Step3 | Router(config-if)#ipaddress ip-address-mask | Defines the IP address for the interface. An IP address is required on all interfaces in an area enabled for IS-IS if any one interface is configured for IS-IS routing. |
See the "IS-IS Routing Configuration Examples" section at the end of this chapter for examples of configuring IS-IS routing.
IS-IS routing supports the assignment of multiple area addresses on the same router. This concept is referred to as multihoming. Multihoming provides a mechanism for smoothly migrating network addresses, as follows:
You must statically assign multiple area addresses on a router. Cisco currently supports assignment of up to three area addresses on a router. All the addresses must have the same system ID. For example, you can assign one address (area1 plus system ID), and two additional addresses in different areas (area2 plus system ID and area3 plus system ID) where the system ID is the same. The number of areas allowed in a domain is unlimited.
A router can dynamically learn about any adjacent router. As part of this process, the routers inform each other of their area addresses. If two routers share at least one area address, the set of area addresses of the two routers are merged. A merged set cannot contain more than three addresses. If there are more than three, the three addresses with the lowest numerical values are kept, and all others are dropped.
To configure multiple area addresses in IS-IS areas, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router#router isis [area tag] | Enables IS-IS routing for the specified routing process, and places you in router configuration mode. Use the area tag argument to identify the area to which this IS-IS router instance is assigned. A value for tag is required if you are configuring multiple IS-IS areas. The first IS-IS instance configured is Level1-2 by default. Later instances are automatically Level1. You can change the level of routing to be performed by a particular routing process using the is-type command. |
Step2 | Router(config)#net network-entity-title | Configures NETs for the routing process. Specify a NET for each routing process if you are configuring multiarea IS-IS. You can specify a name for a NET and for an address. |
See the "NETs Configuration Examples" section at the end of this chapter for examples of configuring NETs and multiple area addresses.
The Cisco IS-IS implementation allows you to customize certain interface-specific IS-IS parameters. You can perform the optional tasks discussed in the following sections:
You are not required to alter any of these parameters, but some interface parameters must be consistent across all routers in the network. Therefore, be sure that if you do configure any of these parameters, the configurations for all routers on the network have compatible values.
You can configure a cost for a specified interface. The default metric is used as a value for the IS-IS metric and is assigned when there is no quality of service (QoS) routing performed. The only metric that is supported by the Cisco IOS software and that you can configure is the default-metric, which you can configure for Level 1 or Level 2 routing or both.
To configure the link-state metric, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis metric default-metric {level-1 |
level-2}
| Configure the metric (or cost) for the specified interface. |
You can specify the length of time (in seconds) between hello packets that the Cisco IOS software sends on the interface. You can also change the default hello packet multiplier used on the interface to determine the hold time sent in IS-IS hello packets (the default is 3).
The hold time determines how long a neighbor waits for another hello packet before declaring the neighbor down. This time determines how quickly a failed link or neighbor is detected so that routes can be recalculated.
To set the advertised hello interval and multiplier, use the following commands in interface configuration mode:
The hello interval can be configured independently for Level 1 and Level 2, except on serial point-to-point interfaces. (Because there is only a single type of hello packet sent on serial links, the hello packet is independent of Level 1 or Level 2.) Specify an optional level for X.25, SMDS, and Frame Relay multiaccess networks.
Use the isis hello-multiplier command in circumstances where hello packets are lost frequently and IS-IS adjacencies are failing unnecessarily. You can raise the hello multiplier and lower the hello interval (isis hello-interval command) correspondingly to make the hello protocol more reliable without increasing the time required to detect a link failure.
Complete sequence number PDUs (CSNPs) are sent by the designated router to maintain database synchronization.
To configure the IS-IS CSNP interval for the interface, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis csnp-interval seconds {level-1 |
level-2}
| Configure the IS-IS CSNP interval for the specified interface. |
The isis csnp-interval command does not apply to serial point-to-point interfaces. It does apply to WAN connections if the WAN is viewed as a multiaccess meshed network.
You can configure the number of seconds between retransmission of Link-State PDUs (LSPs) for point-to-point links.
To set the retransmission level, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis retransmit-interval seconds | Configure the number of seconds between retransmission of IS-IS LSPs for point-to-point links. |
The value you specify should be an integer greater than the expected round-trip delay between any two routers on the network. The setting of this parameter should be conservative, or needless retransmission will result. The value you determine should be larger for serial lines and virtual links.
You can configure the maximum rate (number of milliseconds between packets) at which IS-IS LSPs will be re-sent on point-to-point links This interval is different from the retransmission interval, the time between successive retransmissions of the same LSP.
To set the retransmission throttle interval, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis retransmit-throttle-interval | Configure the IS-IS LSP retransmission throttle interval. |
This command is usually unnecessary, except when very large networks contain high point-to-point neighbor counts.
You can configure the priority to use for designated router election. Priorities can be configured for Level 1 and Level 2 individually. The designated router enables a reduction in the number of adjacencies required on a multiaccess network, which in turn reduces the amount of routing protocol traffic and the size of the topology database.
To configure the priority to use for designated router election, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis priority value {level-1 |
level-2}
| Configure the priority to use for designated router election. |
It is normally not necessary to configure this feature because the IS-IS protocol automatically determines area boundaries and keeps Level 1 and Level 2 routing separate. However, you can specify the adjacency levels on a specified interface.
To configure the adjacency for neighbors on the specified interface, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis circuit-type {level-1 | level-1-2 | level-2-only} | Configure the type of adjacency desired for neighbors on the specified interface (specify the interface circuit type). |
If you specify Level 1, a Level 1 adjacency is established if there is at least one area address common to both this node and its neighbors.
If you specify both Level 1 and Level 2 (the default value), a Level 1 and 2 adjacency is established if the neighbor is also configured as both Level 1 and Level 2 and there is at least one area in common. Ifthere is no area in common, a Level 2 adjacency is established.
If you specify Level 2 only, a Level 2 adjacency is established. If the neighbor router is a Level 1 router, no adjacency is established.
You can assign different authentication passwords for different routing levels. By default, authentication is disabled. Specifying Level 1 or Level 2 enables the password only for Level 1 or Level 2 routing, respectively. If you do not specify a level, the default is Level 1.
To configure an authentication password for an interface, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
isis password password {level-1 |
level-2}
| Configure the authentication password for an interface. |
You can assign authentication passwords to areas and domains. An area password is inserted in Level1 (station router) LSPs, CSNPs, and partial sequence number PDUs (PSNPs). A routing domain authentication password is inserted in Level2 (area router) LSPs, CSNPs, and PSNPs.
To configure area or domain passwords, use the following commands in router configuration mode:
| Command | Purpose |
|---|---|
area-password password | Configure the area authentication password. |
domain-password password | Configure the routing domain authentication password. |
Limiting LSP flooding is important to IS-IS networks in general, and is not limited to configuring multiarea IS-IS networks. In a network with a high degree of redundancy, such as a fully meshed set of point-to-point links over a nonbroadcast multiaccess (NBMA) transport, flooding of LSPs can limit network scalability. You can reduce LSP flooding in two ways:
You can completely block flooding (full blocking) on specific interfaces, so that new LSPs will not be flooded out over those interfaces. However, if flooding is blocked on a large number of links, and all remaining links go down, routers cannot synchronize their link-state databases even though there is connectivity to the rest of the network. When the link-state database is no longer updated, routing loops usually result.
To use CSNPs on selected point-to-point links to synchronize the link-state database, configure a CSNP interval using the isis csnp-interval command on selected point-to-point links over which normal flooding is blocked. You should use CSNPs for this purpose only as a last resort.
