< draft-ietf-isis-wg-multi-topology-11.txt   draft-ietf-isis-wg-multi-topology-12.txt >
Network Working Group Tony Przygienda Internet Draft Tony Przygienda
Internet Draft Naiming Shen (Cisco) prz@net4u.ch
<draft-ietf-isis-wg-multi-topology-11.txt> Nischal Sheth (Juniper) Naiming Shen
October 2005 Cisco Systems
Expires: April 2006 Nischal Sheth
Juniper Networks
Expires: May 2008 November 5, 2007
Intended Status: Proposed Standard
M-ISIS: Multi Topology (MT) Routing in IS-IS M-ISIS: Multi Topology (MT) Routing in IS-IS
<draft-ietf-isis-wg-multi-topology-12.txt>
Status of This Memo Status of This Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as other groups may also distribute working documents as Internet-
Internet-Drafts. Drafts.
Internet-Drafts are draft documents valid for a maximum of six Internet-Drafts are draft documents valid for a maximum of six months
months and may be updated, replaced, or obsoleted by other and may be updated, replaced, or obsoleted by other documents at any
documents at any time. It is inappropriate to use Internet-Drafts time. It is inappropriate to use Internet-Drafts as reference
as reference material or to cite them other than as "work in material or to cite them other than as "work in progress."
progress".
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract Abstract
This draft describes an optional mechanism within ISIS used today This document describes an optional mechanism within ISIS used today
by many ISPs for IGP routing within their clouds. This draft by many ISPs for IGP routing within their clouds. This document
describes how to run within a single ISIS domain a set of describes how to run within a single ISIS domain a set of
independent IP topologies that we call Multi-Topologies (MTs). independent IP topologies that we call Multi-Topologies (MTs).
This MT extension can be used for variety of purposes such as an This MT extension can be used for variety of purposes such as an
in-band management network ``on top'' of the original IGP topology, in-band management network ``on top'' of the original IGP topology,
maintain separate IGP routing domains for isolated multicast or maintain separate IGP routing domains for isolated multicast or
IPv6 islands within the backbone, or force a subset of an address IPv6 islands within the backbone, or force a subset of an address
space to follow a different topology. space to follow a different topology.
Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1. Introduction 1. Introduction
Maintaining multiple MTs for ISIS [ISO10589 , RFC1195] in a Maintaining multiple MTs for ISIS [ISO10589] [RFC1195] in a
backwards-compatible manner necessitates several extensions to the backwards-compatible manner necessitates several extensions to the
packet encoding and additional SPF procedures. The problem can packet encoding and additional SPF procedures. The problem can
be partitioned into forming of adjacencies, and advertising of be partitioned into forming of adjacencies, and advertising of
prefixes and reachable intermediate systems within each topology. prefixes and reachable intermediate systems within each topology.
Having put all the necessary additional information in place, it Having put all the necessary additional information in place, it
must be properly used by MT capable SPF computation. The following must be properly used by MT capable SPF computation. The following
sections describe each of the problems separately. To simplify the sections describe each of the problems separately. To simplify the
text, ``standard'' ISIS topology is defined to be MT ID #0 (zero). text, "standard" ISIS topology is defined to be MT ID #0 (zero).
1.1 Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1.2 Definitions of Terms Used in This Document
CSNP Complete Sequence Number Packet. Used to describe all the
contents of a link state database of IS-IS.
DIS Designated Intermediate System. The intermediate system
elected to advertise the pseudonode for a broadcast
network.
IIH IS-IS Hello. Packets that are used to discover adjacent
intermediate systems.
LSP Link State Packet. Packet generated by an intermediate
system and lists adjacent systems, prefixes and other
information.
PSNP Partial Sequence Number Packet. Used to request information
from an adjacent intermediate system's link state
database.
SPF Shortest Path First. An algorithm that takes a database
of nodes within a domain and builds a tree of connectivity
along the shortest paths through the entire network.
