JNCIE-SP 10.c SG PDF
JNCIE-SP 10.c SG PDF
JNCIE-SP 10.c SG PDF
10.c
Student Guide
Juniper Networks reserves the right to change. modify, transfer. or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable. in an
agreement executed between you and Juniper Networks. or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software. may contain prohibitions against certain uses. and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.
Contents
iv • Contents www.juniper.net
Course Overview
This five-day course is designed to serve as the ultimate preparation for the Juniper Networks
Certified Internet Expert-Service Provider (JNCIE-SP) exam. The course focuses on caveats and
tips useful for potential test candidates and emphasizes hands-on practice through a series of
timed lab simulations. On the final day of the course, students are given a six-hour lab simulation
emulating the testing topics and environment from the real exam. All labs in this course are
facilitated by Junosphere virtual lab devices and are available after hours for additional practice
time. This course is based on Junos OS Release 10.3.
Objectives
After successfully completing this course:
Students will be better prepared for success in taking the actual JNCIE-SP exam.
Students will be well-versed in exam topics, environment, and conditions.
Intended Audience
This course benefits individuals who have already honed their skills on service provider
technologies and could use some practice and tips in preparation for the JNCIE-SP exam.
Course Level
JNCIE Service Provider Bootcamp is an advanced-level course.
Prerequisites
Students should have passed the Junipe:, Networks Certified Internet Professional-Service
Provider (JNCIP-SP) written exam or achieved an equal level of expertise through Education
Services courseware and hands-on experience.
Day 1
Chapter 1: Course Introduction
Chapter 2: Exam Strategies
Chapter 3: Device Infrastructure
Lab 1: Implementing Device Infrastructure
Chapter 4: IGP Implementation
Lab 2 and Lab 3: IGP Implementation
Day2
Chapter 5: IGP Troubleshooting
Lab 4 and Lab 5: IGP Troubleshooting
Chapter 6: BGP Implementation
Lab 6: BGP Implementation
Chapter 7: BGP Troubleshooting
Lab 7: BGP Troubleshooting
Day3
Chapter 8: Multicast Implementation
Lab 8: Multicast Implementation and Troubleshooting and Troubleshooting
Chapter 9: Class of Service Implementation
Lab 9: Class of Service Implementation and Troubleshooting
Day4
Chapter 10: MPLS Implementation
Lab 10: MPLS Implementation and Troubleshooting and Troubleshooting
Chapter 11: MPLS VPN Implementation
Lab 11: MPLS VPNs Implementation and Troubleshooting
Day5
JNCIE-SP Full Lab Simulation
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config. ini in the Filename field.
CLL Undefined Text where the variable's value is Type set policy policy-name.
the user's discretion or text where
ping 10.0.�
the variable's value as shown in
GU.I Undefined the lab guide might differ from the Select File > Save, and type
value the user must input filename in the Filename field.
according to the lab topology.
Technical Publications
You can print technical manuals and release notes directly from the Internet in a variety of formats:
Go to http:j /www.juniper.net;techpubs/.
Locate the specific software or hardware release and title you need, and choose the
format in which you want to view or print the document.
Documentation sets and CDs are available through your local Juniper Networks sales office or
account representative.
Chapter Objectives
• After successfully completing this chapter, you will be
able to:
•Get to know one another
• Identify the objectives. prerequisites. facilities. and
materials used during this course
• Identify additional Education Services courses at
Juniper Networks
• Describe the Juniper Networks Certification Program
---�;"'to;.,,.,�;,,,;
�UrillPefi
�
WorldwideEducallonServlces """".Jun,pernet I 1-2
-:';;&J �
Introductions
Introductions
The slide asks several questions for you to answer during class introductions.
Course Contents
• Contents:
• Chapter 1: Course Introduction
• Chapter 2: Exam Strategies
• Chapter 3: Device Infrastructure
• Chapter 4: IGP Implementation
• Chapter 5: IGP Troubleshooting
• Chapter 6: BGP Implementation
• Chapter 7: BGP Troubleshooting
• Chapter 8: Multicast Implementation
• Chapter 9: Class of Service Implementation
• Chapter 10: MPLS Implementation
• Chapter 11: MPLS VPN Implementation
..__ • Appendix A Junosphere �-- . ..
WorlJ:lwideEducatlonServices wwwJun,pernet 1
·�-·
1-4
Course Contents
The slide lists the topics we discuss in this course.
Pre equisites
,is�"""""
WorldwideEducationSe111lces wwwJunipo,net 11-s
Pm ;,ju,.
Prerequisites
The slide lists the prerequisites for this course.
Course Administratio11
• The basics:
• Sign-in sheet
• Schedule
• Class times
• Breaks
• Lunch
• Break and restroom facilities
• Fire and safety procedures
• Communications
• Telepl1ones and wireless devices
• Internet access
Education Materials
Additional Resources
Additional Resources
The slide provides links to additional resources available to assist you in the installation,
configuration, and operation of Juniper Networks products.
Satisfaction Feedback
(l'li,
f ,:,r.;,ll,'.i·'I
==
Satisfaction Feedback
Juniper Networks uses an electronic survey system to collect and analyze your comments and
feedback. Depending on the class you are taking, please complete the survey at the end of the class,
or be sure to look for an e-mail about two weeks from class completion that directs you to complete
an on line survey form. (Be sure to provide us with your current e-mail address.)
Submitting your feedback entitles you to a certificate of class completion. We thank you in advance
for taking the time to help us improve our educational offerings.
Courses
You can access the latest Education Services offerings covering a wide range of platforms at
http:/ /www.juniper.net/training/technical_education/.
Junos Certifications
Jun1Per
0
;y��!f-
1 ...
JUnlPer
t
(lllllf'!lO
,,«;,r��.o,,.,.,
Jun1Per
ct.>lllt1l0
',:,f"f!A\l�,1
Ct.lfl!>U)
...5.',,0(,,1,ff
Lll!Jr.lmi y •
WorldwideEducationServlces ww�Jun,pe,net 11-11
�.,.,," �« �¥
Find Us Online
Jnet http//www.juniper.neVjnet
http//www.juniper.neVfacebook
m:;, http://www.juniper.neVyoutube
http//www.juniper.net/twitter
Find Us Online
The slide lists some on line resources to learn and share information about Juniper Networks.
Questions
Any Questions?
If you have any questions or concerns about the class you are attending, we suggest that you voice
them now so that your instructor can best address your needs during class.
Chapter Objectives
Exam Preparation
Exam Topics
The JNCIE-SP exam is a challenging full-day, hands-on lab exam and the certification represents the
top experts in SP technologies. This chapter and the rest of this course is designed as a preparatory
tool leading up to the exam. To be successful in obtaining the certification, you must also have had
extensive hands-on practice either through your job role or lab experience and you must have
mastered the various technologies presented throughout the course. To begin your preparation, as
with any Juniper Networks exam, you should identify the exam topics and objectives.
The link on the slide contains the most recent version of exam topics. You can also find out more
information about the exam by visiting the Juniper Networks certification site at
www.juniper.net/certification. Use these topics and objectives as a tool and practice the topics
repeatedly in many variations. Take notes on topics which are difficult for you and time yourself in
repeated simulations. While this course will be very beneficial, you should not rely on it as your single
preparation method.
Exam Resources
Congratulations, by taking this course, you have a tremendous advantage in exam preparation. The
slide lists other vital resources such as technical publications. You should become familiar with the
organization of Juniper Networks technical publications available at www.juniper.net/techpubs
because it is the only resource available to you during the exam. However, hopefully you will not need
to use this resource on exam day because time is already a limited resource.
Continued on the next page.
JNCIE-SP Sections
• Sections include:
• Device infrastructure
• IGPs
• BGP
• Layer 2 and Layer 3 VPNs
• Multicast
• Class of service
• MPLS
,;, . �l'Jnmv\Wo1l�deEducalionSe1Vices
�&:zy;x�,;,i;,
t:;(!l\."[,;i,,4:t,s,.,
=
wwwJun,pernei 1 2 s-
JNCIE-SP Sections
The slide lists the high-level exam sections covered in the JNCIE-SP exam. We will examine each of
these thoroughly on subsequent chapters. For more information, visit the previously mentioned
resources website.
Exam Day
The slide lists the topic we discuss next.
• Exam day
• Make sure you had a good night of rest
• Eat a light breakfast
• Dress comfortably
• Arrive to the testing center early
• Familiarize yourself with tl1e testing facility
• Review your notes
".
Good Morning
Exam day has arrived. Hopefully, you are well-rested and ready for a successful day. To avoid
distractions, you should dress comfortably and eat a light breakfast. Try to keep a typical morning
routine to prolong the onset of stress that is sure to come later.
It is a good idea to arrive at the testing center at least 30 minutes prior to the start of the exam. This
will give you ample time to meet the proctor, familiarize yourself with the facility, and review your
notes.
Exam Tools
• When starting your exam, you will be given:
• Access to terminal with SecureCRT
• Network topology map
• Tables describing network characteristics such as addresses
• List of tasks and associated point values
• Tasks are broken out into sections
• Read all tasks before starting the exam 1
• Access to technical documentation
• Blank sheets of paper and writing tools
• Mark up the topology
• Access to a proctor
• Use to your advantage!
Exam Tools
Your proctor will direct you to your workstation in a quiet, secured area where you will be given a
terminal with access to the certification topology. Most terminals are equipped with SecureCRT and
a local copy of the Juniper Networks technical publications. You will use SecureCRT or a native
terminal emulation client to access your devices' console ports through a terminal server. You can
also access the devices directly using an out-of-band management network.
The proctor will give you a packet containing your network topology, information tables, and a list of
tasks. The tasks will be organized into sections. Each section represents a specific number of points.
The tables will contain information necessary for you to complete your exam such as IP addressing
information. Take some time to read through the task list and review the provided topology. You
might choose to make notes where appropriate or even draw on the topology for your own
clarification. Usually, a writing utensil and spare paper are provided for this purpose.
Once the proctor directs you to begin and notes the official starting time, the proctor will leave the
testing pod but will remain nearby for assistance. Do not be ashamed or embarrassed to approach
the proctor with questions. While proctors cannot give away details of the exam, they can often clarify
items of which you are unsure. One helpful tip to use when asking the proctor for clarification on a
lab task is to not ask the proctor to explain the task, but rather, form your own idea about what the
task entails and ask the proctor if your understanding is correct. Also, you could present the question
in a this-or-that format when appropriate.
It is also important to get the proctor involved quickly if you suspect a hardware problem in your
topology. Hardware issues are not expected and you will be credited for any lost time (within reason).
Exam Infrastructure
Customer?
�
�
??? --
;;;;
Junos· 10.4R3.4
;;;;
;;;; ???
Time-Saving Tips
Pay attention to configuration snippets which can be shared among devices. These provide a good
opportunity to cut and paste configuration stanzas into multiple devices. It is a good idea to
understand the various load commands and pipe ( [) functionality for command outputs. You
should also learn and take advantage of keyboard shortcuts such as the various Ctrl commands
provided by the Junos OS. You can learn more about these time-savers in the Juniper Networks
technical publications.
One reason for reading through the entire task list before beginning the exam is to strategically plan
your implementation. For example, if you know you are going to enable multiple policy functions from
a device to a peer, it may make sense to implement these at the same time. Note that you should
always attempt at least one task from each section, because completely ignoring an entire section
may result in a failure of the exam.
Although you would prefer time to verify that every nuance of your network is in working order, every
second counts on the JNCIE-SP exam. So if you are running short on time, you might need to skip
some verification steps. You can mark them and revisit the tasks for verification later, if time allows.
• Troubleshooting issues
• Troubleshoot by outputs before inspecting configuration
• Verify that the issue is not hardware related
• Alert the proctor sooner rather than later if a hardware issue is
suspected
• Move on and revisit the issue later when possible
•As a last resort, break the exam rules
• Adding tt,at disallowed static route might help prevent the domino
effect
Troubleshooting Tips
As mentioned previously, time is of the essence during the exam. If you encounter an issue, try to
verify the obvious outputs quickly using show commands. This approach preferred over attempting
to review a configuration which might be rather large.
If at any time you suspect a hardware fault, notify the proctor immediately. You will be credited for
lost time caused by the hardware fault (within reason). However, it is unlikely that you can, for
example, claim two hours lost to a faulty interface card.
Many implementation tasks early in the exam are crucial elements for success in tasks later in the
exam. For example, a link failure in the infrastructure section of the exam will affect IGP adjacencies
and possibly, BGP and MPLS functionality. As a last resort, it might make sense to break an exam
rule that will result in lost points for one task in lieu of losing exam points for multiple tasks.
�ur.ir,.e,fr Wii_rl�wfdeEducationServices
""'- WW.,JUnrpmet I 2-13
Grading
Exam Results
The certification team will notify you of your results within 15 business days. For the JNCIE-SP exam,
you must successfully complete enough tasks to be awarded 73% of the available points. The results
come in a basic pass or fail format. However, if the exam was not successful, you will be directed on
areas in need of improvement.
Now What?
• I passed!! ./
• Keep current by recertifying the JNCIP-SP between
18 months and 24 months from pass date
•Show off your accomplishments
• Plaque. logo. resume
• Consider other certification tracks
• Security. enterprise routing. and switching
• I did not pass X
•Schedule your retake
• Must wait 14 calendar days
• Pay close attention to sections in which you had difficulty
�r.
uur.i1Pe WorfdwideEducationServices
"�
WW�Jun,pmet I 2-15
Keep Trying
If your exam outcome is not successful, you can retake the exam in as little as 14 calendar days. We
recommend you schedule a retake sooner rather than later. The experience of taking the exam the
first time will be more beneficial while it is still fresh in your mind. The exam will also change over
time and different versions of the Junos OS or exam topics will make preparation more difficult. So
now is the time to study and practice. Be sure to spend some extra time on topics listed as areas in
need of improvement.
