IS-IS
IS-IS
IS-IS
In the dynamic and expansive landscape of service provider environments, where scale,
efficiency, and reliability are paramount, the role of routing protocols is critical. Link-state
routing protocols (LSPs) emerge as a cornerstone in service providers’ infrastructures,
offering a sophisticated and adaptable mechanism for managing complex environments.
These protocols provide a robust underlay, optimize routing decisions, enhance network
responsiveness, and ensure smooth communication across vast and diverse service provider
networks.
Service providers face unique challenges, such as diverse customer requirements, varying
traffic patterns, and the need for rapid adaptation to changes in network topology. Link-state
routing Protocols address these challenges by providing a decentralized and information-rich
approach to routing. By disseminating detailed information about the state of network links,
routers in service provider environments can construct and maintain an accurate map of the
entire network. This comprehensive awareness empowers the network to dynamically adapt
to changes, rerouting traffic efficiently and minimizing downtime.
The protocols we focus on in this chapter and the next are Intermediate System to Intermedi-
ate System (IS-IS) and Open Shortest Path First (OSPF). Unlike traditional distance-vector
protocols, which focus on the distance or hops to reach a destination, IS-IS and OSPF priori-
tize the precise knowledge of the network’s layout. Their ability to adapt has been the key
factor in their enduring relevance. Five years can feel like an eternity in a digital landscape,
yet both protocols have survived for decades. They excel at maintaining an accurate and up-
to-date understanding of the network’s topology and enable routers to make informed
decisions about the most optimal paths for data transmission.
This chapter and the next examine the specific differences of IS-IS and OSPF. We have struc-
tured the chapters in a way that helps you rapidly acquire and retain practical knowledge of
Telegram: @cisco_in_persian_channel
their underlying mechanics. Both of the protocols provide a good view into enhancing
network efficiency, fault tolerance, and adaptability. By understanding the nuances of
their implementation, you will appreciate the impact of Link-state routing protocols on
the robustness and efficiency of routing within the intricate tapestry of service provider
infrastructures.
One last thing: Extensive literature exists on IS-IS and OSPF, but our emphasis is on practical
implementation for the exam. I (Brad) am trying to show you how to configure and deploy
these protocols effectively within the limited pages available. Thus, I have prioritized the
essential operational components while omitting detailed theoretical aspects to simplify
content. Supplementing with additional resources outside this material can provide a compre-
hensive understanding. I encourage you to concentrate on the practical application; this will
ensure success in demonstrating proficiency during the exam.
CAUTION The goal of self-assessment is to gauge your mastery of the topics in this
chapter. If you do not know the answer to a question or are only partially sure of the answer,
you should mark that question as wrong for purposes of the self-assessment. Giving yourself
credit for an answer you correctly guess skews your self-assessment results and might
provide you with a false sense of security.
Telegram: @cisco_in_persian_channel
110 CCNP SPCOR 350-501 Official Cert Guide
3. Which of the following are IPv6-related ISIS TVLs? (Select all that apply.)
a. 232
b. 233
c. 234
d. 237
4. Which protocol supports preemptive pseudonodes?
a. OSPF
b. IS-IS
c. BGP
d. BFD
5. What is the IS-IS LSP holdtime period in minutes?
a. 10
b. 20
c. 30
d. 60
Foundation Topics
Implement IS-IS (IPv4 and IPv6)
Intermediate System to Intermediate System (IS-IS) was originally developed for use in the
Open Systems Interconnection (OSI) networking framework in the 1980s. However, its
practicality and efficiency transcended its original OSI framework, leading to its adoption in
Internet Protocol (IP) networks. These four key technical elements capture the essence of the
IS-IS protocol:
■ SPF Algorithm: This algorithm computes optimal routes based on the information
collected about network link states.
■ CLNS Addressing: Because it was originally designed for the OSI networking model,
a Connectionless Network Service (CLNS) addressing scheme is employed.
However, in IP networks, it smoothly integrates with IPv4 and IPv6, showcasing the
protocol’s adaptability.
■ Link-State Database (LSDB): This database contains information about the state of
each network link and forms the basis for informed routing decisions.
■ Hierarchical Design: The design organizes routers into levels and areas. This hierarchi-
cal structure enhances scalability and facilitates efficient topology management.
Similar to OSPF, IS-IS is frequently used in both enterprise and service provider environments.
It converges rapidly, scales remarkably well, and is particularly flexible for fine-tuning. Addition-
ally, IS-IS is easily extensible through Type/Length/Value (TLV) extensions, simplifying the use
of newer features, such as support for the IPv6 address family or Segment Routing. It is helpful
to think of TLV extensions as train cars: The train does not care what load a car carries; it will
transport coal, IPv6, or Segment Routing with these extensions anyway. This makes it a powerful
attribute. Some argue that IS-IS is a straightforward protocol; a common sentiment is “If you are
familiar with OSPF, discard half of your knowledge, and you’re acquainted with IS-IS.”
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 111
Remember that IS-IS is a Layer 2 protocol and is encapsulated in CLNS (not Layer 3 IP, like
OSPF); each IS-IS router is uniquely identified with a Network Entity Title (NET) address.
Let’s examine the following NET address: 49.0001.0000.0000.0001.00.
1. The first 8 bits (49) represent the address family identifier (AFI). Currently, 49 repre-
sents a locally defined format (suitable for private addressing, the operator is free to
format to their liking). ISO used to assign AFI identifiers to different organizations
that gave out addresses, but this no longer happens, and when it comes to IS-IS, most
companies end up using 49. As an example, civilian departments within the U.S. gov-
ernment were designated with the code 47.0005, while the U.S. Department of Defense
was identified by the code 47.0006.
2. The next 16 bits (0001) represent the area. This field can vary in length. You can just
leave it “blank”—49.0000.0000.0001.00 (notice this differs from the highlighted exam-
ple before this list). A better practice is to pick a number for this field (as I have done
here) because you may want to add different areas in the future. This will become clear
as we discuss this matter later in the chapter. In this case, I arbitrarily chose 0001, but
I could have used 501 (the exam).
