AJSPR V19A LG - Vol.2
AJSPR V19A LG - Vol.2
AJSPR V19A LG - Vol.2
NETWORKS
Education Services
.... ")
.,., ') '· ..,,,
'1\
~
~ ~,
J_ '
\
•
•
,
Engineering
Simplicity
Lab Guide
Volume2 of 2
un1Pe[ NETWORKS
Education Services
Juniper Networks reserves t he right to change, modify, t ransfer, or otherwise revise t his publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has no known
t ime-related limitations through t he year 2038. However, t he NTP applicat ion is known t o have some difficulty in t he year 2036.
SOFTWARE LICENSE
The terms and condit ions for using Juniper Networks software are described in t he software license provided with the software, or t o the extent applicable, in an agreement
executed between you and Juniper Net works, or Juniper Net works agent. By using Juniper Networks software, you indicat e that you understand and agree t o be bound by its
license t erms and condit ions. Generally speaking, the software license rest ricts t he manner in which you are permitted t o use the Juniper Net works software, may contain
prohibitions against certain uses, and may state condit ions under which t he license is automat ically terminated. You should consult t he software license for further det ails.
Contents
Lab 10: BGP Attributes: Part 1 ............................................. . 10-1
Part 1: Load Starting Configuration . . . ... . .. .. .. . . . . . . . . .. . . . . . . . . . . . . . . . ... . . . . . . . ... . .. . . .. . . . . . 10-2
Part 2: Repai ring Unusable Routes . . . ... . . . .. . . . . . . . . . . .. . . . . . . . . . . . . . . . ... . . . . . . . ... . .. . . .. . . . . 10-30
Part 3: Modifying the Local-Preference Attribute . . . . . . . . . . .. . . . . . . . . . . . . .. . ... . . . . . . . ... . .. . . . . . . . . 10-38
Part 4: Modifying the AS Path Attribute . . . . . . . . . . . . .. . . . . . . . . . . . .. . . . . . . . . . . . .. . . .. . . . . . . . . . . . .. .. 10-46
This f ive-day course is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Through
demonstrations and hands-on labs, students will gain experience in configuring, monitoring, and troubleshooting the Junos
operating system and in monitoring device and protocol ope rations.
This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not
prec lude the course from being applicable to other Jun iper hardware platforms running the Ju nos OS. This cou rse is based
on the Ju nos OS Re lease 1 9 .3 .
Course Level
Advanced Junos Service Provider Routing (AJSPR) is an advanced-level course.
Intended Audience
This course benefits individuals responsible for implementing, monitoring, and troubleshooting Layer 3 components of a
service provider's network.
Prerequisites
Students s hou ld have intermediate-level networking knowledge and an understanding of t he Open Systems
Interconnection (OSI) model and the TCP/ IP protocol suite. Students should also attend the Introduction to the Junos
Operating System (IJOS) and Junos Intermediate Routing (JIR) courses p rior to attending this class.
Objectives
Afte r successfully completing this cou rse, you should be able to :
• List usefu l commands that are used to troub leshoot and verify OSPF.
• List IS-IS adj acency rules and t roubleshoot common adjacency issues.
• Describe BGP attributes and explain how these attributes can be used to manipulate traffic.
• Describe the BGP attributes Origin, M ED and communities in detail and explain the operation of those
attributes.
• Configure confederations.
Day1
Chapter 1: Course Introduction
Chapter 2 : OSPF
Day2
Chapter 5: Troubleshooting OSPF
Day3
Chapter 8 : Multi level IS-I S Networks
Chapter 1 0: BGP
Lab 9 : Configuring BGP
Day4
Chapter 1 1: BGP Attributes an d Policy- Part 1
Day5
Chapter 14: BGP FlowSpec
Franklin Gothic Norma l text. Most of what you read in the Lab Guide and
Student Guide.
CLI Input Text that you must enter. lab@San Jose> sho w r o ute
GUI Input Select F ile > Save, and type c onfig. ini
in the F ile n ame fie ld.
CLI Undefi ned Text where the variable's value is the user's Type set p o l i c y policy-name.
discretion or text where t he variable's va lue
GUI Undefi ned ping 1 0 .0.x . y
as shown in the lab guide might differ from
the va lue the user must input according to Select Fi le > Save, and type filename
the lab topo logy. in t he F ile n ame field.
Technical Publications
You can print technica l man uals and release notes directly from the Internet in a variety of fo rmats:
• Go to http://www.juniper.net/ techpubs/ .
• Locate the specific softwa re or hardware release and title you need, and choose the format in which you
want to view or print the document.
Documentation sets and CDs are available th rough your local Juniper Networks sales office or account representative.
Overview
In this lab, you use the lab diagram titled "Lab Network Diagram: BGP Attributes - Part 1" to
repair unusable routes and influence the BGP route selection process. This lab utilizes
pre-established internal Border Gateway Protocol (IBGP) and EBGP peering sessions in which
certain peers are receiving "hidden" or unusable routes. The Local-Preference attribute is used
in this lab to define a preferred exit point out for your AS for routes being received from AS
65412. Next, routes are advertised to the P1 and P2 routers using AS-path attributes.
By completing this lab you perform the following tasks:
In this lab part, you verify the initial configuration of the routers. You then verify that the
interfaces are operational and OSPF and BGP neighbor relationships have formed.
Note
The instructor will tell you the nature of you r access and will provide
you with the necessary details to access you r assigned device.
Note
The lab topology requires you to display information in the different
logical systems of mxA, mxB, mxC, mxD, and mxE. You will be
changing the perspective of the CLI by issuing the set cli
logical-system ls-name command. Refer to the lab diagram
for the correct logical system name.
By changing the perspective of the CLI, you will be able to perform
network commands such as ping or traceroute from the
perspective of the pertinent logical system.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student devices.
Step 1.2
Access the CLI on your mxB device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lablO-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ l ab@des k top ~ ] $ ssh [email protected]
Password : lab123
La st l o g i n: Sat Nov 30 23 : 52 : 4 4 20 1 9 f rom 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3 Rl . 8 Kerne l 6 4-b it J NPR-11 . 0 - 2019070 1. 269d4 66 b u i l
lab@ mxB > configure
Ente ring confi g u r at ion mode
[e di t ]
l ab@ mxB # load override ajspr/lablO-start . config
l oad comp le t e
[e di t ]
l ab@ mxB # co11ani t and-quit
commit comp l ete
Exit ing con f igurati o n mode
Step 1.3
Issue t he show configuration command . Use t he lab diagram t o verify that the mxB router
has the correct logica l system and interface conf iguration. Verify that BGP has been enabled .
lab@mxB> show configuratio n
## Last commit : 2019 - 12 - 27 12 : 08 : 29 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxB;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNd lhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
.3tQObCdrevo0v635R7ReHTL 0c ."; ## SECRET -DATA
}
login {
user lab {
uid 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
logical-systems {
P3 {
interfaces {
ge-0/0/3 {
unit O {
family inet {
address 172.22 . 125 . 2/24 ;
}
}
}
ge-0/0/4 {
unit O {
fami l y inet {
address 172 . 22 . 126 . 2/24 ;
}
}
}
loO {
uni t O {
fami l y inet {
address 172 . 31 . 1 02 . 1 /32;
}
}
}
}
protocols {
bgp {
group R3-1 {
type external;
mult ihop ;
local -address 1 72 . 3 1. 102 . 1 ;
export ajspr-bgp-export-p3;
neighbo r 172 . 16 . 1 . 2 {
pee r-as 65001;
}
}
group R3-2 {
type external;
mult ihop ;
local -address 1 72 . 3 1. 102 . 1 ;
export ajspr-bgp-export-p3;
neighbor 172 . 16 . 2 . 2 {
pee r- as 65002;
}
}
}
}
po l icy- optio ns {
policy-s tatemen t ajspr -bgp-expo rt-p3 {
term 1 {
from {
protocol static;
route-fi lter 40 . 40 . 0 . 0/22 o rl o nger;
}
then accept;
}
term 2 {
from {
prot ocol bgp ;
ro ute-fi lter 30 . 30 . 0 . 0/22 l onger;
}
then reject;
}
}
}
routing- opt ions {
static {
interface ge - 0/0/0 . 0;
}
}
bgp {
group ibgp {
type internal;
local -address 172 . 16.1 . 2;
export redistribute-statics;
neighbor 172 . 16 . 1 . 1;
}
group P3 {
type external;
multihop;
local -address 172 . 16.1 . 2;
export export-aggregate;
peer - as 65020;
neighbor 172 . 31 . 102 .1;
}
}
}
policy-options {
policy- statement export-aggregate {
term 1 {
from {
protocol aggregate ;
route -fi lter 172.16 .1 . 0/24 exact;
}
then accept;
}
term 2 {
from {
route -fi lter 172.16 .1 . 0/24 longer;
}
then reject;
}
}
policy- statement redistribute - statics {
term 1 {
from protocol static;
then accept;
}
}
}
routing- options {
static {
route 172 . 31 . 102 . 1/32 {
next-hop 172 . 22 . 125.2 ;
no-readvertise;
}
}
autonomous - system 65001;
aggregate {
route 172 . 16 . 1 . 0/24;
}
}
Step 1.4
Issue the show bgp summary logical-system P3 command to view the state of the P3
router's EBGP sessions.
lab@mxB> show bgp summary logical-system P3
Threading mode: BGP I/0
Groups : 2 Peers : 2 Down peers : 0
Table Tot Paths Act Paths Suppressed Hi story Damp State Pending
inet.O
7 6 0 0 0 0
Peer AS In Pkt Out Pkt OutQ Flaps Last Up/Own
Statel#Active/Received/Accepted/Damped ...
172 . 16 . 1 . 2 65001 686 665 0 0 4 : 58 : 01 Establ
inet . O: 1/2/2/0
172 . 16 . 2 . 2 65002 782 777 0 0 5 : 46 : 26 Establ
inet . O: 5/5/5/0
Step 1.5
Access the CLI on your mxC device using Secure Shell (SS H) or as directed by you r instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lablO-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login: Sat Nov 30 23 : 52 : 44 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-11 . 0 - 20190701 . 269d466 buil
lab@mxC> configure
Entering configuration mode
[edit]
lab@mxC# load override ajspr/lablO-start . config
load complete
[edit]
lab@mxC# coirauit and-quit
commit complete
Exiting configu r ation mode
lab@mxC>
Step 1.6
Issue the show configuration command. Use the lab diagram to verify that the mxC router
has the correct interface, OSPF, and BGP configuration.
lab@mxC> show configuration
## Last commit: 2019 - 12 - 01 15 : 38 : 27 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxC ;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNdlhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3 t QObCdrevo0v635R7ReHTL Oc ."; ## SECRET -DATA
}
l ogin {
user lab {
ui d 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3P f ylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
interfaces {
ge-0/0/0 {
unit O {
family inet {
address 10 . 0 . 14 .1 /24;
}
}
}
ge - 0/0/1 {
uni t O {
fam ily inet {
address 172 . 22 .1 24 .1 /24;
}
}
}
ge - 0/0/3 {
uni t O {
fam ily inet {
address 172 . 22 .1 22 .1 /24;
}
}
}
fxpO {
uni t O {
fam ily i net {
address 172 . 25 .1 1 . 3/24 ;
}
}
}
loO {
uni t O {
fam ily inet {
address 172 . 16 . 2 . 1/32 ;
}
}
}
}
policy-options {
policy-statement export-aggregate {
te r m 1 {
fr om {
p r otoco l aggregate;
ro u te -fi lter 172 . 16 . 2 . 0/24 exact;
}
the n accept;
}
te r m 2 {
from {
route -fi lter 172 . 16 . 2 . 0/24 longer;
}
then reject;
}
}
po li cy-statement import-Pl {
term 1 {
fr om {
protocol bgp ;
as - pa t h pa rtner-as;
}
the n accept;
}
bgp {
gro up ibgp {
type internal ;
local - address 1 72 . 16 . 2 . 1 ;
export [ redistribute - statics next- hop- sel f ];
n eighbor 172 . 16 . 2 . 2;
}
gro up Pl -P2 {
type externa l ;
export expo r t - aggregate;
peer- as 65 41 2 ;
n eighbor 172 . 22 . 122 . 2 {
import i mport-Pl;
}
n eighbor 1 72 . 22 . 12 4. 2 ;
}
}
}
Step 1.7
Issue the show ospf neighbor command to ensure the mxC router has established an OSPF
neighbor relationship with the R3-2 router.
lab@mxC> show ospf neighbor
Address Inter f ace St ate ID Pri Dead
10 . 0 . 14 . 2 ge - 0/0/0 . 0 Full 172 . 16 . 2 . 2 128 33
Step 1.8
Issue the show bgp summary command to view the state of the mxC router's BGP sessions.
lab@mxC> show bgp summary
Threading mode : BGP I/0
Groups : 2 Peers: 3 Down peers : 2
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
17 11 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Own
State l #Active/Received/Accept ed/Damped . . .
172 . 16 . 2 . 2 65002 766 766 0 0 5 : 39 : 41 Establ
inet . O: 6/7/7/0 0/0/0/0
172 . 22 . 122 . 2 65412 0 0 0 0 2 : 04 Connect
172 . 22 . 124 . 2 65412 0 0 0 0 2 : 04 Connect
Step 1.9
Access the CLI on your mxE device using Secure Shell (SSH ) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lablO-start. configcommand. After the configuration has been
loaded, commit the changes and exit to operational mode.
[edit]
lab@mxE# load override ajspr/lablO-start.config
load complete
[edit]
lab@mxE# co1caui t and-quit
commit comp l ete
Exiting con f igurat i o n mode
lab@mxE>
Step 1.10
Issue the show configuration command. Use the lab diagram to verify that the mxE router
has the correct logical system and interface configuration. Verify that OSPF and BGP has been
enabled.
lab@mxE> show configuration
file messages {
any notice;
a ut hor iz at i on info;
}
file inte ractive -commands {
inte ract ive -commands a ny;
}
}
}
logical-systems {
P2 {
inte r fa ces {
ge-0/0/2 {
unit O {
f ami ly i ne t {
address 1 72 . 22 . 1 24 . 2/24 ;
}
}
}
ge-0/0/5 {
unit O {
f ami ly i ne t {
address 1 72 . 22 . 252 . 2/30 ;
}
}
}
ge-0/0/7 {
unit O {
f ami ly i ne t {
address 1 72 .2 2 . 1 23 . 2/24 ;
}
}
}
loO {
unit O {
f ami ly i ne t {
address 1 72 .3 1 . 1 0 1 . 1 /32 ;
}
}
}
}
protocols {
ospf {
area 0 . 0 . 0 . 0 {
i nterface lo0.0;
i nterface ge-0/0/5.0;
}
}
bgp {
group ibgp {
type internal;
local -address 172 . 31.101.1;
export ajspr-bgp-nhs;
neighbor 172 .3 1 .1 00 .1;
}
group mxA {
type external;
export ajspr-bgp-export;
neighbor 172 . 22 . 123 .1 {
peer- as 65001;
}
}
group mxC {
type external ;
export ajspr-bgp-export;
neighbor 172 . 22 . 124 .1 {
peer- as 65002;
}
}
}
}
policy- options {
policy- statement ajspr -bgp -export {
term 1 {
from {
protocol static;
route -fi lter 30 . 30 . 0 . 0/22 orlonger;
}
then accept;
}
term 2 {
from {
protocol bgp ;
route -fi lter 40 . 40 . 0 . 0/22 longer;
}
then reject;
}
}
policy- statement ajspr -bgp -nhs {
term 1 {
from {
protocol bgp ;
route -type external;
}
then {
next-hop self;
}
}
}
}
routing- options {
static {
route 30 . 30 . 0 . 0/24 reject;
route 30 . 30 . 1 . 0/24 reject;
route 30 . 30 . 2 . 0/24 reject;
route 30 . 30 . 3 . 0/24 reject;
}
autonomous -system 65412;
}
}
}
inte r faces {
fxp O {
un i t O {
fami l y ine t {
address 172 . 25 . 1 1. 5/24 ;
}
}
}
}
Step 1.11
Issue the show bgp summary logical-system P2 command to view the state of the P2
router's BGP sessions.
lab@mxE> show bgp summary logical-system P2
Threading mode: BGP I/0
Groups: 3 Peers : 3 Down peers : 2
Tabl e Tot Paths Act Paths Suppressed Hi story Damp State Pending
inet . O
12 6 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
Statel#Active/Received/Accepted/Damped ...
172 . 22 . 123 . 1 65001 0 0 0 0 7:56 Connect
172 . 22 . 124 . 1 65002 603 607 0 1 4 : 28 : 40 Establ
inet . O: 6/6/6/0
172 . 31 . 100 . 1 65412 0 0 0 0 7 : 56 Active
Step 1.12
Access the CLI on your mxD device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing t he load
override ajspr/lablO-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password: lab123
Last login : Sat Nov 30 23 : 52 : 44 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kerne l 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxD> configure
[edit]
lab@mxD# load override ajspr/lab10-start . config
load complete
[edit]
lab@mxD# coiraui t and-quit
commit complete
Exiting configuration mode
lab@mxD>
Step 1.13
Issue the show configuration command. Use the lab diagram to verify that the mxD router
has been configured for a logical system called P1 that has the correct interface and OSPF
configuration.
lab@mxD> show configuration
## Last commit: 2019 - 12 - 27 12 : 09 : 34 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxD;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .ArnNdlhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3 t QObCdrevo0v635R7ReHTL Oc ."; ## SECRET-DATA
}
login {
user lab {
uid 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
sys log {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
gro up mxC {
type external;
export ajspr-bgp-export;
neighbor 172 . 22 .1 22 .1 {
peer - as 65002 ;
}
}
}
}
pol icy- opt i o ns {
pol icy-s ta temen t ajspr-bgp -export {
te rm 1 {
f rom {
protocol static;
ro ute-fil ter 30 . 30 . 0 . 0/22 orlonger;
}
then accep t;
}
te rm 2 {
f rom {
pro t ocol bgp;
ro ute-fil ter 40 .4 0 . 0 . 0/22 longer;
}
then rejec t;
}
}
pol icy-s ta temen t ajspr-bgp -nh s {
te rm 1 {
f rom {
protocol bgp;
ro ute-type external;
}
then {
next-hop sel f;
}
}
}
}
ro uting - optio ns {
static {
ro ute 30 . 30 . 0 . 0/24 reject;
ro ute 30 . 30 .1 . 0/24 reject;
ro ute 30 . 30 . 2 . 0/24 reject;
ro ute 30 . 30 . 3 . 0/24 reje c t;
}
a utonomous-system 65 4 12;
}
}
}
inte r faces {
fxpO {
unit O {
fami ly inet {
address 172 . 25 .11 . 4/24 ;
}
}
}
}
Step 1.14
Issue the show ospf neighbor l o gical-system Pl command to ensure the P1 router has
established an OSPF neighbor relationship with the P2 router.
l ab@mxD> show ospf neighbor logical-system Pl
Address Int er f ace St a t e ID Pri Dead
1 72 . 22 . 252 . 2 ge - 0/0/0 . 0 Full 172 . 31 .1 01 . 1 128 32
Step 1.15
Issue the show bgp summary logical-system Pl command to view the state of the P1
router's BGP sessions.
l ab@mxD> show bgp summary logical-system Pl
Th r eading mode : BGP I/0
Gr o ups : 3 Pee r s : 3 Down peers : 1
Table Tot Paths Ac t Pa ths Suppressed His t ory Damp Stat e Pending
i net . O
12 6 0 0 0 0
Peer AS I n Pkt Out Pkt Ou tQ Flaps Las t Up/Dwn
St a t e l #Acti ve/Rece i ved/Accept ed/Damped ...
1 72 . 22 . 12 1.1 65001 0 0 0 0 1: 2 1 Conn ect
1 72 . 22 . 122 .1 65002 593 597 0 1 4 : 24 : 0 4 Establ
ine t. 0 : 6/6/6/0
1 72 . 3 1. 10 1.1 65412 60 4 601 0 2 4 : 24 : 0 4 Establ
ine t. 0 : 0/6/6/0
Step 1.16
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lablO-start. configcomma nd . After the configuration has been
loaded, commit the changes and exit to operational mode.
[edit]
lab@mxA# load override ajspr/ lablO-start . config
load complete
[edit]
lab@mxA# co1caui t and-quit
commit comp l ete
Exiting configuration mode
lab@mxA>
Step 1.17
Issue the show configuration command. Use the lab diagram to verify t hat the mxA router
has the correct interface, OSPF, and BGP configuration.
lab@mxA> show configuration
## Last commit: 2019 -1 2 - 27 12 : 08 : 40 UTC by lab
version 20190829 . 221548 builder . r1052644;
system {
host-name mxA;
root-authentication {
encrypted-password
"$ 6$GBq0FqVe$MXFb2Y . ArnNdlhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHTLOc ."; ## SECRET -DATA
}
login {
user lab {
uid 2000;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1"; ## SECRET - DATA
}
}
}
services {
ssh;
netconf {
ssh ;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
then reject ;
}
}
policy- statement p f e - load- balance {
te r m 1 {
f rom {
p r otoco l bgp ;
route -fi lte r 30 . 30 . 0 . 0/22 longe r ;
}
the n {
l oad- bal ance per- packet;
}
}
}
po l icy- stat ement redis tr ibute - s t atics {
te r m 1 {
f rom p r otoco l s t at i c ;
the n accept ;
}
}
}
ro u t i ng- opt ions {
f orwa r di n g - table {
export p f e - load- balan ce;
}
a u ton omo u s - sys t em 6500 1 ;
aggregate {
route 1 72 .1 6 . 1. 0/2 4 ;
}
}
p r otocols {
osp f {
a r ea 0 . 0 . 0 . 0 {
int er f ace l o0 . 0;
int er f ace ge - 0/0/0 . 0 ;
}
}
bgp {
g r o up i bgp {
type i nterna l ;
l ocal - address 1 72 . 1 6 . 1 .1;
export redi stribu te - stat ics ;
ne i g h bor 172 . 1 6 . 1 . 2;
}
gro up Pl -P2 {
type externa l ;
export [ redis t rib ute - s t atics expor t- aggrega t e ] ;
peer- as 65 41 2 ;
ne i g h bor 172 . 22 . 12 1. 2 ;
ne i ghbor 172 . 22 . 123 . 2 ;
}
}
}
Step 1.18
Issue the show ospf neighbor command to ensure the mxA router has established an OSPF
neighbor relationship with the R3-1 router.
lab@mxA> show ospf neighbor
Address Interface St ate ID Pri Dead
10 . 0 . 10 . 2 ge - 0/0/0 . 0 Full 172 . 16 . 1 . 2 128 34
Step 1.19
Issue the show bgp summary command to view the status of the mxA router's BGP neighbor
relationships.
lab@mxA> show bgp summary
Threading mode : BGP I/0
Gro ups : 2 Peers : 3 Down peers : 0
Answer: The mxA router has established BGP sessions with the
R3-1, P1, and P2 routers.
In this lab part, you identify unusable routes using the show route hidden command. After
analyzing the hidden routes, and discovering the reason they are unusable, you write an IBG P
export policy to change the next-hop attribute. After applying the IBGP export policy, you verify
that the routes are now active and usable.
Step 2.1
Use the show route table inet . 0 command to display the routi ng table.
lab@mxA> show route table inet. O
1 0 . 0 .1 0 . 0/24 * [ Direct/O J 00 : 4 7 : 43
> via ge - 0/0/0 . 0
1 0 . 0 .1 0 . 1/32 * [ Local/O J 00 : 47 : 43
Local via ge-0/0/0 . 0
30 . 30 . 0 . 0/24 * [ BGP/170 J 00 : 47 : 37 , localpref 100
AS path: 654 1 2 I , validation- state : unve ri fie d
> t o 1 72 . 22 . 123 . 2 via ge - 0/0/1 . 0
[ BGP/170 J 00 : 05 : 53 , localpref 100
AS path: 654 1 2 I , validation- state : unve ri fie d
> t o 1 72 . 22 . 12 1 . 2 via ge - 0/0/3 . 0
30 . 30 . 1 . 0/24 * [ BGP/170 J 00 : 47 : 37 , localpref 100
AS path: 654 1 2 I , validation- state : unve ri fie d
> t o 1 72 . 22 . 123 . 2 via ge - 0/0/1 . 0
[ BGP/170 J 00 : 05 : 53 , localpref 100
AS path: 654 1 2 I, validation- state : unve ri fie d
> t o 1 72 . 22 . 12 1 . 2 via ge - 0/0/3 . 0
Answer: Yes. The output shows that there are currently 5 hidden
routes learned by the mxA router.
Step 2.2
Use the show route hidden table inet. 0 command to identify the unusable routes in
the default routing table.
lab@mxA> show route hidden table inet.0
Quest ion: All of the hidden routes are BGP routes. Which BGP
peer is advertising these rout es?
Step 2.3
Use the show route 40. 40. 0. 0/24 hidden extensive command to display more
information about the hidden routes.
lab@mxA> show route 40.40.0.0/24 hidden extensive
Step 2.4
In the BGP route selection process, the BGP next-hop attribute must be resolved in the default
routing table (inet.0). Use the show route 1 72. 31. 102. 1 table inet. 0 command to
verify that the protocol next-hop can be resolved.
lab@mxA> show route 172.31.102.1 table inet.O
lab@mxA>
Step 2.5
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, change the perspective of the CLI to that of the R3-1
logical system by issuing the set cli logical-system R3-1 command.
lab@mxB> set cli logical-system R3-1
Logical sys t em : R3 - 1
lab@mxB : R3 - 1>
Step 2.6
An IBGP export policy needs to be created to modify the next hop attribute that is being
advertised by R3-1 to something that can be resolved in the default routing table.
Enter configuration mode and navigate to the [edit policy- options
policy- sta t ement next - hop - self] hierarchy. In the policy, change the next-hop
attribute to the loopback address of the IBGP advertising peer. Ensure that you only change the
next-hop attribute if the route is a EBGP route.
lab@mxB : R3 -1 > configure
Ent er i ng con fi gura tio n mode
[edit]
lab@mxB : R3-1# edit policy-options policy-statement next-hop-self
Step 2.7
Navigate to the [edit protocols bgp] hierarchy and apply the next - hop - self export
policy in the ibgp group. Commit the changes when completed.
[edit policy-options policy-statement next-hop-self ]
lab@mxB : R3-1# top edit protocols bgp
Step 2.8
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, issue the show route hidden command to verify
that all of the hidden routes are gone from both routing tables.
Step 2.9
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, issue the run show route hidden command to
see if there are any hidden routes learned by the R3-1 router.
[edit protocols bgp]
lab@mxB : R3 - 1# run show route hidden
Answer: Yes. The output shows that there are currently 5 hidden
routes learned by the mxA router.
Question: All of the hidden routes are BGP routes. Which BGP
peer is advertising these routes?
Step 2.10
Use the run show route 30. 30. 0. 0/24 hidden extensive command to display
more information about the hidden routes.
[edit protocols bgp ]
lab@rnxB : R3-1# run show route 30.30.0.0/24 hidden extensive
Step 2.11
In the BGP route selection process, the BGP next-hop attribute must be resolved in the default
routing table (inet.0). Use the run show route <IP from Step 2. 10> table inet. 0
command to verify that the protocol next hop can be resolved.
Step 2.12
An IBGP export policy needs to be created to modify the next hop attribute that is being
advertised by mxA router to something that can be resolved in the default routing table.
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, enter configuration mode and navigate to the [edit
policy- options policy - statement next - hop - self] hierarchy. In the policy,
change the next-hop attribute to the loopback address of the IBGP advertising peer. Ensure that
you only change the next-hop attribute if the rout e is a EBGP route.
lab@mxA> configure
Entering configuration mode
[edit ]
lab@mxA# edit policy-options policy-statement next-hop-self
Step 2.13
Navigate to the [edit protocols bgp J hiera rchy and apply the next - hop - self export
policy in the ibgp group. Commit the changes when completed.
