Weaknesses in ISIS 353
BGP and 274–276, 481–482
Cisco 6
Common header 110
Configuration
Basic 66–68
IOS 451
JUNOS 452
Configuration examples see Configuration
examples
Database 142–143, 433 see also Link-state
database
Defined 1
DIS 113, 188 (see also DR)
And psuedonodes 183
Election 173, 199
ID (JUNOS) 201–202
Pre-emption 200
Priority 199–200
Redundancy 202
Distribution of prefixes 329–331
Encapsulation
802.3 81
SNAP 231–232
Extended fragmentation 518–520
Extensibility 5, 289–291
Extensions 345
Flooding and TED 436
Full Internet routes 469
Future of 503
G-MPLS extensions 513–518
Graceful restart 388–389
IETF and 6
Interface 80
Intergration with IP 5
IOS commands for see Commands, IOS
IP addresses and 102–103
IPv6 370
JUNOS commands for see Commands,
JUNOS
LDP and 421
Levels
8-level ISIS 513–518
Defined 85
L1 85–87, 112, 142, 144, 155, 240, 331
L1L2 85–87, 112, 115, 156, 159, 240,
331, 339
L2 85–87, 112, 143–144, 146, 155, 240,
331
Recommendations 493–494 Liveliness 135–136
LSDB 141–142, 433 see also Link-state
database
LSPs see LSPs
MAC addresses and 80 Messages
Common header 110 Hello 109–110 LAN hello 111 P2P hello 114 Metrics 14, 193, 267, 294–295 301 Auto-bandwidth 320
Auto-calculation of 319–320 And traffic engineering 393 Interworking issues 327 Example 250–253 New-style 318 Old-style 301–302, 304–205, 327 Static 320–322
Wide 304, 318, 408 MTU size 82, 230–232 Checking 116 Issues 230–232 Multi-topology 379 Neighbor liveliness detection 135–136 NETs 92–93, 100
On NSFNet 3–4 Origin of 2–4 OSI-RM and 79–80 Overload bit 154, 156–157, 159 Application 159–160 Fragments and 244 Setting 161–163 Use recommended 499 Padding 116, 234–235 Private addresses 103–104 Pseudonode 153, 183, 186–187, 301 And SPF calculation 254–256 Representation 188
Suppression of (P2P) 196 System-ID selection 191–193 PSNP 208, 218, 236–238 And authorization 365 Purging LSPs 172–175 Expiration of 174 Route leaking, ISIS 87–90 Level 1 to Level 2 337 Level 2 to Level 1 331–334
Trang 2ISIS (cont'd)
Route resolution 247, 273–276
Routing policy 55, 73, 76–77, 310, 312,
336, 471–472, 477–478 see also Route
leaking
Sample network
Addresses 8
Topology 7
Scaling 475
LANs 183–186
Levels and 494–497
Show commands see Commands
SNAP encapsulation 231–232
SPF calculations 94, 126, 144, 156, 208,
241, 247
Stress 479
CPU and memory 483
Flooding 479
Forwarding state change 481
SPF 480
Synchronizing database see Link-state
database, synchronization
TLVs see TLVs
Troubleshooting 439, 460 see also
Troubleshooting, commands
Broken adjacency 460
Missing PP-OSICP 462
Non-matching area-ID 465
Non-matching authentication 466
Non-matching IP subnet 467
Non-matching level 464
ISO 10589
Basics 1, 3, 79, 178–179, 181
Flooding 296
Hellos and LSPs 220
IPv6-IPv4 376
Jitter 185–186
MTU size 234
Oddities 102, 116, 131, 156, 218
New-style metrics 318
Pseudonode priority 257
TLV use 345
Reachability information 301
ISPs 28, 102
Jitter, for timers 185
Juniper
JNBI 77
JUNOS
Activating configuration 68–69 Auto-completion 39
CLI 35, 56
Configuration examples see
Configuration examples, JUNOS Configuration mode 39
Example 37 see also Commands,
JUNOS Help 38 ISIS and 59
ISIS database see ISIS database
ISIS implementation 37, 63–65 Logging 22
Software 33 M-series 31 T640 159
JUNOS see Juniper
Kernel 23–26
Atomic-module 25
L1, L1L2, L2 see Levels
Label request object (LRO) 412 Label stacking 404
Labels, MPLS 402 LAN-ID 106, 173, 200 LANs
