< draft-previdi-isis-mi-mt-00.txt   draft-previdi-isis-mi-mt-01.txt >
INTERNET DRAFT IS-IS Multi-instance Multi-topology Jun 2006
Network Working Group S. Previdi Network Working Group S. Previdi
Internet Draft D. Ward Internet Draft L. Ginsberg
L. Ginsberg Expiration Date: Dec 2006 M. Shand
Expires: February, 2006 A. Roy A. Roy
Cisco Systems, Inc D. Ward
August, 2005 Cisco Systems
June 2006
IS-IS Multi-instance Multi-topology IS-IS Multi-instance Multi-topology
draft-previdi-isis-mi-mt-00.txt draft-previdi-isis-mi-mt-01.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
Internet-Drafts are draft documents valid for a maximum of six Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other months and may be updated, replaced, or obsoleted by other documents
documents at any time. It is inappropriate to use Internet-Drafts at any time. It is inappropriate to use Internet-Drafts as reference
as reference material or to cite them other than as "work in material or to cite them other than as "work in progress."
progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
Abstract Abstract
This draft describes a mechanism that allows a single router to This draft describes a mechanism that allows a single router to
skipping to change at page 2, line 10 skipping to change at page 1, line 44
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
Abstract Abstract
This draft describes a mechanism that allows a single router to This draft describes a mechanism that allows a single router to
share one or more links among multiple IS-IS routing protocol share one or more links among multiple IS-IS routing protocol
instances. instances.
Multiple instances allow the deployment of multiple address-families Multiple instances allow the deployment of multiple address-families
as well as multiple instances of the same address-family and it is as well as multiple instances of the same address-family and it is
an alternative to Multi-Topology IS-IS. Routers supporting the same an alternative to Multi-Topology IS-IS. Routers will form instance
instance will form adjacencies, exchange routing updates and compute specific adjacencies, exchange instance specific routing updates and
paths. Each PDU will contain a new TLV identifying the instance to compute paths utilizing instance specific LSDB information. Each PDU
which the PDU belongs. This allows a network operator to deploy will contain a new TLV identifying the instance to which the PDU
multiple IS-IS topologies in parallel, using the same set of links belongs. This allows a network operator to deploy multiple IS-IS
when required and still have the capability of computing topology topologies in parallel, using the same set of links when required
specific paths. This draft does not address the forwarding paradigm and still have the capability of computing topology specific paths.
that needs to be used in order to ensure data PDUs are forwarded This draft does not address the forwarding paradigm that needs to be
according to the topology to which they belong. used in order to ensure data PDUs are forwarded according to the
topology to which they belong.
1. Conventions used in this document Table of Contents
1. Conventions used in this document..............................2
2. Introduction...................................................2
3. Proposed Solution..............................................3
3.1 Instance Identifier..........................................3
3.2 Instance Membership..........................................3
3.3 Adjacency Establishment......................................4
3.3.1 Point-to-Point Adjacencies................................4
3.3.2 Multi-Access Adjacencies..................................4
3.4 Interoperability Considerations..............................4
3.4.1 MI-ISIS Layer 2 multicast address.........................5
3.4.2 Interoperability using p2p networks.......................5
3.4.3 Interoperability using Broadcast networks.................5
4. Security Considerations........................................6
5. IANA Considerations............................................6
6. Normative References...........................................6
7. Acknowledgments................................................6
8. Authors' Addresses.............................................7
9. Full Copyright Statement.......................................7
1. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
this document are to be interpreted as described in RFC-2119 document are to be interpreted as described in RFC-2119 [BCP14].
[KEYWORDS].