[edi t policy- options policy- statement next- hop- self ]
lab@mxA# top edit protocols bgp
Question: Are all of the hidden routes gone from all of the
routing tables?
In this lab part, you will use the local-preference attribute to change the routing behavior within
AS 65001.
Step 3.1
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, use the show route 172 .16. 2. 0/24 detail to
display detailed information about the summary route being advertised from AS 65002.
lab@mxA> show route 172. 1 6.2.0/24 detail
inet . O: 23 destinations , 29 routes (23 active , 0 holddown , 0 hidden)
Lab 10 -38 • BGP Attributes: Part 1 www.juniper. net
Advanced Junos Service Provider Routing
Accep t ed
Localpref: 100
Ro u te r I D: 1 72 .1 6 .1. 2
Step 3.2
Enter configuration mode and navigate to the [edi t pol i cy- options
po l i cy- s ta temen t import - 1 ocalpre f ] hierarchy. Configure the import - 1 ocalpref
policy to set the loca l-preference on the summary route being received from the Pi router
to 110. Ensure that the loca l-preference is only changed on the Pi neighbor. Use the
show command to display the policy.
lab@mxA> configure
Enterin g conf igu rat ion mode
[edi t ]
lab@mx A# edit policy-options policy-statement import-localpref
[edi t pol i cy- options policy- stat eme nt import- loc alpref]
lab@mxA# set term 1 from route-filter 172.16.2.0/24 exact
Step 3.3
Navigate to t he [edi t protocols bgp group Pl - P2] hierarc hy and apply the
import - localpref pol icy as an import policy under the group. Commit the configuration
when completed.
[edit pol i cy- opt ions policy- stat ement import - localpref]
lab@mxA# top edit protocols bgp group P1-P2
Step 3.4
Use the run show route 172 .16. 2. 0/24 detail command to display detailed
information about the AS 65002 summary route.
[edit protocols bgp group P l - P2]
lab@mxA# run show route 172.16.2.0/24 detail
Router I D: 1 72 . 31 . 100 . 1
BGP Pre f erence : 170/ - 10 1
Next hop type : Router , Next hop index : 0
Address : Oxb39d630
Next- hop re f erence count: 5
Source : 172 . 22 .1 23 . 2
Next hop : 1 72 . 22 . 123 . 2 v i a ge - 0/0/1 . 0 , selec t ed
Session Id : OxO
State: <Ext>
Inactive reason: Local Preference
Local AS : 6500 1 Peer AS : 65 41 2
Age : 4 7 : 50
Validati o n Stat e : u nver i fied
Task : BGP 65412 . 172 . 22 .1 23 . 2
AS pa t h : 65 4 12 65002 I
Aggregat or : 65002 1 72 . 16 . 2 . 1
Accep t ed
Localpref: 100
Route r I D: 1 72 . 31 .1 01 . 1
Question: Now, only two BGP routes are in the mxA router's
routing table. What happened to the route from the R3-1 router?
Step 3.5
Return to the SSH session that you have open to the mxB router.
Use the show route 172 .16. 2. 0/24 detail command to display detail information
about the summary route from AS 65002.
[edit protocols bgp ]
lab@rnxB : R3 - 1# run show route 172 . 16.2.0/24 detail
Question: Two BGP routes are in the R3-1 router's routing table
for the AS 65002 summary route. Why is the route from the mxA
router active over the route received from P3?
Step 3.6
Navigate to the [edit policy- options policy- statement import - P3] hierarchy.
Configure the import - p3 policy to set the local - preference on the AS 65002 summary
route being received from the P3 router to 120. Ensure that the local - preference is only
changed on the P3 neighbor. Also, recall that the P3 neighbor is a multihop peer to the P3
loopback address. Use t he show command to display t he policy.
[edit protocols bgp]
lab@mxB : R3 - 1# top edit policy-options policy-statement import-p3
Step 3.7
Navigate to the [edit protocols bgp group P3] hierarchy and apply the import - p3
policy as an import policy under the group. Commit the configuration and exit to operational
mode when completed.
[edit policy- options policy- statement import - p3 ]
lab@mxB : R3 - 1# top edit protocols bgp group P3
Step 3.9
To set up the next part of the lab, remove the import-p3 statement from the R3-1 configuration.
Commit the configuration when completed.
lab@mxB : R3 - 1>
In this lab part, you modify the AS Path attribute. The AS Path attribute is a mandatory
well-known attribute that must be included in every BGP update. The attribute is modified as
routes are advertised between EBGP peers. The AS number of the advertising peer is prepended
to the beginning of the attribute before it is advertised to the peer. If a BGP update is received
from a peer and the AS number of the receiving peer is somewhere in the attribute, the update is
considered to have looped and discarded. The AS Path attribute is also used in the route
selection process, the shortest AS path length is preferred.#
Step 4.1
Retu rn to the SSH session that you have open to the mxC router.
From the SSH session with the mxC router, issue the show route 172 .16 .1. 0/24
command to display the path of you r summary route from AS 65001.
lab@mxC> show route 172.16.1.0/24
Question: How many BGP paths exist for your summary route?
Step 4.2
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, navigate to the [edit policy- options]
hierarchy. Copy the export - aggregate policy to a new policy named export - p3 and
display the new policy with the show policy-statement export-p3 command.
[ [edi t protocols bgp group P3 ]
lab@mxB : R3 - 1# top edit policy-options
Answer: The BGP update was never sent from the P3 peer to
R3-2. P3 determined that AS number 65002 matched the next
router in the path and suppressed the advertisement. This is the
default Juniper loop prevention mechanism.
Step 4.6
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, navigate to the [edit policy- op t ions
policy- statement export - aggregate] hierarchy. Display the policy with the show
command. Using the as-path-prepend command insert AS 65001 three times in to the AS
path before advertising the summary route. Commit the changes when completed.
[edit protocols bgp group Pl - P2]
lab@mxA# top edit policy-options policy-statement export-aggregate
Question: What is the AS Path for the summary route now? Why
are there four of your AS numbers?
Step 4.8
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, navigate to the [edit policy- options
policy- statement export - p3] hierarchy. Display the policy using the show command
and delete the as - pa th - prepend option. Commit the change when completed.
[edit protocols bgp]
lab@mxB : R3 - 1# top edit policy-options policy-statement export-p3
From the SSH session with the mxC router, use the show route 172 .16 .1. 0/24 command
to display the path of the summary route from AS 65001.
lab@mxC> show route 172.16.1 . 0/24
Answer: The active route is the IBGP update from the R3-2
router. The AS path through the R3 router has a length of two
while the AS path through P1 and P2 has a length of five.
Step 4.10
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, navigate to the [edit policy-options
pol i cy-s ta temen t export - aggregate] hierarchy. Display the export - aggregate
policy using the show command and delete the as-path-prepend statement. Commit the
change when completed.
[edit pol icy-options policy- statement export-aggregate ]
lab@mxA# show
term 1 {
from {
protocol aggregate;
route -fi lter 172 . 16 .1. 0/24 exact;
}
then {
as -path - prepend " 65001 65001 65001";
accept;
}
}
term 2 {
from {
rou te-fi lter 172 . 16 .1. 0/24 longer;
}
then reject;
}
Step 4.12
Use a regular expression in the run show route receive-protocol bgp
1 72 . 22 .121 . 2 aspath-regex ''. * 65002 '' command to only display routes that
originate in AS 65002.
[edi t pol i cy- options po l icy- stat ement export-agg r egat e ]
lab@ mxA# run sho w r oute receiv e-protocol bgp 1 7 2. 22 . 12 1. 2 a spa th-regex II • * 650 02"
Step 4.13
In the following steps, you use regular expressions to create a BGP import policy to only accept
your partner's summary route from the Pi peer.
Step 4.17
Use the command run show route advertising-protocol bgp 1 72. 22. 121. 2 to
display the routes being advertised to the P1 peer.
[edi t pro tocols bgp group Pl-P2]
lab@mxA# run show route advertising-protocol bgp 172.22.121.2
Step 4.18
Retu rn to the SSH session that you have open to the mxB router.
From t he SSH session with the mxB router, navigate to the [edi t rou ting-op t ions ]
hierarchy. Configure a static route of 172.16.10.0/24 in the R3-1 routing instance with a
next-hop of reject . Commit the configuration when completed.
[edi t policy- options policy-statement export-p3]
lab@mxB : R3-1# top edit routing-options
[edi t routing-options]
lab@mxB : R3-1# set static route 172.16.10.0/24 reject
Step 4.20
Using regular expressions, you will now modify the BGP export policy for P1 and P2 to suppress
all internal BGP routes from being advertised. Navigate to the [edit policy- options J
hierarchy. Create an as - pa th named internal - as to match on all internal BGP routes.
[edit protocols bgp group Pl - P2 ]
lab@mxA# top edit policy-options
[edi t pol i cy- options policy- stat ement export- agg r egat e ]
lab@mxA# co1caui t and-quit
commit comple t e
Exit i ng con f igurat i on mode
lab@mxA>
Step 4.22
Use regular expressions in the run show route advertising-protocol bgp
172. 22 .121. 2 aspath-regex '' ()''comma nd to only display routes that originate in your
autonomous system.
lab@mxA> show route advertising-protocol bgp 1 72.22.121.2 aspath-regex " ()"
Step 4.23
Log out of your assigned devices using the exit command.
lab@mxA> exit
mxA (t tyuO)
login :
Virtual Desktop
Console and
mxB VNC Connections
~~
~G>-----____,;
mxc Hypervisor Physical
Virtual Switch Desktops
Management Addressing
mxD
Student mxA: 172.25.11 .1
Virtual mxB: 172.25.11.2
mxE
Environment mxC: 172.25.11 .3
mxD: 172.25.11 .4
mxE: 172.25.11 .5
.0
.~ AS 65002
cc
(D mxB cc
(D
.• ••••••••••••••••
0
-- •••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••;,:
--
••;J
• .w.a.:,
•:.:.
•• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••r•
:.:_:
0
••••••••••••••••••••
o.....-- •••
• 0
-- .2 AS 65020 ~
.:
0
R3-1
lo0.2 = 172.16 .1.2
.1 ------ R3-2
.2
.•••
••
•
lo0.2 = 172.16.2.2 •
••
•
----- •
•
•
•
.•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••.
® 2020 Juniper Networks. Inc .All Rights Rese,veo
Overview
In this lab, you use the lab diagram titled "Lab Network Diagram: BGP Attributes - Part 2" to
influence traffic leaving your autonomous system. The Local-Preference attribute is used in this
lab to define a preferred exit point out for your AS for routes being received from AS 65412. In
addition, you use communities to tag the routes being received from the P1, P2, and P3 routers.
By completing this lab you perform the following tasks:
• Load the starting configuration .
• Influence routing using the Origin attribute .
• Influence routing using the MED attribute .
• Use communities to tag routes .
• Influence routing by matching specific communities .
In this lab part, you verify the initial configuration of the routers. You then verify that the
interfaces are operational and OSPF and BGP neighbor relationships have formed.
Note
The instructor will tell you the nature of your access and
will provide you with the necessary details to access your
assigned device.
Note
The lab topology requires you to display information in the
different logical systems of mxA, mxB, mxC, mxD, and
mxE. You will be changing the perspective of the CLI by
issuing the set cli logical-system ls-name
command. Refer to the lab diagram for the correct logical
system name.
By changing the perspective of the CLI, you will be able to
perform network commands such as ping or
traceroute from the perspective of the pertinent logical
system.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student devices.
Access the CLI on your mxB device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labll-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password: lab123
Last login : Tue Nov 26 19 : 38 : 00 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kerne l 64 - bit JNPR-11 . 0 - 20190701 . 269d466 buil
lab@mxB> configure
Entering configuration mode
[edit]
lab@mxB# load override ajspr/labll-start .config
load complete
[edit]
lab@mxB# coituui t and-quit
commit comp l ete
Exiting configuration mode
lab@mxB>
Step 1.2
Issue t he show configuration command . Use t he lab diagram t o verify that the mxB router
has the correct logica l system and interface conf iguration. Verify that BGP has been enabled .
lab@mxB> show configuration
## Last commit : 2019 - 11 - 26 19 : 33 : 31 UTC by lab
version 20190829 . 221548 bu i lder .r105264 4;
system {
host-name mxB;
root-authenticat ion {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNd lhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3t QObCdrevo0v635R7ReHTL 0c ."; ## SECRET -DATA
}
login {
user lab {
uid 2000 ;
class super-user;
au t h entication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
sys log {
user* {
any emergency;
}
file messages {
any notice;
au t hor iz ation info;
}
file inte ractive -commands {
inte ract ive -commands any;
}
}
}
logical-systems {
P3 {
interfaces {
ge-0/0 /3 {
unit O {
family inet {
address 172.22 . 1 25 . 2/24 ;
}
}
}
ge-0/0 / 4 {
unit O {
fami l y inet {
address 172 . 22 . 126 . 2/24 ;
}
}
}
loO {
uni t O {
fami l y inet {
address 172 . 31 . 1 02 . 1 /32;
}
}
}
}
protocols {
bgp {
group R3-1 {
type external;
mult ihop ;
local -address 1 72 . 3 1. 102 . 1 ;
export ajspr-bgp-export-p3;
neighbo r 172 . 16 . 1 . 2 {
pee r-as 65001;
}
}
group R3-2 {
type external;
mult ihop ;
local -address 1 72 . 3 1. 102 . 1 ;
export ajspr-bgp-export-p3;
neighbo r 172 . 16 . 2 . 2 {
pee r- as 65002;
}
}
}
}
po l icy- optio ns {
policy-s tatemen t ajspr -bgp-expo rt-p3 {
term 1 {
from {
protocol static;
route-fi lter 40 . 40 . 0 . 0/22 o rl o nger;
}
then accept;
}
term 2 {
from {
prot ocol bgp ;
ro ute-fi lter 30 . 30 . 0 . 0/22 l onger;
}
then reject;
}
}
}
routing- opt ions {
static {
interface ge - 0/0/0 . 0;
}
}
bgp {
group ibgp {
type internal;
local -address 172 . 16.1 . 2;
export [ redistribute - statics next-hop-self];
neighbor 172 . 16 . 1 . 1;
}
group P3 {
type external;
multihop;
local -address 172 . 16.1 . 2;
export export-aggregate;
peer - as 65020 ;
neighbor 172 . 31 . 102 .1;
}
}
}
policy- options {
po l icy- statement export-aggregate {
term 1 {
from {
protocol aggregate ;
route -fi lter 172.16 .1. 0/24 exact;
}
then accept;
}
term 2 {
from {
route -fi lter 172.16 .1. 0/24 longer;
}
then reject;
}
}
policy- statement next-hop-self {
term 1 {
from {
protocol bgp ;
route -t ype external;
}
then {
next-hop se lf;
}
}
}
policy- statement redistribute - statics {
term 1 {
from protocol static;
then accept;
}
}
}
routing- options {
s t a t ic {
ro ute 1 72 . 1 6 . 1 .1 28/26 r e j ect;
ro ute 1 72 . 1 6 . 1 .1 92/26 r e j ect;
ro ute 1 72 . 3 1. 102 . 1/32 {
next-hop 172 . 22 .1 25 . 2 ;
n o -re adve r ti s e;
}
}
a ut on o mo u s - s y s tem 65001 ;
agg re g ate {
ro ute 1 72 . 1 6 . 1 . 0/24 ;
}
}
}
R3 - 2 {
i nte r fa c e s {
ge- 0/0/ 1 {
unit O {
f a mi l y i net {
addres s 1 0 . 0 . 14 . 2/2 4;
}
}
}
ge- 0/0/5 {
unit O {
f a mi l y i net {
addres s 1 72 . 22 . 1 26 . 1 /24 ;
}
}
}
loO {
unit 2 {
f a mi l y i net {
address 1 72 .1 6 . 2 . 2/32 ;
}
}
}
}
p r o t oco l s {
ospf {
area 0 . 0 . 0 . 0 {
i nte r fa c e l o 0 . 2 ;
i nte r fa c e ge- 0/0/1 . 0 ;
}
}
b gp {
g r oup ibgp {
t ype i nte r nal ;
loca l -ad d r ess 172 . 16 . 2 . 2 ;
expo rt [ r e d is t rib ute-stati cs next-hop-self ] ;
neighb or 172 . 16 . 2 . 1 ;
}
g r oup P3 {
t ype exter nal ;
mult i hop;
}
}
}
}
inter f aces {
fxpO {
u ni t O {
f ami ly inet {
address 172 . 25 . 1 1. 2/24 ;
}
}
}
}
Answer: The R3-2 router is configured for and EBGP session with
the P3 router and an IBGP session with the mxC router.
Step 1.3
Issue the show bgp summary logical-system P3 command to view the state of the P3
router's EBGP sessions.
lab@mxB> show bgp summary logical-system P3
Threadi ng mode : BGP I/0
Groups : 2 Peers : 2 Down peers : 0
Table To t Pa t hs Act Paths Suppressed His tory Damp S ta te Pending
inet . O
10 6 0 0 0 0
Pee r AS InPkt Ou tPkt OutQ Fl aps Las t Up/Dwn
Sta te l #Ac tive /Received/Accepted/Damped ...
1 72 . 1 6 . 1 . 2 65001 84 1 81 4 0 0 6 : 04 : 05 Establ
i net . O: 1 /5/5/0
1 72 .1 6 . 2 . 2 65002 93 4 926 0 0 6 : 52 : 30 Establ
i net . O: 5/5/5/0
Step 1.4
Access the CLI on your mxC device using Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labll-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@172 . 25.11.3
Password : lab123
Last login : Tue Nov 26 19 : 44 : 21 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kerne l 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 bui l
lab@mxC> configure
Entering configuration mode
[edit ]
lab@mxC# load override ajspr/labll-start . config
load complete
[edit ]
lab@mxC# coirauit and-quit
commit complete
Exiting configuration mode
lab@mxC>
Step 1.5
Issue the show configuration command. Use the lab diagram to verify that the mxC router
has the correct interface, OSPF, and BGP configuration.
lab@mxC> show configuration
## Last commit : 2019 - 11 - 26 19 : 59 : 44 UTC by lab
version 20190829 . 221548 builder . r1052644;
system {
host- name mxC;
root - au t hentication {
encrypted- password
" $6$GBq0FqVe$MXFb2Y . ArnNdlhwla9MApGk . mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHTLOc ." ; ## SECRET- DATA
}
l ogin {
user lab {
uid 2000;
class super- user;
authentication {
encrypted- password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET- DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
Step 1.6
Issue the show ospf neighbor command to ensure the mxC router has established an OSPF
neighbor relationship with the R3-2 router.
lab@mxC> show ospf neighbor
Address Inte r face St a te ID Pri Dead
1 0 . 0 . 14 . 2 ge - 0/0/0 . 0 Full 172 . 16 . 2 . 2 128 33
Step 1.7
Issue the show bgp summary command to view the state of the mxC router's BGP sessions.
lab@mxC> show bgp summary
Threading mode : BGP I/0
Groups : 2 Peers: 3 Down peers : 2
Table Tot Paths Ac t Paths Suppressed His t ory Damp State Pending
ine t . O
17 11 0 0 0 0
Pee r AS I n Pkt Out Pkt Ou tQ Flaps Las t Up/Own
State l #Ac tive /Rece ived/Accep ted/Damped ...
1 72 . 16 . 2 . 2 65002 914 916 0 0 6 :4 5 : 23 Establ
inet. O: 6/7/7/0
172 . 22 . 122 . 2 65412 0 0 0 0 2 : 04 Connect
1 72 . 22 . 12 4. 2 65412 0 0 0 0 2 : 04 Connect
Step 1.8
Access the CLI on your mxE device using Secure Shell (SSH) or as directed by you r instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing t he load
override ajspr/labll-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password: lab123
Last login : Tue Nov 26 1 6 : 19 : 46 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kerne l 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxE> configure
Entering configuration mode
[edit]
lab@mxE# load override ajspr/labll-start . config
load complete
[edit]
lab@mxE# co1caui t and-quit
commit comp l ete
Exiting configuration mode
lab@mxE>
Step 1.9
Issue the show configuration command. Use the lab diagram to verify that the mxE router
has the correct logical system and interface configuration. Verify that OSPF and BGP has been
enabled.
lab@mxE> show configuration
## Last commit : 2019 -11- 26 20 : 03 : 37 UTC by lab
version 20 1 90829 . 221548 builder . r1052644;
system {
host- name mxE;
root-authentication {
encrypted- password
" $6$GBq0FqVe$MXFb2Y . ArnNdlhwla9MApGk . mdlpusC7vWkzduzRuuafxYgZ T2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHT LOc ."; ## SECRET - DATA
}
login {
user lab {
uid 2000 ;
class super-user;
authentication {
encrypted-password "$ 6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET -DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
logical-systems {
P2 {
interfaces {
ge-0/0/2 {
unit O {
family inet {
address 172.22 . 124 . 2/24 ;
}
}
}
ge-0/0/5 {
unit O {
family inet {
address 172.22 . 252 . 2/30;
}
}
}
ge-0/0/7 {
unit O {
family inet {
address 172.22 . 123 . 2/24 ;
}
}
}
loO {
unit O {
family inet {
address 172.31.101 . 1/32;
}
}
then {
next-hop sel f;
}
}
}
}
routing - op tions {
stat ic {
route 30 . 30 . 0 . 0/24 reject;
route 30 . 30 .1 . 0/24 reject;
route 30 . 30 . 2 . 0/24 reject;
route 30 . 30 . 3 . 0/24 reject;
}
autonomo u s - system 65 4 12;
}
}
}
interfaces {
fxp O {
unit O {
fami ly inet {
address 172 . 25 .11 . 5/24 ;
}
}
}
}
Step 1.10
Issue the show bgp summary logical-system P2 command to view the state of the P2
router's BGP sessions.
lab@mxE> show bgp summary logical-system P2
Threadi n g mode : BGP I/0
Gr o u ps : 3 Pee r s : 3 Down pee r s : 2
Table Tot Pa t hs Act Paths Suppr essed Hi story Damp St ate Pending
i net . O
16 6 0 0 0 0
Peer AS In Pkt Ou tPk t Ou tQ Flaps Las t Up/Own
St ate l #Acti ve/Rece i ved/Accepted/Damped ...
1 72 . 22 . 123 . 1 65001 0 0 0 0 7 : 56 Connect
1 72 . 22 . 12 4. 1 65002 748 755 0 1 5 : 33 : 49 Es t abl
i n e t . O: 6/6/6/0
1 72 . 3 1 . 100 . 1 654 1 2 0 0 0 0 7 : 56 Ac ti ve
Step 1.11
Access the CLI on your mxD device using Secure Shell (SSH) or as directed by you r instructor.
Log in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labll-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh iab@l 72 . 25.11.4
Password : lab123
Last login: Tue Nov 26 15:59:57 2019 from 172.25 .1 1 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxD>
Step 1.12
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labll-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
lab@mxD> configure
Entering configuration mode
[edit ]
lab@mxD# load override ajspr/iabll-start . config
load complete
[edit ]
lab@mxD# coiraui t and-quit
commit complete
Exiting configuration mode
lab@mxD>
Step 1.13
Issue the show configuration command. Use the lab diagram to verify that the mxD router
has been configured for a logical system called P1 that has the correct interface and OSPF
configuration.
lab@mxD> show configuration
## Last commit : 2019 - 11 - 26 20 : 04 : 55 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
address 1 72 . 22 . 1 22 . 2/24 ;
}
}
}
loO {
u n it O {
f ami ly i ne t {
address 1 72 . 31 . 1 00 . 1 /32 ;
}
}
}
}
pro t oco l s {
ospf {
area 0 . 0 . 0 . 0 {
int er f ace lo0 . 0;
in t er f ace ge - 0/0/0 . 0;
}
}
bgp {
gro up i bgp {
type int ernal ;
local - address 172 . 3 1.1 00 .1;
export ajsp r-bgp- nhs;
ne i ghbor 172 . 31 .1 01 .1 ;
}
gro up mxA {
type ext ernal ;
export ajsp r-bgp- expo r t;
ne i ghbor 172 . 22 .1 21 .1 {
pee r-as 6500 1;
}
}
gro up mxC {
type ext ernal ;
export ajsp r-bgp- expo r t;
n e i ghbo r 172 . 22 .1 22 .1 {
pee r-as 65002 ;
}
}
}
}
pol i cy- opt i ons {
pol i cy- sta t ement ajspr- bgp- expo rt {
term 1 {
f rom {
prot ocol stat ic;
ro ut e -fi lte r 30 . 30 . 0 . 0/22 orlonger ;
}
t h en accep t ;
}
term 2 {
f rom {
prot ocol bgp ;
ro ut e -fi lte r 40 .4 0 . 0 . 0/22 longer ;
}
then rejec t ;
}
}
policy- stat ement ajspr - bgp- nhs {
term 1 {
f rom {
pro t ocol bgp ;
rout e -t ype external;
}
then {
n ext- hop sel f;
}
}
}
}
routing- options {
static {
route 30 . 30 . 0 . 0/24 reject;
route 30 . 30 . 1 . 0/24 r eject;
route 30 . 30 . 2 . 0/24 r eject;
ro u te 30 . 30 . 3 . 0/24 r e j ect;
}
au t on omou s - system 65412;
}
}
}
i nte rfaces {
f xpO {
uni t O {
f amily i n e t {
address 172 . 25 .1 1 . 4 /24 ;
}
}
}
}
Step 1.14
Issue the show ospf neighbor logical-system Pl command to ensure the P1 router has
established an OSPF neighbor relationship with the P2 router.
l ab@mxD> show ospf neighbor logical-system Pl
Address Int er f ace St a t e ID Pri Dead
1 72 . 22 . 252 . 2 ge - 0/0/0 . 0 Full 172 . 31 . 1 01 . 1 128 32
Step 1.15
Issue the show bgp summary logical-system Pl command to view the state of the P1
router's BGP sessions.
lab@mxD> show bgp summary logical-system Pl
Threading mode : BGP I/0
Grou ps : 3 Peers : 3 Down peers : 1
Tab l e Tot Paths Act Paths Suppressed History Damp S t ate Pending
inet . O
16 6 0 0 0 0
Peer AS In Pkt OutPkt Ou tQ Flaps Last Up/Dwn
Statel#Act i ve/Rece i ved/Accepted/Damped ...