Scaling ISIS for 183–186 Synchronization on 208 Layer 2 MPLS (cell-based MPLS) 402–404 Layer 2 overlays 395–400
Layer 3 MPLS (Packet-based MPLS) 404–408
LDP 408, 417–418 And ISIS 427 And RSVP-TE 428–430 Length check, on TLVs 296–297 Levels, ISIS
Defined 85 L1 85–87, 112, 142, 144, 155, 240, 331 L1L2 85–87, 112, 115, 156, 159, 240, 331, 339
L2 85–87, 112, 143–144, 146, 155, 240, 331
Recommendations 493–494 Scaling 494–497
Link-state database 37, 94, 142, 160 And fragments 243
Example 250–253
Trang 3Locking 258
Modeling 193
Size 186, 243
Synchronization 205
On LANs 208
On P2P 216–217
Periodic 218
With CSNP PDUs 211–213
Liveliness 135–138
Logging 22, 41
In IOS 53–54
In JUNOS 70–72
Logical interfaces 60
Login
IOS 42
JUNOS 57
Loopback interface 44–45, 99–100, 105, 339,
432, 477
And System-ID 490
LSAs (OSPF) 288–289
LSDB see Link-state database
LSP 109, 146–147, 191, 240
Entry TLV #9 211, 213, 236–237
Flooding 141–142, 164–168
Fragmentation 485–488
Generation interval 178
Purging 172–175
Expiration of 174
Revision control 146–150
Sequence numbers 147–148
Lifetimes 149
Periodic refreshes 149
Structure 152–153
Throttling 174–176
Transmit interval of 176
LSP-IDs 105–106, 143, 152, 154, 213
M-series 31
MAC address 80, 122, 196, 199, 317
Mask, network 97
Maximum length check, on TLVs 296–297
Maximum MTU 229, 244
Memory, use in ISIS 483
Mesh groups 168, 218
Messages, ISIS
Common header 110
Hello 109–110
LAN hello 111
P2P hello 114
Metrics 14, 193, 267, 294–295 301 Auto-bandwidth in ISIS 320 Auto-calculation of 319–320 And teaffic engineering 393 Interworking issues 327 ISIS example 250–253 New-style 318 Old-style 301–302, 304–205, 327 RIP 205–206
Static 320–322 Wide 304, 318 Only 408 Migration Area 90–92 Merging 92 Re-numbering 92 Splitting 92 Modes Operator 36 Configuration 36 MPLS 393 cell-based (Layer 2 MPLS) 402–404 For traffic engineering 402
Introduction to 402–408 Layer 2 (cell-based MPLS) 402–404 Layer 3 (packet-based MPLS) 404–408 Labels 402
packet-based (L3 MPLS) 404–408 Signaling 408
MTU 83, 214, 225–226 Check 116, 234 ISIS 230–232 Maximum 229, 244 Sizes 227
Multi-topologies Supported TLV #229 241,
379, 381–382 Multi-topology IP Reachability TLV #235 384
Multi-topology IS Reachability TLV #222 382
Neighbour 15
Discovery 109 Livliness 135 Route 270 NET 92–93, 103, 240 Configuring IOS 104 JUNOS 105
Trang 4NET (cont'd)
Examples 104
Selector 101
Network
Analysis 455–456
Design 475
Mask 97
Recommendations 484
New-style metrics 318, 324–325, 327
Next-hop 14, 17, 98, 483
NLRI 285
NLPID 307, 376
NLSP 5
NLSRP 80
Node ID 191, 194, 200
Non-extensible routing protocol 283–285
NSEL 101
NSFNet 3
Meltdown 296
Null interface 44
NVRAM 35, 47
Objects, RSVP-TE 410
Old-style metrics 301–302, 304–205, 327
Old-style TLVs
IP reachability 304–305
IS reachability 301–302
Opaque LSAs 289
Operator mode 36–39
OS see router OS
OSI-RM 1, 52, 61, 76, 124, 223–225
OSPF 4
Areas 85, 89
AS numbers 104
DR 113
Extending 285–289
Hello message 286
Issues 87
LSA type field 288
Prefix distribution 329
Reference bandwidth 319
Routing leaking 88
Overlay network 395–397
Overload bit 154, 156–157, 159
Application 159–160
Fragments and 244
Setting 161–163
Use recommended 499
P2P 80, 218
Adjacency State TLV #240 128, 134 Authorization for 355
Hello message 114 Over LAN 196 Packet-based MPLS (L3 MPLS) 404–408 Padding TLV #8 116, 234–235
Partial SPF run 267–268 Partition repair 155 Path MTU discovery 229–230 PDU
