1 © 2000, Cisco Systems, Inc. Integrated-ISIS Route Leaking.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
Advertisements

Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
BGP Overview Processing BGP Routes.
90th IETF, Toronto, July 2014 IS-IS Route Preference for Extended IP and IPv6 Reachability draft-ginsberg-isis-route-preference-00.txt Les Ginsberg
IPv6 Static Routes Overview.
Introduction to OSPF.
Lonnie Decker Multiarea OSPF for CCNA Department Chair, Networking/Information Assurance Davenport University, Michigan August 2013 Elaine Horn Cisco Academy.
1 NANAOG24 © 2001, Cisco Systems, Inc. All rights reserved. © 2002, Cisco Systems, Inc. All rights reserved. IS-IS Deployment, Design Guidelines and New.
IPv6 Routing IPv6 Workshop Manchester September 2013
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Multiarea OSPF Scaling Networks.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 4: Intermediate System To Intermediate System.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Monitoring and Troubleshooting IBGP in a Transit AS.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Module Summary BGP has reliable transport provided by TCP, a rich set of metrics called BGP.
BGP Extensions for BIER draft-xu-idr-bier-extensions-01 Xiaohu Xu (Huawei) Mach Chen (Huawei) Keyur Patel (Cisco) IJsbrand Wijnands (Cisco)
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Introducing Routing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 4 Lesson 1 1 The IS-IS Protocol BSCI Module 4 Lesson 1 Introducing IS-IS and Integrated.
CS Summer 2003 Lecture 4. CS Summer 2003 Route Aggregation The process of representing a group of prefixes with a single prefix is known as.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Operating a Network Using Multiple IP Routing.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Configuring and Verifying.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5#-1 MPLS VPN Implementation Configuring OSPF as the Routing Protocol Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring Small-Scale Routing Protocols Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Configuring and Verifying Route Redistribution.
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
Carl Bergenhem Multi Area OSPF Carl Bergenhem
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
1 © 2001, Cisco Systems, Inc. All rights reserved.© 2003, Cisco Systems, Inc. OSPF and ISIS v6 Khalid Raza
Dynamic Routing Protocol EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol developed by Cisco.
111 What Is VLSM and Why Is It Used?. 222 Classful and Classless Routing Classful (basic subnetting) Classful routing protocols require that a single.
© 2002, Cisco Systems, Inc. All rights reserved..
Chapter 9. Implementing Scalability Features in Your Internetwork.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
1 Multilevel TRILL draft-perlman-trill-rbridge-multilevel-00.txt Radia Perlman Intel Labs March 2011.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
1 Multi Topology Routing for OSPFv3 (draft-mirtorabi-mt-ospfv3-00.txt) Sina Mirtorabi
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.0—4-1 The IS-IS Protocol Introducing IS-IS and Integrated IS-IS Routing.
Simplified Extension of LSP Space for IS-IS draft-ietf-isis-wg-extlsp-00.txt Les Ginsberg Stefano Previdi Mike Shand.
92nd IETF, Dallas, March, 2015 IS-IS Route Preference for Extended IP and IPv6 Reachability draft-ietf-isis-route-preference-00.txt Les Ginsberg
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
111 © 2003, Cisco Systems, Inc. All rights reserved. RECAP VLSM and CIDR.
57 th IETF VIENNA draft-sheng-ppvpn-isis-bgp-mpls vpn-01.txt 57 th IETF meeting IS-IS as the PE/CE Protocol in BGP/MPLS VPN draft-sheng-ppvpn-isis-bgp-mpls-00.txt.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Understanding BGP Path Attributes.
BGP Basics BGP uses TCP (port 179) BGP Established unicast-based connection to each of its BGP- speaking peers. BGP allowing the TCP layer to handle such.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Configuring and Verifying.
Advertising Global Labels or SIDs Using IS-IS draft-xu-isis-global-label-sid-advdraft-xu-isis-global-label-sid-adv-00 Xiaohu Xu (Huawei)
Extended procedures and Considerations for Loop Free Alternatives draft-chunduri-rtgwg-lfa-extended-procedures-01 Uma Chunduri Ericsson Inc. Jeff Tantsura.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
Optimizing Routing 1. Using Multiple Routing Protocols
CCNA 3 Chapter 3 Single-Area OSPF
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Multi Topology Routing (MTR) for OSPF
BGP supplement Abhigyan Sharma.
© 2002, Cisco Systems, Inc. All rights reserved.
Explicitly advertising the TE protocols enabled on links in ISIS
EVPN Interworking with IPVPN
Separating Routing Planes using Segment Routing draft-gulkohegde-spring-separating-routing-planes-using-sr-00 IETF 98 – Chicago, USA Shraddha Hegde
Computer Networks Protocols
Presentation transcript:

1 © 2000, Cisco Systems, Inc. Integrated-ISIS Route Leaking

2 © 2000, Cisco Systems, Inc. ISIS routing Levels L1L1L2L1L1L2L1 2. Level-1 LSP with IP prefix: /16 2. Level-1 LSP with IP prefix: /16 L1 1. Level-1 LSP with Attached-bit (used as a default route by all level-1routers 3. Level-2 LSP with IP prefix: /16 IP prefix: /16 Routers within an area do not have any routing information about prefixes originated outside the area. Default routing (ATT-bit or explicit /0) is used to reach destinations outside the area.

3 © 2000, Cisco Systems, Inc. ISIS routing Levels L1L2L1 L2 L1L2L1L1L2L1 1. Level-1 LSP with IP prefix: /16 4. At this point the prefix /16 will NOT be inserted in the L1 LSP (no route leaking by default) 2. Level-2 LSP with IP prefix: /16 3. Level-2 LSP with IP prefix: /16 2. At this point prefix /16 will be inserted in L2 LSP 2. At this point prefix /16 is inserted in L2 LSP 0. Level-1 LSP with ATT bit set

4 © 2000, Cisco Systems, Inc. Route Leaking New ISIS feature/capability described in draft-ietf-isis-domain-wide Allows L1L2 routers to insert in their L1 LSP IP prefixes learned from L2 database if also present in the routing table ISIS areas are not stubby anymore

5 © 2000, Cisco Systems, Inc. Route Leaking L1L2L1 L1L2 L1L1L2L1 1. Level-1 LSP with IP prefix: /16 4. At this point prefix /16 will NOT be inserted in L2 LSP since it has the Down-bit set 3. Level-1 LSP with IP prefix: /16 Up/Down-bit set 3. At this point prefix /16 will be inserted in L1 LSP since route leaking is configured AND the prefix is present in the routing table as a L2 route 2. Level-2 LSP with IP prefix: /16

6 © 2000, Cisco Systems, Inc. Route Leaking L1L2L1 L1L2 4. Level-2 LSP with IP prefix: /16 L1L2 L1L1L2L1 1. Level-1 LSP with IP prefix: /16 2. Level-2 LSP with IP prefix: /16 5. At this point the prefix /16 will NOT be inserted in the L1 LSP since a L1 route is preferred in the routing table 3. Level-1 LSP with IP prefix: /16 Up/Down-Bit set 3. Level-2 LSP with IP prefix: /16

7 © 2000, Cisco Systems, Inc. Route Leaking For IP only Prefixes MUST be present in the routing table as ISIS level-2 routes Otherwise no leaking occurs Same criteria as L1 ---> L2 Inter-area routing is done through the routing table

8 © 2000, Cisco Systems, Inc. Route Leaking Solution for several issues: optimal inter-area routing BGP shortest path to AS exit point MPLS-VPN (PEs loopback reachability)

9 © 2000, Cisco Systems, Inc. Route Leaking When leaking routes from L2 backbone into L1 areas a loop protection mechanism need to be used in order to prevent leaked routes to be re-injected into the backbone