172 . 22 . 121 . 1 65001 0 0 0 0 1 : 21 Connect
172 . 22 . 122 . 1 65002 739 747 0 1 5 : 29 : 39 Es t abl
inet . O: 6/6/6/0
1 72 . 3 1. 101 . 1 654 1 2 755 752 0 2 5 : 29 : 39 Es t abl
inet . O: 0/6/6/0
Step 1.16
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labll-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login : Tue Nov 26 13 : 36 : 36 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kerne l 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxA> configure
Entering configu ration mode
[edit]
lab@mxA# load override ajspr/labll-start . config
load complete
[edit]
lab@mxA# co1caui t and-quit
commit complete
Exiting con f iguration mode
lab@mxA>
Step 1.17
Issue t he show configuration command. Use the lab diagram to verify that the mxA router
has the correct interface, OSPF, and BGP configu ration.
lab@mxA> show configuration
## Last commit: 2019 - 11 - 26 19 : 34 : 59 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxA;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNdlhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHTL 0c ."; ## SECRET-DATA
}
login {
user lab {
uid 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
interfaces {
ge-0/0/0 {
unit O {
fami ly inet {
address 10 . 0 . 10 .1 /24;
}
}
}
ge-0/0/1 {
unit O {
fami ly inet {
address 172 . 22 .1 23 . 1/24;
}
}
}
ge - 0/0/3 {
uni t O {
f amily inet {
address 172 . 22 .1 21 .1 /24;
}
}
}
fxpO {
uni t O {
f amily i net {
address 172 . 25 .1 1 . 1 /24 ;
}
}
}
loO {
uni t O {
f amily i net {
address 172 . 16 .1 . 1/32 ;
}
}
}
}
policy- opt i ons {
policy- statement export-aggregate {
te r m 1 {
from {
protoco l aggregate;
route -fi lter 172 . 16 . 1 . 0/24 exact;
}
the n accept;
}
te r m 2 {
fr om {
ro u te -fi lter 172 . 16 . 1 . 0/24 longer;
}
the n reject;
}
}
policy- statement next- hop- self {
term 1 {
from {
protocol bgp ;
ro u te -type external;
}
then {
next-hop self ;
}
}
}
policy- statement pfe- load-balance {
term 1 {
from {
protocol bgp;
route -fi lter 30 . 30 . 0 . 0/22 longer;
}
then {
load- balance per- packet;
}
}
}
policy- statement redistr i bute - statics {
term 1 {
fr om protocol static;
then accept;
}
}
}
routing-options {
static {
rou te 1 72 . 16 . 1 . 0/26 re ject ;
rou te 1 72 . 16 . 1 . 64/26 reject;
}
f orwarding -table {
export pfe-load-balance;
}
autonomou s - sys tem 65001;
aggregate {
rou te 1 72 . 16 . 1 . 0/2 4;
}
}
protocols {
osp f {
area 0 . 0 . 0 . 0 {
inter fa ce lo0 . 0;
inter fa ce ge - 0/0/0 . 0;
}
}
bgp {
group ibgp {
type internal ;
local -address 172 . 1 6 . 1 . 1;
export [ redis tribute- statics next-hop- sel f ];
neighbor 172 . 16 .1 . 2;
}
group Pl-P2 {
type external;
export export-aggregate;
pee r- as 65 41 2 ;
multipath ;
neighbor 172 . 22 .1 2 1. 2 ;
neighbor 172 . 22 .1 23 . 2 ;
}
}
}
Step 1.18
Issue the show ospf neighbor command to ensure the mxA router has established an OSPF
neighbor relationship with the R3-1 router.
lab@ mxA> show ospf neighbor
Address I nterface State ID Pri Dead
1 0 . 0 .1 0 . 2 ge - 0/0/0 . 0 Fu l l 172 . 16 . 1 . 2 128 34
Step 1.19
Issue the show bgp summary command to view the status of the mxA router's BGP neighbor
relationships.
lab@mxA> show bgp summary
Threading mode : BGP I/0
Gro u ps : 2 Peers: 3 Down peers : 0
Tab l e Tot Paths Ac t Pat hs Su ppressed History Damp Stat e Pending
i net . O
17 16 0 0 0 0
Peer AS In Pkt Out Pkt Ou tQ Flaps Las t Up/Dwn
Statel #Ac tive /Rece i ved/Accept ed/Damped ...
1 72 . 16 . 1 . 2 6500 1 720 711 0 2 5 : 09 :4 5 Establ
i net . O: 6/7/7/0
1 72 . 22 . 12 1. 2 65412 696 71 0 0 3 5 : 09 :4 5 Establ
i net . O: 5/5/5/0
1 72 . 22 . 123 . 2 65412 696 709 0 3 5 : 09 :4 5 Establ
i net . O: 5/5/5/0
Answer: The mxA router has established BGP sessions with the
R3-1, P1, and P2 routers.
In this lab part, you modify the origin attribute. The BGP origin attribute is a well known
mandatory attribute used in the route selection processes. It has three possible values, IGP
( I) , EGP (E) or i ncomplete (?) . In the route selection process IGP is preferred over
EG P and EGP is preferred over incomplete. Using import policy to change the BGP origin, routes
can be influenced to prefer a specific peering session. Beca use the attribute is a transitive
attribute, it can also be used in an export policy to influence traffic into the AS.
Step 2.1
From the SSH session with the mxA router, you will need access configuration mode, change to
the protoco l s bgp hierarchy. Display the configuration and then remove the mu l tipath
command from the BGP group Pl - P2 in order to demonstrate that the BGP origin attribute can
influence traffic. Doing so allows the router to use the BGP route selection process on the
duplicate routes being received from P1 and P2 (they are both advertising routes in the 30.30/
22 range). Once mul tipath is removed from the configuration, the router will choose only a
single path towards routes received from AS 65412. Delete the mul tipath option. Commit the
change when completed.
l ab@mxA> configure
Enter i ng configu ra tio n mode
[edit ]
l ab@mxA# edit protocols bgp
Question: How many routes are active from the P1 peer? How
many routes are active from the P2 peer?
Step 2.3
Use the run show route 1 72 .16. 2. 0/24 detail command to display the summary
route being advertised by AS 65002.
[edit pro t oco l s bgp]
l ab@mxA# run show route 172.16.2.0/24 detail
Step 2.4
Navigate to the [edit policy- options policy- statement Pl - P2 - import]
hierarch y. Write the import policy to change the origin to egp on the 172.16.2.0/24 summary
route being received from P1 and P2.
[edit protocols bgp]
lab@mxA# top edit policy-options policy-statement P1-P2-import
Step 2.5
Navigate to the [edit protocols bgp J hierarchy and apply the Pl - P2 - import policy as
an import policy to the Pl - P2 group. Commit the changes when completed.
[edit policy- options policy- statement Pl - P2 -import ]
lab@mxA# top edit protocols bgp
Step 2.6
Use the run show route 172 .16. 2. 0/24 detail command to display you r partner's
summary route in the default routi ng instance.
[edit protocols bgp ]
lab@rnxA# run show route 172 . 16 . 2 . 0/24 detail
Answer: The R3-1 router is now the preferred BG P peer for the
summary route. The P1/ P2 routes are set as inactive because
of the origin attribute.
Step 2.7
Remove the import policy from the Pl - P2 group. Commit the change and return to operational
mode.
[edit protocols bgp]
lab@mxA# delete group Pl-P2 import
lab@mxA>
Step 2.8
Use the operational mode command show route 172 .16. 2. 0/24 command to verify that
the route again prefers one of the Pi or P2 peers in t he default routing instance.
lab@mxA> show route 172.16.2 . 0/24
Answer: Yes, in the above capture, the origin is now the same on
all three routes and, in this case, the Best in Group path is
through P1.
In this lab part, you configure the MED attribute. The MED is an optional nontransitive attribute
used to influence traffic coming into your AS. It is a route metric assigned to a BGP route and
advertised to a remote peer to influence the remote peer's route selection process. In this part,
you use a MED t o influence AS 65412 to always use P2 to route traffic to your summary address.
Step 3.1
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, change the perspective of the CLI to that of the P1
logical system by issuing the set cli logical-system Pl command.
lab@mxD> set cli logical-system Pl
Logical system: Pl
lab@mxD : Pl>
Step 3.2
Issue the show route 172 .16 .1. 0/24 command to display the path used to forward traffic
destined your summary route from the perspective of t he P1 router.
lab@mxD : Pl> show route 172.16 . 1.0/24
Step 3.3
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, change the perspective of the CLI to that of the P2
logical system by issuing the set cli logical-system P2 command.
lab@mxE> set cli logical-system P2
Logical system : P2
lab@mxE : P2>
Step 3.4
Issue t he show route 172 .16 .1. 0/24 command to display the path used to forward traffic
destined your summary route from the perspective of the P2 router.
lab@mxE : P2> show route 172.16.1.0/24
Step 3.5
Return to the SSH session that you have open t o the mxA router.
From the SSH session with the mxA router, enter configuration mode and navigate to the [edit
protocols bgp group Pl - P2] hierarchy. Set the metric - out value to 10 on the Pi
neighbor. Commit the configuration when completed.
lab@mxA> configure
Ente ri ng con fi g u ration mode
[edi t ]
lab@mxA# edit protocols bgp group P1-P2
Step 3.6
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, issue the show route 172 .16 .1. 0/24
command to display the path used to forward traffic destined your summary route from the
perspective of the P1 router.
lab@mxD : Pl> show route 172.16.1.0/24
Answer: From the P1 router, the preferred path for the summary
route is now through the P2 router. This may take a minute or
two to change.
Step 3.7
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, issue the show route 172 . 16 . 1 . O/ 2 4
command to display the path used to forward traffic destined your summary route from the
perspective of the P2 router.
lab@mxE : P2> show route 172.16.1.0/24
Answer: From the P2 router, the preferred path for the summary
route is still over the ge-0/0/7 .0 interface.
Step 3.8
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, navigate to the [edit policy-options]
hierarchy. Copy the export-aggregate policy to a new policy named export-p2. Display
the new policy with the show command.
[edit protocols bgp group Pl-P2 ]
lab@mxA# top edit policy-options
[edit policy-options ]
lab@mxA# copy policy-statement export-aggregate to policy-statement export-p2
[edit policy-options ]
lab@mxA#
Step 3.9
Navigate to the [edit policy- options policy- statement export - p2] hierarchy.
Set the metric to 20 in term 1 before accepting the summary route.
[edit pol icy- options ]
lab@mxA# edit policy-statement export-p2
Answer: From the P1 router, the preferred path for the summary
route is now through ge-0/ 0/ 1.0.
Step 3.12
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, issue the show route 172 . 16 . 1 . O/ 2 4
command to display the path used to forward traffic destined your summary route from the
perspective of the P2 router.
l ab@mx E : P2> show route 172.16.1.0/24
Answer: From the P2 router, the preferred path for the summary
route is now over the ge-0/0/5.0 interface.
In this lab part, you configure BGP communities. The community attribute is an optional
transitive attribute. An individual BGP process does not have to understand the community
attribute but it must advertise it to all established peers. The community attribute is a 4-octet
value in the format FFFF:FFFF. The first two octets represent an autonomous system number
and the second two octets represent a locally defined value.
Communities can be used simply to provide an administrative tag va lue to associate specific
routes with specific BGP peers. It can also be used to trigger specific actions with an import
routing policy. A route's community value can cause specific routes to be accepted, rejected or
modified.
Step 4.1
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, remove the metric from the P1 neighbor and the
export policy from the P2 neighbor. Commit the changes when completed.
[edit pro t ocols bgp group Pl - P2]
lab@mxA# delete neighbor 172.22.121.2 metric-out
Name Value
65002:100 65002:100
65002:110 65002:110
65002:120 65002:120
lab@mxC> configure
Entering configuration mode
[edit]
lab@mxC# edit policy-options
Step 4.3
Create two routing policies named export - pl and export - p2 by using the copy command
to copy the export - aggregate policy into each of the new policies.
[edit policy- opt ions]
lab@mxC# copy policy-statement export-aggregate to policy-statement export-pl
p r otocol aggregate;
route -f ilter 172 . 16 . 2 . 0/24 exact ;
}
the n accept;
}
t erm 2 {
f rom {
route -f ilter 172 . 16 . 2 . 0/24 longe r;
}
the n re j ect;
}
lab@mxB : R3 - 2>
Step 4.8
Enter configuration mode and navigate to the [edit policy- options] hierarchy. Define
three communities as shown in the following table. The community name shou Id be the same as
the member value.
Name Value
65002:100 65002:100
65002:110 65002:110
65002:120 65002:120
[edit]
lab@mxB : R3 - 2# edit policy-options
Step 4.9
Create a routing policy named export - p3 by using the copy command to copy the
export - aggregate policy into the new policy.
[edit policy- options ]
lab@mxB : R3 - 2# copy policy-statement export-aggregate to policy-statement export-p3
Step 4.10
Navigate to the [edit policy- options policy- statement export - p3] hierarchy
and use the show command to display the policy. In term 1, set the community to the
65 002 : 11 o community configured previously.
[edit policy- options ]
lab@mxB : R3 - 2# edit policy-statement export-p3
Step 4.11
Navigate to the [edit protocols bgp group P3] hierarchy. Apply the export - p3 policy
as an export policy under the P3 neighbor hierarchy. Commit the configuration and exit to
operational mode when completed.
[edi t policy- options policy-statement export-p3]
lab@mxB : R3-2# top edit protocols bgp group P3
lab@mxB : R3-2>
Step 4.12
Return to t he SSH session that you have open to the mxA router.
From the SSH session with the mxA router, issue the run show route 172 .16. 2. 0/24
detail command to display detailed information about the AS 65002 summary route.
[edit protocols bgp group Pl-P2]
lab@mxA# run show route 172.16.2.0/24 detail
Step 4.13
Navigate to the [ edit policy- options ] hierarchy. Define three communities as shown in
the following table. The community name should be the same as the member value.
Name Value
65002:100 65002:100
65002:110 65002:110
65002:120 65002:120
lab@mxA# show
type exte r nal;
export export - agg r ega t e ;
peer - as 65412;
neighbor 172 . 22 . 121 . 2;
neighbor 172 . 22 . 123 . 2;
Step 4.16
Retu rn to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, change the perspective of the CLI to that of the R3-1
logical system by issuing the set cli logical-system R3-1 command.
lab@mxB : R3 - 2> set cli logical-system R3-1
Logical system : R3 - 1
lab@mxB : R3 - 1>
Step 4.17
Enter configuration mode and navigate to the [edi t policy- options J hierarchy. Define
three communities as shown in the following table. The community name should be the same as
the member value.
Name Value
65002:100 65002:100
65002:110 65002:110
65002:120 65002:120
[edi t ]
lab@mxB : R3 - 1# edit policy-options
lab@mxB : R3 - 1>
Step 4.20
Use the show route 172 . 16 . 2 . 0/24 detail command to display detail information
about t he AS 65002 summary route.
lab@mxB : R3 - 1> show route 172 . 16 . 2 . 0 / 24 detail
Session Id : Ox191
Prot oco l next hop : 172 . 1 6 . 1 .1
Indirect next hop : Oxb2b2ca0 1 048575 I NH Session I D: Ox194
Stat e : <Ac ti ve I nt Ext>
Local AS : 6500 1 Peer AS : 6500 1
Age : 2 :4 8 : 56 Metri c2: 1
Va lida tion St a t e: unver ified
Task : BGP 65001 .1 72 .1 6 . 1. 1
Announcement bits (3): 3 - KRT 5 - BGP_RT_ Background 6 -Resolve tree 1
AS path: 65 4 12 65002 I
Aggregator : 65002 172 . 16 . 2 . 1
Co11aullni ties: 65002: 120
Accepted
Localpref: 120
Rou t er I D: 1 72 .1 6 . 1 .1
BGP Pre fe rence : 170/-111
Next hop type : I ndirect, Next hop index : 0
Address: Oxb39cd90
Next- hop re fe rence count: 9
Source: 172 . 31 .1 02 . 1
Next hop type : Router , Next hop index: 7 4 3
Next hop : 1 72 . 22 . 125 . 2 via ge-0/0/2 . 0, se l ected
Session Id : Ox18e
Prot oco l next hop : 1 72 . 3 1. 102 . 1
Indirect next hop : Oxb2b31 f 0 1 048576 I NH Session I D: Ox195
Stat e : <Ext>
Inactive reason: Local Preference
Local AS : 65001 Peer AS: 65020
Age: 3 :4 3 Metri c2: 0
Va lida tion St a t e: unve r ified
Tas k : BGP 65020 .1 72 . 31 .1 02 . 1
AS path: 65020 65002 I
Aggregator: 65002 172 . 16 . 2 . 2
Co11aullni ties: 65002: 110
Accepted
Localpref: 110
Rout er I D: 172.31 . 102 . 1
Question: Why is the route from the mxA router the active route
in the R3-1 router's routing table?
Step 4.21
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, issue the run show route 172 .16. 2. 0/24
detail command to display detail informat ion about the AS 65002 summary route.
[edit protocols bgp group Pl- P2]
lab@mxA# run show route 172.16.2 . 0/24 detail
Answer: The route from the P2 router is the active route. The
route from the P1 router has an inactive reason of Local
Preference. The import policy has set the local preference
based on the community value and the local preference on the
P2 route is higher than the local preference of the P1 route.
Step 4 .22
Log out of your assigned devices using t he exit command .
l ab@mxA> exit
mxA (t t yuO)
l ogin :
Virtual Desktop
Console and
mxB VNC Connections
6D
\JD....________;
mxc Hypervisor Physical
Virtual Switch Desktops
Management Addressing
mxD
Student mxA: 172.25.11.1
Virtual mxB: 172.25.11.2
mxE
Environment mxC: 172.25.11.3
mxD: 172.25.11.4
mxE: 172.25.11.5
..•••· · · · · · · •••
mxA
·~~~~~-I~ · · · · · · ·:· •••·: 172 .2 2. 12 10,2.
..•
i/21 ---
••••••••••••••••••••••••••••••••••
--
AS :~
12
•
..
l _.;.;
...-..:11- 17~2;.;.;; r+
-2;.;;;2.;..;-1.;;;.22;; , ;,·.; .;./0.;;;.24.;......_....... ·· ~
i· ..
+. .
; ;.
;;.;;;;;;
mxC
· · ;;;;;;
· ~;;;;;;
- ~;;;;;;
- ~~;;;;;;
· ~;;;;;;
· ;;;;;;;;
· ;;;;;;
. . ;;;;;
· • ;
· :• -·_ · ._ . . . . • • • •
100_2 = 172 _16_1 _1 ~ge-0/0/3 ge-0/0/1 •....... oO.O= 172.31.100.1 .....: ge-0/0/3 j lo0.2= 172.16.2.1
1 ~ ~ ·1 ; 1 .
•• : b ro 172.22.252 0/24
.._ 0101'\ • • ••••••••••••• •••••••••••••••••••• •••
............. ~.. ;...............•9e-o/0/7 7?<·<< 7 ~ ~ ge~ ~ .1
!:2 . <3.01<1, .2 ~ .0101'2. '\'2.Ar.ol?.. o!2 .....
0 ••••• ge \1?..'J.2 · ---o o
o $ 9e-010;7: P2 .2'; p
AS 65001 :: : 100.1 = 172.31 .1o1.1 : t AS 65002
.0 ... : O
-...
~
~
--."11-1X _.. ~
(0
ro
••••••••••••••••
mxB
.............. ·················································.:.:·.;..•·r-'·--•:.;.••·:.:._··················································· ··········••p• ................... .
(0
(1)
• . • 0
---
0 AS 65020 o0
---
•••
:.
o .....
R3-1
.2
.
I
•
~
____ ......
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
. ~
Overview
In this lab, you use the lab diagrams titled "Lab Network Diagram: Scaling BGP - Parts 1-2" and
"Lab Network Diagram: Scaling BGP - Part 3" to configure route reflectors and confederations.
Within a local autonomous system topology, the IBGP peers should be fully meshed to prevent
routing loops from forming. A fully meshed network inherently has scalability issues which
includes the explicit configuration of all IBGP peers with the addition of a new router. Two
methods can alleviate the full mesh scaling issue and still ensure a loop-free BGP topology.
Route reflection and confederations provide a loop detection mechanism within IBGP without
the need for a full mesh of peering sessions and also allow IBGP routes to be readvertised to
other IBGP peers.
By completing this lab, you perform the following tasks:
In this lab part, you verify the initial configuration of the routers. You then verify that the
interfaces are operational, OSPF neighbor relationships have formed, and BGP neighbor
relationships have formed.
Note
The instructor will tell you the nature of your access and will provide
you with the necessary details to access your assigned device.
Note
The lab topology requires you to display information in the different
logical systems of mxA, mxB, mxC, mxD, and mxE. You will be
changing the perspective of the CLI by issuing the set cli
logical-system ls-name command. Refer to the lab diagram
for the correct logical system name.
By changing the perspective of the CLI, you will be able to perform
network commands such as ping or traceroute from the
perspective of the pertinent logical system.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student devices.
Step 1.2
Access the CLI on your mxB device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab12-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~]$ ssh [email protected]
Password: lab123
Last login: Fri Dec 6 1 2 : 59 : 36 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR-11 . 0 - 20190701 . 269d466 buil
lab@mxB> configure
Entering configuration mode
[edit]
lab@mxB# load override ajspr/lab12-start . config
load complete
[edit]
lab@mxB# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxB>
Step 1.3
Issue t he show configuration command . Use t he lab diagram t o verify that the mxB router
has the correct logica l system and interface conf iguration. Verify that RI P has been enabled.
lab@mxB> show configuratio n
## Last commit : 2019 - 12 - 27 21 : 44:54 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxB;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNd lhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
.3tQObCdrevo0v635R7ReHTL 0c ."; ## SECRET -DATA
}
login {
user lab {
uid 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
logical-systems {
P3 {
interfaces {
ge-0/0/6 {
unit O {
family inet {
address 172.22 . 125 . 2/24 ;
}
}
}
ge-0/0/7 {
unit O {
fami l y inet {
address 172 . 22 . 126 . 2/24;
}
}
}
loO {
unit O {
fami l y inet {
address 172 . 31 . 102 . 1/32;
address 20 . 20 . 1 .1 /32;
address 40 .4 0 . 1 .1 /32;
}
}
}
}
protocols {
bgp {
group as65001 {
type external ;
multihop;
loca l - address 172 . 31.102 . 1;
export ajspr- bgp- export-p3;
neighbor 172 . 16 . 1 . 4 {
peer- as 65001;
}
}
group as65002 {
type external ;
multihop ;
local - address 172 . 31.102 . 1 ;
export ajspr- bgp- export - p3;
neighbor 172 . 16 . 2 . 4 {
peer- as 65002;
}
}
}
}
policy- options {
policy- statement ajspr - bgp- export - p3 {
term 1 {
from {
protocol static;
route -fi l ter 40.40 . 0 . 0/22 orlonger;
}
then accept;
}
term 2 {
from {
protocol bgp ;
route - f i l ter 30.30 . 0 . 0/22 l onger;
}
then reject;
}
}
}
ro uti n g - optio n s {
s tat ic {
ro ute 20 . 20 . 0 . 0/24 reje c t;
ro ute 20 . 20 .1. 0/24 reje c t;
ro ute 20 . 20 . 2 . 0/24 reje c t;
ro ute 20 . 20 . 3 . 0/24 reje c t;
ro ute 20 . 20 . 4 . 0/25 reje c t;
ro ute 20 . 20 . 4 . 1 28/25 r e j e ct ;
ro ute 20 . 20 . 5 . 0/26 reje c t;
ro ute 20 . 20 . 5 . 64 /26 reje c t;
ro ute 20 . 20 . 5 . 1 28/26 r e j e ct ;
ro ute 20 . 20 . 5 . 1 92/26 r e j e ct ;
ro ute 4 0 . 40 . 0 . 0/24 reje c t;
ro ute 4 0 . 40 .1. 0/24 reje c t;
ro ute 4 0 . 40 . 2 . 0/24 reje c t;
ro ute 4 0 . 40 . 3 . 0/24 reje c t;
ro ute 1 72 . 1 6 . 1 . 2/32 next- hop 1 72 . 22 . 1 25 . 1;
ro ute 1 72 . 1 6 . 2 . 2/32 next- hop 1 72 . 22 . 1 26 . 1;
ro ute 1 72 . 1 6 . 1 .4 /32 next- hop 1 72 . 22 . 1 25 . 1;
ro ute 1 72 . 1 6 . 2 .4 /32 next- hop 1 72 . 22 . 1 26 . 1;
ro ute 1 0 . 0 . 20 . 0/22 nex t -hop 1 72 . 22 . 125 . 1 ;
ro ute 1 0 . 0 . 24 . 0/22 nex t -hop 1 72 . 22 . 126 . 1 ;
}
a utono mo us-sys tem 65020 ;
a g g regate {
ro ute 20 . 20 . 0 . 0/21 ;
}
}
}
}
inte r faces {
fxp O {
unit O {
fami l y inet {
address 172 . 25 .11. 2/24 ;
}
}
}
}
Step 1.4
Access the CLI on you r mxE device using Secure Shell (SSH) or as directed by you r instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab12-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login: Fri Dec 6 1 2 : 59 : 36 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kerne l 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxE> configure
Entering configuration mode
[edit]
lab@mxE# load override ajspr/lab12-start . config
load complete
[edit]
lab@mxE# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxE>
Step 1.5
Issue t he show configuration command. Use the lab diagram to verify that the mxE router
has the correct logica l system and interface configuration . Verify t hat IS-IS has been enabled (al l
interfaces at level 2 ).
lab@mxE> show c o nfiguration
## Last commit : 2019 - 12 - 27 19 : 04 : 24 UTC by lab
version 20190829 . 221548 b u ilder . r1052644;
system {
host- name mxE ;
root- authentication {
encrypted- password
" $6$GBq0FqVe$MXFb2Y . AmNdlhwla9MApGk . mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHTLOc ." ; ## SECRET - DATA
}
l ogin {
user lab {
uid 2000 ;
class super- user;
aut hentication {
encrypted- password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET- DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
sys log {
user* {
any emergency ;
}
file messages {
any notice;
aut ho rization info;
}
file interactive - commands {
interactive - commands any;
}
}
}
logical - systems {
Pl {
interfaces {
ge - 0/0/4 {
unit O {
family inet {
address 172 . 22 . 122 . 2/24 ;
}
family iso;
}
}
ge - 0 / 0/5 {
uni t O {
f a mi l y ine t {
addr ess 172 . 22 . 121 . 2/24;
}
f a mi l y i so;
}
}
loO {
uni t O {
f a mi l y ine t {
addr ess 172 . 31 . 1 00 . 1 /32;
}
f a mi l y i so {
addr ess 49 .1 234 .1 720 . 31 1 0 . 0001 . 00;
}
}
}
}
p r otocols {
bgp {
g r o up as65001 {
type ext ernal ;
e xport a j spr-bgp- export ;
n e i g h bo r 172 . 22 . 121 .1 {
pee r-as 65001 ;
}
}
g r o up as65002 {
type ext ernal ;
export a j spr-bgp- export ;
n e i g hbo r 172 . 22 . 122 .1 {
pee r- as 65002 ;
}
}
}
}
po l icy- optio n s {
po l icy- stat ement ajspr - bgp- expo rt {
te r m 1 {
fr om {
pro t ocol s t atic ;
ro ute -fi l te r 30 . 30 . 0 . 0/22 o r lon ger ;
}
then accept;
}
term 2 {
f rom {
pro t ocol bgp ;
ro ute -fi l te r 40 . 40 . 0 . 0/22 l onger ;
}
then rejec t;
}
}
}
ro uti n g - optio n s {
s t a t ic {
ro ute 30 . 30 . 0 . 0/24 reje c t;
ro ute 30 . 30 .1 . 0/24 reje c t;
ro ute 30 . 30 . 2 . 0/24 reje c t;
ro ute 30 . 30 . 3 . 0/24 reje c t;
}
a ut on o mo u s - sys tem 65 4 12 ;
}
}
R5 - 1 {
i nte r fa c e s {
g e- 0/0/0 {
unit O {
f a mi l y i net {
address 1 72 . 22 . 1 25 . 1 /24 ;
}
}
}
g e- 0/0/6 {
unit O {
f a mi l y i net {
address 1 0 . 0 . 12 . 2/2 4;
}
f a mi l y i so ;
}
}
g e- 0/0/7 {
unit O {
f a mi l y i net {
address 1 0 . 0 . 13 . 2/2 4;
}
f a mi l y i so ;
}
}
loO {
unit 1 {
f a mi l y i net {
address 1 72 .1 6 .1. 4/32 ;
}
f a mi l y i so {
addres s 4 9 . 0001 .1 720 .1 600 . 100 4 . 00 ;
}
}
}
}
p r o t oco l s {
osp f {
area 0 . 0 . 0 . 0 {
i nte r fa c e g e- 0/0/6 . 0 ;
i nte r fa c e g e- 0/0/7 . 0 ;
i nte r fa c e l o0 . 1 ;
}
}
bgp {
group P3 {
type external;
multihop;
local -address 172 . 16.1 . 4;
export export-aggregate;
neighbor 172 . 31 . 102 .1 {
peer- as 65020;
}
}
}
}
po l icy- options {
policy- statement export-aggregate {
term 1 {
from {
protocol aggregate;
route -fi lter 172.16 .1. 0/24 exact;
}
then accept;
}
term 2 {
from {
route -fi lter 172.16 .1. 0/24 longer;
}
then reject;
}
}
}
routing- options {
static {
route 172 . 31 . 102 . 1/32 next-hop 172 . 22 . 125 . 2;
}
autonomous - system 65001;
aggregate {
route 172 . 16 . 1 . 0/24;
}
}
}
R5-2 {
interfaces {
ge-0/0/1 {
unit O {
fami l y inet {
address 172 . 22 . 126 . 1/24;
}
}
}
ge-0/0/2 {
unit O {
fami l y inet {
address 10 . 0 . 16 . 2/24;
}
fami l y iso;
}
}
ge - 0/0/3 {
unit O {
f ami ly inet {
address 10 . 0 . 17 . 2/2 4;
}
f ami ly i so;
}
}
loO {
unit 2 {
f ami ly i ne t {
address 1 72 .1 6 . 2 . 4/32;
}
f ami ly iso {
address 4 9 . 0002 .1 720 .1 600 . 200 4 . 00;
}
}
}
}
pro t ocols {
ospf {
area 0 . 0 . 0 . 0 {
i nte r face lo0 . 2;
i nte r fa ce ge - 0/0/2 . 0;
i nte r fa ce ge - 0/0/3 . 0;
}
}
bgp {
group P3 {
type external;
mult ihop ;
local -address 172 . 16 . 2 . 4;
export export-aggregate;
neighbor 172 . 31 .1 02 .1 {
pee r-as 65020 ;
}
}
gro up i bgp {
type inte rnal ;
local -address 172 . 16 . 2 . 4;
export next-hop-self;
neighbor 172 . 16 . 2 . 1;
neighbor 172 . 16 . 2 . 2;
neighbor 172 . 16 . 2 . 3;
}
}
}
pol icy- opt i ons {
policy-s ta temen t export-aggregate {
term 1 {
from {
protocol aggregate;
ro ute-fi lter 172 .1 6 . 2 . 0/2 4 exact;
}
then accep t;
Answer: The routers inside AS 65002 (includ ing the R5-2 router)
are configured for a full lBGP mesh. A fu ll lBGP mesh allows all
routers in the AS to receive all BG P routes but also prevents
routing loops because a router wi ll never readvertise an
IBGP-learned route to an IBGP neighbor.
