Jncie-Sp-12.a LG v1
Jncie-Sp-12.a LG v1
Jncie-Sp-12.a LG v1
12.a
Lab Guide
Volume 1
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has no known
time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an agreement
executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and agree to be bound by its
license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper Networks software, may contain
prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should consult the software license for further details.
Contents
Lab 1: Implementing Device Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Implementing Device Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
This five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—
Service Provider (JNCIE-SP) exam. The course focuses on caveats and tips useful for potential test candidates and
emphasizes hands-on practice through a series of timed lab simulations. On the final day of the course, students are
given a six-hour lab simulation emulating the testing topics and environment from the real exam. All labs in this course
are facilitated by Junosphere Cloud (formerly known as Junosphere) virtual lab devices and are available after hours for
additional practice time. This course is based on Junos OS Release 12.3.
Objectives
After successfully completing this course, you should:
• Be better prepared for success in taking the actual JNCIE-SP exam.
• Be well-versed in exam topics, environment, and conditions.
Intended Audience
This course benefits individuals who have already honed their skills on service provider technologies and could use
some practice and tips in preparation for the JNCIE-SP exam.
Course Level
JNCIE Service Provider Bootcamp is an advanced-level course.
Prerequisites
Students should have passed the Juniper Networks Certified Internet Professional—Service Provider (JNCIP-SP) written
exam or achieved an equal level of expertise through Education Services courseware and hands-on experience.
Day 1
Chapter 1: Course Introduction
Chapter 2: Exam Strategies
Chapter 3: Device Infrastructure
Implementing Device Infrastructure Lab
Chapter 4: IGP Implementation
IS-IS Implementation Lab
OSPF Implementation Lab
Day 2
Chapter 5: IGP Troubleshooting
IS-IS Troubleshooting Lab
OSPF Troubleshooting Lab
Chapter 6: BGP Implementation
BGP Implementation Lab
Chapter 7: BGP Troubleshooting
BGP Troubleshooting Lab
Day 3
Chapter 8: Multicast Implementation
Multicast Implementation and Troubleshooting Lab
Chapter 9: Class of Service Implementation
Class of Service Implementation and Troubleshooting Lab
Day 4
Chapter 10: MPLS Implementation
MPLS Implementation and Troubleshooting Lab
Chapter 11: MPLS VPN Implementation
MPLS VPN Implementation and Troubleshooting Lab
Day 5
JNCIE-SP Full Lab Simulation
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config.ini in the Filename field.
CLI Undefined Text where the variable’s value is Type set policy policy-name.
the user’s discretion or text where
ping 10.0.x.y
the variable’s value as shown in
GUI Undefined the lab guide might differ from the Select File > Save, and type
value the user must input filename in the Filename field.
according to the lab topology.
Overview
In this lab, you will be given a list of tasks specific to device infrastructure to accomplish in a
timed setting. You will have 1 hour to complete the simulation.
By completing this lab, you will perform the following tasks:
• Configure the aggregated Ethernet interfaces ae0, ae1, and ae2. Refer to the lab
diagram for the routers and member interfaces associated with these aggregated
Ethernet interfaces.
• Configure all aggregated Ethernet interfaces to monitor the member links to ensure
that both ends of the bundle are connected to the correct group. Configure R4 to
initiate this process for all aggregated Ethernet interfaces.
• Ensure that the aggregated Ethernet bundle between R2 and R4 always supports a
bandwidth capacity of at least 2.5 Gbps. Traffic must not be forwarded across this
bundle if this requirement is not met at any time.
• Enable graceful restart for all routing protocols except BGP and OSPF on the internal
routers.
• High availability is required for the DC3 router connected to R3 and R5. Configure a
VRRP group in which R3 is the master for the 172.20.20.0/24 range. R5 must
acquire mastership if three of R3’s internal interfaces fail. If a failover condition
occurs for the VRRP group, and that failover condition is restored, R3 must not regain
mastership. Refer to the lab diagram for the specific interfaces and virtual IP
address.
• High availability is required for the data centers, DC1 and DC2, that are connected to
R2 and R4. Configure two VRRP groups in which R2 is the master for the
172.20.21.0/24 range in VRRP group 100. R4 is the master for the 172.20.22.0/24
range in VRRP group 200. Use 802.1q tag values that match the corresponding
VRRP group identifiers. If the link between R2 and R1 fails, R4 must acquire
mastership for VRRP group 100. If any member interface of the ae0 interface fails,
R2 must acquire mastership for VRRP group 200. Refer to the lab diagram for the
specific interfaces and virtual IP addresses.
• Configure all internal routers to communicate with the RADIUS server located at
172.27.155.1 using the secret key of Juniper.
TASK 1
Access the CLI for your routers using either the console, Telnet, or SSH as directed by your
instructor. Refer to the management network diagram for the IP address associated with your
devices. Log in as user lab with the password lab123.
Configure the aggregated Ethernet interfaces ae0, ae1, and ae2.
Refer to the Lab 1 diagram for the routers and member interfaces
associated with these aggregated Ethernet interfaces.
TASK INTERPRETATION
The task appears to be a simple one, but problems might arise if the Ethernet aggregated device
count is not set properly. For example, even though R5 has only one aggregated Ethernet
interface, setting the Ethernet aggregated device count to 1 will result in a non-operational ae2
interface. The device count for R5 must be set to 3 or higher. This setting results in the creation
of interfaces ae0, ae1, and ae2, which is expected for this task.
After the Ethernet device count is set, associate the correct member interfaces with the correct
aggregated Ethernet bundle. Then, configure the aggregated Ethernet interface as you would any
other Gigabit interface on the router.
