1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
|
Network Working Group N. Shen
Request for Comments: 2763 Siara Systems
Category: Informational H. Smit
Cisco Systems
February 2000
Dynamic Hostname Exchange Mechanism
for IS-IS
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2000). All Rights Reserved.
Abstract
Currently, there does not exist a simple and dynamic mechanism for
routers running IS-IS to learn about symbolic hostnames. This
document defines a new TLV which allows the IS-IS routers to flood
their name to system ID mapping information across the IS-IS network.
1. Introduction
IS-IS uses a 1-8 byte system ID (normally 6 bytes) to represent a
node in the network. For management and operation reasons, network
operators need to check the status of IS-IS adjacencies, entries in
the routing table and the content of the IS-IS link state database.
It is obvious that, when looking at diagnostics information,
hexadecimal representations of systemIDs and LSP identifiers are less
clear than symbolic names.
One way to overcome this problem is to define a name-to-systemID
mapping on a router. This mapping can be used bidirectionally. E.g.,
to find symbolic names for systemIDs, and to find systemIDs for
symbolic names. One way to build this table of mappings is by static
definitions. Among network administrators who use IS-IS as their IGP
it is current practice to define such static mappings.
Thus every router has to maintain a table with mappings between
router names and systemIDs. These tables need to contain all names
and systemIDs of all routers in the network.
Shen & Smit Informational [Page 1]
^L
RFC 2763 Dynamic Hostname February 2000
There are several ways one could build such a table. One is via
static configurations. Another scheme that could be implemented is
via DNS lookups. In this document we propose a third solution. We
hope the proposed solution is easier and more manageable than static
mapping or DNS schemes.
2. Possible solutions
The obvious drawback of static configuration of mappings is the issue
of scalability and maintainability. The network operators have to
maintain the name tables. They have to maintain an entry in the table
for every router in the network. They have to maintain this table on
each router in the network. The effort to create and maintain these
static tables grows with the total number of routers on the network.
Changing the name or systemID of one router, or adding one new router
introduced will affect the configurations of all the other routers on
the network. This will make it very likely that those static tables
are outdated.
Having one table that can be updated in a centralized place would be
helpful. One could imagine using the DNS system for this. A drawback
is that during the time of network problems, the response time of DNS
services might not be satisfactory or the DNS services might not even
be available. Another possible drawback might be the added complexity
of DNS. Also, some DNS implementations might not support A and PTR
records for CLNS NSAPs.
A third way to build dynamic mappings would be to use the transport
mechanism of the routing protocol itself to advertise symbolic names
in IS-IS link-state PDU. This document defines a new TLV which allows
the IS-IS routers to include the name to systemID mapping information
in their LSPs. This will allow simple and reliable transport of name
mapping information across the IS-IS network.
3. The Dynamic Hostname TLV
The Dynamic hostname TLV is defined here as TLV type 137.
LENGTH - total length of the value field.
VALUE - a string of 1 to 255 bytes.
The Dynamic hostname TLV is optional. This TLV may be present in any
fragment of a non-pseudo node LSP. The value field identifies the
symbolic name of the router originating the LSP. This symbolic name
can be the FQDN for the router, it can be a subset of the FQDN or any
string operators want to use for the router. The use of FQDN or a
Shen & Smit Informational [Page 2]
^L
RFC 2763 Dynamic Hostname February 2000
subset of it is strongly recommended. The content of this value is a
domain name, see RFC 2181. The string is not null-terminated. The
systemID of this router can be derived from the LSP identifier.
If this TLV is present in a pseudo node LSP, then it should not be
interpreted as the DNS hostname of the router.
4. Implementation
The Dynamic Hostname TLV is optional. When originating an LSP, a
router may decide to include this TLV in its LSP. Upon receipt of an
LSP with the dynamic hostname TLV, a router may decide to ignore this
TLV, or to install the symbolic name and systemID in its hostname
mapping table.
A router may also optionally insert this TLV in it's pseudo node LSP
for the association of a symbolic name to a local LAN.
5. Security Considerations
This document raises no new security issues for IS-IS. However, it is
encouraged to use authentications for IS-IS routing protocol. The
authentication mechanism for IS-IS protocol is specified in [1] and
it is being enhanced within IETF in [2].
6. Acknowledgments
The authors would like to thank Enke Chen and Yakov Rekhter for their
comments on this work.
7. References
[1] ISO, "Intermediate system to Intermediate system routing
information exchange protocol for use in conjunction with the
Protocol for providing the Connectionless-mode Network Service
(ISO 8473)," ISO/IEC 10589:1992.
[2] Li, T., "IS-IS HMAC-MD5 Authentication", Work in Progress.
Shen & Smit Informational [Page 3]
^L
RFC 2763 Dynamic Hostname February 2000
8. Authors' Addresses
Naiming Shen
Siara Systems, Inc.
1195 Borregas Avenue
Sunnyvale, CA, 94089
EMail: naiming@siara.com
Henk Smit
Cisco Systems, Inc.
170 Tasman Drive
San Jose, CA, 95134
EMail: hsmit@cisco.com
Shen & Smit Informational [Page 4]
^L
RFC 2763 Dynamic Hostname February 2000
9. Full Copyright Statement
Copyright (C) The Internet Society (2000). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Shen & Smit Informational [Page 5]
^L
|