Step 1.6
Use the ping 172 . 22 . 125 . 2 count 5 logi cal-system R5 - 1 command to verify that
you can ping the physical interface on the P3 router.
lab@mxE> ping 1 72.22.125.2 count 5 l o g ical- system RS-1
PING 172.22.125 . 2 (172 . 22 . 125.2): 56 data bytes
•
64 bytes from 172.22 . 125.2: icmp -
seq=O ttl=64 time=l . 664 ms
•
64 bytes from 172.22 . 125.2: icmp - seq=l ttl=64 time=l.387 ms
•
64 bytes from 172.22 . 125.2: icmp -
seq=2 ttl=64 time=l . 299 ms
•
64 bytes from 172.22 . 125.2: icmp - seq=3 ttl=64 time=l . 486 ms
•
64 bytes from 172.22 . 125.2: icmp seq=4 ttl=64 time=118 . 364 ms
Step 1.7
Issue the show bgp summary logical-system R5-2 command to view the state of the
R5-2 router's EBGP session.
lab@mxE> show bgp summary logical-system R5-2
Groups : 2 Peers: 4 Down peers : 3
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.O
5 5 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Received/Accepted/Damped ...
172 . 16 . 2 . 1 65002 0 0 0 0 6 :1 6 Active
172 . 16 . 2 . 2 65002 0 0 0 0 6 :1 6 Active
172 . 16 . 2 . 3 65002 0 0 0 0 6 :1 6 Active
172 . 31 . 102 . 1 65020 8 6 0 0 1 : 33 Establ
inet.O : 5/5/5/0
Step 1.8
Access the CLI on you r mxC device using Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab12-start. configcommand. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~]$ ssh iab@172 . 25.11.3
Password : lab123
Last login: Fri Dec 6 12 : 59:36 2019 from 172.25 .1 1 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxC> configure
Entering configuration mode
[edit ]
lab@mxC# load override ajspr/iab12-start .config
load complete
[edit]
lab@mxC# coitaui t and-quit
commit complete
Exiting configuration mode
lab@mxC>
Step 1.9
Issue the show configuration command. Use the lab diagram to verify t hat the mxC router
has two logical systems, R3-2 and R4-2, that have the correct interface and IS-IS conf igu ration.
lab@mxC> show configuration
## Las t commit: 2019 -1 2 - 06 15:06 : 19 UTC by lab
version 20 1 90829 . 221548 b uilder . r1052644;
system {
host-name mxC;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y.ArnNdlhwla9MApGk.mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3 tQ ObCdrevo0v635R7ReHT LOc ."; ## SECRET-DATA
}
login {
use r lab {
uid 2000 ;
class super-user;
a uthent icati on {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/ iovqk i JywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1"; ## SECRET- DATA
}
}
}
services {
ssh ;
netconf {
ssh;
}
}
syslog {
use r * {
any emergency;
}
file messages {
any notice;
authoriza tion info;
}
file interact ive-commands {
inte ractive -commands any ;
}
}
}
logical-systems {
R3-2 {
inte r faces {
ge-0/0/1 {
uni t O {
family inet {
address 10 . 0 . 16 .1 /24;
}
family iso;
}
}
ge-0/0/3 {
unit O {
family inet {
address 10 . 0 . 14 . 2/24;
}
family iso;
}
}
loO {
unit 1 {
family inet {
address 172.16 . 2 . 2/32;
}
family iso {
address 49 . 0002 .1 720 .1 600 . 2002 . 00;
}
}
}
}
protocols {
ospf {
area 0 . 0 . 0 . 0 {
interface ge - 0/0/3 . 0;
interface ge-0/0/1 . 0;
interface lo0 . 1;
}
}
bgp {
group ibgp {
type internal;
local -address 172 . 16 . 2 . 2;
neighbor 172 . 16 . 2 . 1;
neighbor 172 . 16 . 2 . 3;
neighbor 172 . 16 . 2 . 4;
}
}
}
routing - options {
autonomous -system 65002;
}
}
R4-2 {
interfaces {
ge-0/0/2 {
unit O {
family inet {
address 10 . 0 . 17 .1 /24;
}
family iso;
Step 1.10
Issue the show ospf neighbor logical-system R3-2 command to ensure the R3-2 router
has established an OSPF neighbor relationship with R5-2.
l ab@mxC> show ospf neighbor logical-system R3-2
Address Int er f ace St a t e ID Pr i Dead
10 . 0 . 1 6 . 2 ge - 0/0/1 . 0 Full 172 . 16 . 2 . 4 128 34
Step 1.11
Issue the show ospf neighbor logical-system R4-2 command to ensure the R4-2 router
has established an OSPF neighbor relationship with R5-2.
l ab@mxC> show ospf neighbor logical-system R4-2
Address Int er f ace St a t e ID Pr i Dead
10 . 0 . 17 . 2 ge - 0/0/2 . 0 Full 172 . 16 . 2 . 4 128 35
Step 1.12
Issue the show bgp summary logical-system R4-2 command to view the state of the
R4-2 router's IBGP sessions.
Step 1.13
Access t he CLI on your mxD device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab12-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login : Fri Dec 6 1 2 : 59 : 36 20 19 f rom 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 b u il
lab@mxD> configure
Entering configuration mode
[edi t]
lab@mxD# load override ajspr/lab12-start.config
load complete
[edi t ]
lab@mx D# co11aui t and-quit
commit complete
Exit i ng con f igurat i o n mode
lab@mxD>
Step 1.14
Issue the show configuration command. Use the lab diagram to verify that the mxD router
has two logical systems, R2-1 and R2-2, that have the correct interface and IS-IS configuration.
g r o up Pl {
type ext ernal ;
export export- aggregate;
n e i ghbo r 172 . 22 . 122 . 2 {
peer- as 65 41 2 ;
}
}
g r o up i bgp {
type int ernal ;
loca l - address 1 72 . 16 . 2 . 1 ;
export nex t- hop- sel f ;
ne i ghbo r 172 . 16 . 2 . 2;
n e i ghbo r 172 . 16 . 2 . 3;
n e i ghbo r 172 . 16 . 2 . 4;
}
}
}
po l icy- option s {
policy- stat ement expor t-aggrega t e {
term 1 {
f rom {
pro t ocol aggregat e ;
rout e -fi l te r 172 . 16 . 2 . 0/24 exact;
}
then accep t ;
}
te r m 2 {
f rom {
rout e -fi l te r 172 . 16 . 2 . 0/24 lon ge r;
}
then rejec t;
}
}
policy- stat ement n ext- hop- sel f {
fr om ne i ghbor 1 72 . 22 . 122 . 2 ;
then {
n ext-hop sel f;
}
}
}
routing- opt ions {
a uto n omou s - sys t em 65002;
aggregate {
ro u te 1 72 . 16 . 2 . 0/2 4 ;
}
}
}
}
interf aces {
fxpO {
u nit O {
f ami l y i n e t {
address 172 . 25 .1 1 . 4 /24 ;
}
}
}
}
Step 1.15
Issue the show ospf neighbor logical-system R2-2 command to ensure the R2-2 router
has established an OSPF neighbor relationship with the R3-2 and R4-2 routers.
l ab@mxD > show ospf neighbor logical-system R2-2
Address Int er fa c e St a te ID Pr i Dead
1 0 . 0 . 14 . 2 g e - 0/0/4 . 0 Ful l 172 . 16 . 2 . 2 128 34
10 . 0 . 15 . 2 g e - 0/0/5 . 0 Ful l 172 . 16 . 2 . 3 128 35
Step 1.16
Issue the show bgp summary logical-system R2-2 command to view the state of the
R4-2 router's IBGP sessions.
lab@mxD> show bgp summary logical-system R2-2
Threading mode : BGP I/0
Groups : 2 Peers : 4 Down peers : 0
Tab l e Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
10 9 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Received/Accepted/Damped ...
172 . 16 . 2 . 2 65002 8 9 0 0 2 : 57 Establ
inet . O: 0/0/0/0
172 . 16 . 2 . 3 65002 8 10 0 0 2 : 59 Es t abl
inet . O: 0/0/0/0
172 . 16 . 2 . 4 65002 11 10 0 0 2 : 57 Es t abl
inet . O: 4/5/5/0
172 . 22 . 122 . 2 65412 13 12 0 0 3 : 44 Es t abl
inet . O: 5/5/5/0
Step 1.17
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab12-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login : Fri Dec 6 1 2 : 59 : 36 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kerne l 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxA> configure
Entering configuration mode
[edit]
lab@mxA# load override ajspr/lab12-start . config
load complete
[edit]
lab@mxA# coiraui t and-quit
commit complete
Exiting configuration mode
lab@mxA>
Step 1.18
Issue the show configuration command. Use the lab diagram to verify that the mxA router
has two logical systems, R3-1 and R4-1, that have the correct interface and IS-IS configuration.
lab@mxA> show configuration
## Last commit: 20 1 9 - 12 - 06 15 : 09 : 10 UTC by lab
version 20 190829 . 221548 b ui lder .r1052644;
system {
host-name mxA;
root-authenticat ion {
encrypted-password
" $6$GBq0FqVe$MXFb2Y.AmNdlhwla9MApGk.mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3 tQ ObCdrevo0v635R7ReHTL Oc ."; ## SECRET-DATA
}
l ogin {
user lab {
ui d 2000 ;
class super-user;
aut hent ica tion {
encrypted-password "$ 6$JEnFYMln $C6pjHzEv3cK/ iovqk iJywOgyrmgNnX /
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
au t hor iz ation info;
}
file interactive -commands {
interac t ive -commands any;
}
}
}
logical-systems {
R3-1 {
interfaces {
ge - 0/0/2 {
uni t O {
fami l y inet {
addre ss 10 . 0 . 12 .1 /2 4;
}
fami l y i so;
}
}
ge - 0/0/3 {
uni t O {
fami l y inet {
address 10 . 0 . 10 . 2/2 4;
}
fami l y iso;
}
}
l oO {
uni t 1 {
fami l y inet {
address 172 . 16 . 1. 2/32 ;
}
fami l y iso {
address 49 . 0001 .1 720 . 1600 . 1002 . 00;
}
}
}
}
p ro tocols {
osp f {
a rea 0 . 0 . 0 . 0 {
inte r fa ce lo 0 . 1;
inte r fa ce ge - 0/0/3 . 0 ;
inte r fa ce ge - 0/0/2 . 0 ;
}
}
}
routing- opt ions {
a ut onomo us- sys tem 6500 1;
}
}
R4 - 1 {
inte r faces {
ge - 0/0/1 {
uni t O {
fami l y inet {
address 10 . 0 . 13 .1 /2 4;
}
fami l y iso;
}
}
ge - 0/0/4 {
uni t O {
fami l y inet {
address 10 . 0 . 11 . 2/24;
}
Step 1.19
Issue the show ospf neighbor logical-system R3-1 command to ensure the R3-1 router
has established an OSPF neighbor relationship with R2-1 and R5-1.
lab@mxA> show ospf neighbor logical-system R3-1
Address Interface State ID Pri Dead
10 . 0 . 12 . 2 ge - 0/0/2 . 0 Full 172 . 16 . 1 . 4 128 36
10 . 0 . 10 . 1 ge - 0/0/3 . 0 Full 172 . 16 . 1 . 1 128 34
Step 1.20
Issue the show ospf neighbor logical-system R4-1 command to ensure t he R4-1 router
has established an OSPF neighbor relationship with R2-1 and R5-1.
lab@mxA> show ospf neighbor logical-system R4-1
Address Interface State ID Pri Dead
10 . 0 . 13 . 2 ge - 0/0/1 . 0 Full 172 . 16 . 1 . 4 128 38
10 . 0 . 11 . 1 ge - 0/0/4 . 0 Full 172 . 16 . 1 . 1 128 37
Step 1.21
Issue the show bgp summary logical-system R3-1 command and the the show bgp
summary logical-system R4-1 command to view the state of the R3-1 and R4-1 routers'
IBGP sessions.
lab@mxA> show bgp summary logical-system R3-1
BGP is not running
lab@mxA>
Question: What is the state of the R3-1 and R4-1 routers' IBGP
neighbor relationships? Why?
In this lab part, you configure BGP route reflectors. A route reflector utilizes two new BGP
attributes. These attributes are never advertised outside the local autonomous system and are
used internally for IBGP loop detection. The cluster-list is the first new BGP attribute and
operates like the AS path attribute. It contains a list of 32-bit cluster IDs for each cluster a
particular route has transited. If a route reflector detects its cluster ID in the cluster-list, it is
considered a loop and the BGP update is dropped. The second attribute is the originator ID,
which defines the router that first advertised the route to the route reflector. The route reflector
uses the originator ID as a second check against routing loops.
Step 2.1
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, change the perspective of the CLI to that of the R2-1
logical system by issuing the set cli logical-system R2-1 command.
lab@mxD> set cli logical-system R2-1
Logical system : R2 -l
lab@mxD : R2 - l>
Step 2.2
Enter configuration mode and navigate to the [edit protocols bgp group
rr- cl uster] hierarchy. Configure the R2-1 router as a route reflector for the internal BGP
network, and configure the R3-1, R4-2, and R5-1 loopback addresses as neighbors. Use the
R2-1 loopback address as the cluster ID and the local-address within the route reflector group.
Commit the configuration when finished.
lab@mxD : R2 - l> configure
Entering con fig ura tion mode
[edit ]
lab@mxD :R2 - l# edit protocols bgp group rr-cluster
Step 2.3
Return to the SSH session that you have open to the mxA router.
From the SSH session wit h t he mxA router, change the perspect ive of the CLI to that of the R3-1
logical system by issuing the set cli logical-system R3-1 command.
lab@mxA> set cli logical-system R3-1
Logical system : R3 - 1
lab@mxA : R3 - 1>
Step 2.4
Enter configuration mode and navigate to the [edit protocols bgp group ibgp]
hierarchy and configure the R2-1 rout er's loopback address as an IBGP neighbor. Use the R3-1
router's loopback address as t he local - address for the int ernal BGP network. Commit the
configurat ion and exit to operational mode when finished.
lab@mxA : R3 - 1> configure
Entering configuration mode
[edit]
lab@mxA : R3 - 1# edit protocols bgp group ibgp
Step 2.5
Change t he perspective of the CLI to that of the R4-1 logical system by issuing the set cli
logical-system R4-1 command.
lab@mxA : R3 - 1> set cli logical-system R4-1
Logical system : R4 - 1
lab@mxA : R4 - 1>
Step 2.6
Enter configuration mode and navigate to the [edit protocols bgp group ibgp]
hiera rc hy and configure the R2-1 router's loopback address as an IBGP neighbor. Use the R4-1
loopback address as the local - address for the internal BGP group. Commit the
configuration and exit to operational mode when finished.
lab@mxA : R4 - 1> configure
Entering configuration mode
[edit]
lab@mxA : R4 -1 # edit protocols bgp group ibgp
Step 2.7
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, change the perspective of the CLI to that of the R5-1
logical system by issuing t he set cli logical-system R5-1 command.
lab@mxE> set cli logical-system R5-l
Logical system : R5-1
Step 2.8
Enter configuration mode and navigate to the [edi t protocols bgp group ibgp]
hierarchy and configure the R2-1 router's loopback address as an IBGP neighbor. Use the R5-1
loopback address as the local - address for the internal BGP group. Commit the
configuration when completed.
lab@mxE : R5 - 1> configure
Entering configuration mode
[edit]
lab@mxE : R5 - 1# edit protocols bgp group ibgp
Step 2.9
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, issue the command run show bgp summary to
ensure that all of the IBGP peer sessions are established.
[edit protocols bgp group rr - cluster ]
lab@mxD : R2 - 1# run show bgp summary
Threading mode : BGP I/0
Groups : 2 Peers : 4 Down peers : 0
Tabl e Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
10 5 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Received/Accepted/Damped ...
172 . 16 . 1 . 2 65001 2 4 0 0 24 Establ
inet . O: 0/0/0/0
172 . 16 . 1 . 3 65001 2 4 0 0 20 Establ
inet . O: 0/0/0/0
172 . 16 . 1 . 4 65001 4 4 0 0 16 Establ
inet . O: 0/5/5/0
172 . 22 . 121.2 65412 28 27 0 0 11:02 Establ
inet . O: 5/5/5/0
Step 2.10
Use t he run show route hidden command to check for any unusable routes in t he default
routing table.
[edit protoco l s bgp group rr - cluster ]
l ab@mxD : R2 - 1# run show route hidden
Step 2.11
Use the run show route 40. 40/24 hidden detail command to display detailed route
information and a possible cause for the route to be marked unusable.
[edit protoco l s bgp group rr-cluster]
l ab@mxD : R2-1# run show route 40.40/24 hidden detail
Step 2.12
Use the run show route 40. 40/24 hidden extensive to display the extensive
information and a possible cause for the route to be marked unusable.
[edi t pro t ocols bgp g r oup r r- c luste r ]
lab@ rnxD : R2 - 1# run show route 40.40/24 hidden extensive
Step 2.13
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, navigate to the [edit policy- options
policy- statement next - hop - self] hierarchy and create a policy t hat modifies the
next-hop attribute to the local loopback address.
[edit protocols bgp group ibgp]
lab@mxE : RS -1 # top edit policy-options policy-statement next-hop-self
Step 2.14
Navigate to the [edit protocols bgp group ibgp] hierarchy and apply t he
next - hop - self policy as an export policy in the group. Commit the configuration when
finished.
[edit policy- options policy- statement next-hop-self ]
lab@mxE :RS- 1# top edit protocols bgp group ibgp
Step 2.15
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, issue the show route hidden command to
determine if there are any hidden routes.
Step 2.16
Issue the run traceroute 40. 40 .1. 1 source 1 72 .16 .1 .1 command to make sure that
the P3 router is reachable with no routing loops from the R2-1 router.
[edi t pro tocols bgp group rr - cluster ]
lab@mxD : R2 - 1# run traceroute 40.40.1.1 source 172.16.1.1
traceroute to 4 0 .4 0 . 1 . 1 (40 . 40 .1. 1) f rom 172 . 16 . 1 . 1 , 30 hops max, 52 byte packets
1 10 . 0 . 10 . 2 (10 . 0 . 10 . 2) 1 . 715 ms 1 . 6 4 2 ms 1 . 375 ms
2 10 . 0 . 12 . 2 ( 10 . 0 . 12 . 2) 1 . 9 7 8 ms 1 . 8 2 4 ms 1 . 8 31 ms
3 4 0 . 40 .1. 1 (40 .4 0 . 1 . 1) 3 . 287 ms 2 . 655 ms 2 . 847 ms
Step 2.17
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, issue the show route hidden command to see if
there are any hidden routes learned by the R5-1 router.
[edi t pro tocols bgp group ibgp]
lab@mxE : R5 - 1# run show route hidden
Question: Are the any hidden routes learned by the R5-1 router?
Answer: Yes, there are five hidden routes being learned by the
R5-1 router.
Step 2.18
Return to the SSH session that you have open to the mxD router.
From t he SSH session with the mxD router, navigate to the [edit po l icy - options
policy- sta t ement next - hop - self] hiera rchy and create a policy that modifies the
next-hop attribute to the loca l loopback address.
[edit pro t ocols bgp group rr - clu ster]
lab@mxD : R2 - 1# top edit policy-options policy-statement next-hop-self
[edit pol i cy- opt ions policy- stat ement n ext- hop- sel f ]
lab@mxD :R2 -1 # set term 1 then next-hop self
[edit pol i cy- opt ions policy- stat ement n ext- hop- sel f ]
lab@mxD :R2 -1 #
Step 2.19
Navigate to the [ edit protocols bgp group rr - cl uster] hierarchy and apply the
next - hop - self policy as an export policy in the group. Commit the configuration when
completed.
[edi t policy- options policy- statement next- hop- self]
lab@mxD : R2 - 1# top edit protocols bgp group rr-cluster
Question: Are the any hidden routes learned by the R5-1 router?
Step 2.21
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, use the run show route 40. 40/22 command
to display the P3 routes in the default routing table.
[edit protocols bgp group rr- cluster ]
lab@mxD : R2 - 1# run show route 40.40/22
Answer: Yes, the P3 routes are now active in the default routing
table.
Step 2.22
Use the r un t r acero u te 4 0. 40 . 1 . 1 s o u r ce 1 72 . 1 6 . 1 .1 t tl 10 command to verify
connectivity to the 40.40.1.1 address on the P3 router. Be sure to source the traceroute from
the R2-1 router's loopback address.
[edit protocols bgp group rr-clus ter ]
lab@mxD : R2-1# run trac eroute 4 0. 40 . 1 . 1 s o urce 1 72 . 16 . 1 . 1 ttl 10
tracero u te t o 4 0 . 40 . 1 . 1 (40 . 40 .1. 1) f rom 1 72 .1 6 . 1. 1 , 1 0 hops max, 52 byte packets
1 10 . 0 . 1 0 . 2 (10 . 0 . 10 . 2) 1. 43 4 ms 1 . 3 4 8 ms 1 .1 35 ms
2 10 . 0 . 1 0 . 1 (10 . 0 . 10 .1 ) 1. 157 ms 1 . 228 ms 1 .1 51 ms
3 10 . 0 . 1 0 . 2 (10 . 0 . 10 . 2) 1. 639 ms 1 . 826 ms 2 . 050 ms
4 10 . 0 . 1 0 . 1 (10 . 0 . 10 .1 ) 1. 8 4 5 ms 1 . 739 ms 1 . 776 ms
5 10 . 0 . 1 0 . 2 (10 . 0 . 10 . 2) 2 . 258 ms 2 . 41 2 ms 2 . 387 ms
6 10 . 0 . 1 0 . 1 (10 . 0 . 10 .1 ) 2 . 7 11 ms 2 . 583 ms 2 .4 32 ms
7 10 . 0 . 1 0 . 2 (10 . 0 . 10 . 2) 2 . 950 ms 2 . 8 4 2 ms 2 . 792 ms
8 10 . 0 . 1 0 . 1 (10 . 0 . 10 .1 ) 2 . 720 ms 3 .11 0 ms 3 . 093 ms
9 10 . 0 . 1 0 . 2 (10 . 0 . 10 . 2) 3 . 7 1 6 ms 3 . 3 1 3 ms 3 . 371 ms
1 0 10 . 0 . 1 0 . 1 (10 . 0 . 10 .1 ) 3 . 4 6 4 ms 3 . 764 ms 3 . 825 ms
Step 2.23
Navigate to the [ edit policy- options policy- statement next - hop - self]
hierarchy. Modify the policy to change only the next-hop attribute if the BGP routes are external
routes. Use the match condition route - type to accomplish this task. Commit the change
when completed.
[edit protocols bgp group rr - cluster ]
lab@mxD : R2 - 1# top edit policy-options policy-statement next-hop-self
Step 2.24
Use the run traceroute 40. 40 .1 .1 source 172 .16. 1.1 ttl 10 command to verify
connectivity to the 40.40.1.1 address on the P3 router. Be sure to source the tracerout e from
your default router's loopback address.
[edit policy- options policy- statement next- hop- self ]
lab@mxD : R2 - 1# run traceroute 40.40.1.1 source 172.16.1.1 ttl 10
traceroute to 40 . 40 . 1 . 1 (40 . 40 . 1 . 1) from 172 . 16 . 1 . 1, 10 hops max, 52 byte packets
1 10 . 0 . 10 . 2 ( 10 . 0 . 10 . 2) 1 . 6 0 9 ms 1 . 0 0 7 ms 1 . 0 4 8 ms
2 10 . 0 . 12 . 2 (10 . 0 . 12 . 2) 1 . 685 ms 1 . 690 ms 1 . 561 ms
3 40 . 40 . 1 . 1 (40 . 40 . 1 . 1) 2 . 890 ms 2 . 685 ms 2 . 610 ms
Step 2.25
Return to the SSH session that you have open to the mxA router.
From the SSH session with t he mxA router, use the show route 40. 40/24 detail
command to display the P3 route in the R4-1 router's routing table.
lab@mxA : R4 -l > show route 40.40/24 detail
Step 2.26
Use the show route 3 0. 3 0/24 detail command to display the P1 route in the R4-1 router's
routing table.
lab@rnxA : R4 - 1> sho w rout e 3 0. 30 / 24 detail
In this lab part, you configure a scalable IBGP network using confederations. BGP confederations
allows you to break the network up into smaller pieces called a sub-AS or a member-AS network.
Each sub-AS is assigned a unique AS number and operates as an independent internal network
that must follow the IBGP rules, requiring a full mesh or route reflection topology. Connectivity
between the sub-AS networks uses a modified form of EBGP named confederation BGP (CBGP).
CBGP peers prepend the sub-AS number to the AS path attribute as routing updates are
exchanged , which is used to prevent routing loops while the routes are advertised throughout the
IBGP network. Remember to switch to the "Network Diagram: Scaling BGP Lab, Part 3" diagram.
Step 3.1
Enter configuration mode and navigate to the [edit protocols bgp J hierarchy. Delete the
ibgp peer group. Commit the configuration and exit to operational mode when finished.