Summary
• In this chapter, we:
• Reviewed preparatory strategies for the JNCIE-SP exam
• Described the environment and testing procedure
• Described the grading procedure
Chapter Objectives
···-
"'�;;,c,_,�f' ,,
\,\'o1dwideEducationServices
..
wwwJunoperne1 1 3-5
VRRP Considerations
,., .. ,. >-;
".
Know the difference between the syslog and log statements that the action part of the term
uses. The syslog statement stores information on the traffic that matches the term in a syslog file.
When you store this information locally it is contained in non-volatile memory, if you reboot the router
then the information survives. The log statement stores information on the traffic that matches the
term in volatile memory, if you reboot the router the information is lost.
The log statement can be a very powerful troubleshooting and verification tool. Apply this statement
to firewall filter terms that do not appear to be working correctly. Then you can issue the show
firewall log command to view what traffic is actually matching this term. If you do not see the
traffic that you expect, you can apply the log statement to the last term that accepts or denies all
other traffic. This method can provide insight on which term is processing the traffic, then you can
adjust your firewall filter accordingly.
Using the apply-path statement within a prefix-list can assist in saving time. For example, a
router is configured with hundreds of BGP neighbors that change frequently. Configuring a firewall
filter term that statically lists each BGP neighbor does not scale well. Alternatively, you can configure
a prefix-list with the apply-path statement that dynamically lists each BGP neighbor in the
filter's term.
• Task
• High availability is required for the Cirouter connected to
Ri and R2. Configure a VRRP group in which Riis the
master for the 10.30.40.0/24 range. R2 must acquire
mastership if two out of three of R1's internal interfaces fail.
The virtual IP address of 10.30.40.100, that belongs to the
VRRP group, must not respond to any ping requests.
What Now?
Task Completion (1 of 3)
• Initial verification
• Verify interface state
lab@Rl> show interfaces terse ge-0/0/4
Interface Admin Link Proto Local Remote
ge-0/0/ 4 up up
ge-0/0/ 4.0 up up inet 10 .30.40.1/24
ask Completion (2 of 3)
• VRRP configuration-R1
[edit intecfaces ge-0/0/4]
lab@Rl# show
unit O {
family inet {
address 10.30.40.1/24
vnp-gcoup 1 {
victual-addcess 10.30.40.100;
pciocity 149;
trnck {
intecface ge-0/0/1 {
pciocity-cost 25;
intecface ge-0/0/2 {
pciocity-cost 25;
intecface ge-0/0/3 {
pciocity-cost 25;
(,: I
Configuring R1
The slide shows the configuration of R1 that is necessary to complete this task. Notice how the
interface tracking priority values are set in such a way that the VRRP priority drops below 100 if two
out of three of the interfaces fail.
Task Completion (3 of 3)
• VRRP configuration-R2
[edit interfaces ge-0/0/9]
l.ab@R2# show
unit O I
family inet {
address 10.30.40.2/24
v crp-group 1 I
virtual-address 10.30.40.100;
priocity 100;
Configuring R2
The slide shows the configuration of R2 that is necessary to complete this task. Notice how the VRRP
priority is set to 100. In the previous slide, R1's configuration drops its VRRP priority to 99 if two of its
three internal interfaces fail.
Task Verification (1 of 5)
• VRRP verification-R 1
[edit intecfaces ge-0/0/4]
lab@Rl# run show vrrp detail
Physical intecface: ge-0/ 0/4, Unit: 0, Addcess: 10.30.40.1/24
Index: 70, SNMP ifindex: 519, VRRP-Tcaps: disabled
Intecface state: up, Gcoup: 1, State: mastec, VRRP Mode: A ctive
Pciocity: 149, Advectisement intecval: 1, Authentication type: none
Delay thceshold: 100, Computed send cate: 0
Pceempt: yes, Accept-data mode: no, VIP count: 1, VIP: 10.30.40.100
Advectisement Timec: 0. 856s, Mastee coute c: 10. 30.40.1
Victual coutec uptime: 00:03:02, Mastec coutec uptime: 00:01:36
Victual Mac: OO:OO:Se:00:01:01
Tcacking: enabled
Cuccent pciocity: 149, Configuced pciocity: 149
Pciocity hold time: disabled
Intecface tcacking: enabled, Intecface count: 3
Intecface Int state Int speed In cucced pciocity cost
ge-0/0/1.0 up lg
ge-0/0/2.0 up lg
ge-0/0/3.0 up lg
Route tcacking: disabled
Task Verification (2 of 5)
• VRRP verification-R2
[edit interfaces ge-0/0/9]
lab@R2# run show vrrp detail
Physical interface: ge-0/0/9, Unit : 0, Address: 10.30.40.2/24
Index: 70, SNMP ifindex: 531, VRRP-Traps: disabled
Interface state: up, Group: 1, State: backup, VRRP Mode: Active
Pr iority : 100, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
Preempt: yes, Accept-data mode: no, VIP count: 1, VIP: 10.30.40.100
Dead timer: 3.547s, Master priority: 149, Master router: 10.30.40.1
Virtual router uptime: 00:05:02
Tracking: disabled
ask Verification (3 of 5)
• VRRP verification-R 1
[edit interfaces ge-0/0/4]
lab@Rl# up 1 set ge-0/0/1 disable
Tracking: enabled
Current priority: 99, Configured priority: 149
Priority hold time: disabled
Interface tracking: enabled, Interface count: 3
Interface Int state Int speed Incurred priority cost
ge-0/0/1.0 down O 25
ge-0/0/2 .0 down 25
ge-0/0/3.0 up lg
".
Task Verification (4 of 5)
• VRRP verification-R2
[edit intecfaces ge-0/0/9]
lab@R2# run show vrrp detail
Physical intecface: ge-0/0/9, Unit: 0, Addcess: 10.30.40.2/24
Index: 70, SNMP ifindex: 531, VRRP-Tcaps: disabled
Intecface state: up, Gcoup: 1, State: master, VRRP Mode: Active
Pciocity: 100, Advectisement intecval: 1, Authentication type: none
Delay thceshold: 100, Computed send cate: 0
Pceempt: yes, Accept -data mode: no, VIP count: 1, VIP: 10.30.40.100
Advectisement Timer: 0.386s, Master router: 10.30.40.2
Virtual router uptime: 16: 26: 10, Mastec routec uptime: 16: 00:36
Virtual Mac: OO:OO:Se:00:01:01
Tracking: disabled
. �- ...
UU8!�*' �orldwide Education Services
;;:;=�� '
"'"'" ''"P" not 1 3-21
Task Verification (S of S)
• VRRP verification-R 1
[edit interfaces ge-0/0/4]
lab@Rl# up 1 delete ge-0/0/1 disable
Tracking: enabled
Current priority: 149, configured priority: 149
Priority hold time: disabled
Interface tracking: enabled, Interface count: 3
Interface Int state Int speed Incurred priority cost
ge-0/0/1.0 up lg
ge-0/0/2.0 up lg
ge-0/0/3.0 up lg
Summary
�1.:Jlillpe'f'i
u,.....,..z'.IM>rldwide Education Services www 1,,,p,. net 1 , 23
Chapter Objectives
--��rg.c-r it
ijUfillPet;::WondWideEducationServices wwwJuo,pernet 1 4-3
� �"' =4=' -�
�.J""
UL!JlilJ.Eef��w�Worldwide Education Servicas ww" ,unip" net 1 4-6
IS-IS Implementation
The slide lists the topic we discuss next.
IS-IS Considerations
• Configuring IS-IS
• 1Pv4 and 1Pv6 address families supported without explicit
configuration
• family iso is needed on each interface participating in
IS-IS
• You can use apply-groups to speed up tasks
• LSP and hello POU authentication
• Use the overload command to have all transit traffic avoid
a router
• Anytraffic destined to the overloaded router will still reach it
Configuring IS-IS
IS-IS is an interior gateway protocol (IGP) that forwards traffic inside your network. It is an IGP built to
be adaptive in that it supports both 1Pv4 and 1Pv6. In fact, you must explicitly disable 1Pv6 routing
inside of IS-IS if you do not require a router to forward 1Pv6 packets. It is important to note that many
configuration statements that are applied to IS-IS apply to 1Pv4 and 1Pv6. For example, placing an
interface into IS-IS that has 1Pv4 and 1Pv6 enabled on it results in IS-IS passing link-state protocol
data units (PDUs) that contain 1Pv4 and 1Pv6 prefixes.
A very important part, and often overlooked, of enabling IS-IS in your network is applying the
family iso statement to all interfaces that must participate in IS-IS. If you suspect this to be a
problem, issue the show isis interface command. If a particular interface is missing from this
output you have either forgot to place the family iso statement on it, or you did not place the
interface in IS-IS. Remember to apply an ISO address on the loopback interface. Technically, you can
apply this address on any interface, but if you apply it to a transit interface that goes down for any
reason you will lose all IS-IS functionality. To be safe, always apply the ISO address to the loopback
interface.
Continued on the next page.
• IS-IS adjacencies
• Level 1 adjacencies
• Area and level must match
• Level 2 adjacencies
• Only level must match
• Two adjacencies form by default across a link
• Must disable the unwanted level adjacency
• Routers with Level 1 and Level 2 adjacencies
• Apply area ID of level 1
• Routers vvith only Level 1 or Level 2 adjacencies
• Apply area ID of current area
ms-IS Metrics
• IS-IS metric considerations
• Narrow metrics support a maximum metric value of 63
• Narrow metrics are used by default-can be explicitly configured
using the narrow-metrics-only command
• Wide metrics support a maximum metric value of
16. 777,215
• Configured per level using the wide-metrics-only command
OSPF Implementation
The slide lists the topic we discuss next.
OSPF Considerations
• Configuring OSPF
• OSPFv2 only supports 1Pv4
• OSPFv3 supports 1Pv4 and 1Pv6
• IPv4 supported through the use of realms
• Authentication configured at the interface level
• OSPFv2 uses plain text or MD5 aut11entication
• OSPFv3 secures messages using IPsec security associations
• Use the overload command to have all transit traffic avoid
a router
• Any traffic destined to the overloaded router will still reacl1 it
'.
Configuring OSPF
It is important to know the differences between OSPFv2 and OSPFv3 when attempting to configure
them in your network. For example, OSPFv2 only supports 1Pv4, whereas OSPFv3 has support for
1Pv4 and 1Pv6. You can configure OSPFv3 to forward 1Pv4 traffic by enabling the 1Pv4 unicast realm
under the [edit protocols ospf3 J hierarchy level. However, there are some features, such as
plain text and MD5 authentication, traffic engineering, and virtual links, that are not present in the
OSPFv3 1Pv4 unicast realm. Because of the missing features, it is recommended that you configure
OSPFv2 and OSPFv3 to accommodate 1Pv4 and 1Pv6 traffic respectively.
The use of the overload command is similar to what was discussed in the IS-IS section of this
chapter, however, there are some major differences. When a router is overloaded in OSPF it
announces any prefixes that are reachable through it with the maximum possible metric value. If the
only path to a destination is through an OSPF router that is overloaded, the traffic will be forwarded
through the overloaded router. An overloaded IS-IS router cannot forward transit traffic no matter the
circumstance.
OSPF Metrics
• OSPF metric considerations
• Bandwidth calculations
• By default every link will have a cost of 1
- Fast Ethernet. gigabit Ethernet. 10 gigabit Ethernet
• Manual cost can be set through the metric command
• Use to adjust unequal interfaces for load balancing
• Not recommended if metrics must be adjusted on every router
• Use the reference-bandwidth command to
automatically calculate link cost for every interface
• Use m and g notations to reference megabit or gigabit
• Type 1 and Type 2 metrics
• Type 1 must be applied through a routing policy
• Type 2 applied to routes by default that are redistributed into OSPF
DC
1010
• Task:
• R1 and R2 are receiving RIP routes from the DC router. The
specific RIP prefixes must not be present in your OSPF
domain. All internal routers. except R2, must use R1 to
reach these destinations. R2 can be used to reach these
destinations only if R1 is unreachable.
-�uo1Peli, _�)t,!�
• ' %!i,,_�.ef "" "'» �,,,m�="""'
©2012J•alRtrN• or!<s,los.A!Jtights,...,,,... "' WorldwideEducationServices www)un,pernef I 4-16
�'"'"" f;,��
What Now?
"'loll.�-J\��"C::""
�UnfPefifWorldwide Education Services WWW JUntper net J 4-19
�� "'
"'== y
ask Completion (1 of 4)
"'
�[��� rldwide Education Services ww�Jun,pernet 1 4-20
!
Task Completion (2 of 4)
'"�'¥" '""'
UUfi'IISPn WorftlWrde'EducationServices '""'"' JUntper net J 4-21
�J •· '
ask Completion (3 of 4)
[edit]
lab@Rl# show policy-options policy-statement rip-ospf
term agg (
from (
pr.otocol aggregate;
route-filter 10.31.0.0/16 exact;
l
then (
external
type 1;
I
accept;
[edit]
lab@Rl# show protocols ospf export
export rip-ospf;
Configuring R1
The slide displays the necessary configuration on R1 to redistribute the aggregate route that
represents the RIP routes. Notice that the aggregate route is not the most specific summary route
possible for the prefixes. The task does not require you to configure the most specific summary
route, so do not waste time doing so. The metric type is set to a value of 1. which is important
because without specifying this metric value the summary route would be redistributed with a metric
type value of 2.
