Skip to main content

ISIS Link Overload
draft-hegde-isis-link-overload-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Shraddha Hegde , Hannes Gredler
Last updated 2015-09-10 (Latest revision 2015-03-09)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Many ISIS deployments run on overlay networks provisioned by means of pseudo-wires or L2-circuits. when the devices in the underlying network go for maintenance, it is useful to divert the traffic away from the specific node(s), to some alternate paths, before the maintenance is actually scheduled. Since the nodes in the underlying network are not visible to ISIS, existing Avoidance of traffic blackhole mechanism described in [RFC3277] cannot be used. It is useful for routers in IS-IS routing domain to be able to advertise a link being in overload state to indicate impending maintenance activity in the underlying network devices. This document describes the protocol extensions to disseminate link overload information in IS-IS protocol.

Authors

Shraddha Hegde
Hannes Gredler

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)