TASK COMPLETION
• R1:
R1 (ttyd0)
login: lab
Password:
lab@R1> configure
Entering configuration mode
[edit]
lab@R1# set chassis aggregated-devices ethernet device-count 2
[edit]
lab@R1# edit interfaces
[edit interfaces]
lab@R1# set ge-0/0/4 gigether-options 802.3ad ae1
[edit interfaces]
lab@R1# set ge-0/0/5 gigether-options 802.3ad ae1
[edit interfaces]
lab@R1# edit ae1
commit complete
• R2:
R2 (ttyd0)
login: lab
Password:
lab@R2> configure
Entering configuration mode
[edit]
lab@R2# set chassis aggregated-devices ethernet device-count 1
[edit]
lab@R2# edit interfaces
[edit interfaces]
lab@R2# set ge-0/0/6 gigether-options 802.3ad ae0
[edit interfaces]
lab@R2# set ge-0/0/7 gigether-options 802.3ad ae0
[edit interfaces]
lab@R2# set ge-0/0/8 gigether-options 802.3ad ae0
[edit interfaces]
lab@R2# edit ae0
commit complete
• R4:
R4 (ttyd0)
login: lab
Password:
lab@R4> configure
Entering configuration mode
[edit]
lab@R4# set chassis aggregated-devices ethernet device-count 3
[edit]
lab@R4# edit interfaces
[edit interfaces]
lab@R4# set ge-0/0/6 gigether-options 802.3ad ae1
[edit interfaces]
lab@R4# set ge-0/0/7 gigether-options 802.3ad ae1
[edit interfaces]
lab@R4# set ge-0/0/9 gigether-options 802.3ad ae0
[edit interfaces]
lab@R4# set ge-0/0/10 gigether-options 802.3ad ae0
[edit interfaces]
lab@R4# set ge-0/0/11 gigether-options 802.3ad ae0
[edit interfaces]
lab@R4# set ge-0/0/12 gigether-options 802.3ad ae2
[edit interfaces]
lab@R4# set ge-0/0/13 gigether-options 802.3ad ae2
[edit interfaces]
lab@R4# edit ae0
[edit interfaces]
lab@R4# edit ae2
[edit interfaces]
lab@R4# show
...
ge-0/0/6 {
description "Connection to R1 AE1";
gigether-options {
802.3ad ae1;
}
}
ge-0/0/7 {
description "Connection to R1 AE1";
gigether-options {
802.3ad ae1;
}
}
ge-0/0/8 {
description "Connection to internal server";
unit 0 {
family inet {
address 172.27.155.5/24;
}
}
}
ge-0/0/9 {
description "Connection to R2 AE0";
gigether-options {
802.3ad ae0;
}
}
ge-0/0/10 {
description "Connection to R2 AE0";
gigether-options {
802.3ad ae0;
}
}
ge-0/0/11 {
description "Connection to R2 AE0";
[edit interfaces]
lab@R4# commit
commit complete
• R5:
R5 (ttyd0)
login: lab
Password:
lab@R5> configure
Entering configuration mode
[edit]
lab@R5# set chassis aggregated-devices ethernet device-count 3
[edit]
lab@R5# edit interfaces
[edit interfaces]
lab@R5# set ge-0/0/7 gigether-options 802.3ad ae2
[edit interfaces]
lab@R5# set ge-0/0/8 gigether-options 802.3ad ae2
[edit interfaces]
lab@R5# edit ae2
commit complete
TASK VERIFICATION
All aggregated Ethernet bundles terminate on R4, which allows you to verify all the bundles from
one router. Issuing the show interfaces terse | match ae* command displays which
member interfaces are associated with aggregated Ethernet bundles. This command also
displays the status of each aggregated Ethernet interface.
However, we recommend issuing ping tests to ensure that the interfaces are functional. A few
ping replies from each router allows you to determine if the aggregated Ethernet bundles are
operational.
[edit interfaces]
lab@R4# run show interfaces terse | match ae*
Interface Admin Link Proto Local Remote
ge-0/0/6.0 up up aenet --> ae1.0
ge-0/0/7.0 up up aenet --> ae1.0
ge-0/0/9.0 up up aenet --> ae0.0
ge-0/0/10.0 up up aenet --> ae0.0
ge-0/0/11.0 up up aenet --> ae0.0
ge-0/0/12.0 up up aenet --> ae2.0
ge-0/0/13.0 up up aenet --> ae2.0
ae0 up up
ae0.0 up up inet 172.27.0.6/30
ae1 up up
[edit interfaces]
lab@R4# run ping 172.27.0.5 detail count 2
PING 172.27.0.5 (172.27.0.5): 56 data bytes
64 bytes from 172.27.0.5 via ae0.0: icmp_seq=0 ttl=64 time=3.920 ms
64 bytes from 172.27.0.5 via ae0.0: icmp_seq=1 ttl=64 time=3.558 ms
[edit interfaces]
lab@R4# run ping 172.27.0.10 detail count 2
PING 172.27.0.10 (172.27.0.10): 56 data bytes
64 bytes from 172.27.0.10 via ae1.0: icmp_seq=0 ttl=64 time=2.379 ms
64 bytes from 172.27.0.10 via ae1.0: icmp_seq=1 ttl=64 time=2.577 ms
[edit interfaces]
lab@R4# run ping 172.27.0.22 detail count 2
PING 172.27.0.22 (172.27.0.22): 56 data bytes
64 bytes from 172.27.0.22 via ae2.0: icmp_seq=0 ttl=64 time=2.552 ms
64 bytes from 172.27.0.22 via ae2.0: icmp_seq=1 ttl=64 time=2.615 ms
commit complete
• R2:
[edit interfaces ae0]
lab@R2# set aggregated-ether-options lacp passive
commit complete
• R4:
[edit interfaces]
lab@R4# set ae0 aggregated-ether-options lacp active
[edit interfaces]
lab@R4# set ae1 aggregated-ether-options lacp active
[edit interfaces]
lab@R4# set ae2 aggregated-ether-options lacp active
[edit interfaces]
lab@R4# show
...
