Intermediate System to Intermediate System (IS-IS) is a link-state routing protocol used for large-scale networks, including service provider environments. Unlike OSPF, IS-IS operates at Layer 2 (Data Link Layer) of the OSI model. It does not depend on IP for its operation, making it flexible and scalable for multiprotocol environments, including IPv4 and IPv6.
IS-IS organizes networks into a two-level hierarchy to optimize routing and scalability.
Level 1:
Level 2:
Level 1-2 Routers:
Example Scenario:
IS-IS uses various types of Protocol Data Units (PDUs) to exchange information.
Link-State PDU (LSP):
Complete Sequence Number PDU (CSNP):
Partial Sequence Number PDU (PSNP):
How PDUs Work Together:
TLVs are the building blocks of IS-IS packets, allowing flexibility in carrying different types of information.
What is a TLV?
Common TLVs:
Configuration Example:
To define an area in IS-IS:
set protocols isis area 49.0001
IS-IS assigns a metric to each link, which represents the cost of using that link.
Default Metrics:
Wide Metrics:
Configuration Example:
To enable wide metrics:
set protocols isis level 1 wide-metrics-only
Manual Metric Adjustment:
Example:
set protocols isis interface ge-0/0/1 level 2 metric 10
ge-0/0/1 to 10.Route redistribution allows IS-IS to share routes between Level 1 and Level 2 or with external routing protocols.
When to Use Redistribution?
Configuration Example:
Redistributing static routes into IS-IS:
set protocols isis redistribute static level 2
Explanation:
IS-IS supports both IPv4 and IPv6 through integrated routing. This makes it efficient for dual-stack networks.
How IS-IS Supports IPv6:
Configuration Example:
set protocols isis interface ge-0/0/1 family inet6
IS-IS is a link-state routing protocol widely used in service provider and large-scale enterprise networks. Unlike OSPF, IS-IS operates directly over Layer 2 (not IP) and supports both IPv4 and IPv6. It uses TLVs for flexible data handling and divides the routing domain into areas and levels for scalability.
In addition to core concepts, the following enhancements provide deeper understanding and are often tested in certification exams.
IS-IS routers are not identified by IP addresses but by NET (Network Entity Title) addresses derived from NSAP (Network Service Access Point) formats. This unique identifier allows routers to participate in the IS-IS routing domain.
A NET consists of:
Area ID: Identifies the IS-IS area.
System ID: Uniquely identifies the router within the area (often derived from the loopback interface or MAC address).
N-selector: Indicates the NSAP selector (typically 00 for routing).
49.0001.1921.6800.1001.00
49.0001 – Area ID
1921.6800.1001 – System ID (6-byte value)
.00 – N-selector (indicates routing)
Every IS-IS router must have a unique NET, which is configured under the IS-IS protocol hierarchy.
set protocols isis net 49.0001.1921.6800.1001.00
IS-IS routers establish neighbor relationships by exchanging Hello messages (IS-IS Hello PDUs, or IIHs). The adjacency state evolves in stages, and mismatches in parameters such as MTU or authentication can cause failures.
| State | Description |
|---|---|
| Down | No IIH messages received from neighbor. |
| Init | IIH message received, but adjacency not yet established. |
| Up | Full adjacency established; LSDBs can now be synchronized. |
MTU mismatch between peers.
Area ID mismatch.
Authentication failure.
Interface type mismatch (e.g., point-to-point vs broadcast).
Use this command to check adjacency status:
show isis adjacency
IS-IS supports authentication to secure control-plane exchanges, especially important in environments where spoofed PDUs could cause routing instability.
Authentication can be applied to:
IIH (Hello PDUs)
LSP (Link State PDUs)
SNP (Sequence Number PDUs)
Junos supports plaintext and MD5 authentication for IS-IS.
set protocols isis interface ge-0/0/0.0 hello-authentication md5 key 1 secretkey
set protocols isis interface ge-0/0/0.0 lsp-authentication md5 key 1 secretkey
| Topic | Key Details |
|---|---|
| NET Addressing | Unique ID for each router; Area ID + System ID + N-selector. |
| Neighbor State Machine | Down → Init → Up; failure reasons include MTU or auth mismatch. |
| Authentication | Optional security for IIH, LSP, SNP PDUs; supports MD5 in Junos. |
What is the difference between Level-1 and Level-2 routers in IS-IS?
Level-1 routers operate within an area, while Level-2 routers connect different areas.
IS-IS uses a two-level hierarchy similar to OSPF’s multi-area design. Level-1 routers exchange routing information only within their local area. They rely on Level-2 routers to reach destinations outside that area. Level-2 routers maintain a backbone topology and exchange routing information between areas. A router can operate as Level-1, Level-2, or Level-1-2. Level-1-2 routers participate in both databases and act as gateways between areas. When a Level-1 router needs to reach a destination outside its area, it forwards traffic to the nearest Level-1-2 router. This design improves scalability by reducing the size of routing databases within each area.
Demand Score: 73
Exam Relevance Score: 86
Why do many service provider networks prefer IS-IS instead of OSPF?
Because IS-IS scales better and integrates more easily with MPLS environments.
IS-IS was originally designed for large carrier networks and has several advantages in service provider environments. It runs directly over Layer-2 rather than IP, which simplifies operation and avoids dependency on IP connectivity. IS-IS also handles large link-state databases efficiently and supports flexible TLV extensions that allow easy integration with new technologies such as MPLS, Segment Routing, and traffic engineering. Because many MPLS features were originally standardized with IS-IS support, carriers often choose it as their primary IGP. Additionally, its two-level hierarchy simplifies backbone design and scaling.
Demand Score: 70
Exam Relevance Score: 82
Why might an IS-IS adjacency fail to form?
Because of mismatched interface parameters such as level type, authentication, or MTU.
For two routers to form an IS-IS adjacency, several parameters must match. Both routers must operate on compatible levels (Level-1 or Level-2), share the same area configuration, and use identical authentication settings if authentication is enabled. Additionally, mismatched interface MTU values or disabled IS-IS on the interface can prevent adjacency formation. Engineers typically troubleshoot using commands such as show isis adjacency and checking interface configuration under the IS-IS protocol settings. Identifying mismatched parameters is a common task during IS-IS deployment or troubleshooting.
Demand Score: 74
Exam Relevance Score: 88
What is the purpose of TLVs in IS-IS?
TLVs allow IS-IS to carry flexible routing information and support new features.
TLV stands for Type-Length-Value. IS-IS uses TLVs to encode routing information inside Link-State PDUs (LSPs). Each TLV describes a specific piece of information such as neighbor links, IP prefixes, or traffic engineering parameters. Because TLVs are modular, new capabilities can be added without redesigning the entire protocol. This extensibility is one of the reasons IS-IS adapts easily to modern technologies like MPLS traffic engineering and Segment Routing. Routers simply interpret the TLVs they understand and ignore unknown ones, making the protocol highly flexible.
Demand Score: 69
Exam Relevance Score: 83