Just FYI ... An interesting discussion on nanog/cisco-nsp lists ... started innocent with SRv6 bashing, now went into IGP - specifically ISIS territory :)
---------- Forwarded message --------- From: Saku Ytti <s...@ytti.fi> Date: Thu, Jun 18, 2020 at 12:43 PM Subject: Re: Devil's Advocate - Segment Routing, Why? To: Robert Raszuk <rob...@raszuk.net> Cc: Mark Tinka <mark.ti...@seacom.mu>, na...@nanog.org <na...@nanog.org>, cisco-nsp NSP <cisco-...@puck.nether.net> On Thu, 18 Jun 2020 at 13:28, Robert Raszuk <rob...@raszuk.net> wrote: > To your IGP point let me observe that OSPF runs over IP and ISIS does not. That is first fundamental difference. There are customers using both all over the world and therefore any suggestion to just use OSPFv3 is IMHO quite unrealistic. Keep in mind that OSPF hierarchy is 2 (or 3 with super area) while in IETF there is ongoing work to extend ISIS to 8 levels. There is a lot of fundamental differences between those two (or three) IGPs and I am sure many folks on the lists know them. Last there is a lot of enterprise networks happily using IPv4 RFC1918 all over their global WAN and DCs infrastructure and have no reason to deploy IPv6 there any time soon. If you are serious about converging to a single IGP I would rather consider look towards OpenR type of IGP architecture with message bus underneath. On Thu, 18 Jun 2020 at 13:43, Saku Ytti <s...@ytti.fi> wrote: I view the 802.3 and CLNS as liability, not an asset. People who actually route CLNS are a dying breed, think just DCN of a legacy optical. Many platforms have no facilities to protect ISIS, any connected attacker can kill the box. Nokia handles generated packets classification by assigning DSCP value to application then DSCP to forwarding-class, which precludes from configuring ISIS qos. Very few people understand how ISIS works before ISIS PDU is handed to them, world from 802.3 to that is largely huge pile of hacks, instead of complete CLNS stack implementation. There is no standard way to send large frames over 802.3, so there is non-standard way to encap ISIS for those links. Also due to lack of LSP roll-over, ISIS is subject to a horrible attack vector which is very difficult to troubleshoot and solve. -- ++ytti
_______________________________________________ Lsr mailing list Lsr@ietf.org https://www.ietf.org/mailman/listinfo/lsr