Fact-checked by Grok 2 weeks ago

IS-IS

Intermediate System to Intermediate System (IS-IS) is a designed as an (IGP) for intradomain routing within autonomous systems, originally developed by the (ISO) to support the Open Systems Interconnection (OSI) suite and later extended by the (IETF) to handle traffic efficiently in both pure and mixed OSI/ environments. It employs the shortest path first (SPF) , akin to Dijkstra's, to compute optimal routes based on a shared link-state database built from flooded link-state data units (LSPs), enabling routers to maintain a complete view and support scalable, hierarchical routing across large networks. IS-IS is particularly noted for its flexibility in addressing, using network entity titles (NETs) derived from OSI network service access point (NSAP) formats, and its ability to carry multiple information via network layer identifiers (NLPIDs), including support for IPv4 (NLPID 129) and (per 5308). The protocol's development traces back to the late 1980s as part of ISO's efforts to enable for Connectionless Network Protocol (CLNP) in OSI networks, with the core specification outlined in ISO/IEC 10589:2002. and RFC 1195 (1990) for integrated support, allowing a single instance to manage both protocol families without the overhead of separate mechanisms. This adaptation addressed the need for a robust IGP in early environments, where IS-IS competed with and later OSPF, but gained prominence in backbones due to its native support for large-scale topologies and minimal configuration complexity compared to area-based OSPF designs. Over time, extensions have enhanced its capabilities, including traffic engineering (RFC 3784), cryptographic authentication (RFC 5304), and (RFC 5308), ensuring its continued relevance in modern networks. IS-IS operates through a two-level : Level 1 routers handle intra-area within local areas using area addresses for , while Level 2 routers interconnect areas to form a backbone for inter-area traffic, with Level 1/2 routers bridging the two for route summarization and leakage as needed. Routers establish adjacencies via hello data units (PDUs) on point-to-point or broadcast links, flood LSPs to advertise link states, metrics (default reference bandwidth-based, extendable to wide metrics of 1-16,777,215), and information, and perform periodic database synchronization to detect changes and trigger partial or full SPF recalculations for fast convergence. Key advantages include its -independent design, which avoids IP-specific dependencies for greater stability; support for variable-length masking (VLSM) and type-of-service (TOS) ; and in handling thousands of routers through area partitioning and optional features like multi-instance IS-IS (MI-IS-IS) for (VRF) environments. In contemporary deployments, IS-IS powers large ISP and data center networks, often integrated with MPLS for traffic engineering and segment routing (SR), where it distributes labels and prefixes to enable source-based path control without per-flow state. Its robustness is further bolstered by mechanisms like bidirectional forwarding detection (BFD) for sub-second failure detection, loop-free alternates (LFA) for local protection, and overload bit signaling to temporarily exclude unstable routers from path calculations, making it a preferred choice for high-availability environments requiring minimal downtime. Despite competition from OSPF, IS-IS's simplicity in large, flat topologies and vendor-agnostic implementations continue to drive its adoption in core internet routing infrastructures.

Introduction

Description

IS-IS, or Intermediate System to Intermediate System, is an (IGP) originally developed for in Open Systems Interconnection (OSI) networks but subsequently adapted to support in /IP and dual environments. It functions as a link-state protocol, enabling routers within an autonomous system to exchange topology information and compute optimal paths. Widely deployed in large-scale backbones, IS-IS supports efficient across extensive IP infrastructures. In its link-state mechanism, IS-IS routers flood Link State Protocol Data Units (LSPs) to all other routers in the routing domain, allowing each to construct a synchronized database representing the complete network topology. Using this database, routers independently calculate shortest paths to destinations via Dijkstra's shortest path first (SPF) algorithm, ensuring consistent forwarding decisions across the network. The protocol employs a two-level hierarchy—Level 1 for intra-area routing and Level 2 for inter-area connectivity—to manage complexity in sizable domains. Key characteristics of IS-IS include its scalability for large topologies, native multi-protocol support for both and Connectionless Network Protocol (CLNP) traffic, and addressing flexibility that accommodates diverse network designs. High-level operation proceeds through neighbor discovery to establish communication, database synchronization to maintain topology accuracy, and route computation to update forwarding tables as changes occur. Compared to distance-vector protocols, which propagate routes incrementally and risk temporary loops or prolonged convergence during topology shifts, IS-IS achieves faster convergence and inherent loop prevention by leveraging comprehensive topology knowledge at each router.

History

The Intermediate System to Intermediate System (IS-IS) routing protocol emerged in the 1980s as a component of the International Organization for Standardization (ISO)'s Open Systems Interconnection (OSI) reference model, designed to support connectionless network layer routing within OSI environments. Developed initially for routing Connectionless-mode Network Protocol (CLNP) packets, IS-IS was formalized in its initial specification through ISO/IEC 10589, published in 1992, which defined the protocol's core mechanisms for intra-domain routing in OSI networks. In parallel with the rise of the (IP), the (IETF) adapted IS-IS for TCP/IP environments via RFC 1195, also released in 1990, which integrated capabilities into the OSI-based protocol while maintaining support for both IP and CLNP in dual-stack configurations. This extension allowed IS-IS to function as an (IGP) for IP networks without requiring a complete redesign, leveraging its existing link-state architecture. Throughout the , IS-IS gained traction among large service providers, particularly due to its superior scalability in expansive topologies compared to early implementations of (OSPF); for instance, Cisco's IS-IS at the time was noted for greater stability and reliability in handling large-scale deployments. Subsequent IETF efforts introduced key enhancements to address evolving network demands. In 2004, RFC 3784 extended IS-IS with traffic engineering capabilities, including the adoption of wide metrics (up to 24 bits) to support finer-grained path selection in bandwidth-intensive scenarios. IPv6 routing support followed in 2008 with RFC 5308, which defined mechanisms for advertising IPv6 reachability using existing IS-IS type-length-value (TLV) structures, enabling seamless dual-stack IPv4/IPv6 operations. More recently, in 2019, RFC 8667 specified extensions for Segment Routing over the MPLS data plane, allowing IS-IS to advertise segment identifiers for source-based path engineering without additional state in the network core. From 2023 to 2025, IS-IS has maintained its relevance through adoption in modern fabrics, often serving as the underlay protocol for (EVPN) and (VXLAN) overlays in multi-tier Clos topologies. While the core protocol has seen no fundamental changes, vendor implementations have incorporated advancements such as YANG data models (defined in RFC 9130, 2022) to facilitate model-driven telemetry and automation, enabling programmatic configuration, real-time monitoring, and integration with orchestration tools for large-scale environments.