CSNP 208 Length 115 PSNP 208 Penultimate router 408 Permanent interface 60 PFE 31–32, 61 Physical interface 60 PICs 32, 62 Policy routing 14 PRC 268 Pre-emption of DIS 200 Prefix
Distribution 329–331 Insertion 247, 276–278
IP address 97 Priority, DIS 199–200 Private addresses in ISIS 103–104 Privilege level 58
Prompt 36, 39, 63 Proteon 36 Protocols Supported TLV #129 307, 370–371, 376
Pseudonode 153, 183, 186–187, 301 And SPF calculation 254–256 Representation 188
Suppression of (P2P) 196 System-ID selection 191–193 PSNP 208, 218, 236–238 And authorization 365 Purging LSPs 172–175 Expiration of 174
QOS see COS
Reachability information 301
Recommendations Authentication 499–500 BGP for ISIS 485
Trang 5Graceful restart 501
HMAC-MD5 499–500
Levels 493–494
Network design 484
Overload bit 499
Record-route object (RRO) 415
Restart Signaling TLV #211 390
Revision control, of LSPs 146–150
Sequence numbers 147–148
Lifetimes 149
Periodic refreshes 149
RIB-in 17
RIB-local 18, 30
RIB to FIB 19–21
RIP 205–206
RFC
1070 3
1191 229
1195 1, 292, 304, 309, 317, 329, 331, 337,
370, 375–376
1483 128
1518 97
1918 8, 45, 104
2205 408
2370 285, 289
2961 430
2966 329, 331, 334, 337
2973 168
3021 99
3036 417
3209 409
3359 317
3373 128–129
3784 326, 328
rollback 68
Route-maps 55
Route leaking, ISIS 87–90
Level 1 to Level 2 337
Level 2 to Level 1 331–334
Route reflector 162, 522
Route resolution 247, 273–276
Router
Access 36
Architecture 11, 16
Cisco 27–31
Configuration file 35, 47–50
Control plane 19, 21
Forwarding plane 18
Juniper Networks, Inc 31–33
Model 15
OS 24–26, 57 Technology example 26 Routes
Default 497–498 Export 312 IOS 74 JUNOS 75 Import 76 Routing 12 Engine 31–32, 61 Hierarchy 86–87 Loop 331 Policy 41, 55, 73, 76–77, 310, 312, 336,
471–472, 477–478 see also Route
leaking Protocols 281–283, 283–285 Sub-system 22
Tables 17 RP-FIB 18 RSP 27 RSVP 408–409 RSVP-TE 409
Sample network addresses 8
Sample network topology 7 Sanity check, TLV 295–296 SAR 399–400
Scaling BGP 479 LANs 183–186 Levels and 494–497 ISIS 475
With MPLS 404, 428 Scheduler 23–26 Atomic module 25 Self-synchronization 183–184
Shell see Commands
Shim header 404
Show commands see Commands
SNAP header 399
SNP 236 see also CSNP, PSNP
Software maturation 320–322 SONET/SDH 124–126 Source ID 115 Source routing 14, 393 SPF
Algorithm 248 And pseudonodes 254–256
Trang 6SPF (cont'd)
Calculation 83, 94, 126, 144–145, 147,
156, 208, 241, 247
CPU load 264–265, 480–481
Defined 2
Diversity 257
Example 249–253
Incremental 270–272
Partial run 267–268
Runtime 266
Self-protection 259–261
Sorting 303–304
Start shell see Commands
Static LSPs 408
Static metrics 320–322
Stress 479
CPU and memory 483
Flooding 479
Forwarding state change 481
SPF 480
Sub-TLVs 281, 293–295
And traffic engineering 427
Minimum and maximum length 298
Overrun checking 297–298
Shading 8
Summaries
Adjacency 140
CLI 77–78
CSNP (and PSNPs) 222
Design recommendations 501–502
DIS 203–204
Extensions to ISIS 387, 391
Fragmentation 245
Future 524–525
ISIS basics 107–108
LSP basics 182
MPLS signaling 422
PSNP (and CSNPs) 222
Route leaking 344
Router architecture 33–34
SPF runs 279
TLVs 299
Traffic engineering 437
Troubleshooting 474
Switching 17, 28
VIP 29
Synchronization 205
LSPs 214
On LAN 208
On P2P 216 Self 183–184 System-ID 101–102, 112, 240, 301 And pseudnode 191–193 Duplicate 175
Loopback 490
Tables
Adjacency 28 CEF 27 Forwarding 17 RIB-IN 17 RIB-local (RIB) 18, 30 RIB to FIB 19–21 RP-FIB (FIB) 18, 30, 32 Routing 17
Tagging 339 Targeted hellos 430 Tcpdump listings Adjacency TLV 130 Authorization 352–253, 356, 370 BFD 138