Task Completion (4 of 4)
[edit]
lab@R2# show policy-options policy-st atement rip-osp£
term agg {
from {
protocol aggregate;
route-filter 10.31.0.0/16 exact;
l
then {
external
type 2;
I
accept;
[edit]
lab@R2# show protocols ospf export
expo rt r ip-os pf;
Configuring R2
R2's configuration is similar to Rl's configuration with the only difference being the metric type,
which is set to a value of 2. Technically, this setting is unnecessary because R2 wilt redistribute the
route with a Type 2 metric by default. However, configuring a Type 2 metric helps to visually clarify the
policy. This setting causes Rl's redistributed aggregate route to be more preferred by other routers
in the network.
Task Verification (1 of 4)
• Path verification-R3
lab@R3> show route 10.31/16
ask Verification (2 of 4)
• Path verification-R4
lab@R4> show route 10.31/16
-ic·--=--�- �,!'�'<'1
UUlilmJ ,W�rldwide Educatlo n Services
'li
Task Verification (3 of 4)
• Path verification-R 1
lab@Rl> show route 10.31/16
Revisiting R1
After configuring route redistribution, it is always best to revisit the routers that are redistributing the
routes. Having two routers redistribute the same routes can cause unintended results on those
routers. For example, if this task required you to redistribute the specific RIP routes into OSPF, and an
earlier task required you to configure an external OSPF preference of 99, R1 would forward traffic
destined for the DC router towards R2 because R1 would be receiving the specific routes from R2 in
OSPF and they would have a preference of 99. The OSPF routes would be more preferred than the
RIP routes, which have a preference of 100.
Tas Verification (4 of 4)
• Path verification-R2
lab@R2> show route 10.31/16
Revisiting R2
�unm --
wo'rtdwideEducationServlces WWWJun,pernet I 4-27
The recommendation of revisiting R1 is applicable for R2 as well. From the slide shown, you can see
that the correct routing information is present on R2.
Summary
• In this chapter, we:
• Identified IGP Implementation subjects for the JNCIE-SP
exam
• Explained how to configure and monitor IS-IS
• Explained IS-IS areas and levels
• Described IS-IS and OSPF route summarization
• Explained IS-IS and OSPF metrics
• Described IS-IS DIS considerations
• Explained how to configure and monitor OSPF
• Described OSPF DR and BDR considerations
Chapter Objectives
UUr.1ffli ;WorldwideEducatlonServices
��s �
wwwiunipernet 1 5.3
1;1;:::& h--
IGP Troubleshooting
The slide lists the topic we discuss next.
• Possible causes:
• Mismatched area IDs for Level 1 IS-IS adjacencies
• Duplicate system IDs
• Incorrect IP addressing
• Mismatched subnet masks do not affect IS-IS adjacencies
• Hello authentication mismatch
• LSP authentication problems do not affect IS-IS adjacencies
• Mismatched interface types
• Interfaces missing the family iso statement
• Interfaces that are physically down
• Incorrect IS-IS interface placement
• Low MTU setting-less than
.,
1492 for protocol family ISO
if�= .,•-<WW¥Wf===
G JIJCJW,iWprldwill,eEducalionServices waw1un,peroet I 5-6
,,.,���'U;;;.s!« ««
:, . W&��*-''-'"
m:.Jf;l���orl®!ideEducationServices
-�� ""==
WWl'l]unopernet J s-a
An Overloaded Router
• What does it mean to have an overloaded router in
IS-IS or OSPF?
• In OSPF, the router advertises the maximum metric for any
routes that will cause the router to forvvard transit traffic
• In IS-IS. the router floods its locally generated LSP. to other
IS-IS routers. with the overload bit set
• Be careful if the overload timeout statement is
configured
• Bouncing the protocol will cause the router to become overloaded
• A router can be configured to be overloaded or can become
overloaded
• If the prefix-export-limit statement is configured and the
router exceeds that limit. it becomes overloaded
----� ,--
' .
• un1Per,/{WOrldwideEducalionSe1Vices
� ;;.�"� '-'_;
ww�)<Jn,pernet I 5-14
• Task:
• The OSPFv2 adjacency between Ri and R2 is currently not
operational. Ensure that the adjacency reaches the Full
state.
!! I
What Now?
• What are the required components?
• Must you troubleshoot OSPFv2 and OSPFv3? No
• Only OSPFv2 adjacency establishment is required
• Which troubleshooting tools can you use?
• Examine OSPF adjacencies
• Adjacency states might provide valuable clues
•monitor traffic interface interface-name
detailortraceoptions
• MTU problems
• Hello and dead intervals
• Mismatched subnet masks
• Others
Task Completion (1 of 3)
11""=
1";;: = ·-
Worldwide Education Services '""'" Juniper net 1 5-17
ask Completion (2 of 3)
Task Completion (3 of 3)
commit complete
"'
Task Verif cation
Summary
• In this chapter, we:
• Identified IGP implementation subjects for the JNCIE-SP
exam
• Explained possible causes of IS-IS and OSPF adjacency
problems
• Described troubleshooting of IS-IS and OSPF adjacency
problems
• Explained troubleshooting of routing loops
• Explained considerations for overloaded routers
• Described troubleshooting of route summarization issues
�� ..,.....�
WcirldwideEducationServicas ww.,Junope,net I s-21
Chapter Objectives
IBGP Sessions
BGP sessions fall into one of two categories: IBGP or EBGP.
IBGP sessions usually use loopback addresses because the underlying interior gateway protocol
(IGP) normally provides redundant paths between two BGP speakers. BGP uses the AS path as a loop
detection mechanism. Because the AS path is not changed within an AS, IBGP cannot send updates
received from IBGP neighbors to other IBGP neighbors. This constraint requires that IBGP networks
be designed with a full mesh of IBGP speakers. Configuring and maintaining a full mesh of sessions
poses a challenge in bigger ISP networks. To overcome the problem, Internet service providers (ISPs)
use route reflection, confederations, or a combination of the two scaling methods. In the exam, you
should be ready to configure any of these methods. We discuss them later in this chapter.
EBGP Sessions
EBGP sessions are usually established with directly connected neighbors across an AS boundary.
EBGP takes the IP time to live (TIL) value of 1 by default You can optionally tune up the parameters
of both IBGP and EBGP to establish the sessions as needed.
Upon receiving an update BGP always checks the BGP next hop for reachability. Recall that BGP next
hop is changed over EBGP sessions but not over IBGP sessions. You can either change the next hop
to self with policy at the AS boundary router (ASBR) before sending an update to IBGP neighbors, or
you can configure the ASBR external interface as IGP passive. You should know how to use both
approaches for the exam. We review routing policies later in this chapter.
2. AS-dot notation:
[edit routing-options]
user@Rl# show
autonomous-system 1.34464;
Note: We recommend that you use only one method across the domain to avoid confusion.
®--e�0---t®-+-t
PE1 LSP PE2
1Pv6 1Pv6
6� -------------- 6�
1Pv41BGP
��"""'"."¥
WorfdwfdeEducationServices wwwiuniporne1 1 6-7
�"!h,;
·��
ffi
ge-0/0/2
unit O
family inet
address 10.255.2.1/24;
family inct6;
family mpls;
loO
unit O (
family inet
address 10.255.255.16/32;
[edit protocols]
user@PEl# show
ldp
interface ge-0/0/2.0;
mpls (
ipv6-tunneling;
interface ge-0/0/2.0;
bgp
group to_PE2 (
type internal;
local-address 10.255.255.16;
family inet6 (
labeled-unicast (
explicit-null;
neighbor 10.255.255.15;
group to_CEl
local-address 8001::2;
family inet6 (
unicast;
peer-as 200;
neighbor 8001::l;
- 'S .....
Worldwide Education Services www J""P" ne1 1 6·9
t
•cl< - -laa.c}c.s,.-,
-· ·=v� N;,m•
�l.:J[l� WJ?,rldwideEducallonServlces ,wmJun,perne! 1 s-10
� �t = �
BGP Authentication
'l'li'l\e, '
Worldwide EducatlonSe111ices ww"'J'"P" net I s 11
(H
""• �
BGP Authentication
One possible exam task might be configuring BGP authentication. By default, authentication for BGP
sessions is disabled. There are two approaches to configuring BGP authentication: configuring a
static key or configuring key chains. The latter method allows hitless authentication key rollover
because a key chain can be configured with several keys-each of them having a specified activation
date and time. Key chains also allow you to choose which authentication algorithm to use. If you are
using static key chains, there is only one authentication algorithm-MOS. Hence, you must configure
only one authentication key.
Recall that authentication can be configured under BGP protocol, group, or neighbor level, and the
most specific application overrides those of less specific. The following snippet shows an example
configuration for the MD5 authentication. The authentication key is always shown in the hashed
form, however, you must enter it as a plain text while configuring the key from the keyboard.
[edit security]
user@Rl# show
authentication-key-chains
key-chain my-key-chain {
key O {
secret "$9$mPz69CulEytuNb2aiHtuOBic"; ## SECRET-DATA
start-time 2011-01-01.06:00:00;
key l {
secret "$9$cHArK8-VYZUHX7UHqmF3Sre"; ## SECRET-DATA
start-time 2011-07-01.06:00:00;
'.
• Confederation notes
• Defined in RFC 3065
• Breaks an AS (confederation) into multiple sub-ASs
• Within each sub-AS:
• Use a private AS number
• An I BG P full-mesh topology is required
• Between sub-ASs:
• EBGP-type(CBGP) sessions are required
• Only the AS path attribute is changed
- Prevents loops in t11e network
- Sub-AS numbers are not used when comparing AS path
lengths
• Other BG P attributes are not modified by default
Time-Saving Tips
Read the entire exam, and each scenario task carefully before starting the configurations for the
given scenario to avoid making unnecessary mistakes and having to redo tasks. If you plan well, you
can complete all tasks in the scenario more efficiently, avoiding mistakes.
Using the topology maps provided, or alternatively redrawing the topology and planning the route
reflection or confederation design will make it easier to ensure that the design meets all the exam
criteria in terms of redundancy and so on.
You can consider decomposing the tasks into 1Pv4 and 1Pv6 tasks. For instance, you can configure
your 6PE application as a standalone task. Be careful to properly integrate the tasks.
The Ju nos OS BGP implementation mandates the use of BGP groups for all neighbors. Carefully
consider the efficient grouping of neighbors to apply your policies in more logical manner. Think in
terms of policies.
Consider reusing configurations when possible, using copy and paste. Efficient use of an off-line text
editor such as Notepad can speed up these tasks significantly. Remember that the Ju nos OS has
multiple ways of achieving copy and paste. Take time to explore the benefits of using these different
tools.
''JUnlPefii,Worldwide
T lC:�� ;tj :.
Education Services '""'� Juniper nel J 6 18
-
'4
��...
Wof!��e E�ucation Services ww" ,uniper net 1 6-19
Community Types
• Regular community
• 2-byte-as-number:assigned-number (65003: 1111)
• Well-known communities
• no-export (OxFFFFFFO 1)
• no-advertise (OxFFFFFF02)
• no-export-subconfed (OxFFFFFF03)
• Extended community
• type:administrator:assigned-number
• 2-byte AS specific
• 4-byte AS specific
• 1Pv4 address specific
• I Pv6 address specific
Regular Community
Regular communities are 32-bit long communities divided into two main sections: first 16 bits to
encode an AS number, last 16 bits to encode a unique number assigned by the AS. Three community
attribute values are designated as well-known communities. The three communities are no-export,
no-advertise, and no-export-subconfed. No-export is used to limit a route propagation scope to a
neighboring AS only. Similarly, no-export-subconfed is used to limit a route propagation scope to a
neighboring sub-AS only. No-advertise is the strictest one, which limits a route propagation scope to
a neighboring router only.
Extended Community
Because regular communities do not provide enough expansion for services such as VPN, Extended
community are used. An extended community is an 8-bytes value divided into two main sections: a
2-bytes type field and a 6-bytes unique set of data in a format defined by the type field. Different
types of extended communities exist, such as 2-byte AS specific, 4-byte AS specific, 1Pv4 address
specific, 1Pv6 address specific communities.
:]\"W.
�on�" WorldwideEducationServices WW�Jun,pernet J 6·23
Using Regex
Regex offer powerful pattern matching capabilities. You can use regex with both AS path and
community BGP attributes in routing policy. The regex format is tenn operator, where the term
represents an AS number in AS path regular expressions.
There are two steps to using the as-path option in the Junos OS routing policy language. The first
involves the definition of the actual regular expressions, which in turn are referenced by a user
defined name.
You can use regular expression with BGP communities to find communities that match a given
pattern. Similarly to the AS path regex discussed, community use in routing policy follows the same
format, requiring the community to first be defined and then referenced in the routing policy. There is
one difference with communities compared to aspath-regex. in that where aspath-regex typically only
gets used as a match condition in a policy, a community not only can be used as a match condition
but also in the action part of a term or policy to either set the community, add the community or
delete the community.
It should be noted that when multiple community definitions are listed in the FROM statement, this
list is evaluated as a logical OR for match purposes. However. listing multiple communities when
defining them results in logical AND functionality.
Continued on the next page.
AS200 AS300
route 0, NH = discard
Policy
from community RTBH _I/
then NH= 0 uRPF
/1' R2
AS65000
- _____,,,.,,
OoS attack reported
R3
AS100
Customer
..