2. Maintaining MT Adjacencies 2. Maintaining MT Adjacencies
Each adjacency formed MUST be classified as belonging to a set of Each adjacency formed MUST be classified as belonging to a set of
MTs on the interface. This is achieved by adding a new TLV into MTs on the interface. This is achieved by adding a new TLV into
IIH packets that advertises which topologies the interface belongs IIH packets that advertises which topologies the interface belongs
to. If MT #0 is the only MT on the interface, it is optional to to. If MT #0 is the only MT on the interface, it is optional to
advertise it in the new TLV. Thus not including such a TLV in the advertise it in the new TLV. Thus not including such a TLV in the
IIH implies MT ID #0 capability only. Through this exchange of MT IIH implies MT ID #0 capability only. Through this exchange of MT
capabilities, a router is able to advertise the IS TLVs in LSPs capabilities, a router is able to advertise the IS TLVs in LSPs
with common MT set over those adjacencies. with common MT set over those adjacencies.
In the case of adjacency contains multiple MTs on an interface, and In the case of adjacency contains multiple MTs on an interface, and
if there exists overlapping IP address space among the topologies, if there exists overlapping IP address space among the topologies,
additional mechanism MAY be used to resolve the topology identity of additional mechanism MUST be used to resolve the topology identity
the incoming IP packets on the interface. of the incoming IP packets on the interface. See more discussion in
section 8.2.2 of this document.
2.1. Forming Adjacencies on Point-to-Point Interfaces 2.1. Forming Adjacencies on Point-to-Point Interfaces
Adjacencies on point-to-point interfaces are formed as usual with Adjacencies on point-to-point interfaces are formed as usual with
ISIS routers not implementing MT extensions. If local router does ISIS routers not implementing MT extensions. If local router does
not participate in certain MTs, it will not advertise those MTIDs not participate in certain MTs, it will not advertise those MTIDs
in its IIHs and thus will not include that neighbor within it's in its IIHs and thus will not include that neighbor within it's
LSPs. On the other hand, if a MTID is not detected in remote LSPs. On the other hand, if a MTID is not detected in remote
side's IIHs, the local router MUST NOT include that neighbor side's IIHs, the local router MUST NOT include that neighbor
within its LSPs. The local router SHOULD NOT form an adjacency if within its LSPs. The local router SHOULD NOT form an adjacency if
skipping to change at page 3, line 39 skipping to change at page 4, line 18
special TLVs in the pseudo-node LSPs nor run distinct DIS elections special TLVs in the pseudo-node LSPs nor run distinct DIS elections
per MT. Therefore, a generated pseudo-node LSP by DIS MUST contain per MT. Therefore, a generated pseudo-node LSP by DIS MUST contain
in its IS Reachable TLV all nodes on the LAN as usual regardless in its IS Reachable TLV all nodes on the LAN as usual regardless
of their MT capabilities. In other words, there is no change to the of their MT capabilities. In other words, there is no change to the
pseudo-node LSP construction. pseudo-node LSP construction.
4. MTs and Overload, Partition and Attached Bits 4. MTs and Overload, Partition and Attached Bits
A router could for each of the MTs become potentially A router could for each of the MTs become potentially
partitioned, overloaded and attached independently. To prevent partitioned, overloaded and attached independently. To prevent
unnecessary complexity, MT extensions does not support unnecessary complexity, MT extensions does not support MT based
partition repair. The overload, partition and attached bits in LSP partition repair. The overload, partition and attached bits in LSP
header only reflect the status of the default topology. header only reflect the status of the default topology.