ae0 {
aggregated-ether-options {
lacp {
active;
}
}
unit 0 {
family inet {
address 172.27.0.6/30;
}
}
}
ae1 {
[edit interfaces]
lab@R4# commit
commit complete
• R5:
[edit interfaces ae2]
lab@R5# set aggregated-ether-options lacp passive
commit complete
TASK VERIFICATION
The following output displays which member interfaces for the aggregated Ethernet bundles are
in the active mode. R4’s output shows that its local interface, which is designated with the
keyword Actor, is in the Active state. The remote interface of the local interface, which is
designated with the keyword Partner, is in the Passive state.
[edit interfaces]
lab@R4# run show lacp interfaces
Aggregated interface: ae0
LACP state: Role Exp Def Dist Col Syn Aggr Timeout Activity
ge-0/0/10 Actor No No Yes Yes Yes Yes Fast Active
ge-0/0/10 Partner No No Yes Yes Yes Yes Fast Passive
ge-0/0/11 Actor No No Yes Yes Yes Yes Fast Active
ge-0/0/11 Partner No No Yes Yes Yes Yes Fast Passive
ge-0/0/9 Actor No No Yes Yes Yes Yes Fast Active
ge-0/0/9 Partner No No Yes Yes Yes Yes Fast Passive
TASK 3
Ensure that the aggregated Ethernet bundle between R2 and R4 always
supports a bandwidth capacity of at least 2.5 Gbps. Traffic must not
be forwarded across this bundle if this requirement is not met at
any time.
TASK INTERPRETATION
With all three Gigabit links functional, the aggregated Ethernet link between R2 and R4 currently
has a bandwidth capacity of 3 Gbps. If any of the links fails, the bandwidth capacity will drop
below the required 2.5 Gbps. To accomplish this task you must enable the minimum-links
statement with a value of 3. This value will allow the routers to take the aggregated Ethernet
interface down if one of the three member links fails. Remember to enable this command on
both R2 and R4; failure to do so will cause one router to view the bundle as operational.
• R4:
[edit interfaces]
lab@R4# set ae0 aggregated-ether-options minimum-links 3
[edit interfaces]
lab@R4# commit
TASK VERIFICATION
Issuing the show interfaces ae0 command enables you to determine if the interface is
configured to go down if fewer than three operational member links are associated with it.
We can test this functionality by disabling any member interface of ae0. Once a member
interface is disabled, the aggregated Ethernet interface is declared down.
Note
Remember to delete the disable
statement from any interfaces that were
taken down to test failover scenarios.
Forgetting to do so might result in a point
deduction elsewhere in the exam.
[edit interfaces]
lab@R4# run show interfaces ae0 | match minimum
Flow control: Disabled, Minimum links needed: 3, Minimum bandwidth needed: 0
[edit interfaces]
lab@R4# run show interfaces terse | match ae0
ge-0/0/9.0 up up aenet --> ae0.0
ge-0/0/10.0 up up aenet --> ae0.0
ge-0/0/11.0 up up aenet --> ae0.0
ae0 up up
ae0.0 up up inet 172.27.0.6/30
[edit interfaces]
lab@R4# set ge-0/0/9 disable
[edit interfaces]
lab@R4# commit
commit complete
[edit interfaces]
lab@R4# run show interfaces terse | match ae0
ge-0/0/9.0 up down aenet --> ae0.0
ge-0/0/10.0 up up aenet --> ae0.0
Lab 1–14 • Implementing Device Infrastructure www.juniper.net
JNCIE Service Provider Bootcamp
ge-0/0/11.0 up up aenet --> ae0.0
ae0 up down
ae0.0 up down inet 172.27.0.6/30
[edit interfaces]
lab@R4# delete ge-0/0/9 disable
[edit interfaces]
lab@R4# commit
commit complete
TASK 4
Enable Graceful Restart for all routing protocols except BGP and
OSPF on the internal routers.
TASK INTERPRETATION
Turning on graceful restart is accomplished by enabling it globally under the [edit
routing-options] hierarchy. Then, you must disable it for any routing protocols in which you
do not want it to participate.
In this task, all internal routers must have graceful restart disabled for BGP. Only R5 is running
OSPF and requires that graceful restart be disabled for it.
TASK COMPLETION
• R1:
[edit interfaces ae1]
lab@R1# top edit routing-options
[edit routing-options]
lab@R1# set graceful-restart
[edit routing-options]
lab@R1# top edit protocols bgp
commit complete
[edit routing-options]
lab@R2# set graceful-restart
[edit routing-options]
lab@R2# top edit protocols bgp
commit complete
• R3:
R3 (ttyd0)
login: lab
Password:
lab@R3> configure
Entering configuration mode
[edit]
lab@R3# edit routing-options
[edit routing-options]
lab@R3# set graceful-restart
[edit routing-options]
lab@R3# top edit protocols bgp
commit complete
• R4:
[edit interfaces]
lab@R4# top edit routing-options
[edit routing-options]
lab@R4# set graceful-restart
[edit routing-options]
lab@R4# top edit protocols bgp
commit complete
• R5:
[edit routing-options]
lab@R5# set graceful-restart
[edit routing-options]
lab@R5# top edit protocols bgp
commit complete
TASK VERIFICATION
To check the status of graceful restart, you must examine each routing protocol for which it is
enabled or disabled. The following output displays the status of graceful restart for BGP, OSPF,
and IS-IS on R5. It is currently disabled for BGP and OSPF, but it is enabled for IS-IS.