Lll!.lfi11Pe'"/w-;;'r1t1wide
�:, Education Services "'"'" JUOIP" net I 6-27
• Trigger router
[edit couting-options] [edi t policy-option s]
usec@R3# show usec@R3# show
static { ipolicy-statement TRIGGERi{
coute 10.100.1.1/32 teem 1 {
tag 666; from (
ceject; pcotocol static;
tag 666;
then {
local-pcefecence 200;
[edit pcotocols bgp]
usec@R3# show
jcommun1.ty se� RTBH; I
community ad no-expoct;
gcoup IBGP { accept;
type internal;
local-add cess 192.168.100.3;
!expoct TRIGGER; I
neighboc 192.168.100.10; community RTBH membecs 100:666;
community no-expoct membecs no-expoct;
[edit policy-options]
user@Rl# ,:how
[edit protocols bgp] I pohcy-statement ELACR H6LE fIL!ER jl
user@Rl# ,:how fcom {
group IBGP { protocol bgp;
type inte ma l; as-path LOCP..L-P..S;
local-address 192.168.100.1; community RTBH;
!import BLACK-HOLE-FILTER;!
neighbor 192.168.100.10; then {
next-hop discard;
-
Worldwide Education Services WW� JUnrpo, net I 6-29
1�1�
• Policy creation
• Term order is important
• Understand the default BG P routing policy
• Applying policies
• Ensure you apply the policy
• Directionality is important
• Import or export
• Policy application order is important
Policy Creation
When creating your policies it is very important to consider the order of your terms. As you are aware,
a route can only be accepted or rejected once. If you are not careful you might accept or reject a
route before you get to the term that you created to address this route. Make sure you are aware of
the BGP default policy and which routes are accepted and rejected.
Applying Policies
Make sure you apply the policies you create. It seems very obvious, but it is easily overlooked when
configuring multiple routers and multiple policies. You must also make sure you apply the policy
correctly as an import or export policy. It is also important to keep in mind that the order of your
policies being applied is very important.
�q�/�
uunm::,;:;'o ��deEducatlonServices WW�Jun,pe,net I 6·31
Policy Time-Savers
As mentioned before, read the entire exam, and each scenario task carefully before starting the
configurations for the given scenario to avoid making unnecessary mistakes and having to redo
tasks. If you plan well, you can complete all policy tasks in the exam more efficiently, avoiding costly
mistakes.
Do not just start configuring your policies. Strategically plan which tasks can be combined into a
single policy using separate terms. It might be a good idea to outline which tasks apply to each router
so you know what policies need to be created as you move from router to router during the exam.
Many routers require the same policies. To save crucial time, reuse as many policies and terms that
you can by using some method of copy and paste.
i
".
't 0sr, @'" ""{M tP{\t �
:)Ufi'l� WorldwideEducationServices wa•Jun,pernet 1 6·32
-,2ci,>Ji -
AS200
Loop backs Pl----�Rl
Rl - 192.168.1.1
Provider
AS100 0 � �"
,r.,1
�----1c°w'
�Customer-1
AS 700
I�I'
R2 - 192.168.1.2 150150 0/16 2
2002000/16
R3 - 192.168.1.3
R4 - 192.168.1.4
• Task:
• Routes received from the Provider router should not be
advertised to the Transit-1 router or vice versa.
What Now?
• What are the required components?
• Connectivity
• IBGP neighbors must be established
• EBGP neighbors must be established
• IBGP core must be learning routes from EBGP neighbors
• External routes must be active in IBGP core
• Next hop self policy or external interface in IGP passive
• Unique community must be created for all external peers
• Import policies must be created and applied to tag each
external peer's routes with a unique community
• Export policy must be applied to the appropriate EBGP
peering to reject routes tagged with the defined community
�LlUG'l!EeJ:� '&o;!dwide Education Services
� =��{0.l0i!"" =-='t,y "*,.tti �
Task Completion (1 of 6)
-- ·-�o,�-�-
�Ur.ll�'f''WortdwideEducationServices wwwJun,pornet 1 6·35
bl: �k=="
Task Completion (2 of 6)
1.50.1.50 .0. 0/24 • (BGP 170 02: 1.2: 30, localp,·ef 1.00
AS ath: 100 I
> to 1.72.27.0.30 via ge-0/0/1.0
Route Verification
The slide outputs show that there are routes present from each of the external network in Rl's
routing table. This output indicates that we are receiving routes from the external peers. It also
indicates that the next hops for the external routes are being altered within the IBGP network.
Task Completion (3 of 6)
[edit policy-options]
lab@Rl# set commu.n.ity c1-:rout;es members,200:7001
[edit policy-options]
le.b@Rl# set community t1-rout;es members,200:5001
Task Completion (4 of 6)
Task Completion (5 of 6)
then reject;
ask Completion (6 of 6)
Task Verification (1 of 2)
-·�·-
�l:Jnffl ,,wo�dwideEducationServices ww..,,un,p..n,t J 641
)M;lJ,a==
Task Verification (2 of 2)
=--=-�"
UUfi'lJ.fz,�fL \A{llr!!fwicle EducalionSe111lces www Jun,per net 1 6 ·42
�k.;';,.,��,.,
Summary
• In this chapter, we:
• Described IBGP and EBGP advanced topics
• Implemented complex routing policy with 1Pv4 and 1Pv6
Chapter Objectives
;t, -�
l:J(;llDt=lfi. Worldwide Education Services www Jun.pernet 7-2
J
�f ,1��
,, .
Common Sources of BGP Peering Problems
BGP rides on top of TCP/IP, hence TCP/IP connectivity is crucial in BGP operations. If a BGP session
does not come up the first thing, you should check whether two peers can reach each other using
the session IP address.
If IP reachability is verified, then BGP misconfiguration can lead to the BGP session-stays in Active
or Connect state.
If authentication is configured, an mismatched key will disrupt TCP and so BGP communication.
And last. but not least , incorrectly configured firewall filters blocking BGP TCP port 179 prevent BGP
communication as well.
Use traceoptions
If you still cannot find the source of problem with BGP, use traceoptions to debug BGP sessions.
lab@R4> show log bgp-trace.log
Feb 11 12:52:31.750571 BGP RECV 201.201.0.1+179 -> 10.0.3.4+3291
Feb 11 12:52:31.750622 BGP RECV message type 1 (Open) length 45
Feb 11 12:52:31.750668 BGP RECV version 4 as 65011 holdtime 90 id 201.201.0.1 parmlen
16
Feb 11 12:52:31.750692 BGP RECV MP capability AFI=l, SAFI=l
Feb 11 12:52:31.750707 BGP RECV Refresh capability, code=128
Feb 11 12:52:31.750718 BGP RECV Refresh capability, code=2
Feb 11 12:52:31.751108 bgp__process_open: NOTIFICATION sent to 201.201.0.1 (External
AS 65010): code 2 (Open Message Error) subcode 2 (bad peer AS nwnber), Reason:
peer 201.201.0.1 (External AS 65010) claims 65011, 65010 configured
Feb 11 12:52:31.751156 bgp_send: sending 21 bytes to 201.201.0.1 (External AS 65010)
Feb 11 12:52:31.751175
Feb 11 12:52:31.751175 BGP SEND 10.0.3.4+3291 -> 201.201.0.1+179
Feb 11 12:52:31.751194 BGP SEND message type 3 (Notification) length 21
Feb ll l? .:52:31.751208 BGP SEND Notification code 2 (Open Message Error) subcode 2
(bad peer AS number)
EBGP Specifics
• Route reflection
• The same IBGP sessions
• Note that RRs must be fully meshed
• Confederation
• CBGP sessions are EBGP-like sessions
• Check tl1at multi hop is configured for loopback peering
• Check that peer-as is set properly
• Check that local -address is configured for loopback peering
• Double-check the confederation settings in routing-options
� I -
��nlPer�•WorldwideEducationServices www,un,pm,t 1 7-9
...'!'�,:..-..�,,,-J,,,
Confederation Specifics
Be careful with CBGP sessions configuration. The sessions are EBGP-like sessions but they are
established within a single confederation AS, usually using loopback peering on top of underlying IGP
infrastructure. Watch out for mul tihop, peer--as and local-address settings. Double check
the confederation configuration in routing-options.
Connectivity Problems
Policy Misconfiguration
-�""!!19""" I
1
WorldwldeEducatlonServices 'A'W,VJUnrp .. net I 7-11
' � ..L. ' I
inet.0: 917 destinations, 2636 routes (912 active, 0 holddown, 1700 hidden)
Prefix Nexthop MED Lclpref AS path
* 35.0.0.0/8 172.27.0.34 100 1342930876 8918 237 I
Hidden Routes
• Routes are marked hidden and are not used if
• BGP cannot resolve BGP next hop
• Useshow route hidden
• Useshow route resolution unresolved
• Routes are filtered out by a policy, perhaps intentionally
• Useshow route hidden
Hidden Routes
BGP marks routes as hidden if it either cannot resolve the received BGP next hop or the routes are
filtered out with an import policy. Use the show route hidden command to check whether you
have any hidden routes.
lab@Rl> show route hidden
� "'"' ��
--Ii.'*'
WorldwldeEducationSer.ices ww�Junipernet J 1-1s
import from-Tl;
export to-Tl;
peer-as 1342930876;
neighbor 177..27.0.34;
j
www.uniper.net BGP Troubleshooting • Chapter 7-17
JNCIE Service Provider Bootcamp
• Routing is OK
• Check firewall settings
• Use traceroute to verify that traffic follows the IGP
best path or MPLS LSP as required
,., -
, 1�., •
�Ufil�'l·"':'o�d:ideEducationServices -�Jun,pern,11 7-18
Is Routing OK?
If the examination shows that routing works properly but connectivity problems still exist, the
problem might be related to the firewall settings.
Debugging BGP
For complex problems, use traceoptions.
Time-Saving Tips
The slide highlights the topic we discuss next.
Time-Saving Tips
�= 'Kn'i:t
�LJn�;WorfdwideEducationServices ww.,Jun,pe,oet 1 7·21
=&°¥= "-"� I
Summary
• In this chapter, we:
• Discussed and troubleshot BGP peering problems with
misconfigured peering
• Described and troubleshot connectivity caused by routing
policy or fixed by routing policy
• Explained and troubleshot misconfigured BGP settings
La 7: BGP Troubleshooting
Chapter Objectives
Multicast Forwarding
When forwarding unicast traffic, the router is primarily concerned with the destination address. The
goal of unicast forwarding is to send the packet in the direction of the destination. A route lookup is
performed to find the best route toward the destination, and the packet is sent in that direction.
Multicast forwarding is not initially concerned about the destination address of a multicast packet.
Multicast forwarding bases its decisions primarily on the source address of the incoming packet. The
goals of multicast forwarding are to make sure traffic sent toward the receivers does not loop in the
network and also to avoid packet duplication. To make sure no loops or duplicated packets exist,
multicast routing sends only a single packet down each branch of the distribution tree.
To determine which incoming packets are sent down the distribution tree, multicast forwarding uses
the reverse path forwarding (RPF) check. The RPF mechanism basically selects packets to forward
down the distribution tree only if the packet was received on the interface that is nearest to the
source.
The RPF check looks into the routing table to determine the best route back to the source. The
next-hop interface of that route must be the incoming interface of the multicast packet. If the
interfaces match, the packet passes the RPF check and can be forwarded down the tree. If the
incoming interface does not match the route back to the source, the RPF check fails and the packet
is discarded.
""
� tr""'"'�
�l:Jnm ��orldwideEducationServices www,unopernet I a-s
-..A.-J1�%,
• Sparse mode:
• Assurnes sparse distribution of receivers
• More realistic scenario for most networks
• Explicitjoin rnodel
• Multicast traffic is forwarded only to routers that explicitly
request it
• rvlore cornplicated source discovery rnechanisrn required
• RP is required for source discovery in any source multicast model
• Source-specific multicast does not require RP
- Source discovery become�, an application issue
• Sparse mode:
• Shared tree(*. G)
• Initial forwarding state in routers assumes path through RP
• Potential suboptimal path between source and receivers
• Source-based tree (S,G)
• Router nearest to receiver learns about source when receiving
traffic
• If source is known. the router can switcl1 to shortest path between
source and receiver
%11�"') ;i
LJt.:JfilfPefi
�
oildwideEducationServices
""
wwwiun,porn,1 a-s
J
as ' " s=
MSDP Overview
• Communicates information about active sources
between RPs
• lnterdomain RPs
• lntradomain RPs
• Anycast-RP uses MSDP to improve failover time
MSDP Operation
• MSDP peer states:
• Disabled: Peer is not configured
• Inactive: Peer is configured but not listening or connecting
•Connect: Active peer attempts to initiate TCP session
• Listen: Passive peer is configured and listening on port 639
• Established: TCP session is established
• SA message flooding:
• SA message is sent when the source registers with the RP
• If the source is still active. the RP will resend the SA
message every 60 seconds
• SA messages are cached on receiving peers (inet. 4)
SA Messages
The SA message is sent by an RP with MSDP, when the RP becomes aware of a source through the
incoming register message. The SA message is sent to all the RP's MSDP peers. The SA message is
sent every 60 seconds until the source stops sending multicast traffic.
The receiving MSDP peers store this information in their SA cache, if the message passes the
RPF-peer check. In the Junos operating system, this SA cache is stored in the inet. 4 table. To clear
the MSDP cache information, use the clear msdp cache command.
Any SA message that passes the RPF-peer check is sent to all MSDP peers except the peer where the
SA was received.
MSDP SA Flooding
MSDP floods SA messages normally to all its peers except the peer from which it received the
message. Thus, peers can receive the same SA message from more than one peer. To prevent
unnecessary flooding or looping of these messages, MSDP uses a peer-RPF check.