Core Concepts

Terminology

In the IS-IS , an Intermediate System (IS) refers to a device, such as a router, capable of relaying network data units (NPDUs) and performing functions to forward traffic between End Systems (ESs) or other ISs within a . Conversely, an End System (ES) is a non-routing device, such as a , that originates or terminates NPDUs but does not relay them, relying instead on ISs for path determination to other destinations. The Network Service Access Point (NSAP) serves as the OSI model's equivalent to an , representing a conceptual point where network services are accessed and identifying network entities through a structured format including area address, system ID, and selector fields. IS-IS routers are addressed using NSAPs, often in the form of a Network Entity Title (NET), which omits the selector for purposes. Key protocol data units (PDUs) facilitate advertisement and . The Link State PDU (LSP) is the primary packet type used by ISs to broadcast link-state about their connectivity and reachability, enabling the of a link-state database across the network. For database , the Complete Sequence Number PDU (CSNP) lists the sequence numbers of all LSPs in an IS's database, periodically multicast by the Designated IS (DIS) on broadcast networks to ensure all neighbors maintain consistent views. In contrast, the Partial Sequence Number PDU (PSNP) targets specific LSPs, serving as acknowledgments for received LSPs or requests for missing ones to resolve discrepancies during flooding. Adjacency formation relies on the Intermediate System Hello (IIH) PDU, which ISs exchange to discover neighbors, negotiate capabilities, and establish or maintain adjacencies on point-to-point or broadcast links. On multi-access broadcast segments, a is elected among ISs based on priority to represent the segment as a pseudonode, generating LSPs on its behalf and reducing flooding overhead. IS-IS employs a hierarchical routing structure with Level 1 routing, which handles intra-area forwarding using the system ID portion of NSAP addresses within a single area, and Level 2 routing, which manages inter-area paths across the domain backbone using full area addresses to connect multiple areas. This separation allows scalable by limiting detailed topology knowledge to local areas while maintaining global connectivity.

Addressing and NET

The Intermediate System to Intermediate System (IS-IS) protocol employs Network Entity Titles (NETs) as its primary addressing mechanism for identifying routers within a routing domain. A NET is a specific form of Network Service Access Point (NSAP) address, defined in ISO 8348/Add.2, where the N-selector field is set to zero to designate the entire network entity rather than a specific service. This structure ensures unique identification of Intermediate Systems (routers) and supports the protocol's hierarchical routing model. NETs are manually configured on each router and remain static throughout the system's operation, providing a stable basis for adjacency formation and link-state advertisement. The format of a NET consists of three main components: the Area ID, the System ID, and the N-selector. The Area ID, which identifies the routing area within the domain, is variable in length, ranging from 1 to 13 bytes (octets), allowing flexibility in hierarchical addressing. The System ID follows, fixed at 6 bytes for uniqueness within the area (and domain-wide for Level 2 routers), often derived from a MAC address or assigned administratively to ensure global distinction across the network. The N-selector concludes the NET as a single byte, uniformly set to 00 for NETs, distinguishing them from NSAPs used for end-system services. This variable-length design, encoded as binary octets with the most significant octet first, enables efficient packing in protocol data units (PDUs) while supporting the OSI addressing syntax defined in ISO 10589. NETs function as router identifiers in IS-IS operations, uniquely labeling each router in Link State PDUs (LSPs) for database synchronization and path computation. The full or its System ID portion is embedded in LSP headers, allowing routers to advertise their identity and reachable prefixes without relying on IP-specific addressing. For Level 1 , the Area ID confines advertisements to intra-area scope, while Level 2 uses the System ID for inter-area connectivity, promoting in large domains. The variable Area ID length facilitates administrative partitioning of the routing domain, enabling operators to balance load and containment without fixed boundaries. To integrate within IS-IS, as specified in 1195, IP prefixes are mapped to IS-IS information through Type-Length-Value (TLV) extensions in LSPs. Routers advertise directly connected IP subnets using the Internal Information TLV (), which includes the IP address, subnet mask, and metric, allowing IS-IS to compute paths to IPv4 destinations alongside OSI addresses. For external or summarized routes, the IP External Information TLV (code 130) is employed in Level 2 LSPs, enabling hierarchical aggregation of IP prefixes (e.g., a /8 ) while preserving native IS-IS flooding efficiency. This dual-stack capability supports mixed OSI/IP environments without separate protocols, with best-match selection prioritizing longer prefix masks for precise . A representative NET example is 49.0001.1921.6800.1001.00, where 49 denotes the Authority and for private data networks, 0001 is the 1-byte Area ID, 1921.6800.1001 forms the 6-byte (often represented in dotted decimal for readability), and 00 is the N-selector. This format illustrates how NETs encapsulate both area hierarchy and router specificity in a compact, OSI-compliant string.

Hostname Resolution

In IS-IS networks, hostname resolution enables the mapping of human-readable symbolic names to router identifiers, facilitating easier . This feature is supported through a dynamic hostname Type-Length-Value (TLV) extension, defined as TLV type 137, which allows routers to advertise their within Link State Protocol Data Units (LSPs). The TLV carries a variable-length string (1 to 255 bytes) representing the hostname, such as a or a subset thereof, without null termination. This mechanism was introduced in 2763 and updated in 5301 to address the limitations of using opaque System IDs for identification in large-scale deployments. The process occurs as routers their LSPs containing the TLV across the network; receiving routers parse these LSPs and extract the TLV to build or update a local mapping table that associates the advertised with the originating router's System ID, derived directly from the LSP identifier. This mapping can extend to the full Network Entity Title () by combining the System ID with area information. Routers implementing the extension store these mappings optionally, ignoring the TLV if not supported, ensuring with the core IS-IS protocol as specified in ISO/IEC 10589. The process relies on the standard LSP mechanism but does not alter decisions. Hostname resolution finds primary use in , , and (CLI) outputs, where symbolic names replace identifiers for clarity—for instance, in implementations, the "show isis hostname" command displays the dynamic mapping table to aid . It enhances operator efficiency in multi-vendor environments by providing consistent name-based s without relying on external systems like DNS. However, the feature is optional and not integral to core operations, meaning its absence does not impact protocol functionality. Additionally, hostnames are not required to be globally unique, potentially leading to ambiguities if duplicate names are used, though the underlying System IDs remain unique.

