Introduction To The Junos Operating System - 12.A - Lab Guide Details
Introduction To The Junos Operating System - 12.A - Lab Guide Details
Introduction To The Junos Operating System - 12.A - Lab Guide Details
Operating System
12.a
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos
operating system has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty
in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the
extent applicable, in an agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks
software, you indicate that you understand and agree to be bound by its license terms and conditions. Generally speaking, the software
license restricts the manner in which you are permitted to use the Juniper Networks software, may contain prohibitions against certain uses,
and may state conditions under which the license is automatically terminated. You should consult the software license for further details.
Contents
Lab 1: The Junos CLI (Detailed) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Part 1: Logging In and Exploring the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
This one-day course provides students with the foundational knowledge required to work with the
Junos operating system and to configure Junos devices. The course provides a brief overview of the
Junos device families and discusses the key architectural components of the software. Additional
key topics include user interface options with a heavy focus on the command-line interface (CLI),
configuration tasks typically associated with the initial setup of devices, interface configuration
basics with configuration examples, secondary system configuration, and the basics of operational
monitoring and maintenance of Junos devices.
Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring
the Junos OS and monitoring basic device operations. This course uses Juniper Networks
SRX Series Services Gateways for the hands-on component, but the lab environment does not
preclude the course from being applicable to other Juniper hardware platforms running the
Junos OS. This course is based on Junos OS Release 12.1R1.9.
Objectives
After successfully completing this course, you should be able to:
• Describe the basic design architecture of the Junos OS.
• Identify and provide a brief overview of Junos devices.
• Navigate within the Junos CLI.
• Perform tasks within the CLI operational and configuration modes.
• Restore a Junos device to its factory-default state.
• Perform initial configuration tasks.
• Configure and monitor network interfaces.
• Describe user configuration and authentication options.
• Perform secondary configuration tasks for features and services (such as system
logging syslog) and tracing, Network Time Protocol (NTP), configuration archival, and
SNMP.
• Monitor basic operation for the Junos OS and devices.
• Identify and use network utilities.
• Upgrade the Junos OS.
• Perform file system maintenance and password recovery on a Junos device.
• Navigate within the Junos OS J-Web interface.
Intended Audience
This course benefits individuals responsible for configuring and monitoring devices running the
Junos OS.
Course Level
The Introduction to the Junos Operating System course is a one-day, introductory course.
Prerequisites
Students should have basic networking knowledge and an understanding of the Open Systems
Interconnection (OSI) reference model and the TCP/IP protocol suite.
Day 1
Chapter 1: Course Introduction
Chapter 2: Junos Operating System Fundamentals
Chapter 3: User Interface Options
Lab 1: The Junos CLI
Chapter 4: Initial Configuration
Lab 2: Initial System Configuration
Chapter 5: Secondary System Configuration
Lab 3: Secondary System Configuration
Chapter 6: Operational Monitoring and Maintenance
Lab 4: Operational Monitoring and Maintenance
Appendix A: Interface Configuration Examples
Appendix B: The J-Web Interface
Lab 5 (Optional): The J-Web Interface
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config.ini in the Filename field.
CLI Undefined Text where the variable’s value Type set policy policy-name.
is the user’s discretion and text
ping 10.0.x.y
where the variable’s value as
GUI Undefined shown in the lab guide might Select File > Save, and type
differ from the value the user filename in the Filename field.
must input.
Overview
This lab introduces you to the Junos operating system command-line interface (CLI). In
this lab, you will familiarize yourself with various CLI operational mode and configuration
mode features.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Log in to and explore the Junos CLI using both operational and configuration
modes.
In this lab part, you become familiar with the access details used to connect to the
lab equipment. Once you are familiar with the access details, you will use the CLI to
log in to your team’s designated station and use the CLI to become familiar with
operational mode and configuration mode. You also gain experience with some of
the tools and functionality available within operational mode and configuration
mode.
Note
Depending on the class, the lab equipment
used might be remote from your physical
location. The instructor will inform you as to
the nature of your access and will provide
you the details needed to access your
assigned device.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxA-1 with the Secure CRT program as a basis:
login: lab
Password:
[edit]
lab@srxA-1# load override ijos/lab1-start.config
load complete
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 1.4
Determine what system information you can clear from the operational mode
command prompt.
lab@srxA-1> clear ?
Possible completions:
amt Show AMT Protocol information
arp Clear address resolution information
auto-configuration Clear auto-configuration action
bfd Clear Bidirectional Forwarding Detection information
bgp Clear Border Gateway Protocol information
bridge Clear learned Layer 2 MAC address information
www.juniper.net The Junos CLI (Detailed) • Lab 1–3
chassis Clear chassis information
database-replication Clear database replication information
dhcpv6 Clear DHCPv6 information
dot1x Clear 802.1X session
esis Clear end system-to-intermediate system information
ethernet-switching Clear ethernet switching information
fabric Clear RPDF Internal data structures
firewall Clear firewall counters
gvrp Clears Generic VLAN Registration Protocol information
helper Clear port-forwarding helper information
igmp Clear Internet Group Management Protocol information
igmp-snooping Clear IGMP snooping information
interfaces Clear interface information
ipv6 Clear IP version 6 information
isdn Clear Integrated Services Digital Network information
isis Clear Intermediate System-to-Intermediate System
information
l2-learning Clear learned Layer 2 MAC address information
lacp Clear Link Aggregation Control Protocol information
ldp Clear Label Distribution Protocol information
lldp Clear Link Layer Discovery Protocol information
log Clear contents of log file
mld Clear multicast listener discovery information
mld-snooping Clear MLD snooping information
mpls Clear mpls information
msdp Clear Multicast Source Discovery Protocol information
multicast Clear multicast information
network-access Clear network-access related information
ospf Clear Open Shortest Path First information
ospf3 Clear Open Shortest Path First version 3 information
passive-monitoring Clear passive monitoring statistics
pfe Clear Packet Forwarding Engine information
pgm Clear Pragmatic Generalized Multicast information
pim Clear Protocol Independent Multicast information
ppp Clear PPP information
pppoe Clear PPP over Ethernet information
protection-group Clear protection group information
r2cp Clear Radio-to-Router Protocol information
rip Clear Routing Information Protocol information
ripng Clear Routing Information Protocol for IPv6 information
rsvp Clear Resource Reservation Protocol information
security Clear security information
services Clear services
snmp Clear Simple Network Management Protocol information
spanning-tree Clear Spanning Tree Protocol information
system Clear system information
vpls Clear learned Layer 2 MAC address information
vrrp Clear Virtual Router Redundancy Protocol statistics
wlan Clear Wireless LAN information
Step 1.5
Experiment with command completion by entering show i<space>.
lab@srxA-1> show i
^
'i' is ambiguous.