Attached bit and overload bit are part of the MT TLV being Attached bit and overload bit are part of the MT TLV being
distributed within a node's LSP fragment zero. Since each adjacency distributed within a node's LSP fragment zero. Since each adjacency
can belong to different MTs, it is possible that some MTs are L2 can belong to different MTs, it is possible that some MTs are L2
attached, and others are not on the same router. The overload attached, and others are not on the same router. The overload
bit in the MT TLV can be used to signal the topology being bit in the MT TLV can be used to signal the topology being
overloaded. A MT based system is considered being overloaded if overloaded. A MT based system is considered being overloaded if
the overload bit in the MT is set. the overload bit in the MT is set.
skipping to change at page 4, line 34 skipping to change at page 5, line 13
in normal cases, otherwise overlapping addresses in different in normal cases, otherwise overlapping addresses in different
topologies could lead to undesirable routing behavior such as topologies could lead to undesirable routing behavior such as
forwarding loops. The forwarding logic and configuration need to forwarding loops. The forwarding logic and configuration need to
ensure the same MT is traversed from the source to the destination ensure the same MT is traversed from the source to the destination
for packets. The nexthops derived from the MT SPF MUST belong to for packets. The nexthops derived from the MT SPF MUST belong to
the adjacencies conforming to the same MT for correct forwarding. the adjacencies conforming to the same MT for correct forwarding.
It is recommended for the administrators to ensure consistent It is recommended for the administrators to ensure consistent
configuration of all routers in the domain to prevent undesirable configuration of all routers in the domain to prevent undesirable
forwarding behavior. forwarding behavior.
No attempt is made in this draft to allow one topology to calculate No attempt is made in this document to allow one topology to
routes using the routing information from another topology inside calculate routes using the routing information from another
SPF. Even though it is possible to redistribute and leak routes topology inside SPF. Even though it is possible to redistribute
from another IS-IS topology or from external sources, and the and leak routes from another IS-IS topology or from external
exact mechanism is beyond the scope of this document. sources, and the exact mechanism is beyond the scope of this
document.
7. Packet Encoding 7. Packet Encoding
Three new TLVs are added to support MT extensions. One of them is Three new TLVs are added to support MT extensions. One of them is
common for the LSPs and IIHs. Encoding of Intermediate System TLV common for the LSPs and IIHs. Encoding of Intermediate System TLV
and IPv4 Reachable Prefixes is tied to traffic engineering and IPv4 Reachable Prefixes is tied to traffic engineering
extensions [LS01] to simplify the implementation effort. The main extensions [LS01] to simplify the implementation effort. The main
reasons we choose using new TLVs instead of using sub-TLVs inside reasons we choose using new TLVs instead of using sub-TLVs inside
existing TLV type-22 and type-135 are: In many cases, existing TLV type-22 and type-135 are: In many cases,
multi-topologies are non-congruent, using sub-TLV approach will multi-topologies are non-congruent, using sub-TLV approach will
not save LSP space; Many sub-TLVs are already being used in TLV not save LSP space; Many sub-TLVs are already being used in TLV
type-22, and many more are being proposed while there is a maximum type-22, and many more are being proposed while there is a maximum
limit on the TLV size, from the existing TLVs; If traffic limit on the TLV size, from the existing TLVs; If traffic
engineering or some other applications are being applied per engineering or some other applications are being applied per
topology level later, the new TLVs can automatically inherit the topology level later, the new TLVs can automatically inherit the
same attributes already defined for the ``standard'' IPv4 topology same attributes already defined for the "standard" IPv4 topology
without going through long standard process to redefine them per without going through long standard process to redefine them per
topology. topology.
7.1. Multi-Topology TLV 7.1. Multi-Topology TLV
TLV number of this TLV is 229. It contains one or more MTs TLV number of this TLV is 229. It contains one or more MTs
the router is participating in the following structure: the router is participating in the following structure:
x CODE - 229 x CODE - 229
x LENGTH - total length of the value field, it should be 2 x LENGTH - total length of the value field, it SHOULD be 2
times the number of MT components. times the number of MT components.
x VALUE - one or more 2-byte MT components, structured x VALUE - one or more 2-byte MT components, structured
as follows: as follows:
No. of Octets No. of Octets
+--------------------------------+ +--------------------------------+
|O |A |R |R | MT ID | 2 |O |A |R |R | MT ID | 2
+--------------------------------+ +--------------------------------+
Bit O represents the OVERLOAD bit for the MT (only valid Bit O represents the OVERLOAD bit for the MT (only valid
in LSP fragment zero for MTs other than ID #0, otherwise in LSP fragment zero for MTs other than ID #0, otherwise
should be set to 0 on transmission and ignored on receipt.) SHOULD be set to 0 on transmission and ignored on receipt.)