Protocol Mechanics

Packet Types

IS-IS employs four primary types of Protocol Data Units (PDUs) to facilitate neighbor discovery, , and database synchronization within the routing domain. These PDUs share a common header structure that ensures and includes essential fields for identification and processing. The protocol's design, as specified in the OSI standard, supports both point-to-point and types, with variants tailored to Level 1 (intra-area) and Level 2 (inter-area) operations. The common PDU header, fixed at 8 octets in length, begins with an intradomain discriminator (value 0x83) to identify IS-IS packets, followed by a length indicator specifying the total PDU . It includes a field (typically 1), a reserved octet, a ID extension (value 1), and an ID octet indicating the system identifier (usually 6 octets). The header concludes with the source ID, a 6-octet representing the originating Intermediate System's identifier. The PDU type , a single octet, distinguishes the specific PDU category and variant, such as 15 for Level 1 LAN Hello or 18 for Level 1 LSP. Variable- fields follow the header, encoded in Type--Value (TLV) format to carry protocol-specific information. Hello PDUs (IIHs) are used to discover and maintain adjacencies between neighboring Intermediate Systems. There are three main variants: Level 1 IIH (PDU type 15), sent to all Level 1 routers on broadcast networks for intra-area neighbor detection; Level 2 IIH (PDU type 16), similarly for inter-area neighbors; and Point-to-Point IIH (PDU type 17), exchanged on non-broadcast links to establish bidirectional connectivity. These PDUs include fields such as holding time (to manage adjacency timers), priority (for Designated Intermediate System on ), and local , enabling routers to assess compatibility and form Level 1 or Level 2 adjacencies as needed. Link State PDUs (LSPs) advertise a router's local , capabilities, and attached networks to the domain. Level 1 LSPs (PDU type 18) are generated by Level 1 and Level 2 routers for intra-area flooding, while Level 2 LSPs (PDU type 20) are produced by Level 2 routers for domain-wide distribution. Each LSP includes a 2-octet lifetime field, initialized to a maximum (typically 1200 seconds) and decremented upon transmission to indicate validity; expired LSPs are purged after a zero- lifetime (60 seconds). A 4-octet sequence number tracks updates, starting at 1 and incrementing modulo 2^32 to ensure the latest version is propagated during flooding. The LSP identifier combines the source ID, pseudonode number (0 for non-LAN routers), and fragment number. To handle large topologies where an LSP exceeds the maximum transmission unit (MTU), fragmentation is supported by dividing content across multiple LSPs, each with a unique fragment number (0 to 255). The total number of fragments is determined by the originating LSP buffer size advertised in a TLV within the LSP. This allows up to 256 fragments per originating system, ensuring complete information is reliably flooded without due to size constraints. Sequence Number PDUs (SNPs) ensure link-state database across the network. Complete SNPs (CSNPs), with Level 1 (PDU type 24) and Level 2 (PDU type 25) variants, provide a full summary of all LSPs in the database, listing ranges of LSP identifiers, sequence numbers, checksums, and lifetimes; they are periodically by the Designated Intermediate System on broadcast networks to detect inconsistencies. Partial SNPs (PSNPs), Level 1 (PDU type 26) and Level 2 (PDU type 27), target specific LSPs for acknowledgment or query, on point-to-point links or on LANs to request missing or outdated entries, thereby resolving issues efficiently.
PDU TypeVariantRoleKey FieldsPDU Type Value
Hello (IIH)Level 1 LANL1 adjacency on broadcastHolding Time, Priority, LAN ID15
Hello (IIH)Level 2 LANL2 adjacency on broadcastHolding Time, Priority, LAN ID16
Hello (IIH)Point-to-PointAdjacency on point-to-pointHolding Time, Circuit ID17
Link State (LSP)Level 1Intra-area topologyLifetime, Sequence Number, LSP ID18
Link State (LSP)Level 2Inter-area topologyLifetime, Sequence Number, LSP ID20
Sequence Number (SNP)Level 1 CSNPL1 database summaryLSP Ranges, Sequence Numbers24
Sequence Number (SNP)Level 2 CSNPL2 database summaryLSP Ranges, Sequence Numbers25
Sequence Number (SNP)Level 1 PSNPL1 LSP query/ACKSpecific LSP ID, Sequence Number26
Sequence Number (SNP)Level 2 PSNPL2 LSP query/ACKSpecific LSP ID, Sequence Number27

Adjacency Formation

IS-IS routers establish adjacencies through the exchange of Hello packets, known as Intermediate System to Intermediate System Hello (IIH) PDUs, which allow neighbors to discover each other, exchange capabilities, and verify bidirectional communication. On point-to-point links, this process employs a to ensure reliable adjacency formation, where each router sends an IIH PDU containing its system ID, , and adjacency state, enabling the receiving router to confirm that its own Hellos are being acknowledged. This mechanism prevents false adjacencies by requiring mutual validation of received PDUs before declaring the link operational. The adjacency formation begins in the Down state, where no valid IIH has been received. Upon receiving an IIH, the state transitions to Initializing if the packet includes the three-way adjacency option (Type 0xF0), reporting the sender's state and details for . The adjacency reaches the Up state only after both routers confirm bidirectionality by matching IDs and circuit IDs in subsequent IIH exchanges, ensuring the is actively receiving and processing Hellos. Factors such as area address mismatch—where Level 1 routers must share at least one common area address—or authentication failure can cause rejection, preventing the transition to Up and triggering an adjacency down event. Hellos are transmitted periodically based on a configurable , with a default of 10 seconds on point-to-point links, to maintain adjacency liveness. The holding timer, typically set to three times the hello (default 30 seconds), defines the period after which a neighbor is considered unreachable if no IIH is received, leading to the adjacency reverting to Down. On broadcast segments, adjacency formation differs to avoid forming a full of individual adjacencies; instead, routers use specialized Level 1 and Level 2 IIH PDUs, establishing relationships through a designated intermediate system without direct point-to-point handshakes. Each router maintains a local adjacency database that stores details of established neighbors, including their system IDs, supported levels (Level 1, Level 2, or both), information, and current . This database is updated dynamically based on IIH exchanges and timer expirations, ensuring accurate tracking of changes. IIH packets play a central role in this process by carrying the necessary data for initial discovery and ongoing maintenance.