3. The next 48 bits identify the system ID. The formatting here may be confusing. It is 5
12 hex digits long with two dots in between (instead of three); notice that they are
bold in the sample address. It is always the same fixed length. You can format this
to what makes sense in your organization. Many examples in textbooks use a router
number (in this example, router 1) in the last octet to produce the 0000.0000.0001
system ID. Frequently, network operators bake in the router’s loopback address into
this identifier; for example, 10.100.100.1 can be written as 0101.0010.0001 (highlighted
for clarity), which I use in examples so that you become accustomed to looking at
different formats. At first, the two-dotted notation may seem confusing because
you usually see IP addresses with the three-dotted notation, but thinking of these as
hex—that is, the MAC address notation—will help. You can even use a router’s MAC
address in this field (49.0001.5254.000d.f536), but the IP address approach described
here makes most sense for troubleshooting issues. The bottom line is that you need a
single ISO address per router, and a router’s primary loopback interface is commonly
adapted to fit this formatting.
4. Finally, the SEL field, also called an NSAP Selector or NSEL (the more commonly
used abbreviation), is a 1-octet-long field. It identifies the service in or above the net-
work layer on the destination node that processes the datagram. For IP, you use 00. In
fact, if the device is a router, this field will always be 00.
Could you put it all together for an example of a NET address for a router using 192.168.1.1
for its loopback, which belongs to area 3? This exercise should not be hard. Tip: One of the
answers could be 49.0003.1921.6800.1001.00.
IS-IS Topology
Consider the starting IS-IS network topology shown in Figure 5-1. To be able to work with
IS-IS quickly (for the exam and otherwise), you should learn to visualize topologies like this
in your head, without having to look up interfaces and their addresses (this is the reason I am
deliberately not including them here on all interfaces). If you struggle to do this at first, you
can mark up Figure 5-1 with what helps you get through tasks, but ideally, you should learn
Telegram: @cisco_in_persian_channel
112 CCNP SPCOR 350-501 Official Cert Guide
to do this in your head because being able to do so will make you a more careful, better
engineer.
L1 L2 L2
L2
PE2 P4 PE6
L2
L1 L2 L1
L2 L2
Figure 5-1 includes everything you need to know about this topology. There are six rout-
ers in three areas. All links are Level-2 (L2), except for the ones in area 0001 and area 0003,
which are Level-1 (L1). The networking domain is split into three areas, so you can easily
remember which router is in which area. Consider router P4 as an example. Its ISO NET
address will be 49.0002.0101.0010.0004.00 (you could zero out everything but the 4 at
the end of the system ID, but you should get accustomed to recognizing these baked-in
addresses). Its loopback address is 10.100.100.4/32. Its link to PE3 would have the IP address
of 10.100.34.4/24 in this topology. If you understand these concepts, you already know the
entire network in your head and can build and fix everything “from your head.” Sometimes,
you might have to look at the network diagram and draw things out, but by getting into the
practice of doing this in your head, you will quickly become faster than your peers.
In this chapter, I give you the IS-IS portion for the configuration for routers PE3 and P4, but
you must enable IS-IS on all other routers. Without having practiced this task on your own,
you will struggle to answer exam questions, particularly when lablets (small lab simulation
environments) are involved.
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 113
Let’s start with IOS in Example 5-1. I am deliberately drawing attention to the highlighted
areas. You should learn to read these on your own throughout the book. If something stands
out beyond the obvious, I will point it out further.
Example 5-1 Basic IS-IS Configuration in IOS XE
Telegram: @cisco_in_persian_channel
114 CCNP SPCOR 350-501 Official Cert Guide
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 115
What should you pick up on in this example? It enables IS-IS on a single Ethernet interface,
verifies that the protocol is active for this interface, and uses narrow-metrics (not wide-
metrics). The show isis protocol and show clns protocol command outputs look the same,
the CLNS commands give you configuration and holding timers, and it uses a metric of 10.
You can see the interface MTU, no adjacencies are present, IPv6 metrics are shown, and it
sends out LAN Level-1 and Level-2 Hello messages every three seconds. The one command
we would like to point out is log-adjacency-changes. By default, Cisco routers do not log
IS-IS neighbor adjacencies forming or dissolving. It is good to get into the habit of using this
command. You can see this on IOS XR, as demonstrated in Example 5-2.
Example 5-2 Basic IS-IS Configuration in IOS XR
RP/0/RP0/CPU0:PE3# configure
RP/0/RP0/CPU0:PE3(config)# router isis ?
WORD Process ID
RP/0/RP0/CPU0:PE3(config)# router isis CCNP
RP/0/RP0/CPU0:PE3(config-isis)# net 49.0001.0101.0010.0003.00
RP/0/RP0/CPU0:PE3(config-isis)# log adjacency changes
RP/0/RP0/CPU0:PE3(config-isis)# interface gigabitEthernet 0/0/0/2
RP/0/RP0/CPU0:PE3(config-isis-if)# address-family ?
5
ipv4 IPv4 address family
ipv6 IPv6 address family
RP/0/RP0/CPU0:PE3(config-isis-if)# address-family ipv4 ?
multicast multicast topology
unicast unicast topology
RP/0/RP0/CPU0:PE3(config-isis-if)# address-family ipv4 unicast
RP/0/RP0/CPU0:PE3(config-isis-if-af)# exit
RP/0/RP0/CPU0:PE3(config-isis-if)# address-family ipv6 unicast
RP/0/RP0/CPU0:PE3(config-isis-if-af)# commit
Thu Feb 15 13:26:43.365 UTC
RP/0/RP0/CPU0:PE3(config-isis-if-af)# end
RP/0/RP0/CPU0:PE3# show isis protocols
IS-IS Router: CCNP
System Id: 0101.0010.0003
Job Id: 1011
Process Id: 18820
Instance Id: 0
IS Levels: level-1-2
Manual area address(es):
49.0001
Routing for area address(es):
49.0001
LSP MTU: 1492
LSP Full: level-1: No, level-2: No
Non-stop forwarding: Disabled
Most recent startup mode: Cold Restart
Telegram: @cisco_in_persian_channel
116 CCNP SPCOR 350-501 Official Cert Guide
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 117
Telegram: @cisco_in_persian_channel
118 CCNP SPCOR 350-501 Official Cert Guide
GigabitEthernet0/0/0/2 Enabled
Adjacency Formation: Enabled
Prefix Advertisement: Enabled
IPv4 BFD: Disabled
IPv6 BFD: Disabled
BFD Min Interval: 150
BFD Multiplier: 3
Bandwidth: 1000000
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 119
Level-1
Adjacency Count: 1
LAN ID: P4.01
Priority (Local/DIS): 64/64
Next LAN IIH in: 2 s
LSP Pacing Interval: 33 ms
PSNP Entry Queue Size: 0
Hello Interval: 10 s
Hello Multiplier: 3
Level-2
Adjacency Count: 1
LAN ID: P4.01
Priority (Local/DIS): 64/64
Next LAN IIH in: 3 s
LSP Pacing Interval: 33 ms
PSNP Entry Queue Size: 0
Hello Interval: 10 s
Hello Multiplier: 3 5
CLNS I/O
Protocol State: Up
MTU: 1497
SNPA: 5254.000b.e465
Layer-2 Multicast:
All Level-1 ISs: Listening
All Level-2 ISs: Listening
Telegram: @cisco_in_persian_channel
120 CCNP SPCOR 350-501 Official Cert Guide
What were you able to glean from this example? (It’s not enough to just glance through; be
sure to read and consume the output.)
