RFC 8500
RFC 8500
RFC 8500
Shen
Request for Comments: 8500 Cisco Systems
Category: Standards Track S. Amante
ISSN: 2070-1721 Apple Inc.
M. Abrahamsson
T-Systems Nordic
February 2019
Abstract
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Node and Link Isolation . . . . . . . . . . . . . . . . . 2
1.2. Distributed Forwarding Planes . . . . . . . . . . . . . . 3
1.3. Spine-Leaf Applications . . . . . . . . . . . . . . . . . 3
1.4. LDP IGP Synchronization . . . . . . . . . . . . . . . . . 3
1.5. IS-IS Reverse Metric . . . . . . . . . . . . . . . . . . 3
1.6. Specification of Requirements . . . . . . . . . . . . . . 4
2. IS-IS Reverse Metric TLV . . . . . . . . . . . . . . . . . . 4
3. Elements of Procedure . . . . . . . . . . . . . . . . . . . . 6
3.1. Processing Changes to Default Metric . . . . . . . . . . 6
3.2. Multi-Topology IS-IS Support on Point-to-Point Links . . 7
3.3. Multi-access LAN Procedures . . . . . . . . . . . . . . . 7
3.4. LDP/IGP Synchronization on LANs . . . . . . . . . . . . . 8
3.5. Operational Guidelines . . . . . . . . . . . . . . . . . 9
4. Security Considerations . . . . . . . . . . . . . . . . . . . 10
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 10
6.1. Normative References . . . . . . . . . . . . . . . . . . 10
6.2. Informative References . . . . . . . . . . . . . . . . . 11
Appendix A. Node Isolation Challenges . . . . . . . . . . . . . 13
Appendix B. Link Isolation Challenges . . . . . . . . . . . . . 13
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 15
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Authors’ Addresses . . . . . . . . . . . . . . . . . . . . . . . 15
1. Introduction
The IS-IS routing mechanism has the overload bit, which can be used
by operators to perform disruptive maintenance on the router. But in
many operational maintenance cases, it is not necessary to divert all
the traffic away from this node. It is necessary to avoid only a
single link during the maintenance. More detailed descriptions of
the challenges can be found in Appendices A and B of this document.
The metric value in the Reverse Metric TLV and the Traffic
Engineering metric in the sub-TLV being advertised are offsets or
relative metrics to be added to the existing local link and Traffic
Engineering metric values of the receiver; the accumulated metric
value is bounded as described in Section 2.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
The Reverse Metric TLV is a new TLV to be used inside an IS-IS Hello
PDU. This TLV is used to support the IS-IS Reverse Metric mechanism
that allows a "reverse metric" to be sent to the IS-IS neighbor.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Flags | Metric
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Metric (Continued) | sub-TLV Len |Optional sub-TLV
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Reverse Metric TLV MAY be present in any IS-IS Hello PDU. A
sender MUST only transmit a single Reverse Metric TLV in an IS-IS
Hello PDU. If a received IS-IS Hello PDU contains more than one
TYPE: 16
LENGTH: variable (5 - 255 octets)
VALUE:
Flags (1 octet)
Metric (3 octets)
sub-TLV length (1 octet)
sub-TLV data (0 - 250 octets)
0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+
| Reserved |U|W|
+-+-+-+-+-+-+-+-+
Figure 2: Flags
W bit (0x01): The "Whole LAN" bit is only used in the context of
multi-access LANs. When a Reverse Metric TLV is transmitted from a
node to the Designated Intermediate System (DIS), if the "Whole LAN"
bit is set (1), then a DIS SHOULD add the received Metric value in
the Reverse Metric TLV to each node’s existing Default Metric in the
Pseudonode LSP. If the "Whole LAN" bit is not set (0), then a DIS
SHOULD add the received Metric value in the Reverse Metric TLV to the
existing "default metric" in the Pseudonode LSP for the single node
from whom the Reverse Metric TLV was received. Please refer to
"Multi-access LAN Procedures", in Section 3.3, for additional
The Reserved bits of Flags field MUST be set to zero and MUST be
ignored when received.
The Reverse Metric TLV MAY include sub-TLVs when an IS-IS router
wishes to signal additional information to its neighbor. In this
document, the Reverse Metric Traffic Engineering Metric sub-TLV, with
Type 18, is defined. This Traffic Engineering Metric contains a
24-bit unsigned integer. This sub-TLV is optional; if it appears
more than once, then the entire Reverse Metric TLV MUST be ignored.
Upon receiving this Traffic Engineering METRIC sub-TLV in a Reverse
Metric TLV, a node SHOULD add the received Traffic Engineering Metric
offset value to its existing configured Traffic Engineering Default
Metric within its Extended IS Reachability TLV. The use of other
sub-TLVs is outside the scope of this document. The "sub-TLV Len"
value MUST be set to zero when an IS-IS router does not have Traffic
Engineering sub-TLVs that it wishes to send to its IS-IS neighbor.