Areas and Levels

IS-IS utilizes a two-level hierarchical to scale across large networks by dividing the domain into areas and defining distinct levels. This structure confines detailed information to smaller scopes, minimizing the computational and bandwidth overhead associated with link-state updates. The protocol, originally specified in ISO 10589, organizes routers into logical areas where intra-area routing occurs at Level 1, while inter-area connectivity is handled at Level 2. An area represents a logical grouping of contiguous routers that share identical area addresses embedded in their Network Entity Titles (NETs), enabling them to form a common intra-area . Within an area, Level 1 routers exchange Link State PDUs (LSPs) solely for intra-area destinations, building a complete view of the local via the Shortest Path First () algorithm. These routers forward traffic destined for other areas to the nearest Level 1/Level 2 (L1/L2) router using a , akin to the end system-to-intermediate system (ES-IS) mechanism for local reachability. This Level 1 operation limits LSP flooding to the area boundaries, significantly reducing update propagation and enhancing scalability in or areas. Level 2 routing forms the backbone of the IS-IS , interconnecting multiple areas through a connected subgraph of Level 2 or L1/L2 routers that advertise summaries of intra-area . Unlike OSPF, which designates an explicit backbone area (Area 0), IS-IS implicitly defines its backbone via the Level 2 routers, requiring only that they maintain connectivity without area-specific addressing. L1/L2 routers participate in both levels, generating separate LSPs for each and summarizing Level 1 routes into Level 2 LSPs to abstract intra-area details, thereby preventing the backbone from being overwhelmed by local topology data. To address potential suboptimal routing—where Level 1 routers always exit their area via the closest L1/L2 border router—route leaking provides a mechanism for selectively distributing Level 2 prefixes into Level 1 areas. L1/L2 routers accomplish this by advertising external (Level 2-learned) prefixes in their Level 1 LSPs using (TLV) encodings such as 128 or 130, with the up/down bit set to 1 to indicate the direction of advertisement. This bit ensures loop prevention by prohibiting re-advertisement of leaked routes back into Level 2, allowing Level 1 routers to select more optimal paths based on full prefix granularity rather than defaults. The approach, detailed in RFC 2966, improves route quality and supports features like shortest-exit without compromising the hierarchical isolation.

Broadcast Segments and Designated Intermediate System

In multi-access broadcast networks, such as Ethernet LANs, IS-IS faces the challenge of efficiently managing adjacencies among multiple intermediate systems without the overhead of a full mesh topology, which could lead to an N² scaling issue in hello exchanges and link-state advertisements. To address this, the protocol models the broadcast segment as a pseudonode, creating a virtual star topology where each intermediate system advertises a single link to the pseudonode rather than direct links to every other system, thereby reducing the number of links in the link-state database from O(N²) to O(N). This approach avoids the "N² hellos" problem by limiting direct peer-to-peer hellos and leveraging multicast for synchronization. The (DIS) is elected on each broadcast segment to manage this pseudonode and coordinate network operations, with separate elections for Level 1 and Level 2 . is based on the highest priority value advertised in hello packets, ranging from 0 to 127, with a default of if not configured. In case of ties, the system with the highest (or System ID if MAC is unavailable) wins, ensuring dynamic adaptation to changes through continuous of Hello PDUs and preemptive upon detection of higher-priority systems, without manual intervention. Once elected, the assumes key roles in maintaining the segment's and database consistency, including generating a pseudonode Link State PDU (LSP) that advertises zero-metric links to all attached intermediate systems, encapsulating the LAN topology in a single entry. It also periodically multicasts Complete Sequence Number PDUs (CSNPs) every 10 seconds to all relevant systems for link-state database synchronization and floods updates on behalf of the pseudonode. Additionally, the handles ES-IS interactions by multicasting Hellos if needed, though its primary focus remains on intermediate system operations. On broadcast segments, IS-IS uses specific Level 1 and Level 2 LAN Intermediate System Hello (IIH) packets, which are multicast to the all-Level-1-ISs or all-Level-2-ISs addresses to discover and maintain adjacencies efficiently across the multi-access medium. These hellos include the LAN ID (composed of the system's ID and local circuit ID) and are padded to near-maximum size for robustness against packet loss. Flooding mechanisms further optimize overhead by multicasting LSPs and other PDUs to the appropriate all-IS multicast groups, contrasting with point-to-point links where unicast is used, thus scaling better for larger segments with minimal duplication. This multicast-based flooding, rate-limited to one LSP per minimum broadcast transmission interval (default 5 seconds), ensures reliable propagation while controlling bandwidth usage.

Attribute Bits in LSPs

In IS-IS, Link State PDUs (LSPs) include attribute bits in the header and within specific Type-Length-Value (TLV) encodings that provide critical state information influencing routing behavior. These bits, defined in the original protocol specification and extended for support, allow routers to advertise conditions such as overload status, backbone attachment, and route origins, enabling informed decisions during network operation. The LSP header contains three key attribute bits: the Partition (P) bit, the Attached (ATT) bit, and the Overload (OL) bit. The P bit, when set, indicates that the originating router supports partition repair for Level 1 areas, allowing Level 2 routers to use designated paths to restore connectivity in partitioned areas; however, in extended LSP fragments, it is typically set to zero to maintain consistency with attachment semantics. The ATT bit is set in Level 1 LSPs by Level 1/Level 2 routers to signal their attachment to the Level 2 backbone, informing Level 1 routers of available inter-area paths. The OL bit, when set, notifies other routers that the originating router is in an overloaded state, such as during resource constraints or maintenance, prompting them to exclude it from transit path calculations while still allowing local reachability. Within IP reachability TLVs, the Internal/External (I/E) bit further refines route classification. In TLV 128 ( Internal Reachability), the I/E bit is fixed at 0, denoting intra-domain routes with internal metrics, which are advertised by routers for reachable prefixes within the IS-IS domain. Conversely, TLV 130 ( External Reachability) uses the I/E bit in the metric fields—set to 0 for internal metrics or 1 for external metrics on redistributed routes from outside the domain—allowing Level 2 routers to distinguish and prioritize path costs accordingly. These attribute bits directly affect the Shortest Path First (SPF) computation by altering path eligibility and preference. Routers ignore LSPs with the OL bit set for transit forwarding, treating the originator as a to preserve network stability; similarly, the ATT bit guides Level 1 routers to prefer attached Level 1/Level 2 routers for default routing to external destinations. The I/E bit ensures that paths using internal metrics are favored over those with external metrics during tie-breaking in SPF, promoting more efficient intra-domain routing. The P bit, if supported, enables SPF to incorporate repair paths for partitioned areas, though its use is optional and often disabled in modern implementations. By default, all these bits are cleared (0) upon LSP generation, reflecting normal operational status, but they can be explicitly set through router configuration policies, such as during overload conditions or to simulate attachments for testing. Configuration typically involves commands like "set-overload" for the OL bit or "attached-bit" for the ATT bit, allowing administrators to control advertisement without altering core topology data.