[edit protocols ospf]
lab@R5# run show bgp neighbor | match graceful
Options: <GracefulRestartHelperDisabled>
Options: <GracefulRestartHelperDisabled>
TASK 5
High availability is required for the DC3 router connected to R3 and
R5. Configure a VRRP group in which R3 is the master for the
172.20.20.0/24 range. R5 must acquire mastership if three of R3’s
internal interfaces fail. If a failover condition occurs for the
VRRP group, and that failover condition is restored, R3 must not
regain mastership. Refer to the lab diagram for the specific
interfaces and virtual IP address.
commit complete
• R5:
[edit protocols ospf]
lab@R5# top edit interfaces ge-0/0/9
commit complete
TASK VERIFICATION
The show vrrp detail command contains all the information necessary to determine the
status of the VRRP group. Specifically, it gives you the state of the VRRP member, the VRRP
priority, the preempt status, the virtual IP address, and the interfaces being tracked. From this
output you can see if all the conditions of this task are met.
You can test a failover condition by setting the necessary interfaces on R3 to the disabled state.
First, set the ge-0/0/1 and ge-0/0/2 interfaces to the disabled state and commit the
configuration. R3 retains mastership for the VRRP group. Set the ge-0/0/3 interface on R3 to the
disabled state and commit the configuration again. R3 loses mastership to R5. You can now test
if R5 will retain the mastership if R3’s recently disabled interfaces are restored. Delete the
disable statements that you recently configured on R3’s interfaces and issue the show vrrp
detail command again. R5 now retains mastership for the VRRP as per the conditions in the
task.
• R3:
[edit interfaces ge-0/0/4 unit 0 family inet address 172.20.20.3/24 vrrp-group 1]
lab@R3# run show vrrp detail
Physical interface: ge-0/0/4, Unit: 0, Address: 172.20.20.3/24
Index: 73, SNMP ifIndex: 519, VRRP-Traps: disabled
Interface state: up, Group: 1, State: master, VRRP Mode: Active
Priority: 174, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
• R5:
[edit interfaces ge-0/0/9 unit 0 family inet address 172.20.20.5/24 vrrp-group 1]
lab@R5# run show vrrp detail
Physical interface: ge-0/0/9, Unit: 0, Address: 172.20.20.5/24
Index: 77, SNMP ifIndex: 531, VRRP-Traps: disabled
Interface state: up, Group: 1, State: backup, VRRP Mode: Active
Priority: 100, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
Preempt: yes, Accept-data mode: no, VIP count: 1, VIP: 172.20.20.100
Dead timer: 2.835s, Master priority: 174, Master router: 172.20.20.3
Virtual router uptime: 00:32:35
Tracking: disabled
• R3:
[edit interfaces ge-0/0/4 unit 0 family inet address 172.20.20.3/24 vrrp-group 1]
lab@R3# up 5
[edit interfaces]
lab@R3# set ge-0/0/1 disable
[edit interfaces]
lab@R3# set ge-0/0/2 disable
[edit interfaces]
lab@R3# commit
commit complete
[edit interfaces]
lab@R3# run show vrrp detail
Physical interface: ge-0/0/4, Unit: 0, Address: 172.20.20.3/24
Index: 73, SNMP ifIndex: 519, VRRP-Traps: disabled
Interface state: up, Group: 1, State: master, VRRP Mode: Active
Priority: 124, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
Preempt: no, Accept-data mode: no, VIP count: 1, VIP: 172.20.20.100
Advertisement Timer: 0.238s, Master router: 172.20.20.3
Virtual router uptime: 01:08:12, Master router uptime: 00:00:48
Virtual Mac: 00:00:5e:00:01:01
[edit interfaces]
lab@R3# set ge-0/0/3 disable
[edit interfaces]
lab@R3# commit
commit complete
[edit interfaces]
lab@R3# run show vrrp detail
Physical interface: ge-0/0/4, Unit: 0, Address: 172.20.20.3/24
Index: 73, SNMP ifIndex: 519, VRRP-Traps: disabled
Interface state: up, Group: 1, State: backup, VRRP Mode: Active
Priority: 99, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
Preempt: no, Accept-data mode: no, VIP count: 1, VIP: 172.20.20.100
Dead timer: 2.821s, Master priority: 100, Master router: 172.20.20.5
Virtual router uptime: 01:08:45
Tracking: enabled
Current priority: 99, Configured priority: 174
Priority hold time: disabled
Interface tracking: enabled, Interface count: 3
Interface Int state Int speed Incurred priority cost
ge-0/0/1.0 down 0 25
ge-0/0/2.0 down 0 25
ge-0/0/3.0 down 0 25
Route tracking: disabled
[edit interfaces]
lab@R3# delete ge-0/0/1 disable
[edit interfaces]
lab@R3# delete ge-0/0/2 disable
[edit interfaces]
lab@R3# delete ge-0/0/3 disable
[edit interfaces]
lab@R3# commit
commit complete
[edit interfaces]
lab@R3# run show vrrp detail
Physical interface: ge-0/0/4, Unit: 0, Address: 172.20.20.3/24
TASK 6
High availability is required for the data centers, DC1 and DC2,
that are connected to R2 and R4. Configure two VRRP groups in which
R2 is the master for the 172.20.21.0/24 range in VRRP group 100. R4
is the master for the 172.20.22.0/24 range in VRRP group 200. Use
802.1q tag values that match the corresponding VRRP group
identifiers. If the link between R2 and R1 fails, R4 must acquire
mastership for VRRP group 100. If any member interface of the ae0
interface fails, R2 must acquire mastership for VRRP group 200.