Possible completions:
iccp Show Inter Chassis Control Protocol information
igmp Show Internet Group Management Protocol information
igmp-snooping Show IGMP snooping information
ingress-replication Show Ingress-Replication tunnel information
interfaces Show interface information
ipv6 Show IP version 6 information
isdn Show Integrated Services Digital Network information
isis Show Intermediate System-to-Intermediate System
information
Step 1.6
Add characters to disambiguate your command so that you can display
interface-related information; use the Spacebar or Tab key for automatic command
completion.
Note
You can return to the command prompt
without scrolling through all of the
generated output from a command. Enter
the Ctrl+c key sequence or the q key to
abort the operation and return to the
command prompt.
Step 1.8
Verify that the CLI does not let you complete invalid commands by trying to enter the
command show ip interface brief.
lab@srxA-1> show ip<space>
Step 1.9
Enter a show route command followed by a show system users command.
You are entering these commands to demonstrate command history recall. When
finished, enter the keyboard sequences indicated to answer the related questions.
lab@srxA-1> show route
Step 1.10
In many cases, the output of a command might exceed one full screen. For example,
the show interfaces interface-name extensive command displays a lot
of information about the specified interface. Enter this command now for your
system’s ge-0/0/0 interface, and answer the following questions. Use the h key as
needed to obtain help when CLI output is paused at the ---(more)--- prompt.
lab@srxA-1> show interfaces ge-0/0/0 extensive
Physical interface: ge-0/0/0, Enabled, Physical link is Up
Interface index: 134, SNMP ifIndex: 507, Generation: 137
Description: MGMT Interface - DO NOT DELETE
Link-level type: Ethernet, MTU: 1514, Link-mode: Full-duplex, Speed: 1000mbps,
BPDU Error: None, MAC-REWRITE Error: None, Loopback: Disabled,
Source filtering: Disabled, Flow control: Enabled, Auto-negotiation: Enabled,
Remote fault: Online
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Hold-times : Up 0 ms, Down 0 ms
Current address: 00:26:88:e1:54:80, Hardware address: 00:26:88:e1:54:80
Last flapped : 2011-04-20 02:02:04 UTC (2d 03:11 ago)
Statistics last cleared: Never
Traffic statistics:
Input bytes : 197626475 1008 bps
Output bytes : 196448392 0 bps
Input packets: 300053 1 pps
Output packets: 211433 0 pps
Input errors:
Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Policed discards: 0,
L3 incompletes: 0, L2 channel errors: 0, L2 mismatch timeouts: 0,
FIFO errors: 0, Resource errors: 0
Output errors:
Carrier transitions: 1, Errors: 0, Drops: 0, Collisions: 0, Aged packets: 0,
FIFO errors: 0, HS link CRC errors: 0, MTU errors: 0, Resource errors: 0
...TRIMMED...
Step 1.11
Use the pipe (|) and match functions of the Junos CLI to list all interfaces that are
physically down.
lab@srxA-1> show interfaces | match down
Physical interface: ge-0/0/5, Enabled, Physical link is Down
Device flags : Present Running Down
Interface flags: Hardware-Down SNMP-Traps Internal: 0x0
Syntax
host-name hostname;
Hierarchy Level
[edit system]
Release Information
Description
Related Topics
[edit]
lab@srxA-1#
Step 1.14
Display the interfaces portion of the candidate configuration.
[edit]
lab@srxA-1# show interfaces
[edit interfaces]
lab@srxA-1#
[edit interfaces]
lab@srxA-1# show
ge-0/0/0 {
description "MGMT Interface - DO NOT DELETE";
unit 0 {
family inet {
address 10.210.14.131/27;
}
}
}
[edit]
lab@srxA-1#
Note
If you have not already done so, return to
the [edit] hierarchy level using one of
the available methods.
Step 1.17
Try to display the status of chassis hardware with a show chassis hardware
operational command while in configuration mode.
[edit]
lab@srxA-1# show chassis hardware
^
syntax error.
[edit]
lab@srxA-1# run show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis AH3809AA0054 SRX240h-poe
Routing Engine REV 35 750-021794 AAAX6922 RE-SRX240H-POE
FPC 0 FPC
PIC 0 16x GE Base PIC
Power Supply 0
Step 1.18
Try to return to operational mode by entering an exit command.
[edit]
lab@srxA-1# exit
The configuration has been changed but not committed
Exit with uncommitted changes? [yes,no] (yes)
Exit aborted
[edit]
lab@srxA-1# show | compare rollback 0
[edit]
lab@srxA-1#
[edit]
lab@srxA-1# rollback 0
load complete
[edit]
lab@srxA-1# exit
Exiting configuration mode
lab@srxA-1>
Step 1.19
Log out of your assigned device using the exit command.
srxA-1 (ttyu0)
login:
Overview
This lab demonstrates configuration tasks typically performed on new devices running the
Junos operating system. In this lab, you use the CLI to perform initial configuration and
basic interface configuration.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands. Refer to the management network diagram for
access details.
By completing this lab, you will perform the following tasks:
• Load a factory-default configuration and perform initial system configuration.
• Save, delete, and restore a rescue configuration.
• Perform basic interface configuration.
In this lab part, you will load the factory-default configuration and perform initial
configuration tasks using the Junos CLI.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device
Step 1.2
Access the CLI at your station using the console connection.
Note
During this lab, your access through the
management network will be affected.
Ensure that you use the console
connection to access your assigned station.
