幻灯片1-IETF.ppt

上传人:ga****84 文档编号:459875 上传时间:2018-10-09 格式:PPT 页数:9 大小:2.07MB
下载 相关 举报
幻灯片1-IETF.ppt_第1页
第1页 / 共9页
幻灯片1-IETF.ppt_第2页
第2页 / 共9页
幻灯片1-IETF.ppt_第3页
第3页 / 共9页
幻灯片1-IETF.ppt_第4页
第4页 / 共9页
幻灯片1-IETF.ppt_第5页
第5页 / 共9页
点击查看更多>>
资源描述

1、Purge Originator Identification TLV for IS-IS,Fang WeiYue QinZhenqiang Li China MobileTony Li Cisco Systems Jie Dong Huawei Technologies,Content,MotivationsCases to Generate Purge PacketProposed Purge Originator Identification TLVSecurity ConsiderationsNext Step,Motivations,IS-IS protocol floods pur

2、ges throughout an network, regardless of which IS initiated the purge. At present an IS-IS purge does not contain any information identifying the IS that generates the purge. This makes it difficult to locate the source IS.We suggest a TLV be added to purges to record the system ID of the IS generat

3、ing the purge.,Cases to Generate Purge Packet,Legitimate casesAn IS purges its own LSPA LSP owned by another IS ages outA new DIS is elected.Improper casesAn implementation misunderstanding ISO 10589 or predating TC1 generates a purge when it receives a corrupted LSP.An implementation with bugs trie

4、s to purge one of its LSPs and makes a truly egregious mistake.An implementation fails to retain the LSP header after purging while flooding is still in progress.,The Purge Originator Identification TLV,This document defines a TLV to be included in purges. This TLV carries the system ID of the IS ge

5、nerating the purge.This makes it much easier for the network administrator to locate the origin of the purge and thus the cause of the purge.It is also helpful to developers in lab situations.,CODE - XX (to be assigned) LENGTH - total length of the value field.VALUE - System ID of the Intermediate S

6、ystem that initiated the purge.,Security Considerations,If the proposed TLV is used in conjunction with IS-IS authentication mechanisms, the purge LSP is constructed by removing the original contents of the LSP, leaving only the LSP header, adding the Purge Originator Identification TLV and then adding the IS-IS authentication TLV.This document amends the behavior specified in RFC5304 and RFC5310.,Next Step,Any comments are welcome.Move it forward to be a working group draft?,

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 学术论文资料库 > 毕业论文

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。