[edit ]
lab@mxA : R4 - 1# edit protocols bgp
lab@mxA : R4 - 1>
Step 3.2
Change the perspective of the CLI to that of the R3-1 logical system by issuing the set cli
logical-system R3-1 command.
lab@mxA : R4 - 1> set cli logical-system R3-1
Logical system : R3 - 1
lab@mxA : R3 - 1>
Step 3.3
Enter configuration mode and navigate to t he [edit protocols bgp J hierarchy. Delete the
ibgp peer group. Commit the configuration and exit to operational mode when finished.
lab@mxA : R3 - 1> configure
Entering configuration mode
[edit ]
lab@mxA : R3 - 1# edit protocols bgp
lab@mxA : R3 - 1>
Step 3.4
Return to the SSH session that you have open t o the mxE rout er.
From the SSH session wit h the mxE router, navigate to the [edit protocols bgp J
hierarchy. Delete the ibgp peer group. Commit the configuration when finished.
[edit protocols bgp group ibgp]
lab@mxE : RS - 1# up
Step 3.6
Navigate to the [edit routing-options] hierarchy. Set the autonomous system number,
confederation global autonomous system number, and the two member AS numbers as
described in the following table. Refer to the lab diagram as necessary.
Autonomous Confederation
Router Members
System Number
R2-1, R3-1 65101 65001 65101, 65201
R4-1, R5-1 65201 65001 65101, 65201
[edit]
lab@mxA : R3 - 1# edit routing-options
lab@mxA : R3 - 1>
Step 3.10
Use the show bgp summary command to display the BGP peer sessions.
lab@mxA : R3 - 1> show bgp summary
Threadi n g mode : BGP I/0
Grou ps : 1 Peers : 1 Down peers : 0
Table To t Paths Act Paths Suppressed History Damp St ate Pending
inet . O
5 5 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
St atel#Ac t ive/Received/Accepted/Damped ...
172 . 16 . 1 . 1 6510 1 4 2 0 0 6 Es t abl
inet . O: 5/5/5/0
Answer: Yes, the IBGP peer session between the R2-1 router
and the R3-1 router is established. If the peer is not established,
check the configuration or contact your instructor.
Question : How many routes are being received f rom the R2-1
router by the R3-1 router?
Step 3.11
Change the perspective of the CLI to t hat of t he R4-1 logical system by issuing the set cli
logical-system R4-1 command.
lab@mxA : R3 - 1> set cli logical-syst em R4-1
Logical system : R4 - 1
lab@mxA : R4 - 1>
Step 3.12
Enter configuration mode and navigate to the [edit routing - options J hierarchy. Set the
autonomous system number, confederation global autonomous system number, and the two
member AS numbers as described in the table shown earlier. Refer to the lab diagram as
necessary.
lab@mxA : R4 - 1> configure
Entering configuration mode
[edit ]
lab@mxA : R4 - 1# edit routing-options
Step 3.13
Navigate to the [edit protocols bgp group ibgp] hierarchy and configure an internal
peer session to the R5-1 router using loopback addresses. Commit you r configuration when
finished.
[edit routing - options ]
lab@mxA : R4 -1 # top edit protocols bgp group ibgp
Step 3.16
Use the run show bgp summary command to verify that the peer session between the
R4-1 router and the R5-1 router is established.
[edit pro t oco l s bgp gro up i bgp]
l ab@mxE : R5 - 1# run show bgp summary
Threading mode : BGP I/0
Gro ups : 2 Pee r s : 2 Down peers : 0
Table Tot Paths Ac t Pa t hs Suppressed His t ory Damp Stat e Pending
i net . O
5 5 0 0 0 0
Peer AS I n Pkt Out Pkt Ou tQ Flaps Las t Up/Dwn
St a t e l #Acti ve/Received/Accept ed/Damped ...
1 72 . 16 . 1 . 3 6520 1 2 4 0 0 4 Establ
ine t. O: 0/0/0/0
1 72 . 3 1. 102 .1 65020 6 3 0 0 8 Establ
ine t. O: 5/5/5/0
Step 3.17
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, use the run show bgp summary command to
verify that the R5-1 router is advertising routes to the R4-1 peer.
[edit pro t oco l s bgp gro up i bgp]
l ab@mxA : R4-1 # run show bgp summary
Th r eading mode : BGP I/0
Gr o ups : 1 Pee r s : 1 Down peers : 0
Table Tot Paths Ac t Pa ths Suppressed His t ory Damp Stat e Pendin g
i net . O
5 5 0 0 0 0
Peer AS I n Pkt Out Pkt Ou tQ Flaps Las t Up/Dwn
St a t e l #Acti ve/Rece i ved/Accept ed/Damped ...
1 72 . 16 . 1 . 4 6520 1 6 2 0 0 3 1 Establ
ine t. O: 5/5/5/0
Answer: The R4-1 router is receiving five active routes from the
R5-1 peer.
Step 3.18
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, navigate to the [edit protocols bgp group
cbgp] hierarchy. Configure a confederation BGP session between the R2-1 router and the R5-1
router. Because the CBGP session uses loopback addresses to peer, both the local-address
and mul tihop commands are required to establish the session. Commit the configuration
when you are finished.
[edit protocols bgp group ibgp]
lab@ rnx D: R2 - 1# top edit protocols bgp group cbgp
Step 3.20
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, use the run show bgp summary command to
display the bgp peering sessions on the R2-1 router.
[edit protocols bgp group cbgp]
lab@mxD : R2 - 1# run show bgp summary
Threading mode : BGP I/0
Gro u ps : 3 Peers : 3 Down peers : 0
Table Tot Paths Ac t Paths Suppressed History Damp State Pending
inet . O
10 5 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Dwn
Statel#Active/Received/Accept ed/Damped ...
172 . 16 . 1 . 2 65101 15 17 0 0 5 : 43 Establ
inet . O: 0/0/0/0
172 . 16 . 1 . 4 65201 4 4 0 0 9 Establ
inet . O: 0/5/5/0
172 . 22 . 121 . 2 65412 23 18 0 0 6 : 55 Establ
ine t. O: 5/5/5/0
Question: How many routes are being received from the R5-1
router? How many routes are active from R5-1?
Answer: Five routes being are received from the R5-1 router,
however none of the routes are active.
Step 3.21
Use the r u n show route hidden command to display any hidden routes.
[edit protocols bgp group cbgp ]
lab@mxD : R2 - 1# run show route hidden
Answer: Yes, there are five received routes that are hidden.
Question: Why are the routes received from the R5-1 router
marked as unusable?
Step 3.22
Configure the next - hop - self policy as the group export policy. Commit the configuration and
return to operational mode.
[edit protocols bgp group cbgp]
lab@mxD : R2 - 1# set export next-hop-self
lab@mxD : R2 -1 >
Step 3.23
Return to the SSH session that you have open to the mxE router.
From the SSH session with the mxE router, configure the next - hop - self policy as the group
export policy. Commit the configuration and return to operational mode.
[edit protocols bgp group cbgp]
lab@mxE : RS -1 # set export next-hop-self
Step 3.24
Return to the SSH session that you have open to the mxD router.
From the SSH session with t he mxD router, use the show route hidden command to display
the routes t hat are hidden.
lab@mxD : R2 - 1> show route hidden
Step 3.25
Log out of your assigned devices using the exit comma nd.
lab@rnxD : R2-1> exit
rnxD ( t tyu O)
login:
Virtual Desktop
mxB
Console and
VNC Connections
[2. . . . .
6D
\J.D---------
i - - -•·&:-•
·.Q
mxC Hypervisor Physical
Virtual Switch Desktops
Management Addressing
mxD
Student mxA: 172.25.11.1
Virtual mxB: 172.25.11 .2
mxE
Environment mxC: 172.25.11 .3
mxD: 172.25.11 .4
mxE: 172.25.11 .5
•. ---------------
mxD
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
. •
•
•
•
•
..
• -----~---- ·.
........... mxE.............
••
•
•
•
... ---- mxD
--~
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
..
R2-1 .1 172.22.121 .0/24 : •
.2 P1 .2 :
t---++--,....11_2_
.2_2_
.1_2_2._o,_2_
4 _..1.,. R2-2
lo0.1 = 172.16.1.1 = =
••
••
ge-0/0/1 .1 1
ge -0/0/0
ge-0/0/2
••••••••••••••••••• •••••••••• ••••••••••••••••••••••••••• ••
:
•
: 'l[
co
Q
loO.O
(I) _ __ 172.31.100.1
_ _ _. , co
AS 65412
(I)
6 •
::
e .~ .
ge-0/0/3 lo0.2 172.16.2.1
ge-0/0/4 .1 .1 ge-0/0/5
.. , ..... .................... ........... ...................... . •
. 10.0.1 4.0/24 10.0.15.0/24
10.0.10.0/24 •••••••••••••••••••••••••••••••••• ••
•
. . . . ... ~-~:9{9!~ .. - ~.............. ,i. _ij~;9!9!~............ ...• •• •••••••
••
ge-0/0/3 .2 • ••••
e-0/0/4 ... '••
: R3-1 R4-1 : R3-2 R4-2 •
•
: lo0.1 = 172.1 6.1.2 lo0.2 = 172.16.1.3 :• mxA mxC ••
• lo0.1 = 172.16.2.2 lo0.2 = 172.16.2.3
•
•
•
••, •
■,------ ···--.------····· ••••••• • ••• •••••
"•·
ge -0/0/2 .1 .1 ge-0/0/1 •••
ge-0/0/1 .1 .1 ge -0/0/2
~
• •
•
_y •
. AS 65001
♦••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
- - - - - - - - - - - - -
mxE
:
•
.. AS 65020
•••••••••••••••••••••••••••••••••••
_J
. -----=~~~-----
•
I
.
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• •
mxE
Q 2020 Juniper Networks. Inc All Rights Reserved
• . ~-------------
mxD
•• •••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••
.
•
•
••
•
.•• ........... mxE........... ...•
------------ • •
•
•
•
..
• ~-
mxD
---
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
.•
•
R2-1 .1 172.22.121 .0/24 : .2 P1 .2 : 112.22.122.0124 .1 R2-2
lo0. 1 = 172.16.1.1 • ge-0/0/3 lo0.2 = 172.16.2.1
co _=
loO.O 172.31 .100.1
_. , co ::
l
ge-0/0/0 : (I> _ _ __ (1)
•
~ ~}
•• ge-0/0/1 .1 1 ge-0/0/2 .: • ge-0/0/4 .1 .1 ge-0/0/5 •
•• • • ••••• • •••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••• •
. AS 65412 10.0.14.0/24 10.0.15.0/24
10.0.10.0/24 ••••••••••••••••••••••••••••••••••••
I
••
lo0.1 = 172.1 6.1.2 lo0.2 = 172.16.1.3
•
•• mxA mxC •
•• lo0.1 = 172.1 6.2.2 lo0.2 = 172.16.2.3
•
•
•
•
•• ••• • •• -I •••• •• ••••••• • ••• • • • ••
ge-0/0/2 .1 .1 ge-0/0/1 ge-0/0/ 1 .1 .1 ge-0/0/2
10.0.12.0/24
mxB 10.0.17 .0/24
-------------- AS 65001
. •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• .
~
mxE
~
: AS 65020
~.• ••••••••••••••••••••••••••••••••
~ .:
•
~ S 6500
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• •
mxE
.
Overview
In this lab, you use the lab diagram titled "Lab Network Diagram: BGP FlowSpec" to block DNS
traffic that is being used to attack a Web Server located at the Customer site. In the first part of
the lab you will add a flow specification to the customer device and send that information to the
service provider. The service provider will then forward that information to the mxC-R3 device
which creates a filter to block the Attackers traffic based on the flow data. In the next portion of
the lab, the service provider will be responsible for adding the flow specification to the RR and
have the flow routes distributed to mxA-R1, and mxC-R3 devices to block the DNS attack.
By completing this lab, you will perform the following tasks:
• Configure a Customer edge router to forward flow specification data to a service
provider edge device
• Configure a service provider network to receive flow specification routes from a
customer, verify that the routes are within the assigned customer address range and
forward the flow information to all IBGP peers.
• Monitor and verify the edge devices that they are blocking the correct traffic and the
attack no longer exists
• Configure a RR in the service provider network to distribute flow specification
information to IBGP peers.
• Monitor and verify the edge devices receive the routes and create the required
firewall filters.
In this lab part, you load the initial configuration of the routers.
Note
The instructor will tell you the nature of your access and
will provide you with the necessary details to access your
assigned device.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student devices.
Step 1.2
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab13-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login : Wed Nov 27 1 7 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxA> configure
Entering configuration mode
[edit]
lab@mxA# load override ajspr/lab13-start . config
load complete
[edit]
lab@mxA# co11ani t and-quit
commit complete
Exiting configuration mode
lab@mxA- Rl>
Step 1.3
Access the CLI on your mxB device using Secure Shell (SSH ) or as directed by your instruct or. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab13-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[edit ]
lab@mxB# load override ajspr/lab13-start.config
load complete
[edit ]
lab@mxB# co1,aui t and-quit
commit complete
Exiting configuration mode
lab@mxB-R2>
Step 1.4
Access the CLI on your mxC device using Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab13-start. configcommand. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@172 . 25.11 . 3
Password : lab123
Last login: Wed Nov 27 17:21:22 2019 from 172 . 25 .1 1 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxC> configure
Entering con fi guration mode
[edit ]
lab@mxC# load override ajspr/lab13-start . config
load complete
[edit ]
lab@mxC# co1,auit and-quit
commit complete
Exiting configuration mode
lab@mxC-R3>
Step 1.5
Access the CLI on your mxE device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab13-start. configcommand. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@172 . 25.11 . 5
Password : lab123
Last login: Wed Nov 27 17:21:45 2019 from 172 . 25 .1 1 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxE> configure
Ente r ing con fi g u ra t ion mode
[edi t ]
lab@mxE# load override ajspr/lab13-start.config
load complete
[edi t ]
lab@mxE# co1caui t and-quit
commit complete
Exiting con f igurat ion mode
lab@mxE- Attacker>
Step 1.6
Access t he CLI on your mxD device using Secure Shel l (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configu ration mode and load t he device's starting conf igu ration by issuing the load
override ajspr/lab13-start. config comma nd. After the configuration has been
loaded, comm it the changes and exit to operational mode.
[lab@deskt op ~ ] $ ssh [email protected]. 1 1.4
Password : lab123
Last login : Wed Nov 27 1 5 : 27 : 40 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 6 4-b i t JNPR- 11 . 0 - 20190701 . 269d466 bui l
lab@mxD> configure
Entering configuration mode
[edi t ]
lab@mxD# load override ajspr/lab13-start . config
load complete
[edit]
lab@mxD# co1caui t and-quit
commi t complete
Exiting con f iguration mode
lab@mxD- Customer>
In t his lab part, you configure the Customer device (mxD) to create a f low specification which will
be advertised to the service provider network via the mxA-R1 EBGP peeri ng.
Step 2.1
Use the show bgp summary command to view t he BGP neighbor relationsh ip on the
Customer router.
lab@mxD- Customer> show bgp summary
Threading mode : BGP I/0
Groups : 1 Peers : 1 Down peers : 0
Table To t Paths Act Paths Su ppressed Hi story Damp S t ate Pending
inet . O
0 0 0 0 0 0
Pee r AS In Pkt OutPkt Ou tQ Flaps Last Up/Dwn
Statel#Act i ve/Rece i ved/Accepted/Damped ...
172 . 22 . 13 1.1 0 64512 2 2 0 0 16 Establ
inet.0 : 0/0/0/0
Answer: You should see one BGP neighbor that has been
configured on the Customer router.
Step 2.2
Use the show bgp neighbor 172. 22 .131. 38 I match NLRI command to examine the
EBGP session that is currently in an Established state. Follow this command with the show
configuration protocols bgp command.
lab@mxD-Customer> show bgp neighbor 172.22.131 . 10 I match NLRI
NLRI f or restart configured on peer : inet-unicast
NLRI advertised by peer : inet-unicast inet-flow
NLRI for this session : inet-unicast
NLRI that restart is negotiated for : inet-unicast
NLRI of received end-of-rib markers : inet-unicast
NLRI of all end-of-rib markers sent : inet-unicast
Answer: the family unicast-flow has not been added to the BGP
configuration.
Step 2.3
Enter configuration mode and navigate to the [edi t protocols bgp J hierarchy. Add
family inet flow to the BG P group configuration. When satisfied with the changes,
perform a commit.
lab@mxD- Customer> configure
Entering configuration mode
[edit]
lab@mxD- Customer# edit protocols bgp
Step 2.4
Use the run show bgp neighbor 172. 22 .131 .10 I match NLRI command again to
examine the EBGP session.
[edit protocols bgp ]
lab@mxD- Customer# run show bgp neighbor 172.22.131 . 10 I match NLRI
NLRI for restart configured on peer : inet - flow
NLRI advertised by peer : inet - unicast inet - flow
NLRI for this session : inet-flow
NLRI that restart is negotiated for : inet - flow
NLRI of received end- of- rib markers : inet - flow
NLRI of all end- of- rib markers sent : inet - flow
Question: What NLRls have been selected for this session now?
Answer: Only the inet-flow has been selected for this session.
Step 2.5
In this step you will add family inet unicast back into the configuration. When you are
satisfied with the changes, commit the changes.
Step 2.7
Before the flow specification is configured, look at the existing routing -op tions
configuration using the show routing-options command.
[edit protocols bgp ]
lab@mxD- Customer# top show routing-options
static {
route 203 . 0 . 113 . 0/24 discard ;
route 0 . 0 . 0 . 0/0 next-hop 172 . 22 . 131 .1 0 ;
}
autonomous-system 65000 ;
Answer: The 0/0 route is the default route for Internet access.
The 203.0.113.0/24 represents the internal network that
belongs to the Customer. Any route within the range of the
routes owned by the customer can be advertised within the flow
specification.
Step 2.8
In this lab step you will configure BGP FlowSpec to report that address 203.0.113.1 is being
attacked by multiple sources using the UDP protocol and port 53. This traffic should be
discarded at the edge of the service provider network. Once the flow specification has been
created, review the configuration, and apply the changes using the commit and-quit
command.
then discard ;
}
[edit routing-options fl ow ]
lab@mxD-Customer# co11uuit and-quit
commit comple te
Exiting configuration mode
lab@mxD-Customer>
Step 2.9
Use the show route table inetflow. 0 table extensive to determine if a
FlowSpec route has been created.
lab@mxD-Customer> show route table inetflow.O extensive
Step 2.10
Usetheshow route advertising protocol bgp 172.22.131.10 extensive to
see if the route is being advertised to the service provider network.
Step 2.11
Return to the SSH session that you have open to the mxA-R1 router.
From the SSH session with the mxA-R1 router, use the show route receiving protocol
bgp 1 72. 22. 131. 9 extensive table inetflow. 0 to see if the Flow-route is being
received from the Customer network.
lab@mxA- Rl>
Step 2.12
Usethe show route receive-protocol bgp 172.22.131.9 table inetflow.0
extensive hidden to see why the route is hidden.
lab@mxA-Rl> show route receive-protocol bgp 172.22.131.9 table inetflow.O
extensive hidden
lab@mxA-Rl>
Answer: There are two ways for the route to pass validation. The
Flow-route must be within the range of routes originated and
advertised by the Customer to the Service Provider or a custom
va lidation policy must exist on the service provider router to
override the default validation process.
Step 2.13
Return to the SSH session that you have open to the mxD-Customer router.
From the SSH session with the mxD-Customer router, use the show route
advertising-protocol bgp 1 72. 22. 131. 9 table inet. O to see if any routes are
being advertised.
lab@mxD-Customer> show route advertising-protocol bgp 172.22.131.9 table inet . O
lab@mxD-Customer>
Step 2.14
Configu re the Customer router to only advertise their internal network. This will req uire a policy.
Since the goal is to only advertise the one route that belongs to the Customer and not any others,
a reject all term will be needed. Th is reject all term will cause the FlowSpec route to also be
discarded. In this policy, make sure the FlowSpec route is also included.
lab@mxD- Customer> configure
Entering configuration mode
[edit]
lab@mxD- Customer# edit policy-options policy-statement TO-SP
lab@mxD- Customer>
Step 2.15
Ensure that the Customer site is advertising both routes to the service provider using the show
route advertising route bgp 172.22.131.10.
lab@mxD- Customer> show route advertising-protocol bgp 172.22.131.10
Step 2.16
Return to the SSH session that you have open to the mxA-R1 router.
From the SSH session with the mxA-R1 router, verify that the routes are being received from the
Customer and the routes are active by issuing the show route receive-protocol bgp
1 72. 22. 131. 9.
lab@mxA- Rl>
Step 2.17
Verify that R1 has established a FlowSpec peering with all neighbors by running the show bgp
summary command.
i net . O
1 1 0 0 0 0
i net f low . 0
1 1 0 0 0 0
Peer AS InPkt OutPkt Ou tQ Fl aps Las t Up/Dwn
State l #Acti ve/Rece i ved/Accepted/Damped ...
1 72 . 22 . 13 1 . 9 65000 1 82 1 78 0 8 1 : 19 : 49 Es t ab l
ine t . O: 1 /1/ 1 /0
ine t f low . 0 : 1 /1/1/0
1 92 . 1 68 . 7 1 . 2 645 1 2 4 62 463 0 0 3 : 27 : 18 Es t ab l
ine t . O: 0/0/0/0
Step 2.18
Verify the IBGP configuration on R1 usi ng the show configuration protocols bgp group ibgp
command. If fam ily inet flow is not part of the group configuration, add the family inet flow
option.
[edit]
lab@ mxA- Rl # set protocols bgp group ibgp family inet flow
Step 2.19
Configure the routing-options flow ter11L-order to use the standard option. All
edge devices should have this set if they are participating in FlowSpec. Run the co11a1Li t
and-quit command when finished.
[edit]
lab@ mxA- Rl # set routing-options flow term-order standard
[edi t ]
lab@mxA-Rl>
Step 2.20
Verify they the FlowSpec peering is established using the show bgp summary command
and that the FlowSpec routes are being sent to the RR using the show route
advertising-protocol bgp 192.168.71.2.
lab@mxA-Rl> show bgp summary
Threading mode: BGP I/0
Groups: 2 Peers: 2 Down peers : 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
1 1 0 0 0 0
inetflow . 0
1 1 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Dwn
State l #Act ive /Rece ived/Accepted/Damped ...
172 . 22 . 131 .9 65000 196 193 0 8 1 : 26 :1 0 Establ
inet.O : 1/1/1/0
inetflow.0 : 1/1/1/0
192 . 168 . 71 . 2 64512 5 7 0 0 1:09 Establ
inet.0 : 0/0/0/0
inetflow . O: 0/0/0/0
lab@mxA-Rl>
Step 2.21
Return to the SSH session that you have open to the mxC-R3 router.
From the SSH session with the mxC-R3 router, verify that the FlowSpec route is received by the
mxC-R3 router and that it has validated the Flow-route using the show route flow
validation 203. O.113. 0/24 command. Then ensure that the firewall filter was created
using the show firewall command.
lab@mxC- R3> show route flow validation 203 . 0.113.0/24
inet . O:
203 . 0 . 113 . 0/24
Active unicast route
Dependent flow destinations : 1
Origin : 192 . 168 . 71 . 1 , Neighbor AS : 65000
203 . 0 . 113 . 1/32
Flow destination (1 entries, 1 match origin , next - as)
Unicast best match : 203 . 0 . 113 . 0/24
Flags : Consistent
Filter : -
default bpdu filter -
lab@mxC- R3> 0 0
Step 2.22
Return to the SSH session that you have open to the mxE-Attacker router.
From the SSH session with the mxE-Attacker router, use the JU NOS traceroute command and set
the port to 53. This will generate one packet of UDP port 53 traffic before switching over to
random ports.
Execute the traceroute 203. 0 .113. 1 port 53 command on t he mxE-Attacker router.
The first traceroute packet will be dropped and we can verify by looking at the traceroute output
and then running the show firewall command on mxC.
Question: Was there a delay and was the first traceroute output
an*?
Step 2.23
Return to the SSH session that you have open to the mxC-R3 router.
From the SSH session with the mxC-R3 router, run the show firewall command and verify
that one packet was stopped.
l ab@mxC - R3> show firewall
Fi l te r : -
de f a u lt bpdu fi l t er-
Fi l te r : - fl owspec de f a u lt ine t -
Co un ters :
Name Byt es Pac k ets
203 . 0 .11 3 . 1 , * , p r oto=1 7 , port =53 52 1
l ab@mxC -R3>
In this lab part, the NOC has been contacted by the Customer which is complaining that they are
receiving an excessive amount of large ping packets directed at the Server at 203.0.113.1. They
would like the service provider to block ICMP-request that are 100 bytes or larger directed to this
server.
In this example the NOC PE routers must be configured to validate routes received from the route
reflector, since the Flow-route is not being sent from the originator of the network prefix route.
Since these routes are being introduced from inside the AS to PE routers inside the AS the
va lidation checks are meant to ensure a configuration mistake does not end up blocking a large
number or prefixes. This is accomplished by creating a policy that only accepts /32 prefixes into
the inetflow.O table.
Step 3.1
Return to the SSH session that you have open to the mxA-R1 router.
From the SSH session with the mxA-R1 router, enter configuration mode and create a policy to
accept any /32 Flow-route received from the RR. Then apply this policy under the family
inet flow heirarchy after the no-validation option.
[edit]
lab@mxA-Rl # edit policy-options policy-statement Al.low-FS-IN
lab@mxA-Rl>
Step 3.2
Return to the SSH session t hat you have open to the mxC-R3 router.
From the SSH session with the mxC-R3 router, repeat the previous configuration that you just
completed on mxA-R1.
lab@mxC-R3> configure
Entering configuration mode
[edit ]
lab@mxC-R3# edit policy-options policy-statement Allow-FS-IN
lab@mxC- R3>
Step 3.3
Retu rn to t he SSH session that you have open to the mxD router.
From the SSH session with the mxD router, configure the Flow specification to drop ICMP-request
packets that exceed 100 bytes. This will req uired that you set a packet-length. Since the packet
size configured excludes layer 2 headers but includes the 1Pv4 packet header plus the ICMP
header, the size will need to be 28 bytes larger than the packet size. Enter configuration mode
and use the routing-options flow command to set the destination to be
203. 0 .113 .1, the icmp-type to be echo-request and the packet-length to be
128-65535 bytes. Verify you r work using the show command before committing your work.
lab@mxB-R2> configure
Entering configuration mode
[edit]
lab@mxB-R2# edit routing-options flow route ICMP
lab@mxB-R2>
Step 3.4
In this lab step you will verify that the Flow-route has been created and is being forwarded to the
IBGP neighbors. View the inetflow.O table using the show route table inetflow. 0
command to verify that the new Flow-route is added. To verify that t he routes have been
advertised to the neighbors using the command show route advertising-protocol
bgp 192.168.71.3.
Question: Has the new flow route for ICMP traffic destined for
the 203.0.113.1 server been added?
Answer: Yes, the new flow route for ICMP traffic destined for the
203.0.113.1 server has been added.
Step 3.5
Return to the SSH session that you have open to the mxD router.
From the SSH session with the mxD router, verify that the Flow-route has been received and the
Firewa ll filter has been installed. Use the show route receive-protocol bgp
192 .168. 71. 2 command. The use the show firewall command to ensure the
_ f low spec default inet_ firewall filter is present.
lab@rnxC-R3>
Question: Has the new flow route for ICMP traffic destined for
the 203.0.113.1 server been received?
Answer: Yest the new flow route for ICMP traffic destined for the
203.0.113.1 server has been received.
