JNCIE-SP Tech Lab v1.1
JNCIE-SP Tech Lab v1.1
2 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
General information
Copyright and licensing information
All rights reserved. No part of this publication may be reproduced or distributed in any form or by
any means without the prior written permission of iNET ZERO a registered company in the
Netherlands. This product cannot be used by or transferred to any other person. You are not allowed
to rent, lease, loan or sell iNET ZERO training products including this workbook and its configurations.
You are not allowed to modify, copy, upload, email, share, distribute this workbook and supporting
materials in any way. This product may only be used and printed for your own personal use and may
not be used in any commercial way.
Warning: Besides standard anti piracy techniques like document watermarks and password
protection this workbook also contains a steganographyID making this workbook unique and always
traceable to the original buyer.
Juniper (c), Juniper Networks inc, JNCIE, JNCIP, JNCIS, JNCIA, Juniper Networks Certified Internet
Expert, are registered trademarks of Juniper Networks, Inc.
JNCIE-SP workbook:
3 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Alexey Tolstenok
Alexey has more then 12+ experience in the Telecom/IT industry.He is a triple CCIE (R&S, SP, Sec)
#17405 and JNCIE-SP#313, certified Cisco and Juniper instructor.
Ivan Ivanov
Ivan van lives in East Europe country of Bulgaria. He has more than 10 years experience with IP
technologies, working at several Internet Service Providers, big enterprise companies and
International system integrators. Throughout his career, Ivan gained extensive experience designing,
implementing and supporting IP networks based mostly on Juniper Networks and Cisco Systems
solutions and devices. Ivan worked on various international projects, designing, securing and
implementing MPLS/IP backbone for multinational mobile operators. Ivan has the following
certificates: JNCIE, JNCIP-SEC and various Cisco certificates.
Jörg Buesink
JNCIE-SP workbook:
Jörg lives in the Netherlands near Amsterdam and brings more than 10 years of experience in the IT
and networking industry. He has worked for several large ISPs / service providers in the role of
technical consultant, designer and network architect. He has extensive experience in network
implementation, design and architecture. Jörg is triple JNCIE certified (JNCIE-ENT#21, JNCIE-SP#284
and JNCIE-SEC#30) as well as triple CCIE#15032 (Routing/ Switching, Service provider and Security),
3
Cisco CCDE#20110002 and Huawei HCIE#2188 Routing and Switching certified.
4 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Reviewer:
Netherlands based networking enthusiast and Juniper Networks ambassador. Has spent most of his
career on the service-providers’ side of things. Known to lab up and write about whatever sparked
his interest networking wise. Other than that, he is a father to his son, husband to his wife and he
enjoys long dinners with friends.
JNCIE-SP workbook:
5 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Did you know that this workbook could be used in combination with our premium JNCIE rack rental
service? Take a look on our website for more information www.inetzero.com
Warning:
Please do NOT change the root account password for any of our devices to
prevent unnecessary password recovery. Thank you for your cooperation
Target audience
This workbook is developed for experienced network engineers who are preparing for the Juniper
Networks JNCIE-SP lab exam. Although not required it is highly recommended that you have passed
the JNCIP-SP written exam.
6 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Table of contents
General information . .......................................................................................................... 2
Copyright and licensing information . ............................................................................................. 2
About the authors: ......................................................................................................................... 3
Target audience . ............................................................................................................................. 5
How to use this workbook . ............................................................................................................ 5
iNET ZERO support . ......................................................................................................................... 5
8 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
9 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
13 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
13
14 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Introduction:
JUNOS offers support for many features commonly used within networks. The supported
features are (mostly) consistent across the different device types that Juniper has to offer.
By default, there is one super user in the system, this is the “root” user. Any additional users
and passwords have to be added manually. In JUNOS, every user has to belong to a class. A
class can contain multiple users and these classes define what privileges are granted to every
user that is a member of the class. Administrators can define their own custom classes. By
default, there are four pre-defined classes.
Inside every JUNOS class, so-called permission-flags can be set. These permission flags
indicate what commands are available to the users belonging to the class. There are
permissions granting the users access to operational mode commands and there are
permissions granting the users access to configuration commands.
Apart from local password authentication, JUNOS also supports remote authentication
methods such as TACACs+ and RADIUS. Remote authentication methods can be combined
with local password authentication. Local password authentication usually serves as a last
resort, authenticating locally configured users only when IP connectivity with the remote
authentication system is lost.
configuring the same NTP server(s) on all JUNOS devices, troubleshooting can become a lot
easier. JUNOS also offers a standard UNIX syslog service, which supports eight levels of
message severities. These messages can be stored locally, sent to a remote syslog server
and/or to all users that are currently logged in. On JUNOS systems, the SNMP agent is
disabled by default. All existing SNMP versions up to version 3 are supported.
Another integral part of JUNOS images are basic security features such as stateless firewall
filters, control plane protection mechanisms and anti-spoofing mechanisms.
A standard firewall filter can be applied to JUNOS device’s loopback interface and by doing
so, all traffic to and from the routing-engine can be controlled. This helps to provide basic
protection from potentially malicious traffic that is aimed at the routing-engine.
The uRPF feature works by comparing the source IP of each incoming IP packet against the
routing table. The route towards the source IP of the packet has to correspond to the
interface on which the packet was received. If this is not the case, the packet is dropped. In
general, uRPF is enabled on interfaces facing to the “outside” of the AS and the feature can
eliminate the need to configure long and error-prone anti-spoofing firewall filters.
Do’s and Dont’s
• When listing separate allowed/denied commands in the user class configuration,
always enclose them in double quotes “…”
• By default, the number of supported AE interfaces is 0. Don’t forget to enable the
‘aggregated-devices’ in the [ chassis ] configuration hierarchy.
• If the NTP ‘show ntp associations’ command does not show an NTP server selected
for synchronization (indicated by the “*”), try running the operational mode
command “set date ntp <NTP server IP>”. This runs the BSD ntpdate utility, which
15
16 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
16
17 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Change the end-term to not only discard and count, but to log and syslog as well.
18
19 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Chapter 2: IGP
Introduction:
The IGP is one of the most important parts in any SP network design. All other protocols
required by any of the SP services rely either directly or indirectly on the IGP. Some of the
IGPs most critical tasks are the fast and correct distribution of internal prefix information.
The IGPs most commonly deployed by SPs are IS-IS and OSPF.
Both of these IGPs use a link-state database (LSDB) to store routing information and both
OSPF and IS-IS use the Dijkstra algorithm to calculate the best paths. Each protocol uses
specific packets to distribute the routing information stored in the LSDB. In OSPF, these
packets are called LSAs. In IS-IS, these packets are called LSPs.
One of the main differences between OSPF LSAs and IS-IS LSPs is the way in which IS-IS LSPs
use TLV tuples to describe prefix information. New TLV tuples are easily added to carry
additional or different information. So even though IS-IS was not initially developed for IP,
this concept has made it possible to extend IS-IS and rely on only 1 instance of the protocol
to distribute information for both IPv4 and IPv6.
OSPF is transported in IP (protocol number 89) and has 2 versions. OSPFv2 was designed for
IPv4 and, later on, OSPFv3 was developed to support IPv6. Since both versions work
independently from each other, IS-IS is generally considered the most attractive IGP for SP
environments.
Both IGPs establish and maintain neighbor adjacencies. These neighbor adjacencies are a
pre-requisite for the exchange of routing-information. Neighbor adjacencies are built
automatically by having routers exchange Hello packets. These same Hello packets are also
used to maintain the neighbor adjacency.
Even though both IGPs need the MTU size to match on both sides of the link for successful
adjacency formation, there is a difference in MTU mismatch discovery. IS-IS uses hello
packets while OSPF can discover an MTU mismatch only during the exchange of database
JNCIE-SP workbook: Chapter 2: IGP
description packets. Both IGPs also handle fragmentation in a different way. OSPF routers
rely on IP to handle fragmentation. IS-IS routers don’t rely on IP, but have packets
fragmented at the originating router instead.
Both protocols organize the network into areas. However, there are some differences in the
way OSPF and IS-IS do this. In OSPF, all areas must to be connected to area 0 (the backbone
area). The reason for this is that OSPF behaves as a distant vector protocol for inter-area
routing. In OSPF, all the routers within an area have an identical LSDB.
IS-IS does not share the concept of a backbone area. Instead, it requires a logical topology of
19
contiguously connected Level 2 routers with (possible) branches of Level 1-2 and Level 1
20 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
routers. Another difference is that in IS-IS, the entire router resides within a single area while
in OSPF, the individual links of a router can be placed into different areas. In IS-IS, routers
have a per level LSDB. In OSPF, routers have a per area LSDB.
OSPF:
• Always pay attention to which logical interface number should be put into an area. In
case you omit a unit number, unit 0 will be added automatically.
• Don’t forget to add loopback interface lo0.x to the OSPF configuration because other
protocols like internal BGP rely on loopback IP reachability.
• Check that IP addresses on both sieds of the link belong to the same subnet and that
they are using the same subnet. Also make sure that the following parameters are
identical: OSPF interface network type, area number, area type, hello and dead
intervals, MTU, authentication type and passwords (if any).
• Don’t forget to write and add an export policy to the forwarding table if you’re asked
to enable load-balancing across several equal-cost paths.
IS-IS:
• Take care when you are deciding on which level logical interfaces need to operate. In
case you omit a unit number, unit 0 will be added automatically.
• Make sure that the ISO protocol family is on every logical interface that should run IS-
IS.
• Add at least one NET address to the interface configuration under the “family iso”
hierarchy (generally it is configured on the loopback interface).
• By default, levels 1 and 2 are enabled on the IS-IS interface. Disable the unwanted
level to prevent undesirable level adjacencies to be established.
• Make sure that IP addresses are from the same subnet on both ends of the link. Also
make sure that the following parameters are identical: IS-IS interface network type,
MTU, area IDs (for level-1 only adjacencies), authentication parameters (if any).
JNCIE-SP workbook: Chapter 2: IGP
20
21 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
21
22 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
22
23 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
23
24 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
24
25 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Advertise these interface addresses to OSPF without actually running OSPF on them.
Do not use a policy to perform this task.
25
26 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
26
27 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
28 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
28
29 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 2.15: IS-IS Baseline
• Configure a multi-level IS-IS basline according to the diagram.
• Use xxxx.xxxx.xxxx as system-id, where x is the router number.
Task 2.16: IS-IS Authentication
• Enable hello authentication only within L1 areas. Use MD5 as the authentication type
and R1R3 as a password for the R1-R3 connection and R2R4 for the R2-R4 one.
• Disable the DIS election on the links as shown in the diagram.
• Enable both hello and LSP authentication between R3 and R4. Use MD5 and
password R3R4.
• Change the CSNP interval on the R3-R4 links to the value of 5 seconds.
• Change the transmission frequency to 1 LSP per second on the links R1-R3 and R2-R4.
29
30 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 2.19
• Configure the IS-IS and OSPFv3 baseline according to the diagram.
Task 2.20
• Configure 4 static IPv6 routes on R1 according to the diagram.
Use “reject” keyword as a next-hop value.
• Redistribute these routes to IS-IS.
Task 2.21
JNCIE-SP workbook: Chapter 2: IGP
Task 2.22
• Enable OSPFv3 authentication between R3 and R4.
• Use protocol esp, spi 256, the hmac-sha1-96 algorithm and key ' inetzero-jncie-inet0'
30
31 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Chapter 3: MPLS
Introduction:
MPLS is a technology that is playing an invaluable role in any modern SP network. MPLS is
not just another way of switching packets across a SP network, but it’s a different approach
to building a scalable universal infrastructure that can support a variety of services.
In MPLS, Label Switched Paths (LSPs) are signaled between MPLS nodes, called LSRs. These
LSPs are unidirectional and they are used by LSRs to switch traffic across the network. LSRs
perform an exact-match label lookup to determine which interface is to be used as an
outgoing interface. This as opposed to the traditional longest-match lookup of the
destination IP address against the routing table.
Labels are pushed onto IP packets between its Layer 2 and Layer 3 header on the edge of the
MPLS network by edge routers. These router are commonly referred to as PE (Provider Edge)
routers. The operation wherein a label is added to the stack is called a “push” operation. This
operation is mostly performed on ingress. On intermediate MPLS nodes, the MPLS label is
changed. This is called a “swap” operation. On egress, the MPLS label is removed from the
packet in an operation referred to as “pop”. This can be performed by an egress PE or, as is
the case most often, the penultimate hop MPLS node. The scenario wherein the
penultimate hop pops the label is called Penultimate Hop Popping (PHP). PHP behavior
optimizes label operations by avoiding a double lookup on the egress PE. By popping the
label, the egress PE only has to do an IP lookup. If the label were not popped, the egress PE
would have to examine both a label and an IP address.
Label distribution can be provided by means of the label distribution protocols LDP and
RSVP. The main difference between them is the traffic engineering (TE) capabilities offered
by RSVP. LDP relies upon the underlying IGP and LDP signaled LSPs always follow the best
paths chosen by the IGP. RSVP allows for administrators to define what path an LSP should
take, offering a more equal and efficient utilization of network resources. RSVP was
JNCIE-SP workbook: Chapter 3: MPLS
RSVP can also track the amount of currently used and available bandwidth together with
other TE specific parameters inside a database called the TED (traffic engineering database).
This is a more detailed version of the link-state LSDB and both IS-IS and OSPF support TED
and TE capabilities.
31
32 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
One of the things the TED can contain is information about link colors. These can offer
additional flexibility for the creation of LSPs. Link colors make it possible to easily include or
exclude colored links from path computation.
CSPF is an advanced version of SPF algorithm used in link-state protocols. Its additional
capabilities include taking user-defined constraints (such as link colors) into consideration
when creating an ERO (explicit route object) – a list of hops that should be visited during the
creation of an LSP. This ERO list is used by RSVP for LSP signaling.
An ERO list can be defined by explicitly specifying hop sequences from the ingress LSR to the
egress LSR. Two types of hops can be defined in these ordered sequences; strict hops and
loose hops. A strict hop has to be an IP address of a directly connected neighbor interface. A
loose hop can be anywhere between the ingress and egress point of the LSP. The actual
path between the local node and the loose hop is calculated by the IGP.
By default, only the loopback IP addresses for routers will be present in the inet.3 table. This
is because with RSVP signaled LSPs, only the /32 that corresponds to the egress point of the
LSP is placed into the inet.3 table. And with LDP, only the label binding for the loopback IP is
advertised to other routers.
Furthermore, by default, the routing information in the inet.3 table is usable only by the BGP
protocol. If for some prefix the BGP next-hop can be resolved in this table, then the
corresponding LSP will be used to forward traffic. This default behavior can be changed and
LSPs can also be used to forward to non BGP destinations.
32
33 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Enable MPLS processing by adding “family mpls” on all core-facing logical interfaces
on every PE and P router. Also configure the same logical interfaces in the “protocols
mpls” stanza. Verify that all the necessary interfaces are MPLS enabled by analyzing
the output of the “show mpls interfaces” operational mode command.
• Enable RSVP and/or LDP on every logical interface that any MPLS LSP might cross.
Generally, these are core-facing interfaces. Be careful with logical interface numbers
and always double-check them to prevent troubleshooting due to typos.
• Always use the “show mpls lsp extensive” command when troubleshooting
unsuccessful LSP setup. This is because the output of this command contains the
LSP’s recent events. The reasons for any LSP setup failure can be found there as well.
• Be aware that, by default, only BGP uses the inet.3 table for route resolution. The
options under “set protocols mpls traffic-engineering” can change this behavior.
• When using link colors, take into account that links with no color assigned are not
considered. They are purged from calculation when “include” is used and considered
when “exclude” is used.
• When working with ERO lists, be careful to visit nodes only once and avoid loops
when defining a path.
33
34 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 1. RSVP
Initial configurations: OSPFv2-baseline
34
35 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Make sure that the Orange LSP is preferred for internal traffic going to 1.1.1.1/32.
Use a policy for performing this task.
Task 3.7: RSVP LSP Primary and Secondary Paths
• Create an RSVP LSP from R1 to R2 named Brown and turn off CSPF for the LSP.
• Enable a primary path that visits R5 and don’t use more than one ERO.
• Enable the use of a secondary path which is fully calculated by the IGP and have this
path ready to accept traffic in case of primary path failure.
35
36 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Create an LSP from R2 to R1 named “AG1” which includes links only with Green color
while building LSP.
• Create another LSP to the same direction named “AG2” which excludes links with
colors Red or Blue.
Task 3.15: RSVP LSP Auto-Bandwidth
• Enable auto-bandwidth on LSP Orange with the bandwidth reallocation interval set to
300 seconds.
• Adjust the auto-bandwidth statistics interval to 30 seconds and use the name “mpls-
stat” for the statistics file.
36
37 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
37
38 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 2. LDP
Initial configurations: OSPFv2-baseline
38
39 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
39
40 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Chapter 4: BGP
Introduction:
BGP is a protocol that performs different tasks in a SP environment. One of the primary tasks
is to allow for the exchange of prefix information between different autonomous systems.
Apart from that, BGP can also play an important role in the signaling of other services. This is
made possible by using the modified version of BGP, called MP-BGP. This version of BGP is
capable of carrying more than just IPv4 prefixes. It allows for the distribution of routing-
information for a number of different address families, such as the ‘inet-vpn’ and ‘l2vpn
signaling’ address families for example. These last two enable services such as BGP signaled
MPLS Layer 3 and Layer 2 VPNs.
Unlike other routing-protocols, there is no auto-discovery procedure defined for BGP. All
BGP neighbors need to be configured explicitly. Another factor that sets BGP apart from
other routing-protocols is the use of TCP as a (reliable) transport protocol.
We can distinguish two types of BGP sessions: iBGP (used within an AS) and eBGP (used
between different ASes). In general, iBGP sessions are sourced from the loopback addresses
of peering routers while eBGP sessions are sourced using the address configured on the
physical interface that connects the peering routers to each other.
BGP relies on the AS path for loop prevention. The AS path is prepended to prefixes when
they are advertised across an eBGP session. Since the AS path is not prepended to prefixes
exchanged across an iBGP session, this mechanism would not work for iBGP. Therefore, iBGP
learned prefixes are never forwarded across an iBGP session. This leads to the requirement
of a full-mesh of iBGP sessions within an AS.
Since the full-mesh requirement does not scale well, 2 different scaling mechanisms were
developed for BGP: BGP confederation and route-reflection. The BGP confederation
JNCIE-SP workbook: Chapter 4: BGP
mechanism allows for the AS to be broken up into smaller sub-ASes called confederations.
Only within these sub-ASes is a full mesh of iBGP sessions required. Prefix exchange between
sub-AS’es is provided by eBGP-like sessions called confederation BGP sessions.
The other BGP scaling mechanism is called Route-Reflection. The Route-Reflection approach
relaxes the iBGP rule which states that iBGP learned routing information cannot be
advertised to other iBGP peers across an iBGP session. This applies to routers that serve as a
Route-Reflector (RR). Instead of a full mesh, all BGP speaking routers have an iBGP session
with one or more RRs. These RRs can reflect iBGP learned routes between the different RR-
clients. For very large networks, it is even possible to define a hierarchy of RR-clusters that
serve different parts of the network or specific address-families. 40
41 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Another point worth mentioning is that the two BGP scaling mechanisms are not mutually
exclusive. A RR can be configured to relax the iBGP full-mesh requirement within a BGP sub-
AS.
All prefix information carried by BGP has so-called PATH attributes attached to it. These
PATH attributes make BGP the most flexible routing-protocol to date. In combination with
routing-policies, these PATH attributes can be used to manipulate routing-information in an
endless number of ways.
For example, the local preference attribute can be used to manipulate the exit point for
outgoing traffic towards another AS while attributes AS-PATH and MED can be used to
manipulate entry points for incoming traffic into the AS.
Another BGP attribute worth mentioning is the BGP community. Communities are often
used to tag or mark traffic at a certain point in the network. The administrator of the AS can
easily identify these routes anywhere in the AS by referencing these communities in policies.
By doing so, it becomes possible to manipulatie traffic and routing information in a very
concise way.
41
42 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Make sure there is IP reachability between BGP speakers before setting up the BGP
sessions. You can use the ping utility with the ‘source’ option for this.
• To prevent BGP routes from being marked as hidden, make sure that the next-hop of
the route (by default the IP address of the last eBGP peer) can be resolved in the
inet.0 table on every BGP peer. This can be done by injecting the eBGP peer facing
interface into the IGP or through the use of a routing policy that rewrites the next-
hop.
• The first step in configuring RTBH is to configure a static route for an unused prefix
that has it’s next-hop set to discard on every iBGP router within the AS. Then, on a
signaling router, an export policy should be configured to redistribute static routes
into BGP. A policy that takes care of the redistribution should set the next-hop of the
route to match the discard route. This will make all iBGP speaking peers install the
route into the forwarding table with a next-hop that corresponds to a discard route.
Furthermore, the policy on the signaling router should also set the local preference
to the highest value within the AS and attach the no-export community. This way the
route will be active and it will never be (accidentally) advertised towards any other
AS. Another good idea is to make the signaling router trigger RTBH only for static
routes configured with a specific tag or community.
• While configuring IPv6 tunneling, don’t forget to enable “family inet6” support not
only on PE interfaces connected to CE but also on core-facing interfaces.
42
43 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
43
44 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
44
45 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
45
46 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
• Configure AS 65555 so that outgoing traffic to AS 65666 is sent via R3 and all
incoming traffic from AS 65666 enters the AS via R4.
• Don’t use AS Path manipulation for this task.
46
47 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
47
48 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Chapter 5: VPNs
Introduction:
By leveraging their MPLS infrastructure, most of today’s SP networks are able to support
different types of VPNs. VPN traffic for different customers and services is switched across a
common MPLS infrastructure by making use of 2 labels, a bottom label and a top label.
The bottom (or inner) label is sometimes called the VRF label. This label defines the VPN
membership of the packet. An ingress PE pushes this label onto packets on ingress so that an
egress PE router knows what VPN to associate the traffic with.
Another label, the top (or outer) label, is also pushed onto packets by an ingress PE. This
label is used by MPLS routers to forward traffic towards the correct MPLS router. For VPN
traffic, this means that the top label corresponds to the egress PE router.
The routers in between the PE routers, if any, are the P routers. These routers only look at
the top label, switching traffic towards the destination PE router. The P routers have no
knowledge of any VPN or customer routing information. Exchanging routing information
with the customer and propagating customer routing information across the SP network is
strictly the PE routers’ responsibility.
To exchange this customer routing information across the SP network, a modified version of
the BGP protocol is used. This Multi-Protocol BGP (MP-BGP) is used to exchange customer
prefix information for L3VPNs across the SP network. The two most important concepts that
are added in this MP-BGP prefix exchange are the Route-Distinguisher (RD) and the Route-
Target (RT).
The SP network can serve as a common infrastructure to many L3VPNs and all of the
customers using an L3VPN can use their own IP space. This is possible because routing
information for every customer is made unique. This is done by prepending a RD to every
customer prefix. To exchange these routes, the “inet-vpn unicast” address family has to be
enabled for BGP sessions between the PE routers.
JNCIE-SP workbook: Chapter 5: VPNs
The second important concept in L3VPNs is the RT. The RT is an extended BGP community
that defines VPN membership. PE routers attach these RT communities when routing-
information is exported to other PE routers. On import, the remote PE router uses the RT to
determine in which VPN routing table the received prefixes should be installed.
In L3VPNs, the PE routers are involved in customer routing. Between the PE and the CE, the
following routing protocols are supported: OSPF, RIP and BGP. It is also possible to use static
routes on the PE routers involved in with VPN.
Different routing-protocols come with different caveats. For example, with BGP, a customer
may be inclined to use the same AS everywhere. In this case, it is mandatory for the SP to
change the default BGP loop prevention mechanism. This can be done by modifying the AS- 48
path and/or by looping the SP AS several times.
49 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
The most interesting L3VPN scenario is a hub-and-spoke VPN. In this scenario, any inter-
spoke traffic must be forwarded through the hub site first. This is achieved by using different
RTs for the hub and spoke sites and by selectively importing and exporting these RTs. The
hub sites imports routes with the spoke RT and exports routes with the hub RT. The spoke
sites only import routes with the hub RT and export routes with the spoke RT.
Do’s and Dont’s
• If there are no restrictions, use an IP-address-based route distinguisher value. This
can save time during troubleshooting.
• In hub-and-spoke scenarios, consider the default loop-prevention mechanisms and
modify them as needed.
• When using VPN route reflectors that are placed out of the forwarding path, make
sure that the BGP next-hops are resolved in inet.3, else the RR will not accept the
routes.
• To make an OSPF sham link more preferable over a legacy OSPF backbone, it may be
necessary to tune OSPF metrics on the interfaces of the CE devices.
49
50 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 1. L3VPN
Initial configuration: Part 1
50
51 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
51
52 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
52
53 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
53
54 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 3. L3VPN
Initial configurations: L3VPN part3
54
55 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
55
56 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Covered in RFC 4447, the LDP Layer 2 Circuit allows for connectivity between dissimilar
media. An LDP layer 2 circuit is always a point-to-point connection between two devices and
both of these devices have to be configured manually. The LDP based layer 2 circuit is the
only layer 2 VPN that is not configured within a routing-instance. Martini style encapsulation
is used, this goes for the other three layer 2 VPNs as well.
The BGP Layer 2 VPN (L2VPN) is also referred to as the Kompella-draft. It can be used to
provide for connectivity between dissimilar media. The L2VPN connections are always point-
to-point. L2VPN connections are signaled by the PE routers using MP-BGP.The fact that PE
routers use BGP to signal VPN membership is a quality often described as auto-discovery.
Similar mechanics used in MPLS L3VPNs (route-target, route-distinguisher, vrf) are used for
L2VPN as well.
56
57 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Defined in RFC 4761, VPLS connections are signaled using MP-BGP. VPLS uses the same
address family as an L2VPN. This allows for auto-discovery of PE VPN membership. Similar
mechanics used in MPLS L3VPNs (route-target, route-distinguisher, vrf) are used for BGP
signaled VPLS as well.
There are two key differences between a VPLS and an L2VPN. The first is that a VPLS is an
Ethernet-only VPN and an L2VPN is not. The second is that a VPLS allows for point-to-
multipoint connections and an L2VPN does not. A VPLS connects CE devices together in a
way a common L2 switch would.
Defined in RFC 4762, the VachKompella VPLS uses LDP to signal connections. As opposed to
the BGP signaled VPLS, an LDP signaled VPLS does not offer any auto-discovery. This means
that each VPN member has to be specified on every PE involved in the VPLS. The LDP
signaled VPLS is configured in a routing-instance. Since BGP is not used to signal the VPLS,
there is no need for a route-distinguisher or a route-target. A unique VPLS ID has to be
defined for each VPLS.
- When LDP is used as a signaling protocol, make sure that the loopback interface is
configured in the [protocols ldp] stanza
- some encapsulations (vlan-ccc, vlan-vpls) only work for a certain vlan-range
- the forwarding behavior is configured on the interfaces. Be sure to specify the proper
encapsulation on the physical interface level as well as on the logical unit level. JNCIE-SP workbook: Chapter 6: Layer 2 VPN
- BGP signaled L2VPNs and both flavors of VPLS require a routing-instance
- route-reflectors will only reflect the routes that it can resolve
- IP-address-based route-distinguisher values can save time during configuration and
troubleshooting
57
58 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
58
59 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
59
60 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
61
62 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
62
63 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
PE routers work as converters for signaling multicast state between PIM and MP-BGP in both
directions. When the source starts broadcasting to a multicast group, it sends PIM register
messages to the RP (often, this role is performed by a PE router). This PE then announces the
active source, using a Type 5 MVPN NLRI, to all other PEs. PIM register messages on remote
PEs are converted to Type 7 NLRIs and sent towards the PE with an active source. After
building the multicast forwarding tree, multicast traffic will start to flow from the source to
the receivers.
• Make sure that MP-BGP sessions support and negotiate the additional MVPN address
family.
• Don’t forget to enable PIM on CE-facing interfaces within the L3VPN routing-instance
and specify the customer RP address when using PIM sparse-mode.
