New Training: Advanced IS-IS Configurations
In this 10-video skill, CBT Nuggets trainer Knox Hutchinson explores when to use advanced configurations of the IS-IS protocol on Juniper devices. Watch this new Juniper training.
Learn Juniper with one of these courses:
This training includes:
56 minutes of training
You’ll learn these topics in this skill:
Introducing Advanced IS-IS Configurations
How the SPF Algorithm Works
The Partial SPF Run
The Overload Bit
Leak Routes from Level 2 to Level 1
The Up/Down Bit
Summarizing Advanced IS-IS Config
What is the IS-IS IGP on Juniper Devices?
Juniper networking devices have various interior gateway protocols that they can implement. Some protocols may be better for specific use cases, so network engineers need to be fully aware of what options they have available to them. Juniper devices can use both the more common OSPF (open shortest path first) IGP as well as the IS-IS interior gateway protocol.
The IS-IS protocol also uses link-state information for routing decisions much like OSPF. IS-IS uses a shortest-path first algorithm to determine those routes. It evaluates the topology of the network to find changes and determine whether a full SPF recalculation needs to be performed or if a partial route calculation is all that is needed.
Network engineers may prefer to use the IS-IS protocol over OSPF because of its inherent security that it offers by running natively over Layer 2 of the network. Likewise, it is a more modular protocol that is easier to maintain and extend compared to OSPF.