Refer to the Lab 1 diagram for the specific interfaces and virtual
IP addresses.
Question: Which VLAN ID values should you use for the units
associated with VRRP groups 100 and 200?
Answer: The unit associated with VRRP group 100 should use
VLAN ID 100. The unit associated with VRRP group 200 should
use VLAN ID 200.
TASK INTERPRETATION
This task is similar to the previous task, in that you are configuring VRRP again. However, the
interfaces involved in VRRP are being shared between two VRRP groups on two different logical
interfaces, which requires VLAN tagging to be enabled. Be careful when configuring the different
VRRP groups, and configure the VLAN IDs to be the same as the VRRP group values. We also
recommend that the unit number match the VLAN ID values.
[edit interfaces ge-0/0/3 unit 100 family inet address 172.20.21.2/24 vrrp-group
100]
lab@R2# set virtual-address 172.20.21.100
[edit interfaces ge-0/0/3 unit 100 family inet address 172.20.21.2/24 vrrp-group
100]
lab@R2# set priority 200
[edit interfaces ge-0/0/3 unit 100 family inet address 172.20.21.2/24 vrrp-group
100]
lab@R2# set track interface ge-0/0/1 priority-cost 101
[edit interfaces ge-0/0/3 unit 100 family inet address 172.20.21.2/24 vrrp-group
100]
lab@R2# up 4
[edit interfaces ge-0/0/3 unit 200 family inet address 172.20.22.2/24 vrrp-group
200]
Lab 1–24 • Implementing Device Infrastructure www.juniper.net
JNCIE Service Provider Bootcamp
lab@R2# set virtual-address 172.20.22.200
[edit interfaces ge-0/0/3 unit 200 family inet address 172.20.22.2/24 vrrp-group
200]
lab@R2# set priority 100
[edit interfaces ge-0/0/3 unit 200 family inet address 172.20.22.2/24 vrrp-group
200]
lab@R2# up 4
commit complete
• R4:
[edit protocols bgp]
lab@R4# top edit interfaces ge-0/0/2
[edit interfaces ge-0/0/2 unit 100 family inet address 172.20.21.4/24 vrrp-group
100]
lab@R4# set virtual-address 172.20.21.100
[edit interfaces ge-0/0/2 unit 100 family inet address 172.20.21.4/24 vrrp-group
100]
lab@R4# set priority 100
[edit interfaces ge-0/0/2 unit 100 family inet address 172.20.21.4/24 vrrp-group
100]
lab@R4# up 4
[edit interfaces ge-0/0/2 unit 200 family inet address 172.20.22.4/24 vrrp-group
200]
lab@R4# set virtual-address 172.20.22.200
[edit interfaces ge-0/0/2 unit 200 family inet address 172.20.22.4/24 vrrp-group
200]
lab@R4# set priority 200
[edit interfaces ge-0/0/2 unit 200 family inet address 172.20.22.4/24 vrrp-group
200]
lab@R4# set track interface ae0 priority-cost 101
[edit interfaces ge-0/0/2 unit 200 family inet address 172.20.22.4/24 vrrp-group
200]
lab@R4# up 4
commit complete
TASK VERIFICATION
The show vrrp detail command produces all necessary information to verify this task.
Then, by disabling a member interface in the ae0 bundle, you can examine the failover process
of VRRP group 200. Then, by disabling the ge-0/0/1 interface on R2, you can see the failover
process of VRRP group 100.
Note
Remember to delete the disable
statement from any interfaces that were
taken down to test failover scenarios.
Forgetting to do so might result in a point
deduction elsewhere in the exam.
• R4:
[edit interfaces ge-0/0/2]
lab@R4# run show vrrp detail
Physical interface: ge-0/0/2, Unit: 100, Vlan-id: 100, Address: 172.20.21.4/24
Index: 70, SNMP ifIndex: 542, VRRP-Traps: disabled
Interface state: up, Group: 100, State: backup, VRRP Mode: Active
Priority: 100, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
Preempt: yes, Accept-data mode: no, VIP count: 1, VIP: 172.20.21.100
Dead timer: 3.549s, Master priority: 200, Master router: 172.20.21.2
Virtual router uptime: 00:48:47
Tracking: disabled
commit complete
commit complete
• R2:
[edit interfaces ge-0/0/3]
lab@R2# run show vrrp detail
Physical interface: ge-0/0/3, Unit: 100, Vlan-id: 100, Address: 172.20.21.2/24
Index: 77, SNMP ifIndex: 528, VRRP-Traps: disabled
Interface state: up, Group: 100, State: master, VRRP Mode: Active
Priority: 200, Advertisement interval: 1, Authentication type: none
Delay threshold: 100, Computed send rate: 0
Preempt: yes, Accept-data mode: no, VIP count: 1, VIP: 172.20.21.100
Advertisement Timer: 0.576s, Master router: 172.20.21.2
Virtual router uptime: 00:59:59, Master router uptime: 00:59:51
Virtual Mac: 00:00:5e:00:01:64
Tracking: enabled
Current priority: 200, Configured priority: 200
Priority hold time: disabled
Interface tracking: enabled, Interface count: 1
Interface Int state Int speed Incurred priority cost
ge-0/0/1.0 up 1g 0
Route tracking: disabled
commit complete
TASK INTERPRETATION
To accomplish this task you must configure the router to communicate with the RADIUS server
with the secret key of Juniper. However, remember to configure this on all internal routers.