Wide Metrics

The original IS-IS specification limits interface metrics to 6 bits, allowing values from 0 to 63 per link, while the total path metric is constrained to 10 bits, capping it at 1023. This narrow metric range proves insufficient for modern networks with high-speed links and large topologies, where finer granularity is needed to differentiate path costs accurately. To address these limitations, RFC 3784 introduced wide metrics in 2004, extending the metric field to 24 bits for values up to 16,777,215 per link and supporting total path metrics up to approximately 4.2 billion. These wide metrics are encoded using extended Type-Length-Value (TLV) structures, specifically TLV 22 for extended IS reachability, TLV 23 for IS neighbor attributes, and TLV 25 for L2 bundle member attributes, which replace or augment the original narrow TLVs (2, 3, and 1) in link-state PDUs. Within these extended TLVs, the metric value occupies the lower 24 bits, enabling precise cost assignments for traffic engineering purposes. Compatibility with legacy systems that do not support wide metrics is maintained through a transitional approach: implementations advertise both narrow and wide TLVs during migration, allowing non-supporting neighbors to fall back gracefully to the narrow metrics derived from the least significant bits of the wide values. Once wide metrics are fully deployed, the narrow TLVs can be suppressed to optimize protocol efficiency. For traffic engineering extensions, wide metrics incorporate sub-TLVs within TLV 22 and similar structures, such as sub-TLV 4 for administrative groups (also known as link colors), which enable constraint-based path computation by associating links with shared resource groups. These sub-TLVs allow routers to advertise link attributes that influence MPLS traffic engineering label distribution. In practice, wide metrics are enabled through router configuration, often globally via commands like "metric-style wide" in Cisco IOS to activate the extended TLVs across all interfaces, or per-interface using metric assignments that exceed narrow limits. Similar options exist in other implementations, such as Juniper's "wide-metrics-only" to enforce exclusive use of wide formats.

Routing and Path Selection

Path Selection

IS-IS utilizes Dijkstra's algorithm to compute the optimal routes from the link-state database, constructing a that represents the network . The SPF calculation runs independently for Level 1 (L1) and Level 2 () routing, using the respective LSP databases to build separate trees: L1 for intra-area routing and L2 for inter-area routing across the domain. This separation ensures hierarchical routing, where L1 routers prioritize local paths within their area before escalating to for external destinations. Path selection is primarily metric-based, favoring the route with the lowest total cumulative cost along the path. By default, all IS-IS interfaces are assigned a metric of 10, irrespective of link speed, such as gigabit Ethernet connections, though this can be manually adjusted for traffic engineering. Internal metrics are preferred over external ones, and for equal-cost paths, load splitting may occur up to a configurable maximum number of paths, as defined in the base protocol. Tie-breaking rules for equal-cost paths are implementation-dependent. Following SPF computation, selected routes are installed into the Forwarding Information Base (FIB), with L1 paths explicitly preferred over L2 paths for destinations within the same area to maintain intra-area optimality. Convergence in IS-IS is event-driven, triggered by changes in the LSP database, such as new LSP arrivals, updates, or purges, prompting a recomputation of the tree. To enhance efficiency, many implementations incorporate partial SPF optimizations, which recompute only the affected portions of the tree rather than the full , reducing CPU overhead during frequent updates.

BFD Support

Bidirectional Forwarding Detection (BFD) integration with IS-IS enables rapid detection of link and neighbor failures in sub-second intervals, operating in asynchronous mode where lightweight BFD control packets are exchanged independently of IS-IS hello packets. This approach provides failure detection times as low as 10-50 milliseconds, far surpassing the typical 1-10 second intervals of IS-IS hellos, thereby enhancing network responsiveness without relying solely on the protocol's native adjacency maintenance mechanisms. The foundational support for BFD in IS-IS is outlined in RFC 5882, which describes the generic application of BFD to detect bidirectional path faults between forwarding engines in routing protocols like IS-IS, with sessions established upon adjacency formation. To signal BFD capability and ensure proper handling of forwarding plane failures that may not affect hellos, RFC 6213 introduces a BFD-Enabled Type-Length-Value (TLV, Type 148) advertised in IS-IS Hello (IIH) packets, specifying support for particular multi-topology instances (MTIDs) or Protocol Identifiers (NLPIDs). One BFD session is created per supported MTID/NLPID pair once the IS-IS adjacency transitions to the up state, allowing BFD to monitor the forwarding path tied to that adjacency. Configuration of BFD for IS-IS typically involves enabling the feature on relevant interfaces and tuning session parameters for desired detection speed, such as setting a transmit and receive interval of 50 ms with a detection multiplier of 3, resulting in a detection of 150 ms. This setup is vendor-agnostic where implementations adhere to the RFCs, though some platforms may offer extensions for multi-topology or support. The primary benefits of BFD in IS-IS include accelerated network reconvergence following failures, minimizing traffic loss and outage impact in high-availability environments such as service provider backbones. By detecting issues like unidirectional link failures or blackholing in the data plane before they propagate through IS-IS's shortest path first (SPF) computation, BFD ensures more proactive adjacency state changes and route updates. Interoperability is achieved through the standardized mechanisms, enabling seamless operation across diverse vendor equipment while maintaining low CPU and bandwidth overhead due to BFD's lightweight design.