Bit A represents the ATTACH bit for the MT (only valid Bit A represents the ATTACH bit for the MT (only valid
in LSP fragment zero for MTs other than ID #0, otherwise in LSP fragment zero for MTs other than ID #0, otherwise
should be set to 0 on transmission and ignored on receipt.) SHOULD be set to 0 on transmission and ignored on receipt.)
Bits R are reserved, should be set to 0 on transmission Bits R are reserved, SHOULD be set to 0 on transmission
and ignored on receipt. and ignored on receipt.
MT ID is a 12-bit field containing the ID of the topology MT ID is a 12-bit field containing the ID of the topology
being announced. being announced.
This MT TLV can advertise up to 127 MTs and it can occur multiple This MT TLV can advertise up to 127 MTs and it can occur multiple
times if needed within IIHs and LSP fragment zero. The result MT times if needed within IIHs and LSP fragment zero. The result MT
set should be the union of all the MT TLV occurrence in the packet. set SHOULD be the union of all the MT TLV occurrence in the packet.
Any other ISIS PDU occurrence of this TLV MUST be ignored. Lack Any other ISIS PDU occurrence of this TLV MUST be ignored. Lack
of MT TLV in hellos and fragment zero LSP MUST be interpreted as of MT TLV in hellos and fragment zero LSP MUST be interpreted as
participation of the advertising interface or router in participation of the advertising interface or router in
MT ID #0 only. If a router advertises MT TLV, it has to advertise MT ID #0 only. If a router advertises MT TLV, it has to advertise
all the MTs it participates in, specifically including topology all the MTs it participates in, specifically including topology
ID #0 also. ID #0 also.
7.2. MT Intermediate Systems TLV 7.2. MT Intermediate Systems TLV
skipping to change at page 6, line 22 skipping to change at page 6, line 51
|R |R |R |R | MT ID | 2 |R |R |R |R | MT ID | 2
+--------------------------------+ +--------------------------------+
| extended IS TLV format | 11 - 253 | extended IS TLV format | 11 - 253
+--------------------------------+ +--------------------------------+
. . . .
. . . .
+--------------------------------+ +--------------------------------+
| extended IS TLV format | 11 - 253 | extended IS TLV format | 11 - 253
+--------------------------------+ +--------------------------------+
Bits R are reserved, should be set to 0 on transmission Bits R are reserved, SHOULD be set to 0 on transmission
and ignored on receipt. and ignored on receipt.
MT ID is a 12-bit field containing the non-zero MT ID of the MT ID is a 12-bit field containing the non-zero MT ID of the
topology being announced. The TLV MUST be ignored if the ID topology being announced. The TLV MUST be ignored if the ID
is zero. This is to ensure the consistent view of the standard is zero. This is to ensure the consistent view of the standard
unicast topology. unicast topology.
After the 2-byte MT membership format, the MT IS content is After the 2-byte MT membership format, the MT IS content is
in the same format as extended IS TLV, type 22 [LS01]. It in the same format as extended IS TLV, type 22 [LS01]. It
can contain up to 23 neighbors of the same MT if no sub-TLVs can contain up to 23 neighbors of the same MT if no sub-TLVs
skipping to change at page 7, line 4 skipping to change at page 7, line 36
+--------------------------------+ +--------------------------------+
|R |R |R |R | MT ID | 2 |R |R |R |R | MT ID | 2
+--------------------------------+ +--------------------------------+
| extended IP TLV format | 5 - 253 | extended IP TLV format | 5 - 253
+--------------------------------+ +--------------------------------+
. . . .
. . . .