• Make sure that multiple operations (MPLS pop, RPF check etc.) can be performed on
egress packets. This can be achieved by activating the “vrf-table-label” VPN option.
• Pay attention to the task requirements for MVPN sites (sender/receiver only)
because by default, a site is enabled as a sender and a receiver site.
63
64 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 1:
64
65 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Lab introduction:
The R6 router is functioning as a multicast source in this lab. No multicast configuration has
to be performed on this router in any of the tasks. At the end of each task, you can verify the
lab by having the R6 router send multicast traffic to the multicast group address 239.0.0.1.
R1 and R5 are configured to send join messages for group 239.0.0.1. Additionally, they will
also reply to multicast traffic, making it easy for you to test your configuration.
At the end of each task, you can verify the configuration by sending a multicast ping from R6
to the multicast addresses that R1 and R5 are willing to join. To verify the configuration
tasks, you can issue the following command on the R6 router:
All routers are using the ge-0/0/0 interface as their out-of-band management interface.
Treat these interfaces as though they are the management, or fxp0 interfaces, of the routers
in the lab.
The lab exercises may require configuration on any of the routers except for R6.
65
66 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
66
67 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 2:
68
69 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Introduction:
In today’s SP environment, numerous applications are using the same packet switched
network. These applications and/or protocols are very different in nature and they have to
share a common SP IP/MPLS infrastructure.
Applications can be very severely impacted by packet loss, delay and/or jitter. Because of
this, QoS can be very important to an SP. A set of QoS mechanisms can be used to give
preferential treatment to sensitive applications and/or protocols. To be able to use the
different QoS mechanisms on Juniper devices, we use the class of service configuration.
The first CoS processing task that is performed on every router in the network is input traffic
classification. By distributing packets in different virtual containers called Forwarding Classes
(FC), we define the order in which packets leave the router at a later stage. Packet
classification is performed by means of a BA classifier or multi-field (MF) classifier which is
applied on an input interface. A BA classifier examines the headers of incoming packet and
defines the Forwarding Class of a packet. This can be based on the value of any of the
following fields: DSCP, EXP, IP Precedence and 802.1p. You can also define one more locally
significant parameter called Packet Loss Priority (PLP) for a packet. There are 4 possible
values: high, medium-high, medium-low and low. PLP only comes into play during times of
congestion. The PLP defines which packets will be dropped first – these are packets with high
PLP and so on.
By default, a BA classifier called ipprec-compatibility, is applied to every logical interface
configured. This can be changed by configuring another BA classifier. MF classifiers can use
numerous firewall filter parameters as match criteria. These MF classifiers are commonly
used on edge devices or on customer-facing interfaces. They can also perform the
assignment of packets into different Forwarding Classes and they can also set PLP values. MF
69
70 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Before transit traffic is sent through the fabric, it can be subjected to class-based forwarding.
This mechanism changes the way in which the outgoing interface is identified. Instead of a
traditional destination IP lookup, the router uses class-to-next-hop mappings to forward
traffic destined to a configured prefix. By using this approach, you can push traffic across a
more "reliable" and "faster" path.
Schedulers define how outgoing interface queues will be serviced. Every physical interface
has 4 or 8 hardware queues that are mapped to forwarding classes. Every scheduler has a
priority, interface bandwidth and buffer size configured. Each queue is serviced on a round-
robin basis (from the highest priority to the lowest) according to its configured weight. That
means that every Forwarding Class has a guaranteed rate (CIR) while unallocated bandwidth
can be shared equally between other queues. You can also reference drop profiles in the
JUNOS scheduler configuration, which can be used to enable the TCP congestion avoidance
mechanism called WRED.
As packets leave the interface of the device, the rewrite rule is the last mechanism applied
during CoS processing. The rewrite rule can be used to set/ change different CoS field values
according to the packet’s forwarding class and PLP. By default, only an MPLS EXP rewrite-
rule is applied to MPLS-enabled interfaces while logical IP interfaces don’t have any.
70
71 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
71
72 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
72
73 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 8.3: Policing
• Configure a single-rate soft policer on R3 and invoke it twice in the firewall filter that
is already applied to interface ge-0/0/4.13.
• Use the lowest bandwidth-limit and burst size possible. Make sure that this is a total
limit for both gold and silver classes.
• Out-of-profile traffic should be mapped to the “best-effort” forwarding class.
73
74 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
74
75 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
VPLS-2 BGP
VPNA-S1 AS 1516 BGP
AS?
VPNC-S1 VPNA-H
BGP U1 U2
GE-0/0/4.532
GE
AS 3456
GE C2
GE-0/0/4.601
GE-0/0/4.602
-0/
-0/
GE
2
0/4
0/4
. 52
.46
-0/
0
.6
0 23
0/4
P1
0/4
/4.
03
0/0
-0/
GE
.45
-0/0 -
GE
E
/4.4
G
0 0
VPNB-1
GE-0/0/4.200 SRX1 GE-0/0/4.13 SRX3 GE-0/0/4.37 SRX7
GE
OSPF Area 0 -0/
GE 0 /5. IS-IS L1 GE-0/0/4.822
G -0/
E- 0/4 .57 78
0/ 0/4
.35 -0/
GE-0/0/4.67
0/
GE
GE-0/0/2
GE-0/0/1
4.
14 IS-IS L2 SRX8
RIP RIP SRX5
5 GE
23 4.4 -0/
4. /0/ 0/4 68 GE-0/0/4.220
0/ -0 .56 4.
-0/ GE / 0/
E -0
G GE
GE
C1
SRX2 GE-0/0/4.24 SRX4 GE-0/0/4.46 SRX6
-0/
GE-0/0/4.200
0/4
BGP
.53
GE
GE 69
GE-0/0/4.604
GE-0/0/4.320
GE-0/0/4.310
-0/
2
AS 65020
/4.
2
2
-0/ 0/4
.5
0 0/0 .54
E-
/3
/4.
E-
/0
2
0/
49
0
0/
G
E-
4.
G
RR
83
VPLS-1
3
BGP
AS 43.356
75
76 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
AS 5678
VPLS-2 BGP
VPNA-S1 AS 1516 BGP
AS?
VPNC-S1 VPNA-H IPv4
BGP .2 U1 U2
.1
19
AS 3456
VLAN 532
.2 .2
2.1
C2
IPv4
192.168.61.0/30
192.168.62.0/30
68
.1 17 .2
17
2.1
.63
IPv6 6.4
2.1
2
52
6 0
.0
.0/ 3
P1 .0/
6
/30
30
AN
.45
30
172 6.2
. 0/
VL
.1 .16 .1
.40 72
30
.0/3 .1 .1 .1 1
0 .2
.2 .1
.2
.1 172.30.0.0/29 .2 .25 172.30.0.24/30 .26 VPNB-1
SRX1 SRX3 SRX7
.1 .9 /30
.29 .46 17 2.0 .2
.9 .14 OSPF Area 0 2 .30 6 8.8
17 0 .1. IS-IS L1 2 .1
/3 .2 8 19
17 .21 2.3 .44 /30
2. 0.0 0.0
30 .28 .45 2.3
172.30.0.20/30
.30 .1
172.30.80.0/24
/30 17
172.30.1.0/30
.0 .10
. 8/
3 0 IS-IS L2 SRX8
RIP RIP SRX5 17
.6 2.1
30 17 .1 6. 2
2/ /30 2.3 20
.0
.1 .32 .34 .41 0 .0. 30 .0/
30 0 .0 40 . 4/ 30
. .22 2.3 /30 .1 .1
.13 72 17 30
1 .5 2.
.10 17 .2
.33 .42
.2 .17 .18 VL C1
SRX2 SRX4 SRX6
172.30.0.16/30 .37 172.30.0.36/30 .38 IPv4
AN
0 .53
53
.1 .49 17
2.3 5 2/3 .1 .1 BGP
2
.1 0.0 .0. VL
192.168.64.0/30
172.16.232.0/30
172.16.231.0/30
fd17:172:16:232::/64
AS 65020
fd17:172:16:231::/64
0 AN
.48 2.3
2
52
/30 17 54
19
2
N
2.
A
VL
16
8.
.50 RR .54
83
.0
VPLS-1
/3
0
.2 .2 .2
.2
IPv4
VPNC-S2 VPNA-S2 VPNB-2 IPv6 U3
lo0.0
172.30.30.6/32 BGP
::172.30.30.6/128
AS 43.356
76
77 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
77
78 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Lab introduction:
Load the initial configuration on all devices using the files provided with this INETZERO
workbook. You are allowed to perform configuration changes only on devices SRX1 to SRX8
and the RR. To verify the results of your work, you can use operational commands on the VR
device.
You can use username lab with password lab123 to access all the devices. Please, do not
change the password for users lab and root!
To load the initial configuration on all the devices, issue the ‘load override terminal’
command
[edit]
lab@srx1# load override terminal
[Type ^D at a new line to end input]
78
79 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
79
80 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 1.8: Advanced RE protection
• On all routers that use BGP, modify the firewall filter from task 1.6 so that all
configured BGP peers (including the one from the routing-instances) are
automatically put in the compiled firewall filter.
JNCIE-SP workbook: Full day lab challenge
80
81 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 2: IGP
Task 2.1: Troubleshooting
• Make sure that all OSPF and IS-IS adjacencies are established according to the
diagram.
• All OSPF routers should be represented with their 172.30.30.x IP address in the
neighbor table. You are not allowed to use the ‘router-id’ command.
• Ensure that SRX3 never sends Type 2 LSAs.
81
82 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
No static routes are allowed if not explicitly permitted by the particular task.
82
83 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 3: MPLS
Task 3.1: MPLS and RSVP configuration
• Enable the MPLS and RSVP protocols on the routers that are part of the OSPF
domain.
• Ensure that a syslog message is generated when an LSP state is changed.
• Configure traffic-engineering information exchange for all OSPF links. Make sure that
traffic-engineering information is not exchanged between ISIS routers.
• Configure the interface between SRX2 and SRX3 to allow only half of the bandwidth
to be reserved for RSVP.
• Configure link coloring the way that it is shown in the topology below.
red
(1) (1)
red
gr
)
(1
(2)
ee
e
blue (2)
n
blu
re
(3
)
SRX5
)
(4) gre
gr
(2
ee
en
low
ue
l (3)
n
ye blu
bl
(3
e(
)
2)
SRX2 SRX4 SRX6
yellow (4) blue (2)
Task 3.2: LSPs between SRX2 and SRX7
• Configure an LSP from SRX2 to SRX7. This LSP should pass through SRX4 and SRX5.
• You are not allowed to use explicit path or coloring.
• Configure an LSP from SRX7 to SRX2 with a primary path that only crosses red links.
Configure a secondary path for this LSP that only crosses blue links. Both paths
should have a bandwidth reservation of 400m. The secondary path should be pre-
JNCIE-SP workbook: Full day lab challenge
signaled and ready for use.
83
84 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 3.5: LSPs between SRX6 to SRX3
• Configure two distinct LSPs from SRX6 to SRX3.
• One LSP named srx6-to-srx3-1 should egress to 172.30.30.3 where another LSP
named srx6-to-srx3-2 should egress to 3.3.3.3.
Task 3.6: LDP configuration
• Configure LDP for the links in the ISIS domain.
• Make sure that SRX8 can send and receive MPLS packets to and from SRX1 and SRX2
in a redundant way through SRX6 and SRX7.
• You can configure additional RSVP LSPs if needed.
Task 3.7: LSP forwarding based on CoS
• Make sure that on SRX7, traffic to RIP prefixes marked with expedited-forwarding
bits will use the LSP to SRX1.
• Traffic to RIP prefixes marked with best-effort bits should use the LSP to SRX2.
• You can configure additional RSVP LSPs if needed.
84
85 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 4: BGP
Task 4.1: iBGP configuration
• Configure iBGP sessions between the RR device and the SRX routers. Use AS 5678
and, on the RR, create two clusters with no more than 4 clients.
• Failure of any physical interface should not cause for any iBGP session loss. Configure
BFD monitoring of all iBGP connections with 900ms between the keepalives. If 4
keepalives are lost, the neighbor should be declared down.
• Ensure that all iBGP sessions state changes are logged to syslog.
• Use SRX4 and SRX5 as the only routers where internal routes are advertised to BGP.
Advertise a single summarized route 172.30/16 for all internal routes. Advertise all
RIP routes without summarization.
85
86 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
87 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 5: VPN
Task 5.1: VPN Infrastructure
• To resolve the hidden iBGP routes on the RR, do not use rib-groups, static routes or
any solution that requires enabling family mpls on the RR interfaces.
Task 5.3: BGP-based L3VPN
• Configure VPN-B between SRX2 and SRX8.
• Use eBGP as a PE-CE routing protocol, the CE devices are configured with AS64512.
• Route-distinguisher and route-target values can be any of your choice.
• Make sure that all Upstream, Partner and Customer routes are reachable in VPN-B
and the other way around. Designate SRX8 as a point where route leaking is done.
• Make sure that leaked routes are only available in the RIB of the VPN-B VRF. This will
allow th CE attached to SRX8 to have all routes received in BGP without putting an
additional load on the forwarding engine of the SRX.
• You can use single static route to provide routing in the forwarding engine. Advertise
that static to the CE attached behind SRX2. JNCIE-SP workbook: Full day lab challenge
Task 5.4: L2circuit VPN configuration
• Configure a Martini-based L2VPN VPN-C between SRX2 and SRX7.
• Create a new bi-directional CSFP LSP. Make sure it crosses routers SRX4 and SRX5.
• Ensure that VPN-C is using that particular LSP for transport through MPLS network.
• Vlan numbers must match logical interface numbers.
87
88 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 5.5: BGP VPLS configuration
• Configure site 1 of the VPLS behind SRX6 and SRX7. Make sure VLAN numbers match
the logical interface numbers.
• Make sure that SRX6 is a designated forwarder for this site and SRX7 is the backup PE
router in case there is a failure on SRX6.
• The logical interface connecting SRX6 to the CE was mistakenly placed in VLAN 542.
Make sure that traffic in the VPLS is transported with VLAN 532.
• Configure site 2 of the VPLS behind SRX1. Make sure Vlan numbers match the logical
interface numbers.
• Prepare the VPLS configuration to expand with 2 more sites without changing the
configuration for the existing sites.
• Setup RSVP LSPs where appropriate.
Task 5.6: VPLS transport
• To conserve bandwidth, make sure that for ingress replication over the VPLS, ingress
PEs are sending only one packet for each broadcast, unknown or multicast frame.
Replication should be done downstream to the egress.
88
89 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
89
90 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set system host-name R1
set system login class supervisor permissions all
set system login class supervisor deny-commands “start shell”
set system login user inetzero class supervisor authentication
plain-text-password
R2:
set system host-name R2
set system login class supervisor permissions all
set system login class supervisor deny-commands “start shell”
set system login user inetzero class supervisor authentication
plain-text-password
Verification:
login: inetzero
Password:
inetzero@R1>start shell
^
syntax error, expecting <command>.
inetzero@R1>configure
Entering configuration mode
[edit]
inetzero@R1#
90
91 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-0/0/1 gigether-options 802.3ad ae0
set interfaces ge-0/0/2 gigether-options 802.3ad ae0
set interfaces ae0 unit 0 family inet address 10.1.12.1/24
R2:
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-0/0/1 gigether-options 802.3ad ae0
set interfaces ge-0/0/2 gigether-options 802.3ad ae0
set interfaces ae0 unit 0 family inet address 10.1.12.2/24
Verification:
92 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set interfaces ae0 aggregated-ether-options lacp active
set interfaces ae0 aggregated-ether-options minimum-links 2
set interfaces ae0 aggregated-ether-options lacp periodic slow
R2:
set interfaces ae0 aggregated-ether-options lacp passive
set interfaces ae0 aggregated-ether-options minimum-links 2
92
93 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
If we wanted to make the R1 router send lacp messages every 30 seconds, we would have to
configure the R2 router with ‘lacp periodic slow’ as well.
93
94 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
94
95 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
set system ntp server 10.10.1.100 key 1 version 3 prefer
set system ntp authentication-key 1 type md5 value workbook
set system ntp boot-server 10.10.1.100
set system ntp trusted-key 1
Verification:
==============================================================================
==============================================================================
95
96 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
set system archival configuration transfer-interval 15
set system archival configuration archive-sites
ftp://lab:[email protected]
96
97 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
delete system syslog
set system syslog host 10.10.1.100 any any
set system syslog file error-messages any error
set system syslog file error-messages archive size 1M files 20
world-readable
set system syslog file error-messages explicit-priority
set system syslog user * any critical
Verification:
user * {
any critical;
}
host 10.10.1.100 {
any any;
}
file error-messages {
any error;
archive size 1m files 20 world-readable;
explicit-priority;
}
97
98 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set routing-options static route 2.2.2.2 next-hop 10.1.12.2
set interfaces ae0 mtu 9192
R2:
set routing-options static route 1.1.1.1 next-hop 10.1.12.1
set interfaces ae0 mtu 9192
Verification:
98
99 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set snmp community inetzero clients 10.10.1.100/32
set snmp community inetzero authorization read-write
R2:
set snmp trap-group tg version v2
set snmp trap-group tg categories chassis link authentication
set snmp trap-group tg targets 10.10.1.100
99
100 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set firewall family inet filter re-protect term 1 from protocol tcp
set firewall family inet filter re-protect term 1 from port [ftp
ftp-data]
set firewall family inet filter re-protect term 1 then accept
set firewall family inet filter re-protect term 2 from protocol udp
set firewall family inet filter re-protect term 2 from port [ntp
snmp]
set firewall family inet filter re-protect term 2 then accept
set firewall family inet filter re-protect term 4 from protocol icmp
set firewall family inet filter re-protect term 4 from icmp-type
[echo-request echo-reply]
set firewall family inet filter re-protect term 4 then accept
set firewall family inet filter re-protect term 5 then count dropped
discard
10
0
101 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
set firewall family inet filter re-protect term 1 from protocol tcp
set firewall family inet filter re-protect term 1 from port [ftp
ftp-data]
set firewall family inet filter re-protect term 1 then accept
set firewall family inet filter re-protect term 2 from protocol udp
set firewall family inet filter re-protect term 2 from port [ntp
snmptrap]
set firewall family inet filter re-protect term 2 then accept
set firewall family inet filter re-protect term 4 from protocol icmp
set firewall family inet filter re-protect term 4 from icmp-type
[echo-request echo-reply]
set firewall family inet filter re-protect term 4 then accept
set firewall family inet filter re-protect term 5 then count dropped
discard
==============================================================================
Filter: __default_bpdu_filter__
Filter: re-protect
Counters:
Name Bytes Packets
dropped 6739 78
10
2
103 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
set protocols bgp group ibgp type internal
set protocols bgp group ibgp bfd-liveness-detection minimum-interval
100
set protocols bgp group ibgp neighbor 2.2.2.2 local-address 1.1.1.1
set routing-options autonomous-system 65000
set firewall family inet filter re-protect term 6 from protocol udp
set firewall family inet filter re-protect term 6 from destination-
port 4784
set firewall family inet filter re-protect term 6 then accept
insert firewall family inet filter re-protect term 6 before term end
set firewall family inet filter re-protect term end then log
set firewall family inet filter re-protect term end then syslog
R2:
set protocols bgp group ibgp type internal
set protocols bgp group ibgp bfd-liveness-detection minimum-interval
100
set protocols bgp group ibgp neighbor 1.1.1.1 local-address 2.2.2.2
set routing-options autonomous-system 65000
set firewall family inet filter re-protect term end then log
set firewall family inet filter re-protect term end then syslog
10
5
106 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R1> show configuration policy-options prefix-list self | display inheritance
##
## apply-path was expanded to:
## 10.10.1.0/24;
## 10.1.12.0/24;
## 1.1.1.1/32;
##
apply-path "interfaces <*> unit <*> family inet address <*>";
1 sessions, 1 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
10
6
107 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
10
7
108 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
R5:
R6:
R7:
10
8
109 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Breakdown:
There are many possible reasons for IS-IS neighbor adjacency formation to fail. Here is the
full list of all of them together with the way to discover them during the real lab exam:
Reason 1:
Absence of IS-IS PDUs processing on the interface .
The logical interface which is pointing to IS-IS neighbor should be explicitly allowed to
receive/transmit IS-IS packets. Technically, it should have “family iso” configured within its
definition.
How to discover:
Run the “show isis interface” command and compare the list of logical interfaces enabled
for IS-IS processing in its output with the list of the logical interfaces from the network
diagram. Correct the logical interface configuration with the command mentioned earlier.
Reason 2:
IS-IS interface type mismatch.
• Point-to-point
• Level 1 broadcast
• Level 2 broadcast
By default, when enabling IS-IS on multi-access interfaces (such as Ethernet) routers will use
the broadcast IS-IS interface type and generate the appropriate L1 or L2 broadcast hello
The rule is that for IS-IS adjacency to be established successfully, both ends should have the
same IS-IS interface type (broadcast or point-to-point)
How to discover:
Run “show isis interface” command on both ends and check whether the interfaces on both
ends do have the same type. Correct logical interface configuration where applicable.
10
9
110 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Example:
OR
Reason 3:
Interface MTU issue.
Each IS-IS interface in the system must support an MTU of at least 1492 bytes. There is a
mechanism called “IS-IS hello padding”. When generating hello packet IS-IS router pads it to
this value. If there is no support for this MTU value on the remote side, the adjacency is not
formed.
How to discover:
Run the “show interfaces x.y | match iso” command to verify the value of MTU supported by JNCIE-SP workbook: Appendix: Chapter 2 - IGP
ISO address family. For MTUs lower than 1492 bytes, make the proper configuration
adjustments using the command:
OR
change it back to default value (which is calculated automatically) by removing mtu stanza
from interface configuration within ISO address family
Reason 4:
Adjacent routers are configured with different values of area IDs 11
0
(Level-1 routers only)
111 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
In IS-IS, level-1 routers determine that the neighbor is in the same L1 area by comparing
values called “area ID”. L1 adjacencies can establish only between routers that have the
same area ID configured. L2 adjacencies form independently of the area ID value.
Each router in IS-IS should have at least one special address in the configuration called the
NET address. Usually, the NET address is assigned to the loopback interface. The address
consists of several parts: Authority and Format Identifier (AFI), a domain ID(optional), an
area ID, a system identifier and a selector. For example, the NET
address 49.0001.1921.6800.1001.00 can be divided into the following parts:
§ 49—AFI
§ 0001—Area ID
§ 1921.6800.1001—System Identifier (System ID)
§ 00—Selector
Example:
R1 has the 49.0001.1921.6800.1001.00 NET address configured
R2 has the 49.0002.1921.6800.1002.00 NET address configured
Result:
How to discover:
When there is an area ID mismatch, you will see something similar to the following output: JNCIE-SP workbook: Appendix: Chapter 2 - IGP
where x.y is the logical interface behind which another IS-IS router is found.
Reason 5:
Duplicate System IDs in the NET addresses.
According to the protocol rules, the System Identifier (System ID) MUST BE UNIQUE in the IS-
IS network. Commonly, the NET address (which contains Sys ID) is assigned to the most 11
1
stable system interface: logical loopback interface.
112 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Example:
Result:
How to discover:
In case of a duplicate System ID, you will see something similar to the following output:
ERROR: ISIS ignored a bad packet: IIH with duplicate sysid on interface x.y
where x.y is the logical interface behind which another IS-IS router is found.
11
2
113 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Reason 6:
Absence of NET address in the configuration of IS.
Every router in an IS-IS network must have at least one NET address configured. Routers that
participate in multiple areas can have multiple NET addresses.
Example:
How to discover:
When the local router does not have any NET address configured, you will see something
similar to the following output:
11
3
114 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Reason 7:
IP addresses from different subnets on both ends of connection
Example:
In case of an IP-addresses mismatch, you will see something similar to the following output:
where x.y is the logical interface behind which another IS-IS router is found.
JNCIE-SP workbook: Appendix: Chapter 2 - IGP
11
4
115 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Reason 8:
Hello packets authentication parameters mismatch
IS-IS hello packets can be authenticated by their originators. There are 3 possible options:
• No authentication
• Clear text authentication
• MD5-based authentication
For the adjacency to be established, both routers should have the same authentication
type/password configured.
Example:
R1 has IS-IS hello authentication configured on the interface pointing to R2.
R2 does not have IS-IS hello authentication configured on the interface pointing to R1.
OR
R1 and R2 have a different IS-IS hello authentication type and/or password configured on
the interface pointing towards each other.
Result:
How to discover:
That means that appropriate hello authentication parameters should be enabled on the
remote neighbor configuration.
11
5
116 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
In case of authentication type mismatch and/or different passwords on both ends, you will
see something similar to the following output:
where x.y is the logical interface behind which another IS-IS router is found.
11
6
117 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Reason 9:
Wrong logical interface put into the IS-IS configuration
Example:
R1 has the ge-0/0/1.0 interface pointing to R2 which is configured for ISO processing (family
iso enabled for it) but a different logical interface is reference in the IS-IS configuration
stanza.
Conclusion:
All other possible reason can be identified by enabling traceoptions for IS-IS. Set the “error”
flag and analyze the content of the created trace file in real-time (using “monitor start
filename”) or offline (with the “show log filename” command).
11
7
118 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
11
8
119 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
11
9
120 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
To verify that we have routes to all other loopback addresses and subnets between the
routers, we can issue the following command:
Configuration:
R3 and R4:
Verification:
Make sure you still have 2 OSPF adjacencies between R3 and R4 after altering the
configuration:
12
1
122 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
Verification:
lab@R1# run show ospf neighbor extensive
12
2
123 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R3:
R2 and R4:
Verification:
R1:
12
3
124 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R3:
R2 and R4:
Verification:
lab@R1# run show ospf interface ge-0/0/4.13 extensive | match Hello
12
4
125 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3 and R4:
Verification:
Detect Transmit
Address State Interface Time Interval Multiplier
10.1.34.4 Up ge-0/0/1.0 2.000 0.400 5
1 sessions, 1 clients
Cumulative transmit rate 2.5 pps, cumulative receive rate 2.5 pps
12
5
126 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
Verification:
12
6
127 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3 and R4:
Verification:
Before commit:
12
7
128 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3 and R4:
Verification:
Before applying the configuration:
After commit:
12
8
129 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
On all routers:
R1:
R2:
R3:
Verification:
130 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Instance: master
Router ID: 1.1.1.1
Route table index: 0
LSA refresh time: 50 minutes
Database protection state: Normal
Warning threshold: 80 percent, Warning only
Non self-generated LSAs: Current 5, Warning 400, Allowed 500
Ignore time: 300, Reset time: 600
Ignore count: Current 0, Allowed 5
Area: 0.0.0.0
Stub type: Not Stub
Authentication Type: None
Area border routers: 0, AS boundary routers: 0
Neighbors
Up (in full state): 1
Topology: default (ID 0)
Prefix export count: 0
Full SPF runs: 25
SPF delay: 0.200000 sec, SPF holddown: 5 sec, SPF rapid runs: 3
Backup SPF: Not Needed
13
0
131 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
13
1
132 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
Verification:
13
3
134 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
13
4
135 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Configuration:
R1:
R2:
R3:
R4:
Verification:
13
7
138 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
R4:
Verification:
lab@R3# run show route protocol ospf 172.16.4.0/22
inet.0: 23 destinations, 23 routes (23 active, 0 holddown, 0 hidden) JNCIE-SP workbook: Appendix: Chapter 2 - IGP
+ = Active Route, - = Last Active, * = Both
13
9
140 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
14
0
141 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
14
2
143 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
14
3
144 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
14
4
145 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
Verification:
ge-0/0/2.0
Index: 71, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 5 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
2 1 64 10 9.000 27 R4.03 (not us)
ge-0/0/4.13
Index: 72, State: 0x6, Circuit id: 0x1, Circuit type: 1
LSP interval: 1000 ms, CSNP interval: 5 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 9.000 27
14
5
146 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
ge-0/0/2.0
Index: 71, State: 0x6, Circuit id: 0x3, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 5 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
2 1 64 10 3.000 9 R4.03 (us)
ge-0/0/4.24
Index: 72, State: 0x6, Circuit id: 0x1, Circuit type: 1
LSP interval: 1000 ms, CSNP interval: 5 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 9.000 27
14
6
147 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
R3 and R4:
Verification:
lab@R1# run show route protocol isis
inet.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
inet6.0: 11 destinations, 11 routes (11 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
14
8
149 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
14
9
150 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 2.19
• Configure the IS-IS and OSPFv3 baseline according to the diagram.
