intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The Complete IS-IS Routing Protocol- P19

Chia sẻ: Cong Thanh | Ngày: | Loại File: PDF | Số trang:8

88
lượt xem
12
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

The Complete IS-IS Routing Protocol- P19:IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks. Thus, if one is at all interested in routing, it is well worth the time and effort to learn IS-IS.

Chủ đề:
Lưu

Nội dung Text: The Complete IS-IS Routing Protocol- P19

  1. Index 533 Weaknesses in ISIS 353 Recommendations 493–494 BGP and 274–276, 481–482 Liveliness 135–136 Cisco 6 LSDB 141–142, 433 see also Link-state Common header 110 database Configuration LSPs see LSPs Basic 66–68 MAC addresses and 80 IOS 451 Messages JUNOS 452 Common header 110 Configuration examples see Configuration Hello 109–110 examples LAN hello 111 Database 142–143, 433 see also Link-state P2P hello 114 database Metrics 14, 193, 267, 294–295 301 Defined 1 Auto-bandwidth 320 DIS 113, 188 (see also DR) Auto-calculation of 319–320 And psuedonodes 183 And traffic engineering 393 Election 173, 199 Interworking issues 327 ID (JUNOS) 201–202 Example 250–253 Pre-emption 200 New-style 318 Priority 199–200 Old-style 301–302, 304–205, 327 Redundancy 202 Static 320–322 Distribution of prefixes 329–331 Wide 304, 318, 408 Encapsulation MTU size 82, 230–232 802.3 81 Checking 116 SNAP 231–232 Issues 230–232 Extended fragmentation 518–520 Multi-topology 379 Extensibility 5, 289–291 Neighbor liveliness detection 135–136 Extensions 345 NETs 92–93, 100 Flooding and TED 436 On NSFNet 3–4 Full Internet routes 469 Origin of 2–4 Future of 503 OSI-RM and 79–80 G-MPLS extensions 513–518 Overload bit 154, 156–157, 159 Graceful restart 388–389 Application 159–160 IETF and 6 Fragments and 244 Interface 80 Setting 161–163 Intergration with IP 5 Use recommended 499 IOS commands for see Commands, IOS Padding 116, 234–235 IP addresses and 102–103 Private addresses 103–104 IPv6 370 Pseudonode 153, 183, 186–187, 301 JUNOS commands for see Commands, And SPF calculation 254–256 JUNOS Representation 188 LDP and 421 Suppression of (P2P) 196 Levels System-ID selection 191–193 8-level ISIS 513–518 PSNP 208, 218, 236–238 Defined 85 And authorization 365 L1 85–87, 112, 142, 144, 155, 240, 331 Purging LSPs 172–175 L1L2 85–87, 112, 115, 156, 159, 240, Expiration of 174 331, 339 Route leaking, ISIS 87–90 L2 85–87, 112, 143–144, 146, 155, 240, Level 1 to Level 2 337 331 Level 2 to Level 1 331–334
  2. 534 Index ISIS (cont'd) Activating configuration 68–69 Route resolution 247, 273–276 Auto-completion 39 Routing policy 55, 73, 76–77, 310, 312, CLI 35, 56 336, 471–472, 477–478 see also Route Configuration examples see leaking Configuration examples, JUNOS Sample network Configuration mode 39 Addresses 8 Example 37 see also Commands, Topology 7 JUNOS Scaling 475 Help 38 LANs 183–186 ISIS and 59 Levels and 494–497 ISIS database see ISIS database Show commands see Commands ISIS implementation 37, 63–65 SNAP encapsulation 231–232 Logging 22 SPF calculations 94, 126, 144, 156, 208, Software 33 241, 247 M-series 31 Stress 479 T640 159 CPU and memory 483 JUNOS see Juniper Flooding 479 Forwarding state change 481 Kernel 23–26 SPF 480 Atomic-module 25 Synchronizing database see Link-state database, synchronization L1, L1L2, L2 see Levels TLVs see TLVs Label request object (LRO) 412 Troubleshooting 439, 460 see also Label stacking 404 Troubleshooting, commands Labels, MPLS 402 Broken adjacency 460 LAN-ID 106, 173, 200 Missing PP-OSICP 462 LANs Non-matching area-ID 465 Scaling ISIS for 183–186 Non-matching authentication 