Configuring mesh groups (a set of interfaces on a router) can help to limit redundant flooding. All routers reachable over the interfaces in a particular mesh group are assumed to be densely connected (each router has many links to other routers), where many links can fail without isolating one or more routers from the network.
Normally, when a new LSP is received on an interface, it is flooded out over all other interfaces on the router. When the new LSP is received over an interface that is part of a mesh group, the new LSP will not be flooded out over the other interfaces that are part of that same mesh group.
Mesh groups rely on a full mesh of links between a group of routers. If one or more links in the full mesh goes down, the full mesh is broken, and some routers might miss new LSPs, even though there is connectivity to the rest of the network. When you configure mesh groups to optimize or limit LSP flooding, be sure to select alternative paths over which to flood in case interfaces in the mesh group go down.
To minimize the possibility of incomplete flooding, you should allow unrestricted flooding over at least a minimal set of links in the mesh. Selecting the smallest set of logical links that covers all physical paths results in very low flooding, but less robustness. Ideally you should select only enough links to ensure that LSP flooding is not detrimental to scaling performance, but enough links to ensure that under most failure scenarios no router will be logically disconnected from the rest of the network.
The Cisco IS-IS implementation allows you to customize certain IS-IS parameters. You can perform the optional tasks discussed in the following sections:
It is seldom necessary to configure the IS type because the IS-IS protocol will automatically establish the IS type. However, you can configure the router to act as a Level 1 (intra-area) router, as both a Level1 router and a Level 2 (interarea) router, or as an interarea router only.
To configure the IS-IS level, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
is-type {level-1 | level-1-2 | level-2-only} | Configure the IS-IS level at which the router is to operate. |
The IS-IS protocol definition requires that a received LSP with an incorrect data-link checksum be purged by the receiver, which causes the initiator of the LSP to regenerate it. However, if a network has a link that causes data corruption while still delivering LSPs with correct data-link checksums, a continuous cycle of purging and regenerating large numbers of LSPs can occur, rendering the network nonfunctional.
To allow the router to ignore LSPs with an internal checksum error, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
ignore-lsp-errors | Ignore LSPs with internal checksum errors rather than purging the LSPs. |
You can configure IS-IS to generate a log message when an IS-IS adjacency changes state (up or down). Generating a log message may be useful when monitoring large networks. Messages are logged using the system error message facility. Messages are of the following form:
%CLNS-5-ADJCHANGE: ISIS: Adjacency to 0000.0000.0034 (Serial0) Up, new adjacency %CLNS-5-ADJCHANGE: ISIS: Adjacency to 0000.0000.0034 (Serial0) Down, hold time expired
To generate log messages when an IS-IS adjacency changes state, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
log-adjacency-changes | Log IS-IS adjacency state changes. |
Under normal conditions, the default maximum transmission unit (MTU) size should be sufficient. However, if the MTU of a link is lowered to less than 1500 bytes, the LSP MTU must be lowered accordingly on each router in the network. If LSP MTU is not lowered, routing will become unpredictable.
The MTU size must be less than or equal to the smallest MTU of any link in the network. The default size is 1497bytes.
![]() |
CautionThe CLNS MTU of a link (which is the applicable value for IS-IS, even if it is being used to route IP) may differ from the IP MTU. To be certain about a link MTU as it pertains to IS-IS, use the show clns interface command to display the value. |
To change the MTU size of IS-IS LSPs, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
lsp-mtu size | Specify the maximum LSP packet size, in bytes. |
![]() |
NoteIf any link in the network has a reduced MTU, all routers must be changed, not just the routers directly connected to the link. This rule applies for all routers in a network. |
In ISO CLNS networks using a redundant topology, it is possible for an area to become "partitioned" when full connectivity is lost among a Level1-2 border router, all adjacent Level1 routers, and end hosts. In such a case, multiple Level1-2 border routers advertise the Level1 area prefix into the backbone area, even though any one router can reach only a subset of the end hosts in the Level1 area.
When enabled, the partition avoidance command prevents this partitioning by causing the border router to stop advertising the Level1 area prefix into the Level2 backbone.
Other cases of connectivity loss within the Level1 area itself are not detected or corrected by the border router, and this command has no effect.
To enable partitioning avoidance, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
Router(config)#partition avoidance | Causes an IS-IS Level1-2 border router to stop advertising the Level1 area prefix into the Level2 backbone when full connectivity is lost among the border router, all adjacent Level1 routers, and end hosts. |
You can change the routing level configured for an area using the is-type command. If the router instance has been configured for Level1-2 area (the default for the first instance of the IS-IS routing process in a Cisco unit), you can remove Level2 (interarea) routing for the area using the is-type command and change the routing level to Level1 (intra-area). You can also configure Level2 routing for an area using the is-type command, but the instance of the IS-IS router configured for Level2 on the Cisco unit must be the only instance configured for Level2.
To change the routing level for an IS-IS routing process in a given area, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
Router (config)#is-type {level-1 |
level-1-2 | level-2-only}
| Configures the routing level for an instance of the IS-IS routing process. |
To customize display output when the multiarea feature is used, making the display easier to read, use the following command in EXEC mode:
| Command | Purpose |
|---|---|
Router#isis display delimiter [return cnt |char cnt] | Specifies the delimiter to be used to separate displays of information about individual IS-IS areas. |
For example, the following command causes information about individual areas to be separated by 14dashes (-) in the display:
isis display delimiter - 14
The output for a configuration with two Level1 areas and one Level2 area configured is as follows:
dtp-5#show clns neighbors -------------- Area L2BB: System Id Interface SNPA State Holdtime Type Protocol 0000.0000.0009 Tu529 172.21.39.9 Up 25 L1L2 IS-IS -------------- Area A3253-01: System Id Interface SNPA State Holdtime Type Protocol 0000.0000.0053 Et1 0060.3e58.ccdb Up 22 L1 IS-IS 0000.0000.0003 Et1 0000.0c03.6944 Up 20 L1 IS-IS -------------- Area A3253-02: System Id Interface SNPA State Holdtime Type Protocol 0000.0000.0002 Et2 0000.0c03.6bc5 Up 27 L1 IS-IS 0000.0000.0053 Et2 0060.3e58.ccde Up 24 L1 IS-IS
You need not explicitly specify a routing process to use static routing facilities. You can enter a specific static route and apply it globally, even if you have configured the router for ISO IGRP or IS-IS dynamic routing.
To configure a static route, perform the tasks in the following sections. Only enabling CLNS is required; the remaining tasks are optional, although you might be required to perform them depending upon your specific application.
To configure static routing, you must enable CLNS on the router and on the interface. CLNS routing is enabled on the router by default when you configure ISO IGRP or IS-IS routing protocols. NSAP addresses that start with the NSAP prefix you specify are forwarded to the next hop node.
To configure CLNS on the router, use the following commands in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | clns routing | Configure CLNS. |
Step2 | clns net {net-address | name} | Assign an NSAP address to the router if the router has not been configured to route CLNS packets dynamically using ISO IGRP or IS-IS. |
Step3 | clns route nsap-prefix {next-hop-net | name} | Enter a specific static route. |
![]() |
NoteIf you have not configured the router to route CLNS packets dynamically using ISO IGRP or IS-IS, you must assign an address to the router. |
You also must enable ISO CLNS for each interface you want to pass ISO CLNS packet traffic to end systems, but for which you do not want to perform any dynamic routing on the interface. ISO CLNS is enabled automatically when you configure IS-IS or ISO IGRP routing on an interface; however, if you do not intend to perform any dynamic routing on an interface, you must manually enable CLNS. You can assign an NSAP address for a specific interface. Assigning an NSAP address allows the Cisco IOS software to advertise different addresses on each interface. Advertising different addresses is useful if you are doing static routing and need to control the source NET used by the router on each interface.