Example 5-2 does the same things in different ways: it has the MTU, Level-1/Level-2 are on
by default, it names the IS-IS process, it activates address families, it has different CLNS
commands, and adjacency is apparent in the log messages. There is nothing to memorize, but
you need to understand how this works.
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 121
Repetition is the mother of learning. The best advice I can give you at this point for the
exam is to configure Figure 5-1 to its full state. I am going to do this now. It is well worth
your time and practice, so take some time to do it now. In the end, you should have some-
thing that looks like the output in Example 5-3. It doesn’t have to match perfectly, but I am
looking for the IPv4 and IPv6 host routes on, let’s say, PE7.
Example 5-3 Desired Configurations Results
How is it going? Do you have your routes from PE2, PE3, P4, P5, and PE6? If you do, great!
If you do not and are missing some IPv6 routes, welcome to the CCNP 305-501 exam! You
must make this function properly, and you are burning precious minutes. Do you move on
and lose the points (there are no lookbacks on this exam), or do you spend more time to get
this answer correct?
Here’s a hint: RFC 5120. You did not misconfigure IPv6 or miss some interfaces from being
included (you likely have been checking for this for at least several minutes now). RFC 5120
introduced a third IPv6 TLV—Multi Topology Reachable IPv6 Prefix (TLV 237)—to support
multiple independent topologies and SPF calculations. Wait… What are the first two? (A
pop-quiz from an omitted theoretical section.) If you answered TLV 232 (IPv6 addressing,
Hello PDU, etc.) and TLV 236 (IPv6 prefix reachability information—metrics, up/down bits,
etc.), you are doing well. Back to TLV 237 though… What does TLV 237 have to do with not
getting all the IPv6 routes on PE7? Everything. If you followed through with the exercise
instead of just continuing to read this chapter, you may have picked up that XR routers were
not getting XE routes and vice versa. Now you’re learning.
■ Single Topology: In this mode, IPv4 and IPv6 are in the same logical topology table,
sharing a single SPF computation for best path selection. This mode is the default
IPv6 mode for IOS routers.
Telegram: @cisco_in_persian_channel
122 CCNP SPCOR 350-501 Official Cert Guide
■ Multitopology: This mode separates IPv4 and IPv6 into independent topology tables.
Different metrics can be assigned to an interface via address families to allow for
diverse paths and SPF calculations for each protocol. This is great when your network
does not have a 1:1 correlation for IPv4 and IPv6 addresses. It is the recommended
mode for this very reason. This is the default mode for IOS XR routers. Now you
should understand why the two operating systems were not getting each other’s IPv6
routes into their RIBs. In the sample topology, IOS routers are on the top, and XR
routers are on the bottom.
Can you think of how to solve the routing problem now? Try it before reading further.
■ Single-Topology Transition: This is a hybrid mode for legacy routers with IPv6 in a
single-topology mode that need to add IPv4 support without disrupting the exist-
ing IPv6 network. As you saw in the now-memorable trap that I set up for you in the
network, single-topology IOS routers cannot interpret multitopology TLVs sent by
IOS XR routers, and you certainly do not want to run into these issues during a migra-
tion. Instead, you can put the multitopology XR routers into a single-topology mode
(exactly how I collected all the routes in Example 5-3). Then both single and multito-
pology TLVs are exchanged, and a single SPF calculation is performed. Once the older
routers are removed, the network can be returned to the multitopology state.
Example 5-4 shows how to fix this issue with the full IS-IS configuration from PE7. We do
not keep any secrets from you. You will need to do this on PE3 and P5 as well.
Example 5-4 Fixing the Problem with a Single-Topology Conversion
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 123
How do you turn on IS-IS IPv6 single topology on IOS routers? Recall from Table 5-2 that
there is one additional step: enable IPv6 on the interface. Example 5-5 demonstrates an
example from PE2.
5
Example 5-5 Enabling IS-IS IPv6 Single Topology on IOS
Now you know how a single-topology mode works on IOS and how multitopology and
single-topology modes work on IOS XR. What about multitopology on IOS? If you tried to
get the previous scenarios to work, you may have used or noticed the use of wide metrics,
which I cover soon. This is the final piece of the puzzle for this scenario. Example 5-6 shows
how to enable a multitopology mode for IOS.
Telegram: @cisco_in_persian_channel
124 CCNP SPCOR 350-501 Official Cert Guide
PE2(config-router-af)# multi-topology
PE2(config-router-af)# end
PE2# show running-config | section isis
! Output omitted for brevity
router isis
net 49.0001.0101.0010.0002.00
metric-style wide
log-adjacency-changes
!
address-family ipv6
multi-topology
exit-address-family
Example 5-7 shows how to enable a single-topology transition mode for IOS routers.
Example 5-7 Enabling IS-IS Single-Topology Transition Mode on IOS
Example 5-8 shows how to enable a single-topology transition mode for IOS XR routers.
Example 5-8 Enabling IS-IS Single-Topology Transition Mode on IOS XR
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 125
I am deliberately using this approach to make you better remember how to make this tech-
nology work instead of providing you with structured screenshots of various outputs. You
need to learn how the protocol works by breaking it down and putting it back together;
there is no substitute to mastering these topics. On the exam, you will have to visualize what
happens in each task, and no memorization of output will suffice if you do not know the
mechanics of enabling a feature.
Can we verify this? Yes, in Example 5-9 notice how PE2 advertises two TLVs because it is
configured to use the single-topology transition mode. Prefix 2001:10:100:23::/64 appears
twice in the database (notice the MT-IPv6 reference at the bottom).