3. Elements of Procedure
It is important to use the same IS-IS metric type on both ends of the
link and in the entire IS-IS area or level. On the receiving side of
the ’reverse-metric’ TLV, the accumulated value of the configured
metric and the reverse-metric needs to be limited to 63 in "narrow"
metric mode and to (2^24 - 2) in "wide" metric mode. This applies to
both the Default Metric of Extended IS Reachability TLV and the
Traffic Engineering Default Metric sub-TLV in LSP or Pseudonode LSP
for the "wide" metric mode case. If the "U" bit is present in the
flags, the accumulated metric value is to be limited to (2^24 - 1)
for both the normal link metric and Traffic Engineering metric in
IS-IS "wide" metric mode.
Metric sub-TLV, then the IS-IS router MUST NOT change the value of
its Traffic Engineering Default Metric sub-TLV for that link.
In the case of multi-access LANs, the "W" Flags bit is used to signal
from a non-DIS to the DIS whether or not to change the metric and,
optionally, Traffic Engineering parameters for all nodes in the
Pseudonode LSP or solely the node on the LAN originating the Reverse
Metric TLV.
As long as at least one IS-IS node on the LAN sending the signal to
DIS with the W bit set, the DIS would add the metric value in the
Reverse Metric TLV to all neighbor adjacencies in the Pseudonode LSP,
regardless if some of the nodes on the LAN advertise the Reverse
Metric TLV without the W bit set. The DIS MUST use the reverse
metric of the highest source MAC address Non-DIS advertising the
Reverse Metric TLV with the W bit set.
For the use case in Section 1.1, a router SHOULD limit the period of
advertising a Reverse Metric TLV towards a neighbor only for the
duration of a network maintenance window.
The use of a Reverse Metric does not alter IS-IS metric parameters
stored in a router’s persistent provisioning database.
4. Security Considerations
5. IANA Considerations
IANA has allocated IS-IS TLV Codepoint 16 for the Reverse Metric TLV.
This new TLV has the following attributes: IIH = y, LSP = n, SNP = n,
Purge = n.
0: Reserved
1-17: Unassigned
18: Traffic Engineering Metric as specified in this document
(Section 2)
19-255: Unassigned
6. References
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, DOI 10.17487/RFC1195,
December 1990, <https://www.rfc-editor.org/info/rfc1195>.
[IS-IS-SL-EXT]
Shen, N., Ginsberg, L., and S. Thyamagundalu, "IS-IS
Routing for Spine-Leaf Topology", Work in Progress,
draft-ietf-lsr-isis-spine-leaf-ext-00, December 2018.
[RFC5310] Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
and M. Fanto, "IS-IS Generic Cryptographic
Authentication", RFC 5310, DOI 10.17487/RFC5310, February
2009, <https://www.rfc-editor.org/info/rfc5310>.
[RFC6138] Kini, S., Ed. and W. Lu, Ed., "LDP IGP Synchronization for
Broadcast Networks", RFC 6138, DOI 10.17487/RFC6138,
February 2011, <https://www.rfc-editor.org/info/rfc6138>.
[RFC7645] Chunduri, U., Tian, A., and W. Lu, "The Keying and
Authentication for Routing Protocol (KARP) IS-IS Security
Analysis", RFC 7645, DOI 10.17487/RFC7645, September 2015,
<https://www.rfc-editor.org/info/rfc7645>.
After the maintenance activity has completed, the operator resets the
IS-IS Overload Bit within the LSPs of the original IS-IS router
causing it to flood updated IS-IS LSPs throughout the IS-IS domain.
All IS-IS routers recalculate their SPF tree and now include the
original IS-IS router in their topology calculations, allowing it to
be used for transit traffic again.
Acknowledgments
The authors would like to thank Mike Shand, Dave Katz, Guan Deng,
Ilya Varlashkin, Jay Chen, Les Ginsberg, Peter Ashwood-Smith, Uma
Chunduri, Alexander Okonnikov, Jonathan Harrison, Dave Ward, Himanshu
Shah, Wes George, Danny McPherson, Ed Crabbe, Russ White, Robert
Raszuk, Tom Petch, Stewart Bryant, and Acee Lindem for their comments
and contributions.
Contributors
Tony Li
Email: [email protected]
Authors’ Addresses
Naiming Shen
Cisco Systems
560 McCarthy Blvd.
Milpitas, CA 95035
United States of America
Email: [email protected]
Shane Amante
Apple Inc.
One Apple Park Way
Cupertino, CA 95014
United States of America
Email: [email protected]
Mikael Abrahamsson
T-Systems Nordic
Kistagangen 26
Stockholm
Sweden
Email: [email protected]