To configure CLNS on an interface, use the following commands in interface configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | clns enable | Enable ISO CLNS for each interface. |
Step2 | clns net {nsap-address | name} | Optionally, assign an NSAP address to a specific interface. |
See the "Basic Static Routing Examples," "Static Intradomain Routing Example," and "Static Interdomain Routing Example" sections at the end of this chapter for examples of configuring static routes.
You can perform the following tasks that use variations of the clns route global configuration command:
To enter a specific static route, discard packets, or configure a default prefix, use one or all of the following commands in global configuration mode:
| Command | Purpose |
|---|---|
clns route nsap-prefix type number [snpa-address] | Enter a specific static route for a specific interface. |
clns route nsap-prefix discard | Explicitly tell the software to discard packets with the specified NSAP prefix. |
clns route default nsap-prefix type number | Configure a default prefix rather than specify an NSAP prefix. |
Conceptually, each ES lives in one area. It discovers the nearest IS by listening to ES-IS packets. Each ES must be able to communicate directly with an IS in its area.
When an ES wants to communicate with another ES, it sends the packet to any IS on the same medium.
1. The IS looks up the destination NSAP address and forwards the packet along the best route. If the destination NSAP address is for an ES in another area, the Level 1 IS sends the packet to the nearest Level 2 IS.
2. The Level 2 IS forwards the packet along the best path for the destination area until it gets to a Level2 IS that is in the destination area.
3. This IS then forwards the packet along the best path inside the area until it is delivered to the destination ES.
ESs need to know how to get to a Level 1 IS for their area, and Level 1 ISs need to know all of the ESs that are directly reachable through each of their interfaces. To provide this information, the routers support the ES-IS protocol. The router dynamically discovers all ESs running the ES-IS protocol. ESs that are not running the ES-IS protocol must be configured statically.
It is sometimes desirable for a router to have a neighbor configured statically rather than learned through ES-IS, ISO IGRP, or IS-IS.
![]() |
NoteIt is necessary to use static mapping only for ESs that do not support ES-IS. The Cisco IOS software continues to dynamically discover ESs that do support ES-IS. |
![]() |
NoteIf you have configured interfaces for ISO IGRP or IS-IS, the ES-IS routing software automatically turns on ES-IS for those interfaces. |
To enter static mapping information between the NSAP protocol addresses and the subnetwork point of attachment (SNPA) addresses (media) for ESs or ISs, use the following commands in interface configuration mode:
| Command | Purpose |
|---|---|
clns es-neighbor nsap snpa | Configure all end systems that will be used when you manually specify the NSAP-to-SNPA mapping. |
clns is-neighbor nsap snpa | Configure all intermediate systems that will be used when you manually specify the NSAP-to-SNPA mapping. |
For more information, see the "Configuring CLNS over WANs" section later in this chapter.
![]() |
NoteThe SNPA is a data link layer address (such as an Ethernet address, X.25 address, or Frame Relay DLCI address) used to configure a CLNS route for an interface. |
Perform the optional tasks in the following sections to configure miscellaneous features of an ISO CLNS network:
You can define a name-to-NSAP address mapping. This name can then be used in place of typing the long set of numbers associated with an NSAP address.
To define a name-to-NSAP address mapping, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
clns host name nsap | Define a name-to-NSAP address mapping. |
The assigned NSAP name is displayed, where applicable, in show and debug EXEC commands. However, some effects and requirements are associated with using names to represent NETs and NSAP addresses.
The clns host global configuration command is generated after all other CLNS commands when the configuration file is parsed. As a result, you cannot edit the NVRAM version of the configuration to specifically change the address defined in the original clns host command. You must specifically change any commands that refer to the original address. These changes affect all commands that accept names.
The commands that are affected by these requirements include the following:
If your router has both ISO CLNS and IP enabled, you can use the Domain Naming System (DNS) to query ISO CLNS addresses by using the NSAP address type, as documented in RFC 1348. This feature is useful for the ISO CLNS ping EXEC command and when making Telnet connections. This feature is enabled by default.
To enable or disable DNS queries for ISO CLNS addresses, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
ip domain-lookup nsap | |
no ip domain-lookup nsap | Disable DNS queries for CLNS addresses. |
You can build powerful CLNS filter expressions, or access lists. These filter expressions can be used to control either the forwarding of frames through router interfaces, or the establishment of adjacencies with, or the application of filters to, any combination of ES or IS neighbors, ISO IGRP neighbors, or IS-IS neighbors.
CLNS filter expressions are complex logical combinations of CLNS filter sets. CLNS filter sets are lists of address templates against which CLNS addresses are matched. Address templates are CLNS address patterns that are either simple CLNS addresses that match just one address, or match multiple CLNS addresses through the use of wildcard characters, prefixes, and suffixes. Frequently used address templates can be given aliases for easier reference.
To establish CLNS filters, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
clns template-alias name template | |
clns filter-set sname [permit | deny] template | Build filter sets of multiple address template permit and deny conditions. |
clns filter-expr ename term | Build filter expressions, using one or more filter sets. |
To apply filter expressions to an interface, use the following commands in interface configuration mode:
See the "CLNS Filter Examples" section at the end of this chapter for examples of configuring CLNS filters.
For IS-IS routing, redistribution of all area addresses of all Level1 areas into Level2 is implicit, and no additional configuration is required for this redistribution. Explicit redistribution between IS-IS areas cannot be configured. Redistribution from any other routing protocol into a particular area is possible, and is configured per router instance using the redistribute and route map commands. By default, redistribution is into Level2.
![]() |
NoteIt is not necessary to use redistribution between areas. Redistribution only occurs for Level2 routing. |
To configure the router to redistribute routing information into the ISO IGRP domain, use the following commands in global configuration mode:
To configure the router to redistribute routing information into the IS-IS domains, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
router isis [tag] | Specify the routing protocol and tag (if applicable) into which you want to distribute routing information. |
redistribute isis [tag] [route-map map-tag] | Specify the IS-IS routing protocol and tag (if applicable) you want to redistribute. |
![]() |
NoteBy default, static routes are redistributed into IS-IS. |
You can conditionally control the redistribution of routes between routing domains by defining route maps between the two domains. Route maps allow you to use tags in routes to influence route redistribution.
To conditionally control the redistribution of routes between domains, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
route-map map-tag {permit | deny} sequence-number | Define any route maps needed to control redistribution. |
One or more match command and one or more set commands typically follow a route-map command to define the conditions for redistributing routes from one routing protocol into another. If there are no match commands, everything matches. If there are no set commands, nothing is done (other than the match).
The match route-map configuration command has multiple formats. The match commands may be given in any order, and all defined match criteria must be satisfied to cause the route to be redistributed according to the set actions given with the set commands.
To define the match criteria for redistribution of routes from one routing protocol into another, use at least one of the following commands in route-map configuration mode:
To define set actions for redistribution of routes from one routing protocol into another, use at least one of the following commands in route-map configuration mode:
See the "Dynamic Interdomain Routing Example" and "TARP Configuration Examples" sections at the end of this chapter for examples of configuring route maps.
When multiple routing processes are running in the same router for CLNS, it is possible for the same route to be advertised by more than one routing process. The Cisco IOS software always picks the route whose routing protocol has the lowest administrative distance. The lower the value of the distance, the more preferred the route.