+--------------------------------+ +--------------------------------+
| extended IP TLV format | 5 - 253 | extended IP TLV format | 5 - 253
+--------------------------------+ +--------------------------------+
Bits R are reserved, should be set to 0 on transmission
Bits R are reserved, SHOULD be set to 0 on transmission
and ignored on receipt. and ignored on receipt.
MT ID is a 12-bit field containing the non-zero ID of the MT ID is a 12-bit field containing the non-zero ID of the
topology being announced. The TLV MUST be ignored if the ID topology being announced. The TLV MUST be ignored if the ID
is zero. This is to ensure the consistent view of the standard is zero. This is to ensure the consistent view of the standard
unicast topology. unicast topology.
After the 2-byte MT membership format, the MT IPv4 content After the 2-byte MT membership format, the MT IPv4 content
is in the same format as extended IP reachability TLV, is in the same format as extended IP reachability TLV,
type 135 [LS01]. type 135 [LS01].
skipping to change at page 7, line 39 skipping to change at page 8, line 22
+--------------------------------+ +--------------------------------+
|R |R |R |R | MT ID | 2 |R |R |R |R | MT ID | 2
+--------------------------------+ +--------------------------------+
| IPv6 Reachability format | 6 - 253 | IPv6 Reachability format | 6 - 253
+--------------------------------+ +--------------------------------+
. . . .
+--------------------------------+ +--------------------------------+
| IPv6 Reachability format | 6 - 253 | IPv6 Reachability format | 6 - 253
+--------------------------------+ +--------------------------------+
Bits R are reserved, should be set to 0 on transmission Bits R are reserved, SHOULD be set to 0 on transmission
and ignored on receipt. and ignored on receipt.
MT ID is a 12-bit field containing the ID of the topology MT ID is a 12-bit field containing the ID of the topology
being announced. The TLV MUST be ignored if the ID being announced. The TLV MUST be ignored if the ID
is zero. is zero.
After the 2-byte MT membership format, the MT IPv6 context After the 2-byte MT membership format, the MT IPv6 context
is in the same format as IPv6 Reachability TLV, is in the same format as IPv6 Reachability TLV,
type 236 [H01]. type 236 [H01].
This TLV can occur multiple times. This TLV can occur multiple times.
7.5. Reserved MT ID Values 7.5. Reserved MT ID Values
Certain MT topologies are assigned to serve pre-determined purposes: Certain MT topologies are assigned to serve pre-determined purposes:
- MT ID #0: Equivalent to the ``standard'' topology. - MT ID #0: Equivalent to the "standard" topology.
- MT ID #1: Reserved for IPv4 in-band management - MT ID #1: Reserved for IPv4 in-band management
purposes. purposes.
- MT ID #2: Reserved for IPv6 routing topology. - MT ID #2: Reserved for IPv6 routing topology.
- MT ID #3: Reserved for IPv4 multicast routing topology. - MT ID #3: Reserved for IPv4 multicast routing topology.
- MT ID #4: Reserved for IPv6 multicast routing topology. - MT ID #4: Reserved for IPv6 multicast routing topology.
- MT ID #5-#3995: Reserved for IETF consensus. - MT ID #5: Reserved for IPv6 in-band management
purposes.
- MT ID #6-#3995: Reserved for IETF consensus.
- MT ID #3996-#4095: Reserved for development, experimental and - MT ID #3996-#4095: Reserved for development, experimental and
proprietary features [RFC3692]. proprietary features [RFC3692].
8. MT IP Forwarding Considerations 8. MT IP Forwarding Considerations
Using MT extension for ISIS routing can result in multiple RIBs Using MT extension for ISIS routing can result in multiple RIBs
on the system. The implementation and configuration MUST make on the system. In this section we
sure the IP packets are only traversed through the nodes and links
intended for the topologies and applications. In this section we
list some of the known considerations for IP forwarding in various list some of the known considerations for IP forwarding in various
MT scenario. Certain deployment scenarios presented here MT scenario. Certain deployment scenarios presented here
imply different trade-offs in terms of deployment difficulties imply different trade-offs in terms of deployment difficulties
and advantages obtained. and advantages obtained.