Example 5-9 Enabling IS-IS Single-Topology Transition Mode on IOS XR Continued 5
When you are considering these different topology modes, I recommend that you under-
stand what their behavior is and think through exam questions or network problems.
Now, let’s examine an issue in Figure 5-2.
Telegram: @cisco_in_persian_channel
126 CCNP SPCOR 350-501 Official Cert Guide
IS-IS IS-IS
Area 0001 Area 0002
P4
IPv4/IPv6
4v
IP
IPv4/IPv6
PE3 P5
I simplified the starting topology by leaving only three routers that all run IOS; this removes
any confusion regarding default IS-IS topology modes. (You should try to remove as many
complexities as you can when you are learning something new.) So far, you’ve practiced on
IOS and XR because you have to get used to the differences in platform configurations.
These run single topology, but the links connecting to P5 are dual stacked, running IPv4
and IPv6. The link between PE3 and P4 runs IPv4 only. What can possibly go wrong here?
Remember from our earlier discussion, the SPF calculation will be performed once for both
IPv4 and IPv6. Because IS-IS is enabled on both links, PE3 and P4 think that PE3-P4 link
will transport IPv6 traffic. To get a better understanding, look at what PE3 sees in
Example 5-10.
Example 5-10 IS-IS Single Topology for IPv6
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 127
In its LSP database, PE3 sees P4 advertising the IPv6 loopback of 2001:4:4:4::4/128.
However, is this loopback reachable from PE3? You can test, as shown in Example 5-11.
Example 5-11 PE3 Has No Reachability to P4’s Loopback
Telegram: @cisco_in_persian_channel
128 CCNP SPCOR 350-501 Official Cert Guide
Here, you can see that PE3 cannot ping it, and the route to this prefix is also missing!
Because the single-topology mode was used, PE3 and P4 think that the link between them
is usable for IPv6, which is not even running on that interface. One way to fix this issue is to
enable IPv6 on this link to make it dual stack just as the links connecting to P5. Another way
is to enable multitopology on all routers, as shown on PE3 in Example 5-12.
Example 5-12 PE3 Obtains Reachability to P4’s Loopback
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 129
Notice how PE3 uses GigabitEthernet3 (the link to P5) now. Also, notice that the show isis
neighbor detail command reveals the supported topologies—IPv4 and IPv6. 5
Now that I’ve thrown you in at the deep end with this advanced multitopology topic, let’s
examine some of the basics. You might initially perceive the incremental buildup of IS-IS
knowledge as a preferable approach. However, you’ll come to appreciate this method in the
long run. The approach of experimenting, encountering failure, and then striving to compre-
hend the reasons behind those failures ingrains knowledge more effectively. This approach
contrasts with simply amassing theoretical knowledge beforehand, which often leads to for-
getting key details during application.
IS-IS Adjacencies
In IS-IS networks, routing is organized into a two-level hierarchy of areas to provide scal-
ability: Level-1 and Level-2. A contiguous collection of Level-2 routers forms the backbone.
Non-backbone areas consist of Level-1 routers, and routers that handle both intra- and inter-
area routing are classified as Level-1 and Level-2 routers. When no hierarchy is needed, all
routers are treated as Level-2 routers (similar to a single Area 0 in OSPF). In fact, as routers
have become more powerful, it has become very common to use a single IS-IS area for your
entire domain.
Areas control adjacencies, levels create topologies (we discuss this more in the “Route
Advertisement” section). You will appreciate this deceivingly simple wording because it is
easy to get confused on the exam when questions about areas and levels between IS-IS and
OSPF start blending in your mind and you start doubting your memory. Exam questions are
deliberately built to confuse hesitating candidates. For now, remember that IS-IS areas affect
only the formation of adjacencies between two routers; that is it.
■ A Level-1 router only forms an adjacency with another router in the same area.
Telegram: @cisco_in_persian_channel
130 CCNP SPCOR 350-501 Official Cert Guide
Memorize the preceding list and you will be able to quickly identify the right answer. Ques-
tions to solidify your knowledge include the following:
■ Two routers are in the same area. Can they form Level-1 (L1) and Level-2 (L2) adjacen-
cies at the same time? Yes, this is how Cisco routers work by default.
■ Two routers are in different areas. Can they form an L2 adjacency? Yes.
■ Two routers are in different areas. Can they form an L1 adjacency? No.
■ If you want two routers to form a Level-1 adjacency, what should you do? Put them in
the same area.
Refer to Figure 5-1 to solidify this knowledge. Then look at PE3’s adjacencies in Example
5-13 because it has formed adjacencies in different areas.
Example 5-13 PE3’s IS-IS Adjacencies
Example 5-13 shows that PE3 has three adjacencies with one being an L1 adjacency. It is
interesting that the System ID attribute references the router’s hostname rather than the
6-byte system ID. This happens because the LSP exchange contains TLV 137, which provides
a name-to-system-ID mapping during the LSP exchange. Additionally, notice the use of the
show isis hostname command to quickly reveal router hostnames and adjacency levels.
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 131
I recommend you get in the lab and try changing levels and areas to have a solid
understanding of this matter.
Example 5-14 shows how L1 areas must match for adjacencies to establish. PE2 is in area 1,
but as soon as you put it in a different area, the adjacency no longer works.
Example 5-14 Changing PE2 Level Area Adjacency
■ Down: This is the initial state where no IS-IS Hellos (IIHs) have been received from the
neighbor.
■ Initializing: IIHs have been received from the neighbor, but there’s uncertainty about
whether the neighbor is properly receiving this router’s IIHs.
■ Up: IIHs have been received from the neighbor, confirming that the neighbor is
properly receiving this router’s IIHs.
IS-IS natively supports only broadcast (multiaccess, which is the default) and point-to-point
network types. On broadcast networks, routers create adjacencies, synchronize their data-
bases, and keep them synchronized. IS-IS elects one Designated Intermediate System (DIS)
for each broadcast network. IS-IS has no concept of a backup DIS, and in fact, it does not
need one. A DIS is elected based on these criteria:
Telegram: @cisco_in_persian_channel
132 CCNP SPCOR 350-501 Official Cert Guide
A pseudonode and DIS are present at each IS-IS level (L1 and L2); a broadcast network
segment can have two pseudonodes and two DISs. The topology shown in Figure 5-1 does
not have more than two routers on a network segment, but it does not matter, since by
default Cisco routers create the broadcast networks on Ethernet segments.