466 Synchronization on 208 Non-matching IP subnet 467 Layer 2 MPLS (cell-based MPLS) 402–404 Non-matching level 464 Layer 2 overlays 395–400 ISO 10589 Layer 3 MPLS (Packet-based MPLS) Basics 1, 3, 79, 178–179, 181 404–408 Flooding 296 LDP 408, 417–418 Hellos and LSPs 220 And ISIS 427 IPv6-IPv4 376 And RSVP-TE 428–430 Jitter 185–186 Length check, on TLVs 296–297 MTU size 234 Levels, ISIS Oddities 102, 116, 131, 156, 218 Defined 85 New-style metrics 318 L1 85–87, 112, 142, 144, 155, 240, 331 Pseudonode priority 257 L1L2 85–87, 112, 115, 156, 159, 240, 331, TLV use 345 339 Reachability information 301 L2 85–87, 112, 143–144, 146, 155, 240, ISPs 28, 102 331 Recommendations 493–494 Jitter, for timers 185 Scaling 494–497 Juniper Link-state database 37, 94, 142, 160 JNBI 77 And fragments 243 JUNOS Example 250–253
  3. Index 535 Locking 258 Metrics 14, 193, 267, 294–295 301 Modeling 193 Auto-bandwidth in ISIS 320 Size 186, 243 Auto-calculation of 319–320 Synchronization 205 And teaffic engineering 393 On LANs 208 Interworking issues 327 On P2P 216–217 ISIS example 250–253 Periodic 218 New-style 318 With CSNP PDUs 211–213 Old-style 301–302, 304–205, 327 Liveliness 135–138 RIP 205–206 Logging 22, 41 Static 320–322 In IOS 53–54 Wide 304, 318 In JUNOS 70–72 Only 408 Logical interfaces 60 Migration Login Area 90–92 IOS 42 Merging 92 JUNOS 57 Re-numbering 92 Loopback interface 44–45, 99–100, 105, 339, Splitting 92 432, 477 Modes And System-ID 490 Operator 36 LSAs (OSPF) 288–289 Configuration 36 LSDB see Link-state database MPLS 393 LSP 109, 146–147, 191, 240 cell-based (Layer 2 MPLS) 402–404 Entry TLV #9 211, 213, 236–237 For traffic engineering 402 Flooding 141–142, 164–168 Introduction to 402–408 Fragmentation 485–488 Layer 2 (cell-based MPLS) 402–404 Generation interval 178 Layer 3 (packet-based MPLS) 404–408 Purging 172–175 Labels 402 Expiration of 174 packet-based (L3 MPLS) 404–408 Revision control 146–150 Signaling 408 Sequence numbers 147–148 MTU 83, 214, 225–226 Lifetimes 149 Check 116, 234 Periodic refreshes 149 ISIS 230–232 Structure 152–153 Maximum 229, 244 Throttling 174–176 Sizes 227 Transmit interval of 176 Multi-topologies Supported TLV #229 241, LSP-IDs 105–106, 143, 152, 154, 213 379, 381–382 Multi-topology IP Reachability TLV #235 M-series 31 384 MAC address 80, 122, 196, 199, 317 Multi-topology IS Reachability TLV #222 Mask, network 97 382 Maximum length check, on TLVs 296–297 Maximum MTU 229, 244 Neighbour 15 Memory, use in ISIS 483 Discovery 109 Mesh groups 168, 218 Livliness 135 Messages, ISIS Route 270 Common header 110 NET 92–93, 103, 240 Hello 109–110 Configuring LAN hello 111 IOS 104 P2P hello 114 JUNOS 105
  4. 536 Index NET (cont'd) P2P 80, 218 Examples 104 Adjacency State TLV #240 128, 134 Selector 101 Authorization for 355 Network Hello message 114 Analysis 455–456 Over LAN 196 Design 475 Packet-based MPLS (L3 MPLS) 404–408 Mask 97 Padding TLV #8 116, 234–235 Recommendations 484 Partial SPF run 267–268 New-style metrics 318, 324–325, 327 Partition repair 155 Next-hop 14, 17, 98, 483 Path MTU discovery 229–230 NLRI 285 PDU NLPID 307, 376 CSNP 208 NLSP 5 Length 115 NLSRP 80 PSNP 208 Node ID 191, 194, 200 Penultimate router 408 Non-extensible routing protocol 283–285 Permanent interface 60 NSEL 101 PFE 31–32, 61 NSFNet 3 Physical interface 60 Meltdown 296 PICs 32, 62 Null interface 44 Policy routing 14 PRC 268 NVRAM 35, 47 Pre-emption of DIS 200 Prefix Objects, RSVP-TE 410 Distribution 329–331 Old-style metrics 301–302, 304–205, 327 Insertion 247, 276–278 Old-style TLVs IP address 97 IP reachability 304–305 Priority, DIS 199–200 IS reachability 