Configuration:
R1:
R5:
Verification:
15
1
152 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 2.20
• Configure 4 static IPv6 routes on R1 according to the diagram.
Use “reject” keyword as a next-hop value.
• Redistribute these routes to IS-IS.
Configuration:
R1:
15
2
153 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 2.21
• Enable redistribution between OSPFv3 and IS-IS on R3 and R5.
• Make sure you have full IP reachability between all existing prefixes.
• Make sure that there are no routing loops and that there is no suboptimal routing.
Configuration:
R3 and R5:
1 2001:db8:0:19::2 (2001:db8:0:19::2) 9.990 ms 3.696 ms 4.775 ms JNCIE-SP workbook: Appendix: Chapter 2 - IGP
2 2001:db8:0:18::4 (2001:db8:0:18::4) 8.211 ms 8.387 ms 7.661 ms
3 2001:db8:0:22::3 (2001:db8:0:22::3) 7.506 ms 7.619 ms 8.077 ms
4 2001:db8:0:d::1 (2001:db8:0:d::1) 8.149 ms !A 2.576 ms !A 7.983 ms !A
We see suboptimal routing to the prefix originated at R1. The path that the packets take is
R5->R2->R4->R3->R1. Instead of going directly over to R1, packets take a longer path due to
a better external preference of OSPFv3 (150) in comparison to IS-IS L2 external preference
(165).
To resolve this, IS-IS L2 external preference should be “better” than OSPFv3 one. This can be
achieved in 2 ways: by increasing the OSPFv3 external preference or by decreasing the IS-IS
L2 external perference on both R3 and R5.
15
4
155 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 2.22
• Enable OSPFv3 authentication between R3 and R4.
• Use protocol esp, spi 256, the hmac-sha1-96 algorithm and key ' inetzero-jncie-inet0'
Configuration:
R3 and R4:
Verification:
15
5
156 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 1. RSVP
Initial configurations: OSPFv2-baseline
15
6
157 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
R3:
R4:
R5:
Verification:
The ‘show mpls interface’ command will display an interface when the MPLS address family
is configured for that interface AND when the interface is configured under the [ protocols
mpls ] stanza.
lab@R1>show mpls interface
Interface State Administrative groups (x: extended)
ge-0/0/4.13 Up <none>
15
9
160 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
R3:
R4:
16
0
161 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R5# run show rsvp interface ge-0/0/4.35 extensive
ge-0/0/4.35 Index 70, State Ena/Up
Authentication, NoAggregate, NoReliable, NoLinkProtection
HelloInterval 9(second)
Address 10.1.35.5
[…skipped…]
[…skipped…]
[…skipped…]
The “reliable” statement enables RSVP message ID as well as reliable message delivery:
16
1
162 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Red
ActivePath: (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
Bandwidth: 1000kbps
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Blue
ActivePath: (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
Bandwidth: 2Mbps
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.13.3 10.1.43.4 10.1.24.2
Total 2 displayed, Up 2, Down 0
16
2
163 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
16
3
164 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
Verification:
When a path has a ‘loose’ ERO, the route towards the router IP specified does not need to
be a direct path and can include other intermediate routers as well. When a path has a
‘strict’ ERO, the route from the previous router to the router IP specified must be a direct
path. Strict ERO is the default.
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Blue
16
4
165 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Red
ActivePath: Red-Primary (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary Red-Primary State: Up
Priorities: 7 0
Bandwidth: 1000kbps
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.13.3 10.1.34.4 10.1.24.2
Total 2 displayed, Up 2, Down 0
Another thing worth mentioning is that with either ‘strict’ or ‘loose’ ERO, you are allowed to
configure an interface address or a loopback address. This is can make things easier and it
can save time.
16
5
166 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
16
6
167 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
16
7
168 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R2# runshow mpls lsp ingress brief
Ingress LSP: 2 sessions
To From State Rt P ActivePath LSPname
1.1.1.1 2.2.2.2 Up 0 * Green
1.1.1.1 2.2.2.2 Up 0 * Orange
Total 2 displayed, Up 2, Down 0
1.1.1.1
From: 2.2.2.2, LSPstate: Up, ActiveRoute: 0
LSPname: Orange, LSPpath: Primary
LSPtype: Static Configured
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 299968
Resv style: 1 FF, Label in: -, Label out: 299968
Time left: -, Since: Fri Jul 19 10:26:15 2013
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 2 receiver 18972 protocol 0
PATH rcvfrom: localclient
Adspec: sent MTU 1500
Path MTU: received 1500
16
8
169 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Brown
ActivePath: Brown-Primary (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary Brown-Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
16
9
170 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.13.3 10.1.34.4 10.1.24.2
3 Jul 19 11:31:09.957 Record Route: 10.1.13.3 10.1.34.4 10.1.24.2
2 Jul 19 11:31:09.956 Up
1 Jul 19 11:31:09.724 Originate Call
Created: Fri Jul 19 11:30:41 2013
Retrytimer: 10
Retrylimit: 10
Total 1 displayed, Up 1, Down 0
17
1
172 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Before applying configuration in LSP section:
After:
17
2
173 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R1:
Verification:
Let’s disable R3 ge-0/0/4.35 interface to break the primary path and let the secondary path
become active:
R3:
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Brown
ActivePath: Brown-Secondary (secondary)
[…skipped…]
Now LSP Brown uses the following ERO: 10.1.13.3 10.1.34.4 10.1.24.2
Let’s make some temporary changes to let the optimization algorithm choose the lower path
(going through ge-0/0/2 interface of R3) for the LSP:
R1:
R3:
Soon after the changes, we can see the effect of the reoptimization by issuing the following
command:
[…skipped…]
17
5
176 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R3:
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Red
ActivePath: Red-Primary (primary)
Link protection desired
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary Red-Primary State: Up
Priorities: 7 0
Bandwidth: 1000kbps
SmartOptimizeTimer: 180
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Blue
ActivePath: Blue-Primary (primary)
Link protection desired
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary Blue-Primary State: Up
Priorities: 7 0
Bandwidth: 2Mbps
SmartOptimizeTimer: 180 17
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt 6
20=Node-ID):
177 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
4.4.4.4
From: 3.3.3.3, LSPstate: Up, ActiveRoute: 0
LSPname: Bypass->10.1.43.4
LSPtype: Static Configured
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 299888
Resv style: 1 SE, Label in: -, Label out: 299888
Time left: -, Since: Mon Jul 22 12:03:31 2013
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 57949 protocol 0
Type: Bypass LSP
Number of data route tunnel through: 1
Number of RSVP session tunnel through: 0
PATH rcvfrom: localclient
Adspec: sent MTU 1500
Path MTU: received 1500
PATH sentto: 10.1.35.5 (ge-0/0/4.35) 6 pkts
RESV rcvfrom: 10.1.35.5 (ge-0/0/4.35) 6 pkts
Explct route: 10.1.35.5 10.1.45.4
Record route: <self> 10.1.35.5 10.1.45.4
4.4.4.4
From: 3.3.3.3, LSPstate: Up, ActiveRoute: 0
LSPname: Bypass->10.1.34.4
LSPtype: Static Configured
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 3
Resv style: 1 SE, Label in: -, Label out: 3
Time left: -, Since: Mon Jul 22 12:03:35 2013
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 57950 protocol 0
2.2.2.2
From: 1.1.1.1, State: Up, ActiveRoute: 0, LSPname: Brown
ActivePath: Brown-Primary (primary)
Node/Link protection desired
17
LSPtype: Static Configured
7
LoadBalance: Random
178 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
4.4.4.4
From: 3.3.3.3, LSPstate: Up, ActiveRoute: 0
LSPname: Bypass->10.1.35.5->10.1.45.4
LSPtype: Static Configured
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 3
Resv style: 1 SE, Label in: -, Label out: 3
Time left: -, Since: Mon Jul 22 12:10:37 2013
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
17
8
179 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
1.1.1.1
From: 2.2.2.2, State: Up, ActiveRoute: 0, LSPname: Orange
ActivePath: (primary)
FastReroute desired
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.24.4(flag=1) 10.1.43.3 10.1.13.1
16 Jul 22 12:16:19.589 Record Route: 10.1.24.4(flag=1) 10.1.43.3 10.1.13.1
15 Jul 22 12:16:17.596 Make-before-break: Switched to new instance
14 Jul 22 12:16:16.594 Record Route: 10.1.24.4 10.1.43.3 10.1.13.1
13 Jul 22 12:16:16.594 Up
12 Jul 22 12:16:16.356 Originate make-before-break call
1.1.1.1
From: 2.2.2.2, LSPstate: Up, ActiveRoute: 0
LSPname: Orange, LSPpath: Primary
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 299920
Resv style: 1 FF, Label in: 300592, Label out: 299920
Time left: 158, Since: Mon Jul 22 12:32:09 2013
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 50967 protocol 0
FastReroute desired
PATH rcvfrom: 10.1.24.2 (ge-0/0/4.24) 6 pkts
Adspec: received MTU 1500 sent MTU 1500
PATH sentto: 10.1.45.5 (ge-0/0/4.45) 10 pkts
RESV rcvfrom: 10.1.45.5 (ge-0/0/4.45) 8 pkts
17
Explct route: 10.1.45.5 5.5.5.5
9
Record route: 10.1.24.2 <self> 10.1.45.5 10.1.35.3 10.1.13.1
180 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Detour is Up
Detour Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Detour adspec: received MTU 1500 sent MTU 1500
Path MTU: received 1500
Detour PATH sentto: 10.1.34.3 (ge-0/0/1.0) 4 pkts
Detour RESV rcvfrom: 10.1.34.3 (ge-0/0/1.0) 2 pkts
Detour Explct route: 10.1.34.3 10.1.13.1
Detour Record route: 10.1.24.2 <self> 10.1.34.3 10.1.13.1
Detour Label out: 300640
Detour branch from 10.1.45.5, to skip 3.3.3.3, Up
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Adspec: received MTU 1500
Path MTU: received 0
PATH rcvfrom: 10.1.45.5 (ge-0/0/4.45) 8 pkts
Adspec: received MTU 1500
PATH sentto: 10.1.34.3 (ge-0/0/1.0) 0 pkts
RESV rcvfrom: 10.1.34.3 (ge-0/0/1.0) 0 pkts
Explct route: 10.1.34.3 10.1.13.1
Record route: 10.1.24.2 10.1.45.4 10.1.45.5 <self> 10.1.34.3 10.1.13.1
Label in: 300608, Label out: 300640
Total 1 displayed, Up 1, Down 0
18
0
181 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
R3:
R4:
R5:
18
1
182 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R2# run show mpls interface
Interface State Administrative groups (x: extended)
ge-0/0/4.24 Up Green
18
2
183 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
In the case of the ‘AG1’ path, we are only working with one color. Because of this, the
‘include-any’ or ‘include-all’ both would have worked the same in this task. The ‘include-any’
functions as an OR when multiple colors are assigned to the LSP. The ‘include-all’ functions
as an AND when multiple colors are assigned to the LSP.
When using the ‘exclude’ option, you are telling the router to perform an OR on the
configured colors. The ‘exclude’ option will ony exclude links if that link contains one of the
colors that it should exclude. Links without any administrative group assigned to them can
still become part of the LSP path when ‘exclude’ is used .
When both include and exclude options are used, the LSP will perform an AND on these
configuration statements.
1.1.1.1
From: 2.2.2.2, State: Up, ActiveRoute: 0, LSPname: AG1
ActivePath: (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Include Any: Green
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 4)
10.1.24.4 S 10.1.45.5 S 10.1.35.3 S 10.1.13.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.24.4 10.1.45.5 10.1.35.3 10.1.13.1 18
3
6 Jul 22 12:55:46.370 Selected as active path
184 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
1.1.1.1
From: 2.2.2.2, State: Up, ActiveRoute: 0, LSPname: AG2
ActivePath: (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Exclude: Blue Red
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 4)
10.1.24.4 S 10.1.45.5 S 10.1.35.3 S 10.1.13.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.24.4 10.1.45.5 10.1.35.3 10.1.13.1
5 Jul 22 13:02:49.319 Selected as active path
4 Jul 22 13:02:49.318 Record Route: 10.1.24.4 10.1.45.5 10.1.35.3 10.1.13.1
3 Jul 22 13:02:49.318 Up
2 Jul 22 13:02:49.222 Originate Call
1 Jul 22 13:02:49.222 CSPF: computation result accepted 10.1.24.4 10.1.45.5
10.1.35.3 10.1.13.1
Created: Mon Jul 22 13:02:49 2013
Total 1 displayed, Up 1, Down 0
Also keep in mind that when you assign link-colors, the change is not immediately reflected
18
4
185 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
[…skipped…]
1.1.1.1
From: 2.2.2.2, State: Up, ActiveRoute: 0, LSPname: Orange
ActivePath: Orange-Primary (primary)
FastReroute desired
LSPtype: Static Configured
LoadBalance: Random
Autobandwidth
AdjustTimer: 300 secs
Max AvgBW util: 0bps, Bandwidth Adjustment in 296 second(s).
Overflow limit: 0, Overflow sample count: 0
Underflow limit: 0, Underflow sample count: 1, Underflow Max AvgBW: 0bps
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary Orange-Primary State: Up
Priorities: 7 0 18
5
Bandwidth: 112.215kbps
186 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 4)
10.1.24.4 S 10.1.45.5 S 10.1.35.3 S 10.1.13.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.24.4 10.1.45.5 10.1.35.3 10.1.13.1
13 Jul 22 13:28:19.520 Make-before-break: Switched to new instance
12 Jul 22 13:28:18.519 Record Route: 10.1.24.4 10.1.45.5 10.1.35.3 10.1.13.1
11 Jul 22 13:28:18.519 Up
10 Jul 22 13:28:18.518 Automatic Autobw adjustment succeeded: BW changes from 0
bps to 112215 bps
9 Jul 22 13:28:18.417 Originate make-before-break call
18
6
187 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R2# run show mpls lsp ingress name Orange extensive
Ingress LSP: 4 sessions
1.1.1.1
From: 2.2.2.2, State: Up, ActiveRoute: 0, LSPname: Orange
ActivePath: Orange-Primary (primary)
FastReroute desired
LSPtype: Static Configured
LoadBalance: Random
Autobandwidth
AdjustTimer: 300 secs
Max AvgBW util: 0bps, Bandwidth Adjustment in 255 second(s).
Overflow limit: 0, Overflow sample count: 0
Underflow limit: 0, Underflow sample count: 0, Underflow Max AvgBW: 0bps
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary Orange-Primary State: Up, No-decrement-ttl
Priorities: 7 0
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 4)
10.1.24.4 S 10.1.45.5 S 10.1.35.3 S 10.1.13.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.24.4(flag=9) 10.1.45.5(flag=1) 10.1.35.3 10.1.13.1
differences with this way of disabling the TTL is that it affects all LSPs (RSVP and LDP
signaled) and that it has to be configured on every router.
18
8
189 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 2. LDP
Initial configurations: OSPFv2-baseline
18
9
190 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R1:
R3:
R2:
R4:
Verification:
To authenticate the TCP session that LDP neighbors setup, we configured the
‘authentication-key’ under the corresponding LDP session. By enabling ‘strict-targeted-
hellos’, we prevent session-establishtment with neighbors that are not specifically
configured.
lab@R1# run show ldp session
Address State Connection Hold time
3.3.3.3 Operational Open 28
19
1
192 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R3:
R4:
R5:
19
2
193 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Because we configured the LSPs between R3 and R4 to tunnel LDP, we do not need to
explicitly configure an LDP session. This is despite of the fact that we have enabled ‘strict-
targeted-hellos’.
lab@R3# run show mpls lsp ingress detail
Ingress LSP: 1 sessions
4.4.4.4
From: 3.3.3.3, State: Up, ActiveRoute: 0, LSPname: R3-R4
ActivePath: R3-R5-R4 (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary R3-R5-R4 State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.1.35.5 10.1.45.4
Total 1 displayed, Up 1, Down 0
3.3.3.3
From: 4.4.4.4, State: Up, ActiveRoute: 0, LSPname: R4-R3
ActivePath: R4-R5-R3 (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary R4-R5-R3 State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
194 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
19
4
195 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Task 3.19: LDP Policies
• In addition to the loopback interface, have R2 announce prefix 22.22.22.0/24 into
LDP.
• Make sure that only /32 prefixes are installed in the inet.3 table of R1 and R3.
Configure only the R3 router to achieve this.
Configuration:
R2:
R3:
19
5
196 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Under the LDP protocol configuration stanza, you can configure an import policy, an export
policy and an egress policy.
The import and export policy can be used to filter label bindings. The egress policy is what
puts you in control of what it is that LDP should advertise. By configuring an egress policy,
you can advertise additional label bindings that are derived from other interfaces or
protocols.
By default, Juniper devices only advertise a label binding for the loopback IP address
lab@R4>show route table inet.3 22.22.22.0/24 exact
[edit]
19
6
197 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
19
7
198 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
R4:
R5:
19
8
199 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
With asdot notation, all the AS numbers in the 2-byte range of 0-65535 are written in
asplain. Any AS that is above that range is written in asdot+. In asdot+, AS numbers are
represented by two integer values joined by a period character. The first integer represents
the high order 16-bit value in decimal and the second integer represents the low order 16-
bit value in decimal.
In our case, the AS 65555 number exceeds 65535 and converts to AS 1.19. The ‘show bgp
19
9
200 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
20
0
201 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
20
1
202 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
R4:
20
2
203 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
20
3
204 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R4:
20
4
205 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Before adding the “local-as private” option on R4, we can see that the AS configured as
‘local-as’ was added to the AS path:
After adding the “local-as private” option to the configuration on R4, we can see that the AS
is no longer added to the AS path:
After adding the “local-as no-prepend-global-as” configuration command, we can see that
R4 no longer prepends AS 65555. Instead, only the AS 65444 is prepended:
Configuration:
R3:
R5:
20
6
207 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
First we verify the IP connectivity between the 11.11.11.11 and 22.22.22.22 IP addresses:
Before the DDOS starts, the signaling router does not advertise any routing information
towards other routers:
lab@R5# run show route advertising-protocol bgp 4.4.4.4
[edit]
lab@R5#
After discovering an ongoing DDoS attack, we can activate a static route on our signaling
router. Since the objective here is ‘Destination-based’ RTBH, we signal for the attacked
subnet to be redirected to the discard interface on all iBGP routers. We do this by adding
a static route on R5:
20
7
208 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
By blocking all traffic towards the victim IP, we limit can limit the effect of the attack on
the networks of both the customer and the SP. The ‘no-export’ community prevents all
BGP speaking routers in the AS to advertise the subnet to neighboring ASes and the high
local preference makes sure that the route signaled by R5 will win andy election and
become the active.
20
8
209 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R4:
R5:
20
9
210 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
AS path: I
to Reject
AS path: 65565 I
In this case uRPF doesn’t allow packets from the attacker to pass while at the same time
having the customer addresses that are under attack remain available in the ISP network.
This makes it a more appropriate solution when the source address of the attacker is
known.
21
0
211 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
21
1
212 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
R5:
21
2
213 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R6:
R7:
21
3
214 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
21
4
215 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R4:
R5:
21
6
217 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
After applying the BGP import policy, you will see how the /32 routes disappear from RIB-IN
table.
By using “community set” in the policy, we apply that community and we clear any existing
communities.
[edit]
lab@R4# run show route advertising-protocol bgp 10.1.24.2
[edit]
lab@R5# run show route advertising-protocol bgp 10.1.56.6
[edit]
lab@R5# run show route advertising-protocol bgp 10.1.57.7
[edit]
21
7
218 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
R3:
R4:
21
8
219 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Let’s check if the AS Path filter works as expected by temporarily deactivating the import
BGP filter on R4:
Now, since the no-export community is no longer applied to the prefixes received from R7,
R4 starts announcing those routes to AS 65666:
On R2, we can see that these routes are filtered because of the applied as-path filter:
21
9
220 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
22
0
221 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
R2:
R3:
R4:
R5:
22
2
223 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Normally, both 1.1.1.1/32 and 2.2.2.2/32 are present in the inet.0 table on R4 and R5:
After deactivating the export policies, R1 and R2 no longer advertise their loopback IP
addresses. Because of this, the default route will no longer be announced to R6 and R7:
22
3
224 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1 and R2:
R3:
22
4
225 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
22
5
226 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
22
6
227 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
R4:
R5:
22
7
228 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
22
8
229 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
22
9
230 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R3:
R4:
23
0
231 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
23
1
232 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
23
2
233 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
23
3
234 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 1. L3VPN
Initial configuration: Part 1
23
4
235 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
R5:
23
5
236 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R5# run show bgp summary
Groups: 1 Peers: 2 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0
0 0 0 0 0 0
bgp.l3vpn.0
8 8 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
3.3.3.3 65555 19 17 0 0 4:59
Establ
bgp.l3vpn.0: 4/4/4/0
bgp.rtarget.0: 1/1/1/0
4.4.4.4 65555 17 15 0 0 4:47
Establ
bgp.l3vpn.0: 4/4/4/0
bgp.rtarget.0: 0/1/1/0
23
6
237 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
23
7
238 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
23
8
239 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
R3 and R4:
R7:
R8:
23
9
240 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R7# run show route protocol bgp
24
0
241 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
R4:
R5:
24
3
244 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
24
4
245 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
24
5
246 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
Verification:
24
6
247 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
24
7
248 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
24
8
249 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
To check “Internet connection” is up we ping lo0 address of R3 from R7 lo0 address which is
the only allowed IP:
lab@R7# run ping 3.3.3.3 source 7.7.7.7 count 1
PING 3.3.3.3 (3.3.3.3): 56 data bytes
64 bytes from 3.3.3.3: icmp_seq=0 ttl=64 time=1.572 ms
24
9
250 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
25
0
251 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
set protocols bgp group ibgp family inet-vpn unicast
set routing-instances vpn-b instance-type vrf
set routing-instances vpn-b interface ge-0/0/4.37
set routing-instances vpn-b route-distinguisher 3.3.3.3:1
set routing-instances vpn-b vrf-target target:65555L:1
set routing-instances vpn-b protocols ospf area 0 interface ge-
0/0/4.37
set routing-instances vpn-b protocols ospf export bgp-ospf
set policy-options policy-statement bgp-ospf term 1 from protocol
bgp
set policy-options policy-statement bgp-ospf term 1 the accept
set interfaces lo0 unit 1 family inet address 33.33.33.33/32
set routing-instances vpn-b interface lo0.1
set routing-instances vpn-b protocols ospf sham-link local
33.33.33.33
set routing-instances vpn-b protocols ospf area 0 sham-link-remote
44.44.44.44 metric 1
R4:
set protocols bgp group ibgp family inet-vpn unicast
set routing-instances vpn-b instance-type vrf
set routing-instances vpn-b interface ge-0/0/4.48
R5:
25
set protocols bgp group ibgp family inet-vpn unicast 1
252 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R3# run show ospf neighbor instance vpn-b
Address Interface State ID Pri Dead
10.1.37.7 ge-0/0/4.37 Full 7.7.7.7 128 33
44.44.44.44 shamlink.0 Full 44.44.44.44 0 32
25
2
253 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
254 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
25
4
255 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
set routing-instances vpn-a instance-type vrf
set routing-instances vpn-a interface ge-0/0/4.24
set routing-instances vpn-a route-distinguisher 4.4.4.4:2
set routing-instances vpn-a vrf-import hub-routes
set routing-instances vpn-a vrf-export spoke-routes
set routing-instances vpn-a protocols ospf area 0 interface ge-
0/0/4.24
set policy-options policy-statement hub-routes term 1 from protocol
bgp
set policy-options policy-statement hub-routes term 1 from community
hub 25
5
set policy-options policy-statement hub-routes term 1 then accept
256 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
25
7
258 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
25
8
259 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 3. L3VPN
Initial configurations: L3VPN part3
25
9
260 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
R3:
set policy-options policy-statement hub-import term spokes from JNCIE-SP workbook: Appendix: Chapter 5 - VPN
protocol bgp
set policy-options policy-statement hub-import term spokes from
community vpna-hub
set policy-options policy-statement hub-import term spokes then
accept
RR:
26
3
264 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
From the route-reflector, we can quickly check to see if all sessions are up and we can verify
if the inet-vpn address family has been negotiated successfully:
lab@route-reflector> show bgp summary
Groups: 1 Peers: 3 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
bgp.l3vpn.0 26 26 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Damped...
172.16.1.1 65000 7 10 0 0 1:24 Establ
bgp.l3vpn.0: 3/3/0
172.16.1.2 65000 6 8 0 0 1:20 Establ
bgp.l3vpn.0: 11/11/0
172.16.1.3 65000 7 9 0 0 1:19 Establ
bgp.l3vpn.0: 12/12/0
We can see that received routes are active even though the route-reflector does not have
any routing-information in its inet.3 table. Because of the resolution configuration under the
routing-options stanza, this is not necessary. Through this configuration, we have instructed
the route-reflector to resolve the next-hop for all routes in the bgp.l3vpn.0 table in the inet.0
table. This one BGP command also immediately informs us that we are learning routes from
all PE routers involved in the hub and spoke VPN.
Let’s move on to the verification of the VPN. When a hub site only has one interface, it still
requires two route-targets. These are a hub and a spoke route-target. The hub site will also
require two routing-instances on the PE that it is attached to. The two instances each have
their own purpose.
We can see that we are learning two prefixes from the CE device. The routing-instance is
also configured to import all routes with the spoke route-target. To verify this, we first check
what routes we are receiving on R2 and R3:
lab@R2> show route receive-protocol bgp 10.0.0.6 table VPNA-S2.inet.0
VPNA-S2.inet.0: 15 destinations, 15 routes (15 active, 0 holddown, 0 hidden)
Prefix Nexthop MED Lclpref AS path
* 1.1.1.2/32 10.0.0.6 65001 I
* 1.1.2.0/24 10.0.0.6 65001 I
* 1.1.3.0/24 10.0.0.6 65001 I
* 1.1.4.0/24 10.0.0.6 65001 I
* 1.1.5.0/24 10.0.0.6 65001 I
* 1.1.6.0/24 10.0.0.6 65001 I
* 1.1.7.0/24 10.0.0.6 65001 I
* 1.1.8.0/24 10.0.0.6 65001 I
* 1.1.9.0/24 10.0.0.6 65001 I
* 1.1.10.0/24 10.0.0.6 65001 I
The PE is advertising the spoke routes towards the hub CE. This means that the hub CE has
full knowledge of all the spoke routes. We also added two extra knobs to the configuration
of this routing-instance. These are ‘no-vrf-advertise’ and the ‘auto-export’ knob.
The ‘no-vrf-advertise’ configuration prevents the hub learned prefixes from being advertised
to the route-reflector. Instead of advertising the routes to the route-reflector, the ‘auto-
export’ knob makes the routes eligible for local route-leaking.
