IS-IS
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
| OSI model by layer |
|---|
Intermediate System to Intermediate System (IS-IS, also written ISIS) is a link-state interior gateway protocol (IGP) used to exchange routing information within a network. Routers share network topology information so they can find the most efficient paths for data. IS-IS is typically deployed within a single autonomous system and is used in large enterprise and service provider networks.
The IS-IS protocol is defined in ISO/IEC 10589:2002[2][3] as an international standard within the Open Systems Interconnection (OSI) reference design.
Description
[edit]IS-IS is an interior gateway protocol, designed for use within an administrative domain or network. This is in contrast to exterior gateway protocols, primarily Border Gateway Protocol (BGP), which is used for routing between autonomous systems.[4]
IS-IS is a link-state routing protocol, operating by flooding link state information throughout a network of routers. Each IS-IS router builds its own link-state database (LSDB) by collecting the flooded link-state information from other routers. Like OSPF, IS-IS uses Dijkstra's algorithm for computing the best path through the network. Packets (datagrams) are then forwarded along the computed shortest paths to their destinations.
History
[edit]IS-IS was developed by Digital Equipment Corporation as part of DECnet Phase V.
The Internet Engineering Task Force (IETF) published an IS-IS specification in 1990[5], but that RFC was later retracted and marked as historic[6] because it republished a draft rather than a final version of the International Organization for Standardization (ISO) standard, causing confusion.
The protocol was standardized by ISO in 1992 as ISO 10589 for use between Intermediate Systems rather than end systems or hosts. The purpose of IS-IS was to make the routing of datagrams possible using the ISO-developed OSI protocol stack called Connectionless-mode Network Service (CLNS). IS-IS was developed at roughly the same time that the Internet Engineering Task Force IETF was developing a similar protocol called OSPF. IS-IS was later extended to support routing of datagrams in the Internet Protocol (IP), the network-layer protocol of the global Internet. This extension is known as Integrated IS-IS.[7]
By 2005, IS-IS had become the de facto standard for large service provider network backbones.[8]
IS-IS terminology
[edit]The ISO IS-IS standard defines its own terminology for network components, some of which differs from the terms usually found in the industry.
- Intermediate System: A Router
- Designated Intermediate System: An IS selected to represent other ISs on a shared circuit.
- End System (ES): A host or device that does not participate in routing.
- Circuit: A Layer 2 broadcast domain. Such as a point-to-point link, or a LAN.
- Adjacency: A neighboring IS that an IS exchanges routing information with.
Packet types
[edit]IS-IS operates over broadcast (LAN) and point-to-point, over which adjacencies are formed.
- IS-IS Hello PDU (IIH)
- IS-IS Hello PDUs are exchanged periodically to establish and maintain adjacencies. On broadcast networks, a Designated Intermediate System (DIS) is elected based on interface priority and system ID. This hello packet will be sent separately for Level 1 or Level 2. There are three IS-IS hello packets depending on the circuit type.
- LAN L1 (PDU type 15)
- LAN L2 (PDU type 16)
- P2P (PDU type 17). On point-to-point links, there are no separate hello packets per level like there are on broadcast links. Unlike OSPF, IS-IS does not require matching hello intervals, although significant mismatches may affect adjacency stability.
- Link State PDU (LSP)
- This contains the actual routing information. The LSP contains a number of fields called type–length–values (TLVs), which contain the routing data. Each LSP is identified by an LSP ID and consists of a System ID, Pseudonode ID and Fragment ID. In this example LSP with ID 1921.6820.0002.02-01,
- 1921.6820.0002 is the System ID (that generated this LSP),
- 02 is the Pseudonode ID,
- 01 is the Fragment ID.
- If the Pseudonode ID is equal to zero, then it represents a real intermediate system. Any non-zero value means that the LSP is generated by a DIS (Pseudonode).
- If an LSP exceeds the maximum transmission unit (MTU), it is fragmented into multiple LSPs distinguished by a Fragment ID. Fragment numbering begins at zero; an unfragmented LSP consists of a single fragment (ID 0), while additional fragments are assigned incrementing identifiers.
- Complete Sequence Number PDU (CSNP)
- This packet will be sent only by the DIS. By default, every 10 seconds, a CSNP packet will be transmitted by the DIS. The CSNP contains the list of LSP IDs along with sequence number and checksum.
- Partial Sequence Number PDU (PSNP)
- If a router detects discrepancies between its link-state database and a received CSNP, it sends a PSNP requesting the missing or updated LSPs.
IS-IS addressing and NET
[edit]Unlike most IP routing protocols, IS-IS operates directly over Layer 2 rather than relying on Layer 3 for transport, and does not use IP addresses to identify interfaces.