Forgetting to do so on a live exam will result in lost points for the task. There is no need to
commit the configuration after this task, but doing so does no harm.
TASK COMPLETION
• R1:
[edit protocols bgp]
lab@R1# top edit system
[edit system]
lab@R1# set radius-server 172.27.155.1 secret Juniper
[edit system]
lab@R2# set radius-server 172.27.155.1 secret Juniper
• R3:
[edit interfaces]
lab@R3# top edit system
[edit system]
lab@R3# set radius-server 172.27.155.1 secret Juniper
• R4:
[edit interfaces ge-0/0/2]
lab@R4# top edit system
[edit system]
lab@R4# set radius-server 172.27.155.1 secret Juniper
• R5:
[edit interfaces ge-0/0/9 unit 0 family inet address 172.20.20.5/24 vrrp-group 1]
lab@R5# top edit system
[edit system]
lab@R5# set radius-server 172.27.155.1 secret Juniper
TASK VERIFICATION
Communication with the RADIUS server cannot be verified yet.
TASK 8
Configure two local users, jack and jill, on all internal routers
and provide them with full access to the routers.
Question: Which predefined user class will give these users full
access to the routers?
TASK INTERPRETATION
This task requires you to configure two local users and assign them the super-user class.
The passwords that are given to them is completely up to you. However, remember these
passwords because you will use them to verify the users authorization levels.
[edit system]
lab@R1# set login user jill class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R1# commit
commit complete
• R2:
[edit system]
lab@R2# set login user jack class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R2# set login user jill class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R2# commit
commit complete
• R3:
[edit system]
lab@R3# set login user jack class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R3# set login user jill class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R3# commit
commit complete
[edit system]
lab@R4# set login user jill class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R4# commit
commit complete
• R5:
[edit system]
lab@R5# set login user jack class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R5# set login user jill class super-user authentication plain-text-password
New password:
Retype new password:
[edit system]
lab@R5# commit
commit complete
TASK VERIFICATION
To verify the task, log out of the router and then log in as user jack or jill. Once you have
logged in to the router, issue the show cli authorization command to view the
permissions assigned to the user.
[edit system]
lab@R1# exit configuration-mode
Exiting configuration mode
lab@R1> exit
R1 (ttyd0)
login: jack
Password:
jack@R1> exit
R1 (ttyd0)
login: lab
Password:
TASK 9
Create a user group named design on all internal routers. These
users will authenticate with the RADIUS server. This group will
have full access to the routers but will not be able to restart
system processes, reboot, halt the routers, or power down the
routers.
TASK INTERPRETATION
In this task, you create a user template that the router uses to assign permissions to users who
first authenticate with the RADIUS server. In this user template, you define a custom class that
gives full permissions but restricts the users from issuing any commands that contain the
statements restart, reboot, power-off, or halt.
TASK COMPLETION
• R1:
lab@R1> configure
Entering configuration mode
[edit]
lab@R1# edit system login
commit complete
commit complete
• R3:
[edit system]
lab@R3# edit login
commit complete
• R4:
[edit system]
lab@R4# edit login
• R5:
lab@R5> configure
Entering configuration mode
[edit system]
lab@R5# edit login
commit complete
TASK VERIFICATION
Currently, the RADIUS server is not usable, which means the design user template cannot be
tested in this manner. However, you can move the user jack to the design class, commit the
configuration, log out, and log in as jack to test the user template.
Note
Remember to return jack to the
super-user class when you finish
testing the user template. Forgetting to do
so might result in a point deduction in the
exam.
commit complete
Exiting configuration mode
lab@R1> exit
R1 (ttyd0)
login: jack
Password:
[edit]
jack@R1# edit system login
commit complete
Exiting configuration mode
jack@R1> exit
R1 (ttyd0)
login: lab
Password:
TASK 10
Create a user group named support on all internal routers. These
users will authenticate with the RADIUS server. Any users of this
group can only view the configuration and issue read-only commands.
TASK INTERPRETATION
This task is similar to the previous task in which you must create a user template. However, even
though it is possible to accomplish this task by issuing a list of deny-commands, as you did in
the previous task, it is not recommended. Doing so would be time consuming and it is possible
that a necessary command would not make it on the list.
A superior method to accomplish this task is to give the support user template the necessary
permissions.
TASK COMPLETION
• R1:
lab@R1> configure
Entering configuration mode
[edit]
lab@R1# edit system login
commit complete
• R2:
[edit system login]
lab@R2# set class support-class permissions [ view view-configuration ]
commit complete
commit complete
• R4:
[edit system login]
lab@R4# set class support-class permissions [ view view-configuration ]
commit complete
• R5:
[edit system login]
lab@R5# set class support-class permissions [ view view-configuration ]
commit complete
TASK VERIFICATION
Currently, the RADIUS server is not usable, which means the support user template cannot be
tested in this manner. However, you can move the user jack to the support class, commit the
configuration, log out, and log in as jack to test the user template.
