Sveriges mest populära poddar

Underlay

Episode 14 – Digging Deep into the IS-IS Routing Protocol

48 min • 18 oktober 2017

In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.

 

Show Links

https://www.iso.org/standard/30932.html

https://tools.ietf.org/html/rfc1142

https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm

 

Show Notes

  • IS-IS Characteristics
    • IS-IS is a graph
      • Vertices, edges, link types, cost
      • Uses Dijkstra’s algorithm
      • Based on Type Link Value protocol (TLV) instead of fixed type fields which allows IS-IS to be very extensible
      • Similar to OSPF, but the P-node is called the DIS, not the DR, and behaves a bit differently
      • Originally built for host routing
    • Not an IP protocol
      • direct encapsulation to L2, ethertype 0xFEFE
      • Provides some inherent security benefits (very hard to reach in and attack; OSPF solved this with TTL security)
    • QoS over L2VPNs
      • If the EFP is matching IP DSCP for QoS, ISIS may not be classified correctly. If the carrier Ethernet service is untagged, then there is no mechanism to provide QoS, notwithstanding manual Ethertype matching (not supported on all EFPs).
    • Two level hierarchy (level 1 and level 2)
      • Unlike OSPF, the two levels (areas in OSPF) can overlap
      • IS-IS levels are flooding domains
      • The two IS-IS levels can act independently enough that they can seem like two instances of a routing protocol running on top of each other
  • What does IS-IS do well? What does it do poorly?
    • What does it do well?
      • has extensive tools for handling full mesh topologies
      • new routing initiatives are based in part on IS-IS
      • Good best choice for a leaf-spine and non hub-and-spoke topologies
    • What does it do poorly?
      • Hub and Spoke topologies
      • Difficulty with QoS because it is its own protocol and not IP
  • Comparison to OSPF
    • Similarities
      • Both are link state, both have a two-tier hierarchical flooding domain
      • relatively inflexible topology/filtering options within a flooding domain
    • Differences
      • IS-IS is easier to extend to support different functions (more extensible)
      • Important: overlapping topologies can solve a lot of issues, like relatively straightforward TE issues without MPLS or fibbing. Just enable L1/L2 in specific parts of the network, assign subnets to L1 or L2, and adjust L1-specific or L2-specific costs accordingly
      • Areas in IS-IS are not like OSPF, and are mostly relevant in L1 topologies
      • The DIS in IS-IS is different from the DR in OSPF
    • Caveats
      • Two intermediate systems must be in the same area to form L1 neighbors
      • It is possible to span an IS-IS area across L1 and L2 topologies, but the AT bit won’t be set in the L1 area, potentially causing reachability issues (Depends on whether this is desirable or not)
      • A general strategy for deploying IS-IS in a network that is seen to grow is to regionalize ISIS areas.
        • For example, each regional POP can be in separate areas while the backbon
Kategorier
Förekommer på
00:00 -00:00