Peer-RPF Check
When an SA message is received, MSDP performs a peer-RPF check, and only messages that pass
this check can be used (cached locally and forwarded to other peers). The peer-RPF checks to
determine whether the sending peer is on the path towards the originating RP. The concept is similar
to the general multicast RPF check in which traffic is forwarded only away from the source; with
MSDP, SA messages are forwarded only away from the originating RP.
Next, we look at multiple peer-RPF rules.
".
If the advertising MSDP peer is the actual originating RP, then SA message is accepted.
If the advertising MSDP peer is not the actual originating RP, but:
The advertising MSDP peer is the BGP next hop for the originating RP address,
then the SA message is accepted.
The advertising MSDP peer is the advertising router for the route towards the
originating RP, the SA message is accepted.
The advertising MSDP peer belongs to the last AS listed in the BGP route path
towards the originating RP; then the SA message is accepted. If multiple peers
exist from that last AS, SA messages from only the one with the highest IP
address will be accepted.
SA messages received from the configured default MSDP peer. For domains that only
have a single MSDP peer, it is essential that all of the received SA messages are
accepted.
Anycast .. RP Overview (1 of 2)
- ,,,!Tr�;u,.. "'
uwnm�. WorltlwideEducationServfces www,un,p,.net I e-19
�;&; =
Anycast·RP Overview {2 of 2)
0 •
Anycast Address
On each of the RPs, a secondary IP address is used by all RPs to signal the RP role.
�D
S1 R3 Rl Reel
giD
37 .6 .21
ge-0/0/2 ge-0/0/1 ge-0/0/4
@ ®
�, � f°/Q/4 �·,:
N
....... .......
0 0
....... .......
o o
Roc2
�� ge-Q/oN��
�ge-0/0/6 �ge·0/0/4
--,,,""',..,..,--
eJ D
ff"'
• Task R4 .14 R2 .57
• R1 and R3 are RPs for the PIM domain, and the RPs must
support load balancing for a given group. The RPs must also
support 1Pv6 for future implementation. Rec2 must always
use the RPT. inet.O cannot be altered. and RIB groups
cannot be used to accomplish this task.
�l!.Jlilm,
ii:��,}---""-�·
Worldwide Education Services WWW ,,nipe, ne1 I 8·23
What Now?
• What are the required components?
• PIM sparse mode
• The RPs must load balance the same group
• Is PIM anycast-RP required? Yes
• Can MSDP be used for this task? No
• How can you make joins from Rec2 always use the shared
tree and not cutover to the source tree. without altering
inet.O?
• Will altering inet.2 work? Yes, but you are not allowed to
use RIB groups
• Create a policy to not allow the SPT cutover to take place
• Where is the policy applied? R2
Task Completion (1 of 3)
interface all;
interface ge-0/0/0.0
disable;
interface all;
interface ge-0/0/0.0
disable;
Task Completion (2 of 3)
RP Configuration
The slide displays the necessary configuration for PIM anycast-RP on R3. Similar configuration is
also needed on R1 (with the correct IP addresses) to complete this part of the task. Make sure to
configure the same secondary loO address on both R1 and R3, and to configure the unique loO
address as primary (best practice to ensure it is used as the router ID). You will notice that the
non-unique loO address is used as the local RP address, and the unique loO address is used for the
anycast configuration.
Task Completion (3 of 3)
}
inter:face all;
inter:face ge-0/0/0.0
disable;
LJl!.Jn� '°',¥'.';.<'l')l
WortdwideEducatlonServices WW�Jun,po,net I 8-27
" -1als!.0,tL
Policy Creation
The slide displays the required policy to keep group 224.1.1.1 from cutting over to the SPT. The policy
is then applied under PIM as a SPT threshold on the last hop router, R2. The SPT cutover threshold of
infinity applied to a source-group address pair means the last hop routing device never transitions to
a direct SPT.
ask Verification (1 of 4)
Tas Verification (2 of 4)
• Verify PIM anycast-RP configuration
• Make sure both RPs will support the same group range
lab@Rl> show pim rps extensive
Instance: PIM. mastec
:O.ddcess family INET
�Jt" "�
Wor!dwideEducationServices ww.vJunopernet I e-29
; ":i ,._.......,,..
RP: 112.27.255.11
Learned via: static config uration
Interface: ppd0.32769
Group Ranges:
224.0.0.0/4
Anycast PIM rpset:
172.27.255.1
Anycast PIM local ad d ress used: 172.27.255.3
Anycast PIM Regis te r State:
Group Source Origi n
224.1.1.1 172.27.0.38 DIRECT
ask Verification (3 of 4)
Task Verification (4 of 4)
MulticastTraffic Is Flowing
The slide displays that the multicast traffic for group 224.1.1.1 is flowing towards Rec2.
Summary
• In this chapter, we:
• Explained multicast forwarding
• Described and configured PIM sparse mode
• Described and configured intradomain MSDP
Chapter Objectives
�""��itw� '"'
�7"',H<v"
Ull.lfl� wori;,dWld?EducatlonServices WWWJun,pernet I 9-3
,..,mfJdJ;;/S,tt;z
:Jtlfil!R.err\
' wi':1�;lde Education Services WV"'1 Jun,p,rnet I 9-4
I -•t �
• Schedulers
• Understand their use and various options and where they
appear in the context of processing
• Tri-colored marking
• Understand what it is. and how it complements
classification and drop profiles
• Policers
• Understand the different methods that are used when
applied and the different traffic actions supported
J:t�
WtirldwldeEducationServices wwwiunipernet 1 9·6
z�
III
List Cos Exam Topics
�Cos Processing Refresher
II
Caveats, Tips, and Tricks for the CoS Section
• Sarnple Task Analysis
Ingress
BA Multifield
Classifier Classifier
Lookup
----i
Egress I WRED/
Drop
I P rofiles
!1
1
-
I -- --------,
-1----------�
Queue/Scheduler
Marker
r---- j
Rewrite/ _ Policing
(Egress)
�----'
, -
Wort wideEducationServlces
' , ti..,..,.,, * =
www,un,pornet 1 9.7
,,
....-yrn.,.,,,�=� <
�Ufill1�' Worldwide Education Services '""" Jun,per net I s-10
� 'll�W.-\t.i ....
- --fu-
UltlfllPef: WoH�de'EaucationServlces WW,VJUntpecn,t I 9-11
Closing the gap on the more obscure concepts of the CoS section of the JNCIE-SP exam allows you to
feel more comfortable with the shorter tasks on the exam. A lot of these concepts might appear
intimidating at first, but they are not hard concepts to understand and could make a difference in
scoring points on the exam.
r: _.._ '-""''-'i �
h<'1'._
'LJUfillPer. WorldwideEducallonServlces ww,)un,pernet I 9-12
,..,,,..,... ;J,".l',,;,i_, ,
II
List CoS Exam Topics
• CoS Processing Refresher
• Caveats, Tips, and Tricks for the Cos Section
7 Sample Task Analysis
R4
Customer4
$-
eg _-o_;o_;4
___
$
• Task:
• Create a firewall filter on R4 named R4-police.
Reclassify any traffic to port 80 exceeding 20 Mb from
Customer4 to the best effort queue and mark this traffic
as loss priority high.
What Now?
• What are the task requirements?
• The task is asking for a policer configuration that matches
destination port of http.
• The task asks to use a narne for the filter. Since the
configuration requires both a policer and filter. we narne
both the sarne way.
• The task does not ask what burst size rate to use we use
15 tirnes the MTU size to be safe.
,u..:-1>"' ,
.Worldwide
, "'
EducationSel'\lices
u ci.c - -
..,,� JUntper net I 9·15
What Now?
The task is asking for a policer that matches destination port of 80 which is also the http port. The
tasks asks to use a name, but since it is required to configure both a policer for the rate limit portion
and a firewall filter to only apply the policer to http traffic, it is recommended the same name is used
on both to make sure the task requirement is met. Since no burst size is given, it is safe to use 15
times the MTU for the burst size.
Task Completion (1 of 2)
then (
loss-pr:ior:ity high;
for:war:ding-class b est-effor:t;
}
ter:m 2 (
then accept;
-
t
. ------
!.)Uf11W'i1 Worldwid11EducalionSe1Vtces
,..it,;sdi ..t.. ,,,. "
..
�
wwwJun,perne• J 9-16
Task Completion (2 of 2)
• Step 3: Apply filter to ingress interface and commit
lab@R4# show ge-0 /0 /4
unit O {
descciption Customec4;
family inet {
filtec {
input R4-police;
[edit interfaces]
lab@RIJ# commit
••
IW'f- •
9,1!.lr'l Woffdwid�EducatlonSe111lces WW,VJUOlporoet I 9·17
.m
ask erification
-- -""�""W;(t�""-
Task Verification
As mentioned during the tips, tricks and caveats section, CoS tasks are hard to verify, a lot of trust
has to be put in the configuration made. With a policer configuration since is not an option to
generate the amount of traffic needed to trigger the policer. With that said if a quick way to check
that the filter is applied, the show interfaces filters command should satisfy that need.
Summary
• In this chapter, we:
• Identified the Cos technologies covered for the JNCIE-SP
exam
• Reviewed the Cos process in a router
• Explained any caveats. tips, and trict\s for the Cos section of
the JNCIE-SP exam
• Walked through a sample task
"""""""
tJUffilf.(;Ji WorldwideEducationServices -�1un1pornet I s-20
�"
Chapter Objectives
� MPLS Implementation
• Sample Task Analysis
MPLS Implementation
The slide lists the topics we cover in this chapter. We discuss the highlighted topic first.
MPLS Overview
MPLS Labels
MPLS labels can be either assigned manually or set up by a signaling protocol running in each
label-switching router (LSR) along the path of the label-switched path (LSP). Once the LSP is set up,
the ingress router and all subsequent routers in the LSP do not examine the IP routing information in
the labeled packet-they use the label to look up information in their label forwarding tables.
MPLS label values change at each segment of the LSP. A single router can be part of multiple LSPs.
A router can be the ingress and egress router for one or more LSPs, and it can also be a transit router
of one or more LSPs. The functions that each router supports depend on the network design.
The LSR replaces the old label with a new label in a swap operation and then forwards the packet to
the next router in the path. When the packet reaches the LSP's egress point, it is forwarded again
based on longest-match IP forwarding.
There is nothing unique or special about most of the label values used in MPLS. Labels have local
significance, meaning that a label value of 10254, for example, identifies one LSP on one router, and
the same value can identify a different LSP on another router.
Interface Configuration
The default behavior of an interface is to accept IP packets. In the Junos operating system, this
configuration is done by adding the family inet protocol with an IP address to the interface with
which you are working. For the interface to recognize, accept, and send MPLS packets, you must also
configure the MPLS protocol family under the interfaces participating in your MPLS domain.
LDP
The LDP signaling protocol always establishes LSPs that follow the contours of the interior gateway
protocol's (IGP's) shortest path. LDP supports topology-driven MPLS networks in best-effort,
hop-by-hop implementations. Traffic engineering is not possible with LDP. You can tunnel LDP LSPs
over RSVP-signaled LSPs using label stacking. Tunneling LDP through a RSVP LSP allows you to apply
traffic engineering to the portions of your LDP LSP that are being tunneled. Note that you must
enable LDP on the loO. O interfaces to support extended neighbor discovery needed for this
application. Additionally, you must configure the LSPs over which you want LDP to operate by
including the ldp-tunneling statement.
RSVP
The Junos OS supports the extended version of RSVP as the signaling protocol for traffic engineered
LSPs. RSVP provides a tool that consolidates the signaling procedure for a number of tasks or
objects into a single message exchange. These messages can establish an LSP along an explicit
path using an explicit route object (ERO), distribute label-binding information, provide LSP and traffic
protection features, prioritize LSP establishment, and reserve network resources.
".
Using EROS
By adding the ERO to the path message, the ingress LSR can specify a predetermined, explicit path
for the LSP that is independent of the JGP's shortest path perspective. You can define a strict or
loose list of routers that RSVP path messages must visit. The ERO can contain strict hops which
indicate the exact path to use, loose hops which indicate the LSP must traverse this hop before
reaching the egress, or a combination of strict and loose hops in the same ERO.
CSPF
• The CSPF algorithm and traffic engineering database
are used to calculate the best path to signal a RSVP
LSP
• CSPF combines the traffic engineering database with user
constraints
• Bandwidth requirements
• EROs
• Administrative groups
• Prunes non-qualifying paths and performs SPF on remaining
links
• Does not span multi-area (OSPF) or multi-level (IS-IS)
topologies
• Can be turned off using the no-cspf option
• Option available on a per-LSP or global basis
Administrative Groups
• Administrative groups
• Typically named with a color and assigned a 0-32 bit value
• Names are locally significant
• Only bit value is transmitted
• Often referred to as link coloring
• You can choose to include. exclude. or do nothing with links
configured with a particular group narne
• If you include a named group. only those segments are selected
• If you exclude a named group. all segments with that color are
ignored during path selection
• If you do nothing. the metric associated with the named group
determines the patl1 cost for that segment
Administrative Groups
Administrative groups allow you to constrain the routing of an LSP to the set of links that meet the
prescribed administrative groupings. Each interface can support 32 different administrative groups.
The administrative groups associated with each interface is communicated through the extended
IGP for storage in the traffic engineering database.