Filter: -
default bpdu filter -
lab@rnxC-R3>
Answer: Yes, the flowspec filter for ICMP has been created.
Step 3.6
Return to the SSH session that you have open to the mxE-Attacker router.
From the SSH session with the mxE-Attacker router, test the effectiveness of the icmp FlowSpec
Filter. Try three different pings. First try a normal ping using the ping 203. O .113 .1 count
1 command. This should fail. Next try a ping with a packet size of 99 bytes using the ping
203. O .113 .1 count 1 size 99. This should also fail. Finally perform a ping with a packet
size of 100 using the ping 203. 0 .113 .1 count 1 size 100 command.
lab@mxE - Attacker> ping 203.0 . 113.1 count 1
PING 203 . 0 . 113 . 1 (203 . 0 . 113 . 1) : 56 data bytes
64 bytes from 203 . 0 . 113 . 1 : icmp_ seq=O ttl=61 time=4 . 540 ms
lab@mxE - Attacker>
Question: Did the first two pings succeed and the last one fail?
Answer: Yes the first two pings did succeed and the last ping
attempt failed. The failure was caused by the packet size
matching the conditions set by the flowspec rule.
Step 3.7
Return to the SSH session that you have open to the mxC-R3 router.
From the SSH session with the mxC-R3 router, Verify that the filter trapped the Attack traffic
based on the criteria using the show firewall command.
lab@mxC-R3> show firewall
lab@mxC-R3>
mxC- R3 (ttyuO)
login :
Virtual Desktop
mxB
Console and
VNC Connections
[2. . . . .
6D
\J.D---------
i---•·&:-•
·.Q
mxC Hypervisor Physical
Virtual Switch Desktops
Management Addressing
mxD
Student mxA: 172.25.11.1
Virtual mxB: 172.25.11 .2
mxE
Environment mxC: 172.25.11 .3
mxD: 172.25.11 .4
mxE: 172.25.11 .5
Virtual Desktop: 172.25.11 .254
mxA
0 0 _.
(") o
-- --
0 --
co <.,.)
.
..-
-- --.J
~N
N .
N
N
(") _.
..-. <.,.)
_.
co ._.
N
~ co
N
r-- '
..- ~
CD
--
c30
CD
0'
N
<.,.)
. 9 :::.: w .14
· -------·
.
:
••••••••••••••
,,..
Customer :
••••••••••••••
. .·--------- ·.
•
•••••••••••••••••••••••••••••
,,..
mxD •
•
•• :• Attacker ;•mxE
·-------:
: AS 65000
••••••••••••••••••••••••••••••
:
·~------
•
.- .
• •••••••••••••••••••••••••••••
•
Overview
In this lab, you use the lab diagram titled "Lab Network Diagram: BGP Troubleshooting" to
troubleshoot BGP neighbor relationships and routing issues. The goal is to get all neighbor
relationships up and functioning and ensure that routing is functioning correctly. Ensure that
you do not have any hidden routes within your BGP network.
By completing this lab, you will perform the following tasks:
• Troubleshoot various BGP peering issues .
• Make appropriate configuration changes to rectify peering problems .
• Verify and validate routes being shared and ensure that all routes are present.
In this lab part, you load the initial configuration of the routers.
Note
The instructor will tell you the nature of your access and
will provide you with the necessary details to access your
assigned device.
Note
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student dev ices.
Access the CLI on your mxD device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab14-start. config command. After the configuration has been
loaded, commit the changes and exit to operat ional mode.
[lab@desktop ~ ] $ ssh 1ab@172 . 25.11.4
Password : lab123
Last login: Wed Nov 27 1 7 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxD> configure
Entering configuration mode
[edit]
lab@mxD# load override ajspr/lab14-start . config
load complete
[edit]
lab@mxD# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxD>
Step 1.2
Access the CLI on your mxE device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issu ing the load
override ajspr/lab14-start. configcomma nd. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@172 . 25.11.5
Password : lab123
Last login : Wed Nov 27 17 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxE> configure
Entering configuration mode
[edit ]
lab@mxE# load override ajspr/lab14-start . config
load complete
[edit ]
lab@mxE# coirauit and-quit
commit complete
Exiting configuration mode
lab@mxE>
Step 1.3
Access the CLI on your mxC device usi ng Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issu ing the load
override ajspr/lab14-start. configcomma nd . After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@1 72 . 25.11 . 3
Password : lab123
Last login : Wed Nov 27 17 : 21 : 22 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- 11.0 - 20190701 . 269d466 buil
lab@mxC> configure
Entering configuration mode
[edit ]
lab@mxC# load override ajspr/lab14-start . config
load complete
[edit ]
lab@mxC# coirauit and-quit
commit complete
Exiting configuration mode
lab@mxC>
Step 1.4
Access the CLI on your mxB device using Secure Shell (SSH ) or as directed by your instructor.
Log in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab14-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]. 1 1.2
Password : lab123
Last login : Wed Nov 27 1 7 : 21 : 45 2019 f rom 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxB> configure
Entering configuration mode
[edit]
lab@mxB# load override ajspr/lab14-start . config
load complete
[edit]
lab@mxB# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxB>
Step 1.5
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab14-start. config command. After the configuration has been
loaded, commit the changes and exit to operat ional mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login: Wed Nov 27 1 5 : 27 : 40 20 1 9 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxA> configure
Entering configuration mode
[edit]
lab@mxA# load override ajspr/lab14-start . config
load complete
[edit]
lab@mxA# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxA>
In t his lab part, you will be presented with a number of EBGP and IBGP adjacency issues. You will
use various CLI tools to troubleshoot and correct these BGP peering issues.
Step 2.1
Change the perspective of the CLI to that of the R1 logical system by issuing the set cli
logical-system Rl command.
lab@mxA : Rl>
Step 2.2
Use the show bgp summary command to view the BGP neighborships on the R1 router.
lab@mxA : Rl> show bgp summary
Threading mode : BGP I/0
Groups : 2 Peers : 3 Down peers : 3
Tabl e Tot Paths Ac t Pat hs Suppressed His t ory Damp Stat e Pending
inet . O
0 0 0 0 0 0
i net6 . 0
0 0 0 0 0 0
Pee r AS InPkt Out Pkt Ou tQ Flaps Las t Up/Dwn
Statel #Active /Rece i ved/Accepted/Damped ...
1 72 . 22 . 13 1. 37 65230 0 0 0 0 23 Active
1 92 . 168 . 7 1. 2 6550 1 0 0 0 0 23 Idle
1 92 . 168 . 7 1. 4 65501 0 0 0 0 23 I dle
Answer: You should see three BGP neighbors that have been
configured on the R1 router.
Answer: You should see two BGP sessions in Idle state and
you should see one session in an Active state.
Step 2.3
Use the show bgp neighbor 172. 22 . 131 . 37 command to examine the EBGP session that is
currently in an Active state. You should look for a line beginning with ' Error'.
lab@mxA : Rl> show bgp neighbor 172.22.131.37
Pee r : 1 72 . 22 . 1 3 1 . 37 AS 65230 Local : 172 . 22 . 131 . 38 AS 65501
Group : ebgp - AS65530 Routing-I nstance : mas te r
Forwarding routing- instance : master
Type : External State: Act ive Flags : <>
Las t State: Idle Last Event : St art
Las t Error : Open Message Error
Step 2.4
Enter into configuration mode and navigate to the [edi t protocols b gp J hierarchy and
enable traceoptions flagging the nor111al and open conditions. The traceoptions file should be
cal led bgp-trace. When you are satisfied with the changes, commit the configurat ion
changes before moving on.
lab@ mxA : Rl > configure
Ente r i n g con fi g u ra t ion mode
[edi t ]
lab@ mxA : Rl # edit protocols bgp
Step 2.5
Review the contents of the new traceoptions file and identify the problem relating the failure to
establish a neighborship with your EBGP peer. You should be looking for messages that relate to
the EBGP session that is currently in Active state.
[edi t pro t ocols bgp ]
lab@ mxA :Rl # run show log bgp-trace
Dec 1 00 : 03 : 14 t r ace on : Trac i ng t o " /var/ l og/Rl /bgp - trace " start ed ...
Dec 1 00 : 04 : 00 . 500082 BGP RECV 172 . 22 . 131 . 37+179 - > 172 . 22 . 131 . 38+52 4 84
Dec 1 00 : 04 : 00 . 50010 4 BGP RECV message t ype 1 (Open) length 71
Note
You might have to parse through quite a few messages before finding
the messages that relates to the EBGP session. You will also see
many messages that relate to other BGP sessions. You can ignore
those messages at this time.
Step 2.6
Correct the peer AS number that is not configured correctly for the EBGP group by changing the
configured peer AS to 65530. After making the correct changes commit your configuration.
[edit pro t oco l s bgp]
l ab@mxA :Rl # show
traceoptions {
fi le bgp- trace;
fl ag normal;
fl ag open;
}
group ibgp- RR {
type internal;
local-address 1 92 . 168 . 0 . 4 ;
family ine t {
unicast ;
}
family inet 6 {
unicas t;
}
export next-hop-self;
neighbor 1 92 . 168 . 71 . 2 ;
neighbor 1 92 . 168 . 71 . 4 ;
}
group ebgp- AS65530 {
family inet {
unicas t;
}
family ine t 6 {
unicas t;
}
peer- as 65230;
neighbor 1 72 . 22 . 131 . 37;
}
Step 2.7
Use the run show bgp summary command to verify the state of the EBGP peering session
after making your configuration changes.
[edi t prot ocols bgp]
lab@mxA : Rl# run show bgp summary
Groups : 2 Peers : 3 Down peers : 2
Table To t Paths Act Paths Suppressed His tory Damp Sta te Pending
ine t . O
11 11 0 0 0 0
ine t6 . 0
1 1 0 0 0 0
Pee r AS In P kt Out Pkt Ou tQ Flaps Las t Up/Own
Sta te l #Ac tive /Rece ived/Accepted/Damped ...
1 72 . 22 . 131 . 37 65530 11 3 0 0 22 Establ
inet . O: 1 1/ 11 /11/0
inet6 . 0 : 1/ 1 /1/0
1 92 . 168 . 71 . 2 6550 1 0 0 0 0 5 : 41 : 36 Idle
1 92 . 168 . 71 . 4 65501 0 0 0 0 5 : 41 : 36 Idle
Answer: From the output, you should be able to see that the
EBGP session is up and established.
Step 2.8
Begin troubleshooting why the other two sessions are not working. You should start by verifying
that you have routes to their loopback addresses using the
run show route 192 .168. 71/24 command.
[edit protocols bgp]
lab@mxA : Rl# run show route 192.168.71/24
Step 2.9
Verify the address that you are using locally when trying to establish the peering sessions to the
R2 and R4 routers.
[edit protocols bgp]
lab@mxA:Rl# show group ibgp-RR
type internal;
l ocal -address 192.168 . 0 . 4 ;
fami l y inet {
unicast;
}
f amily i n e t 6 {
unicas t;
}
expo rt n ext- hop- sel f;
neighbor 1 92 . 168 . 7 1. 2;
neighbor 1 92 .1 68 . 7 1. 4;
Question: Is the local address bei ng used for you r IBGP peerin gs
conf igured correctly?
Step 2.10
Cha nge the loca l address being used to establish the sessions to your IBGP neighbors. This
address should be configured as your local loopback address. When you are satisfied with the
configuration changes, commit and exit to operationa l mode.
[edit prot ocols bgp ]
lab@mxA : Rl # set group ibgp-RR local-address 192.168.71.1
lab@mxA : Rl >
Step 2.11
Use the show bgp summary command to verify the recent changes have resolved t he peering
issues to t he R2 and R4 routers.
lab@mxA : Rl> show bgp summary
Grou ps : 2 Peers : 3 Down peers : 0
Table To t Pa t hs Act Paths Su ppressed Hi story Damp St ate Pending
inet . O
34 22 0 0 0 0
i net6 . 0
1 1 0 0 0 0
Peer AS In Pkt Ou tPk t Ou tQ Flaps Las t Up/Dwn
St ate l #Ac ti ve/Rece i ved/Accepted/Damped ...
1 72 . 22 . 13 1. 37 65530 22 20 0 0 5 : 28 Es t abl
ine t . O: 1 1/ 11 /1 1 /0
ine t 6 . 0 : 1/ 1 /1/0
1 92 . 1 68 . 7 1. 2 65501 11 11 0 0 20 Es t abl
ine t . O: 1 1/ 11 /1 1 /0
ine t 6 . 0 : 0/0/0/0
1 92 . 1 68 . 7 1. 4 65501 9 9 0 0 16 Es t abl
ine t . O: 0/12/12/0
Step 2.12
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, change the perspective of the CLI to that of the R2
logical system by issuing the set cli logical-system R2 command.
l ab@mxB> set cli logical-system R2
Logical sys tem : R2
lab@mxB : R2>
Step 2.13
Using the show bgp summary command, verify that the R2 router's BGP sessions are up and
operational. R2 is a route reflector (along with R4) and should have IBGP sessions to all internal
devices.
lab@mxB : R2> show bgp summary
Groups : 2 Peers : 4 Down peers : 1
Table Tot Paths Act Paths Suppressed His t ory Damp State Pending
ine t . O
23 22 0 0 0 0
ine t6 . 0
2 1 0 0 0 0
Peer AS I n Pkt OutP k t Ou tQ Flaps Las t Up/Dwn
Statel#Active/Received/Accepted/Damped ...
19 2 . 168 . 71 .1 65501 19 17 0 0 3 :1 6 Establ
inet. O: 11 / 11 /11/0
inet 6 . 0 : 1/1/1/0
19 2 . 168 . 71 . 3 6550 1 820 824 0 0 6 : 06 : 50 Establ
inet. O: 11 / 1 2/12/0
inet6 . 0 : 0/ 1 / 1 /0
19 2 . 168 . 71 . 4 6550 1 828 828 0 0 6 : 06 : 5 4 Establ
inet. O: 0/0/0/0
19 2 . 168 . 71 . 5 65501 0 0 0 0 6 : 07 : 38 Active
Step 2.14
Verify that you have a route to the loopback address for R5 using the
show route 192 . 168. 71 . 5 command.
lab@mxB : R2>
Answer: The next step is to verify you have the correct IS-IS
adjacencies.
Step 2.15
Using the show isis adjacency command, verify that you have the appropriate IS-IS
adjacencies to neighboring devices.
lab@mxB : R2> sho w isis adjacency
Interface System L St ate Hold (secs) SNPA
ge - 0/0/0 . 0 mxA-Rl 2 Up 19 0 : 50 : 56 : a9 : 25 : la
ge - 0/0/2 . 0 mxB-R3 2 Up 8 0 : 50 : 56 : a9 : 21 :f2
lt-0/0/10.0 mxB-R4 2 Up 7 0 : 5 : 86 : 4e : 5a : 1
Step 2.16
Use t he show isis database command to verify that you see the R5 router's link-state
PDUs in the link-state database.
lab@mxB : R2> sho w isis database
I S- IS leve l 1 link-state database :
0 LSPs
Step 2.17
Use the show isi s d a t abase mxC-RS . 00-00 extensive I match prefix command to
determine if R5 is sending its own loopback.
lab@mxB : R2> show isis database mxC-RS . 00-00 extensive I match prefix
IP prefix : 172 . 22 . 131 . 16/30 Metric : 10 Internal Up
IP pref i x : 1 72 . 22 . 131 . 16/30 , Internal , Me t ric : defau lt 10 , Up
I P extended prefix : 172 . 22 . 131 . 16/30 metr i c 10 u p
Answer: No, you should not see the R5 router's loopback at this
time. This indicates there is a problem on R5. We wil l address
this problem when we move to R5.
Note
The problem with the peering session from R2 to R5 can not be
resolved on R2. To keep some order to our troubleshooting steps we
wi ll move on to verifying and troubleshooting R3's BGP sessions and
we wil l address the R2 to R5 neighborship problem when we get to
verifying and troubleshooting R5.
Step 2.18
Change the perspective of the CLI to that of the R3 logical system by issuing the
set cli logical-system R3 command .
lab@mxB : R2> set cli logical-system R3
Logical sys t em : R3
lab@mxB : R3>
Step 2.19
Use the show bgp summary command to verify the state of the R3 router's BGP sessions.
lab@mxB : R3> show bgp summary
Groups : 3 Peers : 4 Down peers : 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
i net6 . 0
2 2 0 0 0 0
i net . O
33 22 0 0 0 0
Peer AS InPkt OutP k t Ou tQ Flaps Las t Up/Dwn
St atel#Acti ve/Rece i ved/Accepted/Damped . ..
1 72 . 22 . 13 1. 46 65532 855 847 0 0 6 : 2 1: 20 1 2/
1 2/12/0 0/0/0/0
1 92 . 1 68 . 7 1. 2 6550 1 840 835 0 0 6 : 14 : 26 Es t abl
i n e t 6 . 0 : 1/ 1 /1/0
inet . O: 1 0/ 11 /1 1 /0
1 92 . 1 68 . 7 1. 4 6550 1 852 847 0 0 6 : 2 1: 12 Es t abl
ine t . O: 0/10/10/0
2001 : db8 : 1 01 : 3 : : 46 65532 849 84 1 0 0 6 : 21 : 05
Es t abl
i n e t 6 . 0 : 1/ 1 /1/0
Step 2.20
Cha nge t he perspective of t he CLI t o t hat of the R4 logica l system by issui ng t he
set cli l o gical-system R4 comma nd.
lab@ mxB : R3> set cli logical-system R4
Logical system : R4
Step 2.22
Verify that you have a route to the loopback address f or t he R5 router using the
show route 192 . 168 . 71 . 5 command .
lab@mxB:R4> show r oute 192 . 168 . 71 . 5
lab@mxB:R4>
Answer: The next step is to verify that you have the correct IS-IS
adjacencies.
Step 2.23
Using the show isis adjacency command, verify that you have the appropriate IS-IS
adjacencies to neighboring devices.
lab@mxB:R4> show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/1 . 0 mxC-RS 2 Up 26 0 : 50 : 56 :a9 : 51 : 76
ge - 0/0/5 . 0 mxB-R3 2 Up 8 0 : 50 : 56 :a9 : 6c : 92
lt-0/0/10.1 mxB-R2 2 Up 22 0 : 5 : 86 : 4e : 5a : O
Answer: Yes, you should have neighborships with the R2, R3,
and R5 routers based on the network topology. These sessions
should be up and functioning at this point.
Step 2.24
Use the show isis database command to verify that you see R5's link-state PDUs in the
link-state database.
lab@mxB : R4> sho w i s is dat abase
IS-IS l evel 1 link-state database :
0 LSPs
Step 2.25
Use the sho w isis dat abas e mxC -RS . 0 0- 0 0 ext e n siv e I mat ch prefix command to
determine if the R5 router is advertising its own loopback address.
lab@mxB : R4> sho w isis database mxC -RS .00- 00 extensi ve I mat ch prefi x
IP prefix : 172.22 . 131.16/30 Metric : 10 Internal Up
IP prefix : 172 . 22 .1 31 . 16/30, Internal , Metric : default 10, Up
IP extended prefix : 172 . 22 .1 31 .1 6/30 me tric 10 up
Answer: No, you should not see the R5 router's loopback at this
time. This indicates there is a problem on R5. We wi ll address
this problem when we move to R5.
Note
Step 2.26
Return to the SSH session that you have open to the mxC router.
From the SS H session with the mxC router, change the perspective of the CLI to that of the R5
logical system by issuing the s e t cli log ical- sys t em RS command.
lab@mxC : R5>
Step 2.27
Use the show bgp summary command to verify the state of the R5 router's BGP sessions.
lab@mxC : R5> show bgp summary
Gro ups : 2 Peers : 3 Down peers : 2
Table Tot Paths Ac t Paths Suppressed History Damp State Pending
inet . O
9 9 0 0 0 0
inet6 . 0
1 1 0 0 0 0
Peer AS In Pkt Out Pkt Ou tQ Flaps Last Up/Dwn
St ate l #Acti ve/Rece i ved/Accept ed/Damped ...
172 . 22 . 13 1. 42 65532 823 815 0 0 6 : 04 :4 4 Establ
ine t. O: 9/9/9/0
ine t 6 . 0 : 1/1/ 1 /0
192 . 168 . 7 1. 2 6550 1 0 0 0 0 6 : 04 : 48 Conn ect
192 . 168 . 7 1. 4 6550 1 0 0 0 0 6 : 04 : 48 Connect
Note
Step 2.28
Use the show configuration protocols isis command to verify the current IS-IS
configuration.
lab@mxC :R5> show configuration protocols isis
level 1 d i sable;
lab@mxC : R5>
Step 2.29
Enter into configuration mode and enable the loopback interface under the IS-IS protocol. Make
su re you commit your cha nges and exit back into operationa l mode.
lab@mxC : R5> configure
Entering configuration mode
[edit]
lab@mxC : R5# activate protocols isis interface loO . O
[edit]
lab@mxC : R5# commit and-quit
commit complete
Exiting configuration mode
lab@mxC : R5>
Step 2.30
Use the show bgp summary command to verify your recent changes have resolved t he BGP
peering issues.
lab@mxC : R5> show bgp summary
Groups : 2 Peers : 3 Down peers : 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
53 22 0 0 0 0
inet6 . 0
2 2 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Received/Accepted/Damped ...
172 . 22 . 131 . 42 65532 830 829 0 0 6 : 07 : 48 Es t abl
inet . O: 8/9/9/0
inet6 . 0 : 1/1/1/0
192 . 168 . 71 . 2 65501 18 11 0 0 16 Es t abl
inet . O: 14/22/22/0
inet6 . 0 : 1/1/1/0
192 . 168 . 71 . 4 65501 15 11 0 0 22 Establ
inet . O: 0/22/22/0
Now that all our BGP sessions are up and functioning the next step is to verify that al l routes are
being accepted and are not being hidden. We should also verify that there are no missing NLRI
families or other reachability problems in our network.
You shou ld start you r verification at t he route reflectors because they should receive a ll
advertised routes and are responsible for distributing the appropriate routes to the IBGP peers.
Step 2.31
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, change the perspective of the CLI to that of the R2
logical system by issuing the set cli logical-system R2 command .
lab@mxB:R4> set cli logical-sys tem R2
Logical system : R2
lab@mxB : R2>
Step 2.32
Use the show route summary command to review the current status of routes on t his
device.
lab@mxB : R2> show r oute summary
Autonomous system number : 65501
Router ID : 192.168.71 . 2
Answer: Yes, you should notice that you have both 1Pv4 and 1Pv6
hidden routes.
Step 2.33
Use the show route hidden command to get more details about the hidden routes in the R2
router's routing table. You should be able to determine which peer is advertising these routes to
the R2 router.
lab@mxB : R2> show route hidden
Step 2.34
Use t he show route hidden extensive I match protocol command to identify the
protocol next hop for each of the hidden routes. After identifying the protocol next hop, you can
determine if you have a route to this next hop usi ng the show route address command.
lab@mxB:R2> show route hidden extensive I match protocol
Protocol next hop: 172.22.131.42
Protocol next hop: 172 . 22 . 131 . 42
Protocol next hop: 172 . 22 . 131 . 42
Protocol next hop: 172.22.131.42
Protocol next hop: 172 . 22 . 131 . 42
Protocol next hop: 172 . 22 . 131 . 42
Protocol next hop: 172 . 22 . 131 . 42
Protocol next hop: 172.22.131.42
Protocol next hop: : : fff f: 172 . 22 .1 31 .4 2
Protocol next hop: : : ffff : 192 . 168 . 71 . 3
lab@mxB:R2>
Answer: No, you do not have a route to any of the protocol next
hops for the hidden routes.
Question: Why are the routes from the R5 router showing the
EBGP peers interface address as the protocol next hop?
Answer: You see this problem because IBGP does not change
the next hop when advertising to internal peers by default. To
avoid this problem, you must either create a policy to change the
next-hop or include the EBGP facing interface in your AS's IGP
while also setting it to passive.
Step 2.35
Retu rn to the SSH session that you have open to the mxC router.
From the SSH session with the mxC router, use the show configuration
policy-options command to review the current policies configured on R5. If there is a policy
defined to change the next hop you should use the show configuration protocols bgp
group ibgp-RR command to verify if the policy has been applied to the BGP group. If there is
not a policy then you should determine if the EBGP peering interface is included in your IGP as a
passive interface.
lab@mxC : RS> show configuration policy-options
policy- statement next - hop- self {
fr om {
protocol bgp ;
route -t ype external;
}
then {
next-hop self;
}
}
Answer: Yes, you should have a policy designed to alter the next
hop for EBGP routes.
Answer: No, the policy has not been applied to the IBGP peering
.
sessions.
Step 2.36
Enter into configuration mode and navigate to the [edi t protocols bgp group
ibgp - RR] hierarchy and apply the policy as an export policy. Commit and exit configuration
mode after you are satisfied with your configuration changes.
[edit]
lab@mxC : RS# edit protocols bgp group ibgp-RR
lab@mxC : RS>
Step 2.37
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, use the show route summary command to review
the current status of routes on this device and determine if the policy you applied on the R5
router has resolved the problem causing hidden routes from that peer.
lab@mxB : R2> show route summary
Autonomous system numbe r: 6550 1
Ro u ter ID : 192 . 168 . 71 . 2
Answer: Yes, you will still have one hidden route. You should
remember that you still have a hidden route that was learned
from the R3 router. You should notice that the hidden 1Pv4
routes are no longer there as well as the one 1Pv6 route that we
are learning from the R5 router.
Step 2.38
Change the perspective of the CLI to that of the R3 logical system by issuing the set cli
logical-system R3 command.
lab@mxB : R2> set cli l o gic al-system R3
Logical system : R3
lab@mxB : R3>
Step 2.39
Use the show configuration protocols bgp group ibgp-RR command to review
the current BGP configuration to ensure the next-hop-self policy is applied. Then review the
loopback interface configuration to verify the 1Pv4-mapped 1Pv6 address has been configured .
Step 2.40
Enter into configuration mode and activate the 1Pv4-mapped 1Pv6 address on the loopback
address. Commit and exit to operational mode when you are satisfied with your configuration
changes.
lab@mxB : R3> configure
En t ering configura t ion mode
[edit]
lab@mxB : R3# activate interfaces loO unit 3 family inet6 address
: :ffff:192.168.71.3/128
[edit]
lab@mxB : R3# show interfaces loO
unit 3 {
f amily inet {
address 192 . 168 . 71 . 3/32;
}
f amily iso {
address 49 . 000 1 . 0000 . 0000 . 7803 . 00 ;
}
f amily inet6 {
address 2001 : db8 : 0101 : : 3/128 {
pri' mary ;
}
address : :ffff:1 92 . 1 68 . 71 . 3/128;
}
}
[edit]
lab@mxB : R3# commit and-quit
commit comple t e
Exit i ng con f igu ra t ion mode
lab@mxB : R3>
Step 2.41
Cha nge t he perspective of t he CLI t o t hat of t he R2 logica l system by issui ng t he set cli
logical-system R2 command.
lab@mxB : R3> set cli logical-system R2
Logical system : R2
lab@mxB : R2>
Step 2.42
Use the show route summary comma nd to review t he current status of routes on th is device
and determine if activating t he loopback 1Pv4-mapped 1Pv6 add ress on the R3 router has
resolved the problem causing the hidden rout e f rom that peer.
lab@mxB : R2> show r oute summary
Autonomou s system n u mber : 6550 1
Ro u ter ID : 192 . 168 . 71 . 2
Step 2.43
Change the perspective of the CLI to that of the R4 logical system by issu ing the set cli
logical-system R4 command .
lab@mxB : R2> set cli logical-system R4
Logical system : R4
lab@mxB : R4>
Step 2.44
Use the show route summary command to review the current status of routes on this
device.
lab@mxB : R4> show r oute summary
Au t onomous system number : 65501
Router ID : 192.168.71 . 4
Answer: No, you should not see any hidden routes. The
alterations we made to resolve issues on the R2 router have
ensured that we do not have the same problems on the R4
route reflector.