By default, the following administrative distances are assigned:
However, if you must change an administrative distance for a route, use the following command in router configuration mode:
| Command | Purpose |
|---|---|
distance value [clns] | Specify preferred routes by setting the lowest administrative distance. |
If you want an ISO IGRP prefix route to override a static route, you must set the distance for the routing process to be lower than 10.
You can configure ES-IS parameters for communication between end systems and routers. In general, you should leave these parameters at their default values.
When configuring an ES-IS router, be aware of the following:
The recipient of a hello packet creates an adjacency entry for the system that sent it. If the next hello packet is not received within the interval specified, the adjacency times out and the adjacent node is considered unreachable.
A default rate has been set for hello packets and packet validity; however, to change the defaults, use the following commands in global configuration mode:
A default rate has been set for the ES Configuration Timer (ESCT) option; however, to change the default, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
clns esct-time seconds | Specify how often the end system should send ES hello packet PDUs. |
DECnet Phase V cluster aliasing allows multiple systems to advertise the same system ID in end-system hello packets. The Cisco IOS software accomplishes cluster aliasing by caching multiple ES adjacencies with the same NSAP address, but different SNPA addresses. When a packet is destined for the common NSAP address, the software splits the packet loads among the different SNPA addresses. A router that supports this capability forwards traffic to each system. You can enable this capability on a per-interface basis.
To configure cluster aliases, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
clns cluster-alias | Allow multiple systems to advertise the same system ID in end-system hello packets. |
If DECnet Phase V cluster aliases are disabled on an interface, ES hello packet information is used to replace any existing adjacency information for the NSAP address. Otherwise, an additional adjacency (with a different SNPA) is created for the same NSAP address.
For an example of configuring DECnet OSI cluster aliases, see the "TARP Configuration Examples" section at the end of this chapter.
If you have an old DECnet implementation of ES-IS in which the NSAP address advertised in an IS hello packet does not have the N-selector byte present, you may want to configure the Cisco IOS software to allow IS hello packets sent and received to ignore the N-selector byte. The N-selector byte is the last byte of the NSAP address.
To enable Digital-compatible mode, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
clns dec-compatibl e | Allow IS hello packets sent and received to ignore the N-selector byte. |
By default, the Cisco IOS software discards any packets with security options set. You can disable this behavior. To allow such packets to pass through, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
clns security pass-through | Allow the software to accept any packets it sees as set with security options. |
This section provides general information about running ISO CLNS over WANs.
You can use CLNS routing on serial interfaces with High-Level Data Link Control (HDLC), PPP, Link Access Procedure, Balanced (LAPB), X.25, Frame Relay, dial-on-demand routing (DDR), or SMDS encapsulation. Both incoming and outgoing CLNS packets can be fast switched over PPP.
To use HDLC encapsulation, you must have a router at both ends of the link. If you use X.25 encapsulation, and if IS-IS or ISO IGRP is not used on an interface, you must manually enter the NSAP-to-X.121 address mapping. The LAPB, SMDS, Frame Relay, and X.25 encapsulations interoperate with other vendors.
Both ISO IGRP and IS-IS can be configured over WANs.
X.25 is not a broadcast medium and therefore does not broadcast protocols (such as ES-IS) that automatically advertise and record mappings between NSAP/NET (protocol addresses) and SNPA (media addresses). (With X.25, the SNPAs are the X.25 network addresses, or the X.121 addresses. These addresses are usually assigned by the X.25 network provider.) If you use static routing, you must configure the NSAP-to-X.121 address mapping with the x25 map command.
Configuring a serial line to use CLNS over X.25 requires configuring the general X.25 information and the CLNS-specific information. First, configure the general X.25 information. Then, enter the CLNS static mapping information.
You can specify X.25 nondefault packet and window sizes, reverse charge information, and so on. The X.25 facilities information that can be specified is exactly the same as in the x25 map interface configuration command described in the "Configuring X.25 and LAPB" chapter in the CiscoIOS Wide-Area Networking Configuration Guide.
See the "ISO CLNS over X.25 Example" section at the end of this chapter for an example of configuring CLNS over X.25.
Generally, you need not change the default settings of the router for CLNS packet switching, but there are some modifications you can make when you decide to make changes in the performance of your network. The following sections describe ISO CLNS parameters that you can change:
See the "Performance Parameters Example" section at the end of this chapter for examples of configuring various performance parameters.
Changing the MTU value with the mtu interface configuration command can affect the CLNS MTU value. If the CLNS MTU is at its maximum given the interface MTU, the CLNS MTU will change with the interface MTU. However, the reverse is not true; changing the CLNS MTU value has no effect on the value for the mtu interface configuration command.
To set the CLNS MTU packet size for a specified interface, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
clns mtu bytes | Set the MTU size of the packets sent on the interface. |
![]() |
NoteThe CTR card does not support the switching of frames larger than 4472 bytes. Interoperability problems might occur if CTR cards are intermixed with other Token Ring cards on the same network. These problems can be minimized by lowering the CLNS MTU sizes to be the same on all routers on the network. |
When the ISO CLNS routing software originates a CLNS packet, by default it generates checksums. Todisable this function, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
no clns checksum | Disable checksum generation. |
![]() |
NoteEnabling checksum generation has no effect on routing packets (ES-IS, ISO IGRP, and IS-IS) originated by the router; it applies to pings and traceroute packets. |
Fast switching through the cache is enabled by default for all supported interfaces. To disable fast switching, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
no clns route-cache |
![]() |
NoteThe cache still exists and is used after the no clns route-cache interface configuration command is used; the software does not support fast switching through the cache. |
If a router that is configured for CLNS experiences congestion, it sets the congestion-experienced bit. You can set the congestion threshold on a per-interface basis. By setting this threshold, you cause the system to set the congestion-experienced bit if the output queue has more than the specified number of packets in it.
To set the congestion threshold, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
clns congestion-threshold number |
When a CLNS packet is received, the routing software looks in the routing table for the next hop. If it does not find one, the packet is discarded and an error protocol data unit (ERPDU) is sent.
You can set an interval time between ERPDUs. Setting a minimum interval between ERDPUs can reduce the amount of bandwidth used by ERDPUs. When you set a minimum interval between ERPDUs, the Cisco IOS software does not send ERPDUs more frequently than one per millisecond on the specified interface, where milliseconds is the argument used in the clnserpdu-interval command for setting the minimal interval time between ERPDUs.
To send ERPDUs and set the minimum interval time between ERPDUs, use the following commands in interface configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | clns send-erpdu | Send an ERPDU when the routing software detects an error in a data PDU; this is enabled by default. |
Step2 | clns erpdu-interval milliseconds | Set the minimum interval time, in milliseconds, between ERPDUs. |
If a packet is sent out the same interface it came in on, a redirect protocol data unit (RDPDU) also can be sent to the sender of the packet. You can control RDPDUs in the following ways:
![]() |
NoteSNPA masks are never sent, and RDPDUs are ignored by the Cisco IOS software when the router is acting as an IS. |
To control RDPDUs, use either of the following commands in interface configuration mode:
| Command | Purpose |
|---|---|
clns send-rdpdu | Send redirect PDUs when a better route for a given host is known. |
clns rdpdu-interval milliseconds | Set the minimum interval time, in milliseconds, between RDPDUs. |
To configure parameters for packets originated by a specified router, use either of the following commands in global configuration mode:
| Command | Purpose |
|---|---|
clns packet-lifetime seconds | Specify in seconds the initial lifetime for locally generated packets. |
clns want-erpdu | Specify whether to request ERPDUs on packets originated by the router. |
You should set the packet lifetime low in an internetwork that has frequent loops.
