Re: POP Quiz 2

From: David Luu (wicked01@xxxxxxxxxxxxx)
Date: Thu May 30 2002 - 05:04:32 GMT-3


   
i have not tested any of the following config, but here it is anyways along
with the answers to the questions...

you use route leaking
RFC 2966
12.1 and 12.0T - TLV 128, 130, 135
12.0S - TLV 135

12.1 and 12.0T
--------------------------
router isis
redistribute isis ip level-2 into level-1 distribute-list #
metric-style wide

access-list 150 permit ip loopback's-ip any

12.0S
--------------------------
router isis
advertise ip l2-into-l1 access-list#
metric-style wide

access-list 150 permit ip loopback's-ip any

At 04:28 PM 5/30/2002 +1000, Jason Sinclair wrote:
>All,
>
>Sorry for being slack but here is POP Quiz 2 as discussed.
>
>Topology:
>
>R1---------r2---------------r3
>
>1. Routing protocol is ISIS
>2. R1-r2 is level 2, r2-r3 is level 1. I want to see the loopback ip
>address on r1 on r3 and not just a default route.
>3. There is a way to do this in 12.0S and a different way to do this on
>12.0T, 12.1 and higher.
>4. Send me the appropriate configs from router 2.
>5. Send me the name this techniques is known as.
>6. Send me the RFC number this is detailed in.
>7. Send me the TLV types that are used to do this.
>
>Cheers for this week,
>
>Jason
>
>
>**********************************************************************
>PowerTel Limited, winners of
>Broadband Wholesale Carrier of the year, CommsWorld Telecomms Awards 2001
>Best Emerging Telco, Australian Telecom Awards 2001
>
>**********************************************************************
>This email (including all attachments) is intended solely for the named
>addressee. It is confidential and may contain commercially sensitive
>information. If you receive it in error, please let us know by reply email,
>delete it from your system and destroy any copies.
>
>This email is also subject to copyright. No part of it should be reproduced,
>adapted or transmitted without the prior written consent of the copyright
>owner.
>
>Emails may be interfered with, may contain computer viruses or other defects
>and may not be successfully replicated on other systems. We give no
>warranties in relation to these matters. If you have any doubts about
>the authenticity of an email purportedly sent by us, please contact us
>immediately.
>
>**********************************************************************



This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:59:12 GMT-3