IS-IS Design Principles
Foundation for Success
Successful IS-IS deployments start with solid design principles. These guidelines ensure networks are scalable, maintainable, and perform optimally while providing the flexibility to accommodate future growth and changes.
Core Design Principles
Hierarchical Design
Concept: Implement a clear hierarchical structure using IS-IS levels and areas to provide scalability and stability.
Benefits:
- Reduced routing table size
- Faster convergence
- Fault isolation
- Simplified troubleshooting
Implementation:
- Use Level-1 for access areas
- Use Level-2 for backbone
- Level-1-2 routers at boundaries
- Logical area organization
Redundancy and Resilience
Concept: Design networks with appropriate redundancy to maintain connectivity during failures while avoiding unnecessary complexity.
Redundancy Best Practices
# Multiple area border routers
router isis
is-type level-1-2
# Diverse path metrics
interface GigabitEthernet0/0
isis metric 100
interface GigabitEthernet0/1
isis metric 150 # Backup path
# BFD for fast failure detection
interface GigabitEthernet0/0
isis bfd
bfd interval 50 min_rx 50 multiplier 3
Summarization Strategy
Concept: Implement route summarization at appropriate boundaries to reduce routing overhead and improve stability.
Where to Summarize:
- Area boundaries
- Network layer boundaries
- Redistribution points
- Regional aggregation points
What to Summarize:
- Contiguous address blocks
- Customer networks
- Infrastructure networks
- Service networks
Addressing Plan
Concept: Develop a comprehensive addressing plan that supports summarization, troubleshooting, and network growth.
Component | Recommendation | Example | Benefit |
---|---|---|---|
Area IDs | Geographic or functional | 49.0001 (NYC), 49.0002 (LA) | Easy identification |
System IDs | Based on loopback IP | 1921.6800.0001 (192.168.0.1) | Correlation with management |
Loopbacks | Contiguous blocks | 192.168.0.0/24 for infrastructure | Easy summarization |
P2P Links | Dedicated ranges | 10.0.0.0/16 for WAN links | Clear separation |
Design Decision Framework
1. Requirements Analysis
- Network size and growth projections
- Performance requirements
- Availability targets
- Security requirements
2. Topology Design
- Area layout and boundaries
- Router level assignments
- Redundancy planning
- Traffic flow analysis
3. Implementation Planning
- Migration strategy
- Testing procedures
- Rollback plans
- Documentation requirements
Scalability Guidelines
IS-IS Scalability Factors
IS-IS scalability depends on several factors including network size, topology complexity, and resource availability. Understanding these factors helps design networks that can grow efficiently.
Key Scalability Metrics
Factor | Recommended Limit | Impact | Optimization |
---|---|---|---|
Routers per Area | 50-100 | LSP database size | Area subdivision |
Areas per Domain | 100-200 | Level-2 database size | Route summarization |
LSPs per Router | 1000-5000 | Memory and CPU usage | LSP fragmentation |
Neighbors per Router | 50-100 | Hello overhead | Network design |
Routes per LSP | 200-500 | Flooding efficiency | Route aggregation |
Scalability Optimization Techniques
Hierarchical Design
Use IS-IS's natural hierarchy to limit flooding scope and reduce database sizes.
# Proper level assignment
router isis CORE
is-type level-2-only
net 49.0001.1921.6800.0001.00
router isis ACCESS
is-type level-1
net 49.0010.1921.6800.0010.00
router isis BORDER
is-type level-1-2
net 49.0010.1921.6800.0020.00
Route Summarization
Implement aggressive summarization to reduce routing table sizes and improve convergence.
# Summarization at area boundaries
router isis
summary-address 192.168.0.0 255.255.0.0 level-2
summary-address 172.16.0.0 255.240.0.0 level-1
summary-address 10.0.0.0 255.0.0.0 external
Route Filtering
Use route filtering to control information propagation and reduce unnecessary routes.
# Filter unnecessary routes
ip prefix-list FILTER-MGMT seq 10 deny 192.168.255.0/24
ip prefix-list FILTER-MGMT seq 20 permit 0.0.0.0/0 le 32
router isis
distribute-list prefix FILTER-MGMT out level-2
Mesh Groups
Use mesh groups in full-mesh topologies to reduce LSP flooding overhead.