301–302 Private addresses in ISIS 103–104 Opaque LSAs 289 Privilege level 58 Operator mode 36–39 Prompt 36, 39, 63 OS see router OS Proteon 36 OSI-RM 1, 52, 61, 76, 124, 223–225 Protocols Supported TLV #129 307, 370–371, OSPF 4 376 Areas 85, 89 Pseudonode 153, 183, 186–187, 301 AS numbers 104 And SPF calculation 254–256 DR 113 Representation 188 Extending 285–289 Suppression of (P2P) 196 Hello message 286 System-ID selection 191–193 Issues 87 PSNP 208, 218, 236–238 LSA type field 288 And authorization 365 Prefix distribution 329 Purging LSPs 172–175 Reference bandwidth 319 Expiration of 174 Routing leaking 88 Overlay network 395–397 QOS see COS Overload bit 154, 156–157, 159 Application 159–160 Reachability information 301 Fragments and 244 Recommendations Setting 161–163 Authentication 499–500 Use recommended 499 BGP for ISIS 485
  5. Index 537 Graceful restart 501 Model 15 HMAC-MD5 499–500 OS 24–26, 57 Levels 493–494 Technology example 26 Network design 484 Routes Overload bit 499 Default 497–498 Record-route object (RRO) 415 Export 312 Restart Signaling TLV #211 390 IOS 74 Revision control, of LSPs 146–150 JUNOS 75 Sequence numbers 147–148 Import 76 Lifetimes 149 Routing 12 Periodic refreshes 149 Engine 31–32, 61 RIB-in 17 Hierarchy 86–87 RIB-local 18, 30 Loop 331 RIB to FIB 19–21 Policy 41, 55, 73, 76–77, 310, 312, 336, RIP 205–206 471–472, 477–478 see also Route RFC leaking 1070 3 Protocols 281–283, 283–285 1191 229 Sub-system 22 1195 1, 292, 304, 309, 317, 329, 331, 337, Tables 17 370, 375–376 RP-FIB 18 1483 128 RSP 27 1518 97 RSVP 408–409 1918 8, 45, 104 RSVP-TE 409 2205 408 2370 285, 289 Sample network addresses 8 2961 430 Sample network topology 7 2966 329, 331, 334, 337 Sanity check, TLV 295–296 2973 168 SAR 399–400 3021 99 Scaling 3036 417 BGP 479 3209 409 LANs 183–186 3359 317 Levels and 494–497 3373 128–129 ISIS 475 3784 326, 328 With MPLS 404, 428 rollback 68 Scheduler 23–26 Route-maps 55 Atomic module 25 Route leaking, ISIS 87–90 Self-synchronization 183–184 Level 1 to Level 2 337 Shell see Commands Level 2 to Level 1 331–334 Shim header 404 Route reflector 162, 522 Show commands see Commands Route resolution 247, 273–276 SNAP header 399 Router SNP 236 see also CSNP, PSNP Access 36 Software maturation 320–322 Architecture 11, 16 SONET/SDH 124–126 Cisco 27–31 Source ID 115 Configuration file 35, 47–50 Source routing 14, 393 Control plane 19, 21 SPF Forwarding plane 18 Algorithm 248 Juniper Networks, Inc. 31–33 And pseudonodes 254–256
  6. 538 Index SPF (cont'd) On P2P 216 Calculation 83, 94, 126, 144–145, 147, Self 183–184 156, 208, 241, 247 System-ID 101–102, 112, 240, 301 CPU load 264–265, 480–481 And pseudnode 191–193 Defined 2 Duplicate 175 Diversity 257 Loopback 490 Example 249–253 Incremental 270–272 Tables Partial run 267–268 Adjacency 28 Runtime 266 CEF 27 Self-protection 259–261 Forwarding 17 Sorting 303–304 RIB-IN 17 Start shell see Commands RIB-local (RIB) 18, 30 Static LSPs 408 RIB to FIB 19–21 Static metrics 320–322 RP-FIB (FIB) 18, 30, 32 Stress 479 Routing 17 CPU and memory 483 Tagging 339 Flooding 479 Targeted hellos 430 Forwarding state change 481 Tcpdump listings SPF 480 Adjacency TLV 130 Sub-TLVs 281, 293–295 Authorization 352–253, 356, 370 And traffic engineering 427 BFD 138 Minimum and maximum length 298 BGP next-hop 273 Overrun checking 297–298 Checksum 366, 370 Shading 8 CSNP 239 Summaries DIS election 200–201 Adjacency 140 DIS purge 201 CLI 77–78 DIS redundancy 203 CSNP (and PSNPs) 222 External reachability TLV 293 Design recommendations 501–502 Full TE extensions 488 DIS 203–204 Hello timer 136 Extensions to ISIS 387, 391 