Using the console connection ensures
persistent connectivity even when the
management network access is
unavailable. If needed, ask your instructor
how to connect to your system using the
console port.
login: lab
Password:
[edit]
lab@srxA-1# load factory-default
warning: activating factory configuration
Step 1.4
Display the factory-default configuration.
[edit]
lab@srxA-1# show
## Last changed: 2012-04-17 23:59:34 UTC
system {
autoinstallation {
delete-upon-commit; ## Deletes [system autoinstallation] upon change/
commit
traceoptions {
level verbose;
flag {
all;
}
}
interfaces {
ge-0/0/0 {
bootp;
}
}
}
name-server {
208.67.222.222;
208.67.220.220;
}
services {
ssh;
telnet;
xnm-clear-text;
web-management {
http {
interface vlan.0;
}
https {
system-generated-certificate;
Note
The factory-default configuration displays
several statements pertaining to the
security hierarchy level. This information is
outside the scope of this class but is
covered in the Junos for Security Platforms
(JSEC) course.
Step 1.5
Try to activate the factory-default configuration by issuing a commit command.
[edit]
lab@srxA-1# commit
[edit]
'system'
Missing mandatory statement: 'root-authentication'
error: commit failed: (missing statements)
Step 1.6
Navigate to the [edit system root-authentication] hierarchy level. Issue
the set plain-text-password command. When prompted to enter a new
password, type apples.
[edit]
lab@srxA-1# edit system root-authentication
Step 1.8
Issue the set plain-text-password command once again. When prompted
to enter a new password, type Rootroot. When prompted to confirm the password,
type Rootroot. Activate the change and return to operational mode by issuing a
commit and-quit command.
[edit system root-authentication]
lab@srxA-1# set plain-text-password
New password:
Retype new password:
lab@srxA-1>
Step 1.9
Issue the file list /var/tmp command.
lab@srxA-1> file list /var/tmp
error: no local user: lab
srxA-1 (ttyu0)
login: root
Password:
Note
You should see the previously defined
hostname at the login prompt. The
amnesiac hostname is shown when the
hostname is removed and the system is
rebooted. You do not need to reboot the
system at this time because you will
configure a new hostname shortly.
Step 1.11
Start the CLI with the cli command and enter configuration mode.
root@srxA-1% cli
root@srxA-1> configure
Entering configuration mode
[edit]
root@srxA-1#
Step 1.12
Define the system’s hostname. Use the hostname specified on the management
network diagram provided by your instructor.
[edit]
root@srxA-1# set system host-name hostname
Step 1.13
Configure the time zone and system time using the local time zone and current date
and time as input values.
[edit]
root@srxA-1# set system time-zone time-zone
[edit]
root@srxA-1# run set date date/time
Wed April 25 04:19:00 PDT 2012
[edit]
root@srxA-1# delete interfaces
[edit]
root@srxA-1# delete security
[edit]
root@srxA-1# delete protocols
[edit]
root@srxA-1# delete vlans
Step 1.15
Configure the ge-0/0/0 interface using the address and subnet mask specified on
the management network diagram, and specify an interface description of "MGMT
INTERFACE - DO NOT DELETE".
[edit]
root@srxA-1# edit interfaces
[edit interfaces]
root@srxA-1# set ge-0/0/0 unit 0 family inet address management IP address
[edit interfaces]
root@srxA-1# set ge-0/0/0 description "MGMT Interface - DO NOT DELETE"
[edit interfaces]
root@srxA-1#
Step 1.16
Navigate to [edit routing-options] and define a static route for the
10.210.0.0/16 destination prefix to allow for reachability beyond the local
management subnet. Use the gateway address, shown on the management network
diagram, as the next-hop value. When complete commit the configuration and return
to operational mode.
[edit interfaces]
root@srxA-1# top edit routing-options
[edit routing-options]
root@srxA-1# set static route 10.210.0.0/16 next-hop gateway address
[edit routing-options]
root@srxA-1# commit and-quit
commit complete
Exiting configuration mode
root@srxA-1>
STOP Wait for your instructor before you proceed to the next part.
In this lab part, you will save, display, load, and delete a rescue configuration using
the Junos CLI.
Step 2.1
Enter configuration mode and load the lab2-part2-start.config file from
the/var/home/lab/ijos/ directory. This will return the lab to its original state
and reestablish the lab user. Commit your configuration and return to operational
mode when complete.
root@srxA-1> configure
[edit]
root@srxA-1# load override /var/home/lab/ijos/lab2-part2-start.config
load complete
[edit]
root@srxA-1# commit and-quit
commit complete
Exiting configuration mode
root@srxA-1>
Step 2.2
Log out of the root user by issuing the exit command twice, then log in as the
lab user using lab123 as the password.
root@srxA-1> exit
root@srxA-1% exit
logout
srxA-1 (ttyu0)
login: lab
Password:
[edit]
lab@srxA-1# delete system services
[edit]
lab@srxA-1# commit
commit complete
[edit]
lab@srxA-1#
Step 2.6
Verify that the [edit system services] hierarchy level is empty and then load
the rescue configuration.
www.juniper.net Initial System Configuration (Detailed) • Lab 2–15
Introduction to the Junos Operating System
[edit]
lab@srxA-1# show system services
[edit]
lab@srxA-1# rollback rescue
load complete
Step 2.7
Verify that the [edit system services] hierarchy level once again contains
the ssh, telnet, and web-management services.
[edit]
lab@srxA-1# show system services
ssh;
telnet;
web-management {
http {
interface ge-0/0/0.0;
}
https {
system-generated-certificate;
interface all;
}
}
Step 2.8
Activate the rescue configuration and return to operational mode.
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 2.9
Delete the rescue configuration and attempt to display the rescue.conf.gz file to
confirm the deletion.
STOP Wait for your instructor before you proceed to the next part.
In this lab part, you will perform interface configuration and verify the operational
state of interfaces using the Junos CLI.