# Optimize flooding in mesh networks
interface Serial0/0
isis mesh-group 100 # Primary path
interface Serial0/1
isis mesh-group blocked # Backup path
Resource Planning
Memory Planning
Memory Usage Factors:
- ~1KB per LSP in database
- ~500 bytes per route
- ~200 bytes per neighbor
- Buffer allocation for flooding
Optimization:
- Limit LSP database size
- Use route summarization
- Configure appropriate buffers
CPU Planning
CPU Usage Factors:
- SPF calculations
- LSP processing
- Hello packet handling
- Route table updates
Optimization:
- Tune SPF timers
- Limit topology changes
- Use incremental SPF
Growth Planning
Phase 1: Current State Analysis
- Document current network size
- Measure resource utilization
- Identify bottlenecks
- Assess performance metrics
Phase 2: Growth Modeling
- Project network expansion
- Model resource requirements
- Identify scaling limits
- Plan optimization points
Phase 3: Implementation Strategy
- Design scalable architecture
- Implement growth accommodations
- Establish monitoring
- Plan regular reviews
Security Best Practices
IS-IS Security Framework
IS-IS security involves multiple layers of protection, from basic authentication to comprehensive access control. A defense-in-depth approach provides the best protection against various threats.
Security Layers
Authentication Layer
Implement strong authentication to prevent unauthorized routers from joining the IS-IS domain.
Authentication Best Practices
# Use HMAC-MD5 authentication
router isis
area-password SecureArea2024 authenticate hmac-md5
domain-password SecureDomain2024 authenticate hmac-md5
# Interface-specific authentication
interface GigabitEthernet0/0
isis password InterfaceKey2024 level-1 authenticate hmac-md5
isis password InterfaceKey2024 level-2 authenticate hmac-md5
# Key chain for rotation
key chain ISIS-AUTH
key 1
key-string CurrentKey2024
accept-lifetime 00:00:00 Jan 1 2024 23:59:59 Dec 31 2024
send-lifetime 00:00:00 Jan 1 2024 23:59:59 Nov 30 2024
key 2
key-string NextKey2025
accept-lifetime 00:00:00 Nov 1 2024 infinite
send-lifetime 00:00:00 Jan 1 2025 infinite
router isis
authentication key-chain ISIS-AUTH level-1
authentication mode hmac-md5 level-1
Access Control Layer
Control which routes are advertised and accepted to prevent routing attacks.
Route Filtering for Security
# Prevent private address advertisement
ip prefix-list DENY-PRIVATE seq 5 deny 10.0.0.0/8
ip prefix-list DENY-PRIVATE seq 10 deny 172.16.0.0/12
ip prefix-list DENY-PRIVATE seq 15 deny 192.168.0.0/16
ip prefix-list DENY-PRIVATE seq 20 deny 0.0.0.0/0
ip prefix-list DENY-PRIVATE seq 100 permit 0.0.0.0/0 le 32
# Apply security filters
router isis
distribute-list prefix DENY-PRIVATE out
# Limit redistribution
route-map SECURE-REDIS permit 10
match ip address prefix-list AUTHORIZED-NETWORKS
set tag 65001
router isis
redistribute connected route-map SECURE-REDIS
Monitoring Layer
Implement comprehensive monitoring to detect security events and anomalies.
What to Monitor:
- Authentication failures
- Unexpected adjacencies
- Route table changes
- LSP database modifications
- Traffic anomalies
Monitoring Tools:
- SNMP monitoring
- Syslog analysis
- Network management systems
- Custom scripts
- Flow analysis
Security Threats and Mitigations
Unauthorized Router Insertion
Threat: Attacker inserts rogue router into IS-IS domain
Impact: Route manipulation, traffic interception, network disruption
Mitigation:
- Strong authentication on all levels
- Physical security of network infrastructure
- Regular adjacency monitoring
- Network access control
Route Hijacking
Threat: Unauthorized advertisement of routes
Impact: Traffic redirection, service disruption, data interception
Mitigation:
- Route filtering and validation
- Route origin authentication
- Network monitoring and alerting
- Baseline route table monitoring
Denial of Service
Threat: Flooding attacks or resource exhaustion
Impact: Network instability, service outages, performance degradation
Mitigation:
- Rate limiting and throttling
- Resource monitoring and limits
- Redundant network design
- Traffic filtering and shaping
Security Hardening Checklist
Authentication
Access Control
Monitoring
Performance Optimization
IS-IS Performance Tuning
Optimizing IS-IS performance involves tuning various timers, controlling resource usage, and implementing features that improve convergence time and reduce overhead.