10 © 2000, Cisco Systems, Inc. Route Leaking UP/Down bit Extended IP Reachability TLV (135) contains Up/Down bit Described in draft-ietf-isis-traffic UP/Down bit is set each time a prefix is leaked into a lower level Allows multi-level hierarchy route leaking Prefixes with Up/Down bit set are NEVER propagated to a upper level

11 © 2000, Cisco Systems, Inc. Route Leaking Route leaking works also with IP Internal Reachability Information (TLV 128) IP External Reachability Information (TLV 130) Also known as: Old-style or Narrow-metric TLVs

12 © 2000, Cisco Systems, Inc. Route Leaking TVLs 128 and 130 have a metric field that consists of 4 TOS metrics The first metric, the so-called "default metric", has the high-order bit reserved (bit 8) Routers must set this bit to zero on transmission, and ignore it on receipt The high-order bit in the default metric field in TLVs 128 and 130 becomes the Up/Down bit

13 © 2000, Cisco Systems, Inc. Route Leaking Route leaking can be used with both: IP reachability TLVs: 128 and 130 Default Metric Bit-8 is used as Up/Down bit Extended IP Reachability TLV: 135 Up/Down bit

14 © 2000, Cisco Systems, Inc. Route Leaking Route leaking is implemented in both 12.0S and 12.1 Cisco IOS 12.0S command advertise ip L2-into-L1 Cisco IOS 12.1 command redistribute isis ip level-2 into level-1 distribute-list Both commands are supported 12.0S command will be converted into 12.1 syntax

15 © 2000, Cisco Systems, Inc. Route Leaking A bit of bits history TVLs 128 and 130 have a metric field that consists of 4 TOS metrics The first metric, the so-called "default metric", has the high-order bit reserved (bit 8) Routers must set this bit to zero on transmission, and ignore it on receipt Bit 7 indicates the metric type (internal or external), and may be set to zero indicating internal metrics, or may be set to 1 indicating external metrics (only in TLV130)

16 © 2000, Cisco Systems, Inc. Route Leaking A bit of bits history However……………. Cisco IOS software BEFORE 12.1 uses bit 8 as I/E bit !!!! Since VERY early stage of ISIS implementation When doing (under “router isis”) redistribute …. metric-type external !!!!! bit 8 is set instead of bit 7 !!!!!!!

17 © 2000, Cisco Systems, Inc. Route Leaking R2 R Level-2 LSP with IP prefix: /16 2. At this point R3 (12.1) will NOT insert /16 in its L2 LSP since it considered the Up/Down bit set R1-12.0S 1. R1 (12.0S) redistributes into ISIS with “metric-type external” Therefore bit-8 is (wrongly) set 1. Level-1 LSP with IP prefix: /16 Bit-8 is set 1. Level-1 LSP with IP prefix: /16 L1L2 router using Cisco IOS from 12.1 will NOT put in L2 LSP any prefix with Up/Down bit set Even if route leaking is not configured Up/Down bit for TLVs 128, 130 and 135

18 © 2000, Cisco Systems, Inc. Route Leaking R2 R3 6. LOOP !!! 4. R1 (12.0S) Advertises the prefix back to level-2 since it doesn’t understand the Down-bit 1. Level-1 LSP with IP prefix: /16 L1L2 router using Cisco IOS 12.0S will put in L2 LSP any TLV128 or TLV130 prefix since Up/Down bit is not recognized Even if route leaking is not configured R1-12.0S 3. Level-1 LSP with IP prefix: /16 Down-bit Set (bit-8) 2. Level-2 LSP with IP prefix: /16 5. Level-2 LSP with IP prefix: /16

19 © 2000, Cisco Systems, Inc. Always use TLV-135 Configure routers with: Router isis metric-style wide Router isis metric-style wide Route Leaking Recommendation Don’t use “metric-type external” when redistributing into ISIS