Step 3.1
Enter configuration mode and load the lab2-part3-start.config file from
the /var/home/lab/ijos/ directory. Commit you configuration when complete.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# load override ijos/lab2-part3-start.config
load complete
[edit]
lab@srxA-1# commit
commit complete
[edit]
lab@srxA-1#
Step 3.2
Refer to the network diagram for this lab and configure the listed interfaces. Use
logical unit 0 on all specified interfaces. Commit the configuration and return to
operational mode when complete.
[edit]
lab@srxA-1# edit interfaces
[edit interfaces]
lab@srxA-1# set ge-0/0/3 unit 0 family inet address address/30
[edit interfaces]
lab@srxA-1# set ge-0/0/2 unit 0 family inet address address/30
[edit interfaces]
lab@srxA-1# set ge-0/0/1 unit 0 family inet address address/30
[edit interfaces]
lab@srxA-1# set lo0 unit 0 family inet address address/32
[edit interfaces]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 3.3
Issue the show interfaces terse CLI command to verify the state of the
configured interfaces.
lab@srxA-1> show interfaces terse
Interface Admin Link Proto Local Remote
ge-0/0/0 up up
ge-0/0/0.0 up up inet 10.210.14.131/27
...TRIMMED..
ge-0/0/1 up up
ge-0/0/1.0 up up inet 172.20.77.1/30
ge-0/0/2 up up
ge-0/0/2.0 up up inet 172.20.66.1/30
ge-0/0/3 up up
ge-0/0/3.0 up up inet 172.18.1.2/30
...TRIMMED..
lo0 up up
lo0.0 up up inet 192.168.1.1 --> 0/0
...TRIMMED..
Step 3.4
Log out of your assigned device using the exit command.
lab@srxA-1> exit
srxA-1 (ttyu0)
login:
Overview
This lab demonstrates typical secondary configuration tasks performed on devices
running the Junos operating system.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample outputs from most commands.
By completing this lab, you will perform the following tasks:
• Define user accounts and authentication options.
• Set up and verify proper operation of system logging (syslog).
• Configure and monitor NTP.
• Enable and monitor the operation of SNMP.
• Configure and monitor the configuration archival feature.
In this lab part, your team will configure user accounts and related authentication
options.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxA-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Enter configuration mode
and load the reset configuration file using the load override /var/home/
lab/ijos/lab3-start.config command. After the configuration has been
loaded, commit the changes.
srxA-1 (ttyp0)
login: lab
[edit]
lab@srxA-1# load override ijos/lab3-start.config
load complete
[edit]
lab@srxA-1# commit
commit complete
[edit]
lab@srxA-1#
Step 1.4
Navigate to [edit system login] and define a custom login class named
juniper with the following permissions:
• view
• view-configuration
• reset
[edit]
lab@srxA-1# edit system login
Note
There may be an error after entering the
command, but it should still be added to
the configuration. Use the show command
to verify this.
Note
The remainder of this lab part tests user
login options. To prevent yourself from
being locked out, keep the current console
session open!
Step 1.7
Open another terminal window and use Telnet to access your system’s management
IP address. If needed, refer to the management network diagram. Log in with the
username walter.
srxA-1 (ttyp0)
login: walter
Password:
Step 1.9
Enter a question mark (?) at the prompt to view the permitted operational mode
command options for the user walter.
walter@srxA-1> ?
Possible completions:
file Perform file operations
help Provide help information
load
monitor Show real-time debugging information
op Invoke an operation script
quit Exit the management session
request Make system-level requests
restart Restart software process
save
set Set CLI properties, date/time, craft interface message
show Show system information
start Start shell
test Perform diagnostic debugging
Step 1.10
Verify that the user walter can view the configuration and other operational
outputs such as interface information.
walter@srxA-1> show configuration
## Last commit: 2012-04-18 12:14:08 PDT by lab
version 12.1R1.9;
system {
host-name srxA-1;
time-zone America/Los_Angeles;
root-authentication {
encrypted-password /* SECRET-DATA */; ## SECRET-DATA
ssh-dsa /* SECRET-DATA */;
Step 1.11
Restart the routing process using the restart routing command. This
command restarts the routing protocol daemon (rpd), which can be useful when
troubleshooting routing problems.
walter@srxA-1> restart routing
Routing protocols process started, pid 9777
Step 1.12
Log out from the user walter and initiate a new Telnet session to the management
interface for the user nancy. (Hint: Use the reconnect option on your terminal
client.) Attempt to restart the routing protocol process using the restart
routing command.
walter@srxA-1> exit
srxA-1 (ttyp0)
login: nancy
Password:
Step 1.14
Return to the original session opened to the lab user.
From the session opened to the lab user attempt to add the clear permission to
the default read-only login class. Issue the show command to view the system
login hierarchy.
[edit system login]
lab@srxA-1# set class read-only permissions clear
warning: 'read-only' is a predefined class name; changing to 'read-only-local'
Step 1.15
Navigate to the top of the configuration hierarchy and configure a RADIUS server for
use with user authentication. Refer to your management network diagram for the
server address. The RADIUS secret should be Juniper. Configure the
authentication order so that user login attempts use only local password
authentication if the RADIUS server is unreachable. Use commit to activate the
changes.
[edit system login]
lab@srxA-1# top
[edit]
lab@srxA-1# set system radius-server RADIUS server secret Juniper
[edit]
lab@srxA-1# set system authentication-order radius
[edit]
lab@srxA-1# commit
commit complete
[edit]
lab@srxA-1#
Step 1.16
Return to the secondary Telnet session opened to you student device
From the secondary Telnet session in which the user nancy is logged in, issue the
exit command to log out. Test the RADIUS server by reconnecting to the Telnet
session and try to log back in as nancy.
nancy@srxA-1> exit
srxA-1 (ttyp0)
login: nancy
Password:
Login incorrect
login:
Step 1.17
In the previous lab step, the defined RADIUS server was reachable. Because you did
not define the username on the RADIUS server, the RADIUS server rejected the
authentication. Therefore, the software did not consult the local password database.
Return to the original session opened to the lab user.
From the session opened to the lab user and change the IP address of the RADIUS
server to 10.1.1.1. You can use the rename command for this change. Do not forget
to issue commit to activate the change.
