The (Unofficial) CCNP-SP Study Guide
  • About
    • About the Author
    • About This Study Guide
  • MPLS
    • LDP
      • LDP Transport Address
      • LDP Conditional Advertisement
      • LDP Authentication
      • LDP/IGP Sync
      • LDP Session Protection
    • MPLS-TE
      • MPLS-TE Basics, Pt. 1 (TED)
      • MPLS-TE Basics, Pt.2 (RSVP)
      • MPLS-TE Basics, Pt.3 (CSPF)
      • MPLS-TE Basics, Pt.4 (Routing)
      • MPLS-TE Fast Reroute (FRR)
      • MPLS-TE with OSPF
    • Unified MPLS
    • Segment Routing
      • Introduction, Theory Pt.1
      • Introduction, Lab (OSPF) Pt.2
      • Introduction, Lab (ISIS) Pt. 3
      • Multi-Area/Level Segment Routing
      • Segment Routing using BGP
      • Migrating LDP to SR
      • LDP/SR Interworking
      • TI-LFA Pt. 1 (Theory)
      • TI-LFA Pt. 2 (Implementation)
      • TI-LFA Pt. 3 (Node and SRLG Protection)
      • SR-TE Pt. 1 (Overview)
      • SR-TE Pt. 2 (Creating an SR-TE Policy)
      • SR-TE Pt. 3 (Using a PCE)
      • SR-TE Pt. 4 (Automated Steering)
      • SR-TE Pt. 5 (On-Demand Nexthop)
      • SR-TE Pt. 6 (Flex Algo)
    • MPLS OAM
      • Classic Traceroute Behavior in MPLS Networks
      • LSP Ping
      • LSP Traceroute
  • Routing
    • BGP
      • BGP Synchronization
      • BGP Load Sharing (Multipath)
      • An Intuitive Look at Path Attributes
      • AS Path Prepending on XE and XR
      • RPL
    • BGP Security
      • BGP TTL Security, Pt. 1
      • BGP TTL Security, Pt. 2 (IOS-XE)
      • BGP TTL Security, Pt. 3 (IOS-XR)
      • BGP MD5 Authentication
      • BGP Maximum Prefixes
      • BGP RFD (Route Flap Dampening)
      • RTBH
      • Flowspec
      • BGPsec
    • L3VPN
      • An In-Depth Look at RD and RT, Pt. 1
      • An In-Depth Look at RD and RT, Pt. 2
      • An In-Depth Look at RD and RT, Pt. 3
      • An In-Depth Look at RD and RT, Pt. 4
      • Inter-AS L3VPN Pt. 1, Overview
      • Inter-AS L3VPN Pt. 2, Option A
      • Inter-AS L3VPN Pt. 3, Option B
      • Inter-AS L3VPN Pt. 4, Option C
      • CSC (Carrier Supporting Carrier)
      • PE NAT
    • OSPF
      • Type 7 to Type 5 Translation
      • OSPF Authentication
      • Troubleshooting OSPF Adjacencies
      • OSPFv3 LSA Types
      • OSPFv3 LSAs Example (Single Area)
    • ISIS
      • The Potential for Asymmetric Routing with Multi-Area ISIS
      • Interarea Routing is Distance-Vector
      • Basic ISIS - LSPDB
      • Multitopology
      • What is the role of CLNS and CLNP in ISIS?
      • Troubleshooting ISIS Adjacencies
    • IPv6 Transition
      • Overview
      • NAT64
      • 6to4
      • 6RD (IPv6 Rapid Deployment)
      • DS Lite (Dual Stack Lite)
      • MAP (Mapping of Address and Port)
      • Tunneling IPv6 Dynamic Routing Protocols over IPv4
    • Multicast
      • Introduction
      • IP and MAC Addressing
      • Tree Formation and Packet Forwarding
      • IGMP
      • PIM-DM (Dense Mode)
      • PIM-SM (Sparse Mode)
      • PIM-SM SPT Switchover
      • PIM-SM Tunnel Interfaces
      • PIM DR and the Assert Message
      • PIM-SM RP Discovery
      • PIM-BiDir
      • PIM-SSM (Source-Specific Multicast)
      • Interdomain Multicast (PIM-SM)
      • IPv6 Multicast
      • mVPN Introduction
      • mVPN Profile 0
      • mVPN Profile 1
      • Multicast Routing on IOS-XR
  • L2VPN & Ethernet
    • IOS-XE Ethernet Services
      • Service Instances
      • E-Line
      • E-LAN (VPLS)
      • E-Tree
      • E-Access
      • VPLS with BGP Autodiscovery
      • Martini/Kompella Circuits
    • EVPN
      • Introduction to EVPN
      • Learning EVPN VXLAN First
      • E-Line (EVPN VPWS)
      • E-Line (EVPN VPWS) on IOS-XR
      • E-Line (EVPN VPWS) Multi-Homed
      • E-LAN (EVPN Single-Homed)
    • Carrier Ethernet
      • 802.1ah (MAC-in-MAC)
      • 802.3ah (Ethernet OAM)
      • 802.1ag (CFM)
      • Cisco REP (Resilient Ethernet Protocol)
      • ITU G.8032 ERPS (Ethernet Ring Protection Switching)
  • Security
    • CoPP (Control Plane Policing)
    • LPTS (Local Packet Transport Services)
  • Misc
    • QoS
      • QoS Introduction (Part 1)
      • QoS Tools Overview and QoS Models (Part 2)
      • QoS Classification and Marking (Part 3)
      • QoS Queuing/Congestion Management (Part 4)
      • QoS Shaping and Policing (Part 5)
      • QoS for IPv6
      • MPLS QoS Basics
      • MPLS QoS Modes
      • MPLS TE QoS (DS-TE)
      • MPLS TE CBTS/PBTS
    • Automation and Assurance
      • NSO
      • NSO Command Cheat Sheet
      • Intro to YANG/NETCONF
      • YANG In-Depth
      • NETCONF In-Depth
      • RESTCONF
      • Model-Driven Telemetry
      • Automation Tool Comparison
      • Netflow
      • SNMP
    • Virtualization
      • NFV (Network Function Virtualization)
      • OpenStack
    • Transport
      • xPON
      • SONET/SDH
      • WDM
      • 4G and 5G RAN
    • High Availability (HA)
      • NSF/GR
      • NSR
      • NSF/NSR Whitepapers
      • BFD
      • Link Aggregation on IOS-XE
      • Link Aggregation on IOS-XR
    • IOS Software Overview
  • Labs
    • Lab Challenges
      • How to Use These Labs
      • Basic LDP
      • Advanced LDP
      • BGP Security
      • Unified MPLS
      • BGP Fundamentals
      • Ethernet Services
      • L3VPN Extranet
      • Multicast
      • Inter-area OSPF
      • ISIS
      • MPLS-TE
      • Control Plane Policing
      • QoS
Powered by GitBook
On this page
  • What are CLNS and CLNP?
  • Examining ISIS frames
  • ISIS compared to other routing protocols
  • Ethernet II vs. 802.3
  • Further Reading
  1. Routing
  2. ISIS