![]() |
NoteThe clns want-erpdu global configuration command has no effect on routing packets (ES-IS, ISO IGRP, and IS-IS) originated by the router; it applies to pings and traceroute packets. |
To monitor and maintain the ISO CLNS caches, tables, and databases, use the following commands in EXEC mode:
| Command | Purpose |
|---|---|
clear clns cache | |
clear clns es-neighbors | |
clear clns is-neighbors | |
clear clns neighbors | Remove CLNS neighbor information from the adjacency database. |
clear clns route | |
ping clns {host | address} | |
show clns | |
show clns cache | |
show clns area-tag es-neighbors [type number] [detail] | Display ES neighbor entries, including the associated areas. |
show clns filter-expr [name] [detail] | |
show clns filter-set [name] | |
show clns interface [type number] | List the CLNS-specific or ES-IS information about each interface. |
show clns area-tag is-neighbors [type number] [detail] | Display IS neighbor entries, according to the area in which they are located. |
show clns area-tag neighbors [type number] [detail] | |
show clns area-tag neighbor areas | Display information about IS-IS neighbors and the areas to which they belong. |
show clns area-tag protocol [domain | area-tag] | List the protocol-specific information for each IS-IS or ISO IGRP routing process in this router. |
show clns route [nsap] | Display all the destinations to which this router knows how to route CLNS packets. |
show clns area-tag traffic | Display information about the CLNS packets this router has seen. |
show isis area-tag database [level-1] [level-2] [l1] [l2] [detail] [lspid] | |
show isis area-tag routes | |
show isis area-tag spf-log | Display a history of the shortest path first (SPF) calculations for IS-IS. |
show isis area-tag topology | Display a list of all connected routers in all areas. |
show route-map [map-name] | Display all route maps configured or only the one specified. |
trace clns destination | Discover the paths taken to a specified destination by packets in the network. |
which-route {nsap-address | clns-name} | Display the routing table in which the specified CLNS destination is found. |
Some applications (typically used by telephone companies) running on SONET devices identify these devices by a target identifier (TID). Therefore, it is necessary for the router to cache TID-to-network address mappings. Because these applications usually run over OSI, the network addresses involved in the mapping are OSI NSAPs.
When a device must send a packet to another device it does not know about (that is, it does not have information about the NSAP address corresponding to the TID of the remote device), the device needs a way to request this information directly from the device, or from an intermediate device in the network. This functionality is provided by an address resolution protocol called TID Address Resolution Protocol (TARP).
Requests for information and associated responses are sent as TARP PDUs, which are sent as Connectionless Network Protocol (CLNP) data packets. TARP PDUs are distinguished by a unique N-selector in the NSAP address. Following are the five types of TARP PDUs:
TARP can be used for a conventional IS-IS configuration with a single Level1 and a Level2 area (or configuration with a single Level1 area or a Level2 area).
If multiple Level1 areas are defined, the router resolves addresses using TARP in the following way:
1. The router obtains the NSAP of the Level2 area, if present, from the locally assigned target identifier.
2. If only Level 1 areas are configured, the router uses the NSAP of the first active Level 1 area as shown in the configuration at the time of TARP configuration ("tarp run"). (Level 1 areas are sorted alphanumerically by tag name, with capital letters coming before lowercase letters. For example, AREA-1 precedes AREA-2, which precedes area-1.) Note that the TID NSAP could change following a reload if a new Level 1 area is added to the configuration after TARP is running.
3. The router continues to process all Type 1 and 2 PDUs that are for this router. Type 1 PDUs are processed locally if the target identifier is in the local TID cache. If not, they are "propagated" (routed) to all interfaces in the same Level1 area. (The same area is defined as the area configured on the input interface.)
4. Type 2 PDUs are processed locally if the specified target identifier is in the local TID cache. If not, they are propagated via all interfaces (all Level1 or Level2 areas) with TARP enabled. If the source of the PDU is from a different area, the information is also added to the local TID cache. Type 2 PDUs are propagated via all static adjacencies.
5. Type 4 PDUs (for changes originated locally) are propagated to all Level1 and Level2 areas (because internally they are treated as "Level1-2").
6. Type 3 and 5 PDUs continue to be routed.
7. Type 1 PDUs are only "propagated" (routed) via Level1 static adjacencies if the static NSAP is in one of the Level1 areas in this router.
For several examples of configuring TARP, see the "TARP Configuration Examples" section at the end of this chapter.
The router will use the CLNS capability to send and receive TARP PDUs. If the router is configured as an IS, the router must be running IS-IS. If the router is configured as an ES, the router must be running ES-IS.
To turn on the TARP functionality, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
tarp run | Turn on the TARP functionality. |
tarp tid tid | Assign a TID to the router. |
To enable TARP on one or more interfaces, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
tarp enable | Enable TARP on the interface. |
By default, TID-to-NSAP address mappings are stored in the TID cache. Disabling this capability clears the TID cache. Reenabling this capability restores any previously cleared local entry and all static entries.
To disable TID-to-NSAP address mapping in the TID cache, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
no tarp allow-caching | Disable TARP TID-to-NSAP address mapping. |
By default, the router originates TARP PDUs and propagates TARP PDUs to its neighbors, and the interface propagates TARP PDUs to its neighbor. Disabling these capabilities means that the router no longer originates TARP PDUs, and the router and the specific interface no longer propagate TARP PDUs received from other routers.
To disable origination and propagation of TARP PDUs, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
no tarp originate | Disable TARP PDU origination. |
no tarp global-propagate | Disable global propagation of TARP PDUs. |
To disable propagation of TARP PDUs on a specific interface, use the following command in interface configuration mode:
| Command | Purpose |
|---|---|
no tarp propagate [all | message-type type-number [type-number] [type-number]] | Disable propagation of TARP PDUs on the interface. |
A router may have more than one NSAP address. When a request for an NSAP is sent (Type 1 or Type2 PDU), the first NSAP address is returned. To receive all NSAP addresses associated with the router, enter a TID-to-NSAP static route in the TID cache for each NSAP address.
To create a TID-to-NSAP static route, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
tarp map tid nsap | Enter a TID-to-NSAP static route. |
In addition to all its IS-IS/ES-IS adjacencies, a TARP router propagates PDUs to all its static TARP adjacencies. If a router is not running TARP, the router discards TARP PDUs rather than propagating the PDUs to all its adjacencies. To allow TARP to bypass routers en route that may not have TARP running, TARP provides a static TARP adjacency capability. Static adjacencies are maintained in a special queue.
To create a static TARP adjacency, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
tarp route-static nsap [all | message-type type-number [type-number] [type-number]] | Enter a static TARP adjacency. |
To stop TARP from propagating PDUs to an IS-IS/ES-IS adjacency that may not have TARP running, TARP provides a blacklist adjacency capability. The router will not propagate TARP PDUs to blacklisted routers.
To blacklist a router, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
tarp blacklist-adjacency nsap | Bypass a router not running TARP. |
To determine an NSAP address for a TID or a TID for an NSAP address, use the following commands in EXEC mode:
| Command | Purpose |
|---|---|
tarp query nsap | Get the TID associated with a specific NSAP. |
tarp resolve tid [1 | 2] | Get the NSAP associated with a specific TID. |
To determine the TID, the router first checks the local TID cache. If there is a TID entry in the local TID cache, the requested information is displayed. If there is no TID entry in the local TID cache, a TARP Type 5 PDU is sent out to the specified NSAP address.