[edit]
lab@srxA-1# rename system radius-server RADIUS server to 10.1.1.1
[edit]
lab@srxA-1# commit
commit complete
Step 1.19
Return to the original session opened to the lab user.
From the session opened to the lab user and delete the
authentication-order statement. When complete commit your config and
return to operational mode.
[edit]
lab@srxA-1# delete system authentication-order
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
STOP Wait for your instructor before you proceed to the next part.
In this lab part, you will perform configuration of some common system
management features. You will configure and monitor syslog, NTP, SNMP, and
configuration archival.
www.juniper.net Secondary System Configuration (Detailed) • Lab 3–13
Introduction to the Junos Operating System
Step 2.1
Enter configuration mode and load the lab3-part2-start.config file from
the/var/home/lab/ijos/ directory. Commit your configuration when complete.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# load override ijos/lab3-part2-start.config
load complete
[edit]
lab@srxA-1# commit
commit complete
[edit]
lab@srxA-1#
Step 2.2
Use the show system syslog command to view the current syslog
configuration.
[edit]
lab@srxA-1# show system syslog
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
/var/log/:
authd_profilelib
authd_sdb.log
autod
chassisd
config-changes
cosd
dcd
dfwc
dfwd
eccd
gres-tp
httpd.log
httpd.log.old
idpd.addver
interactive-commands
inventory
Note
The files stored in the /var/log/
directory might vary between each system.
Step 2.6
Configure the system to synchronize its clock with an NTP server. Refer to the
management network diagram for the server’s IP address.
[edit system syslog]
lab@srxA-1# top
[edit]
lab@srxA-1# set system ntp server server address
Step 2.7
Use the same server IP address used in the previous step and configure an NTP
boot server. Commit the configuration and return to operational mode when
complete.
[edit]
lab@srxA-1# set system ntp boot-server server address
[edit]
lab@srxA-1# commit and-quit
commit complete
lab@srxA-1>
Step 2.8
View the config-changes log and verify the logging of the latest configuration
changes.
lab@srxA-1> show log config-changes
Apr 22 18:58:08 srxA-1 mgd[2552]: UI_CFG_AUDIT_OTHER: User 'lab' set: [system
ntp]
Apr 22 18:58:08 srxA-1 mgd[2552]: UI_CFG_AUDIT_OTHER: User 'lab' set: [system
ntp server 10.210.14.130]
Apr 22 18:58:16 srxA-1 mgd[2552]: UI_CFG_AUDIT_SET: User 'lab' set: [system ntp
boot-server] <unconfigured> -> "10.210.14.130"
Step 2.9
Manually force synchronization with the NTP server by issuing the set date ntp
operational mode command.
lab@srxA-1> set date ntp
22 Apr 19:04:24 ntpdate[3080]: step time server 10.210.14.130 offset -0.000025
sec
Step 2.10
Verify synchronization with the NTP server by using the show ntp
associations command. The system is synchronized with the NTP server if you
see the server address in the remote column with an asterisk (*) next to it. Check
the current system time using the show system uptime command.
Note
Step 2.11
Return to configuration mode and configure the system to allow SNMP access using
a community value of junos. The system should allow processing of SNMP
messages only when it receives them from the NMS server’s IP address. Refer to the
management network diagram for the server’s IP address.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# set snmp community junos clients server address
[edit]
lab@srxA-1#
Step 2.12
Configure an SNMP trap group to send traps to the NMS server. The SNMP trap
group should send traps whenever an interface transitions to a down state. Name
the trap group interfaces.
[edit]
lab@srxA-1# set snmp trap-group interfaces targets server address
[edit]
lab@srxA-1# set snmp trap-group interfaces categories link
Note
In subsequent steps you will disable the
management interface. Ensure that the
terminal session to your system uses the
console connection.
[edit]
lab@srxA-1# commit
commit complete
[edit]
lab@srxA-1# run show interfaces ge-0/0/0 terse
Interface Admin Link Proto Local Remote
ge-0/0/0 down down
ge-0/0/0.0 up down inet 10.210.14.131/27
[edit]
lab@srxA-1# delete interfaces ge-0/0/0 disable
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 2.14
Verify that the interface transition resulted in the sending of a trap by viewing the
messages log. Use the pipe symbol (|) and match on the ge-0/0/0 interface and
the keyword snmp to parse the messages log output. Next, issue the show snmp
statistics command and confirm that the Traps value in the Output section
is not zero.
lab@srxA-1> show log messages | match ge-0/0/0 | match snmp
Apr 19 11:05:22 srxB-1 mib2d[1223]: SNMP_TRAP_LINK_DOWN: ifIndex 508,
ifAdminStatus down(2), ifOperStatus down(2), ifName ge-0/0/0
Apr 19 11:06:14 srxB-1 mib2d[1223]: SNMP_TRAP_LINK_UP: ifIndex 508,
ifAdminStatus up(1), ifOperStatus up(1), ifName ge-0/0/0
Apr 19 11:06:14 srxB-1 mib2d[1223]: SNMP_TRAP_LINK_UP: ifIndex 512,
ifAdminStatus up(1), ifOperStatus up(1), ifName ge-0/0/0.0
Apr 19 11:13:28 srxB-1 mgd[1291]: UI_CMDLINE_READ_LINE: User 'lab', command
'show log messages | match ge-0/0/0 | match snmp '
Step 2.15
Perform an SNMP MIB walk with the Junos CLI using the show snmp mib walk
jnxOperatingDescr command. Note that the resolved object identifier (OID) of
jnxOperatingDescr is case sensitive. The OID is variable; we are simply using
this OID as an example.
lab@srxA-1> show snmp mib walk jnxOperatingDescr
jnxOperatingDescr.1.1.0.0 = midplane
jnxOperatingDescr.2.1.0.0 = PEM 0
jnxOperatingDescr.4.1.0.0 = SRX240 PowerSupply fan 1
jnxOperatingDescr.4.2.0.0 = SRX240 PowerSupply fan 2
jnxOperatingDescr.4.3.0.0 = SRX240 CPU fan 1
jnxOperatingDescr.4.4.0.0 = SRX240 CPU fan 2
jnxOperatingDescr.4.5.0.0 = SRX240 IO fan 1
Step 2.16
Enter configuration mode and configure your system to archive its configuration to a
remote FTP server whenever a commit operation occurs. You should configure the
archive-sites as “ftp://ftp@server address:/archive” including
the quotation marks. Refer to the management network diagram for the server’s IP
address. You should configure the password as ftp. You perform this configuration
under the [edit system archival configuration] hierarchy level.