Note
Remember to return jack to the
super-user class when you finish testing
the user template. Forgetting to do so might
result in a point deduction in the exam.
commit complete
Exiting configuration mode
lab@R1> exit
R1 (ttyd0)
login: jack
Password:
jack@R1> configure
^
unknown command.
jack@R1> exit
R1 (ttyd0)
login: lab
Password:
[edit]
lab@R1# edit system login
commit complete
TASK 11
Allow jack and jill to authenticate locally on the routers only if
the RADIUS server is unreachable.
TASK INTERPRETATION
By default, the router allows only local users to log in. To change this behavior, you must
configure the router to authenticate with the RADIUS server under the [edit system]
hierarchy.
Once under the [edit system] hierarchy level use the authentication-order
command to configure the router to authenticate users with the RADIUS server. Using only the
radius option will enable the router to authenticate all users with the RADIUS server. If the
router cannot communicate with the RADIUS server, it then allows local authentication to be
used. However, if the password and radius options are used, local users can log in to the
router even if the RADIUS server is reachable.
TASK COMPLETION
• R1:
[edit system login]
lab@R1# up
[edit system]
lab@R1# set authentication-order ?
Possible completions:
[ Open a set of values
password Traditional password authentication
radius Remote Authentication Dial-In User Service
tacplus TACACS+ authentication services
[edit system]
lab@R1# set authentication-order radius
[edit system]
lab@R1# commit
commit complete
• R2:
[edit system login]
lab@R2# up
[edit system]
lab@R2# set authentication-order radius
[edit system]
lab@R2# commit
commit complete
• R3:
[edit system login]
lab@R3# up
[edit system]
lab@R3# set authentication-order radius
[edit system]
lab@R3# commit
commit complete
• R4:
[edit system login]
lab@R4# up
[edit system]
lab@R4# set authentication-order radius
[edit system]
lab@R4# commit
commit complete
• R5:
[edit system login]
lab@R5# up
[edit system]
lab@R5# set authentication-order radius
[edit system]
lab@R5# commit
commit complete
TASK VERIFICATION
You have the opportunity to verify this task because the RADIUS server is currently unreachable.
Simply log out of the router and attempt to log in as user jack. You will receive a delay while the
router attempts to contact the RADIUS server. The Local password prompt is displayed
because the RADIUS server is unreachable. Enter the password you gave to the user jack at the
Local password prompt to log in to the router again.
[edit system]
lab@R1# exit configuration-mode
Exiting configuration mode
lab@R1> exit
R1 (ttyd0)
login: jack
Password:
Local password:
R1 (ttyd0)
login: lab
Password:
Local password:
TASK 12
Ensure that all internal routers disallow root access through the
console port.
Answer: All users that can authenticate with the router has
access through the console port.
TASK INTERPRETATION
By default, the root user is allowed access to the router through the console port. To disable
this functionality, you must mark the console port as insecure.
TASK COMPLETION
Note
When issuing the set console ?
command, you might notice the description
for the insecure option displays that it
disallows superuser access. Issuing this
command only denies root access to the
console port and not other users who have
super-user permissions.
• R1:
lab@R1> configure
[edit]
lab@R1# edit system ports
commit complete
• R2:
[edit system]
lab@R2# edit ports
commit complete
• R3:
[edit system]
lab@R3# edit ports
commit complete
• R4:
[edit system]
lab@R4# edit system ports
commit complete
• R5:
[edit system]
lab@R5# edit system ports
commit complete
TASK VERIFICATION
Attempt to log in to the router with user root and access is denied. You do not know the current
password for user root. You must change root password to verify this step. This confirms that
you have accomplished the task by denying root access through the console port.
Note
Receiving the Local password prompt
is expected because of the authentication
order we specified in a previous step.
commit complete
lab@R1> exit
R1 (ttyd0)
login: root
Password:
Local password:
Login incorrect
login: lab
Password:
Local password:
www.juniper.net Implementing Device Infrastructure • Lab 1–47
JNCIE Service Provider Bootcamp
TASK 13
Ensure that the control plane of router R5 is protected from
malicious attacks. Configure a firewall filter with the following
criteria:
– Permit essential protocols already running on the
router. For example, all IS-IS, OSPF, and LDP
adjacencies must be maintained.
– Ensure BGP messages are only accepted from configured
neighbors. Any additional BGP neighbors that are added
later must not require a configuration change to this
firewall filter.
– Allow any SSH connections from the 172.27.0.0/16 range.
Log and silently discard any SSH connections attempted
from outside this range.
– Allow RADIUS authentication messages.
– All other traffic must be silently discarded.
TASK INTERPRETATION
This task might seem complicated at first, but if you break it down to its individual parts it is less
overwhelming.
The first bullet stipulates that all essential protocols running on the routers must be permitted.
When examining R5 you can determine that it is running the following protocols: RSVP, LDP,
MPLS, BGP, IS-IS, OSPF, and VRRP. However, it is not necessary to provision a term that
accommodates IS-IS messages. These messages are not exchanged through IPv4 and will never
match any term in an IPv4 firewall filter.
The second bullet stipulates that BGP messages can be accepted only from configured peers.
Simply specifying each BGP neighbor that R5 has configured does not accomplish this task. Any
BGP neighbors that are added later necessitates configuration changes to this term. The correct
method is to use a prefix-list which contains an apply-path for the locally configured
BGP neighbors. This method scales well because no changes to the firewall filter are necessary if
BGP neighbors are added at a later date.