If you use administrative groups, we recommend that you configure them identically on all routers
participating in an MPLS domain. Great confusion results when a pair of routers do not agree on the
color associated with a mutually attached link. Note that the actual group name is for local reference
only, which means that the exact spelling and case need not be identical between all routers in the
traffic engineering domain because only the bit value is transmitted to the traffic engineering
database. You can assign more than one administrative group to each physical link, or you might opt
to leave one or more links uncolored, by not assigning any administrative group values.
These names are often assigned as colors, but they do not have to be a color; they can be any
descriptive term you want. Each link can have one or more bits enabled, and can therefore be
associated with one or more colors simultaneously. The colors advertised by each link are displayed
in both hexadecimal and in symbolic form in the output of show ted database extensive
command.
You can choose to include, exclude, or do nothing with a particular administrative group. The two
options for including groups in a LSP path computation are include-any, and include-all. If
you omit the include-any, include-all, and exclude statements, the LSP's path calculation
proceeds unchanged, using the default CSPF path selection criteria.
Traffic Protection (1 of 2)
Fast Reroute
The fast reroute operation establishes detour paths within each router of the main LSP to protect
against failure of its next downstream link or router. When a downstream failure is detected by the
upstream router, the router begins forwarding the LSP traffic along the detour path and sends a
Path Err message upstream. The fast reroute detour path serves as an interim transport until a new
LSP can be established. Upon receiving the error message, the ingress router attempts to re-signal
the primary path or moves the LSP traffic to a secondary path, depending on the configuration. Once
a new path has been established by the ingress router, the original LSP along with the detours are
torn down. Each downstream router will use CSPF to calculate its own detour path to the egress
router using only administrative groups as user constraints and does not honor any bandwidth
reservations that might be configured.
Traffic Protection (2 of 2)
• Link protection
• Creates a bypass LSP to protect a downstream link
• Add link protection for the LSP on the ingress router
• Add link protection on all downstream RSVP interfaces to be
protected
• Add user constraints to tl1e bypass LSP like EROs. administrative
groups. and bandwidth reservations
• Node protection
• Creates a bypass LSP to protect a downstream router
• Add link-node protection for the LSP on the ingress router
• Add link protection on the egress RSVP interface before the
downstream router to be protected
• Add user constraints to the bypass LSP like EROs. administrative
groups. and bandwidth reservations
Link Protection
A link protection environment creates a bypass LSP from each router to its immediate downstream
router avoiding the downstream link. The bypass LSP is created as a function of RSVP on each router
where link-protection is configured on the RSVP interface. During a failure, the next upstream router
or the point of local repair will perform a label swap to place the downstream router's label into the
MPLS header. The router then performs a label push operation adding the bypass LSP label as the
outer label, and the packet is forwarded onto the bypass LSP. The penultimate router of the bypass
LSP pops the outer label and the packet is forwarded to the downstream router with the locally
significant label. Link protection must be configured on all the downstream interfaces to be
protected. When configuring link protection on the interfaces you can specify user constraints like
EROs, administrative groups, and bandwidth reservation to be observed when establishing the
bypass LSP.
Node Protection
A node protection environment is similar to the link protection environment in that a bypass LSP is
created to avoid the immediate downstream router. The bypass LSP is created as a function of RSVP
on each router where node-protection is enabled on the RSVP interface. The same swap/push
operation is performed except the label swapped is the label of the next downstream router of the
protected router.
Use the show rsvp interface extensive command to see the presence of a bypass LSP on
the transit node. Note that link protection is an RSVP feature, and as a result, the resulting bypass
LSPs are not listed in the output of show mpls lsp commands.
Bandwidth Reservation
,,.,..,...
u�nm ,\"[_�rld�ide Education Services
"" ".tr�M.i=.-; �
WWWJunopernet I 10-13
Bandwidth Reservation
You can configure an LSP to reserve bandwidth along the path of the LSP. During the setup process
for an LSP configured for bandwidth, each downstream router will receive a request to reserve
bandwidth for the LSP in the form of the traffic specification (TSpec) object. Each router along the
path will make its own individual decision as whether it has enough available bandwidth on its
egress interface for the LSP. To determine whether enough bandwidth is available, a router will sum
the bandwidth of all LSPs traversing the egress interface and subtract it from the total bandwidth for
the interface. If not enough bandwidth is available, the LSP will fail to be instantiated and the
upstream routers will be informed with a Path Err message. This behavior can be changed by altering
the default setup and hold priorities as mentioned on the previous page.
By default, the bandwidth reservation configured for a LSP is only logical and used for LSP setup . The
amount of traffic that actually traverses an LSP is not enforced. It is possible, however, to override
the default behavior and have the ingress router police the traffic that enters an LSP. This can be
done by configuring MPLS for auto-policing or configuring a firewall filter an applying directly to
the specific LSP. If you have multiple LSPs with bandwidth reservations and you do not want the
auto-policing feature to be applied, you must turn off auto-policing for that specific LSP
using the no-auto-policing option under the LSP policing level.
Point-to-Multipoint LSPs
,, . u1.:1nmr:-,;, �orl�ide
�ll'jl'�
""" -
Education Services WWW Junop,.n,t I 10-15
Point-to-Multipoint LSPs
A point-to-multipoint MPLS LSP is an RSVP LSP with multiple destinations. By taking advantage of
the MPLS packet replication capability of the network, point-to-multipoint LSPs avoid unnecessary
packet replication at the ingress router.
A point-to-multipoint LSP allows you to use MPLS for point-to-multipoint data distribution. This
functionality is similar to that provided by IP multicast. A branch can be added or removed from the
main point-to-multipoint LSP without disrupting traffic. The unaffected parts of the LSP continue to
function normally. A router can be configured as both a transit and an egress router for different
branch LSPs of the same point-to-multipoint LSP. Link protection can also be used with
point-to-multipoint LSPs. Link protection can provide a bypass LSP for each of the branch LSPs that
make up the LSP. If any of the primary paths fail, traffic can be quickly switched to the bypass.
Point-to-multipoint LSPs can be configured either statically, dynamically, or as a combination of static
and dynamic LSPs.
LSP Authentication
• RSVP
• MD5 authentication available
• Configured at the RSVP interface level
• All RSVP messages are authenticated
• LDP
• MD5 authentication available
• Configured at the session level
• Applies to session messages only. not neighbor discovery
• If authentication is applied to a established session. the session
will reset and resignal
RSVP Authentication
When needed, you can configure Hashed Message Authentication Code (HMAC)-Message Digest 5
(MD5) authentication for RSVP exchanges. RSVP authentication is configured on a per-interface
basis. Once configured, all RSVP messages are authenticated using a message digest based on a
shared secret key. Sequence numbers are added to all messages to prevent replay attacks. Confirm
that authentication is in effect using the show rsvp interface <interface-name>
detail command.
LOP Authentication
You can also configure MD5-based authentication for the TCP transport protocol that supports LOP
sessions. LOP session authentication is configured on a per-session basis. Note that LOP session
authentication does not apply to the UDP-based neighbor discovery mechanism. Thus, mismatched
LOP authentication settings permit LOP neighbor discovery and adjacency formation, but the LOP
session will not establish without compatible authentication values. Also, note that specifying
interface addresses under the session stanza requires the use of transport-address interface for
authentication to be in effect because LOP sessions form between loO addresses by default. If
authentication is applied after a session is already established, the session will be torn down and
reestablished using authentication.
TIL Manipulation
�ulilm ,. z;,;,-,_
,o�pwldeEducatlonServices
-iii .
WWWJunopmet I 10·17
TTL Manipulation
By default, the time-to-live (TIL) value in the packet header is decremented by 1 for every hop the
packet traverses in the LSP, thereby preventing loops and allowing topology discovery. If the TIL field
value reaches 0, packets are dropped and an Internet Control Message Protocol (ICMP) error packet
can be sent to the originating router. You might want to disable normal TIL decrementing to make
the MPLS cloud appear transparent. thereby hiding the network topology.
The first option for TIL manipulation is using the no-decrement-ttl statement. The ingress
router negotiates with all downstream routers using a proprietary RSVP object to ensure all routers
are in agreement. This command can also be typed within the primary or secondary path hierarchy. If
negotiation succeeds, the whole LSP appears as two hops for transit IP traffic. Note that the RSVP
object is proprietary to the Ju nos OS and might not work with other vendors. Further. this feature
applies only to RSVP-signaled LSPs, and is not supported on LOP-signaled LSPs. You can apply
no-decrement-ttl on a per-LSP basis under the [edit protocols mpls
label-switched-path lsp-name] hierarchy or globally under the [edit protocols
mpls J hierarchy.
The second option is using the no-propagate-ttl statement at the [edit protocols
mpls J hierarchy level of all routers in the path of the LSP for proper operation, which is in contrast to
the ingress based setting for the no-decrement-ttl option. Note that the no-propagate-ttl
statement applies to all LSPs in a global manner. regardless of whether they are RSVP or LOP
signaled. Once set, all future LSPs traversing through this router behave as a single hop to IP
packets. LSPs established before this statement is committed are not affected.
• RSVP
• BFD is configured for a RSVP LSP on the ingress router
• You can enable BFD for all LSPs or for specific LSPs
• BFD sessions originate only at the ingress router and
terminate at the egress router
• LOP
• You can enable BFD for the LDP LSPs associated with a
specific FEC
• You can configure an OAM ingress policy to enable BFD on a
range of FEC addresses
• Simple hello mechanism that detects failures in a network
�µfDm,.�
��«�C@,tl!'=®)
MPLS Pitfalls (1 of 2)
• RSVP
• MPLS family required on the interfaces
• Enabling correct interfaces in RSVP
• Correct LSP names
• LDP
• MPLS family required on the interface
• Correct interfaces in LDP
• CSPF and the traffic engineering database
• Does not work across multi-area or multi-level networks
• Fast reroute, link or node protection. and administrative
groups require CSPF
MPLS Pitfalls (2 of 2)
• ERO
• Using the loose transit point might result in an invalid path
during network convergence
• If two separate paths are required, ensure that you specify
enough ERO hops to maintain separation
• Fast reroute versus link or node protection
• Understand the complete requirements of the task-fast
reroute does not reserve bandwidth
• Fast reroute creates a detour LSP
• Link or node protection creates a bypass LSP
MPLS Time-Savers (1 of 2)
MPLS Time-Savers (2 of 2)
Verify Behavior
Take a structured and methodical approach to verifying your configuration. It makes sense to begin
with one device and verify that everything looks correct and then move on to the next router. In some
situations you can verify a feature from a single device.
• MPLS lmplen,entation
�Sample Task Analysis
What Now?
ask Completion (1 of 2)
family mpls;
[edit]
=
lab@Rl# show protocols rsvp
intecface all;
LJL:JQIP8(\;. W?!ldwide EducalionSel\lices
,.< >, "' '-'� ,qf ;--S,,"'::ft'<'z<jc
Initial Verification
The slide shows the commands and outputs to verify the first few steps.
Task Completion (2 of 2)
label-switched-path cl-to-c9 {
to 192.168.1.9;
I
ban dwidth 2m; I
intecf ace all;
lab@Rl>
Configuration Steps
The slide shows the command to configure the LSP and apply the bandwidth reservation, as well as
the command to configure auto-policing.
Task Verification (1 of 2)
• LSP verification
lab@Rl> show mpls lsp name r1-to-r9 detail
Ingress LSP: 1 sessions
192.168 .1. 9
From: 192.168.1.1, !state: Up,! ActiveRoute: 0, LSPname: cl-to-c9
ActivePath: (primacy)
LSPtype: Static Configured
Loa dBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primacy State: Up
Pciocities: 7 0
!Bandwidth: 2Mbps !
SmactOptimizeTimec: 180
Computed ERO ( S [L] denotes stcict [ loose] hops) : (CSPF mete ic: 1)
172.27.0.9 S 172.27.0.22 s
Received RRO (PcotectionFla g l=Available 2=InUse 4=8/W B=Node lO=SoftPceempt
20=Node- ID)
172.27.0.9 172.27.0.22
Total 1 displayed, Up 1, Down O
LSP Verification
The slide displays the status of the LSP that was just created. As you can see, the LSP is up and
functioning. You can also see that 2 Mbps of bandwidth is being reserved.
Task Verification (2 of 2)
• Reservation verification
lab@Rl> show rsvp interface
RSVP interface: 7 active
Active Subscr- Static Available Reserved
Highwater
Interface State resv iption BW BW BW mark
ge-0/0/ l. 0 Up 100% lOOOMbps 998Mbps 2Mbps 2Mbps
� �i':""� ·�
. �un1Per,:
,<"' Mt Worldwide Education Services Juniper net I 10-31
�· ->.-;..== WWW
Summary
• In this chapter, we:
• Explained LDP and RSVP signaling
• Described CSPF with IS-IS and OSPF
• Explained advanced LDP and RSVP concepts
• Described LSP path selection using routing policy
".
Chapter Objectives
• Layer 3 VPNs
• Includes CE devices
• Reside on t11e customer premises
• Includes PE devices
• Maintains VPN-specific forwarding tables
• Exchanges VPN routing information with other PE routers using
BGP
• Uses MPLS LSPs to forward VPN traffic
• Can include P devices
• Forward VPN data transparently over establisl1ed LSPs
• Do not maintain VPN specific routing information
".
Layer 3 VPNs
Customer Edge (CE) routers are located at the customer location and provide access to the
provide r -provisioned VPN (PP-VPN) service. CE routers can interface to Provider Edge (PE) routers
using virtually any Layer 2 technology and routing protocol.