Commit your configuration and return to operational mode when complete.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# edit system archival configuration
lab@srxA-1>
Step 2.17
Verify that the configuration successfully transferred to the remote FTP server by
using the show log messages | match transfer command.
lab@srxA-1> show log messages | match transfer
Apr 19 13:01:46 srxB-1 mgd[1291]: UI_CFG_AUDIT_SET: User 'lab' set: [system
archival configuration] <unconfigured> -> "transfer-on-commit"
Apr 19 13:01:46 srxB-1 mgd[1291]: UI_CMDLINE_READ_LINE: User 'lab', command
'set transfer-on-commit '
Apr 19 13:02:43 srxB-1 logger: transfer-file: Transferred /var/transfer/
config/srxB-1_juniper.conf.gz_20120419_200200
Apr 19 13:15:28 srxB-1 mgd[1291]: UI_CMDLINE_READ_LINE: User 'lab', command
'show log messages | match transfer '
Note
Step 2.18
Log out of your assigned device using the exit command.
lab@srxA-1> exit
srxA-1 (ttyu0)
login:
Overview
This lab covers common operational monitoring and platform maintenance activities. In
this lab, you monitor system, chassis, and interface operation, use network utilities, and
perform system maintenance tasks.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Monitor chassis, system, and interface operation.
• Use network utilities.
• Upgrade a device running the Junos operating system and recover the root
password.
In this lab part, each team will use key commands within the CLI to monitor system
and chassis operation.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxA-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Enter configuration mode
and load the reset configuration file using the load override /var/home/
lab/ijos/lab4-start.config command. After the configuration has been
loaded, commit the changes and return to operational mode.
srxA-1 (ttyp0)
login: lab
Password:
[edit]
lab@srxA-1# load override ijos/lab4-start.config
load complete
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 1.4
Issue the show system processes extensive command to check the status
of the routing protocol daemon (rpd). Alternatively, issue the show system
processes extensive | match "pid | rpd" command to parse the
output. The use of two pipes (|) in this command allows you to make multiple
matches. In this case it matches rpd for the routing protocol process as well as PID
to view the column headers.
lab@srxA-1> show system processes extensive
last pid: 5976; load averages: 0.08, 0.14, 0.07 up 1+21:08:16 07:32:28
124 processes: 18 running, 95 sleeping, 11 waiting
Mem: 143M Active, 98M Inact, 535M Wired, 159M Cache, 112M Buf, 34M Free
Swap:
PID USERNAME THR PRI NICE SIZE RES STATE C TIME WCPU COMMAND
1234 root 7 76 0 511M 61524K select 0 140.4H 282.62%
flowd_octeon_hm
22 root 1 171 52 0K 16K RUN 0 39.0H 87.94% idle: cpu0
23 root 1 -20 -139 0K 16K RUN 0 16:54 0.00% swi7: clock
1256 root 1 76 0 10896K 4104K select 0 5:14 0.00% license-check
5 root 1 -16 0 0K 16K rtfifo 0 5:12 0.00% rtfifo_kern_recv
1223 root 1 76 0 26180K 9224K select 0 4:03 0.00% mib2d
1225 root 1 76 0 18768K 7252K select 0 3:41 0.00% l2ald
1244 root 1 76 0 15588K 3464K select 0 2:48 0.00% shm-rtsdbd
1218 root 1 76 0 113M 16796K select 0 1:49 0.00% chassisd
19 root 1 171 52 0K 16K RUN 3 1:44 0.00% idle: cpu3
20 root 1 171 52 0K 16K RUN 2 1:44 0.00% idle: cpu2
21 root 1 171 52 0K 16K RUN 1 1:43 0.00% idle: cpu1
1227 root 2 76 0 22948K 7616K select 0 1:40 0.00% pfed
1222 root 1 76 0 18932K 11360K select 0 1:33 0.00% snmpd
1252 root 1 76 0 16684K 7916K select 0 1:28 0.00% utmd
50 root 1 -16 0 0K 16K psleep 0 1:14 0.00% vmkmemdaemon
25 root 1 -40 -159 0K 16K WAIT 0 1:13 0.00% swi2: netisr 0
1215 root 1 76 0 3288K 1376K select 0 1:10 0.00% bslockd
1219 root 1 76 0 11132K 3324K select 0 1:10 0.00% alarmd
1685 root 1 4 0 49392K 22156K kqread 0 0:40 0.00% rpd
...TRIMMED...
Step 1.5
Issue the show system statistics command to view protocol statistics
related to your team’s device.
lab@srxA-1> show system statistics
tcp:
466 packets sent
340 data packets (16474 bytes)
0 data packets (0 bytes) retransmitted
0 resends initiated by MTU discovery
116 ack-only packets (91 delayed)
0 URG only packets
2 window probe packets
0 window update packets
10 control packets
...TRIMMED...