Now, look at Example 5-15 to examine the network segment between routers PE3 (IOS XR)
and P4 (IOS).
Example 5-15 Viewing DIS Information in IOS and IOS XR
When you look at the two interfaces, which are facing each other, you can see that PE3 has
won the DIS role. In IOS XR, it is under LAN ID on PE3 and under DR ID for the IOS-based
P4, confirming that PE3 was elected. A priority value greater than the default value (64) will
make the interface more preferable. In the topology, I left the priority values alone, so you
should verify why PE3 was elected. To do so, compare the SPNAs (MAC addresses) on both
routers in Example 5-16.
Example 5-16 Changing IS-IS Interface Priority on P4
It is easy to see that PE3 has a higher MAC address than P4 (15>0d). Since IS-IS DIS is pre-
emptive (if a new router appears on the LAN with a higher interface priority, the new router
becomes the DIS), the newcomer will purge the old pseudonode LSP and flood a new set of
LSPs. Example 5-17 shows exactly that.
Example 5-17 Configuring DIS Preemption and Verification
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 133
If you set IS-IS priority to the value of 0, it will significantly lower the probability of the
router to become a DIS. What do IS-IS LSPs look like under the current network type of
broadcast? As you can see in Example 5-18, there are quite a few of them.
Example 5-18 IS-IS LSPs Under Network Type Broadcast
You are going to love point-to-point interfaces where IS-IS expects a single neighbor, estab-
lishes an adjacency through a three-way handshake process, and subsequently synchronizes
link-state databases. Unless you expect more than one neighbor on Ethernet segments,
convert them to point-to-point network type because IS-IS routers will not benefit from
the presence of a pseudonode. DIS elections waste resources, CSNPs (complete sequence
number PDUs) are flooded into a segment, and the pseudonode LSP enters the LSP database
Telegram: @cisco_in_persian_channel
134 CCNP SPCOR 350-501 Official Cert Guide
for the routers in that level. I suggest you turn your broadcast interfaces into point-to-point
interfaces, as in Example 5-19, where PE3 and P4 are shown. Please do this on all interfaces
in the diagram.
Example 5-19 IS-IS Network Goes Point-to-Point
I had to wait 20 minutes for the LSP holdtime of 1200 seconds to expire, and now there are
only 7 LSPs instead of the 13 LSPs shown earlier in Example 5-18. The pseudonode objects
are no longer advertised, as seen in Example 5-20.
Example 5-20 IS-IS Database Under Point-to-Point Network Type
What breaks IS-IS router adjacencies? If you slowed down and observed IS-IS adjacencies
during cutting over to the point-to-point network types, you may have noticed network
types break the adjacencies. However, try putting PE2 back to the broadcast network type.
Example 5-21 shows a change in network type.
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 135
As you can see in Example 5-21, the adjacency is immediately removed when network types
do not match. MTU mismatches can give you trouble as well. Observe Example 5-22.
Telegram: @cisco_in_persian_channel
136 CCNP SPCOR 350-501 Official Cert Guide
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 137
5
System Id Type Interface IP Address State Holdtime Circuit Id
PE3 L1 Gi1 10.100.23.3 DOWN 22 00
PE2(config-if)# do show isis neighbor
Setting one side’s MTU to 1512 certainly kills the adjacency due to the difference in values,
and you can observe how adjacency is kept in the DOWN state with the holdtime timer dec-
rementing and then an IIH hello packet putting it back to the 30-second countdown.
Pop-quiz time: Do you know why I chose this specific MTU value? If the answer is no, you
must study up on this topic. The short answer is every MPLS label takes 4 bytes, so adding
the additional 12 bytes accounts for three additional labels in the label stack.
IS-IS Metrics
Cisco’s IS-IS implementation sets a default metric of 10 for all interfaces, regardless of
their bandwidth. Notice that I aim to steer clear of comparing IS-IS with OSPF features in
contrast to many educational materials. The approach here avoids confusion during exam
scenarios. Instead, I prefer separating the specifics of each protocol. This approach facilitates
clearer understanding and quicker identification of knowledge gaps. It’s preferable to
maintain clarity rather than risk confusion during exams, especially with nuanced questions.
However, everyone has their preferred study method, so choose what works best for you.
Telegram: @cisco_in_persian_channel
138 CCNP SPCOR 350-501 Official Cert Guide
In IS-IS, administrators need to manually configure interface metrics if different values are
required. The original IS-IS specification and RFC 1195 specify a 6-bit width for individual
interface metrics (1–63) and a 10-bit width for complete path metrics (1–1023). While suffi-
cient at the time of definition, modern requirements demand a broader metric range. Also, do
not forget that vendors can implement RFCs differently. Think of the topology in Figure 5-1
(try to visualize this in your head). PE6 and PE7 are neighbors via L1, but their loopbacks are
in L2; the path from PE7 to PE6’s loopback 10.100.100.6 will have four links because it must
travel through the contiguous L2 backbone. This should add up to the metric value of 40. I
have quickly converted the wide metrics to the default narrow metrics on all routers (one com-
mand on IOS under the routing process, two commands on XR under each address family).
You can see what happens in Example 5-23.
Example 5-23 IS-IS Narrow Metrics Behavior
Three links to get to PE6 plus the loopback add up to the metric value of 40, regardless of band-
width. It doesn’t matter if the links are 1 Mb or 400 Gb; they have the same path metric of 10.
You can see how setting all interfaces to the same metric can lead to suboptimal routing and
why designs may call for changing interface metrics. The IS-IS metric becomes similar to the hop
count metric that is used by the distance-vector protocols. Then, there is the issue of correlating
1 Mb to 400 Gb. Now, you can attempt to change the PE6 loopback0 metric to 100 (you know
that 63 is the maximum allowed under the narrow construct), as shown in Example 5-24.
Example 5-24 IS-IS Narrow Metrics Changing Values
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 139
With a quick change on PE6, you can see that PE7 sees 93 (10 + 10 + 10 + 63). While the
interface metric is limited to 63 and does not allow you to set 100, PE7 sees a path metric
that exceeds 63 because the cost is added from the local LSP database. Now, try adding a
metric on another router. Example 5-25 adds a metric of 20 (instead of 10) on P5.