To determine the NSAP address, the router first checks the local TID cache. If there is an NSAP entry in the local TID cache, the requested information is displayed. If there is no NSAP entry in the local TID cache, a TARP Type 1 or Type 2 PDU is sent out. By default, a Type 1 PDU is sent to all Level1 (IS-IS and ES-IS) neighbors. If a response is received, the requested information is displayed. If a response is not received within the response time, a Type 2 PDU is sent to all Level 1 and Level 2 neighbors. Specifying the tarp resolve tid 2 EXEC command causes only a Type 2 PDU to be sent.
You can configure the length of time that the router will wait for a response (in the form of a Type 3 PDU).
TARP timers provide default values and typically need not be changed.
You can configure the amount of time that the router waits to receive a response from a Type 1 PDU, a Type 2 PDU, and a Type 5 PDU. You can also configure lifetime of the PDU based on the number of hops.
You can also set timers that control how long dynamically created TARP entries remain in the TID cache, and how long the system ID-to-sequence number mapping entry remains in the loop detection buffer table. The loop detection buffer table prevents TARP PDUs from looping.
To configure TARP PDU timers, control PDU lifetime, and set how long entries remain in cache, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
tarp t1-response-timer seconds | Configure the number of seconds that the router will wait for a response from a TARP Type 1 PDU. |
tarp t2-response-timer seconds | Configure the number of seconds that the router will wait for a response from a TARP Type 2 PDU. |
tarp post-t2-response-tim er seconds | Configure the number of seconds that the router will wait for a response from a TARP Type 2 PDU after the default timer has expired. |
tarp arp-request-timer seconds | Configure the number of seconds that the router will wait for a response from a TARP Type 5 PDU. |
tarp lifetime hops | Configure the number of routers that a TARP PDU can traverse before it is discarded. |
tarp cache-timer seconds | Configure the number of seconds a dynamically created TARP entry remains in the TID cache. |
tarp ldb-timer seconds | Configure the number of seconds that a system ID-to-sequence number mapping entry remains in the loop detection buffer table. |
TARP default PDU values typically need not be changed.
To configure miscellaneous PDU information, use the following commands in global configuration mode:
| Command | Purpose |
|---|---|
tarp sequence-number number | Change the sequence number in the next outgoing TARP PDU. |
tarp urc [0 | 1] | Set the update remote cache bit in all subsequent outgoing TARP PDUs so that the remote router does or does not update the cache. |
tarp nselector-type hex-digit | Specify the N-selector used to identify TARP PDUs. |
tarp protocol-type hex-digit | Specify the protocol type used in outgoing TARP PDUs. Only Fast Ethernet (FE) (to indicate Connectionless Network Protocol (CLNP)) is supported. |
| Command | Purpose |
|---|---|
clear tarp counters | Reset the TARP counters that are shown with the show tarp traffic command. |
clear tarp ldb-table | Remove all system ID-to-sequence number mapping entries in the TARP loop detection buffer table. |
clear tarp tid-table | Remove all dynamically created TARP TID-to-NSAP address mapping entries in the TID cache. |
show tarp | Display all global TARP parameters. |
show tarp blacklisted-adjacencies | List all adjacencies that are blacklisted (that is, adjacencies that will not receive propagated TARP PDUs). |
show tarp host tid | Display information about a specific TARP router stored in the local TID cache. |
show tarp interface [type number] | List all interfaces on the router that have TARP enabled. |
show tarp ldb | Display the contents of the loop detection buffer table. |
show tarp map | List all the static entries in the TID cache. |
show tarp static-adjacencies | List all static TARP adjacencies. |
show tarp tid-cache | Display information about the entries in the TID cache. |
show tarp traffic | Display statistics about TARP PDUs. |
Figure 19 and the following example show how to configure dynamic routing within a routing domain. The router can exist in one or more areas within the domain. The router named Router A exists in a single area.

! define a tag castor for the routing process router iso-igrp castor ! configure the net for the process in area 2, domain 47.0004.004d net 47.0004.004d.0002.0000.0C00.0506.00 ! specify iso-igrp routing using the previously specified tag castor interface ethernet 0 clns router iso-igrp castor ! specify iso-igrp routing using the previously specified tag castor interface ethernet 1 clns router iso-igrp castor ! specify iso-igrp routing using the previously specified tag castor interface serial 0 clns router iso-igrp castor
Figure 20 and the following example show how to configure a router named Router A that exists in two areas.

! define a tag orion for the routing process router iso-igrp orion ! configure the net for the process in area 1, domain 47.0004.004d net 47.0004.004d.0001.212223242526.00 ! specify iso-igrp routing using the previously specified tag orion interface ethernet 0 clns router iso-igrp orion ! specify iso-igrp routing using the previously specified tag orion interface ethernet 1 clns router iso-igrp orion
The following example shows how to configure a router with overlapping areas:
! define a tag capricorn for the routing process router iso-igrp capricorn ! configure the NET for the process in area 3, domain 47.0004.004d net 47.0004.004d.0003.0000.0C00.0508.00 ! define a tag cancer for the routing process router iso-igrp cancer ! configure the NET for the process in area 4, domain 47.0004.004d net 47.0004.004d.0004.0000.0C00.0506.00 ! specify iso-igrp routing on interface ethernet 0 using the tag capricorn interface ethernet 0 clns router iso-igrp capricorn ! specify iso-igrp routing on interface ethernet 1 using the tags capricorn and cancer interface ethernet 1 clns router iso-igrp capricorn clns router iso-igrp cancer ! specify iso-igrp routing on interface ethernet 2 using the tag cancer interface ethernet 2 clns router iso-igrp cancer
Figure 21 and the following example show how to configure three domains that are to be transparently connected.

The following example shows how to configure Router Chicago for dynamic interdomain routing:
! define a tag A for the routing process router iso-igrp A ! configure the NET for the process in area 2, domain 47.0007.0200 net 47.0007.0200.0002.0102.0104.0506.00 ! redistribute iso-igrp routing information throughout domain A redistribute iso-igrp B ! define a tag B for the routing process router iso-igrp B ! configure the NET for the process in area 3, domain 47.0006.0200 net 47.0006.0200.0003.0102.0104.0506.00 ! redistribute iso-igrp routing information throughout domain B redistribute iso-igrp A ! specify iso-igrp routing with the tag A interface ethernet 0 clns router iso-igrp A ! specify iso-igrp routing with the tag B interface serial 0 clns router iso-igrp B
The following example shows how to configure Router Detroit for dynamic interdomain routing. Comment lines have been eliminated from this example to avoid redundancy.
router iso-igrp B net 47.0006.0200.0004.0102.0104.0506.00 redistribute iso-igrp C router iso-igrp C net 47.0008.0200.0005.0102.01040.506.00 redistribute iso-igrp B interface serial 0 clns router iso-igrp B interface serial 1 clns router iso-igrp C
Chicago injects a prefix route for domain A into domain B. Domain B injects this prefix route and a prefix route for domain B into domain C.
You also can configure a border router between domain A and domain C.
The following examples show the basic syntax and configuration command sequence for IS-IS routing.
