当前位置:网站首页>[HCIP Continuous Update] Principle and Configuration of IS-IS Protocol
[HCIP Continuous Update] Principle and Configuration of IS-IS Protocol
2022-08-09 13:27:00 【Chuan Dome 2001】
IS-IS protocol principle and configuration
The source of the routing entry
Direct Routing
Indirect routing
Static Routing
Dynamic Routing
IGP Interior Gateway Protocol
Distance vector: RIP
Link Status: OSPF ISIS
EGP Exterior Gateway Protocol: BGP
ISIS Intermediate System to Intermediate System
ISIS protocol is a dynamic routing protocol developed by the ISO national standardization organization for the CLNP protocol in the OSI model. Due to the strong scalability of ISIS, it supports both CLNP and IP protocols.So what is now called ISIS is called Integrated ISIS
ospf----TCP/IP----IP
ISIS----OSI/TCP/IP----IP/CLNP
Scenario application
OSPF - Campus Network - Application Protocol
ISIS—Backbone—Service-Based Protocol
Address Structure
NSAP address: main network + subnet + host + SEL (protocol type)
NET identifier: is a special NSAP address, when SEL=00, the NSAP address becomes the NET identifier
How Dynamic Routing Works
1. Establish neighbor relationship
2. Synchronize the database
3. Calculate the routing table
Router classification
level-1 router ----- quite a special area of OSPF
level-2 router-----equivalent to the backbone area of OSPF
level-1-2 router ---- equivalent to OSPF ABR area border router
level-1 neighbor relationship
Same area: level-1 router and level-1 router or level-1-2 router
level-2 neighbor relationship
Same area: level-2 router and level-2 router or level-1-2 router
Different regions: establishing level-2 relationships
Neighbor HELLO message
Establishing neighbor relationships
Network Type
1. Point-to-point network: P2P IIH (mac: 0180-C200-0014)
2. Broadcast network L1 lan IIH (mac: 0180-C200-0015)
State Mechanism
1, down
2, init
3, up
DIS and the analogy between DIS and DR
Barrier of link state information
Establishing neighbor relationships—IIH
Information
—SNP (Sequence Number Message)
—CSNP (Complete Sequence Number Message) ----equivalent to DD in OSPF
—PSNP (Partial Sequence Number Packet) ----equivalent to LSR/LSACK in OSPF
Inter-area routing
1. The layer where the L2 neighbor relationship is located - with detailed routing
2. The layer where the L1 neighbor relationship is located - with a default route pointing to the L1/2 router for external access
3. The L1/2 router sets the ATT field to 1, and the L1 router receives the information with the position 1, and generates a default route pointing to the L1/2 router
The difference between IS-IS and OSPF
IS-IS configuration
1. Configure basic IP information
2. Configure ISIS
- start ISIS
— configure the NET identifier
——Configure the router type
3. The interface participating in the ISIS calculation starts the ISIS process
4. Verify
Configuring ISIS
isis 100network-enytity 49.0012.0000.0001.00//Configure the net identityis-level level-1//Configure the router typeThe interface participating in the ISIS calculation starts the ISIS process
interface g0/0/0isis enable 100interface LoopBack 0isis enable 100Test View
dis isis peer//View neighbor relationship informationdis isis route // View ISIS routedis ip routing-tableprotocol isisRoute leak
When there are more than two L1/2 routers (ABRs) in the non-backbone area, since the area inside the area accesses the external area through the default route pointing to the L1/2 router, the optimal route calculated internally is in the entire network.The path selection may not be optimal, and there may be sub-optimal paths.Therefore, through route leakage, the detailed route of the backbone area is leaked to the sub-area, and the detailed route of the whole network is obtained.With accurate calculation, sub-routing problems are avoided.- Leaked on ABR
isis 100import-route isis level-2 into level-1边栏推荐
- WeChat side: what is consistent hashing, usage scenarios, and what problems does it solve?
- Flutter Getting Started and Advanced Tour (2) Hello Flutter
- MySQL 原理与优化,Group By 优化 技巧
- 发明时代,「幂集创新」事关你我
- Data Mining-05
- Flutter Getting Started and Advanced Tour (8) Button Widget
- Too much volume... Tencent was asked on the side that the memory was full, what would happen?
- 技术分享 | 接口自动化测试如何处理 Header cookie
- 字符串转换整数 (atoi)
- glide工具类的简单封装
猜你喜欢

中断系统结构及中断控制详解

h264协议

你没见过的《老友记》镜头,AI给补出来了|ECCV 2022

ABP 6.0.0-rc.1的新特性

鹅厂机器狗花式穿越10m梅花桩:前空翻、单桩跳、起身作揖...全程不打一个趔趄...

h264 protocol

用场景定义硬件,英码科技破解“边缘计算”密码

Two minutes recording can pass by second language!The volcano how to practice and become voice tone reproduction technology?

How to upload local file trial version in binary mode in ABAP report

LeetCode #101. Symmetric Binary Tree
随机推荐
About the handling of variable parameters in the Retrofit network request URL
FFmpeg库在win10上配置使用(不配置libx264)
造自己的芯,让谷歌买单!谷歌再度开源 180nm 工艺的芯片
自定义VIEW实现应用内消息提醒上下轮播
Glory to the Blue Yonder, speeds up the strategic growth
K个结点的组内逆序调整
Simple encapsulation of glide tool class
Flutter Getting Started and Advanced Tour (8) Button Widget
ERP不规范,同事两行泪 (转载非原创)
AQS Synchronization Component - FutureTask Analysis and Use Cases
荣耀携手Blue Yonder,加快企业战略增长
新起之秀 DPU,正在掀起数据中心变革!
Common gadgets of Shell (sort, uniq, tr, cut)
Win10 compiles the x264 library (there are also generated lib files)
数据挖掘-05
Manchester city launch emotional intelligence scarf can be detected, give the fans
保存Simulink仿真模型为图片或者PDF的方法
The batch size does not have to be a power of 2!The latest conclusions of senior ML scholars
字符串转换整数 (atoi)
Intranet penetration tool ngrok usage tutorial