This is where the second routing-instance comes in. The VPNA-ADVERTISE routing-instance is
configured without any interfaces. It’s also configured with ‘auto-export’ and the ‘vrf-target
target:6500:100’, which is the hub route-target. Because of the 'auto-export' configuration,
the routes learned from the hub CE are leaked from VPNA-HUB to VPNA-ADVERTISE. And
because VPNA-ADVERTISE is not configured with the ‘no-vrf-advertise’ knob, this routing-
instance will advertise the hub CE prefixes to the route-reflector. Packets that are send from
one spoke site to the other will arrive in this routing-instance. When they do, a lookup is
done and packets will be routed towards the hub CE:
lab@R1> show route table VPNA-ADVERTISE
0.0.0.0/0 *[BGP/170] 00:02:11, localpref 100 JNCIE-SP workbook: Appendix: Chapter 5 - VPN
AS path: 65001 I
> to 10.0.0.2 via ge-0/0/4.100
1.1.1.1/32 *[BGP/170] 00:02:11, localpref 100
AS path: 65001 I
> to 10.0.0.2 via ge-0/0/4.100
10.0.0.0/30 *[Direct/0] 00:06:07
> via ge-0/0/4.100
Packets send by a spoke can only be routed towards hub CE and when they arrive at the hub
CE , that device will do a route-lookup. As we saw earlier, the hub CE has all the spoke
routes, so the lookup by the hub CE will point the packets back at the PE. This will make the
packets arrive in the VPNA-HUB routing instance. This routing-instance does contain all
spoke routes, so packets can be routed towards a spoke site: 26
6
267 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
1
10.0.0.5 (10.0.0.5) 8.076 ms 7.724 ms 3.879 ms
2
* * *
3
10.0.0.2 (10.0.0.2) 8.156 ms 7.550 ms 5.514 ms
4
10.0.0.1 (10.0.0.1) 11.056 ms 10.971 ms 8.827 ms
5
* * *
6
* * *
7
192.168.1.29 (192.168.1.29) 12.342 ms 9.812 ms 11.312 ms
MPLS Label=299776 CoS=0 TTL=1 S=1
8 1.1.1.3 (1.1.1.3) 20.463 ms 27.710 ms 11.933 ms
lab@vr-device>
Packets sourced from s3 can make it to s2 and vice versa. From the traceroute output, we
can conclude that packets are send through the hub site.
26
8
269 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R2:
set policy-options policy-statement vpnb-export term ipv4 from JNCIE-SP workbook: Appendix: Chapter 5 - VPN
family inet
set policy-options policy-statement vpnb-export term ipv4 then as-
path-prepend 65000
set policy-options policy-statement vpnb-export term ipv4 then
accept
set policy-options policy-statement vpnb-import term ipv6 from next-
hop ::ffff:10.0.1.6
set policy-options policy-statement vpnb-import term ipv6 then
local-preference 110
set policy-options policy-statement vpnb-import term ipv6 then
accept
27
0
R3:
271 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
RR:
27
2
273 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
We have configured several things. The highlights are the following:
• enabled PE-CE communication and configured a routing-instance on all PE routers
• manipulated the preference for IPv4 and IPv6 routes
• enabled the distribution of the additional inet6-vpn address family between the PE
routers
• installed IPv4 mapped IPv6 routes in the inet6.3 table to be able to resolve the IPv6
routes
The routing instance was configured on PE routers R1, R2, R3 and R4. To verify that the PE-
CE peering session supports both IPv4 and IPv6 prefixes, we can issue the following
command:
lab@R1> show bgp neighbor 10.0.1.2 | match NLRI.*session
NLRI for this session: inet-unicast inet6-unicast
The CE devices send the IPv6 prefixes with a next-hop attribute that contains an IPv4
mapped IPv6 address. To be able to resolve these routes, we configured an IPv4 mapped
IPv6 address on the PE’s CE facing interface. This was done on all PE routers. To verify the
receipt of the IPv6 prefixes:
lab@R1> show route receive-protocol bgp 10.0.1.2
2001:db8:2222::1/128
* ::ffff:10.0.1.2 65000 [65000]
65000 I
2001:db8:2222::2/128
* Self 65000 [65000]
65000 I
2001:db8:2222::3/128
* Self 65000 [65000]
65000 I
2001:db8:2222::4/128
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:1::/80
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:2::/80
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:3::/80
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:4::/80
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:5::/80
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:6::/80
* Self 65000 [65000]
65000 I
2001:db8:aaaa:2:7::/80
* Self 65000 [65000]
65000 I
277 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
2001:db8:aaaa:2:2::/80
* ::ffff:10.0.1.6 65000 I
2001:db8:aaaa:2:3::/80
* ::ffff:10.0.1.6 65000 I
2001:db8:aaaa:2:4::/80
* ::ffff:10.0.1.6 65000 I
2001:db8:aaaa:2:5::/80
* Self 65000 I
2001:db8:aaaa:2:6::/80
* Self 65000 I
2001:db8:aaaa:2:7::/80
* Self 65000 I
2001:db8:aaaa:2:8::/80
* Self 65000 I
2001:db8:aaaa:2:9::/80
* Self 65000 I
2001:db8:aaaa:2:10::/80
* Self 65000 I
2001:db8:aaaa:2:11::/80
* Self 65000 I
2001:db8:aaaa:2:12::/80
* Self 65000 I
Both PE routers are advertising IPv4 and IPv6 prefixes. On R1, the IPv6 prefixes are being
prepended and on R2, the IPv4 prefixes are being prepended.
To verify that traffic from the MPLS VPN towards the CE devices is following the desired
path, we can examine the route towards CE1 in the routing-table of the VPN on both R1 and
R2:
2001:db8:2222::1/128
*[BGP/170] 00:03:34, localpref 110, from 172.16.1.9
AS path: 65500 I
> to 192.168.1.6 via ge-0/0/4.3, label-switched-path R1_to_R2
27
[BGP/170] 00:17:07, localpref 100, from 10.0.1.2
7
AS path: 65500 I
278 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
2001:db8:2222::1/128
*[BGP/170] 00:04:08, localpref 110, from 10.0.1.6
AS path: 65500 I
> to ::ffff:10.0.1.6 via ge-0/0/4.104
In the output, the local preference of the route that was advertised by the attached CE
device was highlighted. On R1, the IPv4 route has the highest local preference and on R2 the
IPv6 route has the highest local preference.
All PE routers and the RR had their BGP sessions configured with the inet6-vpn address
family. To verify what address families are currently active on a BGP session:
::ffff:172.16.1.2/128
*[RSVP/7/1] 00:21:02, metric 20
> to 192.168.1.6 via ge-0/0/4.3, label-switched-path R1_to_R2
::ffff:172.16.1.3/128
*[RSVP/7/1] 00:21:02, metric 20
> to 192.168.1.6 via ge-0/0/4.3, label-switched-path R1_to_R3
::ffff:172.16.1.4/128
*[RSVP/7/1] 00:21:02, metric 30
> to 192.168.1.6 via ge-0/0/4.3, label-switched-path R1_to_R4
Because of this, the PE routers can both resolve the IPv6 prefixes and use the RSVP-signaled
LSPs to forward IPv6 traffic.
On the R3 router, we forced IPv6 traffic across separate LSPSs by configuring the IPv4
mapped IPv6 address in the LSP configuration. Additionally, we configured the LSP with the
::ffff:172.16.1.1/128
*[RSVP/7/1] 00:15:00, metric 20
> to 192.168.1.34 via ge-0/0/4.10, label-switched-path
R3_to_R1_ipv6
::ffff:172.16.1.2/128
*[RSVP/7/1] 00:15:00, metric 20
> to 192.168.1.34 via ge-0/0/4.10, label-switched-path
R3_to_R2_ipv6
::ffff:172.16.1.4/128
*[RSVP/7/1] 00:15:00, metric 20
> to 192.168.1.30 via ge-0/0/4.9, label-switched-path
R3_to_R4_ipv6
28
1
282 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
28
set policy-options community vpna-hub members target:6500:100 2
283 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Interprovider VPN option B is described in RFC4364. The option is titled ‘EBGP redistribution
of labeled VPN-IPv4 routes from AS to neighboring AS’.
First, the BGP session with the neighboring AS needs to support the correct address family:
lab@R4> show bgp neighbor 192.168.1.58 | match NLRI.*session
NLRI for this session: inet-vpn-unicast
The R4 router also needs to be able to forward MPLS traffic across the interface towards the
neighboring AS. For this reason, the interface is configured for MPLS forwarding:
lab@R4> show mpls interface
Interface State Administrative groups (x: extended)
ge-0/0/4.12 Up <none>
ge-0/0/4.13 Up <none>
ge-0/0/4.107 Up <none>
The RTs need to be normalized. This means that through import and export policies, R4 will
be translating the advertised and received RTs to make them correspond with the different
numbering schemes deployed in both ASes.
To verify that the RTs have been translated correctly, we first check the RTs attached to the
The route that is destined to be imported into VPNA had the spoke RT attached to it. To
verify that it was imported correctly, we can issue the following command on R1:
lab@R1> show route table VPNA-HUB.inet.0 8.8.8.1
The last thing we can do to verify the configuration is verifying IP connectivity between the
remote sites and the sites in AS65000:
28
6
287 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
28
7
288 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Instance: l2vpn
Local site: 2 (2)
28
Number of local interfaces: 1 9
Number of local interfaces up: 1
290 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
ge-0/0/1.0 1
Label-base Offset Size Range Preference
800000 1 2 1 100
status-vector: 0
connection-site Type St Time last up # Up trans
1 rmt Up Mar 13 08:05:53 2016 1
Remote PE: 1.1.1.1, Negotiated control-word: Yes (Null)
Incoming label: 800000, Outgoing label: 800003
Local interface: ge-0/0/1.0, Status: Up, Encapsulation: ETHERNET
Connection History:
Mar 13 08:05:53 2016 status update timer
Mar 13 08:05:53 2016 PE route changed
Mar 13 08:05:53 2016 Out lbl Update 800003
Mar 13 08:05:53 2016 In lbl Update 800000
Mar 13 08:05:53 2016 loc intf up ge-0/0/1.0
The highlighted parts inform us about the following:
• the state of the L2VPN (Up)
• the remote PE router involved in this L2VPN (1.1.1.1)
• the local interface that is connected to that remote PE (ge-0/0/1.0)
• the Encapsulation type (Ethernet)
• the connection history
On R1, the L2VPN route that is advertised towards R7 can be observed by issuing the
following command:
lab@R1> show route advertising-protocol bgp 7.7.7.7 detail
Some key items in this printout are the route-distinguisher, the extended route-target
community and the encapsulation used for this VPN.
Since the entire interface is configured as part of the L2VPN, all OSPF neighbor relationships
between R8 and R1 should form as soon as the L2VPN is up. We can verify this on the R8
router like this: 29
0
291 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Instance: vpn-b
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.60 Full 192.168.1.1 255 35
Instance: vpn-c
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.70 Full 192.168.1.1 255 39
Instance: vpn-d
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.80 Full 192.168.1.1 255 39
Instance: vpn-e
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.90 Full 192.168.1.1 255 38
Instance: l2circuit
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.10 Full 192.168.1.1 255 38
Instance: circuit-b
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.11 Full 192.168.1.1 255 35
Instance: vpn-h
29
1
292 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
29
2
293 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
We can verify the status of the layer 2 circuit itself by issuing the following command:
[…skipped…]
Neighbor: 7.7.7.7
Interface Type St Time last up # Up trans
ge-0/0/1.10(vc 10) rmt Up Mar 13 08:25:14 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: Yes (Null)
Incoming label: 299824, Outgoing label: 299824
Negotiated PW status TLV: No
Local interface: ge-0/0/1.10, Status: Up, Encapsulation: VLAN
Connection History:
Mar 13 08:25:14 2016 status update timer
Mar 13 08:25:14 2016 PE route changed
Mar 13 08:25:14 2016 Out lbl Update 299824
Mar 13 08:25:14 2016 In lbl Update 299824
Mar 13 08:25:14 2016 loc intf up ge-0/0/1.10
On the R8 router, we can verify whether or not an OSPF adjacency was able to form:
lab@R8> show ospf neighbor instance l2circuit
Address Interface State ID Pri Dead
192.168.1.1 ge-0/0/1.10 Full 192.168.1.1 255 34
29
3
294 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
29
4
295 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R1> show l2vpn connections
Layer-2 VPN connections:
[…skipped…]
Instance: circuit-b
Local site: 1 (1)
connection-site Type St Time last up # Up trans
2 rmt Up Mar 13 08:36:54 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: Yes (Null)
Incoming label: 800003, Outgoing label: 800002
Local interface: ge-0/0/1.11, Status: Up, Encapsulation: VLAN
On the R2 router, we can verify whether or not an OSPF adjacency was able to form across
the configured circuit:
lab@R2> show ospf neighbor instance circuit-b
Address Interface State ID Pri Dead
192.168.1.4 ge-0/0/1.11 Full 192.168.1.4 128 38
29
5
296 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
29
7
298 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Issuing the following command gives us an overview of all the VPLS connection that have
been able to form:
lab@R1> show vpls connections extensive
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-a
VPLS-id: 50
Number of local interfaces: 1
Number of local interfaces up: 1
ge-0/0/1.50
lsi.1048577 Intf - vpls vpn-a neighbor 3.3.3.3 vpls-id 50
lsi.1048576 Intf - vpls vpn-a neighbor 5.5.5.5 vpls-id 50
lsi.1048578 Intf - vpls vpn-a neighbor 7.7.7.7 vpls-id 50
Neighbor Type St Time last up # Up trans
3.3.3.3(vpls-id 50) rmt Up Mar 13 08:44:03 2016 1
Remote PE: 3.3.3.3, Negotiated control-word: No
Incoming label: 262146, Outgoing label: 262145
Negotiated PW status TLV: No
Local interface: lsi.1048577, Status: Up, Encapsulation: ETHERNET
Description: Intf - vpls vpn-a neighbor 3.3.3.3 vpls-id 50
Connection History:
Mar 13 08:44:03 2016 status update timer
Mar 13 08:44:03 2016 PE route changed
Mar 13 08:44:03 2016 Out lbl Update 262145
Mar 13 08:44:03 2016 In lbl Update 262146
299 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On the R2 router, we can verify whether or not an OSPF adjacency was able to form across
the configured VPLS by issuing the following command:
29
9
300 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R5:
30
set interfaces ge-0/0/1 unit 60 encapsulation vlan-vpls 0
301 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
30
1
302 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
In this scenario, only R1 and R3 are configured to treat R7 as a backup connection to the R5
VPLS connection. On bot R5 and R7, only R1 and R3 are configured as VPLS neighbors:
lab@R1> show vpls connections instance vpn-b
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-b
VPLS-id: 60
Neighbor Type St Time last up # Up trans
3.3.3.3(vpls-id 60) rmt Up Mar 13 08:50:37 2016 1
Remote PE: 3.3.3.3, Negotiated control-word: No
Incoming label: 262149, Outgoing label: 262148
Negotiated PW status TLV: No
Local interface: lsi.1048579, Status: Up, Encapsulation: ETHERNET
Description: Intf - vpls vpn-b neighbor 3.3.3.3 vpls-id 60
5.5.5.5(vpls-id 60) rmt Up Mar 13 08:50:38 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: No
Incoming label: 262148, Outgoing label: 262148
Negotiated PW status TLV: No
Local interface: lsi.1048580, Status: Up, Encapsulation: ETHERNET
Description: Intf - vpls vpn-b neighbor 5.5.5.5 vpls-id 60
7.7.7.7(vpls-id 60) rmt BK
The above printout verifies that the VPLS connections towards R3 and R5 are up. The R7
connection is in a backup state.
[…skipped…]
Instance: vpn-b
VPLS-id: 60
Neighbor Type St Time last up # Up trans
1.1.1.1(vpls-id 60) rmt Up Mar 13 08:50:38 2016 1
Remote PE: 1.1.1.1, Negotiated control-word: No
Incoming label: 262148, Outgoing label: 262148
Negotiated PW status TLV: No
Local interface: lsi.1048579, Status: Up, Encapsulation: ETHERNET
Description: Intf - vpls vpn-b neighbor 1.1.1.1 vpls-id 60
3.3.3.3(vpls-id 60) rmt Up Mar 13 08:50:38 2016 1 30
2
Remote PE: 3.3.3.3, Negotiated control-word: No
303 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On the R7 router, for as long as R1 and R3 have a connection with R5, the status is OL (no
outgoing label):
[…skipped…]
Instance: vpn-b
VPLS-id: 60
Neighbor Type St Time last up # Up trans
1.1.1.1(vpls-id 60) rmt OL
3.3.3.3(vpls-id 60) rmt OL
On the R2 router, we can verify that an OSPF adjacency was able to form across the
configured VPLS by issuing the following command:
lab@R2> show ospf neighbor instance vpn-b
Address Interface State ID Pri Dead
192.168.1.2 ge-0/0/1.60 Full 192.168.1.2 128 39
192.168.1.3 ge-0/0/1.60 Full 192.168.1.3 128 34
To verify whether or not the redundancy works, we can temporarily deactivate the routing-
instance on the R5 router:
[…skipped…]
Instance: vpn-b
VPLS-id: 60
Neighbor Type St Time last up # Up trans
1.1.1.1(vpls-id 60) rmt Up Mar 13 08:57:54 2016 1
Remote PE: 1.1.1.1, Negotiated control-word: No
Incoming label: 262148, Outgoing label: 262150 30
3
Negotiated PW status TLV: No
304 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[…skipped…]
Instance: vpn-b
VPLS-id: 60
Neighbor Type St Time last up # Up trans
3.3.3.3(vpls-id 60) rmt Up Mar 13 08:56:40 2016 1
Remote PE: 3.3.3.3, Negotiated control-word: No
Incoming label: 262148, Outgoing label: 262148
Negotiated PW status TLV: No
Local interface: lsi.1048576, Status: Up, Encapsulation: ETHERNET
Description: Intf - vpls vpn-b neighbor 3.3.3.3 vpls-id 60
7.7.7.7(vpls-id 60) rmt Up Mar 13 08:58:02 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: No
Incoming label: 262150, Outgoing label: 262148
Negotiated PW status TLV: No
Local interface: lsi.1048581, Status: Up, Encapsulation: ETHERNET
Description: Intf - vpls vpn-b neighbor 7.7.7.7 vpls-id 60
5.5.5.5(vpls-id 60) rmt OL
30
4
305 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
30
6
307 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
The verification of the VPLS can be done by issuing the following command:
lab@R3> show vpls connections instance vpn-c
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-c
Local site: 2 (2)
connection-site Type St Time last up # Up trans
1 rmt Up Mar 13 09:11:27 2016 1
Remote PE: 1.1.1.1, Negotiated control-word: No
Incoming label: 262401, Outgoing label: 262402
Local interface: lsi.1048581, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-c local site 2 remote site 1
3 rmt Up Mar 13 09:11:31 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: No
Incoming label: 262403, Outgoing label: 262402
Local interface: lsi.1048583, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-c local site 2 remote site 3
4 rmt Up Mar 13 09:11:28 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: No
Incoming label: 262404, Outgoing label: 262402
Local interface: lsi.1048582, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-c local site 2 remote site 4
For troubleshooting purposes, another useful suggestion is to verify the BGP routes
advertised and received for this VPLS. This routing information can be acquired by issuing
Import Accepted
Route Distinguisher: 1.1.1.1:6
Label-base: 262401, range: 8
Nexthop: 1.1.1.1
Localpref: 100
AS path: I (Originator) Cluster list: 0.0.0.1
AS path: Originator ID: 1.1.1.1
Communities: target:65555L:70 Layer2-info: encaps:VPLS, control flags:, mtu:
0, site preference: 100
30
8
309 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
31
0
311 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
We can verify the status of the VPLS connection on R1 by issuing the following command:
lab@R1> show vpls connections instance vpn-d
[…skipped…]
Instance: vpn-d
Local site: 1 (1)
connection-site Type St Time last up # Up trans
2 rmt Up Mar 13 09:30:09 2016 1
Remote PE: 3.3.3.3, Negotiated control-word: No
Incoming label: 262410, Outgoing label: 262409
Local interface: lsi.1048584, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-d local site 1 remote site 2
3 rmt Up Mar 13 09:30:13 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: No
Incoming label: 262411, Outgoing label: 262409
Local interface: lsi.1048585, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-d local site 1 remote site 3
As we can see from the R1 router, connections to the other sites of the VPLS are up. The
primary PE for site 3, R5, is currently handling traffic for that site. By examining the BGP
routing information, we can discover how this works:
lab@R1> show route table vpn-d.l2vpn.0 detail
Address: 0x155dbac
Next-hop reference count: 10
Source: 7.7.7.7
Protocol next hop: 3.3.3.3
Indirect next hop: 2 no-forward
State: <Secondary Active Int Ext>
Local AS: 65555 Peer AS: 65555
Age: 2:32 Metric2: 1
Task: BGP_65555.7.7.7.7+59397
Announcement bits (1): 0-vpn-d-l2vpn
AS path: I (Originator)
Cluster list: 0.0.0.1
Originator ID: 3.3.3.3
Communities: target:65555L:80 Layer2-info: encaps:VPLS, control
flags:, mtu: 0, site preference: 100
Import Accepted
Label-base: 262409, range: 8
Localpref: 100
Router ID: 7.7.7.7
Primary Routing Table bgp.l2vpn.0
313 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[…skipped…]
Instance: vpn-d
Local site: 3 (3)
connection-site Type St Time last up # Up trans
314 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On R1, we should see the VPLS connection to site 3 form with R7:
lab@R1> show vpls connections instance vpn-d
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-d
Local site: 1 (1)
connection-site Type St Time last up # Up trans
2 rmt Up Mar 13 09:30:09 2016 1
Remote PE: 3.3.3.3, Negotiated control-word: No
Incoming label: 262410, Outgoing label: 262409
Local interface: lsi.1048584, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-d local site 1 remote site 2
3 rmt Up Mar 13 09:30:13 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: No
Incoming label: 262411, Outgoing label: 262409
Local interface: lsi.1048585, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-d local site 1 remote site 3
On R7, the connection towards the other PE routers will be in the status up:
lab@R7> show vpls connections instance vpn-d | no-more
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-d
set firewall family vpls filter BUM-LIMIT term 1 then policer BUM
set firewall family vpls filter BUM-LIMIT term 1 then accept
set firewall policer BUM if-exceeding bandwidth-limit 32k
set firewall policer BUM if-exceeding burst-size-limit 15k
set firewall policer BUM then discard
set firewall family vpls filter BUM-LIMIT term 1 then policer BUM
set firewall family vpls filter BUM-LIMIT term 1 then accept
R7:
set interfaces ge-0/0/1 unit 90 encapsulation vlan-vpls
set interfaces ge-0/0/1 unit 90 vlan-id 90
set firewall family vpls filter BUM-LIMIT term 1 then policer BUM
set firewall family vpls filter BUM-LIMIT term 1 then accept
set firewall policer BUM if-exceeding bandwidth-limit 32k
set firewall policer BUM if-exceeding burst-size-limit 15k
set firewall policer BUM then discard
31
7
318 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
First, we check the R1 router to see if the VPLS connections towards the other PE routers are
up:
[…skipped…]
Instance: vpn-e
Local site: 1 (1)
connection-site Type St Time last up # Up trans
2 rmt Up Mar 13 09:39:03 2016 1
Remote PE: 3.3.3.3, Negotiated control-word: No
Incoming label: 262418, Outgoing label: 262417
Local interface: lsi.1048586, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-e local site 1 remote site 2
3 rmt Up Mar 13 09:39:09 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: No
Incoming label: 262419, Outgoing label: 262425
Local interface: lsi.1048587, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-e local site 1 remote site 3
4 rmt Up Mar 13 09:39:20 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: No
Incoming label: 262420, Outgoing label: 262417
Local interface: lsi.1048588, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-e local site 1 remote site 4
On the R2 router, we can verify whether or not an OSPF adjacency was able to form across
set firewall family vpls filter BUM-LIMIT term 1 then count bum
Since we are running OSPF across this VPLS, and since OSPF uses a multicast address, we
should be able to observe the following after a brief period of time: 31
8
319 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Filter: __default_bpdu_filter__
Filter: BUM-LIMIT
Counters:
Name Bytes Packets
bum 3074 29
Policers:
Name Bytes Packets
BUM-1 0
Before moving on, we remove the counter from R1:
R1:
delete firewall family vpls filter BUM-LIMIT term 1 then count bum
31
9
320 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R1:
Verification:
As mentioned previously, when normalizing the VLAN through routing-instance
configuration, traffic is not able to transit the VPLS on the hardware used in this lab. The
configuration supplied here will work on an MX router.
To verify VLAN normalization through routing-instance configuration, we could check the
‘show interfaces’ command. The interface locally involved with the VPLS should list
something like this:
Flags: Up SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.600 ] In(swap .512) Out(swap .600)
Encapsulation: VLAN-VPLS
32
1
322 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
First, we verify whether or not the VPLS connection is up:
lab@R1> show vpls connections instance vpn-g
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-g
Local site: 1 (1)
connection-site Type St Time last up # Up trans
3 rmt Up Mar 13 10:00:50 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: No
Incoming label: 262435, Outgoing label: 262441
Local interface: lsi.1048590, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-g local site 1 remote site 3
After that, we verify what rewrite rules are applied to the interfaces by issuing the following
command:
On the R2 router, we can verify whether or not an OSPF adjacency was able to form across
the configured VPLS by issuing the following command:
lab@R2> show ospf neighbor instance vpn-g
Address Interface State ID Pri Dead
192.168.1.4 ge-0/0/2.700 Full 192.168.1.4 128 39
32
4
325 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
32
5
326 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
R6:
R1:
[…skipped…]
Instance: vpn-g
Local site: 1 (1)
Number of local interfaces: 2
Number of local interfaces up: 2
IRB interface present: no
ge-0/0/2.520
Interface flags: VC-Down
ge-0/0/1.520
lsi.1048602 3 Intf - vpls vpn-g local site 1 remote site 3
Label-base Offset Size Range Preference
262473 1 8 8 100
connection-site Type St Time last up # Up trans
3 rmt Up Mar 13 10:31:57 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: No
32
6
327 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
32
7
328 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R5:
set interfaces ge-0/0/1 unit 100 encapsulation vlan-vpls
set interfaces ge-0/0/1 unit 100 vlan-id 100
32
8
329 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R7:
set interfaces ge-0/0/1 unit 100 encapsulation vlan-ccc
set interfaces ge-0/0/1 unit 100 vlan-id 100
32
9
330 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
We verify the solution from R5 since this router is involved with the VPLS and with the
L2VPN. First, we check the VPLS connections:
lab@R5> show vpls connections instance vpn-h extensive
Layer-2 VPN connections:
[…skipped…]
Instance: vpn-h
Local site: 3 (3)
Number of local interfaces: 2
Number of local interfaces up: 2
IRB interface present: no
ge-0/0/1.100
lt-0/0/0.1
lsi.1048608 1 Intf - vpls vpn-h local site 3 remote site 1
lsi.1048609 2 Intf - vpls vpn-h local site 3 remote site 2
Label-base Offset Size Range Preference
262497 1 8 8 100
connection-site Type St Time last up # Up trans
1 rmt Up Mar 13 10:41:05 2016 1
Remote PE: 1.1.1.1, Negotiated control-word: No
Incoming label: 262497, Outgoing label: 262483
Local interface: lsi.1048608, Status: Up, Encapsulation: VPLS
Description: Intf - vpls vpn-h local site 3 remote site 1
Connection History:
Mar 13 10:41:05 2016 status update timer
Mar 13 10:41:05 2016 loc intf up lsi.1048608
From the previous output, we can see that the R5 router has an active VPLS connection
towards R3 and R1. We can also see that two local interfaces are participating in this VPLS. 33
0
These are interfaces ge-0/0/1.100 and lt-0/0/0.1.
331 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
The ge-0/0/1.100 interface is used to connect the CPE to the VPLS. The lt-0/0/0.1 interface is
used to connect the L2VPN into this VPLS. This is done by peering the interface with
interface lt-0/0/0.0 and by placing that interface into an L2VPN.