Hostname 348 Fragmentation 245 Ideal LSP 484–485 Future 524–525 IP external TLV 310 ISIS basics 107–108 IPv6 371, 373 LSP basics 182 IS neighbor TLV 123 MPLS signaling 422 Jitter (of timers) 185–186 PSNP (and CSNPs) 222 JUNOS interface 73 Route leaking 344 Loopback/system-ID mapping 491 Router architecture 33–34 LSP 154–155, 236 SPF runs 279 LSP interval timer 178 TLVs 299 MTU 232 Traffic engineering 437 Multi-topology 381–382 Troubleshooting 474 Multiple IP interface addresses 315 Switching 17, 28 New-style metrics 324 VIP 29 Padding TLV 117, 118, 235 Synchronization 205 Protocols supported TLV 308–309 LSPs 214 Pseudonode 190–191 On LAN 208 Pseudonode suppression 196–197
  7. Index 539 PSNP 238 Multi-topologies Supported #229 241, Graceful restart 390 379, 381–382 RSVP-TE 410, 424, 426 Multi-topology IP Reachability #235 TE sub-TLVs 435 384 TDP (Cisco) 418 Multi-topology IS Reachability #222 TE Router ID TLV #134 427 382 TED 422, 428 P2P Adjacency State #240 128, 134 Text authorization 351 Padding #8 116, 234 Throttling LSPs 174–176 Protocols Supported #129 307, 370–371, Timers 376 Adjusting 492 Restart Signaling #211 390 Drop dead 112, 136 TE Router ID #134 427 Hello 136–137 Traceoptions 70, 132 Hold down 134 ISIS flags 451 For SPF 258 Traffic engineering 328, 393 Holding 112 Database (TED) 422, 428 Jitter for 185 DiffServ aware 435–436 TLV Objects for 410 Content pattern checking 298 Overlays 394–396 Discrete length 298 With CSPF 422 Encoding 291, 293 With MPLS 402 For extensibility 281 With RSVP-TE 409–410 Format 289–291 Transmit interval of LSPs 176 Lost of 292 Troubleshooting 41 Minimum-maximum length 297 Case studies 460 Sanity checking 295–296 Broken adjacency 460 Shading 9 Missing PP-OSICP 462 Sub-TLV 293–295 see also Sub-TLV Non-matching area-ID 465 Type Non-matching authentication 466 Area Address #1 241 Non-matching IP subnet 467 Authentication #10 211, 351 Non-matching level 464 BGP Discovery #IANA 522 CDP 50 Buffer Size #14 244 Commands for 442 Capability #242 524 Debug isis (IOS) 53, 132, 232–233 Checksum #12 365, 368 Debug isis adj-packets (IOS) 449–450, Dynamic Hostname #137 347 464, 468 Extended IP Reachability #135 318, Debug isis authentication (IOS) 467 324–325 Debug isis update-packets (IOS) 450 Extended IS Reachability #22 293, 318 Monitor (JUNOS) 451, 456 IDRP Information #131 313–314 Show clns interface (IOS) 443 IP Authentication #133 317–318 Show clns neighbor (IOS) 47 IP External Reachability #130 309, 313 Show interface (JUNOS) 463 IP Interface Address #132 131, 298, 314 Show interface pos 3/0 (IOS) 462 IP Internal Reachability #128 304 Show ip route (IOS) 445 IPv6 Reachability #236 372 Show isis adjacency (JUNOS) 446 IS Alias #24 520 Show isis database (IOS) 443 IS Neighbors #6 122, 134 Show isis database (JUNOS) 446, IS Reachability #2 109, 186, 301–302 470–471, 473 LSP Entry #9 211, 213, 236–237 Show isis interface (JUNOS) 445
  8. 540 Index Troubleshooting (cont'd) URLs Show isis spf log (JUNOS) 447 Cisco documentation 56 Show isis spf results (JUNOS) Dijkstra 248 448 Ethereal 232 Show isis spf-log (IOS) 444 FreeBSD 57 Show isis topology (IOS) 444 Show log (JUNOS) 456, 464, VIP 29, 32 447 Virtual interfaces Show route (JUNOS) 448 In JUNOS 80 Start shell (JUNOS) 457–458 Loopback 44–45, 99–100, 105, 339, 432, Configuration (JUNOS) 69 477 ISIS 439, 441 And SYS-ID 490 Flow control 440 Null 45 Tools for 441 VPN 404 MPLS 422 Network analyzer 455–456 Wander 242 System-IDs 105–106 Weight 145 Wide-metrics 304, 318 UNIX 33, 36, 57 Only 408 Un-numbered interface 100 Up/down bit 331 Y2K 149
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2