Step 1.6
Issue the show system storage command to view information regarding the
device storage space.
lab@srxA-1> show system storage
Filesystem Size Used Avail Capacity Mounted on
/dev/da0s1a 898M 497M 330M 60% /
devfs 1.0K 1.0K 0B 100% /dev
devfs 1.0K 1.0K 0B 100% /dev/
/dev/md0 477M 477M 0B 100% /junos
/cf 898M 497M 330M 60% /junos/cf
devfs 1.0K 1.0K 0B 100% /junos/dev/
Step 1.7
Issue the show system uptime command to view the current system time.
lab@srxA-1> show system uptime
Current time: 2012-04-20 08:01:50 PDT
System booted: 2012-04-18 10:24:42 PDT (1d 21:37 ago)
Protocols started: 2012-04-18 12:27:26 PDT (1d 19:34 ago)
Last configured: 2012-04-20 07:52:13 PDT (00:09:37 ago) by lab
8:01AM up 1 day, 21:37, 2 users, load averages: 0.07, 0.05, 0.03
Step 1.8
Open another terminal window and use Telnet to access your system’s management
IP address. If needed, refer to the management network diagram. Log in with the
username walter and the password walter123.
login: walter
Password:
Step 1.10
Issue the request system logout user walter command to force a log
out for the user walter. Next, issue the show system users command to verify
that the user session for walter was terminated.
lab@srxA-1> request system logout user walter
logout-user: done
Step 1.13
View details about your system’s hardware components using the show chassis
hardware command.
lab@srxA-1> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis AH2909AA0041 SRX240-poe
Routing Engine REV 31 750-021794 AAAK4071 RE-SRX240-POE
FPC 0 FPC
PIC 0 16x GE Base PIC
Power Supply 0
Step 1.14
Issue the show interface terse command to quickly verify the administrative
and link state for your device’s interfaces.
lab@srxA-1> show interfaces terse
Interface Admin Link Proto Local Remote
ge-0/0/0 up up
ge-0/0/0.0 up up inet 10.210.14.131/27
Step 1.16
Issue the clear interfaces statistics ge-0/0/0 command followed by
the show interfaces ge-0/0/0 extensive | find "traffic"
command.
lab@srxA-1> clear interfaces statistics ge-0/0/0
STOP Wait for your instructor before you proceed to the next part.
In this lab part, each team will use network utilities within the CLI and monitor local
system traffic.
Step 2.1
Enter configuration mode and load the lab4-part2-start.config file from
the/var/home/lab/ijos/ directory. Commit your configuration and return to
operational mode when complete.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# load override ijos/lab4-part2-start.config
load complete
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 2.2
Start a continuous ping to the server with a data size of 500 bytes. Refer to the
management network diagram for the server’s IP address.
Note
If you are not receiving Internet Control
Message Protocol (ICMP) echo replies from
the server, notify your instructor.
Note
You can stop the ping operation by using
the Ctrl+c keystroke combination. You
should, however, let the ping operation
continue at this time for the subsequent
monitoring step.
Step 2.3
Open a new terminal session to your team’s device. Use Telnet to access your
system’s management IP address. If needed, refer to the management network
diagram. Log in with the lab user account and the password provided by the
instructor. You will use this separate terminal session to monitor ping traffic
generation.
srxA-1 (ttyp0)
login: lab
Password:
lab@srxA-1>
lab@srxA-1>
Note
The monitor traffic command
captures only packets that are local to the
device. It does not capture transit packets.
Step 2.5
In preparation for the next lab part, stop the monitor operation using the Ctrl+c
keystroke combination, and close the extra terminal session that you opened.
...TRIMMED...
09:24:07.464577 In PFE proto 2 (ipv4): 10.210.14.130 > 10.210.14.131: ICMP echo
reply, id 960, seq 1934, length 64
^C
18 packets received by filter
0 packets dropped by kernel
lab@srxA-1>
Step 2.6
Return to the original session opened to your device.
From the original session opened to your device, issue the Ctrl+c keystroke
combination to stop the continuous ping.
...TRIMMED...
508 bytes from 10.210.14.130: icmp_seq=3 ttl=64 time=2.803 ms
508 bytes from 10.210.14.130: icmp_seq=4 ttl=64 time=4.753 ms
508 bytes from 10.210.14.130: icmp_seq=5 ttl=64 time=2.495 ms
Lab 4–16 • Operational Monitoring and Maintenance (Detailed) www.juniper.net
Introduction to the Junos Operating System
508 bytes from 10.210.14.130: icmp_seq=6 ttl=64 time=2.942 ms
^C
--- 10.210.14.130 ping statistics ---
651 packets transmitted, 651 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.949/1.388/11.951/0.736 ms
lab@srxA-1>
STOP Wait for your instructor before you proceed to the next part.
In this lab part, you will retrieve a Junos OS package from a remote server and
upgrade your assigned device. Note that to keep the software consistent, you
upgrade the device to the same version of the Junos OS that it is currently running.
Step 3.1
Enter configuration mode and load the lab4-part3-start.config file from
the/var/home/lab/ijos/ directory. Commit your configuration and return to
operational mode when complete.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# load override ijos/lab4-part3-start.config
load complete
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 3.2
Use the file copy command in conjunction with FTP to retrieve the install image
named junos-srxsme-12.1R1.9-domestic.tgz from the server. Refer to
the management network diagram for the server’s IP address. Use the username
ftp and a password of ftp. Save the image to the /var/tmp directory on the
local device.
lab@srxA-1> file copy ftp://ftp:ftp@server address/
junos-srxsme-12.1R1.9-domestic.tgz /var/tmp/
/var/home/lab/...transferring.file.........U4R100% of 200 MB 2946 kBps 00m00s
Note
If there is not enough room in the
/var/tmp directory to accommodate the
software package, notify your instructor.
Step 3.3
Verify that the software package transferred correctly to the local /var/tmp
directory by using the file list /var/tmp | match junos command.
lab@srxA-1> file list /var/tmp/ | match junos
junos-srxsme-12.1R1.9-domestic.tgz
Shutdown NOW!
...TRIMMED...
Fri Apr 22 20:36:27 UTC 2011
srxA-1 (ttyu0)
login:
Step 3.5
After the reboot is complete, log in again as the lab user and issue the show
version command.
srxA-1 (ttyu0)
login: lab
Password:
lab@srxA-1>
STOP Wait for your instructor before you proceed to the next part.
In this lab part, you will perform root password recovery. The root password recovery
process requires that you use the console connection.
Step 4.1
Enter configuration mode and load the lab4-part4-start.config file from
the /var/home/lab/ijos/ directory. Commit your configuration and return to
operational mode when complete.
lab@srxA-1> configure
Entering configuration mode
[edit]
lab@srxA-1# load override ijos/lab4-part4-start.config
load complete
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 4.2
Using a terminal session connected to the console port, reboot the system. Enter
yes to authorize the reboot. When prompted to enter the command prompt, press
the space bar.
lab@srxA-1> request system reboot
Reboot the system ? [yes,no] (no) yes
Shutdown NOW!