We can verify the status of the L2VPN by issuing the following command:
[…skipped…]
Instance: vpn-h-stitched-l2vpn
Local site: 1 (1)
Number of local interfaces: 1
Number of local interfaces up: 1
lt-0/0/0.0 2
Label-base Offset Size Range Preference
800000 1 2 2 100
status-vector: 0
connection-site Type St Time last up # Up trans
2 rmt Up Mar 13 10:54:57 2016 1
Remote PE: 7.7.7.7, Negotiated control-word: Yes (Null)
Incoming label: 800001, Outgoing label: 800002
Local interface: lt-0/0/0.0, Status: Up, Encapsulation: VLAN
Connection History:
Mar 13 10:54:57 2016 status update timer
Mar 13 10:54:57 2016 PE route changed
Mar 13 10:54:57 2016 Out lbl Update 800002
Mar 13 10:54:57 2016 In lbl Update 800001
Mar 13 10:54:57 2016 loc intf up lt-0/0/0.0
[…skipped…]
Instance: vpn-h-stitched-l2vpn
Local site: 2 (2)
connection-site Type St Time last up # Up trans
1 rmt Up Mar 13 10:54:41 2016 1
Remote PE: 5.5.5.5, Negotiated control-word: Yes (Null)
Incoming label: 800002, Outgoing label: 800001
Local interface: ge-0/0/1.100, Status: Up, Encapsulation: VLAN
What we did was create a VPLS on R1, R3 and R5. On R5, we placed two interfaces in the 33
1
VPLS. One CE facing interface and one tunnel interface. The tunnel interface was peered
332 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
with another tunnel interface that was then placed inside an L2VPN. The L2VPN connection
was setup towards R7.
We can verify that there is layer 2 connectivity between all CPE routers by issuing the
following command on R2:
lab@R2> show ospf neighbor instance vpn-h
Address Interface State ID Pri Dead
192.168.1.4 ge-0/0/1.100 Full 192.168.1.4 128 31
192.168.1.2 ge-0/0/1.100 Full 192.168.1.2 128 33
192.168.1.3 ge-0/0/1.100 Full 192.168.1.3 128 35
33
2
333 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
33
3
334 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
The RSVP signaled point-to-multipoint tunnel needs no explicit configuration under the [
protocols mpls stanza ]. Activating the routers for RSVP and specifying the provider-tunnel
rsvp-te label-switched-path-template default-template for the routing-instance is
enough.
lab@R5> show mpls lsp extensive
Ingress LSP: 2 sessions
1.1.1.1
From: 5.5.5.5, State: Up, ActiveRoute: 0, LSPname: 1.1.1.1:5.5.5.5:11:vpls:vpn-h
ActivePath: (primary)
P2MP name: 5.5.5.5:11:vpls:vpn-h
PathDomain: Inter-domain
LSPtype: Dynamic Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 2)
10.0.75.7 S 10.0.71.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
10.0.75.7 10.0.71.1
5 Mar 13 11:34:30.223 Selected as active path
4 Mar 13 11:34:30.217 Record Route: 10.0.75.7 10.0.71.1
3 Mar 13 11:34:30.217 Up
3.3.3.3
From: 5.5.5.5, State: Up, ActiveRoute: 0, LSPname: 3.3.3.3:5.5.5.5:11:vpls:vpn-h
ActivePath: (primary)
P2MP name: 5.5.5.5:11:vpls:vpn-h
PathDomain: Inter-domain
LSPtype: Dynamic Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 1)
10.0.35.3 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
33
10.0.35.3
4
5 Mar 13 11:34:30.205 Selected as active path
335 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
3.3.3.3
From: 5.5.5.5, LSPstate: Up, ActiveRoute: 0
LSPname: 3.3.3.3:5.5.5.5:11:vpls:vpn-h, LSPpath: Primary
LSPtype: Dynamic Configured
P2MP LSPname: 5.5.5.5:11:vpls:vpn-h, Re-merge: None
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 262427
Resv style: 1 SE, Label in: -, Label out: 262427
Time left: -, Since: Sun Mar 13 11:34:30 2016
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 22905 protocol 0
PATH rcvfrom: localclient
Adspec: sent MTU 1500
Path MTU: received 1500
PATH sentto: 10.0.35.3 (ge-0/0/4.35) 3 pkts
1.1.1.1
From: 5.5.5.5, LSPstate: Up, ActiveRoute: 0
LSPname: 1.1.1.1:5.5.5.5:11:vpls:vpn-h, LSPpath: Primary
LSPtype: Dynamic Configured
P2MP LSPname: 5.5.5.5:11:vpls:vpn-h, Re-merge: None
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 299840
Resv style: 1 SE, Label in: -, Label out: 299840
Time left: -, Since: Sun Mar 13 11:34:30 2016
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 22905 protocol 0
PATH rcvfrom: localclient
Adspec: sent MTU 1500
Path MTU: received 1500
PATH sentto: 10.0.75.7 (ge-0/0/4.75) 3 pkts 33
5
RESV rcvfrom: 10.0.75.7 (ge-0/0/4.75) 3 pkts
336 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
33
6
337 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 1:
33
7
338 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Lab introduction:
The R6 router is functioning as a multicast source in this lab. No multicast configuration has
to be performed on this router in any of the tasks. At the end of each task, you can verify the
lab by having the R6 router send multicast traffic to the multicast group address 239.0.0.1.
R1 and R5 are configured to send join messages for group 239.0.0.1. Additionally, they will
also reply to multicast traffic, making it easy for you to test your configuration.
At the end of each task, you can verify the configuration by sending a multicast ping from R6
to the multicast addresses that R1 and R5 are willing to join. To verify the configuration
tasks, you can issue the following command on the R6 router:
All routers are using the ge-0/0/0 interface as their out-of-band management interface.
Treat these interfaces as though they are the management, or fxp0 interfaces, of the routers
in the lab.
The lab exercises may require configuration on any of the routers except for R6.
33
8
339 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
33
9
340 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
To display information about PIM neighbors, we can issue the following command:
Instance: PIM.master
Interface IP V Mode Option Uptime Neighbor addr
ge-0/0/4.3 4 2 HPLGT 00:04:52 192.168.1.6
ge-0/0/4.6 4 2 HPLGT 00:04:52 192.168.1.18
ge-0/0/4.9 4 2 HPLGT 00:04:52 192.168.1.29
The auto-rp mechanism enables routers to learn the about the RP. The configuration of two
dense mode group addresses is required on every router. This is because the auto-rp
mechanism relies on the dense mode group addresses 224.0.1.39 (to advertise auto-rp
messages) and 224.0.1.40 (to discover).
In this task, all routers except for R3 are configured to discover, or listen for auto-rp
messages. Since the R3 router is configured to be an RP, it is configured with the 'mapping'
keyword. This makes the router send and listen for auto-rp messages. Be patient because it
can take a while for all routers to learn about the RP.
To verify that the auto-rp mechanism was successful, we can issue the following command:
All routers need to know the RP address, so a thorough investigation would require a similar
check on every router.
To verify that multicast traffic can make its way to the receivers, we can make R6 generate
some multicast traffic:
lab@R6> ping bypass-routing interface ge-0/0/4.14 ttl 10 239.0.0.1 34
0
PING 239.0.0.1 (239.0.0.1): 56 data bytes
341 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
We should start to see replies from both routers that were configured as receivers. The
192.168.1.1 address belongs to R1 and the 192.168.1.45 address belongs to R5.
Shortly after initiating the multicast stream, we can see that on R4, two interfaces have
joined the 'Downstream interface list':
lab@R4> show multicast route group 239.0.0.1
extensive Instance: master Family: INET
Group: 239.0.0.1
Source: 192.168.1.50/32
Upstream interface: ge-0/0/4.14
Downstream interface list:
ge-0/0/4.5 ge-0/0/4.4
Session description: Organisational Local Scope
Statistics: 0 kBps, 1 pps, 105 packets
Next-hop ID: 262142
Upstream protocol: PIM
Route state: Active
Forwarding state: Forwarding
Cache lifetime/timeout: 360 seconds
Wrong incoming interface notifications: 0
Group: 239.0.0.1
Source: 192.168.1.50
Flags: sparse,spt
Upstream interface: ge-0/0/4.14
Upstream neighbor: Direct
Upstream state: Local Source
Keepalive timeout: 346
Uptime: 00:01:30
Downstream neighbors: 34
1
Interface: ge-0/0/4.4
342 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Group: 239.0.0.1
Source: 192.168.1.50/32
Upstream interface: ge-0/0/4.5
Downstream interface list:
ge-0/0/4.13
Session description: Organisational Local Scope
Statistics: 0 kBps, 1 pps, 205 packets
Next-hop ID: 262150
Upstream protocol: PIM
Route state: Active
Forwarding state: Forwarding
Cache lifetime/timeout: 360 seconds
Wrong incoming interface notifications: 0
Uptime: 00:03:52
This is the multicast traffic destined to R5. On R7 and R2, we could see multicast traffic
destined to R1.
34
2
343 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
34
3
344 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
PIM allows for both export and import filters. Import filters can be used to filter inbound
joins for a multicast group. To verify that Rx Joins are being filtered:
lab@R2> show pim statistics | match filtered
RP Filtered Source 0
Rx Joins/Prunes filtered 7
Tx Joins/Prunes filtered 0
And export filters can be used to limit, or filter, outbound joins for a multicast group. To
verify that Tx Joins are being filtered:
34
4
345 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R8:
34
5
346 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Since multicast routing protocols are not the fastest routing protocols there are, a 'run
restart routing' can speed things up in a lab.
In this task, the routers must learn about the RP using the bootstrap mechanism instead of
the auto-rp mechanism. Since we no longer need the two dense-groups, we use PIM SM, or
PIM sparse mode. PIM SM neighbors are indicated by an 'S' as opposed to an 'SD' for sparse
dense which we saw in our previous tasks:
lab@R4> show pim interfaces
Instance: PIM.master
After while, the other routers will learn about the BSR routers and they will display that they
have learned about the RP:
A final check on R6 shows us that multicast traffic can make its way across the network:
Group: 239.0.0.1
To verify that the packets keep flowing, we can issue the same command a few seconds
later: 34
7
348 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Group: 239.0.0.1
Source: 192.168.1.50/32
Upstream interface: ge-0/0/4.14
Downstream interface list:
ge-0/0/4.5 ge-0/0/4.4
Session description: Organisational Local Scope
Statistics: 0 kBps, 1 pps, 41 packets
Next-hop ID: 262142
Upstream protocol: PIM
Route state: Active
Forwarding state: Forwarding
Cache lifetime/timeout: 360 seconds
Wrong incoming interface notifications: 0
Uptime: 00:00:43
34
8
349 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
34
9
350 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R4> show pim rps
Instance: PIM.master
35
0
351 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R8:
delete protocols pim rp static
set protocols pim rp local address 10.0.0.255
set protocols msdp group any-cast peer 10.0.0.3
set protocols msdp group any-cast local-address 10.0.0.8
set protocols msdp group any-cast mode mesh-group
35
1
352 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
With anycast-RPs, we can achieve load sharing per multicast group and fast failover times.
Anycast RP routers need to be configured with a shared address that they both inject into
the network. Typically, this is done through an IGP. Receivers interested in multicast traffic
use the nearest available RP. This RP might not be the closest RP towards the source of the
traffic. The two redundant RPs must be able to communicate with each other and make sure
they both know about all the sources and receivers. The anycast RP configuration needs a
way to handle this exchange of information between the two RP routers. This can be
achieved by using either PIM or MSDP. For this task, we are using MSDP.
Apart from being able to connect together multiple PIM-SM domains, MSDP can also be
used to enable anycast RP within a PIM-SM domain allowing the redundant RPs to share
information. An anycast RP setup can be configured together with different RP selection
methods, though in this case, a static RP is all that is required.
To see if the configured MSDP peering is up, issue the following command:
lab@R3> show msdp
Peer address Local address State Last up/down Peer-Group SA Count
10.0.0.8 10.0.0.3 Established 00:02:09 any-cast 1/1
Activity (or lack thereof) is easily spotted by using the following command:
35
Both R3 and R8 will function as an RP and both will display they are a static RP:
2
353 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
RP: 10.0.0.255
Learned via: static configuration
Time Active: 00:03:33
Holdtime: 0
Device Index: 131
Subunit: 32769
Interface: ppd0.32769
Static RP Override: Off
Group Ranges:
224.0.0.0/4
Register State for RP:
Group Source FirstHop RP Address State Timeout
239.0.0.1 192.168.1.50 10.0.0.4 10.0.0.255 Receive 148
Anycast PIM local address used: 10.0.0.8
Always double-check the addresses used in the configuration. The peer and source address
are the addresses that will be used to setup the TCP session between the two routers.
A final check to end the verification of the MSDP anycast RP configuration:
....
35
3
354 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
35
4
355 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Instead of MSDP, this time we use the PIM protocol to provide for a working anycast-RP
solution inside the PIM SM domain. Instead of introducing a new protocol, this flavor of
anycast RP re-uses the PIM register messages between the RPs to have them synchronize
with each other.
Same as with the MSDP anycast-RP configuration, mind the addresses you are using in the
configuration. With PIM anycast-RP, the 'anycast-pim rp-set address' is the remote loopback
of the other anycast-RP router. The 'anycast-pim local-address' is the local loopback address.
lab@R3> show pim rps extensive
Instance: PIM.master
RP: 10.0.0.255
Learned via: static configuration
Mode: Sparse
Time Active: 00:00:38
Holdtime: 150
Device Index: 131
Subunit: 32769
Interface: ppd0.32769
Static RP Override: Off
Group Ranges:
224.0.0.0/4
Anycast PIM rpset:
10.0.0.8
RP: 10.0.0.255
Learned via: static configuration
Time Active: 00:00:51
Holdtime: 0
Device Index: 131
Subunit: 32769
Interface: ppd0.32769
Static RP Override: Off
Group Ranges:
224.0.0.0/4
35
Anycast PIM rpset:
5
10.0.0.3
356 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
After sending some multicast traffic:
35
6
357 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 2:
35
7
358 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
35
8
359 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
35
9
360 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R7:
set interfaces lo0.0 family inet address 172.16.1.254/32
set protocols pim interface all mode sparse
set protocols pim interface ge-0/0/0.0 disable
set protocols pim rp local family inet address 172.16.1.254
set protocols pim rp local family inet anycast-pim rp-set address
172.16.1.8
set protocols pim rp local family inet anycast-pim local-address
172.16.1.7
R8:
36
0
361 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
In draft Rosen, which is described in historic RFC 6037, a distinction is made between two
instances of PIM.
The first instance is the PIM P-instance, where the P stands for Provider. This instance of PIM
is the provider wide instance that runs on the backbone of the service provider. The PIM P-
instance of PIM provides for adjacencies between service provider routers, P and PE alike.
The second is the PIM C-instance, where the C stands for customer. This instance of PIM
runs on the edges, is VPN specific and runs between the PE and CE routers.
For this task, we start with the configuration of the P-instance of PIM. It will be a PIM-SM
domain using the PIM anycast RP mechanism.
To verify the neighbor PIM neighbor establishment:
To verify the mode and to see if the correct interfaces are enabled for PIM:
36
2
363 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
set routing-instances c1 protocols pim vpn-group-address 239.1.1.1
set routing-instances c1 protocols pim rp bootstrap family inet
priority 200
set routing-instances c1 protocols pim rp local address 10.4.4.4
set routing-instances c1 protocols pim interface all mode sparse
set routing-instances c1 protocols bgp export export-lo0
R6:
36
3
364 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
If the PIM P-instance is configured correctly, we should be able to see that all the customer
sites have learned the RP:
lab@R1> show pim rps instance c1-1
Instance: PIM.c1-1
Address family INET
RP address Type Holdtime Timeout Groups Group prefixes
10.4.4.4 bootstrap 150 117 1 224.0.0.0/4
36
Address family INET6
4
365 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Group: 224.2.2.2
Source: 10.0.0.5/32
Upstream interface: ge-0/0/4.99
Downstream interface list:
mt-0/0/0.32768
Session description: Multimedia Conference Calls
The traffic arrives at R2. In this case, the upstream interface is multicast tunnel interface.
Another command that can give a quick overview is the following command:
36
5
366 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
36
6
367 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Instance: PIM.c1
Interface IP V Mode Option Uptime Neighbor addr
ge-0/0/4.100 4 2 HPLGT 00:05:24 10.0.0.1
mt-0/0/0.32768 4 2 HPLGT 00:04:52 10.2.2.2
mt-0/0/0.32768 4 2 HPLGT 00:04:24 10.6.6.6
The multicast traffic is actually send across the multicast tunnel interface to both PE routers.
However, since the R2 PE does not have any interested receivers, the forwarding state is
pruned:
Group: 224.2.2.2
Source: 10.0.0.5/32
Upstream interface: mt-0/0/0.1081344
Session description: Multimedia Conference Calls
Statistics: 0 kBps, 2 pps, 133 packets
Next-hop ID: 0
Upstream protocol: PIM
Route state: Active
Forwarding state: Pruned
Cache lifetime/timeout: 360 seconds
Wrong incoming interface notifications: 0
Uptime: 00:02:13
On the R4 PE, we can see traffic received over the multicast tunnel interface. Only in this
case, there is an interested receiver. The interface towards the CE was added to the
downstream interface list, and the traffic is flowing towards the interested receiver:
Group: 224.2.2.2
Source: 10.0.0.5/32
Upstream interface: mt-0/0/0.1081344
Downstream interface list:
ge-0/0/4.100
Session description: Multimedia Conference Calls
Statistics: 0 kBps, 1 pps, 128 packets
Next-hop ID: 262154
36
Upstream protocol: PIM
7
Route state: Active
368 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Group: 224.3.3.3
Source: 10.0.0.5/32
Upstream interface: ge-0/0/4.99
Downstream interface list:
mt-0/0/0.32768
Session description: Unknown
Statistics: 0 kBps, 0 pps, 15 packets
Next-hop ID: 262160
Upstream protocol: PIM
Route state: Active
Forwarding state: Forwarding
Cache lifetime/timeout: 360 seconds
Wrong incoming interface notifications: 1
Uptime: 00:01:16
Group: 224.3.3.3
Source: 10.0.0.5/32
Upstream interface: mt-0/0/0.1081344
Downstream interface list:
ge-0/0/4.98
Session description: Unknown
Statistics: 0 kBps, 1 pps, 74 packets
Next-hop ID: 262159
Upstream protocol: PIM
Route state: Active
Forwarding state: Forwarding
36
Cache lifetime/timeout: 360 seconds
8
Wrong incoming interface notifications: 0
369 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Uptime: 00:01:15
Group: 224.3.3.3
Source: 10.0.0.5/32
Upstream interface: mt-0/0/0.1081344
Session description: Unknown
Statistics: 0 kBps, 1 pps, 73 packets
Next-hop ID: 0
Upstream protocol: PIM
Route state: Active
Forwarding state: Pruned
Cache lifetime/timeout: 360 seconds
Wrong incoming interface notifications: 1
Uptime: 00:01:16
36
9
370 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
set routing-instances c2 protocols pim interface all mode sparse
set routing-instances c2 protocols pim rp local address 10.4.4.4
set routing-instances c2 protocols bgp group cpe export export-lo0
R6:
set routing-instances c2 protocols pim interface all mode sparse
set routing-instances c2 protocols pim rp static address 10.4.4.4
37
0
371 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R2> show pim neighbors instance c2
Instance: PIM.c2
B = Bidirectional Capable, G = Generation Identifier,
H = Hello Option Holdtime, L = Hello Option LAN Prune Delay,
P = Hello Option DR Priority, T = Tracking Bit
Instance: PIM.c2
Interface IP V Mode Option Uptime Neighbor addr
ge-0/0/4.97 4 2 HPLGT 00:00:22 10.0.0.1
37
1
372 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R4:
set protocols ldp p2mp
set protocols bgp group ibgp family inet-mvpn signaling
R6:
Other P routers:
set protocols ldp p2mp
37
2
373 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
In NG MVPN, the forwarding and the signaling operations have been separated. The
signaling is something that is taken care of by a BGP address family called 'inet-mvpn ',
which we'll check later on. First, we'll examine the forwarding part of the NG MVPN by
looking into LDP.
The routing-instances on the R4 PE is configured with a 'provider-tunnel'. R4 will use BGP
to signal the other routers to setup a p2mp LDP signaled LSP. For R2 and R6 to succeed in
this, all the other P/PE routers need to have the p2mp capability enabled. To verify this, we
can check the following on every router:
lab@R2> show ldp overview | match Cap
Capabilities enabled: p2mp
On R4, we should see the following:
lab@R4> show ldp database p2mp extensive
Input label database, 172.16.1.4:0--172.16.1.3:0
Label Prefix
300096 P2MP root-addr 172.16.1.4, lsp-id 16777217
State: Active
Age: 4:37
lab@R4>
37
4
375 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
To verify BGP, we should check and make sure that all the BGP sessions support the two
required address families. The required address families are 'inet-vpn-unicast' (for the
MPLS VPN) and 'inet-mvpn' (for the multicast VPN part).
lab@R4> show bgp neighbor 172.16.1.2 | match NLRI.*session
NLRI for this session: inet-vpn-unicast inet-mvpn
The 'c2.inet.0' table contains the IPv4 prefix information for this customers. The 'c2.mvpn.0'
table is the multicast virtual private network route advertised by R4. The R4 router is
announcing the exact same c2.mvpn route towards both of the other PE routers:
lab@R4> show route advertising-protocol bgp 172.16.1.6 table c2.mvpn.0 extensive
NG MVPN, the PIM join that a PE receives from the customer is encoded in a BGP route
update. The format of this route is as follows:
{type}{active sender PE}{source AS}{C-S mask}{C-RP}{C-G mask}{C-G}
Now, let's look at the route that was send by R6 to R4 again:
6:172.16.1.4:8:65000:32:10.4.4.4:32:224.4.4.4
Type: 6
Active sender PE: 172.16.1.4:8
Source AS: 65000
C-S mask: 32
C-RP: 10.4.4.4
C-G mask: 32
C-G: 224.4.4.4
We can also examine the PIM join by issuing the following command:
Group: 224.4.4.4
Source: *
RP: 10.4.4.4
Flags: sparse,rptree,wildcard
Upstream protocol: BGP
Upstream interface: Through BGP
37
7
378 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
MVPN instance:
Legend for provider tunnel
I-P-tnl -- inclusive provider tunnel S-P-tnl -- selective provider tunnel
Legend for c-multicast routes properties (Pr)
DS -- derived from (*, c-g) RM -- remote VPN route
Family : INET
Instance : c2
MVPN Mode : RPT-SPT
Provider tunnel: I-P-tnl:LDP-P2MP:172.16.1.4, lsp-id 16777218
Neighbor I-P-tnl
172.16.1.2
172.16.1.6
C-mcast IPv4 (S:G) Ptnl St
0.0.0.0/0:224.3.3.3/32 LDP-P2MP:172.16.1.4, lsp-id 16777218 RM
0.0.0.0/0:224.4.4.4/32 LDP-P2MP:172.16.1.4, lsp-id 16777218 RM
MVPN instance:
Legend for provider tunnel
I-P-tnl -- inclusive provider tunnel S-P-tnl -- selective provider tunnel
Legend for c-multicast routes properties (Pr)
DS -- derived from (*, c-g) RM -- remote VPN route
Family : INET6
Instance : c2
MVPN Mode : RPT-SPT
Provider tunnel: I-P-tnl:LDP-P2MP:172.16.1.4, lsp-id 16777218
R6:
R2:
37
9
380 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
The LSP was changed from LDP signaled to RSVP signaled:
172.16.1.2
From: 172.16.1.4, State: Up, ActiveRoute: 0, LSPname:
172.16.1.2:172.16.1.4:6:mvpn:c2
ActivePath: (primary)
P2MP name: 172.16.1.4:6:mvpn:c2
LSPtype: Dynamic Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
Bandwidth: 10Mbps
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 20)
192.168.1.17 S 192.168.1.2 S
172.16.1.6
From: 172.16.1.4, State: Up, ActiveRoute: 0, LSPname:
172.16.1.6:172.16.1.4:6:mvpn:c2
ActivePath: (primary)
P2MP name: 172.16.1.4:6:mvpn:c2
38
LSPtype: Dynamic Configured
0
LoadBalance: Random
381 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
In the previous task, we saw that the R4 router used BGP to signal the other routers that an
LDP p2mp LSP would be used to forward traffic. In this case, the R4 router is updating R2 and
R6 that an RSVP signaled p2mp LSP will be used:
lab@R4> show route advertising-protocol bgp 172.16.1.2 table c2.mvpn.0 extensive
38
1
382 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
38
2
383 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
set firewall family inet filter mfc term 1 from protocol icmp
set firewall family inet filter mfc term 1 from source-address
1.1.1.1/32
set firewall family inet filter mfc term 1 then forwarding-class
gold
set firewall family inet filter mfc term 1 then count gold
set firewall family inet filter mfc term 1 then accept
set firewall family inet filter mfc term 2 from protocol icmp
set firewall family inet filter mfc term 2 from source-address
10.1.13.1/32
set firewall family inet filter mfc term 2 then forwarding-class
silver
R4:
set firewall family inet filter mfc term 1 from protocol icmp
set firewall family inet filter mfc term 1 from source-address
2.2.2.2/32
set firewall family inet filter mfc term 1 then forwarding-class
gold
set firewall family inet filter mfc term 1 then count gold
38
set firewall family inet filter mfc term 1 then accept 3
384 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
set firewall family inet filter mfc term 2 from protocol icmp
set firewall family inet filter mfc term 2 from source-address
10.1.24.2/32
set firewall family inet filter mfc term 2 then forwarding-class
silver
set firewall family inet filter mfc term 2 then count silver
set firewall family inet filter mfc term 2 then accept
set firewall family inet filter mfc term 3 then accept
38
4
385 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Counters:
Name Bytes Packets
gold 84 1
silver 84 1
38
5
386 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
R4:
R5:
custom-exp
set class-of-service forwarding-classes queue 1 gold
set class-of-service forwarding-classes queue 2 silver
38
7
388 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
[edit]
lab@R4# run show class-of-service interface ge-0/0/4.45
Logical interface: ge-0/0/4.45, Index: 74
Object Name Type Index
Rewrite exp-default exp (mpls-any) 33
Classifier custom-exp exp 46412
Classifier ipprec-compatibility ip 13
[edit]
lab@R4# run show class-of-service classifier name custom-exp
Classifier: custom-exp, Code point type: exp, Index: 46412
Code point Forwarding class Loss priority
000 best-effort low
001 best-effort high
010 silver high
011 gold high
100 silver low
101 gold low
110 network-control low
111 network-control high
38
8
389 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
38
9
390 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
root@R3# run clear firewall all
39
0
391 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!
--- 2.2.2.2 ping statistics ---
1000 packets transmitted, 1000 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.323/2.646/22.828/2.210 ms
[edit]
lab@R1# run ping 2.2.2.2 rapid count 1000
PING 2.2.2.2 (2.2.2.2): 56 data bytes
39
1
392 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
39
2
393 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!
--- 2.2.2.2 ping statistics ---
1000 packets transmitted, 1000 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.307/2.474/28.111/2.280 ms
39
3
394 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Filter: mfc
Counters:
Name Bytes Packets
gold 84000 1000
silver 84000 1000
Policers:
Name Bytes Packets
soft-limit 1702
If we would not have used the filter-specific knob, and we would have performed the exact
same test, the output would have looked like this:
Filter: mfc
Counters:
Name Bytes Packets
gold 84000 1000
silver 84000 1000
Policers:
Name Bytes Packets
soft-limit-1 851
soft-limit-2 856
39
4
395 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3 and R4:
39
6
397 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R3# run show class-of-service scheduler-map sm
Packets : 34 0 pps
Bytes : 3604 0 bps
[…skipped…]
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!
--- 2.2.2.2 ping statistics ---
100 packets transmitted, 100 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.619/2.556/8.104/1.907 ms
[…skipped…]
39
9
400 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
40
0
401 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
Configuration:
R3:
R4:
R5:
40
3
404 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
40
4
405 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
R3:
40
5
406 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
40
6
407 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
40
7
408 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Configuration:
R3:
40
8
409 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
lab@R1> ping 2.2.2.2 source 1.1.1.1 count 1000 rapid
[…skipped…]
Policers:
Name Bytes Packets
hard-limit-1-R3-R4 15
40
9
410 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Lab introduction:
Load the initial configuration on all devices using the files provided with this INETZERO
workbook. You are allowed to perform configuration changes only on devices SRX1 to SRX8
and the RR. To verify the results of your work, you can use operational commands on the VR
device.
You can use username lab with password lab123 to access all the devices. Please, do not
change the password for users lab and root!
To load the initial configuration on all the devices, issue the ‘load override terminal’
command
[edit]
lab@srx1# load override terminal
[Type ^D at a new line to end input]
On all devices:
[edit]
lab@srx1# show system services
ssh {
root-login deny;
}
telnet;
• Make sure that console sessions will logout automatically when the console cable is
disconnected.