2. Introduction 2. Introduction
IS-IS has been already extended in order to support multiple "[MT-IS-IS] defines extensions to IS-IS which support multiple
topologies [MT-ISIS] through the use of additional TLVs in IIH/LSP topologies through the use of additional TLVs in IIH/LSP PDUs. [MT-
PDUs. MT-ISIS specifies that a single adjacency, single flooding IS-IS] specifies that a single adjacency, single flooding scheme,
scheme, and single LSDB are to be shared across all topologies to and single LSDB are to be shared across all topologies to which a
which a router belongs. This draft describes an alternative approach router belongs. This draft describes an alternative approach where
where multiple topologies are supported by the use of multiple multiple topologies are supported by the use of multiple independent
instances of the IS-IS protocol. Routers which support this instances of the IS-IS protocol. Routers which support this
extension are referred to as "multi-instance capable routers" extension are referred to as "multi-instance capable routers" (MI-
(MI-RTR). RTR).
3. Proposed Solution 3. Proposed Solution
The solution is based on a new TLV called the Instance Identifier The solution is based on a new TLV called the Instance Identifier
(IID) that is used to mark each routing PDU originated by the (IID) that is used to mark each IS-IS PDU originated by the router.
router. Routers form adjacencies and exchange routing updates only Routers form adjacencies and exchange routing updates only if their
if their IIDs correspond. Each topology is therefore processed IIDs correspond. Each topology is therefore processed within a
within a separate instance of the IS-IS protocol. separate instance of the IS-IS protocol.
This also implies an instance specific flooding scheme, instance This also implies an instance specific flooding scheme, instance
specific LSDBs and Instance specific routing calculations. It MAY specific LSDBs and instance specific routing calculations. It MAY
also imply instance specific routing and forwarding tables. However, also imply instance specific routing and forwarding tables. However,
this aspect is outside the scope of this specification. When this aspect is outside the scope of this specification. When
multiple instances share the same link each instance will have a multiple instances share the same link each instance will have a
separate set of adjacencies. Each IS-IS PDU is associated with separate set of adjacencies. Each IS-IS PDU is associated with only
only one IS-IS instance. one IS-IS instance.
How multiple instances are implemented is outside the scope of How multiple instances are implemented is outside the scope of this
this specification. specification.
3.1. Instance Identifier (IID) 3.1 Instance Identifier
A new TLV is defined in order to convey an instance identifier A new TLV is defined in order to convey an instance identifier
(IID). The scope of the IID is to mark each IS-IS instance running (IID). The purpose of the IID is to mark each IS-IS instance running
on a router with a unique 16-bit number. The IID TLV is carried in on a router with a unique 16-bit number. The IID TLV is carried in
all IS-IS PDUs (IIH, SNP, LSP) originated by the router. Routers all IS-IS PDUs (IIH, SNP, LSP) originated by the router. Multiple
have to exchange and agree on instance numbers so that IIDs can be instances of IS-IS may co-exist on the same network and on the same
understood consistently across adjacencies and flooding domain. The physical router. IIDs MUST be unique within the same routing domain.
following format is used for the IID:
TLV: Instance identifier #0 is reserved for the standard topology
Type: TBD supported by legacy systems.
Length: 2
Value: <16-bit number IID>
3.2 Instance Membership The following format is used for the IID:
Each router can be configured as part of one or more instances of Type TBA by IANA
IS-IS. Each instance the router belongs to will correspond to the Length 2
value advertised in the IID TLV of IS-IS PDUs originated by that Value <16-bit number IID>
instance. Only one IID can be advertised in an IIH, LSP, or SNP
PDU. PDUs with multiple IID TLVs MUST be ignored.
3.3 Adjacency Establishment 3.2 Instance Membership
Each router is configured to be participating in one or more
instances of IS-IS. For each instance in which it participates, a
router labels all IS-IS PDUs (IIH, LSP or SNP) generated pertaining
to that instance by including the appropriate IID TLV. Note that
this applies for the standard topology (instance identifier #0). A
PDU can only be labeled with a single instance identifier. PDUs with
multiple IID TLVs MUST be ignored.
3.3 Adjacency Establishment
In order to establish adjacencies, IS-IS routers exchange IIH PDUs. In order to establish adjacencies, IS-IS routers exchange IIH PDUs.