Question: Do you see all the BGP routes you had on the R2
router?
Answer: No, you should notice that there are no 1Pv6 BGP routes
on the R4 router.
Answer: You might not have the 1Pv6 peer configured in BGP.
You might be missing the 1Pv6 NLRI family if you are using the
1Pv4 sessions to transport the 1Pv6 addresses. These are just
some possible causes.
Step 2.45
Enter into configuration mode and navigate to the [edit protocols bgp] hierarchy and
review your BGP peering configurations.
lab@rnxB : R4> configure
Entering configuration mode
[edit]
lab@rnxB : R4# edit protocols bgp
Step 2.46
Configure the 1Pv6 family in your ibgp and ibgp-clients BGP groups. This configuration will
ensure that your 1Pv6 routes are tra nsported over your 1Pv4 BGP sessions. Remember that you
also have to explicitly define the inet NLRI when defining another family for the BGP sessions.
Commit and exit to operational mode when you are satisfied with your configuration changes.
[edit protocols bgp]
lab@mxB : R4# set group ibgp family inet unicast
lab@mxB : R4>
Step 2.47
Use the show route summary comma nd to review t he current status of routes on th is device
and determine if activati ng the 1Pv6 NLRI for you BGP sessions has resolved the problem causing
t he missing 1Pv6 routes from neighbors.
lab@mxB : R4> show r oute summary
Autonomou s system n umber : 65501
Ro u ter ID : 192 . 168 . 71 .4
Step 2.48
Log out of your assigned devices using the exit comma nd.
lab@mxB : R4> exit
mxB (ttyu O)
login :
Virtual Desktop
mxB
Console and
VNC Connections
[2. . . . .
6D
\J.D---------
i---
·.Q
•·&:-•
mxD
Student mxA: 172.25.11.1
Virtual mxB: 172.25.11 .2
mxE
Environment mxC: 172.25.11 .3
mxD : 172.25.11 .4
m xE: 172.25.11 .5
. • "' • ;.__, ~
~
•♦ ••
i8
o e ·
·•........................................ ~-~ 1. ..................................•· · Q
§8
.
..-
C") 2001 :db8:101 :3::/64 m ..-
C")
..-. 172.22.131.44/30 'P ..-.
N Q N
N (C N CC
~
• CD
N, .46 N cp
t-- 0
..- Q -- •,--------
•
: Endpoint3
.
•••••••••••••••••••••••••••••
:
mxE •
~
~ ~
.............:37. ~-..........•• •
: AS65532 :
• . ......... A2 .............. .•
•
1 Endpoint1 j mxD ·------- ·
••••••••••••••••••••••••••••••••
•
1 Endpoint2 j mxD
: AS65530 : :• AS65532 :
••••••• • ••••• •••••• •••••••
IQ 2020 Juniper NetworkS. Inc All Rights Reserved
Overview
In this lab, you use the lab diagram titled "Lab Network Diagram: Troubleshooting Routing
Policy" to verify and troubleshoot routing problems. You will ensure routing policies are correctly
configured and implemented. As the network administrator, you must adhere to certain routing
requirements.
The local AS honors a set of communities to influence AS_PATH prepending when advertising
routes to peers:
• Community 65501:3 is used to prepend the local AS three times before advertising
to peers.
• Community 65501:6 is used to prepend the local AS six times before advertising to
peers.
• Community 65501:9 is used to prepend the local AS nine times before advertising to
peers.
In addition, there are specific requirements for each of the peering points:
• EBGP session to AS65530 on R1
Inbound: Routes transiting through in AS73 should be rejected; all other routes
should be tagged with community 65501:100
• EBGP session to AS65532 on R3
Inbound: no route transiting either AS 31 or 32 should be accepted; accepted
routes should be tagged with community 65501:200
Outbound: no route tagged with community 65501:100 and more specific than
/24 should be sent
• EBGP session to AS65532 on R5
Inbound: route originating from AS3 should be rejected; accepted routes should
be tagged with community 65530:200
By completing this lab, you will perform the following tasks:
• Troubleshoot import and export policies to ensure that you are meeting the defined
requirements.
• You will fix any issues that you come across during the troubleshooting steps .
In this lab part, you load the initial configuration of the routers.
Note
The instructor will tell you the nature of your access and will provide
you with the necessary details to access your assigned device.
Note
The lab topology requires you to display information in the different
logical systems of mxA, mxB, mxC, mxD, and mxE. You will be
changing the perspective of the CLI by issuing the set cli
logical-system ls-name command. Refer to the lab diagram
for the correct logical system name.
By changing the perspective of the CLI, you will be able to perform
network commands such as ping or traceroute from the
perspective of the pertinent logical system.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student devices.
Step 1.2
Access the CLI on your mxD device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab15-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ l ab@deskt op ~ ] $ ssh [email protected]
Password : lab123
Last l ogin : Wed Nov 27 1 7 : 20 : 28 20 1 9 f rom 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Ke r nel 6 4-b it JNPR-11 . 0 - 2019070 1. 269d4 66 b u i l
lab@ mxD> configure
Ente ring confi g u ra t ion mode
[e di t ]
lab@ mx D# load override ajspr/lab15-start . config
load comp l e te
[e di t ]
lab@ mx D# coxcaui t and-quit
commit comple te
Ex it i ng con f igurati o n mode
lab@ mx D>
Step 1.3
Access the CLI on your mxE device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issu ing the load
override ajspr/lab15-start. configcomma nd . After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@172 . 25.11.5
Password : lab123
Last login : Wed Nov 27 17 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxE> configure
Entering configuration mode
[edit ]
lab@mxE# load override ajspr/lab15-start . config
load complete
[edit ]
lab@mxE# coirauit and-quit
commit complete
Exiting configuration mode
lab@mxE>
Step 1.4
Access the CLI on your mxC device usi ng Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issu ing the load
override ajspr/lab15-start. configcomma nd . After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@172 . 25.11 . 3
Password : lab123
Last login : Wed Nov 27 17 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- 11.0 - 20190701 . 269d466 buil
lab@mxC> configure
Entering configuration mode
[edit ]
lab@mxC# load override ajspr/lab15-start . config
load complete
[edit ]
lab@mxC# coirauit and-quit
commit complete
Exiting configuration mode
lab@mxC>
Step 1.5
Access the CLI on your mxB device using Secure Shell (SSH ) or as directed by your instructor.
Log in as user lab with t he password lab123.
www .j uniper. net Troubl eshooting Rout ing Policy • Lab 15-3
Advanced Junos Service Provider Ro uti ng
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab15-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh 1ab@172 . 25. 1 1.2
Password : lab123
Last login : Wed Nov 27 1 7 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxB> configure
Entering configuration mode
[edit]
lab@mxB# load override ajspr/lab15-start . config
load complete
[edit]
lab@mxB# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxB>
Step 1.6
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab15-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login : Wed Nov 27 1 7 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 1 9 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxA> configure
Entering configuration mode
[edit]
lab@mxA# load override ajspr/lab15-start . config
load complete
[edit]
lab@mxA# co11ani t and-quit
commit complete
Exiting configuration mode
lab@mxA>
In this lab part, you will be use CLI commands to discover routing issues. Once discovered, you
will use various CLI tools to troubleshoot and correct import and export policies.
Step 2.1
Change the perspective of the CLI to that of the R1 logical system by issuing the set cli
logical-system Rl command.
lab@mxA> set cli logical-system Rl
Logical system : Rl
lab@mxA : Rl>
Step 2.2
Use the show bgp summary command to view the BGP neighborships and routes being
learned on the R1 router.
lab@mxA:Rl> show bgp summary
Groups: 2 Peers: 3 Down peers : 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . 0
29 9 0 0 0 0
inet6.0
3 1 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Dwn
State l #Act ive /Rece i ved/Accepted/Damped ...
172 . 22 . 131 . 37 65530 278 289 0 0 1 : 59 :4 2 Establ
inet.0 : 0/11/0/0
inet6 . 0 : 0/1/0/0
192 . 168 . 71 . 2 65501 300 275 0 0 1 : 59 : 09 Establ
inet.O : 9/9/9/0
inet6 . 0 : 1/1/1/0
192 . 168 . 71 . 4 65501 127 83 0 1 36 :4 2 Establ
inet.0 : 0/9/9/0
inet6 . 0 : 0/1/1/0
Question: How many prefixes are you receiving from your EBGP
peer?
Answer: You should see 111Pv4 routes and 11Pv6 route being
learned from the R1 router's EBGP peer.
Step 2.3
Use the show route receive-protocol bgp 172. 22. 131. 37 to examine the routes
learned from the EBGP peer.
lab@mxA : Rl> show route receive-protocol bgp 172.22.131.37
Answer: The routes are there, they are just marked as hidden.
Step 2.4
Use the show route receive-protocol bgp 172. 22 .131. 37 hidden detail command
to review the received routes that are being marked as hidden.
lab@mxA : Rl> show route receive-protocol bgp 172.22 . 131.37 hidden detail
Answer: These routes are hidden because they have all been
reject ed by import policy.
Step 2.5
Review the import policies applied to the EBGP group. If t here are additional paramet ers like
as - path and comrnuni ty tags being used as match condit ions you should investigate them
also.
www .juni per. net Troubleshooting Rout ing Policy • Lab 15-7
Advanced Junos Service Provider Ro uting
Question: Do you see any issues with the import policies being
applied as import policies?
Step 2.6
Enter into configuration mode and navigate to the [edi t policy- opt ions J hierarchy.
Correct the as-path definition for transit - 7 3 by altering the defined path. Use " . * 73 . *"
as the new AS path. Commit and exit to operational mode when you are finished.
lab@mxA : Rl> configure
Entering con fi g u ra t ion mode
[edi t ]
lab@mxA : Rl# edit policy-options
l ab@mxA : Rl >
Step 2.7
Use the show route receive-protocol bgp 172. 22 .131. 37 hidden command to verify
that the only hidden routes are routes with the transit 73 AS number in their AS path.
l ab@mxA : Rl> show route receive-protocol bgp 172.22.131.37 hidden
Answer: No, you should only see one route and that route
should have the AS 73 in the path.
Step 2.8
Use the show route receive-protocol bgp 1 72. 22 .131. 37 coitauuni ty
11
65501:. * [123]" extensive command to review routes that are coming from the Endpoint1
router. This command is designed to look for the routes with the prepend community attached
to it. This community is used to add our AS number based on the community definition before it
is advertised to other EBG P peer on other routers.
l ab@mxA : Rl> show route receive-protocol bgp 1 72 . 22 .131. 37 coitauuni ty
11
65501: .*[123]" extensive
Step 2.9
Use t he show route 172. 20. O. 0/24 extensive I match com to view the community
values assigned to these routes t hat are installed in your routing table.
lab@mxA : Rl> show route 172.20.0.0/24 extensive I match com
Commu nit i es : 65501 : 100
Commu ni t ies : 65501 : 100
Commu nit i es : 65501 : 100
Commu n it ies : 65501 : 100
Commu nit i es : 6550 1: 100
Commu ni t ies : 65501 :1 00
Step 2.10
Review the im port policies for the EBGP neighbor. Review the applied policies to determine why
the 65501 : 3 community values are being removed.
lab@mxA : Rl > show configuration protocols bgp group ebgp-AS65530
i mport [ re j ect- 73 tag- commu ni t yl ];
f amily inet {
u nicast;
}
f amily inet 6 {
u nicas t;
}
export prepend;
peer- as 65530;
ne i ghbor 172 . 22 . 13 1 . 37;
Answer: Yes, the policy action is commu nity set which will
replace all communities already applied to the route.
Step 2.11
Enter into configuration mode and navigate to the [edi t policy- options
policy- sta t ement tag- communi tyl] hiera rchy. Change t he policy action to add a
community value instead of set the community. After making the correct changes co,cucLi t your
configuration and exit to operational mode.
l ab@mxA : Rl > configure
Ent er i ng con f i gura tion mode
[edit]
l ab@mxA : Rl # edit policy-options policy-statement tag-communityl
[edit pol i cy- opt ions po l icy- stat ement tag - communit yl]
l ab@mxA :Rl # show
t e r m t ag {
the n {
commu n i t y set c l ;
}
}
Step 2.12
Use the show route 172. 20. O. 0/24 extensive I match com to view the community
values assigned to these routes that are installed in your routing table.
lab@ mxA : Rl > show route 172. 20. 0. 0/24 extensive I match com
Commu nit i es : 6550 1: 3 6550 1: 100
Commu n it ies : 65501 : 3 65501 : 1 00
Commu nit i es : 6550 1: 3 6550 1: 100
Commu n it ies : 65501 : 3 65501 : 1 00
Commu nit i es : 6550 1: 3 6550 1: 100
Commu n it ies : 65501 : 3 65501 : 1 00
Step 2.13
Usetheshow route advertising-protocol bgp 172.22.131.37 community 65501:3
command to verify that you are prepending your AS number three times on the routes tagged
with the community 65501 : 3 that you are advertising to your EBGP peer.
lab@ mxA : Rl > show route advertising-protocol bgp 172. 22 .131. 37 coituuuni ty 65501: 3
Step 2.14
Return to the SSH session that you have open to the mxB router.
From the SSH session with the mxB router, change the perspective of the CLI to that of the R3
logical system by issuing the set cli logical-system R3 command.
lab@mxB> set cli logical-system R3
Logical system : R3
lab@mxB:R3>
Step 2.15
Use the show bgp summary command to view the BGP neighborships and routes being
learned on the R3 logical system.
lab@mxB : R3> show bgp summary
Threading mode: BGP I/0
Groups: 3 Peers: 4 Down peers : 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet6.0
5 0 0 0 0 0
inet . O
50 0 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Dwn
Statel#Active/Received/Accepted/Damped ...
172 . 22 . 131 . 46 65532 34 26 0 0 11:12 Establ
inet.O : 0/12/0/0
192 . 168 . 71 . 2 65501 52 26 0 0 11:04 Establ
inet.O : 0/19/0/0
inet6 . 0 : 0/2/0/0
192 . 168 . 71 . 4 65501 43 27 0 0 10:44 Establ
inet.0 : 0/19/0/0
inet6 . 0 : 0/2/0/0
2001 : dbB : 101:3: : 46 65532 28 25 0 0 11:10
Establ
inet6 . 0 : 0/1/0/0
Answer: You should see 12 1Pv4 routes and 11Pv6 route being
learned from the Endpoint3 router.
Step 2.16
Review the import policies applied to the EBGP group. If there are additional parameters like
as - pa th and comrnuni ty tags being used as match conditions you should investigate them
also.
lab@mxB : R3> show configuration protocols bgp
group ebgp- AS65532 - ipv6 {
type external ;
fami l y inet6 {
unicast ;
}
peer- as 65532;
neighbor 2001 : db8 : 101 : 3 :: 46;
}
group ebgp- AS65532 - ipv4 {
type external ;
fami l y inet {
unicast ;
}
peer- as 65532;
neighbor 172 . 22 . 131.46;
}
grou p ibgp- RR {
type internal;
local - address 192 . 168 . 71 . 3;
fami l y inet {
unicast ;
}
family inet6 {
uni cast ;
}
export next - hop- self ;
neighbor 192 . 168 . 71.2 ;
neighbor 192 . 168 . 71 . 4 ;
}
import [ no - 31 - 32 tag- routes ] ;
Answer: Yes, you should notice that the no-31 - 32 policy has a
reject action that is outside the term with the conditions.
This reject action will match all routes because there is no
global condition.
Question: Did you notice anything else wrong with the policy or
policy definitions.
Step 2.17
Enter into configuration mode and navigate to the [edit policy- options J hierarchy.
Make two unique as-paths called via-31 and via-32 for the different AS numbers. Remove
the existing as-path that is incorrectly configured.
lab@mxB : R3> configure
Entering configuration mode
[edit]
lab@mxB : R3# edit policy-options
[edit policy-options ]
lab@mxB : R3# show as-path via-31-or-32
". *3 [ 12 ) . *";
[edit policy-options ]
lab@mxB : R3# set as-path via-31 "· * 31 .*"
www .juniper.net Troubleshooting Routing Policy • Lab 15-15
Advanced Junos Service Provider Ro uting
lab@mxB : R3>
Step 2.19
Use the show route receive-protocol bgp 172. 22 .131. 46 hidden command to verify
that only routes received from the Endpoint3 router that go through AS numbers 31 and/ or 32
are rejected and marked as hidden.
lab@mxB : R3> show route receive-protocol bgp 172 . 22.131.46 hidden
Answer: No, you should only see hidden routes that have the 31
or 32 AS numbers in their AS path.
Step 2.20
Use the show route advertising-protocol bgp 172 . 22 .131. 46 command to verify that
you are not exporting anything to your EBGP that is longer than the required / 24.
lab@mxB : R3> show route advertising-protocol bgp 172 . 22.131.46
www .j uniper. net Trou bleshoot ing Routi ng Policy • Lab 15-17
Advanced Junos Service Provider Routi ng
Answer: Yes, you should see two routes that are /25s and they
are still being advertised to your EBGP peer.
Step 2.21
Use the show configuration protocols bgp command to verify what policies you have
applied to your BGP groups. Review the policies and determine why the /25 routes are still being
advertised.
lab@mxB : R3> show configuration protocols bgp
group ebgp- AS65532 - ipv6 {
type external;
f amily inet6 {
unicast;
}
peer- as 65532;
neighbor 2001 : db8 :1 01 : 3 : : 46;
}
group ebgp- AS65532 - ipv4 {
type external;
f amily inet {
unicast;
}
peer- as 65532;
neighbor 1 72 . 22 . 131 . 46;
}
group ibgp-RR {
type internal;
local-address 192.168 . 71 . 3;
f amily inet {
unicast;
}
f amily inet6 {
unicast;
}
export next-hop-self;
neighbor 1 92 . 168 . 71 . 2 ;
neighbor 192 . 168 . 71 . 4 ;
}
import [ no-31-32 tag-routes ] ;
export [ no - tagged- specifics prepend ] ;
Step 2.22
Enter into configuration mode and navigate to the [edi t policy- options
pol i cy-s ta temen t no - tagged - specifics] hierarchy and fix the term by removing the
up-to conditions and replace it with prefix-length-range conditions. Commit and exit to
operational mode when you are satisfied with your changes.
lab@mxB:R3> configure
Entering configuration mode
[edit ]
lab@mxB :R3# edit policy-options policy-statement no-tagged-specifics
lab@mxB : R3>
Step 2.23
Use the show route advertising-protocol bgp 172. 22 .131. 46 command to verify that
you are not exporting anything to your EBGP that is longer than the required /24.
lab@mxB : R3> show route advertising-protocol bgp 172.22.131.46
Answer: No, you should not be advertising any routes t hat are
longer t han / 24. The R3 router's routes and policies seem to be
working correctly now.
Step 2.24
Return to the SSH session that you have open to the mxC router.
From t he SSH session with the mxC router, change the perspective of the CLI to t hat of t he R5
logica l system by issuing the set cli logical-system RS command.
lab@mxC> set cli logical-system RS
Logical system : RS
lab@mxC : RS>
Step 2.25
Use the show bgp summary command to view the BGP neighborships and routes being
learned by the R5 router.
lab@mxC : R5> show bgp summary
Threading mode : BGP I/0
Gro ups : 2 Peers : 3 Down peers : 0
Tabl e Tot Paths Ac t Pat hs Suppressed His t ory Damp Stat e Pending
i net . O
45 22 0 0 0 0
i net6 . 0
5 2 0 0 0 0
Peer AS In Pkt OutP k t Ou tQ Flaps Las t Up/Dwn
Statel #Active /Rece i ved/Accept ed/Damped ...
1 72 . 22 . 13 1. 42 65532 52 49 0 0 1 8 : 00 Establ
i ne t. O: 8/9/9/0
i net6 . 0 : 1 / 1 / 1 /0
1 92 . 168 . 7 1. 2 65501 64 49 0 0 1 6 : 5 1 Establ
i net . 0 : 1 4/ 18/18/0
i ne t 6 . 0 : 1 /2/2/0
1 92 . 168 . 7 1. 4 65501 51 50 0 0 1 6 : 58 Establ
i net . O: 0/18/ 18 /0
i net6 . 0 : 0/2/2/0
Answer: You should see 9 1Pv4 routes and 11Pv6 route being
learned from the Endpoint2 router.
Step 2.26
Use the show route receive-protocol bgp 172 . 22 .131. 42 command to review the
routes learned from the Endpoint2 router to ensure that the R5 router is not accepting routes
that have transited AS number 3.
l ab@mxC : R5> show route receive-protocol bgp 172 . 22.131.42
Step 2.27
Review t he BGP configuration and import policies to determine the reason why you are sti ll
accepti ng routes that have traversed t he AS 3.
lab@mxC : R5> show configuration proto cols bgp group ebgp-AS65532
type external;
import [ tag-routes reject - 3 ] ;
family inet {
unicast;
}
family inet 6 {
unicas t;
}
export prepen d;
peer-as 65532;
neighbor 172 . 22 . 13 1 . 42;
Answer: The policy will accept all routes that are evaluated by
this policy.
Answer: You have a couple options to fix this issue. You can
re-order the policies so that the routes that have the AS 3 in
their AS path are rejected before being evaluated and accepted
by the tag- route policy. Alternately, you can remove the
accept statement from the tag- route policy.
Step 2.28
Enter into configuration mode and navigate to the [edit policy- options
pol i cy- s ta temen t tag- routes] hierarchy and remove the accept action from the policy.
Commit and exit to operational mode when you are satisfied with your changes.
lab@mxC : RS> configure
Entering configuration mode
[edit]
lab@mxC:R5# edit policy-options policy-statement tag-routes
commit comple t e
Exiting con f igu ra t ion mode
lab@mxA- 1 : R5>
Step 2.29
Use the show route receive-protoco l bgp 172 . 22 . 1 3 1 . 4 2 command to review the
routes learned f rom the Endpoint2 router to ensure that the R5 router is not accepting routes
t hat have transited AS number 3 .
lab@mxC : R5> sho w r o ute rec eive-pro t ocol bgp 172 . 22 . 131 . 42
Answer: No, you should not see any routes that have transited
through AS 3.
Step 2.30
Log out of your assigned devices using the exit command.
lab@mxC : R5> exit
mxC (ttyu O)
login :
Virtual Desktop
mxB
Console and
VNC Connections
[2. . . . .
6D
\J.D---------
i---
·.Q
•·&:-•
mxD
Student mxA: 172.25.11.1
Virtual mxB: 172.25.11 .2
mxE
Environment mxC: 172.25.11 .3
mxD : 172.25.11 .4
m xE: 172.25.11 .5
Virtual Desktop: 172.25.11 .254
(0
(")
(.,.)
••••. CD .45
······································Q ···································
•••• g
0
0
w
.
...-
(") 2001 :db8:101:3::/64 m ...-
(")
...-. 172.22.131.44/30 cp ...-.
N
N (C e N
N CC
.46 ~
. co
N, N cp
t-- 0
...- ...... •••••••••••••••••••••••••••••
•♦ ------- ♦• mxE ,...-
.._ e
-
0
Q : Endpoint3 : ~
..............
j
,.,...............................
~?. ~-···········.
Endpoint1 j mxD
•
.....
: _____ •
AS65532 __, .:
••••••••••••••••••••••••••••••• •
. ,.......... ............ .
j
••........ A2 ..............•
Endpoint2 j mxD
: AS65530 : :• AS65532 :
•• • • • • • • • ■ •••
•••••• • ••••• •
Q 2020 Juniper Networks. Inc All Rights Reserved
Overview
In this lab, you use the lab diagram titled "Lab Network Diagram: BGP Route Damping" to
monitor the EBGP-received routes for any link flapping that might occur within the network.
Route damping monitors the behavior of EBGP-received routes being withdrawn and
readvertised. It uses a point system known as figure-of-merit to determine whether routes
should be instal led and advertised into the IBGP topology, or suppressed at the edge.
By completing this lab, you perform the following tasks:
In this lab part, you verify the initial configuration of the routers. You then verify that the
interfaces are operational and OSPF and BGP neighbor relationships have formed.
Note
The instructor will tell you the nature of your access and will provide
you with the necessary details to access your assigned device.
Note
The lab topology requires you to display informat ion in the different
logical systems of mxA, mxB, mxC, mxD, and mxE. You will be
changing the perspective of the CLI by issuing the set cli
logical-system ls-name command. Refer to the lab diagram
for the correct logical system name.
By changing the perspective of the CLI , you will be able to perform
network commands such as ping or traceroute from the
perspective of the pertinent logical system.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to determine the
management address of the student dev ices.
Step 1.2
Access the CLI on your mxB device using Secure Shell (SSH ) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labl 6-start. config command. After the configuration has been
loaded, commit the changes and exit to operat ional mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login: Wed Nov 27 17 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 bui l
lab@mxB> configure
Entering configuration mode
[edit]
lab@mxB# load override ajspr/lab16-start . config
load complete
[edit]
lab@mxB# co1caui t and-quit
commit complete
Exiting configuration mode
lab@mxB>
Step 1.3
Issue t he show configuration command . Use t he lab diagram t o verify that the mxB router
has the correct logica l system and interface conf iguration. Verify that BGP has been enabled.
lab@mxB> show configuration
## Last commit : 2019 - 12 - 06 15 : 11:54 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxB;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNd lhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHTL 0c ."; ## SECRET-DATA
}
login {
user lab {
uid 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
sys log {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
logical-systems {
P3 {
interfaces {
ge-0/0 /3 {
unit O {
f amily inet {
address 172.22 . 125 . 2/24 ;
}
}
}
ge-0/0/4 {
unit O {
fami l y inet {
address 172 . 22 . 126 . 2/24 ;
}
}
}
loO {
uni t O {
fami l y inet {
address 172 . 31 . 1 02 . 1 /32;
}
}
}
}
protocols {
bgp {
group R3-1 {
type external;
mult ihop ;
local -address 1 72 . 3 1. 102 . 1 ;
export ajspr-bgp-export-p3;
neighbo r 172 . 16 . 1 . 2 {
pee r-as 65001;
}
}
group R3-2 {
type external;
mult ihop ;
local -address 1 72 . 3 1. 102 . 1 ;
export ajspr-bgp-export-p3;
neighbor 172 . 16 . 2 . 2 {
pee r- as 65002;
}
}
}
}
po l icy- optio ns {
policy-s tatemen t ajspr -bgp-expo rt-p3 {
term 1 {
from {
protocol static;
route-filter 40 . 40 . 0 . 0/22 o rl o nger;
}
then accept;
}
term 2 {
from {
prot ocol bgp ;
ro ute-fi lter 30 .3 0 . 0 . 0/22 l onger;
}
then reject;
}
}
}
routing- opt ions {
static {
interface ge - 0/0/0 . 0;
}
}
bgp {
group ibgp {
type internal;
local -address 172 . 16.1 . 2;
export [ redistribute - statics next-hop-self];
neighbor 172 . 16 . 1 . 1;
}
group P3 {
type external;
multihop;
local -address 172 . 16.1 . 2;
export export-aggregate;
peer - as 65020 ;
neighbor 172 . 31 . 102 .1;
}
}
}
policy- options {
po l icy- statement export-aggregate {
term 1 {
from {
protocol aggregate ;
route -fi lter 172.16 .1. 0/24 exact;
}
then accept;
}
term 2 {
from {
route -fi lter 172.16 .1. 0/24 longer;
}
then reject;
}
}
policy- statement next-hop-self {
term 1 {
from {
protocol bgp ;
route -t ype external;
}
then {
next-hop se lf;
}
}
}
po l icy- statement redistribute - statics {
term 1 {
from protocol static;
then accept;
}
}
}
routing- options {
s t a t ic {
ro ute 1 72 . 1 6 . 1 .1 28/26 r e j ect;
ro ute 1 72 . 1 6 . 1 .1 92/26 r e j ect;
ro ute 1 72 . 3 1. 102 . 1/32 {
next-hop 172 . 22 .1 25 . 2 ;
n o -re adve r ti s e;
}
}
a ut on o mo u s - s y s tem 65001 ;
agg re g ate {
ro ute 1 72 . 1 6 . 1 . 0/24 ;
}
}
}
R3 - 2 {
i nte r fa c e s {
ge- 0/0/ 1 {
unit O {
f a mi l y i net {
addres s 1 0 . 0 . 14 . 2/2 4;
}
}
}
ge- 0/0/5 {
unit O {
f a mi l y i net {
addres s 1 72 . 22 . 1 26 . 1 /24 ;
}
}
}
loO {
unit 2 {
f a mi l y i net {
address 1 72 .1 6 . 2 . 2/32 ;
}
}
}
}
p r o t oco l s {
ospf {
area 0 . 0 . 0 . 0 {
i nte r fa c e l o 0 . 2 ;
i nte r fa c e ge- 0/0/1 . 0 ;
}
}
b gp {
g r oup ibgp {
t ype i nte r nal ;
loca l -ad d r ess 172 . 16 . 2 . 2 ;
expo rt [ r e d is t rib ute-stati cs next-hop-se l f ] ;
neighb or 172 . 16 . 2 . 1 ;
}
g r oup P3 {
t ype exter nal ;
mult i hop;
}
}
routing - options {
stat ic {
route 1 72 . 16.2 . 128/26 reject;
route 172 . 16.2 . 192/26 reject;
route 1 72 . 3 1. 102 . 1/32 {
next-hop 172 . 22 .1 26 . 2;
no-readvertise;
}
}
autonomo u s - system 65002;
agg regate {
route 172 . 16.2.0/24;
}
}
}
}
interfaces {
fxp O {
unit O {
fami ly inet {
address 172 . 25 .11. 2/24 ;
}
}
}
}
Step 1.4
Issue the show bgp summary logical-system P3 command to view the state of the P3
router's EBGP sessions.
lab@mxB> show bgp summary logical-system P3
Threading mode : BGP I/0
Groups : 2 Peers : 2 Down peers : 0
Table Tot Paths Ac t Paths Suppressed History Damp State Pending
inet . O
2 2 0 0 0 0
Peer AS In Pkt OutPkt Ou tQ Flaps Last Up/Dwn
Statel#Active/Rece i ved/Accepted/Damped .. .