Instead, IS-IS identifies interfaces using Layer 2 addresses (SNPA, e.g. MAC addresses on Ethernet), and identifies routing nodes using ISO network addresses.
Each Intermediate System is assigned a Network Entity Title (NET), which is an NSAP address used to identify the router within the IS-IS routing domain. A NET is an NSAP used as a Network Entity Title where the NSEL field is set to zero.
While not required by the protocol, a common operational practice is to set the System ID field to a unique IPv4 address from one of the router’s loopback interfaces.
On a single intermediate system there can be up to 3 NET addresses. This may be useful during migration of an IS from one area to another.
The NET consists of an Area, System ID and NSEL field. Area itself consists of an AFI (Address Family Identifier) and an Area ID.
Area can have a variable length of 1–13 bytes. The System ID is six bytes long and the NSEL is one byte.
As an example, the fields of the ISO Network Address "49.0100.1921.6821.1138.00" are as follows:
- 49 is the AFI. 49 specifically represents the "private address space", similar to RFC1918 for IPv4.,
- 0100 is the Area ID,
- 49.0100 is the Area,
- 1921.6821.1138 is the System ID,
- 00 is the NSEL, which must be zero. Routers will not form adjacencies with routers with a non-zero NSEL in their NET, as that field is only used by the NSAP.
Hostname resolution
[edit]When administrating large networks, using IP addresses directly is often difficult and inconvenient.
Network engineers generally prefer to use domain names like "if-bundle-22-2.qcore1.pye-paris.as6453.net" to identify routers, as they contain more relevant and human-readable information.
Other routing protocols which principally identify routers using IP addresses can easily solve this problem using local DNS resolution.
Because IS-IS is not an IP-based protocol, it has hostname resolution built into the standard. Link-state PDUs can carry a Type Length Value 137 (TLV 137) field, which contains a hostname associated with a NET.[9]
Areas and levels
[edit]Similar to OSPF, IS-IS employs the concept of areas to divide the network, reducing the overall burden on routers in the network, by only requiring them to have complete link-state information for their area.
In IS-IS, ISs operate at Level 1, Level 2 or Level 1/Level 2.
- Level 1 routers are internal to an area, and only maintain a Link State Database (LSDB) for that area.
- Level 2 routers form the backbone of an IS-IS network, and route traffic between areas. They maintain a separate Level 2 LSDB for inter-area routing. Level 2 routers must be contiguous, meaning the network of Level 2 routers must be fully internally routable without crossing into different areas.
- Level 1/Level 2 routers are on the boundaries between Level 1 and Level 2 routers, and participate in both intra-area and inter-area routing, maintaining separate Level 1 and Level 2 LSDBs.
When a Level 1 router needs to send traffic to a destination not within its area, it directs it to a Level 1/Level 2 router.
Level 1/Level 2 routers advertise their status as boundary routers by setting the Attached Bit (ATT), in its Level 1 LSP. Routers that receive this LSP will add a default route to the origin of the LSP.
External routes can be redistributed to Level 1 areas, including their Level 1/Level 2 routers. However, by default, external routes will not be redistributed to Level 2 routers. To change this policy, Level 1/Level 2 routers must be configured to originate these external routes to the Level 2 network.
Attribute bits in LSPs
[edit]IS-IS LSPs contain information about the LSP itself in the attribute block of the LSP header, which is 8 bits long.
- P bit – Partition repair bit, 8th bit, indicates if a partitioned Level 1 area can be repaired (joined) over Level 2 area. Modern deployments of IS-IS generally do not support partition repair, and will not set the P bit.
- ATT bit – Attached bit, 7th–4th bits, indicates if the originating router is attached to another area.
- If these bits are set by the Level 1/Level 2 router in its Level 1 LSP, other routers in the Level 1 area will automatically generate a default route to the originator.
- There are 4 ATT bits which represent the Error, Expense, Delay and Default metrics respectively.
- Typically, only the 4th (default) ATT bit is used, as typical IS-IS networks only use the Default (Cost) metric.
- OL bit – Overload bit, 3rd bit, indicates if the router is overloaded.
- If this bit is set, then this router will not be forwarded traffic. However, it will be still reachable.
- The overload bit can be set automatically by a router under heavy load or intentionally by an administrator.
- Operators commonly use the overload bit during maintenance to temporarily prevent transit traffic from being forwarded through a router.
- The overload bit may also be set while a router waits for other dependent protocols (such as BGP) to establish neighborship, before allowing traffic to be routed to itself. This may be desirable because IS-IS converges much faster than some dependent protocols, and a router that becomes available before another dependent routing protocol converges, the router could become a traffic black hole.