Example 5-25 IS-IS Narrow Metrics Changing Values on P5
RP/0/RP0/CPU0:P5# configure
RP/0/RP0/CPU0:P5(config)# router isis CCNP
RP/0/RP0/CPU0:P5(config-isis)# interface gigabitEthernet 0/0/0/1
RP/0/RP0/CPU0:P5(config-isis-if)# address-family ipv4
RP/0/RP0/CPU0:P5(config-isis-if-af)# metric 20
RP/0/RP0/CPU0:P5(config-isis-if-af)# commit
RP/0/RP0/CPU0:P5(config-isis-if-af)#
You can quickly see how this approach can become unmanageable on larger networks. This
is why RFC 3784 (now RFC 5305) introduced wide metrics to address this issue, allowing 5
for a 24-bit interface metric range and a 32-bit range for entire path metrics. It is highly rec-
ommended to utilize wide metrics, especially for Segment Routing support and why they
are enabled at the beginning of this chapter. Remember that it is essential for all routers in an
area to use the same metric type. Try getting on PE5 now and rolling back your configura-
tions to wide metrics. You will achieve IS-IS adjacency, but you will not build the complete
SPF tree. The reason is that you are sending different TLVs that are independent of each
other. Example 5-26 clearly illustrates this from how PE6 views the topology.
Example 5-26 IS-IS Incomplete SPF Tree Due to Mixed Narrow and Wide Metrics
PE6 can compute narrow metrics but has trouble with P5 and PE7, since P5 advertises wide
metrics. Both routers’ SPF trees are incomplete because the routers cannot reconcile 6-bit
and 24-bit values—which is not possible. RFC 3787 specified the migration process from
narrow to wide metrics without affecting the topology. Consult Example 5-27, where a tran-
sitional mode metric is applied to advertise both narrow and wide TLVs at the same time.
Telegram: @cisco_in_persian_channel
140 CCNP SPCOR 350-501 Official Cert Guide
Once the network topology runs in the transitional state, the operator can gradually convert
to wide metrics.
Example 5-27 IS-IS Metrics Transitional State
Also, observe that you can specify a different metric for different levels where you set the
default metric of 100 for L1 interfaces and 1000 for L2 interfaces in Example 5-28. As you
can see, metric 63 is still used for L1 connections even though you specify the default level
of 100.
Example 5-28 IS-IS Metrics Varying Level Metrics
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 141
PE3 --
P4 1000 P4 Gi0/0/0/2 *PtoP*
P5 1000 P5 Gi0/0/0/3 *PtoP*
PE6 1010 P4 Gi0/0/0/2 *PtoP*
PE7 1010 P5 Gi0/0/0/3 *PtoP*
Route Advertisement
As mentioned earlier, areas control adjacencies, levels create topologies. In IS-IS, levels
control LSP flooding. Consider the following logic:
1. A Level-1 router looks at the destination address and compares the area address to its
own area.
2. If the Level-1 area is equal, then flood within its Level-1 area (which is what normally
happens).
3. If the Level-1 area is not equal, pass to the nearest Level-1-2 router.
4. At the Level-1-2 router, compare the area address to its own area. If the Level-1 area is
equal, use the Level-1 database. If not equal, use the Level-2 database.
5
5. Level-2 LSPs are flooded across a contiguous set of Level-2 areas.
How can this be summarized in a single sentence so that you can remember it on the exam?
Use Level-1 if equal; if not equal, pass to Level-l-2; there, try Level-1 first, then use Level-2.
That’s the best I have come up with thus far. Maybe you can come up with a better one.
Now, again consider Figure 5-1, where PE2 has only the Level-1 area routes. I got rid of all
narrow metrics in the topology to make things cleaner. PE2 has two interfaces in the L1 area,
one of these peering with PE3. Now, see what routes PE2 sees in Example 5-29.
Example 5-29 PE2 Routes
PE2 sees only L1 routes, and there are none coming from other routers at this time. L1
routers are aware only of the local area topology. The only route it receives is an L1 default
route, which was never configured. It’s interesting that Cisco routers do this on their own
by default. This is not the behavior of non-Cisco routers, where you have to generate these
manually. Now, see what routes PE3 sees in Example 5-30.
Telegram: @cisco_in_persian_channel
142 CCNP SPCOR 350-501 Official Cert Guide
PE3, an L1-L2 router, on the other hand, sees the entire topology. It sees all L2 routes,
which you can tell by the loopbacks of all five routers in the topology. It sees the L1 route
10.100.100.2 coming from PE2. It even sees the L1-level route from area 0003 (PE6 to PE7
link), but it comes in as an L2 route. Finally, let’s look at an L2-only router; PE4 is a good
example in Example 5-31.
Example 5-31 PE4 Routes
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 143
Only L2 routes are seen. What is the conclusion? To put it into one exam-type statement:
L1 routes are advertised into the L2 backbone, and L2 routes are not advertised into L1 areas
by default, except for the default route.
Now, reread that last statement. What does it mean from a design perspective? Configure
the L1 areas to have a default route pointing to the L1-L2 router, or alternatively, place all
routers within a single large L2 area. The previous statement is my opinion (although an
educated one based on experience). Wait, what is the point of having multiple L2 areas then?
And why does Figure 5-1, the reference topology, have multiple L2 areas?
I constructed the diagram to illustrate how IS-IS behaves, not to make a design recommenda-
tion. Now that you know that PE1, which belongs to area 1, will still get area 2 and area 3
routes, why not run a single L2 area? That is what most ISPs try to do nowadays; simplicity
is the key driving force. Unless you are running out of scale. Or if you run networks under
different administrative governance. Or you are merging networks. Or you can dream up
other corner case scenarios. And for those, there are discussions, differences of opinions,
and “better” ways of doing things. If you are running out of scale, use BGP. Or use Cisco
Unified MPLS, which bridges multiple IS-IS domains into a single LSP. Or use IS-IS prefix
suppression to only advertise loopback interfaces. Or, depending on your topology, start
summarizing routes, using IS-IS mesh-groups. (Look up mesh-groups when you have time.) 5
… I have a headache coming on just thinking about this. We are here to see how the protocol
works, and if I had my say, a single IS-IS Level-2 area for the network core is where I would
start. But I am not you and I do not know your network and business. But I’m convinced
I can charge a princely sum for my consultations, just like those trendy artisanal coffees…
except I promise my advice won’t leave a bitter taste in your mouth!