PE routers are located at the edge of the provider's network. They interface to the CE routers on one
side and to the provider's core routers on the other. PE routers maintain site-specific VPN route and
forwarding (VRF) tables. The PE and CE routers function as routing peers, with the PE router
terminating the routing exchange between customer sites and the provider's core. Routes learned
from the CE routers (and stored in the PE router's VRF table) are sent to remote PE routers using
Multiprotocol Border Gateway Protocol (MP-BGP). PE routers use MPLS label-switched paths (LSPs)
when forwarding customer VPN traffic between sites. LSP tunnels in the provider's network separate
VPN traffic in the same fashion as PVCs in a legacy ATM or frame relay network.
Provider (P) routers are located in the provider's core. These routers do not carry VPN customer
routes, nor do they interface in the VPN control and signaling planes. This setup is a key aspect of
the RFC 4364 scalability model; only PE routers are aware of VPN customer routes, and no single PE
router must hold all VPN customer state information. P routers are involved in the VPN forwarding
plane, where they act as label-switching routers (LSRs) performing label swapping (and popping)
operations.
PE to PE Exchanges
• MPLS LSPs core
• MP-BGP next-hop attribute
• Must resolve in inet.3 routing table
• Label swap operation
• Layer 3 VPN NLRI
• PE to PE exchanges require the VPN-1Pv4 NLRI
• Mask. MPLS label. route distinguist1er. and 1Pv4 prefix
• Ingress PE router prepends route distinguisher to 1Pv4 prefix
of routes received from each CE device
• VPN-I Pv4 routes are exchanged between PE routers using
MP-BGP
• Egress PE router converts VPN-1Pv4 routes into I Pv4 routes
before inserting into site's routing (VRF) table
VRFTables
Route Distinguisher
The route distinguisher is an 8-octet field applied to all customer prefixes before being advertised in
the VPN-1Pv4 NLRI. A unique route distinguisher must be configured within each VRF instance to
maintain customer prefix uniqueness within the network. A global route distinguisher can be
configured in the routing-options hierarchy, and the router will dynamically assign a unique route
distinguisher to each VRF instance. There are two labels used to define the route distinguisher value,
Type O and Type 1. The particulars for each type are outlined on the slide.
Route Target
The extended BGP route-target community is used to accept customer routes into the VRF table from
the bgp .13vpn. O table. Only routes with a route-target community that matches the import
community configured in the VRF instance will be installed in the VRF table. Therefore, routes
advertised from the remote PE router must be tagged with the appropriate extended route-target
information to function correctly. The import and export route-target information can be configured
as a global parameter or through policy.
PE to CE Routing Protocols
• Static routing
• PE and CE routers configured with static routes
• BGP routing
• External BG P peering
• as-override
• origin community
• Internal BGP peering
• independent-domain
• OSPF routing
• Carries OSPF routes across backbone as BGP routes
• Two methods to advertise OSPF routes between sites
• sham-link
• domain-identifier
• RIP routing
��--
x xV�7-.="",,, �,
©��•••l1'•0l•lm\'k>,ln,:;A1Jniatt,,e,.��' •' ':)LJ(']�bWorldwideEducalionServices wwwJun,pernel 1 11-10
BGP Routing
BGP peering to the customer site from the provider can be an external or internal BGP session.
Using external BGP to connect the customer sites introduces the provider as a BGP hop within the
AS-path. If a customer is using the same autonomous system (AS) number at both sites, a problem
can arise with loop detection. When the as-override option is configured on the PE router, the
customer AS number in the AS-path is replaced with the provider's AS number when the route is
advertised to the customer site. The origin community can be used to avoid routing loops caused
when advertising routes back into a network where the routes were learned through another
connection.
Peering to the customer using IBGP requires a new BGP attribute called the ATIRSET to carry
customer attributes across the provider's network. This independent-domain option effectively
hides the provider's network from the customer by preserving and restoring all customer attributes.
Continued on the next page.
RIP Routing
RIP can also be used to share routes between the PE and CE routers.
PE to CE Routing Policy
In addition to the VRF import and export policies, which control the exchange of routes between PE
routers, you can also use routing policy to control the exchange of routes on the PE-CE routing
instance. Using BGP or RIP as a PE-CE routing protocol permits both import and export policies. OSPF
can also have export policies, but has limited functionality when implementing an import policy. You
can use OSPF import policy only to set priority or to filter OSPF external routes. If an OSPF import
policy is applied that results in a reject terminating action for a non-external route, then the reject
action is ignored and the route is accepted anyway. This behavior prevents traffic black holes-that
is, silently discarded traffic-by ensuring consistent routing within the OSPF domain. Routing policy
applied under the protocols portion of a VRF table only affects the routes being exchanged on the
local PE-CE link. To control the exchange of VPN routes between PE routers, VRF import and export
policies must exist.
PE to CE Firewall Filters
Firewall filters can be applied to the logical interfaces that are participating in a VPN instance. A
firewall filter must be applied to the interface configuration and will be applied to the VPN instance
as long as the interface and unit are defined for that instance.
VPN Considerations (1 of 2)
• Hub-and-spoke
• Reduces the number of BGP sessions and LSPs needed
• Spoke to spoke communication must transit tt1e hub site
• Requires two VRF instances on the hub site
• Requires two interfaces from PE to CE
• Can be logical interfaces on the same pt1ysical interface
• 1Pv6 VPNs
• PE to CE interfaces can be configured for 1Pv6
• Must enable inet6-vpn family for the MP-BG P session
• Must configure BG P. OSPF version 3. or static routes for PE to CE
routing
• Can operate in conjunction with 1Pv4 routing in the same
VPN
1Pv6 VPNs
You can configure IP version 6 (1Pv6) between the PE and CE routers of a Layer 3 VPN. The PE router
must have the PE router to PE router BGP session configured with the family inet6-vpn
statement_ The CE router must be capable of receiving 1Pv6 traffic. To support 1Pv6 routes, you must
configure BGP, OSPF version 3, or static routes for the connection between the PE and CE routers in
the Layer 3 VPN_ You can configure BGP to handle just 1Pv6 routes or both IP version 4 (1Pv4) and
1Pv6 routes.
VPN Considerations (2 of 2)
• vrf-table-label option
• Uses LSP sub-interface abstract
• Creates an LSI that maps to each VRFtable
• Supported core-facing interfaces map reserved MPLS labels to
eachVRF LSI
• Caveats:
• Only supported on limited interface types
• Not supported for MP-BG P-labeled routes (interprovider and
carrier-of-carrierVPNs)
• VPN tunnel interface
• Requires a tunnel services PIC
• Causes Internet Processor II lookups on the Egress PE
• Rather than forward tt1e packet directly out the physical VRF
interface. the resulting IP packet from the first lookup is sent to the
tunnel service interface (next hop equals the vt-x/y/ z interface)
Q
VPN Scalability
• Route reflection
• Reduces the number of MP-BGP sessions
• Typically configured on a P router
• Requires tl1e NLRI families be configured within t11e cluster
• The bgp .13vpn. inet. 0 table requires PE reachability
through inet. 3
• LDP or RSVP unidirectional full mesh
• Static default route
• Route target filtering
• PE sends a list of route targets locally configured to the
route reflector
• The route-target NLRI must be enabled on MP-BGP sessions
• Route reflector only sends routes with the specified route
targets to PE router
Route Reflection
The use of route reflection in a Layer 3 VPN topology can dramatically reduce the number of MP-BGP
peering sessions on the PE routers. The VPN route reflector requires the configuration of the
VPN-1Pv4 family and automatically keeps all received VPN routes in the bgp. l 3vpn. O table to
provide only control plane function. To install routes into the bgp. 13vpn. O table, the BGP next-hop
attribute must resolve to an LSP with an entry in inet. 3. LSP egress entries can be generated into
the inet. 3 table using the dynamic signaling protocols, LOP or RSVP, but because the route
reflector is not part of the data plane, a static default entry can be placed into the table.
Internet Access
In a distributed Internet access model, a PE router provides connectivity to the Internet for its
connected CE router. In this environment, the provider has three main options for forwarding traffic
through the PE router.
The first two options require a separate logical circuit between the PE and the CE routers. In both
options, all VPN traffic is received and transmitted on the same circuit with the only difference being
forwarding of Internet traffic. In Option 1 all Internet traffic is sent and received on the same circuit,
while in Option 2 the Internet traffic is received on the VPN circuit but sent on a different circuit.
The third option uses a single logical circuit for both VPN and Internet traffic. As in Option 2, all
received VPN traffic will be routed to the appropriate PE and all Internet traffic will be routed to the
primary routing instance (inet. O). The primary issue in Option 3 is the return traffic from the
Internet. Because the customer interface is in the VRF routing instance, and the Internet traffic is in
the primary routing instance, routing information must be shared between the two.
1-N,:,l?,;<v•""t
UL!Jf:11Pef7.J!.Worldwide Education Services w�w iunipernet 1 11·17
�st- JktL.»-..:= - �
Common Mistakes
Route target import information must match the extended BGP target community in the VPN
advertisement. Use the show route receive-protocol bgp detail and show route
advertising-protocol bgp detail commands to troubleshoot route target mismatches.
The BGP keep-all option will also help by installing all VPN routes in the bgp. 13vpn. O table
regardless of route target information.
VPN routes are advertised using the VPN-1Pv4 NLRI, which must be negotiated between BGP peers
and is configured using the BGP family inet-vpn unicast command. When this family is
configured in BGP it overrides the default behavior of advertising standard 1Pv4 prefixes. If both are
required, they must both be configured.
Scaling IBGP using route reflectors and route target filters can reduce the number of peering
sessions and route advertisements. Route reflectors participate in the VPN control plane which
requires the VPN-1Pv4 NLRI and LSP resolution.
All VPN routes received must resolve to an LSP before they can be installed in the bgp .13vpn. o
table. Verify that the next-hop attribute can resolve to the inet. 3 table.
lnterprovider VPN
lnterprovider VPNs
lnterprovider VPNs provide connectivity when a VPN customer's sites are attached to different
service providers. In this environment, the PE routers in each AS connect to the VPN customer site
and an autonomous system boundary router (ASBR) connects the each provider's network. Three
options exist in the interprovider VPN scenario:
Option A describes a back-to-back pairing of ASBR using unlabeled EBGP between VRF
table to VRF table. This option requires a separate logical circuit between the ASBRs for
each VPN connection.
Option B describes a single MP-EBGP session between the ASBRs to exchange labeled
routes across the network boundary. This option requires an end-to-end LSP between
PE routers.
Option C describes an interprovider environment that hides the customer routes from
the provider's ASBR router. This option requires the leaking of the PE loopback address
to form a MP-EBGP session between the PE routers.
....
--·�"'"'�,ft'
fi'l�,i'�orfdwid�EducationServices .,.,w,un,p""'' 111-21
• Carrier-of-carrier
• Generally connects two provider sites within the same AS
through another cari-ier AS
• Carrier PE routers maintain the provider's internal routes
• Carrier PE routers do not maintain customer external routes
• Provider routers maintain internal routes as well as external
customer routes
• Pitfalls
• VPN routes must resolve to inet. 3
• Route target mismatches
• VPN routes received are compared against t11e local route target in
the import policy
• Time-savers
• Identify correct solution
• Ensure reacl1abilitythrough inet. 3 routes
• Build VRF routing instance
• PE to CE interfaces and protocols
• Route target information
lnterprovider Pitfalls
VPN routes are advertised using the VPN-1Pv4 NLRI, which must be negotiated between BGP peers
and is configured using the BGP family inet-vpn unicast command. When this family is
configured in BGP, it overrides the default behavior of advertising standard 1Pv4 prefixes. If both are
required, they must both be configured. Routes sharecl between ASBR must also be present in
inet.3.
Route target import information must match the extended BGP target community in the VPN
advertisement. Use the show route receive-pr,otocol bgp detail and show route
advertising-protocol bgp detail commancls to troubleshoot route target mismatches.
The BGP keep-all option will also help by installing all VPN routes in the bgp .13vpn. o table,
regardless of route target information.
lnterprovider Timesavers
Begin by determining which solution you must implem,�nt. Identify the PE routers and verify that the
IBGP and MPLS infrastructure is in place. Identify ASBRs and which routes must be leaked to peers
with labels. Use the show bgp sununary and show route table inet. 3 commands to verify
the configuration. A stable topology will make the VPN control process easier to troubleshoot if there
are problems exchanging VRF information.
Configure the customer interface and establish CE to PE peering using the routing protocol specified
in the VPN task information. Verify customer reachability and routing information in the VRF table.
·-"" ·
<! I f:l Woifdwlde'EaucationServices
fil*Jt<-
WWWJunoperoet I 11-25
II
• Layer 2 VPNs
• Layer 2 VPN using BGP signaling (Kornpella)
• Automatically assigns new circuit IDs and labels
• Can use either RSVP or LOP to signal LSPs
• Layer 2 circuit using LOP signaling (Martini)
• Requires manual circuit provisioning
• LOP sessions can be adjacent or extended (ldp-tunneling)
• VPLS
• VPLS using BGP signaling
• Automatic provisioning
• Can use eitl1er RSVP or LOP to signal
• VPLS using LOP signaling
• Must configure a full mesh of LDP session between PE routers
• LOP sessions can be adjacent or extended (ldp-tunneling)
Q
• Layer 2 VPN
• Layer 2 VPNs and Layer 2 circuits offer point-to-point
Ethernet, frame relay, ATM. PPP. or Cisco-HDLC services
• Administrator of PE router maps local circuit IDs to remote
sites
• VPLS
• Offers Ethernet-based point-to-multipoint VPNs
• To the customer in a VPLS environment the provider's
network appears to function as a single LAN segment
• Acts similarly to a learning bridge
• No need to map local circuit IDs to remote sites
• PE device learns MAC address from received Layer 2 frames
• MAC addresses are dynamically mapped to outbound MPLS LSPs.
interfaces. or both
--
n�fi �"" ' -
WorldwideEducationServices
""' "":;(�!.... ,..,, W� 'NJUnlpernot 111·27
VPLS Concepts
To the customer, a VPLS appears to be a single LAN segment. In fact, it appears to act similarly to a
learning bridge. That is, wt1en the destination media access control (MAC) address is not known, an
Ethernet frame is sent to all remote sites. If the destination MAC address is known, it is sent directly
to the site that owns it.