- An example of this behavior is a provider edge router running an MPLS VPN with IS-IS and BGP. After the router boots, it establishes IS-IS adjacency before it finishes establishing BGP neighborship with other routers. When BGP is finished establishing neighborship, the overload bit is cleared and this router joins the MPLS VPN.
- IS type bits – 2nd and 1st bits, indicate the IS type of the originator. It can be Level 1 only, Level 2 only, or Level 1/Level 2.
- 01 – Level 1
- 10 – Level 2
- 11 – Level 1/Level 2
Wide metrics
[edit]When IS-IS was initially introduced, TLVs for IS reachability (TLV 2) and IP reachability (TLVs 128 and 130) could have an interface metric of no more than 63 (6 bits) and total accumulated path metric of no more than 1023 (10 bits).
Over time, networks outgrew the constraints imposed by these metrics as speeds and hop-counts increased with better hardware.
To allow for these larger networks 2 new TLVs – TLV 22 for Extended IS reachability and TLV 135 for Extended IP reachability – were introduced.
These additions to the protocol allowed link metrics up to 16.7 million (24 bits) and total accumulated path metric up to 4 billion (32 bits).
Metrics without TLV 22 and 135 are called narrow, and metrics that include them are called wide.[10]
Wide metrics or narrow metrics can be set on a per-level basis.
Adjacency formation
[edit]Compared to OSPF, IS-IS rules of adjacency formation are much simpler and depend primarily on the router level.
- A Level 1 router cannot form any adjacency with Level 2 router.
- A Level 1 router can form a Level 1 adjacency with other Level 1 router in the same area.
- A Level 1 router can form a Level 1 adjacency with Level 1/Level 2 router in the same area
- A Level 2 router can form a Level 2 adjacency with other Level 2 routers regardless of their areas.
- A Level 2 router can form a Level 2 adjacency with a Level 1/Level 2 router regardless of their areas.
- A Level 1/Level 2 router can form both Level 1 and Level 2 adjacencies with other Level 1/Level 2 routers if their areas match.
Broadcast segments and designated intermediate system
[edit]Similar to OSPF, all routers in a broadcast domain need to form adjacencies and exchange LSPs, resulting in there being LSPs for each router in the domain.
In order to overcome this issue, on each LAN segment a designated intermediate system (DIS) is elected. The router with the highest priority and System ID is elected as the DIS, but if another router is connected with a higher priority (or higher System ID if the priorities are equal), will be elected as the new DIS.
Instead of each router forming an adjacency with every other router in the broadcast domain, each router forms an adjacency with just the DIS, and the DIS becomes responsible for relaying LSPs to the subordinate routers, in a hub-and-spoke topology.
An elected DIS router is a pseudonode, which uses the resources (including System ID) of one real router.
The Pseudonode ID in LSPs originated by a DIS, always have a non-zero Pseudonode ID field.
The DIS will send periodic CSNPs on the LAN segment and reply to PSNPs from other routers.
If the DIS stops communicating, a new DIS will be elected in the segment.
Authentication
[edit]IS-IS supports both simple password and MD5 authentication types. In IS-IS, per-level or per-interface authentication is possible.
In addition, to protect from a replay attack, IS-IS uses an increasing sequence number in the IIH.
IPv6 support and multi-topology
[edit]Unlike OSPF, which operates at Layer 3, IS-IS encapsulates its PDUs into Layer 2 frames, and does not depend on Layer 3 protocols, such as IPv4 or IPv6.
In order to support IPv6 routing information TLV 232 for IPv6 interface address and TLV 236 for IPv6 reachability were added.
In order to display supported Layer 3 protocols, also called NLPID (Network Layer Protocol ID), TLV 129 is used. Here, IPv4 has code of 0xCC, while IPv6 has a code of 0x8E.
There might be an issue, if the IPv4 and IPv6 topologies do not overlap. This could happen due to misconfiguration or lack of support for IPv6 by routers in the network. For this situations, multi-topology support is added to IS-IS.
TLV 229 was added to indicate support for multi-topologies, such as IPv4 unicast and IPv6 unicast.
If multi-topology is enabled, IS-IS will calculate separate SPF tree for IPv4 and IPv6. This means twice the resource usage, but from the other side, this prevents traffic black holes.
When multi-topology is enabled, then IS-IS will use TLV 222 for Multi-topology IS reachability, TLV 235 for Multi-topology IP reachability and TLV 236 for Multi-topology IPv6 reachability.