On all devices:
[edit]
lab@srx1# show system
host-name srx1; 41
0
authentication-order radius;
411 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
ports {
console log-out-on-disconnect;
}
• Ensure that 10.10.10.1 is resolved by name S1.inetzero.com.
On all devices:
[edit]
lab@srx1# show system
static-host-mapping {
S1.inetzero.com inet 10.10.10.1;
}
Verification:
[edit]
lab@srx1# run ping S1.inetzero.com
PING S1.inetzero.com (10.10.10.1): 56 data bytes
^C
On all devices:
[edit]
lab@srx1# show routing-options
On all devices:
[edit]
lab@srx1# show system
radius-server {
10.10.10.1 secret "$9$n5yoCORx7VsgJvWX-wgUDn/CuBE"; ## SECRET-DATA
}
• Authentication should only be performed against a local database when the Radius 41
server times out. 1
412 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On all devices:
[edit]
lab@srx1# show system
authentication-order radius;
Verification:
login as: lab
Using keyboard-interactive authentication.
Password:
Using keyboard-interactive authentication.
Local password:
--- JUNOS 12.1X46-D10 built 2013-12-05 15:04:51 UTC
lab@srx1>
On all devices:
[edit]
lab@srx1# show system login
class operations {
idle-timeout 5;
permissions [ network secret view view-configuration ];
[edit]
lab@srx1# show system login
class super-remote {
permissions all;
deny-commands "start shell";
}
user remote {
uid 2003;
class super-remote;
}
On all devices:
[edit]
lab@srx1# show system
archival {
configuration {
transfer-on-commit;
}
}
• Use “ftp” and “ftp123” as username/password to access the FTP server.
On all devices:
[edit]
lab@srx1# show system
On all devices:
[edit]
lab@srx1# show groups 41
family_mpls { 3
interfaces {
414 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
<*> {
unit <*> {
family mpls;
}
}
}
}
[edit]
lab@srx1# set interfaces apply-groups family_mpls
[edit]
lab@srx1# show interfaces
ge-0/0/0 {
unit 0 {
apply-groups-except family_mpls;
description "=== management connection ===";
family inet {
address 10.10.1.1/24;
}
}
}
Verification:
[edit]
lab@srx1# show interfaces | display inheritance
ge-0/0/0 {
unit 0 {
apply-groups-except family_mpls;
description "=== management connection ===";
family inet {
address 10.10.1.1/24;
}
}
}
}
• The connection between SRX3 and SRX4 needs more bandwidth. Configure an
Aggregated Ethernet interface bundle using the ge-0/0/1 and ge-0/0/2 physical
interfaces. Make sure that if one of the links is down, the Aggregated interface is
declared down. Adjust the configuration to reflect the change.
On SRX3 and SRX4 devices:
[edit]
lab@srx3# set chassis aggregated-devices ethernet device-count 1
[edit]
lab@srx3# copy interfaces ge-0/0/1 to ae0
[edit]
lab@srx3# delete interfaces ge-0/0/1 unit 0
[edit]
lab@srx3# set interfaces ge-0/0/1 gigether-options 802.3ad ae0
[edit]
lab@srx3# set interfaces ge-0/0/1 description "=== Link 1 to SRX4 ==="
[edit]
lab@srx3# set interfaces ge-0/0/2 gigether-options 802.3ad ae0
[edit]
lab@srx3# set interfaces ge-0/0/2 description "=== Link 2 to SRX4 ==="
[edit]
lab@srx3# set interfaces ae0 aggregated-ether-options lacp active
[edit]
lab@srx3# rename protocols ospf area 0 interface ge-0/0/4.34 to interface ae0.0
Verification:
[edit]
lab@srx4# set interfaces ge-0/0/1 disable
[edit]
lab@srx4# commit
commit complete
[edit]
lab@srx4# run show interfaces terse ae0
Interface Admin Link Proto Local Remote
ae0 up down
ae0.0 up down inet 172.30.0.22/30
41
5
416 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On all devices:
[edit]
lab@srx1# show firewall
family inet {
filter protect.RE {
term accept.ssh {
from {
port ssh;
}
then accept;
}
term accept.telnet {
from {
port telnet;
}
then accept;
}
term accept.rip {
from {
protocol udp;
port rip;
}
then accept;
}
term accept.bgp {
}
term accept.rsvp {
from {
protocol rsvp;
}
then accept;
}
term accept.ldp {
from {
port ldp;
}
then accept;
}
term accept.traceroute {
from {
protocol udp;
port 33434-33464;
}
then accept;
}
term accept.icmp {
from {
protocol icmp;
}
then accept;
}
}
}
family inet6 {
filter protect.ipv6.RE {
term accept.ospf3 {
from {
next-header ospf;
}
then accept;
}
• Apply this firewall filter to the loopback interface in the input direction.
On all devices
[edit]
lab@srx1# show interfaces lo0
apply-groups-except family_mpls;
unit 0 {
family inet {
filter {
input protect.RE;
}
address 172.30.30.1/32;
}
family inet6 {
filter {
input protect.ipv6.RE;
}
}
}
• All other traffic should be denied and logged.
On all devices:
[edit]
lab@srx1# show firewall family inet filter protect.RE
term discard.all {
then {
log;
syslog;
discard;
}
}
On all devices:
41
[edit] 8
lab@srx1# show firewall family inet filter protect.RE term accept.telnet
419 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
from {
source-address {
192.168.1.0/255.255.1.0;
}
port telnet;
}
then accept;
Task 1.8: Advanced RE protection
• On all routers that use BGP, modify the firewall filter from task 1.6 so that all
configured BGP peers (including the one from the routing-instances) are
automatically put in the compiled firewall filter.
On all devices:
[edit]
lab@srx1# show policy-options
prefix-list bgp.neighbors {
apply-path "protocols bgp group <*> neighbor <*>";
}
prefix-list bgp.neighbors.routing.instance {
apply-path "routing-instances <*> protocols bgp group <*> neighbor <*>";
}
[edit]
lab@srx1# show firewall family inet filter protect.RE term accept.bgp
from {
source-prefix-list {
bgp.neighbors;
bgp.neighbors.routing.instance;
}
port bgp;
41
9
420 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 2: IGP
Task 2.1: Troubleshooting
• Make sure that all OSPF and IS-IS adjacencies are established according to the
diagram.
• Ensure that SRX3 never sends Type 2 LSAs.
Troubleshooting SRX1 OSPF neighbors:
[edit]
lab@srx1# run show ospf neighbor
Address Interface State ID Pri Dead
172.30.0.2 ge-0/0/4.13 2Way 3.3.3.3 0 35
172.30.0.10 ge-0/0/4.14 Full 172.30.30.4 128 39
[edit]
lab@srx1# show protocols ospf
area 0.0.0.0 {
interface ge-0/0/4.13 {
priority 0;
}
interface ge-0/0/4.14 {
interface-type p2p;
}
}
[edit]
lab@srx3# show protocols
ospf {
area 0.0.0.0 {
interface ge-0/0/4.13 {
[edit]
lab@srx1# commit
commit complete
[edit]
lab@srx1# run show ospf neighbor
Address Interface State ID Pri Dead
172.30.0.2 ge-0/0/4.13 Full 3.3.3.3 0 38
172.30.0.10 ge-0/0/4.14 Full 172.30.30.4 128 33
Troubleshooting SRX5 OSPF neighbors:
[edit]
lab@srx5# run show ospf neighbor
Address Interface State ID Pri Dead
172.30.0.29 ge-0/0/4.35 Full 3.3.3.3 128 33
172.30.0.42 ge-0/0/4.56 Full 172.30.30.6 128 31
[edit]
lab@srx5# show protocols ospf
area 0.0.0.0 {
interface ge-0/0/4.35 {
interface-type p2p;
}
interface ge-0/0/4.45 {
interface-type p2p;
}
interface ge-0/0/4.56 {
interface-type p2p;
}
interface ge-0/0/4.57 {
interface-type p2p;
authentication {
[edit]
lab@srx5# rename interfaces lo0.0 family inet address 172.30.30.4/32 to address
172.30.30.5/32
[edit]
lab@srx5# run show ospf neighbor
Address Interface State ID Pri Dead 42
1
172.30.0.29 ge-0/0/4.35 Full 3.3.3.3 128 37
422 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx5# set protocols ospf traceoptions file OSPF_log
[edit]
lab@srx5# set protocols ospf traceoptions file size 10m
[edit]
lab@srx5# set protocols ospf traceoptions flag all
[edit]
lab@srx5# commit
commit complete
[edit]
lab@srx5# run show log OSPF_log | match authentication
Nov 21 13:52:54.863670 OSPF authentication key with key-id 10 active (gen_time :
0, now : 1416577974)
Nov 21 13:52:56.786645 OSPF packet ignored: authentication failure (missing key-
id).
Nov 21 13:52:56.786781 OSPF packet ignored: authentication failure from
172.30.0.46
Nov 21 13:53:05.480469 OSPF packet ignored: authentication failure (missing key-
id).
Nov 21 13:53:05.480605 OSPF packet ignored: authentication failure from
172.30.0.46
Nov 21 13:53:15.269870 OSPF packet ignored: authentication failure (missing key-
id).
Nov 21 13:53:15.270006 OSPF packet ignored: authentication failure from
172.30.0.46
Nov 21 13:53:23.714098 OSPF packet ignored: authentication failure (missing key-
id).
Nov 21 13:53:23.714234 OSPF packet ignored: authentication failure from
172.30.0.46
[edit]
lab@srx5# commit
commit complete
[edit]
lab@srx5# run show ospf neighbor
Address Interface State ID Pri Dead
172.30.0.29 ge-0/0/4.35 Full 3.3.3.3 128 37
172.30.0.33 ge-0/0/4.45 Full 172.30.30.4 128 37
172.30.0.42 ge-0/0/4.56 Full 172.30.30.6 128 38
172.30.0.46 ge-0/0/4.57 Full 172.30.30.7 128 33
Troubleshooting SRX7 IS-IS adjacencies:
[edit]
lab@srx7# run show isis adjacency 42
2
Interface System L State Hold (secs) SNPA
423 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set interfaces ge-0/0/4.67 family iso
[edit]
lab@srx7# commit
commit complete
[edit]
lab@srx7# run show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/4.67 srx6 2 Up 25 0:c:29:84:c5:5c
ge-0/0/5.78 srx8 1 Up 8 0:c:29:b1:d0:75
Troubleshooting SRX8 IS-ISadjacencies:
[edit]
lab@srx8# run show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/4.68 0172.3030.0006 1 Initializing 24 0:c:29:84:c5:5c
ge-0/0/5.78 srx7 1 Up 26 0:c:29:99:d8:93
lab@srx8# commit
commit complete
[edit]
lab@srx8# run show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/4.68 srx6 1 Up 22 0:c:29:84:c5:5c
ge-0/0/5.78 srx7 1 Up 22 0:c:29:99:d8:93
• All OSPF routers should be represented with their 172.30.30.x IP address in the
neighbor table. You are not allowed to use the ‘router-id’ command.
[edit]
lab@srx3# show interfaces lo0.0
family inet {
address 172.30.30.3/32;
address 3.3.3.3/32;
}
[edit]
lab@srx3# set interfaces lo0.0 family inet address 172.30.30.3/32 primary
[edit]
lab@srx3# commit
commit complete
Verification:
[edit]
lab@srx2# run show ospf neighbor
Address Interface State ID Pri Dead
172.30.0.14 ge-0/0/4.23 Full 172.30.30.3 128 39
172.30.0.18 ge-0/0/4.24 Full 172.30.30.4 128 32
On All devices:
[edit]
lab@srx1# set protocols ospf area 0 interface lo0.0 passive
[edit]
lab@srx1# commit
commit complete
On SRX3 devices:
[edit]
lab@srx3# delete protocols ospf area 0 interface lo0.0 42
4
425 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx3# set protocols ospf area 0 interface 172.30.30.3 passive
[edit]
lab@srx3# commit
commit complete
Verification:
[edit]
lab@srx4# run show route 172.30.30.3
On SRX3 devices:
[edit]
lab@srx3# show policy-options
policy-statement adv.to.ospf {
term adv.loopback {
from {
route-filter 3.3.3.3/32 exact;
}
then accept;
}
}
[edit]
[edit]
lab@srx3# commit
commit complete
Verification:
[edit]
lab@srx4# run show route 3.3.3.3
[edit]
lab@srx1# set protocols rip group RIP neighbor ge-0/0/4.200
[edit]
lab@srx1# set policy-options policy-statement adv.to.rip term 1 from protocol ospf
[edit]
lab@srx1# set policy-options policy-statement adv.to.rip term 1 from protocol
direct
[edit]
lab@srx1# set policy-options policy-statement adv.to.rip term 1 then accept
[edit]
lab@srx1# set protocols rip group RIP export adv.to.rip
[edit]
lab@srx1# set policy-options policy-statement adv.to.ospf term 1 from protocol rip
[edit]
lab@srx1# set policy-options policy-statement adv.to.ospf term 1 from protocol
direct
[edit]
lab@srx1# set policy-options policy-statement adv.to.ospf term 1 then accept
[edit]
lab@srx1# set protocols ospf export adv.to.ospf
[edit]
lab@srx2# set interfaces ge-0/0/4.200 vlan-id 200 family inet address
172.30.80.2/24
[edit]
lab@srx2# set protocols rip group RIP neighbor ge-0/0/4.200
[edit]
lab@srx2# set policy-options policy-statement adv.to.rip term 1 from protocol ospf
[edit]
lab@srx2# set policy-options policy-statement adv.to.rip term 1 from protocol
direct
[edit]
lab@srx2# set policy-options policy-statement adv.to.rip term 1 then accept
[edit] 42
lab@srx2# set protocols rip group RIP export adv.to.rip 6
427 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx2# set policy-options policy-statement adv.to.ospf term 1 from protocol rip
[edit]
lab@srx2# set policy-options policy-statement adv.to.ospf term 1 from protocol
direct
[edit]
lab@srx2# set policy-options policy-statement adv.to.ospf term 1 then accept
[edit]
lab@srx2# set protocols ospf export adv.to.ospf
[edit]
lab@srx2# commit
commit complete
Verification:
[edit]
lab@srx1# run show rip neighbor
Local Source Destination Send Receive In
Neighbor State Address Address Mode Mode Met
-------- ----- ------- ----------- ---- ------- ---
ge-0/0/4.200 Up 172.30.80.1 224.0.0.9 mcast both 1
[edit]
lab@srx2# run show rip neighbor
Local Source Destination Send Receive In
Neighbor State Address Address Mode Mode Met
-------- ----- ------- ----------- ---- ------- ---
ge-0/0/4.200 Up 172.30.80.2 224.0.0.9 mcast both 1
[edit]
lab@srx1# run show route protocol rip terse
[edit]
lab@srx1# run show route advertising-protocol rip 172.30.80.1 terse
[edit]
lab@srx1# set policy-options policy-statement adv.from.rip term 1 then reject
[edit]
lab@srx1# set policy-options policy-statement adv.from.rip term 2 then accept
[edit]
lab@srx1# set protocols rip group RIP neighbor ge-0/0/4.200 import adv.from.rip
[edit]
lab@srx1# commit
commit complete
[edit]
lab@srx2# set policy-options policy-statement adv.from.rip term 1 from next-hop
172.30.80.1
[edit]
lab@srx2# set policy-options policy-statement adv.from.rip term 1 then reject
[edit]
lab@srx2# set policy-options policy-statement adv.from.rip term 2 then accept
[edit]
lab@srx2# set protocols rip group RIP neighbor ge-0/0/4.200 import adv.from.rip
[edit]
lab@srx2# commit
commit complete
Verification:
[edit]
lab@srx2# run show route protocol rip
42
9
inet.0: 569 destinations, 603 routes (568 active, 0 holddown, 1 hidden)
430 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On SRX1 and SRX2 devices:
[edit]
lab@srx1# set policy-options policy-statement adv.to.ospf term 1 then external
type 1
[edit]
lab@srx1# commit
commit complete
[edit]
lab@srx2# set policy-options policy-statement adv.to.ospf term 1 then external
type 1
[edit]
On SRX6, SRX7 and SRX8 devices:
[edit]
lab@srx6# set protocols isis level 1 authentication-type md5
[edit]
lab@srx6# set protocols isis level 1 authentication-key inetzero
[edit]
lab@srx6# set protocols isis level 2 authentication-type md5
[edit]
lab@srx6# set protocols isis level 2 authentication-key inetzero
[edit]
lab@srx6# set protocols isis level 1 no-csnp-authentication
[edit]
lab@srx6# set protocols isis level 1 no-psnp-authentication
[edit]
lab@srx6# set protocols isis level 2 no-csnp-authentication
[edit]
[edit]
lab@srx6# commit
commit complete
Verification:
[edit]
lab@srx6# run show isis authentication
Interface Level IIH Auth CSN Auth PSN Auth
ge-0/0/4.67 2 MD5 None None
ge-0/0/4.68 1 MD5 None None
• Ensure that traffic is not black holed when SRX6 or SRX7 lose their connection to the
OSPF area. Make sure there are no routing loops after redistribution and make sure
that the network has full IP reachability.
On SRX6 device:
[edit]
lab@srx6# set policy-options policy-statement condition.default term 1 from
protocol ospf
[edit]
lab@srx6# set policy-options policy-statement condition.default term 1 from route-
filter 172.30.30.5/32 exact
[edit]
lab@srx6# set policy-options policy-statement condition.default term 1 then accept
[edit]
lab@srx6# set policy-options policy-statement condition.default term 2 from
protocol ospf
[edit]
lab@srx6# set policy-options policy-statement condition.default term 2 from route-
filter 172.30.0.4/32 exact
[edit]
lab@srx6# set policy-options policy-statement condition.default term 2 then accept
[edit]
lab@srx6# set policy-options policy-statement condition.default term 3 from
protocol ospf
[edit]
lab@srx6# set policy-options policy-statement condition.default term 3 from route-
[edit]
lab@srx6# set policy-options policy-statement condition.default term 3 then accept
[edit]
lab@srx6# set policy-options policy-statement condition.default term last then
reject
[edit]
lab@srx6# set routing-options generate route 0.0.0.0/0 policy condition.default
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term reject.tag.200 from
protocol isis
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term reject.tag.200 from
tag 200
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term reject.tag.200 then 43
2
reject
433 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term 1 from protocol
isis
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term 1 from protocol
direct
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term 1 then tag 100
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf term 1 then accept
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term reject.tag.100 from
protocol ospf
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term reject.tag.100 from
tag 100
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term reject.tag.100 then
reject
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term 2 from route-filter
0.0.0.0/0 exact
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term 2 then tag 200
[edit]
lab@srx6# set protocols ospf export adv.to.ospf
[edit]
lab@srx6# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set policy-options policy-statement condition.default term 1 from
protocol ospf
[edit]
lab@srx7# set policy-options policy-statement condition.default term 1 from route-
filter 172.30.30.5/32 exact
[edit]
lab@srx7# set policy-options policy-statement condition.default term 1 then accept
43
3
[edit]
434 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set policy-options policy-statement condition.default term 2 from route-
filter 172.30.0.3/32 exact
[edit]
lab@srx7# set policy-options policy-statement condition.default term 2 then accept
[edit]
lab@srx7# set policy-options policy-statement condition.default term last then
reject
[edit]
lab@srx7# set routing-options generate route 0.0.0.0/0 policy condition.default
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf term reject.tag from
protocol isis
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf term reject.tag from tag
200
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf term reject.tag then
reject
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf term 1 from protocol
isis
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf term 1 from protocol
direct
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf term 1 then accept
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term reject.tag.100 from
protocol ospf
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term reject.tag.100 from
tag 100
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term reject.tag.100 then
reject
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 2 from route-filter
43
0.0.0.0/0 exact
4
435 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 2 then tag 200
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 2 then accept
[edit]
lab@srx7# set protocols ospf export adv.to.ospf
[edit]
lab@srx7# set protocols isis export adv.to.isis
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx8# run show route 0.0.0.0/0 exact
[edit]
lab@srx5# run show route 172.30.30.8/32
[edit]
lab@srx7# deactivate interfaces ge-0/0/4.57
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx8# run show route 0.0.0.0/0 exact
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 14 family inet6
[edit]
lab@srx1# set protocols ospf3 area 0 interface ge-0/0/4.13 interface-type p2p
[edit]
lab@srx1# set protocols ospf3 area 0 interface ge-0/0/4.14 interface-type p2p
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx1# run show ospf3 neighbor
ID Interface State Pri Dead
172.30.30.3 ge-0/0/4.13 Full 128 32
Neighbor-address fe80::20c:2900:dbd:ff4c
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf3 term reject.tag.200
then reject
[edit]
lab@srx6# set policy-options policy-statement adv.to.ospf3 term 1 from protocol
isis 43
6
[edit]
437 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx6# set protocols ospf3 export adv.to.ospf3
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term 3 from route-filter
::/0 exact
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term 3 then accept tag
200
[edit]
lab@srx6# set routing-options rib inet6.0 aggregate route ::/0
[edit]
lab@srx6# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf3 term reject.tag.200
from protocol isis tag 200
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf3 term reject.tag.200
then reject
[edit]
lab@srx7# set policy-options policy-statement adv.to.ospf3 term 1 from protocol
isis
[edit]
lab@srx7# set protocols ospf3 export adv.to.ospf3
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 3 from route-filter
::/0 exact
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 3 then accept tag
200
[edit]
lab@srx7# set routing-options rib inet6.0 aggregate route ::/0
[edit]
lab@srx7# commit
commit complete 43
7
438 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
[edit]
lab@srx5# run show route fd17:f0f4:fe:f:0::/64
inet6.0: 127 destinations, 146 routes (24 active, 0 holddown, 119 hidden)
+ = Active Route, - = Last Active, * = Both
[edit]
lab@srx8# run show route table inet6.0
On SRX6 device:
[edit]
lab@srx6# set protocols isis topologies ipv6-unicast
[edit]
lab@srx6# set protocols isis interface ge-0/0/4.68 level 1 ipv6-unicast-metric 50
[edit]
lab@srx6# commit
commit complete
On SRX7 device:
43
8
[edit]
439 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# delete protocols isis overload
[edit]
lab@srx7# commit
commit complete
On SRX8 device:
[edit]
lab@srx8# set protocols isis topologies ipv6-unicast
[edit]
lab@srx8# set protocols isis interface ge-0/0/4.68 level 1 ipv6-unicast-metric 50
[edit]
lab@srx8# commit
commit complete
Verification:
When R7 is unavailable:
lab@srx8# run show route table inet6.0 protocol isis
[edit]
lab@srx8# run show route table inet6.0 protocol isis
No static routes are allowed if not explicitly permitted by the particular task.
On All OSPF enabled devices:
[edit]
lab@srx1# set policy-options policy-statement load.balance term 1 from protocol
ospf
[edit]
lab@srx1# set policy-options policy-statement load.balance term 1 then load-
balance per-packet
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx5# run show route forwarding-table destination 172.16.40.0/30
Routing table: default.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
172.16.40.0/30 user 0 ulst 262153 23
172.30.0.29 ucst 594 12 ge-0/0/4.35
172.30.0.33 ucst 597 8 ge-0/0/4.45
44
1
442 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 3: MPLS
Task 3.1: MPLS and RSVP configuration
• Enable the MPLS and RSVP protocols on the routers that are part of the OSPF
domain.
• Ensure that a syslog message is generated when an LSP state is changed.
On All devices:
[edit]
lab@srx1# set protocols mpls interface all
[edit]
lab@srx1# set protocols mpls interface ge-0/0/0.0 disable
[edit]
lab@srx1# set protocols mpls log-updown syslog
[edit]
lab@srx1# set protocols rsvp interface all
[edit]
lab@srx1# set protocols rsvp interface ge-0/0/0.0 disable
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx1# set protocols ospf traffic-engineering
[edit]
lab@srx1# commit 44
2
commit complete
443 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On SRX6, SRX7 and SRX8 devices:
[edit]
lab@srx6# set protocols isis traffic-engineering disable
[edit]
lab@srx6# commit
commit complete
• Configure the interface between SRX2 and SRX3 to allow only half of the bandwidth
to be reserved for RSVP.
[edit]
lab@srx2# set protocols rsvp interface ge-0/0/4.23 subscription 50
[edit]
lab@srx2# commit
commit complete
Verification:
[edit]
lab@srx2# run show rsvp interface
RSVP interface: 4 active
Active Subscr- Static Available Reserved Highwater
Interface State resv iption BW BW BW mark
ge-0/0/4.200Up 0 100% 1000Mbps 1000Mbps 0bps 0bps
ge-0/0/4.23 Up 0 50% 1000Mbps 500Mbps 0bps 0bps
ge-0/0/4.24 Up 0 100% 1000Mbps 1000Mbps 0bps 0bps
sp-0/0/0.0 Up 0 100% 800Mbps 800Mbps 0bps 0bps
On All devices:
[edit]
lab@srx1# set protocols mpls admin-groups red 1
[edit]
lab@srx1# set protocols mpls admin-groups blue 2
[edit]
lab@srx1# set protocols mpls admin-groups green 3
[edit]
lab@srx1# set protocols mpls admin-groups yellow 4
On SRX1 device:
[edit] 44
3
lab@srx1# set protocols mpls interface ge-0/0/4.13 admin-group yellow
444 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# set protocols mpls interface ge-0/0/4.14 admin-group green
[edit]
lab@srx1# commit
commit complete
On SRX2 device:
[edit]
lab@srx2# set protocols mpls interface ge-0/0/4.23 admin-group red
[edit]
lab@srx2# set protocols mpls interface ge-0/0/4.23 admin-group blue
[edit]
lab@srx2# set protocols mpls interface ge-0/0/4.24 admin-group yellow
[edit]
lab@srx2# commit
commit complete
On SRX3 device:
[edit]
lab@srx3# set protocols mpls interface ae0.0 admin-group blue
[edit]
lab@srx3# set protocols mpls interface ge-0/0/4.13 admin-group yellow
[edit]
lab@srx3# set protocols mpls interface ge-0/0/4.23 admin-group red
[edit]
[edit]
lab@srx3# set protocols mpls interface ge-0/0/4.35 admin-group red
[edit]
lab@srx3# set protocols mpls interface ge-0/0/4.37 admin-group green
[edit]
lab@srx3# commit
commit complete
On SRX4 device:
[edit]
lab@srx4# set protocols mpls interface ge-0/0/4.14 admin-group green
[edit]
lab@srx4# set protocols mpls interface ae0.0 admin-group blue
[edit] 44
lab@srx4# set protocols mpls interface ge-0/0/4.24 admin-group yellow 4
445 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx4# set protocols mpls interface ge-0/0/4.45 admin-group yellow
[edit]
lab@srx4# set protocols mpls interface ge-0/0/4.46 admin-group blue
[edit]
lab@srx4# commit
commit complete
On SRX5 device:
[edit]
lab@srx5# set protocols mpls interface ge-0/0/4.35 admin-group red
[edit]
lab@srx5# set protocols mpls interface ge-0/0/4.45 admin-group yellow
[edit]
lab@srx5# set protocols mpls interface ge-0/0/4.57 admin-group red
[edit]
lab@srx5# set protocols mpls interface ge-0/0/4.56 admin-group green
[edit]
lab@srx5# commit
commit complete
On SRX6 device:
[edit]
lab@srx6# set protocols mpls interface ge-0/0/4.46 admin-group blue
[edit]
lab@srx6# set protocols mpls interface ge-0/0/4.56 admin-group green
[edit]
lab@srx6# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set protocols mpls interface ge-0/0/4.57 admin-group red
[edit]
lab@srx7# set protocols mpls interface ge-0/0/4.57 admin-group blue
[edit]
lab@srx7# set protocols mpls interface ge-0/0/4.37 admin-group green
[edit]
lab@srx7# commit 44
commit complete 5
446 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
[edit]
lab@srx1# run show mpls interface
Interface State Administrative groups (x: extended)
ge-0/0/4.200 Up <none>
ge-0/0/4.400 Up <none>
ge-0/0/4.13 Up yellow
ge-0/0/4.14 Up green
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx7 to 172.30.30.7
[edit]
lab@srx2# set protocols ospf area 0.0.0.0 interface ge-0/0/4.23 te-metric 100
[edit]
lab@srx2# commit
commit complete
On SRX3 device:
[edit]
[edit]
lab@srx3# set protocols ospf area 0.0.0.0 interface ge-0/0/4.37 te-metric 100
[edit]
lab@srx3# commit
commit complete
On SRX4 device:
[edit]
lab@srx4# set protocols ospf area 0.0.0.0 interface ge-0/0/4.46 te-metric 100
[edit]
lab@srx4# commit
commit complete
Verification:
[edit] 44
lab@srx2# run show mpls lsp name srx2-to-srx7 extensive 6
Ingress LSP: 3 sessions
447 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
172.30.30.7
From: 172.30.30.2, State: Up, ActiveRoute: 0, LSPname: srx2-to-srx7
ActivePath: (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 3)
172.30.0.18 S 172.30.0.34 S 172.30.0.46 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
172.30.30.4(flag=0x29) 172.30.0.18(flag=9 Label=301312) 172.30.30.5(flag=0x20)
172.30.0.34(Label=300256) 172.30.30.7(flag=0x20) 172.30.0.46(Label=3)
117 Jan 1 07:12:47.792 Record Route: 172.30.30.4(flag=0x29) 172.30.0.18(flag=9
Label=301312) 172.30.30.5(flag=0x20) 172.30.0.34(Label=300256)
172.30.30.7(flag=0x20) 172.30.0.46(Label=3)
116 Jan 1 07:12:44.919 Selected as active path
115 Jan 1 07:12:44.918 Record Route: 172.30.30.4(flag=0x20)
172.30.0.18(Label=301312) 172.30.30.5(flag=0x20) 172.30.0.34(Label=300256)
172.30.30.7(flag=0x20) 172.30.0.46(Label=3)
114 Jan 1 07:12:44.918 Up
113 Jan 1 07:12:44.755 Originate Call
112 Jan 1 07:12:44.755 CSPF: computation result accepted 172.30.0.18
172.30.0.34 172.30.0.46
• Configure an LSP from SRX7 to SRX2 with a primary path that only crosses red links.