Extensions and Security

Authentication

IS-IS employs authentication mechanisms to verify the integrity and authenticity of Protocol Data Units (PDUs) exchanged between routers, preventing unauthorized insertion or modification of routing information. These mechanisms include both legacy password-based approaches and cryptographic methods, applied at different scopes to secure Hello (IIH), Link State PDU (LSP), and Sequence Number PDU (SNP) exchanges. The original IS-IS specification supports password-based using cleartext area and domain passwords embedded in IIH, LSP, and PDUs, providing basic protection against casual tampering but vulnerable to . To enhance security, RFC 3567 introduced cryptographic using HMAC-MD5 (per RFC 2104), where the authentication field in the PDU is computed as an HMAC-MD5 digest over the PDU contents (with the authentication field zeroed) and the key, ensuring integrity without transmitting the password in . This method applies to area passwords for Level 1 (covering IIH and Level 1 LSP/) and domain passwords for Level 2 (covering Level 2 LSP/), while interface-level passwords secure IIH PDUs specifically. For stronger protection, IS-IS uses Keyed-MD5 as defined in RFC 5304, which specifies per-packet HMAC-MD5 (using RFC 2104) to compute an integrity check value over the entire PDU (with the authentication field zeroed). This cryptographic method includes a ID in the authentication TLV to identify the , supporting key rotation through multiple configured keys without adjacency disruptions, often implemented via key chains in vendor systems. operates at three levels: interface-level for point-to-point or broadcast IIH PDUs, area-wide for intra-area Level 1 traffic, and domain-wide for inter-area Level 2 traffic, allowing granular control over security scopes. Further extending authentication capabilities, RFC 5310 (2010) introduces generic cryptographic , allowing IS-IS to support a range of algorithms beyond HMAC-, including the HMAC-SHA family (, SHA-256, etc., per FIPS 180-3 and RFC 2104). This uses key IDs for security associations, enabling algorithm agility and stronger protection against known weaknesses in MD5, with applied uniformly across PDUs. Despite these protections, IS-IS remains vulnerable to replay attacks, as it lacks built-in timestamps or nonces to detect duplicated PDUs, relying instead on inherent sequence numbers and lifetime checks that may not suffice against sophisticated threats. For comprehensive security, including anti-replay and confidentiality, deployments are recommended to layer (AH or modes per RFC 4301) over IS-IS links, providing end-to-end cryptographic protection beyond protocol-internal mechanisms.

IPv6 Support and Multi-Topology

IS-IS was extended to support routing through RFC 5308, published in 2008, which defines mechanisms for advertising reachability information within the existing IS-IS framework. This extension introduces new Type-Length-Value (TLV) encodings, such as TLV type 236 for Reachability Information (which includes both internal and external prefixes via an external flag) and TLV type 232 for Interface Address, allowing routers to flood prefixes in Link State PDUs (LSPs) alongside IPv4 prefixes without requiring a separate instance. These TLVs are optional, ensuring that legacy IPv4-only IS-IS implementations can continue to operate by ignoring unrecognized TLVs, thus providing during network transitions to . Addressing in IPv6-enabled IS-IS retains the protocol's original OSI-based Network Entity Title (NET) for router identification, which does not incorporate addresses directly. Instead, prefixes are advertised as reachability information within the dedicated TLVs in LSPs, enabling the shortest path first () algorithm to compute routes for traffic independently from IPv4 while sharing the same link-state database . This approach avoids modifications to the core IS-IS packet formats or flooding mechanisms, preserving with existing deployments. To further optimize dual-stack environments, RFC 5120 from 2008 introduces multi-topology (MT) routing in IS-IS, which permits the maintenance of separate topology instances for different address families, such as and , over the same physical network infrastructure. In this model, a Multi-Topology ID (MT-ID) is added to relevant TLVs, including the IPv6 reachability TLVs from RFC 5308, allowing routers to perform distinct computations for each topology without duplicating overhead across the entire protocol. Routers configured for MT can selectively participate in specific topologies, ignoring LSPs with unfamiliar MT-IDs to maintain . The primary benefits of these IPv6 and multi-topology extensions lie in enabling a single IS-IS instance to handle both IPv4 and routing in dual-stack networks, which reduces protocol overhead, simplifies , and lowers resource consumption compared to deploying separate interior gateway protocols (IGPs) for each family. This unified approach has been widely adopted in service provider backbones for efficient migration, as it leverages the existing IS-IS for both s while minimizing times.

Applications and Comparisons

Other Uses

IS-IS has found extensive application in service provider backbones, where it serves as a scalable alternative to OSPF for managing large, flat topologies in ISP environments. Its protocol-independent design and ability to handle high router counts make it particularly suitable for core networks requiring rapid and minimal overhead in expansive deployments. In modern traffic engineering, IS-IS supports Segment Routing (SR) through extensions defined in RFC 8667, enabling source-based path control via segment identifiers advertised in link-state packets. This allows for efficient label distribution and explicit path steering in MPLS networks without the need for separate signaling protocols like LDP or RSVP-TE, facilitating simplified operations in service provider and enterprise environments. Data centers increasingly adopt IS-IS as the underlay protocol in Clos topologies, particularly for equal-cost multipath (ECMP) routing to optimize load balancing across spine-leaf architectures. Since 2020, its integration with EVPN overlays has gained traction for providing scalable Layer 2/3 connectivity in multi-tenant fabrics, leveraging IS-IS's fast convergence to support high-density server interconnects and virtualized workloads. For network automation and telemetry, IS-IS integrates with and data models, enabling programmatic configuration and real-time monitoring in (SDN) setups. The model for IS-IS, standardized in 9130, supports streaming telemetry for metrics like adjacency states and LSP floods, with implementations in vendor platforms from 2023 onward enhancing SDN orchestration for dynamic policy enforcement and fault detection. Beyond , IS-IS continues to route Connectionless Network Protocol (CLNP) traffic in legacy OSI environments, such as specialized government or research networks that retain OSI addressing for compatibility with historical systems. Integrated IS-IS extensions allow dual-stack operation, preserving CLNP reachability in isolated domains without dependency. IS-IS and (OSPF) are both link-state interior gateway s (IGPs) that build a complete topology map of the network to compute shortest paths using the Dijkstra algorithm. However, IS-IS originates from the Open Systems Interconnection (OSI) model's Intermediate-System-to-Intermediate-System , standardized by ISO 10589 and extended for in 1195, giving it a protocol-independent heritage that does not rely on for operation and runs directly over Layer 2 media. In contrast, OSPF was developed specifically by the IETF for networks. IS-IS demonstrates superior in large deployments exceeding 1000 routers, owing to its configurable Link State PDU (LSP) lifetimes up to 18.2 hours and staggered refresh intervals that reduce flooding overhead, making it a preference among service providers for flat topologies. Unlike OSPF, which elects a Designated Router () and Backup DR (BDR) to optimize multi-access network efficiency, IS-IS selects a single Designated Intermediate System () without a backup, allowing preemption and full adjacencies among all routers on broadcast segments. Compared to distance-vector protocols like (RIP), IS-IS provides faster by flooding link-state updates across the domain rather than periodic vector exchanges limited to hop counts, though this requires higher CPU utilization for maintaining the link-state database and performing Shortest Path First (SPF) computations. (EIGRP), a Cisco-proprietary blending distance-vector metrics with link-state partial updates, achieves speeds comparable to IS-IS through feasible successor routes but avoids the full database overhead. RIP, as a pure distance-vector , suffers from slower due to count-to-infinity issues and is unsuitable for modern networks beyond small scales. IS-IS frequently serves as the IGP to establish for Internal BGP (iBGP) sessions within an autonomous system, providing the underlying for BGP next-hop resolution without altering BGP's path attributes. In multi-protocol environments like BGP/MPLS IP VPNs, where IS-IS operates as the Provider Edge to Customer Edge (PE-CE) , the attached bit (or down bit) in LSPs prevents loops by marking redistributed routes as external, ensuring they are not re-advertised back into the provider domain. Interoperability between IS-IS and OSPF is achieved through route redistribution, where external routes are injected using seed metrics to align path preferences; for instance, OSPF's bandwidth-based costs must be mapped to IS-IS's default values (0-63 for narrow metrics) via route-maps to avoid suboptimal . Dual-IGP designs, running both protocols concurrently on routers, facilitate smooth transitions between domains, with policies controlling mutual redistribution to maintain during migration. Network operators may choose IS-IS over OSPF for its vendor-neutral OSI foundation, which avoids IP-specific dependencies, and its inherent multi-protocol capabilities, allowing seamless IPv4 and support within a single instance rather than requiring separate processes. This makes IS-IS particularly suitable for service provider backbones or environments demanding protocol extensibility without frequent redesigns.