Key Performance Areas
Convergence Optimization
Reduce convergence time through timer optimization and fast failure detection.
Convergence Tuning
# SPF timer optimization
router isis
spf-interval 5 50 200 # initial, min, max delays (seconds)
max-lsp-lifetime 900 # Reduce LSP lifetime
lsp-refresh-interval 600 # Reduce refresh interval
# Fast Hello timers for critical links
interface GigabitEthernet0/0
isis hello-interval 3
isis hello-multiplier 3 # 9 second hold time
# BFD for subsecond failure detection
interface GigabitEthernet0/0
isis bfd
bfd interval 150 min_rx 150 multiplier 3
# LSP generation throttling
router isis
lsp-gen-interval 5 50 200 # initial, min, max delays (ms)
Memory Optimization
Optimize memory usage through database management and route control.
Memory Management
# Limit maximum LSPs
router isis
max-lsp-lifetime 1200
# Route summarization to reduce table size
router isis
summary-address 192.168.0.0 255.255.0.0
summary-address 172.16.0.0 255.240.0.0
# Limit redistribution
route-map LIMIT-ROUTES permit 10
match ip address prefix-list ESSENTIAL-ROUTES
set metric 100
router isis
redistribute connected route-map LIMIT-ROUTES
CPU Optimization
Reduce CPU utilization through efficient processing and calculation limits.
CPU Management
# SPF calculation limits
router isis
spf-interval 10 100 500 # Increase intervals for stability
ispf # Enable incremental SPF
# Hello padding reduction (on P2P links)
interface Serial0/0
isis network point-to-point
no isis hello padding
# LSP pacing
router isis
lsp-refresh-interval 900 # Spread refresh load
Bandwidth Optimization
Minimize protocol overhead through efficient packet handling and mesh groups.
Bandwidth Efficiency
# Mesh groups for full-mesh networks
interface Serial0/0
isis mesh-group 100
interface Serial0/1
isis mesh-group blocked
# Adjust CSNP intervals on LANs
interface GigabitEthernet0/0
isis csnp-interval 30 # Reduce frequency
# LSP MTU optimization
router isis
lsp-mtu 1497 # Optimize for interface MTU
Performance Monitoring
Key Metrics
# Monitor SPF performance
show isis spf-log
show isis spf-log detail
# Check memory usage
show isis database summary
show processes memory | include ISIS
# Monitor CPU utilization
show processes cpu | include ISIS
show processes cpu history
# Check neighbor stability
show isis neighbors detail
show isis interface detail
Performance Thresholds
Metric | Good | Warning | Critical | Action |
---|---|---|---|---|
SPF Runtime | < 100ms | 100-500ms | > 500ms | Optimize topology/summarization |
LSP Database Size | < 1000 LSPs | 1000-5000 LSPs | > 5000 LSPs | Implement summarization |
Convergence Time | < 10s | 10-30s | > 30s | Tune timers, add BFD |
Memory Usage | < 50MB | 50-100MB | > 100MB | Reduce database size |
Performance Troubleshooting
Slow Convergence
Symptoms: Routes take long time to appear after topology changes
Diagnosis Steps:
- Check SPF calculation times
- Verify timer configurations
- Examine LSP flooding efficiency
- Review network topology complexity
Solutions:
- Tune SPF and LSP generation timers
- Implement BFD for fast failure detection
- Optimize network hierarchy
- Use incremental SPF (iSPF)
High Memory Usage
Symptoms: Router memory consumption increasing over time
Diagnosis Steps:
- Monitor LSP database size growth
- Check route table size
- Examine redistribution sources
- Review summarization effectiveness
Solutions:
- Implement route summarization
- Limit redistribution scope
- Use route filtering
- Optimize area boundaries
Performance Best Practices Summary
- Plan for Scale: Design network hierarchy to support growth
- Monitor Regularly: Establish baseline metrics and track changes
- Tune Gradually: Make incremental changes and measure impact
- Test Thoroughly: Validate performance improvements in test environment
- Document Changes: Maintain records of optimization configurations