8.1. Each MT belong to a distinct address family 8.1. Each MT belong to a distinct address family
In this case, each MT related routes are installed into a In this case, each MT related routes are installed into a
separate RIB. Multiple topologies can share the same ISIS interface separate RIB. Multiple topologies can share the same ISIS interface
on detecting the incoming packet address family. As an example, on detecting the incoming packet address family. As an example,
skipping to change at page 8, line 54 skipping to change at page 9, line 35
MTs have their dedicated interfaces, and those interfaces can be MTs have their dedicated interfaces, and those interfaces can be
associated with certain MT RIBs and FIBs. associated with certain MT RIBs and FIBs.
8.2.2. Multiple MTs share an interface with overlapping addresses 8.2.2. Multiple MTs share an interface with overlapping addresses
Some additional mechanism is needed to select the correct RIBs Some additional mechanism is needed to select the correct RIBs
for the incoming IP packets to determine the correct RIB to make for the incoming IP packets to determine the correct RIB to make
a forwarding decision. For example, if the topologies are a forwarding decision. For example, if the topologies are
QoS partitioned, then the DSCP bits in the IP packet header can QoS partitioned, then the DSCP bits in the IP packet header can
be utilized to make the decision. Some IP header or even packet be utilized to make the decision. Some IP header or even packet
data information may be checked to make the forwarding table data information MAY be checked to make the forwarding table
selection, such as source IP address in the header can be used selection, such as source IP address in the header can be used
to determine the desired forwarding behavior. to determine the desired forwarding behavior.
This topic is not unique to IS-IS or even to Multi-topology, it
is a local policy and configuration decision to make sure the
inbound traffic uses the correct forwarding tables. For example,
preferred customer packets are sent through a L2TP towards the
high-bandwidth upstream provider, and other packets are sent
through a different L2TP to a normal-bandwidth provider. Those
mechanism are not part of the L2TP protocol specifications.
The generic approach of packet to multiple MT RIB mapping over The generic approach of packet to multiple MT RIB mapping over
the same inbound interface is outside the scope of this draft. the same inbound interface is outside the scope of this document.
8.2.3. Multiple MTs share an interface with non-overlapping addresses 8.2.3. Multiple MTs share an interface with non-overlapping addresses
When there is no overlap in the address space among all the MTs, When there is no overlap in the address space among all the MTs,
strictly speaking the destination address space classifies the strictly speaking the destination address space classifies the
topology a packet belongs to. It is possible to install routes topology a packet belongs to. It is possible to install routes
from different MTs into a shared RIB. As an example of such a from different MTs into a shared RIB. As an example of such a
deployment, a special ISIS topology can be setup for certain deployment, a special ISIS topology can be setup for certain
EBGP nexthop addresses. EBGP nexthop addresses.
8.3 Some MTs are not used for forwarding purpose 8.3 Some MTs are not used for forwarding purpose
MT in ISIS may be used even if the resulting RIB is not used for MT in ISIS MAY be used even if the resulting RIB is not used for
forwarding purposes. As an example, multicast RPF check can be forwarding purposes. As an example, multicast RPF check can be
performed on a different RIB than the standard unicast RIB albeit performed on a different RIB than the standard unicast RIB albeit
an entirely different RIB is used for the multicast forwarding. an entirely different RIB is used for the multicast forwarding.
However, an incoming packet must be still clearly identified as However, an incoming packet MUST be still clearly identified as
belonging to a unique topology. belonging to a unique topology.
9. MT Network Management Considerations 9. MT Network Management Considerations
When multiple ISIS topologies exist within a domain, some of the When multiple ISIS topologies exist within a domain, some of the
routers can be configured to participate in a subset of the MTs routers can be configured to participate in a subset of the MTs
in the network. This section discusses some of the options we in the network. This section discusses some of the options we
have to enable operations or the network management stations to have to enable operations or the network management stations to
access those routers. access those routers.
skipping to change at page 10, line 4 skipping to change at page 10, line 43
optionally installed into the default RIB. optionally installed into the default RIB.