References

  1. [1]
    RFC 1195 - Use of OSI IS-IS for routing in TCP/IP and dual ...
    Overview of the ISO IS-IS Protocol The IS-IS Routing Protocol has been developed in ISO to provide routing for pure OSI environments. In particular, IS-IS ...
  2. [2]
    Overview of IS-IS - Nokia Documentation Center
    Oct 25, 2023 · This chapter provides information about configuring the Intermediate System-to-Intermediate System (IS-IS) protocol. Topics in this chapter ...
  3. [3]
    RFC 5308 - Routing IPv6 with IS-IS - IETF Datatracker
    This document specifies a method for exchanging IPv6 routing information using the IS-IS routing protocol.
  4. [4]
    RFC 1142 - OSI IS-IS Intra-domain Routing Protocol - IETF Datatracker
    This protocol permits Intermediate Systems within a routeing Domain to exchange configuration and routeing information to facilitate the operation of the route ...
  5. [5]
    RFC 5304 - IS-IS Cryptographic Authentication - IETF Datatracker
    This document describes the authentication of Intermediate System to Intermediate System (IS-IS) Protocol Data Units (PDUs) using the Hashed Message ...
  6. [6]
    IS-IS ESN TLV - IETF
    IS-IS is not only restricted to few Tier-1 ISP backbones but.. ▫ Has been adopted widely in various L2 and L3 routing deployment of the data centers for ...
  7. [7]
    IP Routing: ISIS Configuration Guide - IS-IS Overview and Basic ...
    Feb 15, 2016 · This module provides a technical overview of the Integrated Intermediate System-to-Intermediate System (IS-IS) routing protocol.
  8. [8]
    The Evolution of IS-IS Routing Protocol: From Origins to Modern ...
    May 17, 2024 · From its origins in the 1980s to the present day, the IS-IS routing protocol has demonstrated remarkable resilience and adaptability in the ever ...Missing: 10589 | Show results with:10589
  9. [9]
    [PDF] OSPF-vs-ISIS.pdf
    Apr 4, 2025 · Biggest ISPs tend to use IS-IS – why? In early 1990s, Cisco implementation of IS-IS was much more stable and reliable than OSPF ...Missing: adoption | Show results with:adoption
  10. [10]
    RFC 3784 - Extensions for Traffic Engineering (TE) - IETF Datatracker
    This document describes extensions to the Intermediate System to Intermediate System (IS-IS) protocol to support Traffic Engineering (TE).
  11. [11]
    RFC 8667 - IS-IS Extensions for Segment Routing - IETF Datatracker
    This document describes the IS-IS extensions that need to be introduced for Segment Routing operating on an MPLS data plane.Table of Contents · Introduction · Segment Routing Identifiers · Router Capabilities
  12. [12]
    VXLAN Data Center Interconnect Using EVPN Overview | Junos OS
    Starting in Junos OS Release 16.1, Ethernet VPN (EVPN) technology can be used to interconnect Virtual Extensible Local Area Network (VXLAN) networks over an ...Vxlan Data Center... · Technology Overview Of... · Vxlan-Evpn Packet...
  13. [13]
    RFC 9130 - YANG Data Model for the IS-IS Protocol - IETF Datatracker
    Oct 19, 2022 · This document defines a YANG data model that can be used to configure and manage the IS-IS protocol on network elements.
  14. [14]
    None
    Below is a merged response that consolidates all the information from the provided segments into a single, comprehensive summary. To maximize detail and clarity while adhering to space constraints, I will use a table in CSV format for the definitions, followed by a section for useful URLs. This approach ensures all information is retained, including section references and summaries, in a dense yet readable format.
  15. [15]
    RFC 2763 - Dynamic Hostname Exchange Mechanism for IS-IS
    This document defines a new TLV which allows the IS-IS routers to flood their name to system ID mapping information across the IS-IS network.
  16. [16]
    Cisco IOS IP Routing: ISIS Command Reference
    Jan 31, 2011 · Entering the show isis hostname command displays the dynamic host mapping table. The dynamic host mapping table displays the router-name-to- ...
  17. [17]
    IS-IS Overview | Junos OS - Juniper Networks
    IS-IS hello PDUs establish adjacencies with other routers and have three different formats: one for point-to-point hello packets, one for Level 1 broadcast ...
  18. [18]
    RFC 5303 - Three-Way Handshake for IS-IS Point ... - IETF Datatracker
    This paper defines a backward-compatible extension to the protocol that provides for a three-way handshake. It is fully interoperable with systems that do not ...
  19. [19]
    Configure IS-IS Adjacency and Area Types - Cisco
    The scope of this document is to provide information which regards IS-IS area types, configuration, and troubleshooting. It shows a sample network scenario ...
  20. [20]
    RFC 2966 - Domain-wide Prefix Distribution with Two-Level IS-IS
    This document describes extensions to the Intermediate System to Intermediate System (IS-IS) protocol to support optimal routing within a two-level domain.
  21. [21]
    RFC 1142: OSI IS-IS Intra-domain Routing Protocol
    This parameter is set locally for each level 1 IS by system management; it contains a list of all synonymous area addresses associated with the IS.
  22. [22]
    Understanding IS-IS Designated Routers | Junos OS
    A router's priority for becoming the designated router is indicated by an arbitrary number from 0 through 127, which you configure on the IS-IS interface.
  23. [23]
  24. [24]