BGP next-hop 273 Checksum 366, 370 CSNP 239
DIS election 200–201 DIS purge 201 DIS redundancy 203 External reachability TLV 293 Full TE extensions 488 Hello timer 136 Hostname 348 Ideal LSP 484–485
IP external TLV 310 IPv6 371, 373
IS neighbor TLV 123 Jitter (of timers) 185–186 JUNOS interface 73 Loopback/system-ID mapping 491 LSP 154–155, 236
LSP interval timer 178 MTU 232
Multi-topology 381–382 Multiple IP interface addresses 315 New-style metrics 324
Padding TLV 117, 118, 235 Protocols supported TLV 308–309 Pseudonode 190–191
Pseudonode suppression 196–197
Trang 7PSNP 238
Graceful restart 390
RSVP-TE 410, 424, 426
TE sub-TLVs 435
TDP (Cisco) 418
TE Router ID TLV #134 427
TED 422, 428
Text authorization 351
Throttling LSPs 174–176
Timers
Adjusting 492
Drop dead 112, 136
Hello 136–137
Hold down 134
For SPF 258
Holding 112
Jitter for 185
TLV
Content pattern checking 298
Discrete length 298
Encoding 291, 293
For extensibility 281
Format 289–291
Lost of 292
Minimum-maximum length 297
Sanity checking 295–296
Shading 9
Sub-TLV 293–295 see also Sub-TLV
Type
Area Address #1 241
Authentication #10 211, 351
BGP Discovery #IANA 522
Buffer Size #14 244
Capability #242 524
Checksum #12 365, 368
Dynamic Hostname #137 347
Extended IP Reachability #135 318,
324–325
Extended IS Reachability #22 293, 318
IDRP Information #131 313–314
IP Authentication #133 317–318
IP External Reachability #130 309, 313
IP Interface Address #132 131, 298, 314
IP Internal Reachability #128 304
IPv6 Reachability #236 372
IS Alias #24 520
IS Neighbors #6 122, 134
IS Reachability #2 109, 186, 301–302
LSP Entry #9 211, 213, 236–237
Multi-topologies Supported #229 241,
379, 381–382 Multi-topology IP Reachability #235 384
Multi-topology IS Reachability #222 382
P2P Adjacency State #240 128, 134 Padding #8 116, 234
Protocols Supported #129 307, 370–371, 376
Restart Signaling #211 390
TE Router ID #134 427 Traceoptions 70, 132 ISIS flags 451 Traffic engineering 328, 393 Database (TED) 422, 428 DiffServ aware 435–436 Objects for 410 Overlays 394–396 With CSPF 422 With MPLS 402 With RSVP-TE 409–410 Transmit interval of LSPs 176 Troubleshooting 41
Case studies 460 Broken adjacency 460 Missing PP-OSICP 462 Non-matching area-ID 465 Non-matching authentication 466 Non-matching IP subnet 467 Non-matching level 464 CDP 50
Commands for 442 Debug isis (IOS) 53, 132, 232–233 Debug isis adj-packets (IOS) 449–450,
464, 468 Debug isis authentication (IOS) 467 Debug isis update-packets (IOS) 450 Monitor (JUNOS) 451, 456 Show clns interface (IOS) 443 Show clns neighbor (IOS) 47 Show interface (JUNOS) 463 Show interface pos 3/0 (IOS) 462 Show ip route (IOS) 445 Show isis adjacency (JUNOS) 446 Show isis database (IOS) 443 Show isis database (JUNOS) 446, 470–471, 473
Show isis interface (JUNOS) 445
Trang 8Troubleshooting (cont'd)
Show isis spf log (JUNOS) 447
Show isis spf results (JUNOS)
448
Show isis spf-log (IOS) 444
Show isis topology (IOS) 444
Show log (JUNOS) 456, 464,
447
Show route (JUNOS) 448
Start shell (JUNOS) 457–458
Configuration (JUNOS) 69
ISIS 439, 441
Flow control 440
Tools for 441
MPLS 422
Network analyzer 455–456
System-IDs 105–106
UNIX 33, 36, 57
Un-numbered interface 100
Up/down bit 331
URLs Cisco documentation 56 Dijkstra 248
Ethereal 232 FreeBSD 57
VIP 29, 32
Virtual interfaces
In JUNOS 80 Loopback 44–45, 99–100, 105, 339, 432, 477
And SYS-ID 490 Null 45
VPN 404
Wander 242
Weight 145 Wide-metrics 304, 318 Only 408
Y2K 149