The following example shows how to use the IS-IS protocol to configure a single area address for Level1 and Level 2 routing:
! route dynamically using the is-is protocol router isis ! configure the NET for the process in area 47.0004.004d.0001 net 47.0004.004d.0001.0000.0c00.1111.00 ! enable is-is routing on ethernet 0 interface ethernet 0 clns router isis ! enable is-is routing on ethernet 1 interface ethernet 1 clns router isis ! enable is-is routing on serial 0 interface serial 0 clns router isis
The following example shows a similar configuration, featuring a single area address being used for specification of Level1 and Level2 routing. However, in this case, interface serial interface0 is configured for Level2 routing only. Most comment lines have been eliminated from this example to avoid redundancy.
router isis net 47.0004.004d.0001.0000.0c00.1111.00 interface ethernet 0 clns router isis interface ethernet 1 clns router isis interface serial 0 clns router isis ! configure a level 2 adjacency only for interface serial 0 isis circuit-type level-2-only
The following example shows a mulitarea IS-IS configuration with two Level1 areas and one Level1-2 area. Figure 22 illustrates this configuration.
clns routing ... interface Tunnel529 ip address 10.0.0.5 255.255.255.0 ip router isis BB clns router isis BB interface Ethernet1 ip address 10.1.1.5 255.255.255.0 ip router isis A3253-01 clns router isis A3253-01 ! interface Ethernet2 ip address 10.2.2.5 255.255.255.0 ip router isis A3253-02 clns router isis A3253-02 ... router isis BB ! Defaults to "is-type level-1-2" net 49.2222.0000.0000.0005.00 ! router isis A3253-01 net 49.0553.0001.0000.0000.0005.00 is-type level-1 ! router isis A3253-02 net 49.0553.0002.0000.0000.0005.00 is-type level-1

The following example shows an OSI configuration example. In this example, IS-IS runs with two area addresses, metrics tailored, and different circuit types specified for each interface. Most comment lines have been eliminated from this example to avoid redundancy.
! enable is-is routing in area 1 router isis area1 ! Router is in areas 47.0004.004d.0001 and 47.0004.004d.0011 net 47.0004.004d.0001.0000.0c11.1111.00 net 47.0004.004d.0011.0000.0c11.1111.00 ! enable the router to operate as a station router and an interarea router is-type level-1-2 ! interface ethernet 0 clns router isis area1 ! specify a cost of 5 for the level-1 routes isis metric 5 level-1 ! establish a level-1 adjacency isis circuit-type level-1 ! interface ethernet 1 clns router isis area1 isis metric 2 level-2 isis circuit-type level-2-only ! interface serial 0 clns router isis area1 isis circuit-type level-1-2 ! set the priority for serial 0 to 3 for a level-1 adjacency isis priority 3 level-1 isis priority 1 level-2
The following example shows route redistribution between IS-IS and ISO IGRP domains. In this case, the IS-IS domain is on Ethernet interface 0; the ISO IGRP domain is on serial interface 0. The IS-IS routing process is assigned a null tag; the ISO IGRP routing process is assigned a tag of remote-domain. Most comment lines have been eliminated from this example to avoid redundancy.
router isis net 39.0001.0001.0000.0c00.1111.00 ! redistribute iso-igrp routing information throughout remote-domain redistribute iso-igrp remote-domain ! router iso-igrp remote-domain net 39.0002.0001.0000.0c00.1111.00 ! redistribute is-is routing information redistribute isis ! interface ethernet 0 clns router isis ! interface serial 0 clns router iso-igrp remote
The following examples show how to configure NETs for both ISO IGRP and IS-IS.
The following example shows how to specify a NET:
router iso-igrp Finance net 47.0004.004d.0001.0000.0c11.1111.00
The following example shows how to use a name for a NET:
clns host NAME 39.0001.0000.0c00.1111.00 router iso-igrp Marketing net NAME
The use of this net router configuration command configures the system ID, area address, and domain address. Only a single NET per routing process is allowed.
router iso-igrp local net 49.0001.0000.0c00.1111.00
The following example shows how to specify a single NET:
router isis Pieinthesky net 47.0004.004d.0001.0000.0c11.1111.00
The following example shows how to use a name for a NET:
clns host NAME 39.0001.0000.0c00.1111.00 router isis net NAME
The following example shows how to assign three separate area addresses for a single router using net commands. Traffic received that includes an area address of 47.0004.004d.0001, 47.0004.004d.0002, or 47.0004.004d.0003, and that has the same system ID, is forwarded to this router.
router isis eng-area1 ! |IS-IS Area|System ID|S| net 47.0004.004d.0001.0000.0C00.1111.00 net 47.0004.004d.0002.0000.0C00.1111.00 net 47.0004.004d.0003.0000.0C00.1111.00
The following two examples show how to configure a router in two areas. The first example configures ISO IGRP; the second configures IS-IS.
The following example shows the router in domain 49.0001 and having a system ID of aaaa.aaaa.aaaa. The router is in two areas: 31 and 40 (decimal). Figure 23 illustrates this configuration.

router iso-igrp test-proc1 ! 001F in the following net is the hex value for area 31 net 49.0001.001F.aaaa.aaaa.aaaa.00 router iso-igrp test-proc2 ! 0028 in the following net is the hex value for area 40 net 49.0001.0028.aaaa.aaaa.aaaa.00 ! interface ethernet 1 clns router iso-igrp test-proc1 ! interface serial 2 clns router iso-igrp test-proc1 ! interface ethernet 2 clns router iso-igrp test-proc2
The following example shows how to run IS-IS instead of ISO IGRP. The illustration in Figure 23 still applies. Ethernet interface 2 is configured for IS-IS routing and is assigned the tag of test-proc2.
router iso-igrp test-proc1 net 49.0002.0002.bbbb.bbbb.bbbb.00 router isis test-proc2 net 49.0001.0002.aaaa.aaaa.aaaa.00 ! interface ethernet 1 clns router iso-igrp test-proc1 ! interface serial 2 clns router iso-igrp test-proc1 ! interface ethernet 2 clns router is-is test-proc2
To allow CLNS packets only to blindly pass through an interface without routing updates, use the following configuration:
clns routing interface serial 2 ! permits serial 2 to pass CLNS packets without having CLNS routing turned on clns enable
Configuring FDDI, Ethernets, Token Rings, and serial lines for CLNS can be as simple as enabling CLNS on the interfaces. Enabling CLNS on the interfaces is all that is ever required on serial lines using HDLC encapsulation. If all systems on an Ethernet or Token Ring support ISO 9542 ES-IS, then no configuring is required.
The following example shows how to configure an Ethernet and a serial line:
! enable clns packets to be routed clns routing ! configure the following network entity title for the routing process clns net 47.0004.004d.0055.0000.0C00.BF3B.00 ! pass ISO CLNS traffic on ethernet 0 to end systems without routing interface ethernet 0 clns enable ! pass ISO CLNS traffic on serial 0 to end systems without routing interface serial 0 clns enable ! create a static route for the interface clns route 47.0004.004d.0099 serial 0 clns route 47.0005 serial 0
The following example is a more complete example of CLNS static routing on a system with two Ethernet interfaces. After configuring routing, you define a NET and enable CLNS on the Ethernet0 and Ethernet 1 interfaces. You must then define an ES neighbor and define a static route with the clns route global configuration command, as shown. In this situation, there is an ES on Ethernet 1 that does not support ES-IS. Figure 24 illustrates this network.

clns host sid 39.0001.1111.1111.1111.00 clns host bar 39.0002.2222.2222.2222.00 ! assign a static address for the router clns net sid ! enable CLNS packets to be routed clns routing ! pass ISO CLNS packet traffic to end systems without routing them interface ethernet 0 clns enable ! pass ISO CLNS packet traffic to end systems without routing them interface ethernet 1 clns enable ! specify end system for static routing clns es-neighbor bar 0000.0C00.62e7 ! create an interface-static route to bar for packets with the following NSAP address clns route 47.0004.000c bar
Figure 25 and the following example show how to use static routing inside of a domain. Imagine a company with branch offices in Detroit and Chicago, connected with an X.25 link. These offices are both in the domain named Sales.

