On Fri, 28 Sep 2018 at 11:48, Saku Ytti <[email protected]> wrote:
>
> Hey James,
>
> In this failure mode this feature would help to find the rogue ISIS
> speaker, so looks sensible feature to me, even when very partial
> support it will limit limit the domain where the suspect exists. I've
> personally not used it, and very much hope I'll never have need for
> it.

Hi Saku,

Yeah agreed, it's really helping only in a corner case of possible
issue a network might face so I'm usually against deploying features
that only work or are only used in rare corners, to reduce complexity.
However, I can imagine that the time I need this feature is when
everything is on fire, even the fire is on fire.

On Fri, 28 Sep 2018 at 14:55, Pierre Emeriaud <[email protected]> wrote:
>
> a subsidiary of $work had an issue with rogue purges. But it wasn't a
> rogue equipment. It was just failing in the (very) wrong way. Their
> network went down for several reaaaally looong hours.

^ This is my concern, multi-vendor network, not all our vendors
support this feature but "some" is better than "none" in this case I
think.

On Fri, 28 Sep 2018 at 16:00, Clinton Work <[email protected]> wrote:
> I support a multi-vendor network with Cisco, Nokia SROS, and Juniper routers. 
>  We've had several incidents with ISIS purge messages that were very 
> difficult to isolate.  Every router needs to support the ISIS POI TLV if you 
> want to isolate the source of the ISIS purge messages which is difficult in a 
> multi-vendor network.  The cause of the ISIS purge messages was faulty 
> hardware that was corrupting the ISIS LSP packets.

^ Again, not all our vendors do support it but even if only the
Junipers do, we can narrow an issue down to a specific Juniper and
checks it's neighborus if they are not Juniper boxes.

Cheers,
James.
_______________________________________________
juniper-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to