Configure a secondary path for this LSP that only crosses blue links. Both paths
should have a bandwidth reservation of 400m. The secondary path should be pre-
signaled and ready for use.
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 adaptive
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 primary srx7-srx2-
primary bandwidth 400m
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 primary srx7-srx2-
primary admin-group include-all red
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 secondary srx7-srx2-
secondary bandwidth 400m
44
7
[edit]
448 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 secondary srx7-srx2-
secondary admin-group include-all blue
[edit]
lab@srx7# set protocols mpls path srx7-srx2-primary
[edit]
lab@srx7# set protocols mpls path srx7-srx2-secondary
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx7# run show mpls lsp name srx7-to-srx2 extensive
Ingress LSP: 6 sessions
172.30.30.2
From: 172.30.30.7, State: Up, ActiveRoute: 0, LSPname: srx7-to-srx2
ActivePath: srx7-srx2-primary (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary srx7-srx2-primary State: Up
Priorities: 7 0
Bandwidth: 400Mbps
SmartOptimizeTimer: 180
Include All: red
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 102)
On SRX1 device:
[edit]
lab@srx1# set protocols mpls label-switched-path srx1-to-srx6 to 172.30.30.6
[edit]
lab@srx1# set protocols mpls label-switched-path srx1-to-srx6 primary to-srx6-1
hop-limit 3
[edit]
lab@srx1# set protocols mpls path to-srx6-1
[edit]
lab@srx1# set protocols mpls path to-srx6-2 172.30.30.3 loose
[edit]
lab@srx1# set protocols mpls path to-srx6-2 172.30.30.5 loose
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx1# run show mpls lsp name srx1-to-srx6 extensive 44
9
Ingress LSP: 3 sessions
450 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
172.30.30.6
From: 172.30.30.1, State: Up, ActiveRoute: 0, LSPname: srx1-to-srx6
ActivePath: to-srx6-1 (primary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary to-srx6-1 State: Up
Priorities: 7 0
Hoplimit: 3
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 101)
172.30.0.10 S 172.30.0.38 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
172.30.0.10 172.30.0.38
5 Dec 31 07:34:06.597 Selected as active path
4 Dec 31 07:34:06.587 Record Route: 172.30.0.10 172.30.0.38
3 Dec 31 07:34:06.587 Up
2 Dec 31 07:34:06.507 Originate Call
1 Dec 31 07:34:06.507 CSPF: computation result accepted 172.30.0.10
172.30.0.38
Secondary to-srx6-2 State: Dn
Priorities: 7 0
SmartOptimizeTimer: 180
Created: Wed Dec 31 07:33:36 2014
[edit]
lab@srx1# deactivate protocols mpls label-switched-path srx1-to-srx6 primary to-
srx6-1
Verification:
[edit]
lab@srx1# run show mpls lsp name srx1-to-srx6 extensive
172.30.30.6
From: 172.30.30.1, State: Up, ActiveRoute: 0, LSPname: srx1-to-srx6
ActivePath: to-srx6-2 (secondary)
LSPtype: Static Configured
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Secondary to-srx6-2 State: Up
Priorities: 7 0
SmartOptimizeTimer: 180
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt
20=Node-ID):
172.30.0.2 172.30.0.30 172.30.0.42
4 Jan 3 07:44:22.834 Selected as active path
3 Jan 3 07:44:22.833 Record Route: 172.30.0.2 172.30.0.30 172.30.0.42
2 Jan 3 07:44:22.833 Up
1 Jan 3 07:44:22.715 Originate Call
Created: Wed Dec 31 07:33:37 2014
Total 1 displayed, Up 1, Down 0
[edit] 45
0
lab@srx1# rollback 1
451 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
load complete
On SRX6 device:
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx1 to 172.30.30.1
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx1 primary to-srx1-1
hop-limit 3
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx1 secondary to-srx1-2
no-cspf
[edit]
lab@srx6# set protocols mpls path to-srx1-1
[edit]
lab@srx6# set protocols mpls path to-srx1-2 172.30.30.5 loose
[edit]
lab@srx6# set protocols mpls path to-srx1-2 172.30.30.3 loose
[edit]
lab@srx6# commit
commit complete
Verification:
[edit]
lab@srx6# run show mpls lsp name srx6-to-srx1
Ingress LSP: 6 sessions
To From State Rt P ActivePath LSPname
172.30.30.1 172.30.30.6 Up 0 * to-srx1-1 srx6-to-srx1
• Make sure that if traffic is switched to secondary path, it is never automatically
switched back to the primary path.
On SRX1 device:
[edit]
lab@srx1# set protocols mpls label-switched-path srx1-to-srx6 revert-timer 0
[edit]
lab@srx6# commit
commit complete
On SRX6 device:
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx1 revert-timer 0
45
1
[edit]
452 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
lab@srx6# commit
commit complete
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 fast-reroute no-
include-all
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx7# run show mpls lsp name srx7-to-srx2 extensive
Ingress LSP: 6 sessions
172.30.30.2
From: 172.30.30.7, State: Up, ActiveRoute: 0, LSPname: srx7-to-srx2
• Configure node protection for the LSP from SRX2 to SRX7. Make sure that the bypass
LSPs are explicitly configured to bypass SRX4 and SRX5.
On SRX2 device:
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx7 node-link-protection
[edit]
lab@srx2# set protocols rsvp interface ge-0/0/4.23 link-protection path
172.30.30.3 loose
[edit]
lab@srx2# set protocols rsvp interface ge-0/0/4.23 link-protection path
172.30.30.5 loose
[edit]
lab@srx2# set protocols rsvp interface ge-0/0/4.24 link-protection
[edit]
lab@srx2# commit
commit complete
On SRX4 device:
[edit]
lab@srx4# set protocols rsvp interface ae0.0 link-protection path 172.30.30.3
loose
[edit]
lab@srx4# set protocols rsvp interface ae0.0 link-protection path 172.30.30.7
loose
[edit]
lab@srx4# commit
commit complete
Verification:
[edit]
lab@srx2# run show rsvp session name Bypass->172.30.0.18->172.30.0.34 extensive
Ingress RSVP: 4 sessions
172.30.30.5
From: 172.30.30.2, LSPstate: Up, ActiveRoute: 0
LSPname: Bypass->172.30.0.18->172.30.0.34
LSPtype: Static Configured
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 301616
Resv style: 1 SE, Label in: -, Label out: 301616
Time left: -, Since: Thu Jan 1 07:12:55 2015
45
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
3
Port number: sender 1 receiver 21233 protocol 0
454 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx4# run show rsvp session name Bypass->172.30.0.34->172.30.0.46 extensive
Ingress RSVP: 1 sessions
172.30.30.7
From: 172.30.30.4, LSPstate: Up, ActiveRoute: 0
LSPname: Bypass->172.30.0.34->172.30.0.46
LSPtype: Static Configured
Suggested label received: -, Suggested label sent: -
Recovery label received: -, Recovery label sent: 301568
Resv style: 1 SE, Label in: -, Label out: 301568
Time left: -, Since: Thu Jan 1 07:11:56 2015
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 30718 protocol 0
Type: Bypass LSP
Number of data route tunnel through: 1
Number of RSVP session tunnel through: 0
PATH rcvfrom: localclient
Adspec: sent MTU 1500
Path MTU: received 1500
PATH sentto: 172.30.0.21 (ge-0/0/4.34) 4202 pkts
RESV rcvfrom: 172.30.0.21 (ge-0/0/4.34) 4201 pkts
Explct route: 172.30.0.21 172.30.0.26
Record route: <self> 172.30.0.21 172.30.0.26
On SRX6 device:
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx3-1 to 172.30.30.3
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx3-1 no-cspf
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx3-2 to 3.3.3.3
[edit] 45
4
lab@srx6# set protocols mpls label-switched-path srx6-to-srx3-2 no-cspf
455 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx6# commit
commit complete
Verification:
[edit]
lab@srx6# run show mpls lsp
Ingress LSP: 6 sessions
To From State Rt P ActivePath LSPname
3.3.3.3 172.30.30.6 Up 0 * srx6-to-srx3-2
172.30.30.1 172.30.30.6 Up 0 * to-srx1-1 srx6-to-srx1
172.30.30.2 172.30.30.6 Up 0 * srx6-to-srx2
172.30.30.3 172.30.30.6 Up 0 * srx6-to-srx3-1
172.30.30.7 172.30.30.6 Up 0 * srx6-to-srx7
Total 5 displayed, Up 5, Down 0
[edit]
lab@srx6# set protocols ldp interface ge-0/0/4.68
[edit]
lab@srx6# commit
commit complete
On SRX1 device:
[edit]
lab@srx1# set protocols mpls label-switched-path srx1-to-srx6 ldp-tunneling
[edit]
45
lab@srx1# set protocols mpls label-switched-path srx1-to-srx7 to 172.30.30.7
5
456 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# set protocols mpls label-switched-path srx1-to-srx7 ldp-tunneling
[edit]
lab@srx1# set protocols ldp interface lo0.0
[edit]
lab@srx1# commit
commit complete
On SRX2 device:
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx7 ldp-tunneling
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx6 to 172.30.30.6
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx6 ldp-tunneling
[edit]
lab@srx2# set protocols ldp interface lo0.0
[edit]
lab@srx2# commit
commit complete
On SRX6 device:
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx1 ldp-tunneling
[edit]
lab@srx6# set protocols mpls label-switched-path srx6-to-srx2 to 172.30.30.2
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term 4 from route-filter
172.30.30.1/32 exact accept
[edit]
lab@srx6# set policy-options policy-statement adv.to.isis term 4 from route-filter
172.30.30.2/32 exact accept
[edit]
lab@srx6# set protocols ldp interface lo0.0
[edit]
lab@srx6# commit
commit complete
On SRX7 device:
45
[edit] 6
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2 ldp-tunneling
457 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx1 to 172.30.30.1
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx1 ldp-tunneling
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 4 from route-filter
172.30.30.1/32 exact accept
[edit]
lab@srx7# set policy-options policy-statement adv.to.isis term 4 from route-filter
172.30.30.2/32 exact accept
[edit]
lab@srx7# set protocols ldp interface lo0.0
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx6# run show ldp session
Address State Connection Hold time
172.30.30.1 Operational Open 27
172.30.30.2 Operational Open 27
172.30.30.7 Operational Open 27
172.30.30.8 Operational Open 27
[edit]
lab@srx8# run show route 172.30.30.1 table inet.3
[edit]
lab@srx8# run show route 172.30.30.2 table inet.3
On SRX7 device:
[edit]
lab@srx7# set class-of-service forwarding-policy next-hop-map rip.routes
forwarding-class best-effort lsp-next-hop srx7-to-srx2
[edit]
lab@srx7# set class-of-service forwarding-policy next-hop-map rip.routes
forwarding-class expedited-forwarding lsp-next-hop srx7-to-srx1
[edit]
lab@srx7# set policy-options policy-statement cos.forwarding term 1 from route-
filter 172.31.0.0/20 orlonger
[edit]
lab@srx7# set policy-options policy-statement cos.forwarding term 1 then cos-next-
hop-map rip.routes
[edit]
lab@srx7# set routing-options forwarding-table export cos.forwarding
[edit]
lab@srx7# commit
commit complete
45
8
459 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 4: BGP
Task 4.1: iBGP configuration
• Configure iBGP sessions between the RR device and the SRX routers. Use AS 5678
and, on the RR, create two clusters with no more than 4 clients.
• Failure of any physical interface should not cause for any iBGP session loss. Configure
BFD monitoring of all iBGP connections with 900ms between the keepalives. If 4
keepalives are lost, the neighbor should be declared down.
On SRX1 device:
[edit]
lab@srx1# set routing-options autonomous-system 5678
[edit]
lab@srx1# set protocols bgp group cluster-1 type internal
[edit]
lab@srx1# set protocols bgp group cluster-1 local-address 172.30.30.1
[edit]
lab@srx1# set protocols bgp group cluster-1 bfd-liveness-detection minimum-
interval 900
[edit]
lab@srx1# set protocols bgp group cluster-1 bfd-liveness-detection multiplier 4
[edit]
lab@srx1# set protocols bgp group cluster-1 neighbor 172.30.30.19
[edit]
[edit]
lab@route-reflector# set protocols bgp group cluster-1 type internal
[edit]
lab@route-reflector# set protocols bgp group cluster-1 local-address 172.30.30.19
[edit]
lab@route-reflector# set protocols bgp group cluster-1 cluster 1.1.1.1
[edit]
lab@route-reflector# set protocols bgp group cluster-1 bfd-liveness-detection
minimum-interval 900
45
9
[edit]
460 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@route-reflector# set protocols bgp group cluster-1 neighbor 172.30.30.1
[edit]
lab@route-reflector# set protocols bgp group cluster-1 neighbor 172.30.30.2
[edit]
lab@route-reflector# set protocols bgp group cluster-1 neighbor 172.30.30.3
[edit]
lab@route-reflector# set protocols bgp group cluster-1 neighbor 172.30.30.4
[edit]
lab@route-reflector# set protocols bgp group cluster-2 type internal
[edit]
lab@route-reflector# set protocols bgp group cluster-2 local-address 172.30.30.19
[edit]
lab@route-reflector# set protocols bgp group cluster-2 cluster 2.2.2.2
[edit]
lab@route-reflector# set protocols bgp group cluster-2 bfd-liveness-detection
minimum-interval 900
[edit]
lab@route-reflector# set protocols bgp group cluster-2 bfd-liveness-detection
multiplier 4
[edit]
lab@route-reflector# set protocols bgp group cluster-2 neighbor 172.30.30.5
[edit]
[edit]
lab@route-reflector# set protocols bgp group cluster-2 neighbor 172.30.30.7
[edit]
lab@route-reflector# set protocols bgp group cluster-2 neighbor 172.30.30.8
[edit]
lab@route-reflector# commit
commit complete
Verification:
[edit]
lab@srx1# run show bfd session
Detect Transmit
Address State Interface Time Interval Multiplier
172.30.30.19 Down 0.000 0.900 4
1 sessions, 1 clients 46
0
Cumulative transmit rate 1.0 pps, cumulative receive rate 0.0 pps
461 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# run show firewall log detail
Time of Log: 2015-01-04 05:51:39 UTC, Filter: pfe, Filter action: discard, Name of
interface: ge-0/0/4.14
Name of protocol: UDP, Packet Length: 13312, Source address: 172.30.30.19:49152,
Destination address: 172.30.30.1:4784
Time of Log: 2015-01-04 05:51:38 UTC, Filter: pfe, Filter action: discard, Name of
interface: ge-0/0/4.14
Name of protocol: UDP, Packet Length: 13312, Source address: 172.30.30.19:49152,
Destination address: 172.30.30.1:4784
Fixing the problem:
[edit]
lab@srx1# set firewall family inet filter protect.RE term accept.bfd from port
4784
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx1# run show bfd session
Detect Transmit
Address State Interface Time Interval Multiplier
172.30.30.19 Up 3.600 0.900 4
1 sessions, 1 clients
Cumulative transmit rate 1.1 pps, cumulative receive rate 1.1 pps
[edit]
lab@srx1# run show bgp summary
[edit]
lab@route-reflector# run show bgp summary
Groups: 2 Peers: 8 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 0 0 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
172.30.30.1 5678 11 12 0 0 4:17
0/0/0/0 0/0/0/0
172.30.30.2 5678 11 11 0 0 4:12
0/0/0/0 0/0/0/0
172.30.30.3 5678 10 10 0 0 4:04
0/0/0/0 0/0/0/0
172.30.30.4 5678 10 10 0 0 4:00 46
1
0/0/0/0 0/0/0/0
462 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@route-reflector# run show bfd session
Detect Transmit
Address State Interface Time Interval Multiplier
172.30.30.1 Up 3.600 0.900 4
172.30.30.2 Up 3.600 0.900 4
172.30.30.3 Up 3.600 0.900 4
172.30.30.4 Up 3.600 0.900 4
172.30.30.5 Up 3.600 0.900 4
172.30.30.6 Up 3.600 0.900 4
172.30.30.7 Up 3.600 0.900 4
172.30.30.8 Up 3.600 0.900 4
8 sessions, 8 clients
Cumulative transmit rate 8.9 pps, cumulative receive rate 8.9 pps
• Ensure that all iBGP sessions state changes are logged to syslog.
On All devices:
[edit]
lab@srx1# set protocols bgp log-updown
[edit]
lab@srx1# commit
commit complete
[edit]
lab@srx1# commit
commit complete
On SRX4 and SRX5 devices:
[edit]
lab@srx4# set routing-options aggregate route 172.30.0.0/16
[edit] 46
2
463 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx4# set policy-options policy-statement adv.to.ibgp term 1 from route-filter
172.30.0.0/16 exact
[edit]
lab@srx4# set policy-options policy-statement adv.to.ibgp term 1 then accept
[edit]
lab@srx4# set policy-options policy-statement adv.to.ibgp term 2 from tag 520
[edit]
lab@srx4# set policy-options policy-statement adv.to.ibgp term 2 then next-hop
self
[edit]
lab@srx4# set policy-options policy-statement adv.to.ibgp term 2 then accept
[edit]
lab@srx4# set protocols bgp group cluster-1 export adv.to.ibgp
[edit]
lab@srx4# commit
commit complete
On RR device:
[edit]
lab@route-reflector# set protocols bgp advertise-inactive
[edit]
lab@route-reflector# commit
commit complete
[edit]
lab@srx8# run show route 172.31/16
AS path: I
> to 172.30.1.5 via ge-0/0/4.68
[edit]
lab@srx8# set interfaces ge-0/0/4.220 vlan-id 220 family inet address
172.16.220.1/30
[edit]
lab@srx8# set protocols bgp group C1 peer-as 65020
[edit]
lab@srx8# set protocols bgp group C1 local-as 8765
[edit]
lab@srx8# set protocols bgp group C1 local-as private
[edit]
lab@srx8# set protocols bgp group C1 neighbor 172.16.220.2 family inet unicast
prefix-limit maximum 20
[edit]
[edit]
lab@srx8# run show route receive-protocol bgp 172.16.220.2 46
4
465 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set interfaces ge-0/0/4.230 vlan-id 320 family inet address
172.16.230.1/30
[edit]
lab@srx7# set protocols bgp group C2 neighbor 172.16.230.2 family inet unicast
prefix-limit maximum 20
[edit]
lab@srx7# set protocols bgp group C2 peer-as 64512
[edit]
lab@srx7# set protocols bgp group C2 traceoptions flag open
[edit]
lab@srx7# set protocols bgp group C2 traceoptions flag general
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx7# run show log BGP.log
Dec 2 12:16:46.796357 bgp_process_open:2789: NOTIFICATION sent to 172.16.230.2
(External AS 64512): code 2 (Open Message Error) subcode 2 (bad peer AS number),
Reason: peer 172.16.230.2 (External AS 64512) claims 65100, 64512 configured
46
[edit]
5
lab@srx7# set protocols bgp group C2 neighbor 172.16.230.2 peer-as 65100
466 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx7# run show bgp summary
Groups: 2 Peers: 2 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 499 499 0 0 0 0
bgp.l3vpn.0 0 0 0 0 0 0
inet6.0 0 0 0 0 0 0
bgp.l2vpn.0 2 2 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
172.16.230.2 65100 3 417 0 0 9
Establ
inet.0: 16/16/16/0
• Configure eBGP sessions with U1 and U2. Configure an eBGP session with U3 and
load balance across the two physical links. Make sure that you receive IPv6 routes
over single IPv4 session. You are allowed to use a single static route for each address
family. Make sure that you receive IPv6 prefixes from U3 and that they are active in
the RIB. Assume that SRX6 does not support 4-byte AS.
On SRX3 device:
[edit]
lab@srx3# set interfaces ge-0/0/4 unit 450 description "=== connection to upstream
==="
[edit]
lab@srx3# set protocols bgp group U1 peer-as 1516
[edit]
lab@srx3# set protocols bgp group U1 neighbor 172.16.45.1
[edit]
lab@srx3# commit
commit complete
Verification:
[edit]
lab@srx3# run show bgp summary
Groups: 2 Peers: 2 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 533 512 0 0 0 0
46
bgp.l3vpn.0 0 0 0 0 0 0
6
inet6.0 119 0 0 0 0 0
467 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
bgp.l2vpn.0 0 0 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
172.16.45.1 1516 81860 82923 0 2 3w4d21h
Establ
inet.0: 457/462/462/0
On SRX7 device:
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 460 description "=== connection to upstream
==="
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 460 vlan-id 460 family inet address
172.16.46.2/30
[edit]
lab@srx7# set protocols bgp group U2 peer-as 1516
[edit]
lab@srx7# set protocols bgp group U2 neighbor 172.16.46.1
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx7# run show bgp summary
Groups: 3 Peers: 3 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 990 512 0 0 0 0
bgp.l3vpn.0 6 6 0 0 0 0
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 310 family inet6 address
fd17:172:16:231::1/64
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 320 vlan-id 320 family inet address
172.16.232.1/30 46
7
468 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 320 family inet6 address
fd17:172:16:232::1/64
[edit]
lab@srx6# set interfaces lo0 unit 0 family inet6 address ::172.30.30.6/128
[edit]
lab@srx6# set routing-options rib inet6.0 static route ::192.168.50.1/128 next-hop
fd17:172:16:231::2
[edit]
lab@srx6# set routing-options rib inet6.0 static route ::192.168.50.1/128 next-hop
fd17:172:16:232::2
[edit]
lab@srx6# set routing-options static route 192.168.50.1/32 next-hop 172.16.231.2
[edit]
lab@srx6# set routing-options static route 192.168.50.1/32 next-hop 172.16.232.2
[edit]
lab@srx6# set protocols bgp group U3 multihop
[edit]
lab@srx6# set protocols bgp group U3 local-address 172.30.30.6
[edit]
lab@srx6# set protocols bgp group U3 family inet unicast
[edit]
lab@srx6# set protocols bgp group U3 family inet6 unicast
[edit]
lab@srx6# set protocols bgp group U3 peer-as 23456
[edit]
lab@srx6# set protocols bgp group U3 import adv.from.U3
[edit]
lab@srx6# set policy-options policy-statement adv.from.U3 term 3 from family inet6
[edit]
lab@srx6# set policy-options policy-statement adv.from.U3 term 3 then next-hop
::192.168.50.1
[edit]
lab@srx6# commit
commit complete
Verification:
[edit]
lab@srx6# run show bgp summary 46
8
Groups: 2 Peers: 2 Down peers: 0
469 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 985 512 0 0 0 0
bgp.l3vpn.0 0 0 0 0 0 0
inet6.0 119 103 0 0 0 0
bgp.l2vpn.0 2 2 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
192.168.50.1 23456 82093 86979 0 1 3w5d0h
Establ
inet.0: 5/462/462/0
inet6.0: 87/87/87/0
• Configure an eBGP session with P1. Use a single session for both IPv4 and IPv6. Make
sure that you receive IPv6 prefixes and they are active in the RIB.
On SRX1 device:
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 400 vlan-id 400 family inet address
172.16.40.2/30
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 400 family inet6 address
::ffff:172.16.40.2/96
[edit]
lab@srx1# set protocols bgp group P1 peer-as 3456
[edit]
lab@srx1# set protocols bgp group P1 neighbor 172.16.40.1 family inet unicast
[edit]
lab@srx1# set protocols bgp group P1 neighbor 172.16.40.1 family inet6 unicast
On All devices:
[edit]
lab@srx1# set policy-options community customer members 5678:2000
[edit]
lab@srx1# set policy-options community partner members 5678:3000
[edit]
lab@srx1# set policy-options community upstream members 5678:1000
On SRX8 device:
[edit]
lab@srx8# set policy-options policy-statement adv.from.C1 term 2 from as-path
C1.as.path
[edit]
lab@srx8# set policy-options policy-statement adv.from.C1 term 2 then community
add customer
[edit]
lab@srx8# set policy-options policy-statement adv.from.C1 term 2 then accept
[edit]
lab@srx8# set policy-options policy-statement adv.to.C1 term 1 from route-filter
0.0.0.0/0 exact
[edit]
lab@srx8# set policy-options policy-statement adv.to.C1 term 1 then accept
[edit]
lab@srx8# set policy-options policy-statement adv.to.C1 term 2 then reject
[edit]
lab@srx8# set policy-options as-path C1.as.path "^65020$"
[edit]
lab@srx8# set protocols bgp group C1 import adv.from.C1
[edit]
lab@srx8# set protocols bgp group C1 export adv.to.C1
47
[edit] 0
lab@srx8# commit
471 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
commit complete
On SRX7 device:
[edit]
lab@srx7# set policy-options policy-statement adv.to.C2 term 1 from route-filter
0.0.0.0/0 exact
[edit]
lab@srx7# set policy-options policy-statement adv.to.C2 term 1 then accept
[edit]
lab@srx7# set policy-options policy-statement adv.to.C2 term 2 then reject
[edit]
lab@srx7# set policy-options policy-statement adv.from.C2 term 1 from as-path
C2.as.path
[edit]
lab@srx7# set policy-options policy-statement adv.from.C2 term 1 then community
add customer
[edit]
lab@srx7# set policy-options policy-statement adv.from.C2 term 1 then accept
[edit]
lab@srx7# set policy-options policy-statement adv.from.C2 term 2 then reject
[edit]
lab@srx7# set policy-options as-path C2.as.path "^65100$"
[edit]
lab@srx7# set protocols bgp group C2 import adv.from.C2
[edit]
[edit]
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx8# run show route community-name customer terse
[edit]
lab@srx8# run show route advertising-protocol bgp 172.16.220.2
On SRX8 device:
[edit]
lab@srx8# set policy-options policy-statement adv.from.C1 term 1 from community
blackhole
[edit]
lab@srx8# set policy-options policy-statement adv.from.C1 term 1 then next-hop
discard
[edit]
lab@srx8# insert policy-options policy-statement adv.from.C1 term 1 before term 2
[edit]
lab@srx8# set policy-options community blackhole members 65020:666
[edit]
lab@srx8# commit
commit complete
• Ensure that the prefixes received from U1, U2 and U3 can be distinguished from the
prefixes received from other eBGP neighbors.