The following example shows one way to configure the Router Chicago:
! define the name chicago to be used in place of the following NSAP clns host chicago 47.0004.0050.0001.0000.0c00.243b.00 ! define the name detroit to be used in place of the following NSAP clns host detroit 47.0004.0050.0002.0000.0c00.1e12.00 ! enable ISO IGRP routing of CLNS packets router iso-igrp sales ! configure net chicago, as defined above net chicago ! specify iso-igrp routing using the previously specified tag sales interface ethernet 0 clns router iso-igrp sales ! set the interface up as a DTE with X.25 encapsulation interface serial 0 encapsulation x25 x25 address 1111 x25 nvc 4 ! specify iso-igrp routing using the previously specified tag sales clns router iso-igrp sales ! define a static mapping between Detroit's nsap and its X.121 address x25 map clns 2222 broadcast
This configuration brings up an X.25 virtual circuit between the Router Chicago and the Router Detroit. Routing updates will be sent across this link. This implies that the virtual circuit could be up continuously.
If the Chicago office should grow to contain multiple routers, it would be appropriate for each of those routers to know how to get to Router Detroit. Add the following command to redistribute information between routers in Chicago:
router iso-igrp sales redistribute static
Figure 26 and the following example show how to configure two routers that distribute information across domains. In this example, Router A (in domain Orion) and Router B (in domain Pleiades) communicate across a serial link.

The following example shows how to configure Router A for static interdomain routing:
! define tag orion for net 47.0006.0200.0100.0102.0304.0506.00 router iso-igrp orion ! configure the following network entity title for the routing process net 47.0006.0200.0100.0102.0304.0506.00 ! define the tag bar to be used in place of Router B's NSAP clns host bar 47.0007.0200.0200.1112.1314.1516.00 ! specify iso-igrp routing using the previously specified tag orion interface ethernet 0 clns router iso-igrp orion ! pass ISO CLNS traffic to end systems without routing interface serial 1 clns enable ! configure a static route to Router B clns route 47.0007 bar
The following example shows how to configure Router B for static interdomain routing:
router iso-igrp pleiades ! configure the network entity title for the routing process net 47.0007.0200.0200.1112.1314.1516.00 ! define the name sid to be used in place of Router A's NSAP clns host sid 47.0006.0200.0100.0001.0102.0304.0506.00 ! specify iso-igrp routing using the previously specified tag pleiades interface ethernet 0 clns router iso-igrp pleiades ! pass ISO CLNS traffic to end systems without routing interface serial 0 clns enable ! pass packets bound for sid in domain 47.0006.0200 through serial 0 clns route 47.0006.0200 sid
CLNS routing updates will not be sent on the serial link; however, CLNS packets will be sent and received over the serial link.
The following example shows how to allow packets if the address starts with either 47.0005or47.0023. It implicitly denies any other address.
clns filter-set US-OR-NORDUNET permit 47.0005... clns filter-set US-OR-NORDUNET permit 47.0023...
The following example shows how to deny packets with an address that starts with 39.840F, but allows any other address:
clns filter-set NO-ANSI deny 38.840F... clns filter-set NO-ANSI permit default
The following example shows how to build a filter that accepts end system adjacencies with only two systems, based only on their system IDs:
clns filter-set ourfriends...0000.0c00.1234.** clns filter-set ourfriends...0000.0c00.125a.** interface ethernet 0 clns adjacency-filter es ourfriends
The following example shows how to redistribute two types of routes into the integrated IS-IS routing table (supporting both IP and CLNS). The first routes are OSPF external IP routes with tag5, and these are inserted into Level 2 IS-IS LSPs with a metric of 5. The second routes are ISO IGRP derived CLNS prefix routes that match CLNS filter expression "osifilter." These routes are redistributed into IS-IS as Level 2 LSPs with a metric of 30.
router isis redistribute ospf 109 route-map ipmap redistribute iso-igrp nsfnet route-map osimap ! route-map ipmap permit match route-type external match tag 5 set metric 5 set level level-2 ! route-map osimap permit match clns address osifilter set metric 30 clns filter-set osifilter permit 47.0005.80FF.FF00
The following example shows how to redistribute a RIP learned route for network 160.89.0.0 and an ISO IGRP learned route with prefix 49.0001.0002 into an IS-IS Level 2 LSP with a metric of 5:
router isis redistribute rip route-map ourmap redistribute iso-igrp remote route-map ourmap ! route-map ourmap permit match ip address 1 match clns address ourprefix set metric 5 set level level-2 ! access-list 1 permit 160.89.0.0 0.0.255.255 clns filter-set ourprefix permit 49.0001.0002...
The following example shows how to enable cluster aliasing for CLNS:
clns routing clns nsap 47.0004.004d.0001.0000.0C00.1111.00 router iso-igrp pleiades ! enable cluster aliasing on interface ethernet 0 interface ethernet 0 clns cluster-alias ! enable cluster aliasing on interface ethernet 1 interface ethernet 1 clns cluster-alias
The following example shows how a serial interface 1 on Router A acts as data terminal equipment (DTE) for X.25. It permits broadcasts to pass through. Router B is an IS, which has a CLNS address of 49.0001.bbbb.bbbb.bbbb.00 and an X.121 address of 31102. Router A has a CLNS address of 49.0001.aaaa.aaaa.aaaa.00 and an X.21 address of 31101. Figure 27 illustrates this configuration.

Router A
router iso-igrp test-proc net 49.0001.aaaa.aaaa.aaaa.00 ! interface serial 1 clns router iso-igrp test-proc ! assume the host is a DTE and encapsulates x.25 encapsulation x25 ! define the X.121 address of 31101 for serial 1 X25 address 31101 ! set up an entry for the other side of the X.25 link (Router B) x25 map clns 31101 broadcast
Router B
router iso-igrp test-proc net 49.0001.bbbb.bbbb.bbbb.00 ! interface serial 2 clns router iso-igrp test-proc ! configure this side as a DCE encapsulation x25-dce ! define the X.121 address of 31102 for serial 2 X25 address 31102 ! configure the NSAP of Router A and accept reverse charges x25 map clns 31101 broadcast accept-reverse
The following example shows how to set ES hello packet and IS hello packet parameters in a simple ISO IGRP configuration, along with the MTU for a serial interface:
router iso-igrp xavier net 49.0001.004d.0002.0000.0C00.0506.00 ! send IS/ES hellos every 45 seconds clns configuration-time 45 ! recipients of the hello packets keep info. in the hellos for 2 minutes clns holding-time 120 ! specify an mtu of 978 bytes; generally, do not alter the default mtu value interface serial 2 clns mtu 978
The following two sections provide basic and complex examples of TARP configuration.
The following example shows how to enable TARP on the router and interface Ethernet 0. The router is assigned the TID myname.
clns routing tarp run tarp tid myname interface ethernet 0 tarp enable
Figure 28 and the following example show how to enable TARP on Router A and on interface Ethernet 0, and assign the TID myname. A static route is created from Router A (49.0001.1111.1111.1111.00) to Router D (49.0004.1234.1234.1234.00) so that Router D can receive TARP PDUs because Router C is not TARP capable. A blacklist adjacency is also created on Router A for Router B (49.001.7777.7777.7777.00) so that Router A does not send any TARP PDUs to Router B.

clns routing tarp run tarp cache-timer 300 tarp route-static 49.0004.1234.1234.1234.00 tarp blacklist-adjacency 49.0001.7777.7777.7777.00 tarp tid myname interface ethernet 0 tarp enable
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon Jul 17 13:10:06 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.