Back to something far more interesting. Where does PE2’s default route in Example 5-28
come from? Yes, it comes from PE3, but how did PE3 know to advertise it? Remember, you
did not configure the default route anywhere. Even more so, what is the IS-IS mechanism
that advertised the default route to PE2? Meet the attach bit from RFC 3787, section 7.
When a router is L1-L2, it will use the attach bit to advertise to the router in the same area
how to exit the area to reach other destinations. Example 5-32 shows exactly that.
Example 5-32 IS-IS Attach Bit
Telegram: @cisco_in_persian_channel
144 CCNP SPCOR 350-501 Official Cert Guide
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 145
In PE3’s LSP database Level-1 section, the ATT bit is flipped to the value of 1; this is what
makes PE3 advertise this default route to this Level-1 area. What could be interesting is to
look at PE6 and PE7, since they both belong to the same Level-1 area. How would their data-
bases look for area 0003, I wonder? Example 5-33 shows this.
Example 5-33 IS-IS Attach Bit on Multiple Routers
Isn’t that something? Both PE6 and PE7 advertise their own exits from area 0003. But back
to PE3. In the lower output of Example 5-32, you should also observe that there is no default
route on PE3; it just knows about all the IS-IS networks advertised in the topology. You can
change this, however. You can hop on P4 and advertise the default route into the topology, as
shown in Example 5-34.
Example 5-34 IS-IS Default Route Origination
Telegram: @cisco_in_persian_channel
146 CCNP SPCOR 350-501 Official Cert Guide
Note the option to use a route map, but you just want the vanilla default route. It immedi-
ately shows up on PE3 as well. Again, P4 has no default route in its RIB. It doesn’t matter,
because it still advertises that route.
Overload Bit
The Overload bit is a good one to be aware of. Originally, it signified memory exhaustion on
a router—a rare condition on modern routers. Operators cleverly use this technique to route
the traffic around the router on which they plan to do maintenance. Example 5-36 shows this
feature in action. I will take P5 out of service for “maintenance.” But before we do, here is a
good brainstorming activity to prepare you for the exam and professional work.
Look at Figure 5-1 again. When you take P5 out of service, what consequences will this have
on the topology? Do not read the answer but think about this discussion on areas and lev-
els. Will full reachability work between areas 1 and 3? Specifically, will PE3 be able to ping
PE7’s loopback 10.100.100.7?
The answer should be no, since PE7’s loopback0 is in Level-2, which will be cut off from the
contiguous connectivity to the backbone as soon as P5 is no longer a part of the path. By
taking P5 out of service, you will break the rule of keeping the backbone fully connected
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 147
and lose reachability. It is good to think ahead, and that is what I am trying to coach you on.
Our suggestion is to convert the PE6-PE7 link to Level-2. Do this on your own. This task
shouldn’t be hard. If you do not do it, you will not be able to reach PE7 unless you come up
with this or a different solution. Let’s pick up in Example 5-35 before making the change.
Example 5-35 Overload Bit Usage Part 1
Notice that PE3’s route and trace to PE7 lie through P5. Now for some unscheduled
maintenance window time…
5
Example 5-36 Overload Bit Usage Part 2
RP/0/RP0/CPU0:P5# configure
RP/0/RP0/CPU0:P5(config)# router isis CCNP
RP/0/RP0/CPU0:P5(config-isis)# se?
segment-routing set-overload-bit
RP/0/RP0/CPU0:P5(config-isis)# set-overload-bit ?
advertise If overload-bit set advertise the following types of IP prefixes
level Set overload-bit for one level only
on-startup Set overload-bit temporarily after reboot
<cr>
RP/0/RP0/CPU0:P5(config-isis)# set-overload-bit
RP/0/RP0/CPU0:P5(config-isis)# commit
RP/0/RP0/CPU0:P5(config-isis)# do show isis database P5.00-00
After seeing the option to advertise the overload bit for different prefixes, levels, or on
start-up, you can choose the road most traveled and see the OL bit flipped to 1 in the LSP
database. In Example 5-37, you can confirm that PE3 now takes a different path.
Telegram: @cisco_in_persian_channel
148 CCNP SPCOR 350-501 Official Cert Guide
Now you have all the time in the world to upgrade P5 to the image TAC wants you to load.
What other things do I have in mind for you? Let’s do a couple more before we move on to
troubleshooting IS-IS.
Authentication
IS-IS supports plaintext and MD5 authentication on hello packets and LSPs. PE2 and PE3
peering desperately needs these, your manager tells you. For exam purposes, it’s good to know
that TLV 10 stores IS-IS authentication, which is present in IIH and PDUs. Example 5-38 shows
one way to configure authentication.
Example 5-38 IIH Plaintext Authentication IOS
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 149
In this example, you enable the IOS side and can watch the peering dissolve in front of
your eyes as the countdown timer expires. Now, you can fix the other side, as shown in
Example 5-39.
Example 5-39 IIH Plaintext Authentication IOS XR
RP/0/RP0/CPU0:PE3# configure 5
RP/0/RP0/CPU0:PE3(config)# router isis CCNP
RP/0/RP0/CPU0:PE3(config-isis)# interface gigabitEthernet 0/0/0/1
RP/0/RP0/CPU0:PE3(config-isis-if)# hello-password ?
WORD The unencrypted (clear text) hello password
accept Use password for incoming authentication only
clear Specifies an unencrypted password will follow
encrypted Specifies an encrypted password will follow
hmac-md5 Use HMAC-MD5 authentication
keychain Specifies a Key Chain name will follow
text Use cleartext password authentication
RP/0/RP0/CPU0:PE3(config-isis-if)# hello-password text IKNOWISIS
RP/0/RP0/CPU0:PE3(config-isis-if)# do show isis neighbor
Telegram: @cisco_in_persian_channel
150 CCNP SPCOR 350-501 Official Cert Guide
There are several authentication options. If you choose plaintext, right before hitting
commit, you see PE2 is in Init state. As you hit commit, it comes right back up.
What would be good homework at this point? Try getting this to work with key chains on
the XR side, because they do not support plaintext authentication.
The second task is to secure LSPs. You can take care of the IOS side first, as in Example 5-40.
Example 5-40 LSP MD5 Authentication
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 151
RP/0/RP0/CPU0:PE3# configure
RP/0/RP0/CPU0:PE3(config)# router isis CCNP
RP/0/RP0/CPU0:PE3(config-isis)# lsp-password ?