[edit]
lab@srx3# set policy-options policy-statement adv.from.U1 term 1 from route-filter
172.16.0.0/12 orlonger reject
[edit]
lab@srx3# set policy-options policy-statement adv.from.U1 term 1 from route-filter
182.168.0.0/16 orlonger reject
[edit]
lab@srx3# set policy-options policy-statement adv.from.U1 term 1 from route-filter
0.0.0.0/0 through 0.0.0.0/32 reject
[edit]
lab@srx3# set policy-options policy-statement adv.from.U1 term 2 then community
add upstream
[edit]
lab@srx3# set protocols bgp group U1 import adv.from.U1
[edit]
lab@srx3# set protocols bgp keep none
[edit]
lab@srx3# commit
commit complete
[edit]
lab@srx6# commit
commit complete
Verification:
[edit]
lab@srx3# run show route community-name upstream
[edit]
lab@srx3# commit
commit complete
Verification:
[edit]
lab@srx3# run show route advertising-protocol bgp 172.16.45.1 172.31/16
[edit]
lab@srx3# set policy-options policy-statement adv.from.U1 term 2 then local-
preference 200 47
4
475 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx3# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set policy-options policy-statement adv.to.U2 term 2 then origin egp
[edit]
lab@srx7# set protocols bgp group U2 export adv.to.U2
[edit]
lab@srx7# commit
commit complete
• Ensure that prefixes originated from U3 are directly accessible from SRX6. Make SRX6
less preferred compared to SRX3 and SRX7 for prefixes from and to Upstream. Again,
you are not allowed to use as-path prepend.
On SRX6 device:
[edit]
lab@srx6# set policy-options policy-statement adv.from.U3 term 4 from as-path
U3.as.path
[edit]
lab@srx6# set policy-options policy-statement adv.from.U3 term 4 then local-
preference 250
[edit]
lab@srx6# set policy-options policy-statement adv.from.U3 term 4 from as-path
[edit]
lab@srx6# set policy-options policy-statement adv.from.U3 term 4 then local-
preference 250
[edit]
lab@srx6# set policy-options policy-statement adv.to.U3 term 2 then origin
incomplete
[edit]
lab@srx6# commit
commit complete
Verification:
[edit]
lab@srx6# run show route aspath-regex "^43\.356$"
AS path: 2818404 I
to 172.16.231.2 via ge-0/0/3.310
> to 172.16.232.2 via ge-0/0/3.320
45.26.0.0/16 *[BGP/170] 01:55:05, localpref 250, from 192.168.50.1
AS path: 2818404 I
> to 172.16.231.2 via ge-0/0/3.310
to 172.16.232.2 via ge-0/0/3.320
120.128.0.0/20 *[BGP/170] 01:55:04, localpref 250, from 192.168.50.1
AS path: 2818404 I
to 172.16.231.2 via ge-0/0/3.310
> to 172.16.232.2 via ge-0/0/3.320
160.34.192.0/24 *[BGP/170] 01:55:03, localpref 250, from 192.168.50.1
AS path: 2818404 I
> to 172.16.231.2 via ge-0/0/3.310
to 172.16.232.2 via ge-0/0/3.320
193.35.40.0/22 *[BGP/170] 01:55:03, localpref 250, from 192.168.50.1
AS path: 2818404 I
to 172.16.231.2 via ge-0/0/3.310
> to 172.16.232.2 via ge-0/0/3.320
• Make sure that AS 5678 is not used as a transit AS between Upstream neighbors and
Customer neighbors.
[edit]
lab@srx3# set policy-options policy-statement adv.to.U1 term 1 from community
customer
[edit]
lab@srx3# set policy-options policy-statement adv.to.U1 term 1 then reject
[edit]
lab@srx3# commit
commit complete
[edit]
lab@srx3# set policy-options policy-statement adv.to.ibgp term 1 then next-hop
3.3.3.3
[edit]
lab@srx3# set policy-options policy-statement adv.to.ibgp term 1 then accept
[edit]
lab@srx3# set policy-options policy-statement adv.to.ibgp term 2 then next-hop
self
47
[edit] 6
lab@srx3# commit
477 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
commit complete
Verification:
[edit]
lab@srx6# run show route 3.189.0.0/16
[edit]
lab@srx1# set policy-options policy-statement adv.from.P1 term 1 from route-filter
182.168.0.0/16 orlonger reject
[edit]
lab@srx1# set policy-options policy-statement adv.from.P1 term 1 from route-filter
0.0.0.0/0 through 0.0.0.0/32 reject
[edit]
lab@srx1# set policy-options policy-statement adv.from.P1 term 2 then community
add partner
[edit]
lab@srx1# set protocols bgp group P1 import adv.from.P1
[edit]
lab@srx1# commit
commit complete 47
7
478 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Verification:
[edit]
lab@srx1# run show route community-name partner terse
On SRX1 device:
[edit]
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx1# run show route advertising-protocol bgp 172.16.40.1 172.31/16
172.31.9.0/24 Self I
172.31.10.0/24 Self I
172.31.11.0/24 Self I
172.31.12.0/24 Self I
172.31.13.0/24 Self I
172.31.14.0/24 Self I
172.31.15.0/24 Self I
[edit]
lab@srx1# commit
commit complete
[edit]
lab@route-reflector# set routing-options rib inet6.3 static route
0:0:0:0:0:ffff::/96 receive
lab@route-reflector# commit
commit complete
[edit]
lab@srx6# run show route fd17:f0f4:f691:d::/64
fd17:f0f4:f691:d::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:1::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:2::/80 47
9
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
480 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:3::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:4::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:5::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:6::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:7::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
fd17:f0f4:f691:d:8::/80
*[BGP/170] 02:27:51, localpref 100, from 172.30.30.19
AS path: 3456 I
> to 172.30.0.37 via ge-0/0/4.46, label-switched-path srx6-to-
srx1
Use SRX7 to advertise AS 5678 IPv6 prefixes for MPLS core. Make sure those prefixes
lab@srx6# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx6 to 172.30.30.6
[edit]
lab@srx7# set policy-options policy-statement adv.to.ibgp term 1 from rib inet6.0
48
[edit]
0
481 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set policy-options policy-statement adv.to.ibgp term 1 then accept
[edit]
lab@srx7# set protocols bgp group cluster-2 export adv.to.ibgp
lab@srx7# commit
commit complete
Verification:
[edit]
lab@srx6# run show route fd17:f0f4:fe:f::/64
[edit]
On All devices:
[edit]
lab@srx6# set policy-options policy-statement nhs term 1 then next-hop self
[edit]
lab@srx6# set protocols bgp group cluster-2 export nhs
48
1
lab@srx6# commit
482 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
commit complete
48
2
483 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
Part 5: VPN
Task 5.1: VPN Infrastructure
• To resolve the hidden iBGP routes on the RR, do not use rib-groups, static routes or
any solution that requires enabling family mpls on the RR interfaces.
[edit]
lab@srx1# set protocols bgp group cluster-1 family inet-vpn unicast
[edit]
lab@srx1# set protocols bgp group cluster-1 family l2vpn signaling
On RR device:
[edit]
lab@route-reflector# set routing-options resolution rib bgp.l3vpn.0 resolution-
ribs inet.0
[edit]
lab@route-reflector# set routing-options resolution rib bgp.l2vpn.0 resolution-
ribs inet.0
[edit]
lab@route-reflector# commit
commit complete
Verification:
On SRX7 device:
[edit]
lab@srx7# set routing-options route-distinguisher-id 172.30.30.7
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 601 vlan-id 601 family inet address
192.168.61.1/30
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 602 vlan-id 602 family inet address
192.168.62.1/30
[edit]
lab@srx7# set routing-instances VPNA-HUB instance-type vrf
[edit]
lab@srx7# set routing-instances VPNA-HUB interface ge-0/0/4.601
[edit]
lab@srx7# set routing-instances VPNA-HUB vrf-import vpna.null
[edit]
lab@srx7# set routing-instances VPNA-HUB vrf-export vpna.hub.export
[edit]
lab@srx7# set routing-instances VPNA-HUB vrf-table-label
[edit]
lab@srx7# set routing-instances VPNA-HUB protocols ospf area 0.0.0.0 interface ge-
0/0/4.601 interface-type p2p
[edit]
lab@srx7# set routing-instances VPNA-SPOKE instance-type vrf
[edit]
lab@srx7# set routing-instances VPNA-SPOKE vrf-import vpna.spoke.import
[edit]
lab@srx7# set routing-instances VPNA-SPOKE vrf-export vpna.null
[edit]
lab@srx7# set routing-instances VPNA-SPOKE vrf-table-label
[edit]
lab@srx7# set routing-instances VPNA-SPOKE protocols ospf domain-id disable
[edit]
lab@srx7# set routing-instances VPNA-SPOKE protocols ospf domain-vpn-tag 0
[edit]
lab@srx7# set routing-instances VPNA-SPOKE protocols ospf export vpna.ospf.export
48
[edit] 4
485 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# set policy-options community VPNA-HUB members target:5678:601
[edit]
lab@srx7# set policy-options community VPNA-SPOKE members target:5678:602
[edit]
lab@srx7# set policy-options policy-statement vpna.hub.export term 1 from protocol
ospf
[edit]
lab@srx7# set policy-options policy-statement vpna.hub.export term 1 from protocol
direct
[edit]
lab@srx7# set policy-options policy-statement vpna.hub.export term 1 then
community add VPNA-HUB
[edit]
lab@srx7# set policy-options policy-statement vpna.hub.export term 1 then accept
[edit]
lab@srx7# set policy-options policy-statement vpna.null term 1 then reject
[edit]
lab@srx7# set policy-options policy-statement vpna.ospf.export term 1 from
protocol bgp
[edit]
lab@srx7# set policy-options policy-statement vpna.ospf.export term 1 then accept
[edit]
lab@srx7# set policy-options policy-statement vpna.spoke.import term 1 from
[edit]
lab@srx7# set policy-options policy-statement vpna.spoke.import term 1 from
community VPNA-SPOKE
[edit]
lab@srx7# set policy-options policy-statement vpna.spoke.import term 1 then accept
[edit]
lab@srx7# set policy-options policy-statement vpna.spoke.import term 2 then reject
[edit]
lab@srx7# set protocols mpls icmp-tunneling
lab@srx7# commit
commit complete
On SRX1 device:
[edit] 48
5
lab@srx1# set routing-options route-distinguisher-id 172.30.30.1
486 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 603 vlan-id 603 family inet address
192.168.63.1/30
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 instance-type vrf
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 interface ge-0/0/4.603
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 vrf-import vpna.import
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 vrf-export vpna.export
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 vrf-table-label
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 protocols ospf export vpna.ospf.export
[edit]
lab@srx1# set routing-instances VPNA-SPOKE1 protocols ospf area 0.0.0.0 interface
ge-0/0/4.603 interface-type p2p
[edit]
lab@srx1# set policy-options policy-statement vpna.export term 1 from protocol
ospf
[edit]
lab@srx1# set policy-options policy-statement vpna.export term 1 from protocol
direct
[edit]
[edit]
lab@srx1# set policy-options policy-statement vpna.export term 1 then community
add SPOKE-1
[edit]
lab@srx1# set policy-options policy-statement vpna.export term 1 then accept
[edit]
lab@srx1# set policy-options policy-statement vpna.export term 2 then reject
[edit]
lab@srx1# set policy-options policy-statement vpna.import term 1 from protocol bgp
[edit]
lab@srx1# set policy-options policy-statement vpna.import term 1 from community
VPNA-HUB
[edit]
48
lab@srx1# set policy-options policy-statement vpna.import term 1 then accept
6
487 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# set policy-options policy-statement vpna.import term 2 then reject
[edit]
lab@srx1# set policy-options policy-statement vpna.ospf.export term 1 from
protocol bgp
[edit]
lab@srx1# set policy-options policy-statement vpna.ospf.export term 1 then accept
[edit]
lab@srx1# set policy-options community SPOKE-1 members origin:172.30.30.1:602
[edit]
lab@srx1# set policy-options community VPNA-HUB members target:5678:601
[edit]
lab@srx1# set policy-options community VPNA-SPOKE members target:5678:602
[edit]
lab@srx1# set protocols mpls icmp-tunneling
lab@srx1# commit
commit complete
On SRX2 device:
[edit]
lab@srx2# set routing-options route-distinguisher-id 172.30.30.2
[edit]
lab@srx2# set interfaces ge-0/0/3 unit 604 vlan-id 604 family inet address
192.168.64.1/30
[edit]
[edit]
lab@srx2# set routing-instances VPNA-SPOKE2 interface ge-0/0/4.604
[edit]
lab@srx2# set routing-instances VPNA-SPOKE2 vrf-import vpna.import
[edit]
lab@srx2# set routing-instances VPNA-SPOKE2 vrf-export vpna.export
[edit]
lab@srx2# set routing-instances VPNA-SPOKE2 vrf-table-label
[edit]
lab@srx2# set routing-instances VPNA-SPOKE2 protocols ospf export vpna.ospf.export
[edit]
lab@srx2# set routing-instances VPNA-SPOKE2 protocols ospf area 0.0.0.0 interface
ge-0/0/4.604 interface-type p2p
[edit] 48
7
lab@srx2# set routing-instances VPNB-2 instance-type vrf
488 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx2# set routing-instances VPNB-2 interface ge-0/0/3.833
[edit]
lab@srx2# set routing-instances VPNB-2 vrf-target target:5678:500
[edit]
lab@srx2# set routing-instances VPNB-2 vrf-table-label
[edit]
lab@srx2# set routing-instances VPNB-2 protocols bgp group site-2 advertise-peer-
as
[edit]
lab@srx2# set routing-instances VPNB-2 protocols bgp group site-2 peer-as 64512
[edit]
lab@srx2# set routing-instances VPNB-2 protocols bgp group site-2 neighbor
192.168.83.2
[edit]
lab@srx2# set policy-options policy-statement vpna.export term 1 from protocol
ospf
[edit]
lab@srx2# set policy-options policy-statement vpna.export term 1 from protocol
direct
[edit]
lab@srx2# set policy-options policy-statement vpna.export term 1 then community
add VPNA-SPOKE
[edit]
lab@srx2# set policy-options policy-statement vpna.export term 1 then community
add SPOKE-2
[edit]
lab@srx2# set policy-options policy-statement vpna.export term 2 then reject
[edit]
lab@srx2# set policy-options policy-statement vpna.import term 1 from protocol bgp
[edit]
lab@srx2# set policy-options policy-statement vpna.import term 1 from community
VPNA-HUB
[edit]
lab@srx2# set policy-options policy-statement vpna.import term 1 then accept
[edit]
lab@srx2# set policy-options policy-statement vpna.import term 2 then reject
[edit]
48
lab@srx2# set policy-options policy-statement vpna.ospf.export term 1 from
8
protocol bgp
489 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx2# set policy-options policy-statement vpna.ospf.export term 1 then accept
[edit]
lab@srx2# set protocols mpls icmp-tunneling
lab@srx2# commit
commit complete
Verification:
lab@srx7# run show route table VPNA-HUB.inet.0
[edit]
lab@srx7# run show route table VPNA-SPOKE.inet.0
[edit]
lab@srx2#
49
3
494 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On SRX8 device:
[edit]
lab@srx8# set routing-options route-distinguisher-id 172.30.30.8
[edit]
lab@srx8# set routing-instances VPNB-1 instance-type vrf
[edit]
lab@srx8# set routing-instances VPNB-1 interface ge-0/0/4.822
[edit]
lab@srx8# set routing-instances VPNB-1 vrf-export VPNB.export
[edit]
[edit]
lab@srx8# set routing-instances VPNB-1 vrf-table-label
[edit]
lab@srx8# set routing-instances VPNB-1 routing-options static route 0.0.0.0/0
next-table inet.0
[edit]
lab@srx8# set routing-instances VPNB-1 protocols bgp group site-1 advertise-peer-
as
[edit]
lab@srx8# set routing-instances VPNB-1 protocols bgp group site-1 family inet
unicast rib-group vpnb.inet.to.master
[edit]
lab@srx8# set routing-instances VPNB-1 protocols bgp group site-1 peer-as 64512
[edit]
lab@srx8# set routing-instances VPNB-1 protocols bgp group site-1 neighbor 49
192.168.82.2 4
495 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx8# set policy-options policy-statement VPNB.export term 1 from protocol
static
[edit]
lab@srx8# set policy-options policy-statement VPNB.export term 1 from route-filter
0.0.0.0/0 exact
[edit]
lab@srx8# set policy-options policy-statement VPNB.export term 1 then community
add VPNB
[edit]
lab@srx8# set policy-options policy-statement VPNB.export term 1 then accept
[edit]
lab@srx8# set routing-options interface-routes rib-group inet master.inet.to.vpnb
[edit]
lab@srx8# set routing-options rib-groups master.inet.to.vpnb import-rib inet.0
[edit]
lab@srx8# set routing-options rib-groups master.inet.to.vpnb import-rib VPNB-
1.inet.0
[edit]
lab@srx8# set routing-options rib-groups vpnb.inet.to.master import-rib VPNB-
1.inet.0
[edit]
lab@srx8# set routing-options rib-groups vpnb.inet.to.master import-rib inet.0
[edit]
lab@srx8# set protocols bgp group cluster-2 family inet unicast rib-group
master.inet.to.vpnb
[edit]
lab@srx8# set policy-options policy-statement no.vpnb.forwarding term 1 from
community upstream
[edit]
lab@srx8# set policy-options policy-statement no.vpnb.forwarding term 1 from
community customer
[edit]
lab@srx8# set policy-options policy-statement no.vpnb.forwarding term 1 from
community partner
[edit]
lab@srx8# set policy-options policy-statement no.vpnb.forwarding term 1 then
reject
[edit]
49
lab@srx8# set routing-options forwarding-table export no.vpnb.forwarding
5
496 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx8# commit
commit complete
On SRX2 device:
[edit]
lab@srx2# set routing-options route-distinguisher-id 172.30.30.2
[edit]
lab@srx2# set routing-instances VPNB-2 instance-type vrf
[edit]
lab@srx2# set routing-instances VPNB-2 interface ge-0/0/4.833
[edit]
lab@srx2# set routing-instances VPNB-2 vrf-target target:5678:500
[edit]
lab@srx2# set routing-instances VPNB-2 vrf-table-label
[edit]
lab@srx2# set routing-instances VPNB-2 protocols bgp group site-2 advertise-peer-
as
[edit]
lab@srx2# set routing-instances VPNB-2 protocols bgp group site-2 peer-as 64512
[edit]
lab@srx2# set routing-instances VPNB-2 protocols bgp group site-2 neighbor
192.168.83.2
[edit]
lab@srx2# commit
commit complete
[edit]
lab@srx8# run show route table VPNB-1.inet.0
[edit]
lab@srx8# run show route forwarding-table table VPNB-1
Routing table: VPNB-1.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
default user 0 rtbl 1 7
default perm 0 rjct 606 1
0.0.0.0/32 perm 0 dscd 604 1
10.10.1.0/24 user 0 rtbl 1 7
10.10.1.8/32 user 0 10.10.1.8 locl 543 3
10.10.82.0/24 user 0 192.168.82.2 ucst 557 5 ge-0/0/4.822
172.16.220.0/30 user 0 rtbl 1 7
172.16.220.1/32 user 0 172.16.220.1 locl 588 3
172.30.0.0/16 user 0 indr 262145 36
10:e:7e:43:d9:4 ucst 513 16 ge-0/0/4.68
172.30.1.4/30 user 0 rtbl 1 7
172.30.1.6/32 user 0 172.30.1.6 locl 547 3
172.30.1.8/30 user 0 rtbl 1 7
172.30.1.10/32 user 0 172.30.1.10 locl 592 3
172.30.30.8/32 user 0 rtbl 1 7
172.31.0.0/24 user 0 indr 262145 36
172.30.1.5 ucst 513 16 ge-0/0/4.68
172.31.1.0/24 user 0 indr 262145 36
172.30.1.5 ucst 513 16 ge-0/0/4.68
172.31.2.0/24 user 0 indr 262145 36
172.30.1.5 ucst 513 16 ge-0/0/4.68
[edit]
lab@srx8#
49
8
499 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On SRX2 device:
[edit]
lab@srx2# set interfaces ge-0/0/3 encapsulation flexible-ethernet-services
[edit]
lab@srx2# set interfaces ge-0/0/3.522 vlan-id 522
[edit]
lab@srx2# set interfaces ge-0/0/3.522 encapsulation vlan-ccc
[edit]
lab@srx2# set interfaces ge-0/0/3.522 apply-groups-except family_mpls
[edit]
lab@srx2# set l2circuit neighbor 172.30.30.7 interface ge-0/0/3.522 virtual-
circuit-id 522
[edit]
lab@srx2# set l2circuit neighbor 172.30.30.7 interface ge-0/0/3.522 community
l2mapped
[edit]
lab@srx2# set policy-options policy-statement l2circuit.mapping term 1 from
community l2mapped
[edit]
lab@srx2# set policy-options community l2mapped members 5678:2
[edit]
lab@srx2# set routing-options forwarding-table export l2circuit.mapping
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx7-l2circuit to
172.30.30.7
[edit]
lab@srx2# set protocols mpls label-switched-path srx2-to-srx7-l2circuit primary
to-srx7-via-srx3
[edit]
lab@srx2# set protocols mpls path to-srx7-via-srx3 172.30.0.14 strict
[edit] 49
9
lab@srx2# set protocols mpls path to-srx7-via-srx3 172.30.0.26 strict
500 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx2# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set interfaces ge-0/0/4 encapsulation flexible-ethernet-services
[edit]
lab@srx7# set interfaces ge-0/0/4.522 vlan-id 522
[edit]
lab@srx7# set interfaces ge-0/0/4.522 encapsulation vlan-ccc
[edit]
lab@srx7# set interfaces ge-0/0/4.522 apply-groups-except family_mpls
[edit]
lab@srx7# set l2circuit neighbor 172.30.30.2 interface ge-0/0/4.522 virtual-
circuit-id 522
[edit]
lab@srx7# set l2circuit neighbor 172.30.30.2 interface ge-0/0/4.522 community
l2mapped
[edit]
lab@srx7# set policy-options policy-statement l2circuit.mapping term 1 from
community l2mapped
[edit]
lab@srx7# set policy-options policy-statement l2circuit.mapping term 1 then
install-nexthop lsp srx7-to-srx2-l2circuit
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2-l2circuit to
172.30.30.2
[edit]
lab@srx7# set protocols mpls label-switched-path srx7-to-srx2-l2circuit primary
to-srx2-via-srx3
[edit]
lab@srx7# set protocols mpls path to-srx2-via-srx3 172.30.0.25 strict
[edit]
lab@srx7# set protocols mpls path to-srx2-via-srx3 172.30.0.13 strict
[edit]
lab@srx7# commit
commit complete
Verification: 50
0
501 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# run show l2circuit connections
Layer-2 Circuit Connections:
50
1
502 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
On SRX6 device:
[edit]
lab@srx6# set interfaces ge-0/0/4 encapsulation flexible-ethernet-services
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 542 apply-groups-except family_mpls
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 542 encapsulation vlan-vpls
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 542 vlan-id 542
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 542 input-vlan-map vlan-id 532
[edit]
lab@srx6# set interfaces ge-0/0/4 unit 542 output-vlan-map swap
[edit]
lab@srx6# set routing-instances VPLS-2 instance-type vpls
[edit]
lab@srx6# set routing-instances VPLS-2 interface ge-0/0/4.542
[edit]
lab@srx6# set routing-instances VPLS-2 vrf-target target:5678:200
[edit]
lab@srx6# set routing-instances VPLS-2 protocols vpls site-range 4
[edit] 50
2
lab@srx6# set routing-instances VPLS-2 protocols vpls no-tunnel-services
503 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx6# set routing-instances VPLS-2 protocols vpls site 1 site-identifier 1
[edit]
lab@srx6# set routing-instances VPLS-2 protocols vpls site 1 multi-homing
[edit]
lab@srx6# set routing-instances VPLS-2 protocols vpls site 1 site-preference
primary
[edit]
lab@srx6# commit
commit complete
On SRX7 device:
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 532 apply-groups-except family_mpls
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 532 encapsulation vlan-vpls
[edit]
lab@srx7# set interfaces ge-0/0/4 unit 532 vlan-id 532
[edit]
lab@srx7# set routing-instances VPLS-2 instance-type vpls
[edit]
lab@srx7# set routing-instances VPLS-2 interface ge-0/0/4.532
[edit]
lab@srx7# set routing-instances VPLS-2 vrf-target target:5678:200
[edit]
lab@srx7# set routing-instances VPLS-2 protocols vpls no-tunnel-services
[edit]
lab@srx7# set routing-instances VPLS-2 protocols vpls site 1 site-identifier 1
[edit]
lab@srx7# set routing-instances VPLS-2 protocols vpls site 1 multi-homing
[edit]
lab@srx7# set routing-instances VPLS-2 protocols vpls site 1 site-preference
backup
[edit]
lab@srx7# commit
commit complete
On SRX1 device:
50
3
[edit]
504 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 532 apply-groups-except family_mpls
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 532 encapsulation vlan-vpls
[edit]
lab@srx1# set interfaces ge-0/0/4 unit 532 vlan-id 532
[edit]
lab@srx1# set routing-instances VPLS-1 instance-type vpls
[edit]
lab@srx1# set routing-instances VPLS-1 interface ge-0/0/4.532
[edit]
lab@srx1# set routing-instances VPLS-1 vrf-target target:5678:200
[edit]
lab@srx1# set routing-instances VPLS-1 protocols vpls site-range 4
[edit]
lab@srx1# set routing-instances VPLS-1 protocols vpls no-tunnel-services
[edit]
lab@srx1# set routing-instances VPLS-1 protocols vpls site 2 site-identifier 2
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx6# run show vpls connections
Layer-2 VPN connections:
Instance: VPLS-2
Local site: 1 (1)
connection-site Type St Time last up # Up trans
1 rmt RN
2 rmt Up Jan 11 09:46:51 2015 1
Remote PE: 172.30.30.1, Negotiated control-word: No
Incoming label: 262146, Outgoing label: 262145
Local interface: lsi.1048576, Status: Up, Encapsulation: VPLS
Description: Intf - vpls VPLS-2 local site 1 remote site 2
[edit]
lab@srx1# run show vpls connections
Layer-2 VPN connections:
Instance: VPLS-1
Local site: 2 (2)
connection-site Type St Time last up # Up trans
1 rmt Up Jan 5 03:59:17 2015 1
Remote PE: 172.30.30.6, Negotiated control-word: No
50
Incoming label: 262145, Outgoing label: 262146
5
Local interface: lsi.1048832, Status: Up, Encapsulation: VPLS
506 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx7# run show vpls connections
Layer-2 VPN connections:
Instance: VPLS-2
Local site: 1 (1)
connection-site Type St Time last up # Up trans
1 rmt LN
2 rmt LN
50
7
508 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
[edit]
lab@srx1# set protocols mpls label-switched-path vpls-p2mp-dynamic optimize-timer
450
[edit]
lab@srx1# set protocols mpls label-switched-path vpls-p2mp-dynamic p2mp
[edit]
lab@srx1# set routing-instances VPLS-1 provider-tunnel rsvp-te label-switched-
path-template vpls-p2mp-dynamic
[edit]
lab@srx1# commit
commit complete
Verification:
[edit]
lab@srx1# run show mpls lsp p2mp
Ingress LSP: 1 sessions
P2MP name: 172.30.30.1:6:vpls:VPLS-1, P2MP branch count: 1
[edit]
lab@srx6# run show mpls lsp p2mp
Ingress LSP: 1 sessions 50
8
P2MP name: 172.30.30.6:5:vpls:VPLS-2, P2MP branch count: 1
509 iNET ZERO – JNCIE-SP TECHNOLOGY LABS WORKBOOK – version 1.1 (2016)
50
9