    Configure Attach Bit Set - Cisco
    Jun 7, 2021 · This document describes the behavior of Intermediate System to Intermediate System (ISIS) attach bit.
  25. [25]
    Uses of the Overload Bit with IS-IS - Cisco
    Oct 25, 2005 · The overload bit in IS-IS alerts other routers when a router is overloaded, preventing transit traffic, and can be set for a specific time ...Missing: header Partition
  26. [26]
  27. [27]
  28. [28]
  29. [29]
    overload (Protocols IS-IS) | Junos OS - Juniper Networks
    Configure the local routing device so that it appears to be overloaded. This statement causes the routing device to continue participating in IS-IS routing, ...
  30. [30]
    IP Routing: ISIS Configuration Guide - Customizing IS-IS for ... - Cisco
    Feb 15, 2016 · By default the priority is 64. You can configure the priority in the range from 0 to 127. You can configure a summary address to represent ...
  31. [31]
    Understanding Wide IS-IS Metrics for Traffic Engineering | Junos OS
    IS-IS metrics are routing metrics; default is 10, but can be up to 63. Wide metrics can reach 16,777,215, and Junos OS supports both wide and default metrics.Missing: 3784 | Show results with:3784
  32. [32]
    Cisco IOS IP Routing: ISIS Command Reference
    Apr 30, 2024 · Examples. The following example configures IS-IS to accept and send any key belonging to the key chain named site1: router isis ...
  33. [33]
    RFC 5880 - Bidirectional Forwarding Detection (BFD)
    This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines.
  34. [34]
    RFC 5882 - Generic Application of Bidirectional Forwarding ...
    This document describes the generic application of the Bidirectional Forwarding Detection (BFD) protocol.
  35. [35]
    RFC 6213 - IS-IS BFD-Enabled TLV - IETF Datatracker
    This document describes a type-length-value (TLV) for use in the IS-IS routing protocol that allows for the proper use of the Bidirectional Forwarding ...
  36. [36]
    Understanding BFD for IS-IS | Junos OS - Juniper Networks
    ... RFC 7794 Prefix Attribute Flags · Understanding BGP Communities, Extended ... For large-scale network deployments with a large number of BFD sessions ...
  37. [37]
    RFC 3567 - Cryptographic Authentication - IETF Datatracker
    Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication (RFC 3567, ; obsoleted by RFC 5304)
  38. [38]
  39. [39]
  40. [40]
  41. [41]
  42. [42]
    IP Routing: ISIS Configuration Guide - Cisco - Cisco
    Feb 15, 2016 · The IS-IS process and adjacency formation are also explained. IS-IS is link-state protocol that allows the network designer to organize the ...
  43. [43]
    ISIS vs OSPF - Cisco Learning Network
    Usually in ISP world ISIS is preferred over OSPF. One of the main reason is that ISIS used an LSP per each level that contains different TLV for the routing ...
  44. [44]
    Overview of IP Clos Fabrics for Campus Networks
    A campus fabric based on EVPN-VXLAN is a modern and scalable network that uses a BGP, OSPF, or IS-IS underlay from the core to the access layer switches. The ...
  45. [45]
    [PDF] Building data centres on open standards - BKNIX Peering Forum
    Today, underlays can be deployed in many ways using OSPF,. IS-IS or BGP. Overlay networks are typically deployed with. BGP-EVPN. There are mature solutions ...Missing: adoption 2020-2025
  46. [46]
    Model Driven Telemetry White Paper - Cisco
    Apr 3, 2024 · YANG can be used for configuration data and operational data. It can use Xpath to define the elements of the YANG data model. The sensor path of ...Missing: SDN | Show results with:SDN
  47. [47]
    ISO CLNS Configuration Guide, Cisco IOS Release 15.0S
    Mar 1, 2004 · This module describes addresses, routing processes, and the steps you follow to configure ISO CLNS.
  48. [48]
    RFC 2328 - OSPF Version 2 - IETF Datatracker
    This memo documents version 2 of the OSPF protocol. OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous System.
  49. [49]
    [PDF] Network Design Comparisons and Considerations IS-IS and OSPF
    ○ DR election/discovery. ○ Serve as keepalives. ○ 3s JUNOS default hello interval, dead interval 3X. ▫ Hellos padded to full MTU size (dubious). ▫ Fewer ...
  50. [50]
    [PDF] Comparing ISIS and OSPF
    Biggest ISPs tend to use ISIS – why? ▫ In early 90s, Cisco implementation of ISIS was much more solid than OSPF implementation –. ISPs naturally preferred ...
  51. [51]
    Understand and Use the Enhanced Interior Gateway Routing Protocol
    EIGRP, unlike RIP and IGRP, does not rely on the routing (or forwarding) table in the router to hold all of the information it needs to operate. Instead, it ...
  52. [52]
    EIGRP Frequently Asked Questions - Cisco
    Jul 17, 2012 · EIGRP taking longer to converge under heavy CPU usage is a normal behavior. EIGRP convergence is faster when you lower the hold time. The ...
  53. [53]
    Configure Routing Protocol Redistribution - Cisco
    Each protocol uses different metrics. For example, RIP metric is based on hop count, and EIGRP uses a composite metric-based on bandwidth, delay, reliability, ...
  54. [54]
    Example: Redistributing OSPF Routes into IS-IS | Junos OS
    This example shows how to redistribute OSPF routes into an IS-IS network, using an export policy, and redistributing routes 192.168.0/24 through 192.168.3/24 ...Missing: transition | Show results with:transition