WORD The unencrypted (clear text) LSP/SNP password
accept Use password for incoming authentication only
clear Specifies an unencrypted password will follow
encrypted Specifies an encrypted password will follow
hmac-md5 Use HMAC-MD5 authentication
keychain Specifies a Key Chain name will follow
text Use cleartext password authentication
RP/0/RP0/CPU0:PE3(config-isis)# lsp-password keychain LSP ?
enable-poi Enable purge originator identification
level Set lsp-password for one level only
send-only Authenticate outgoing LSPs/SNPs only
snp Specify SNP packets authentication mode
<cr>
RP/0/RP0/CPU0:PE3(config-isis)# lsp-password keychain LSP
RP/0/RP0/CPU0:PE3(config-isis)# exit 5
RP/0/RP0/CPU0:PE3(config)# key chain LSP
RP/0/RP0/CPU0:PE3(config-LSP)# key 1
P/0/RP0/CPU0:PE3(config-LSP-1)# cryptographic-algorithm md5
RP/0/RP0/CPU0:PE3(config-LSP-1)# key-string AUTH-LSP
RP/0/RP0/CPU0:PE3(config-LSP-1)# commit
RP/0/RP0/CPU0:PE3(config-LSP-1)#
Telegram: @cisco_in_persian_channel
152 CCNP SPCOR 350-501 Official Cert Guide
The task is now complete and verified. Note that I deliberately avoid the use of show
running-config unless it is absolutely necessary. To excel in this exam and become a pro-
ficient engineer (as Cisco expects), hands-on learning is paramount—a belief I strongly
uphold. Mere book knowledge falls short; I’ve encountered individuals adept at memoriza-
tion yet unable to execute fundamental networking tasks. My aim is to pass invaluable skills
on to you, those you’ll appreciate profoundly if you embrace this method.
IS-IS
Area 0002
IS-IS L1 IS-IS
Area 0001 Area 0003
L1 L2 L1
L2
PE2 P4 PE6
L2
L1 L2 L1
L2 L2
PE3 P5 PE7
L2 L2 L1
To stage what I am about to show you next, you need to convert area 0003 to L1 links and
add an additional L1 link between PE2 and PE6. If you are using CML or other virtualized
platforms, this task should not take you long. I am going to power down the current lab to
get interfaces added and will see you in a few minutes. You can also roll back the last change
on P5 for the overload bit if you would like. Here is where you pick up in Example 5-41.
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 153
Question: Can PE2 and PE6 exchange L1 routes? If you recall what we covered previously in
this chapter, the answer should be no. What is your explanation as to the reasons why? Here
are two. First, areas are not equal; therefore, the direct L1 adjacency is not possible. Second,
since L2 routes are not leaked to L1 areas by default, both PE2 and PE6 will be missing
routes from each other’s areas. You can take a snapshot of what you see with Example 5-42.
Example 5-42 PE6 Topology View
On PE6, notice the absence of PE2’s peering (not in the LSP database) and the single L1
route from PE7. A critical question: How would you solve this “problem”? Think before
reading further.
Telegram: @cisco_in_persian_channel
154 CCNP SPCOR 350-501 Official Cert Guide
If you understand the mechanics of IS-IS and what you need to know for the exam, a possi-
ble and quick solution should be to make their areas equal. I propose you convert area 0003
on PE6 and PE7 to area 0001. Example 5-43 shows PE6; PE7 needs this as well.
Example 5-43 Changing Area 0003 to Area 0001
Are you ready to see what happened? Take a look at Example 5-44.
Example 5-44 Changing Area 0003 to Area 0001 results
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 155
Voila! Notice that the peering is built, and L1 area 0001 contains routes from both PE3
and PE7. The adjacency completes, and the L1 routes dominate the pathing in the area as
described at the beginning of IS-IS logical flow. The IS-IS jigsaw puzzle is finally complete.
At this point, you should have a thorough understanding of how the protocol functions.
When doing this “007” networking, it is easy to mess up the IS-IS database. Should this hap-
pen, clear the IS-IS processes and database, and the network will put itself back together.
Troubleshooting IS-IS
If you paced yourself and carefully examined the content in this chapter, you have climbed
far on the IS-IS mountain and already have the most important aspect necessary for trouble-
shooting this protocol: you understand the mechanics of how it works. What you may be
missing now are the commands to reveal where the problems lie. Table 5-3 summarizes the
more important ones that you have seen throughout these discoveries.
Well, that is IS-IS for you. Stay confident in your understanding of this protocol and don’t
get bogged down in minutiae, because it’s your grasp of the core principles that will prove
most valuable during the exam. IS-IS is a robust protocol for running your network underlay.
I suggest you go through the review section that follows and take a good break to let the
knowledge settle for a few days before diluting it with OSPF, which we will tackle next.
Telegram: @cisco_in_persian_channel
156 CCNP SPCOR 350-501 Official Cert Guide
Connectionless Network Service (CLNS), CSNP, DIS, IIH, Link-State Database (LSDB),
link-state routing protocol (LSP), NET address, NSAP, NSEL, SPF Algorithm, SPNA, TLV
Telegram: @cisco_in_persian_channel
Chapter 5: IS-IS 157
Review Questions
As a part of the review, we encourage you to provide a single-sentence answer (keep your
answers as short as possible) to the following questions. If you struggle to complete this
answer in a single sentence, this may indicate a lack of clarity or reveal gaps in your under-
standing. We have constructed these questions to help you consolidate this chapter’s
information and extract the essence of the covered content.
The answers to these questions appear in Appendix A. For more practice with exam format
questions, use the Pearson Test Prep Software Online.
1. Can you explain the single key advantage of the IS-IS protocol over OSPF in a service
provider network?
2. What is the difference between IS-IS areas and levels?
Bibliography
R. Callon. RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments,
IETF, https://tools.ietf.org/html/rfc1195, December 1990.
T. Li and H. Smit. RFC 3784, Intermediate System to Intermediate System (IS-IS)
Extensions for Traffic Engineering (TE), IETF, https://tools.ietf.org/html/rfc3784,
June 2004.
T. Li and H. Smit. RFC 5305, IS-IS Extensions for Traffic Engineering, IETF, https://
tools.ietf.org/html/5305, October 2008.
J. Parker. RFC 3787, Recommendations for Interoperable IP Networks using Intermedi-
ate System to Intermediate System (IS-IS), IETF, https://tools.ietf.org/html/rfc3787,
May 2004.
Telegram: @cisco_in_persian_channel