IS-IS path selection
[edit]Depending on the configuration, the router can have Level 1, Level 2 or both Level 1/Level 2 Link-State Databases. IS-IS uses Dijkstra's algorithm to generate the routing tables from these databases.
But there can be situations, when IS-IS router has exactly the same prefix in different level databases, or external and internal. In order to choose best path in this situations, there is a specific order in which the route goes from the most preferred to the least preferred:
- L1 intra-area with internal metric,
- L1 external with internal metric,
- L2 intra-area with internal metric,
- L2 external with internal metric,
- Inter-area (from L1 to L2) with internal metric,
- Inter-area external (from L1 to L2) with internal metric,
- Inter-area (from L2 to L1) with internal metric,
- Inter-area external (from L2 to L1) with internal metric,
- L1 external with external metric,
- L2 external with external metric,
- Inter-area external (from L1 to L2) with external metric,
- Inter-area external (from L2 to L1) with external metric.
BFD support
[edit]IS-IS uses Hello packets (IIH) to share information about routers and to establish adjacencies. Hello packets also help detect faults between neighboring routers.
Fault detection can be sped up by lowering the hello packet transmission intervals, but this increases CPU load.
As an alternative, BFD can be used. BFD is a low-overhead fault detection protocol that operates independently of the routing protocol and can provide sub-second detection with minimal impact on the CPU.
Other uses
[edit]IS-IS is the base for the control plane in Shortest Path Bridging (SPB). SPB enables equal-cost multipath routing among Ethernet switches in a mesh topology: Ethernet frames are forwarded along multiple load-balanced, service-specific paths, which are all equally the shortest. To support this, SPB extends IS-IS with new TLVs.[11]
Related protocols
[edit]References
[edit]- ^ "X.225 : Information technology – Open Systems Interconnection – Connection-oriented Session protocol: Protocol specification". Archived from the original on 1 February 2021. Retrieved 10 March 2023.
- ^ "ISO/IEC 10589:2002 – Information technology – Telecommunications and information exchange between systems – Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473)". ISO website. International Organization for Standardization (ISO). November 2002. Retrieved May 24, 2017.
- ^ "Free-of-charge PDF copy of ISO/IEC 10589:2002". ISO website. International Organization for Standardization. Retrieved May 24, 2017.
- ^ J. Hawkinson; T. Bates (March 1996). Guidelines for creation, selection, and registration of an Autonomous System (AS). Network Working Group. doi:10.17487/RFC1930. BCP 6. RFC 1930. Best Current Practice 6. Updated by RFC 6996 and 7300.
- ^ D. Oran, ed. (February 1990). OSI IS-IS Intra-domain Routing Protocol. Network Working Group. doi:10.17487/RFC1142. RFC 1142. Historic. Obsoleted by RFC 7142.
- ^ M. Shand; L. Ginsberg (February 2014). Reclassification of RFC 1142 to Historic. Internet Engineering Task Force. doi:10.17487/RFC7142. ISSN 2070-1721. RFC 7142. Informational. Obsoletes RFC 1142.
- ^ R. Callon (December 1990). Use of OSI IS-IS for Routing in TCP/IP and Dual Environments. Network Working Group. doi:10.17487/RFC1195. RFC 1195. Proposed Standard. Updated by RFC 1349, 5304 and 5302.
- ^ Gredler, Hannes; Goraiski, Walter (2005). The complete IS-IS routing protocol. Springer. p. 1. ISBN 1-85233-822-9.
- ^ "Intermediate System-to-Intermediate System (IS-IS) TLVs". Cisco. Retrieved 2025-06-23.
- ^ "Understanding Wide IS-IS Metrics for Traffic Engineering | Junos OS | Juniper Networks". www.juniper.net. Retrieved 2025-06-23.
- ^ D. Allan; N. Bragg; P. Unbehagen (April 2011). D. Fedyk; P. Ashwood-Smith (eds.). IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging. Internet Engineering Task Force. doi:10.17487/RFC6329. ISSN 2070-1721. RFC 6329. Proposed Standard.
External links
[edit]- IS-IS standard (ISO/IEC 10589:2002, Second Edition) – free-of-charge PDF version
- OSPF and IS-IS: A Comparative Anatomy by Dave Katz, Juniper
- Collection of RFCs pertaining to IS-IS Archived 2013-06-02 at the Wayback Machine
- IS-IS and OSPF difference discussion (Vishwas Manral, Manav Bhatia and Yasuhiro Ohara)
- Google Quagga IS-IS implementation
- Sample isisd.conf file: used with Quagga
- IS-IS route preference for Extended IP and IPv6 Reachability