Two types of adjacencies exist in IS-IS: point-to-point and Two types of adjacencies exist in IS-IS: point-to-point and
broadcast. The following sub-sections describe the additional rules broadcast. The following sub-sections describe the additional rules
an MI-RTR MUST follow in order to establish adjacencies. an MI-RTR MUST follow when establishing adjacencies.
3.3.1 Point-to-Point Adjacencies 3.3.1 Point-to-Point Adjacencies
A new IID TLV is inserted into the p2p hello PDUs originated by an A new IID TLV is inserted into the p2p hello PDUs originated by an
MI-RTR. Upon reception of an IIH, an MI-RTR inspects the received MI-RTR. Upon reception of an IIH, an MI-RTR inspects the received
IID TLV and if it matches any of the IIDs configured on that link, IID TLV and if it matches any of the IIDs configured on that link,
normal adjacency establishment procedures are used to establish an normal adjacency establishment procedures are used to establish an
instance specific adjacency. instance specific adjacency.
This extension allows an MI-RTR to establish multiple adjacencies to This extension allows an MI-RTR to establish multiple adjacencies to
the same neighbor over a p2p link. This differs from the generic the same physical neighbor over a p2p link. This differs from the
behavior of p2p links where only one adjacency is formed. However, normal behavior on p2p links where only one adjacency is formed.
in this case IS-IS instances are "ships-in-the-night" and from a However, in this case IS-IS instances are "ships-in-the-night" and
logical perspective only one adjacency per instance is formed on from a logical perspective only one adjacency per instance is formed
p2p links. on p2p links.
3.3.2 Multi-Access Adjacencies 3.3.2 Multi-Access Adjacencies
Multi-Access (broadcast) networks behave differently than p2p in the Multi-Access (broadcast) networks behave differently than p2p in
sense that a DIS is elected. MI-RTRs will establish adjacencies and that PDUs sent by one router are visible to all routers and all
elect a DIS per IS-IS instance. Upon reception of an IIH each MI-RTR routers must agree on the election of a DIS.
will form adjacencies only with routers advertising the same IID in
their IIH PDUs. Since an MI-RTR is not required to participate in
all IIDs on a LAN, it's possible to elect a different DIS for
different instances.
3.3.3 Interoperability Considerations MI-RTRs will establish adjacencies and elect a DIS per IS-IS
instance. Upon reception of an IIH each MI-RTR will form adjacencies
only with routers advertising the same IID in their IIH PDUs. Since
an MI-RTR is not required to participate in all IIDs on a LAN, it's
possible to elect a different DIS for different instances.
3.4 Interoperability Considerations
It is assumed that any TLV that is not understood is silently It is assumed that any TLV that is not understood is silently
ignored without compromising the processing of the whole IS-IS PDU ignored without compromising the processing of the whole IS-IS PDU
(IIH, LSP, SNP). (IIH, LSP, SNP).
To a router not implementing this extension, all IS-IS PDUs received To a router not implementing this extension, all IS-IS PDUs received
will appear to be associated with the standard topology regardless will appear to be associated with the standard topology regardless
of any IID TLVs which may be contained in those PDUs. This can cause of any IID TLVs which may be contained in those PDUs. This can cause
interoperability issues, not all of which can be resolved. Therefore interoperability issues unless the mechanisms and procedures
deployment/configuration of MI-RTRs must be done prudently. MI-RTRs discussed below are followed.
may be configured to accept or not to form an adjacency with a
router not supporting this extension. In any case, only the IID zero
instance can seamlessly interoperate with routers not supporting
this extension.
3.3.3.1 Interoperability using p2p networks 3.4.1 MI-ISIS Layer 2 multicast address
MI-RTRs supporting IID #0 may interoperate over a p2p link with a In order for routers to correctly interoperate with routers not
router which does NOT support this extension. To do so, an MI-RTR implementing this extension and in order not to cause disruption, a
must refrain from sending LSPs and SNPs for instances other than specific and dedicated MAC address is used for multicasting IS-IS
IID #0 over the p2p link. It MUST also refrain from sending IIHs PDUs labeled with any non-zero IID among MI-RTRs. Each level will
for instance IDs other than zero as these IIHs may affect the state use a specific layer 2 multicast address. Such an address allows MI-
of the adjacency for IID #0 in the neighbor. RTRs to exchange IS-IS PDUs with non-zero IIDs without these PDUs
being processed by legacy routers and therefore no disruption is
caused.
An MI-RTR will exchange ISIS PDUs intended for IID #0 using AllL1IS
and AllL2IS ISIS mac layer addresses (as defined in [IS-IS]) and
will use two new (TBD) dedicated layer 2 multicast addresses (one
for each level) when sending IS-IS PDUs for any non-zero IID.
MI-RTRs MUST discard IS-IS PDUs received if either of the following
is true:
. The destination multicast address is AllL1IS or AllL2IS and the
PDU contains an IID TLV with non-zero value.
. The destination multicast address is one of the two new
addresses and the PDU contains an IID TLV with a zero value or
has no IID TLV.
3.4.2 Interoperability using p2p networks
In order for an instance on an MI-RTR which participates in the
standard topology (IID #0) to interoperate over a p2p link with a
router which does NOT support this extension, the MI-RTR MUST NOT
send IS-IS PDUs for instances other than IID #0 over the p2p link as
these PDUs may affect the state of IID #0 in the neighbor.
The presence/absence of the IID TLV in an IIH indicates that the The presence/absence of the IID TLV in an IIH indicates that the
neighbor does/does not support this extension. Once it is determined neighbor does/does not support this extension. Once it is determined
that the neighbor does not support this extension, an MI-RTR MUST that the neighbor does not support this extension, an MI-RTR MUST
NOT send PDUs (including IIHs) for instances other than IID #0. NOT send PDUs (including IIHs) for instances other than IID #0.
Until such time as the capability of the neighbor are known, an 3.4.3 Interoperability using Broadcast networks
implementation MAY send IIHs for any IID on a p2p link.
3.3.3.2 Interoperability using Multi-Access networks
The presence on a multi-access network of one or more MI-RTRs If the multicast addresses AllL1IS and/or AllL2IS are improperly
supporting one or more non-zero IIDs is incompatible with the used to send IS-IS PDUs for non-zero IIDs, legacy systems will
presence of any routers which do not support this extension. This is interpret these PDUs as being associated with IID #0. This will
because the necessary transmission of IS-IS PDUs associated with cause inconsistencies in the LSDB in those routers, may incorrectly
non-zero IIDs will be interpreted as being associated with IID #0 by maintain adjacencies, and may lead to inconsistent DIS election.
the routers not supporting this extension. Therefore, use of this
extension on a multi-access network requires that all routers are
upgraded to a software version supporting this extension. This
restriction MAY be applied independently for each level of routing
supported on the network.
4. IANA considerations 4. Security Considerations
IANA will assign a new codepoint for the MI-MT IID defined in this Security concerns for IS-IS are addressed in the IS-IS specification
document and carried within the IIH PDU. Suggest value is XX (to be [IS-IS], and accompanying specifications on [HMAC-MD5]. No
assigned by IANA). additional considerations need to be made for the extension.
5. Acknowledgments 5. IANA Considerations
The authors would like to thank Mike Shand for his valuable input. This document requires the definition a new ISIS TLV that needs to
be reflected in the ISIS TLV code-point registry:
6. Normative References Type Description IIH LSP SNP
---- ----------------------------------- --- --- ---
TBA MI-MT IID y y y
[RFC] Bradner, S., "Key words for use in RFCs to Indicate 6. Normative References
Requirement Levels," RFC 2119.