The advantages of duplicate 'mgmt' routes in both RIBs include: The advantages of duplicate 'mgmt' routes in both RIBs include:
the network management utilities on the system does not have to be the network management utilities on the system does not have to be
modified to use specific RIB other than the default RIB; the 'mgmt' modified to use specific RIB other than the default RIB; the 'mgmt'
topology can share the same link with the default topology if so topology can share the same link with the default topology if so
designed. designed.
9.2. Extend the default topology to all the nodes 9.2. Extend the default topology to all the nodes
Even in the case default topology is not used on some of the nodes Even in the case default topology is not used on some of the nodes
in the IP forwarding, we may want to extend the default topology in the IP forwarding, we MAY want to extend the default topology
to those nodes for the purpose of network management. Operators to those nodes for the purpose of network management. Operators
SHOULD set high cost on the links which belong to the extended SHOULD set high cost on the links which belong to the extended
portion of the default topology. This way the IP data traffic portion of the default topology. This way the IP data traffic
will not be forwarded through those nodes during network topology will not be forwarded through those nodes during network topology
changes. changes.
10. Acknowledgments 10. Acknowledgments
The authors would like to thank Andrew Partan, Dino Farinacci, The authors would like to thank Andrew Partan, Dino Farinacci,
Derek Yeung, Alex Zinin, Stefano Previdi, Heidi Ou, Steve Luong, Derek Yeung, Alex Zinin, Stefano Previdi, Heidi Ou, Steve Luong,
Pekka Savola, Mike Shand, Shankar Vemulapalli and Les Ginsberg Pekka Savola, Mike Shand, Shankar Vemulapalli and Les Ginsberg
for the discussion, their review, comments and contributions to for the discussion, their review, comments and contributions to
this draft. this document.
11. Security Consideration 11. Security Consideration
ISIS security applies to the work presented. No specific security ISIS security applies to the work presented. No specific security
issues with the proposed solutions are known. The authentication issues with the proposed solutions are known. The authentication
procedure for ISIS PDUs is the same regardless of MT information procedure for ISIS PDUs is the same regardless of MT information
inside the ISIS PDUs. inside the ISIS PDUs.
Note that an authentication mechanism, such as the one defined in
[RFC3567] SHOULD be applied if there is high risk resulting
from modification of multi-topology information.
As described in section 8.2.2, multiple topologies share an
interface in the same address space, some mechanism beyond
IS-IS need to be used to select the right forwarding table
for an inbound packet. A misconfiguration on the system or
a packet with spoofed source address for example can lead to
packet loss or unauthorized use of premium network resource.
12. IANA Considerations 12. IANA Considerations
IANA is requested to create a new registry, "IS-IS multi-topology ID This document defines the following new IS-IS TLV types, which have
values" with the assignment listed in Section 7.5 of this document already been reflected in the IANA IS-IS TLV code-point registry:
and registration policies for future assignments.
IANA is also requested to update the IS-IS codepoint registry Name Value
(http://www.iana.org/assignments/isis-tlv-codepoints) so that TLV
codes 222, 229, 235 and 237 refer to this document's RFC number.
[[ note to the RFC-editor: the above paragraph may be removed or MT-ISN 222
reworded prior to RFC publication ]] M-Topologies 229
MT IP. Reach 235
MT IPv6 IP. Reach 237
IANA is requested to create a new registry, "IS-IS multi-topology ID
values" with the assignment listed in Section 7.5 of this document
and registration policies [RFC2434] for future assignments. The
MT ID values range 6-3095 are allocated through Expert Review;
values in the range of 3096-4095 are reserved for Private Use.
In all cases, assigned values are to be registered with IANA.