172 . 16 . 1 . 2 65001 5 5 0 0 45 Establ
inet . O: 1/1/1/0
172 . 16 . 2 . 2 65002 5 5 0 0 45 Establ
inet . O: 1/1/1/0
Step 1.5
Access the CLI on your mxC device using Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab16-start. configcommand. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh iab@172 . 25.11.3
Password : lab123
Last login : Wed Nov 27 17 : 20 : 28 2019 from 172.25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- ll . 0 - 20190701 . 269d466 buil
lab@mxC> configure
Entering configuration mode
[edit]
lab@mxC# load override ajspr/lab16-start.config
load complete
[edit]
lab@mxC# coitani t and-quit
commit complete
Exit i ng configuration mode
lab@mxC>
Step 1.6
Issue the show configuration command. Use the lab diagram to verify that the mxC router
has the correct interface, OSPF, and BGP configuration.
lab@mxC> show configuration
## Last commit : 2019 - 12-08 22 : 07 : 24 UTC by lab
version 20 1 90829 . 221548 b uilder . r1052644;
system {
host- name mxC;
root - authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y.ArnNdlhwla9MApGk.mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHT LOc ."; ## SECRET - DATA
}
login {
use r lab {
ui d 2000 ;
class super-user;
a uthent icati o n {
encrypted- password " $6$JEnFYM l n$C 6pjHzEv3cK/iovqki JywOgyrmgNnX /
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1"; ## SECRET - DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
use r * {
any emergency;
}
file messages {
any notice;
a uthorization info;
}
fi le interact ive-commands {
inte ractive -comman ds any ;
}
}
}
inter f aces {
ge - 0/0/0 {
unit O {
f ami ly inet {
address 10 . 0 . 1 4.1 /2 4;
}
}
}
ge-0/0 / 1 {
unit O {
fami ly inet {
address 172 . 22 .1 24 . 1 /24 ;
}
}
}
ge-0/0 /3 {
unit O {
fami l y inet {
address 172 . 22 .1 22 . 1 /24 ;
}
}
}
fxp O {
unit O {
fami ly inet {
address 172 . 25 .11 . 3/24 ;
}
}
}
loO {
unit O {
fami l y inet {
address 172 .1 6 . 2 . 1/32 ;
}
}
}
}
policy-options {
policy-s tatemen t export-aggregate {
te rm 1 {
from {
prot oco l agg regate;
ro ute-fi lter 172 . 16 . 2 . 0/24 exact;
}
then accept;
}
term 2 {
from {
ro ute-fi lter 172 . 16 . 2 . 0/24 longer;
}
then rejec t;
}
}
policy-s tatement nex t -hop-self {
term 1 {
from {
p r otocol bgp ;
route -type external;
}
then {
next-hop sel f;
}
}
}
policy-statement pfe-load-balance {
te r m 1 {
fr om {
protocol bgp ;
route -fi lter 30 . 30 . 0 . 0/22 longer;
}
then {
load- balance per- packet;
}
}
}
policy-statement redistribute-statics {
term 1 {
fr om {
protocol static;
route -fi lter 172 . 16 . 0 . 0/16 o r longer;
}
then accept;
}
}
as-path partner- as ". * 6500 1";
as-path internal -as " () " ;
}
routing-options {
static {
route 172.16 . 2 . 0/26 reject;
route 172.16 . 2 . 64/26 reject;
}
f orwarding- table {
export p fe- load- balance;
}
autonomous-system 65002;
aggregate {
route 172.16 . 2 . 0/2 4;
}
}
protocols {
ospf {
area 0 . 0 . 0 . 0 {
interface lo0 . 0;
inte rface ge - 0/0/0 . 0 ;
}
}
bgp {
gro up ibgp {
type interna l ;
local -address 172 . 16 . 2 .1;
Step 1.7
Issue the show ospf neighbor command to ensure the mxC router has established an OSPF
neighbor relationship with the R3-2 router.
lab@mxC> show ospf neighbor
Address Interface State ID Pri Dead
10.0 . 14 . 2 ge - 0/0/0 . 0 Full 172 . 16 . 2.2 128 33
Step 1.8
Issue the show bgp summary command to view the state of the mxC router's BGP sessions.
lab@mxC> show bgp summary
Threading mode : BGP I/0
Groups: 2 Peers : 3 Down peers : 0
Tabl e Tot Paths Act Paths Suppressed Hi story Damp State Pending
inet . O
17 11 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Received/Accepted/Damped ...
172 . 16 . 2 . 2 65002 7 6 0 0 1:09 Es t abl
inet . O: 7/7/7/0
172 . 22 . 122 . 2 65412 0 0 0 0 1:20 Connect
172 . 22 . 124 . 2 65412 0 0 0 0 1:20 Connect
Step 1.9
Access the CLI on you r mxE device using Secure Shell (SSH) or as directed by you r instructor. Log
in as user lab with the password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/labl 6-start. config command. After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~ ] $ ssh [email protected]
Password : lab123
Last login: Wed Nov 27 17 : 20 : 28 2019 from 172 . 25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-ll . 0 - 20190701 . 269d466 buil
lab@mxE> configure
Entering configuration mode
[edit ]
lab@mxE# load override ajspr/lab16-start.config
load complete
[edit ]
lab@mxE# coirauit and-quit
commit complete
Exiting configuration mode
lab@mxE>
Step 1.10
Issue the show configuration command. Use the lab diagram to verify that the mxE router
has the correct logical system and interface configuration. Verify that OSPF and BGP has been
enabled.
lab@mxE> show configuration
## Last commit: 2019 - 12 - 27 22 : 15 : 06 UTC by lab
version 20190829 . 221548 b ui lder . r1052644;
system {
host-name mxE;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y .AmNdlhwla9MApGk .mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3 t QObCdrevo0v635R7ReHTL Oc ."; ## SECRET -DATA
}
login {
user lab {
ui d 2000 ;
class super-user;
authentication {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1 " ; ## SECRET-DATA
}
}
}
services {
ssh;
netconf {
ssh;
}
}
syslog {
user* {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive -commands any;
}
}
}
logical - systems {
P2 {
interfaces {
ge-0/0 / 2 {
unit O {
fami l y inet {
address 172 . 22 . 124 . 2 / 24;
}
}
}
ge-0/0 / 5 {
unit O {
fami l y inet {
address 172 . 22 . 252 . 2 / 30;
}
}
}
ge-0/0/7 {
unit O {
fami l y inet {
address 172 . 22 . 123 . 2/24;
}
}
}
l oO {
unit O {
fami l y inet {
address 172 . 31 . 1 01 . 1/32;
}
}
}
}
protocols {
ospf {
area 0 . 0 . 0 . 0 {
interface lo0 . 0;
interface ge - 0/0/5 . 0;
}
}
bgp {
group ibgp {
type internal ;
l oca l - address 172 . 31 . 101.1 ;
export ajspr- bgp-nhs;
neighbor 172 . 31 . 100 .1;
}
group mxA {
type external ;
export ajspr- bgp- export;
neighbor 172 . 22 . 123 .1 {
peer- as 65001;
}
}
group mxC {
type external ;
Step 1.11
Issue the show bgp summary logical-system P2 command to view the state of t he P2
router's BGP sessions.
lab@mxE> show bgp summary logical-system P2
Threading mode : BGP I/0
Groups : 3 Peers : 3 Down peers : 2
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
6 6 0 0 0 0
Peer AS In Pkt OutPkt Ou tQ Flaps Last Up/Dwn
State l #Active/Rece i ved/Accepted/Damped ...
172 . 22 . 123 . 1 65001 0 0 0 0 1 : 50 Connect
172 . 22 . 124 . 1 65002 17 16 0 0 5 : 30 Establ
inet . 0 : 6/6/6/0
172 . 31 . 100 . 1 65412 0 0 0 0 1 : 50 Active
Step 1.12
Access the CLI on your mxD device using Secure Shell (SSH) or as directed by your instructor.
Log in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issuing the load
override ajspr/lab16-start. configcommand. After the configuration has been
loaded, commit the changes and exit to operational mode.
[ lab@desktop ~]$ ssh 1ab@l72 . 25.11.4
Password : lab123
Last login : Wed Nov 27 17 : 20:28 2019 from 172.25 . 11 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR- 11 . 0 - 20190701 . 269d466 buil
lab@mxD> configure
Entering con fi g u ration mode
[edit]
lab@mxD# load override ajspr/ labl6-start . config
load complete
[edi t]
lab@mxD# co1caui t and-quit
commit complete
Exiting con f igurati o n mode
lab@mxD>
Step 1.13
Issue the show configuration comma nd. Use the lab diagram t o verify t hat t he mxD router
has been conf igu red for a logical syst em ca lled Pi that has t he correct interface and OSPF
configuration.
lab@mxD> show configuration
## Las t commi t: 2019 -1 2 - 27 22 : 14:55 UTC by lab
version 20 1 90829 . 221548 b uilder . r1052644;
system {
host-name mxD;
root-authentication {
encrypted-password
" $6$GBq0FqVe$MXFb2Y.ArnNdl hwla9MApGk.mdl pusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHT LOc ."; ## SECRET -DATA
}
login {
use r lab {
ui d 2000 ;
class super-user;
authent icati on {
encrypted-password " $6$JEnFYMln$C6pjHzEv3cK/iovqkiJywOgyrmgNnX/
U0r3B3kfaeXa4ygKFE117De7YsKVbjdJnab3PfylSLmDHjgPVMiilP1"; ## SECRET - DATA
}
}
}
services {
ssh ;
netconf {
ssh;
}
}
sys log {
use r * {
any emergency;
}
file messages {
any notice;
a uthorization info;
}
file interactive-commands {
inte ractive -commands any ;
}
}
}
logical - sys t ems {
Pl {
int er f aces {
ge - 0/0/0 {
unit O {
f ami ly i ne t {
address 1 72 . 22 . 252 . 1 /30 ;
}
}
}
ge - 0/0/ 1 {
u n it O {
f ami ly i ne t {
addr ess 1 72 . 22 . 1 2 1 . 2/24 ;
}
}
}
ge - 0/0/ 4 {
unit O {
f ami ly i ne t {
addr ess 1 72 . 22 . 1 22 . 2/24 ;
}
}
}
loO {
u n it O {
f ami ly i ne t {
addr ess 1 72 . 31 . 1 00 . 1 /32 ;
}
}
}
}
pro t oco l s {
ospf {
area 0 . 0 . 0 . 0 {
i nter f ace lo0 . 0;
i nter f ace ge - 0/0/0 . 0;
}
}
bgp {
gro up ibgp {
type int ernal ;
l ocal - address 172 . 3 1.1 00 . 1 ;
export ajsp r-bgp-nhs;
neighbor 172 . 31 .1 01 .1;
}
gro up mxA {
type ext ernal ;
export ajspr- bgp- expo r t ;
neigh bor 172 . 22 .1 21 .1 {
peer - as 6500 1;
}
}
}
}
}
Step 1.14
Issue the show ospf neighbor logical-system Pl command to ensure the P1 router has
established an OSPF neighbor relationship with the P2 router.
lab@mxD> show ospf neighbor logical-system Pl
Address Interface State ID Pri Dead
172 . 22 . 252 . 2 ge - 0/0/0 . 0 Ful l 172 . 31 . 101 . 1 128 32
Step 1.15
Issue the show bgp summary logical-system Pl command to view t he state of the P1
router's BGP sessions.
lab@mxD> show bgp summary logical-system Pl
Threading mode : BGP I/0
Groups : 3 Peers : 3 Down peers : 1
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
12 6 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Received/Accepted/Damped ...
172 . 22 . 121 . 1 65001 0 0 0 0 1:20 Connect
172 . 22 . 122.1 65002 19 18 0 0 6 : 44 Establ
inet . O: 6/6/6/0
172 . 31 . 101.1 65412 18 18 0 0 5 : 58 Establ
inet . O: 0/6/6/0
Step 1.16
Access the CLI on your mxA device using Secure Shell (SSH) or as directed by your instructor. Log
in as user lab with t he password lab123.
Enter configuration mode and load the device's starting configuration by issu ing the load
override ajspr/labl6-start. configcomma nd . After the configuration has been
loaded, commit the changes and exit to operational mode.
[lab@desktop ~]$ ssh 1ab@172 . 25.11.1
Password : lab123
Last login: Wed Nov 27 17 : 20:28 2019 from 172.25 .1 1 . 254
--- JUNOS 19 . 3Rl . 8 Kernel 64 - bit JNPR-11. 0 - 20190701 . 269d466 buil
lab@mxA> configure
Entering configuration mode
[edit]
lab@mxA# load override ajspr/lab16-start . config
load complete
[edit]
lab@mxA# co1,aui t and-quit
commit complete
Exiting configuration mode
lab@mxA>
Step 1.17
Issue the show configuration command. Use the lab diagram to verify that the mxA router
has the correct interface, OSPF, and BGP configuration.
lab@mxA> show configuration
## Last commit : 2019 - 12 - 08 22 : 07 : 17 UTC by lab
version 20190829 . 221548 builder .r1052644;
system {
host-name mxA ;
root - authentication {
encrypted- password
" $6$GBq0FqVe$MXFb2Y.AmNdlhwla9MApGk.mdlpusC7vWkzduzRuuafxYgZT2XJzpU40sb/
. 3tQObCdrevo0v635R7ReHTL0c ."; ## SECRET- DATA
}
login {
user lab {
uid 2000 ;
loO {
unit O {
fami ly inet {
address 172 .16.1. 1/32 ;
}
}
}
}
policy-options {
policy-s ta temen t export-aggregate {
te rm 1 {
from {
prot ocol agg regate;
ro ute-fi lter 172 . 16 .1 . 0/24 exact;
}
then accep t;
}
te rm 2 {
from {
ro ute-fi lter 172 . 16 .1 . 0/24 longer;
}
then rejec t;
}
}
policy-s ta tement nex t - hop-self {
te rm 1 {
fr om {
pro t ocol bgp ;
ro ute-type external;
}
then {
next-hop self;
}
}
}
policy-s ta temen t pfe-load-balance {
te rm 1 {
fr om {
protocol bgp;
ro ute-fi lte r 30 . 30 . 0 . 0/22 longer ;
}
then {
load- balan ce per- packet;
}
}
}
policy- statement redis trib ute-statics {
term 1 {
from p r otocol static;
then accep t;
}
}
}
routing-options {
static {
Step 1.18
Issue the show ospf neighbor command to ensure the mxA router has established an OSPF
neighbor relationship with the R3-1 router.
lab@mxA> show ospf neighbor
Address Interface State ID Pri Dead
10 . 0 . 10 . 2 ge - 0/0/0 . 0 Full 172 . 16 . 1 . 2 128 34
Step 1.19
Issue the show bgp summary command to view the status of the mxA router's BGP neighbor
relationships.
lab@mxA> show bgp summary
Threading mode : BGP I/0
Groups : 2 Peers : 3 Down peers : 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet . O
17 11 0 0 0 0
Peer AS In Pkt OutPkt OutQ Flaps Last Up/Dwn
State l #Active/Rece i ved/Accepted/Damped .. .
172 . 16 . 1 . 2 65001 27 25 0 0 9 : 36 Establ
inet . O: 6/7/7/0
172 . 22 . 121 . 2 65412 28 26 0 0 10:24 Establ
inet . O: 5/5/5/0
172 . 22 . 123 . 2 65412 27 26 0 0 10 : 18 Establ
inet . O: 0/5/5/0
Answer: The mxA router has established BGP sessions with the
R3-1 , P1, and P2 routers.
In this lab part, you create and advertise a static route from the mxC router to the P1 and P2
routers which will propagate the route through EBGP to the mxA router. After damping is enabled
in the mxA router, you will flap the route by deleting the static route and adding it back on the
mxC router.
Step 2.1
Return to the SSH session that you have open to the mxC router.
From the SSH session with the mxC router, enter configuration mode and navigate to the [edit
routing - options J hierarchy. Configure the 172.22.2.0/24 static route with a next hop of
reject .
lab@mxC> configure
Entering configuration mode
[edit]
lab@mxC# edit routing-options
Step 2.2
Navigatetothe [edit policy- options policy- statement export - aggregate]
hierarchy and configure a third term in the policy to advertise the new static route. Use the show
command to display the policy. Commit your configuration when finished.
[edit routing - options]
lab@mxC# top edit policy-options policy-statement export-aggregate
Step 2.3
Issue the run show route advertising-protocol bgp 1 72. 22 .122. 2 and run show
route advertising-protocol bgp 172. 22 .122. 2 commands to view the routes that are
being advertised from the mxC router to the P1 and P2 routers.
[edit policy- options policy-statement export-aggregate ]
lab@mxC# run show route advertising-protocol bgp 172.22 . 122 . 2
Step 2.4
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, issue the show route 1 72. 22. 2. 0/24
command to display the new route being advertised by the mxC router.
lab@mxA> show route 172.22.2.0/24
Answer: Yes, the route should be an active BGP route in the mxA
router's routing table. If the route is not active, check your
configuration or ask your instructor for help.
Step 2.5
Enter configuration mode and navigate to the [edit protocols bgp J hierarchy. Enable
BGP damping as a global command. Commit the change.
lab@mxA> configure
Entering configuration mode
[edit]
lab@mxA# edit protocols bgp
Step 2.6
You will now cause the 172.22.2.0/ 24 route to flap on the mxC router.
Return to the SSH session that you have open to the mxC router.
From the SSH session with the mxC router, navigate to the [edit routing- options J
hierarchy. Cause the newly-configured static route to flap by deleting the static route. Commit the
change when you are ready.
[edit routing-options ]
lab@mxC# delete static route 172.22.2.0/24
[edit routing-options ]
lab@mxC# coiranit
commit complete
[edit routing-options ]
lab@mxC#
Step 2.7
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, use the run show route damping history
detail command to display routes that are withdrawn but have a history of f igure-of-merit in
the mxA router's routing table.
[edit protocols bgp]
lab@mxA# run show route damping history detail
Age : 56
Validat i on State : unverified
Task : BGP 65412 . 172 . 22 .1 21 . 2
AS path : 65 4 12 65002 I
Accepted
Localpre f: 100
Router I D: 172 . 31 .1 00 . 1
Merit (last update/now): 1000/962
De f a u l t damping pa r amete r s u sed
Last update: 00000000 : 00 : 56 Firs t u pdate : 00000000 : 00 : 56
Flaps: 1
Hi story entry . Expires in: 00000000 : 34 : 00
Hidden re aso n: s u ppre ssed by dampi n g
Step 2.8
Retu rn to t he SSH session that you have open to the mxC router.
From the SSH session with the mxC router, navigate to the top of the configuration and perform a
rollback 1 to readvertise the static route. Commit the configuration when completed.
[edit]
lab@mxC# rollback 1
load complete
[edit]
lab@mxC# coitaui t
commit complete
[edit]
lab@mxC#
Step 2.9
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, use the run show route damping decayed
detail command to show active routes that are decaying but not suppressed.
[edit protocols bgp]
lab@mxA# run show route damping decayed detail
Step 2.10
Return to the SSH session that you have open to the mxC router.
From the SSH session with the mxC router, flap the route 4 times using the rollback 1 and
commit commands.
[edit]
lab@mxC# rollback 1
load complete
[edit]
lab@mxC# coituni t
commit complete
[edit]
lab@mxC# rollback 1
load complete
[edit]
lab@mxC# coituni t
commit complete
[edit]
lab@mxC# rollback 1
load complete
[edit]
1 ab@mx C# coituni t
commit complete
[edit]
lab@mxC# rollback 1
load complete
[edit]
1 ab@mx C# coituni t
commit complete
[edit]
lab@mxC#
Step 2.11
Return to the SSH session that you have open to the mxA router.
From the SSH session with the mxA router, use the run show route damping
suppressed detail command to display routes that have been suppressed due to damping
in the default routing table.
[edit protocols bgp]
lab@mxA# run show route damping suppressed detail
In this lab part, you use routing policy to modify the default damping parameters. You create an
import policy to disable damping on routes received from the P1 router, and another policy to
aggressively damp routes received from the P2 router.
Step 3.1
Navigate to the [edit policy- options] hierarchy. Create and configure two damping
profiles named disable and aggressive. The disable profile should use the disable
option. The aggressive profile should set the suppress parameter to 1500, half -l ife to
1 O minutes, and the reuse parameter to 5 00.
[edit protocols bgp ]
lab@mxA# top edit policy-options
Step 3.2
Navigate to the [edi t po l i cy- options policy- s t atement modify- damping]
hierarchy. Configure the first term of the modify- damping import policy to use the disable
profile on all BGP routes received from the P1 neighbor. Configure the second term to use the
aggressive profile on all routes received from the P2 neighbor. Use the show command to
display the policy.
[edit pol i cy- opt ions ]
l ab@mxA# edit policy-statement modify-damping
[edit pol i cy- opt ions po l i cy- stat ement modif y - dampi ng ]
l ab@mxA# set term 1 from protocol bgp
[edit pol i cy- opt ions po l i cy- stat ement modif y - dampi ng ]
l ab@mxA# set term 1 from neighbor 172.22.121.2
[edit pol i cy- opt ions po l icy- stat ement modif y - damping ]
l ab@mxA# set term 1 then damping disable
[e dit pol i cy- opt ions po l icy- stat ement modif y - damping ]
l ab@mxA# top edit protocols bgp group P1-P2
Step 3.4
Use the run clear bgp damping command to reset the figure-of-merit to zero on all routes.
Use the run show route damping suppressed command to verify that all routes are
active and no routes are suppressed in the default routing table.
[edi t protocols bgp group Pl - P2]
lab@mxA# run clear bgp damping
Step 3.5
Return to the SSH session that you have open to the mxC router.
From the SSH session with the mxC router, flap the route 2 times using the rollback 1 and
commit commands.
[edi t ]
lab@mxC# rollback 1
load complete
[edit]
lab@mxC# coiruui t
commit complete
[edit]
lab@mxC# rollback 1
load complete
[edit]
lab@mxC# coiruui t
commit complete
[edit ]
lab@mxC#
Step 3.6
Retu rn to t he SSH session that you have open to the mxA router.
From the SSH session with the mxA router, use the run show route damping
suppressed detail command to display any routes suppressed due to damping in the mxA
router's routing table.
[edit protocols bgp group Pl-P2 ]
lab@mxA# run show route damping suppressed detail
Step 3.7
Using the data in the following table, issue the run show route 1 72. 22. 2. 0/24 detail
command to verify that the damping policy on the P1 router is disabling damping on received
routes.
[edit protocols bgp group Pl-P2]
lab@rnxA# run show route 172.22.2 .0/2 4 detail
Step 3.8
Use the run show route damping decayed detail command to display any active
routes with figure-of-merit in the default routing table.
[edit protocols bgp group Pl-P2]
lab@rnxA# run show route damping decayed detail
Step 3.9
Log out of your assigned devices using the exit command .
lab@mxA> exit
mxA ( tt yu O)
log in :
Virtual Desktop
Console and
mxB VNC Connections
6D
QPi-----____; •
mxD
Student mxA: 172.25.11.1
Virtual mxB: 172.25.11.2
mxE Environment mxC: 172.25.11.3
mxD: 172.25.11.4
mxE: 172.25.11.5
Note: Your instructor will provide address and access info rmation.
~1......:_ _1_72
_ ._22_._12_1_.0_12_4_ _:.,._~
------ .
,-
P1 ...._~: _...;1.;..
72;;;.;·.;;.
22;;;.;·..;.;
12 ;;.;2;;.;..0
;;.;./.;;.
,-
24.;.._~~=H-'-t
default ..-- .-- default
100_2 = 172 _16 _1 _1 l ge-0/0/3 ge-0/0/1 oO.O = 172.31 .100.1 ge-0/0/3 l lo0.2 = 172.16.2.1
1 : ~ ·1 i 1 .
•...................................~ ~ <p 172.22.252.0/24 ge-OIOI'\ • ...................................•♦
17
o/ 1 e,o/0/7 <.22. 123 o Q ------ A o/ .1
Q
0 -0124 , ....._ _ _.2_~_ _~ ,.,•• 9_e_0101?. ,.., '\?.A .ol?.
A1i.'t.~• Q
0 -->
o 9 {}e-01013 .2 P2 ' o ~
AS 65001 ~ j 100.1 = 172.31.101.1 : t AS 65002
•
. ..... ........·x:e·. . . .... • 0
~
~ro mxB ~
ro ................... .
.............. , ............................................................................................................................. ··········••p•i
:'. ~ ~ 65020 ~ ··..
-0 .2 ~----=-----=----.; - 2
.......
R3-1 .1 172.22.125.0/24 2 P3 172.22.126.0/24
t-t--e""!:
0~/0~/2~=~~~.;,,__-.......i lo0.2 = 172.31 .102.1 . . - . i - - - - - - - - - - - - 1 - . 1 . 1 R3-2
lo0.2 = 172.16.1 .2 9 - ge-0/0/3 ge-0/0/4 ge-0/0/5 lo0.2 = 172.16.2.2
.
I
•
~
___-
.........
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
. ~
Engineering
Simplicity
EDU-JUN-AJSPR, Revision V19A