[pid 950]
lab@srxA-1>
*** FINAL System shutdown message from lab@srxA-1 ***
System going down IMMEDIATELY
...TRIMMED...
FreeBSD/MIPS U-Boot bootstrap loader, Revision 1.9
([email protected], Mon May 17 05:45:58 UTC 2010)
Memory: 1024MB
[0]Booting from nand-flash slice 1
Un-Protected 1 sectors
writing to flash...
Protected 1 sectors
Loading /boot/defaults/loader.conf
/kernel data=0xa17310+0xdbc54 syms=[0x4+0x7f730+0x4+0xb6cd4]
Type '?' for a list of commands, 'help' for more detailed help.
loader>
Step 4.3
At the prompt, first disable the watchdog process by using the watchdog
disable command. Secondly, type boot -s and press Enter to boot the Junos OS
in single-user mode.
loader> watchdog disable
loader> boot -s
Kernel entry at 0x801000d8 ...
init regular console
Primary ICache: Sets 64 Size 128 Asso 4
Primary DCache: Sets 1 Size 128 Asso 64
Secondary DCache: Sets 512 Size 128 Asso 8
...TRIMMED...
System watchdog timer disabled
Enter full pathname of shell or 'recovery' for root password recovery or RETURN
for /bin/sh:
Step 4.4
When prompted to enter a pathname for shell or ‘recovery’ for root password
recovery, type recovery and press Enter.
Enter full pathname of shell or 'recovery' for root password recovery or RETURN
for /bin/sh: recovery
NOTE: Once in the CLI, you will need to enter configuration mode using
NOTE: the 'configure' command to make any required changes. For example,
NOTE: to reset the root password, type:
NOTE: configure
NOTE: set system root-authentication plain-text-password
NOTE: (enter the new password when asked)
NOTE: commit
NOTE: exit
NOTE: exit
NOTE: When you exit the CLI, you will be asked if you want to reboot
NOTE: the system
[edit]
root@srxA-1# set system root-authentication plain-text-password
New password:
Retype new password:
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1> exit
srxA-1 (ttyu0)
login:
Step 4.6
Once the system boots, verify the root password recovery by logging in with the new
root password.
srxA-1 (ttyu0)
login: root
Password:
root@srxA-1%
Step 4.7
Start the CLI and enter configuration mode.
root@srxA-1% cli
root@srxA-1> configure
Entering configuration mode
[edit]
root@srxA-1#
Step 4.8
Restore the lab4-part4-start configuration using the load override /
var/home/lab/ijos/lab4-part4-start.config command. Activate the
configuration and log out of the system.
[edit]
root@srxA-1# load override /var/home/lab/ijos/lab4-part4-start.config
load complete
[edit]
root@srxA-1# commit and-quit
commit complete
Exiting configuration mode
root@srxA-1> exit
root@srxA-1% exit
logout
srxA-1 (ttyu0)
login:
Overview
This lab introduces you to the J-Web graphical user interface (GUI). In this lab, you will
familiarize yourself with various J-Web features and capabilities.
The lab is available in two formats: a high-level format that is designed to make you think
through each step and a detailed format that offers step-by-step instructions complete
with sample output from most commands.
By completing this lab, you will perform the following tasks:
• Log in to the J-Web interface.
• Explore J-Web monitoring options.
• Explore J-Web configuration and diagnose options.
In this lab part, you will familiarize yourself with the access details for your team’s
station and log in through the J-Web interface. You will also familiarize yourself with
the various monitoring capabilities available in the J-Web user interface.
Note
Depending on the specifics of your class,
you might be accessing a router that is
remote from your physical location. The
instructor will inform you as to the nature of
your access and will provide you with the
details needed to access your router.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxA-1 with the Secure CRT program as a basis:
login: lab
Password:
[edit]
lab@srxA-1# load override ijos/lab5-start.config
load complete
[edit]
lab@srxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxA-1>
Step 1.4
Open a Web browser on your PC.
From a Web browser on your PC. navigate to the management address of your
device. Refer to the management network diagram for the IP address associated
with your team’s station.
Step 1.5
Log in as user lab with the password supplied by your instructor.
Step 1.6
After logging in click on the Dashboard tab in the upper left corner. Use the
information found in your browser to answer the following questions.
Step 1.7
Edit the Dashboard Preferences to display the Chassis Status.
1. Click Open Preferences Dialog in the upper right corner of the
screen.
2. Scroll down the list of available Panels, and select Chassis Status,
then click OK.
Step 1.8
Navigate to Monitor > Interfaces and view the ge-0/0/0.0 interface.
Step 1.9
Navigate to Monitor > Routing > Route Information to view the current
static routes.
In this lab part, you will familiarize yourself with the configuration and diagnostic
capabilities available in the J-Web interface. You will also identify the key pages that
relate to those capabilities.
Step 2.1
Access the J-Web configuration page by clicking the Configure tab.
Step 2.2
Navigate to Configure > System Properties > User Management.
Step 2.3
Click Edit. In the Edit User Management window, click Add and create the
user Jweb. Use the password lab123 and fullname Jweb User. Keep the login
class as read-only. Leave the User ID field blank. Click OK when complete.
Step 2.4
Commit the new user by clicking on Actions in the upper right corner, then click
Commit.
Step 2.5
Return to User Management and remove the Jweb user created earlier.
1. Navigate to Configure > System Properties > User
Management.
2. Click Edit.
3. Highlight the Jweb user and click Delete.
4. Click OK.
Step 2.6
Click Actions, then click Compare to display changes in the configuration.
Step 2.7
Commit the changes by clicking on Actions then Commit.
Step 2.8
Navigate to Troubleshoot > Ping Host. Enter the IP address of the server in
the management network and click Start to begin the ping.
Step 2.9
Logout of your J-Web session. Return to the cli session opened to your device and
log out using the exit command.
lab@srxA-1> exit
srxA-1 (ttyu0)
login: