When the show isis adjacency
command is executed, it shows only the system ID but not the ISIS neighbor's hostname.
This article gives a possible reason and suggests what should be done to resolve the problem.
ISIS adjacency is up but the show isis adjacency
command output does not show the neighbor's hostname. It shows its system ID instead. Further, the local router is seen to have not learned the neighbor's hostname.
Example Topology
< R60 > ----- ISIS level 2 ------ < R69>
Output of show
isis adjacency
root@r69> show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/3.0 1280.4910.3060 2 Up 6 0:5:86:68:b:4 . << System ID is showing here instead of hostname.
root@r69> run show isis hostname
IS-IS hostname database:
System ID Hostname Type
1280.4910.3069 r69 Static << Hostname cache has only the router's hostname.
This symptom could be caused by mismatched authentication keys between the two routers. It can happen when establishing ISIS adjacencies between Juniper devices and devices from other vendors, which may configure the ISIS authentication key in a different location or at a different level.
In Junos OS, ISIS authentication keys can be configured under isis
level
or isis
interface
as shown in the example below:
set protocols isis level 2 authentication-key "$9$SvtyK87-wsgJ"
set protocols isis level 2 authentication-type md5
set protocols isis interface ge-0/0/3 level 2 hello-authentication-key "$9$90kxCpBcSe8X-IE7V"
set protocols isis interface ge-0/0/3 level 2 hello-authentication-type md5
In the above example, there are two authentication keys being used by R69 for ISIS domain level authentication and interface hello authentication. If the peer device can configure only one ISIS authentication key or one of the authentication keys does not match with R69, it may result in successful hello authentication but failed LSP authentication.
In such a scenario, ISIS adjacency will come up because the hello packets are being accepted. However, the R60's LSPs are dropped by R69 due to authentication failure. Because ISIS hostname is carried in ISIS LSP packets, R69 is not able to learn the peer device's hostname and the output described in the symptom section is observed.
Check the ISIS LSP database on the local router to see if it has learned the peer's device's ISIS LSP.
user@host> show isis database
IS-IS level 2 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
<peer device system ID or hostname> 0x644 0x53f7 2952 L1 L2 <<< Check if the peer device’s LSP is installed in the local ISIS LSP database.
If the peer device's LSP is not in the ISIS database, check the number of authentication keys required from both sides and make sure that all authentication keys are matching.
router isis <instance>
lsp-password hmac-md5 encrypted <key 2>
router isis <instance>
interface <interface-name> hello-password hmac-md5 encrypted <key 1>
set protocols isis level 2 authentication-key <key 2>
set protocols isis interface <interface-name> level 2 hello-authentication-key <key 1>