What is the role of CLNS and CLNP in ISIS?

PreviousMultitopologyNextTroubleshooting ISIS Adjacencies

Last updated 2 years ago

ISIS was developed by the ISO for use with the OSI networking suite which includes CLNP/CLNS. ISIS uses CLNP addressing for setting the system ID (the NET), but that is where ISIS’s involvment with CLNP ends. While ISIS was originally used to route CLNP, nowdays it is essentially exclusively used to route IPv4/IPv6. ISIS runs at layer 2 which allows it to be layer 3 agnostic and carry routing information for any protocol.

It is a common misconception that you are “running CLNP” when you use ISIS. This is not true. ISIS operates at a level below CLNP, and you do not need to enable CLNP in order to run ISIS. This confusion may have been perpetuated by old IOS documentation which stated that you needed to literally enable CLNS routing before using ISIS.

What are CLNS and CLNP?

CLNS stands for Connection Less Network Service

CNLP stands for Connection Less Network Protocol

CLNP is the layer 3 protocol and CLNS is the service offered to higher layers. CLNS is not exactly layer 4 - it is a layer between layer 3 and layer 4 and is best described as an API.

The fact that IOS required you to enable “CLNS routing” doesn’t really make sense. CLNS is not a routed protocol - CLNP is. Yet we still see show commands that use show clns today. However, most show clns command output can also be seen with an equivalent show isis command, allowing you to pretty much ignore CLNS references in IOS these days.

Examining ISIS frames

Let’s take a look at an ISIS frame:

What is unique about ISIS is that it uses the old 802.3 frame format which we rarely see today. Section 1 is the 802.3 header which is very similar to today’s Ethernet II header, except it has a length field instead of a type field. Section 2 contains the LLC which is considered part of the 802.3 frame format even though it is a separate header. The LLC has the destination and source SAP (Service Access Point). The SAP is roughly similar to the Ethertype in Ethernet II. It indicates the layer 3 protocol in use. 0xFE indicates an ISO protocol. This does not refer to CLNP specifically, just OSI as a whole. (Both CLNP and ISIS use a SAP of 0xFE, but we will see the difference between ISIS and CLNP in the next header). The control field value of 0x03 means that flow control is off.

Section 3 is the ISO header, and it uses a value of 0x83 which indicates ISIS. CLNP uses value 0x81 and ESIS uses 0x82. So ISIS is completely separate from CLNP. Section 4 is the actual ISIS hello PDU.

ISIS compared to other routing protocols

ISIS is a very unique protocol because it does not need a layer three protocol. Even though OSPF and EIGRP have their own IP protocol, they are still relying on IP and can be said to be at layer 4 in the stack, adjacent to where TCP lives. BGP relies on TCP and does not have its own IP protocol number - this fact is sometimes used to argue that BGP is an application. In comparison, ISIS is its own layer 3 protocol.

  • An OSPF hello. OSPF relies on IP. Every OSPF packet has a src/dst IP address.

Ethernet II vs. 802.3

For comparison to the 802.3 frame format, take a look at a ping below:

The layer 2 frame is Ethernet II and uses a Type field instead of a Length field. To ensure that Ethernet II is easily differentiated from 802.3 when parsing the frame, the Ethernet II type field value is always greater than 1500, which is the maximum allowed length value for 802.3. So if that field is equal to or less than 1500, the frame is 802.3. If it is greater than 1500, it is Ethernet II.

Further Reading

https://www.linkedin.com/pulse/connection-less-network-protocol-clnpand-service-clns-priyanka-kumari
https://blog.ipspace.net/2010/03/clns-and-clnp.html
https://blog.ipspace.net/2009/06/is-is-is-not-running-over-clnp.html
https://www.firewall.cx/networking-topics/ethernet/ethernet-frame-formats/200-ieee-8023-frame.html
https://www.firewall.cx/networking-topics/ethernet/ethernet-frame-formats/201-ethernet-ii.html