13. References 13. References
13.1. Normative References 13.1. Normative References
[ISO10589] ISO. Intermediate System to Intermediate System Routing [ISO10589] ISO. Intermediate System to Intermediate System Routing
Exchange Protocol for Use in Conjunction with the Exchange Protocol for Use in Conjunction with the
Protocol for Providing the Connectionless-Mode Network Protocol for Providing the Connectionless-Mode Network
Service. ISO 10589, 1992. Service. ISO 10589, 1992.
[RFC1195] R. Callon. Use of OSI ISIS for Routing in TCP/IP and [RFC1195] R. Callon. Use of OSI ISIS for Routing in TCP/IP and
Dual Environments. RFC 1195, December 1990. Dual Environments. RFC 1195, December 1990.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3692] Narten, T., "Assigning Experimental and Testing [RFC3692] Narten, T., "Assigning Experimental and Testing
Numbers Considered Useful", BCP 82, RFC 3692, January Numbers Considered Useful", BCP 82, RFC 3692, January
2004. 2004.
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing
an IANA Considerations Section in RFCs", BCP 26,
RFC 2434, October 1998.
13.2. Informative References 13.2. Informative References
[RFC3567] Li, T. and R. Atkinson, "Intermediate System to
Intermediate System (IS-IS) Cryptographic
Authentication", RFC 3567, July 2003.
[LS01] T. Li and H. Smit. IS-IS Extensions for Traffic [LS01] T. Li and H. Smit. IS-IS Extensions for Traffic
Engineering. RFC 3784, May 2005. Engineering. RFC 3784, May 2005.
[H01] C. Hopps. Routing IPv6 with IS-IS. [H01] C. Hopps. Routing IPv6 with IS-IS.
draft-ietf-isis-ipv6-06.txt, May 2004. (work in progress) draft-ietf-isis-ipv6-07.txt, October 2007.
(work in progress)
14. Authors' Addresses 14. Authors' Addresses
Tony Przygienda Tony Przygienda
Z2 Sagl Z2 Sagl
Via Rovello 32 Via Rovello 32
CH-6942 Savosa CH-6942 Savosa
prz@net4u.ch prz@net4u.ch
Naiming Shen Naiming Shen
skipping to change at page 11, line 40 skipping to change at page 13, line 5
225 West Tasman Drive 225 West Tasman Drive
San Jose, CA, 95134 USA San Jose, CA, 95134 USA
naiming@cisco.com naiming@cisco.com
Nischal Sheth Nischal Sheth
Juniper Networks Juniper Networks
1194 North Mathilda Avenue 1194 North Mathilda Avenue
Sunnyvale, CA 94089 USA Sunnyvale, CA 94089 USA
nsheth@juniper.net nsheth@juniper.net
Intellectual Property Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed Intellectual Property Rights or other rights that might be claimed to
to pertain to the implementation or use of the technology described pertain to the implementation or use of the technology described in
in this document or the extent to which any license under such this document or the extent to which any license under such rights
rights might or might not be available; nor does it represent that might or might not be available; nor does it represent that it has
it has made any independent effort to identify any such rights. made any independent effort to identify any such rights. Information
Information on the procedures with respect to rights in RFC on the procedures with respect to rights in RFC documents can be
documents can be found in BCP 78 and BCP 79. found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use attempt made to obtain a general license or permission for the use of
of such proprietary rights by implementers or users of this such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository specification can be obtained from the IETF on-line IPR repository at
at http://www.ietf.org/ipr. http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at this standard. Please address the information to the IETF at
ietf-ipr@ietf.org. ietf-ipr@ietf.org.
Full Copyright Statement Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject Copyright (C) The IETF Trust (2007).
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on This document is subject to the rights, licenses and restrictions
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE contained in BCP 78, and except as set forth therein, the authors
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND retain all their rights.
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST
AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT
THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY
ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PARTICULAR PURPOSE. PURPOSE.
Acknowledgment Acknowledgment
Funding for the RFC Editor function is currently provided by the Funding for the RFC Editor function is provided by the IETF
Internet Society. Administrative Support Activity (IASA).
 End of changes. 47 change blocks. 
83 lines changed or deleted 152 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/