system to intermediate system (ISIS) instance on a network element. The method may further
include instantiating a secondary ISIS instance on the network element. The method may
also include configuring the primary ISIS instance and the secondary ISIS instance to
appear as a single ISIS instance to other network elements remote to the network element.