[IS-IS] "Intermediate System to Intermediate System Intra-Domain [IS-IS] ISO, "Intermediate system to Intermediate system routeing
Routeing Exchange Protocol for use in Conjunction with the Protocol information exchange protocol for use in conjunction with the
for Providing the Connectionless-mode Network Service (ISO 8473)", Protocol for providing the Connectionless-mode Network Service
ISO 10589. (ISO 8473)," ISO/IEC 10589:2002, Second Edition.
[IS-IS-IP] Callon, R., RFC 1195, "Use of OSI IS-IS for routing in [MT-IS-IS] Pryzgienda, T., Shen, N., and Sheth, N., "Multi
TCP/IP and dual environments", RFC 1195, December 1990. Topology (MT) Routing in IS-IS", draft-ietf-isis-wg-multi-
topology-11.txt (work in progress), October 2005.
[HMAC-MD5] Li, T. and R. Atkinson, "Intermediate System to [HMAC-MD5] Li, T. and R. Atkinson, "Intermediate System to
Intermediate System (IS-IS) Cryptographic Authentication", RFC 3567, Intermediate System (IS-IS) Cryptographic Authentication", RFC
July 2003. 3567, July 2003.
[MT-IS-IS] Przygienda, T., Shen, N., and N. Sheth, "M-ISIS: Multi [BCP9] Bradner, S., "The Internet Standards Process -- Revision
Topology (MT) Routing in IS-IS", draft-ietf-isis-wg-multi-topology- 3", BCP 9, RFC 2026, October 1996.
10.txt, May 2005.
7. Security Considerations [BCP14] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997
Security concerns for IS-IS are addressed in the IS-IS specification [BCP26] Narten, T. and Alvestrand, H., "Guidelines for Writing an
[IS-IS], and accompanying specifications on [HMAC-MD5]. No IANA Considerations Section in RFCs", BCP 26 , RFC 2434, October
additional considerations need to be made for the extension. 1998
8. Authors' Addresses [BCP79] Bradner, S. Ed., "Intellectual Property Rights in IETF
Technology ", BCP 79 , RFC 3979, March 2005
7. Acknowledgments
The authors would like to acknowledge contributions made by Dino
Farinacci.
8. Authors' Addresses
Stefano Previdi Stefano Previdi
CISCO Systems, Inc.
Via Del Serafico 200
00142 - Roma
ITALY
Email: sprevidi@cisco.com
Les Ginsberg
Cisco Systems Cisco Systems
Via Del Serafico, 200 510 McCarthy Blvd.
00142 Rome, Italy Milpitas, Ca. 95035 USA
sprevidi@cisco.com Email: ginsberg@cisco.com
Dave Ward Abhay Roy
Cisco Systems Cisco Systems
170 W. Tasman Dr. 170 W. Tasman Dr.
San Jose, CA 95134 USA San Jose, CA 95134 USA
dward@cisco.com akr@cisco.com
Les Ginsberg Mike Shand
Cisco Systems Cisco Systems
170 W. Tasman Dr. 250 Longwater Avenue,
San Jose, CA 95134 USA Reading,
ginsberg@cisco.com Berkshire,
RG2 6GB
UK
Email: mshand@cisco.com
Abhay Roy Dave Ward
Cisco Systems Cisco Systems
170 W. Tasman Dr. 170 W. Tasman Dr.
San Jose, CA 95134 USA San Jose, CA 95134 USA
akr@cisco.com dward@cisco.com
9. IPR Disclaimer 9. Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph
are included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights. it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79. documents can be found in BCP 78 and BCP 79.
skipping to change at page 7, line 13 skipping to change at line 374
attempt made to obtain a general license or permission for the use attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr. at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf- this standard. Please address the information to the IETF at ietf-
ipr@ietf.org. ipr@ietf.org.
10. Full Copyright Statement
Copyright (C) The Internet Society (2005).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
11. Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
This document expires in February, 2006.
 End of changes. 57 change blocks. 
139 lines changed or deleted 236 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/