When using VPLS, you do not need to map the local circuit to remote sites. In a VPLS, PE devices
learn MAC addresses from the frames that it receives. They will use the source and destination
addresses to dynamically create a forwarding table (vpn-name. vpls) for Ethernet frames. Based
on this table, frames are forwarded out directly connected interfaces or over MPLS LSPs across the
provider core. This behavior allows you to not have to manually map Layer 2 circuits to remote sites.
• Layer 2 circuit
• LOP signaling for peering sessions
• Does not support traffic engineering
• Manually provisioned at both ends of a circuit
• Supports label stacking
• No auto-provisioning of Layer 2 circuits
• No VRFtables
• Configured under protocols 12circui t hierarchy
• BGP is not required
• Uses RFC 4448 encapsulation
n�¥m�,iLi " ,
--�,,,- ,
WorfdwideEducationServfcas W�WJunop .. n<t 11129
BGP signaled VPLS also uses RFC 4448 as the standard for its Layer 2 encapsulation.
•VPLS
• Interfaces require vpls encapsulation
• VLAN interfaces must be in the range of 512 through 4094
• Can use extended-vlan-vpls encapsulation on the physical
interface to allow the use of VLAN IDs from 1 through 4094
• Add family vpls to the interface
VPLS Interfaces
You must specify an encapsulation type for each PE to CE interface configured for VPLS. You must
use one of the VPLS encapsulation types as well as specifying the family vpls on the interface.
When you enable VPLS encapsulation on a vlan-tagged interface, VLAN IDs from 512 through 4094
are reserved for VPLS encapsulation. You can enable '"xtended support to allow the use the full
range of VLAN values.
Multihome VPLS (1 of 2)
�n"'
ril!W Wo ��eEducationServices ww •NJun,pe,net 111-33
Multihome VP S (2 of 2)
..
Multiple PE to CE interfaces
When connecting a single PE to a single CE using multiple interfaces, you must use one of the loop
prevention mechanisms listed on the slide.
Point-to-Multipoint LSPs
Broadcast, unicast with unknown destination, and multicast traffic are replicated and flooded solely
by the ingress PE by default. This behavior can put a tremendous burden on the PE if it happens to
service several hundred Vl'LS instances. Point-to-multipoint LSPs can be used specifically for the
purpose of carrying broadcast, unicast with unknown destination, and multicast traffic. When using
a point-to-multipoint LSP for this purpose, the ingress PE must send only one copy of the broadcast,
unicast with unknown destination, and multicast traffic into the core. The downstream routers along
the LSP will perform replication of the traffic. To notify remote PEs that a point-to-multipoint LSP will
be used for broadcast, unicast with unknown destination, and multicast traffic forwarding, the
ingress PE readvertises all label blocks along with the Provider Multicast Service Interface (PMSI)
Tunnel attribute, which carries the RSVP session identification information.
To allow a PE to flood broadcast, unicast with unknown destination, and multicast traffic using
point-to-multipoint LSP, simply configure an RSVP provider tunnel. You can use the default template,
or you can use a user defined label switched path template.
Layer 2 Pitfalls
• Interface configuration
• Physical and logical interfaces
• Protocol family configured
• Route targets
• VRF import and export policies
• BGP and MPLS configuration
• BGP uses family 12vpn
• Remote PE addresses in inet. 3
...
Layer 2 Pitfalls: Interface Configuration
The PE to CE interface must be configured with the appropriate CCC encapsulation, both on the
physical interface and the logical interface. If either is misconfigured, it looks good but it does not
work. CCC encapsulated interfaces do not support protocol families, including families inherited from
applied groups. It is very common to apply a group to all transit interfaces to support family mpls
or family iso. These families will not be displayed with a simple show interface command,
but must include the I display inheritance option. Any interface configured with a protocol
family and encapsulation CCC will fail the commit check.
Route Targets
The same rules apply to L2VPNs as apply to L3VPNs. The import extended route target community
must match the community received in the MP-IBGP update.
Layer 2 Time-Savers
• Plan ahead
• Use topology maps to define PE routers
• Draw out VPNs using different colors
• MPLS transport
• RSVP or LOP
• Configure each VPN router by router
• Use the show I display set command to copy and
paste routing instances and route target policies
MPLS Transport
Most of the MPLS transport should already be in place from the MPLS and L3VPN tasks. Both
protocol mpls and protocol rsvp should be configured on all of the routers. You might need
to configure protocol LDP on some of the routers to support any L2 circuits.
Rl - 192.168.1.1
\ 3
R2 - 192.168.1.2
'
' 1 651
.,,. / o.o/�·o -- / ,
I / j
0 \
��
$-+---0�
R3 - 192.168.1.3 - - C2-1 C2-2
R4 - 192.168.1.4 ,' \ R4
R5 - 192.168.1.5 Customer ®Cust�mer
R6 - 192.168.1.6 2 I R6
\ ,� _/ IR 5 /
R7 - 192.168.1.7 _/�
'·®--
C3·1 \ Cl-2.,. ,,. - - ,
R8 - 192.168.1.8
R9 - 192.168.1.9 Customer Cl) 'ilj'
R§
� �Customer '\
�
3 R7' --. ...... ,. R9 5 s.1.s.0;3 1 1
_,,..,. \
- - - - - I
'' AS 65100 ;
• Task:
_,,.
What Now?
Task Completion (1 of 6)
• BGP
lab@Rl> show bgp summary
Gcoups: 1 Peers: 8 Down peecs:
Table Tot Paths Act Paths Suppcessed Histocy Damp State Pending
inet. 0 O O O 0 0 0
Peec AS InPk t Out Pkt OutQ Flaps Last Up/Dwn
Statel#Active/Received/Accepted/Damped ...
Initial Verification on R1
The slide shows the commands and outputs to verify the first couple steps on Rl.
ask Completion {2 of 6)
Initial Verification on R9
The slide shows the commands and outputs to verify the first couple steps on R9.
Task Completion (3 of 6)
family inet-vpn
unicast;
export. nhs;
neighboc 192.168.1.2;
neighboc 192.168.1.3;
neighboc 192.168.1.4;
neighbor 192.168.1.5;
neighbor 192.168.1.6;
neighbor 192.168.1. 7;
neighbor 192.168.1.8;
neighbor 192.168.1.9;
ask Completion (4 of 6)
family inet-vpn
unicast;
export nhs;
neighbor 192.168.1.1;
neighbor 192.168.1.2;
neighbor 192.168.1.3;
neighbor 192.168 .1.4;
neighbor 192.168.1.5;
neighbor 192.168.1.6;
neighbor 192.168.1. 7;
neighbor 192.168.1.8;
Task Completion (5 of 6)
Task Completion (6 of 6)
Q •
Task Verification (1 of 5)
PE to CE Routing Verification
The slide shows that the BGP sessions from the PE devices have been established to the CE routers.
You can also see that you are learning routes from each peer.
Task Verification (2 of 5)
Task Verification1 (3 of 5)
''
Task Verification (4 of 5)
Tas Verification1 (5 of 5)
• Verify route-distinguisher values R9
lab@R9> show route table bgp.1.3vpn.O
Summary
• In this chapter, we:
• Demonstrated Layer 3 VPNs
• Explained 1Pv4 and 1Pv6 Layer 3 VPt�s
• Explained interprovider Layer 3 VPNs
• Described carrier-of-carrier Layer 3 VPNs
• Outlined BGP and LOP signaled VPLS and Layer 2 VPNs
@m v.:.���,;ideEducationServices
�Jdl.j "'""
W�Wjun,po,net I 11-53
Appendix A: Junosphere
JNCIE Service Provider Bootcamp
Objectives
We Will Discuss:
Junosphere architecture and access; and
The utilization of Junosphere for Education Services labs.
Agenda:Junosphere
� Accessing the Junosphere Interface
• Accessing Active Topologies
= � =� , "�,a ' I
�umim JAforldwi�e ducatlonServices
�
WWWJUnlpernet I 3
What Is Junosphere?
• Junosphere is a virtualized environment where
multiple virtual devices connect to form topologies
Internet
SSL\IPN
-
,-.........,
What Is Junosphere?
Junosphere is a virtualization environment where multiple virtual machines representing network
devices can be connected and configured to create network topologies. For the purposes of
Education Services, the network topologies will be pre-assembled and ready for your use in lab
exercises. Most virtual devices on which you will perform tasks are known as VJX or VSRX Series
devices. Once you are connected to your topology, the experience is almost identical to connecting to
a physical rack of devices.
Accessing Junosphere
• Browse to http://www.junosphere.net
• Your instructor will provide a username and password
Usemame: ,::!:mo
Password:
·�Te.-=� �·�
�t:Jn�
, Vcl
I1
>(;"t"
WorldwideEducatlonS,nvices 5
I� h_ '==
,VWWJUn1pernet [
I
Accessing Junosphere
Access Junosphere with a standard web browser by pointing the browser to
http://www.junosphere.net. The instructor will provide you with your username and password.
I
Jl.mosohere fac1lrtat1:s: y,:>ur network des19n. testing and tra1rn
you can create and run nt>tworks us1no ·.mtual Junos.
C:���" '."oc,o'o,;r ,.. >.' •:.1or<l
I,
Mo!!,.�;;e i::�� dt:o"'!.
Mtri��e ioPQio,i;:�
.:.c::�s .:.�ta-,t1\:; oo.ocf
Administration
Useful links
t;_q;;f�:ft q-::M !ll.'.}n!J'i1�. f,...,;:Jtrr.r. Qgr,_ �f'hiQ11(fnM l9Qi<" yij;.ij<:;
=mad ]un�_team with :?DY q11c.5prm5
�QOU�...,r cusrrnwr serwp• QC OMO anuooort tlCM.t
! iil Mlili11.•.f:!=:-.=
••11!1::1J•liililmmm:i:·:.:;, 1;1iimllltii ::::i::: >�tr� -i;.. MILtt:Jii·H:ti;!!) 1E:::!%:'
��, ; - ·Oc,,:e ;r,fr�tr,.;,:;.:r� 0 0
Lo!'2-!'z!S�c'1t�tt°"1 0 (;)
No topology selected
�l.:lnm
- 1'1!,' • '
"'*"'�= ""
yv��deEd\ltationServices ,,_Jun;pern,t J 7
I
Bank and Sandbox Sections
Once you have clicked the Manage Topologies link, then you can view available sandbox and
bank information. As a student, you may not have access to modify the sandbox settings, so the
Sandbox tab might not display any information. If the Sandbox tab is blank, click the Bank tab to
see the bank libraries you have access to. Typically, you will have access to only one bank's set of
library topologies. If the Sandbox tab contains multiple entries, select the one directed by your
instructor, and then click the Bank tab.
The VM Units
The Name and Des er: iption
field displays the
fields display to which lab the
number of VM devices
topology is associated
used in the lab
...: c:J
.) � ! r..,
DMIAE1Jlifil1;LEM#i1 , 1 • 11111
l d -r�Pn.•:(<'� B<•t)t, dinp HK ir sr n,:wtc. .inip topuk:in�·(, L 1_;NCIE·SP _Eootum:,
@i ;.:,
Lab 1 · Devr:::e Infrastructure
r MVi ti
f,l
Agenda:Junosphere
II
Accessing the Junosphere Interface
�Accessing Active Topologies
"'m-;t."""
I
-�. ,
�tiff! '!(lnildwldeEdocatlonServfces wwwiunlpernet Is
mt "' I
Starting a Topoflogy (1 of 2)
1 ? _ZiCrE,S?_eoo:c<Y'C
�i]£IE-S?_£oat,:�rro
�IJJfilll=?ef.i -�,l�deEducatlonServices
="'le'M ,s,
'cy��"�
Q WWWJUnipernet 110
ct ''"'" == «
Starting a Topology
The slide illustrates how to start a topology, which is accomplished by clicking the checkbox to the
left of the topology and then clicking the Start button. Once you start a topology, it begins to
initialize each device that is contained within the topology.
Starting a Topology (2 of 2)
� Cancel
After you have activated the topology, you will receive a message stating that the topology start
process has been initiated successfully. Click OK to close the message box.
".
Rt f2 of S VMS} started.
I 7·Jun·201312;21 MDT
! R.2 (3 of S VMs: started.
R.3 (.; of S VMS} S't3r1ed.
R4 (5 of S VMs} started.
RS('> of s VMS) started.
7·Jun·2013 l2;,2 MDT
\fd'i'!\11Cf (7 oi S VMS) start'?d.
c�ntos •:s of s VMs} started.
Step 4 cf 5: Enabling �"ess to the topology.
if'j:!4! �
ti lt�mc ...
t··WMPii
UI' WI ,Ml•'I
I .i:•;m.:
IH' in) '/l,:i I
I n··J11v;
l.f! ,,, I ,.
u·
t;f, I ) ,,.
;.u;_:,
Summary
• In this content, we:
• Described Junosphere architecture
• Utilized Junosphere to perform lab exercises for this content
We Discussed:
Junosphere architecture and access; and
The utilization of Junosphere to perform lab exercises for Education Services
courseware.