[edit firewall]
lab@R5# show | no-more
family inet {
filter protect-re {
term RSVP-allow {
from {
protocol rsvp;
}
then accept;
}
term LDP-allow {
from {
protocol [ tcp udp ];
port ldp;
}
then accept;
}
term BGP-allow {
from {
source-prefix-list {
configured-bgp-neighbors;
}
protocol tcp;
port bgp;
}
then accept;
}
term OSPF-allow {
from {
protocol ospf;
}
then accept;
}
term VRRP-allow {
from {
protocol vrrp;
}
then accept;
[edit firewall]
lab@R5# commit
commit complete
TASK VERIFICATION
There is no simple way to verify if a firewall filter is working. You must test each term individually
and some terms are not verifiable at this time.
[edit firewall]
lab@R5# run show ldp neighbor
Address Interface Label space ID Hold time
172.27.0.26 ge-0/0/1.0 172.27.255.3:0 13
172.27.0.21 ae2.0 172.27.255.4:0 10
[edit firewall]
lab@R5# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.58 ge-0/0/5.0 Full 10.255.3.1 128 39
[edit firewall]
lab@R5# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae2.0 R4 2 Up 20 52:54:0:0:c6:4
ge-0/0/1.0 R3 2 Up 6 56:68:29:7a:9e:2e
[edit firewall]
lab@R5# run show vrrp
Interface State Group VR state VR Mode Timer Type Address
ge-0/0/9.0 up 1 master Active A 0.758 lcl 172.20.20.5
vip 172.20.20.100
• R2:
[edit]
lab@R2# run ssh 172.27.255.5
The authenticity of host '172.27.255.5 (172.27.255.5)' can't be established.
RSA key fingerprint is 0c:d7:22:f8:ae:60:7b:60:12:40:df:e2:b4:2f:d1:c7.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '172.27.255.5' (RSA) to the list of known hosts.
lab@172.27.255.5's password:
--- JUNOS 12.3I20130406_1317_anjali (kernel) #1: 2013-04-06 13:40:14 UTC
[edit]
lab@R2# run ssh 172.27.255.5 source 172.20.21.2
ssh: connect to host 172.27.255.5 port 22: Operation timed out
TASK 14
Log and silently discard all instances of IPv4 or IPv6 traffic that
are coming from transit peers and have the source address of
172.27.0.0/16 or 2008:4498::/32. This information must be
recoverable after a reboot.
TASK INTERPRETATION
This task is simple in regards to creating an IPv4 firewall filter and an IPv6 firewall filter that
blocks traffic from the specified source addresses. However, the criterion of making this
information recoverable after a reboot might cause some confusion. Two methods are available
for collecting information on traffic that matches a firewall filter term; logging and syslogging.
The key difference is the log command stores the information in a volatile memory location,
which will not survive a reboot. The syslog command stores the information in a non-volatile
memory location, such as the hard drive or compact flash. You must use the syslog command
to correctly complete this task.
You must also configure a syslog file in which to store the logs. The firewall facility must be
specified to collect the necessary information.
TASK COMPLETION
• R5:
[edit firewall family inet filter protect-re]
lab@R5# up
[edit firewall]
lab@R5# edit family inet6 filter block-ipv6-int
[edit firewall]
lab@R5# show
family inet {
...
filter block-ipv4-int {
term int-src {
from {
source-address {
172.27.0.0/16;
}
}
then {
syslog;
discard;
}
}
term allow-rest {
then accept;
}
}
}
family inet6 {
filter block-ipv6-int {
term int-src {
from {
[edit firewall]
lab@R5# top edit system syslog file int-src-violations
commit complete
[edit firewall]
lab@R2# edit family inet6 filter block-ipv6-int
commit complete
TASK VERIFICATION
You can verify this task by logging in to the VR-device and pinging the directly connected
interfaces of routers R2 and R5 from T1 and T2, respectively. Then, you can view the recently
created syslog for the recording of the violation.
• VR-device:
root@vr-device> ping 172.27.0.37 routing-instance transit1 count 2
PING 172.27.0.37 (172.27.0.37): 56 data bytes
• R2:
[edit interfaces ge-0/0/2]
lab@R2# run show log int-src-violations
Jan 22 10:17:15 R2 clear-log[46110]: logfile cleared
Jan 22 10:21:09 R2 fwdd[1203]: ^A^EPFE_FW_SYSLOG_IP: FW:
^Ainterface-name^A^Lge-0/0/2.0 ^Aaction^A^AD ^Aprotocol-name^A^Dicmp
^Asource-address^A^K38.0.27.172 ^Adestination-address^A^K37.0.27.172
^Asource-port-or-type^A^E 8 ^Adestination-port-or-code^A^E 0
(^Acount^A^A1 packets)
Jan 22 10:21:10 R2 fwdd[1203]: ^A^EPFE_FW_SYSLOG_IP: FW:
^Ainterface-name^A^Lge-0/0/2.0 ^Aaction^A^AD ^Aprotocol-name^A^Dicmp
^Asource-address^A^K38.0.27.172 ^Adestination-address^A^K37.0.27.172
^Asource-port-or-type^A^E 8 ^Adestination-port-or-code^A^E 0
(^Acount^A^A1 packets)
Jan 22 10:21:33 R2 fwdd[1203]: PFE_FW_SYSLOG_IP6_ICMP: FW: ge-0/0/2.0 D icmpv6
SA 820:9844:0:0:0:0:0:2600 DA 2ff:0:0:0:0:100:ff:2500 type 135 code 0 (1
packets)
Jan 22 10:21:35 R2 last message repeated 2 times
TASK 15
On router R4, configure the syslog file Monitor-Agg-Eth to only log
information associated with its local aggregated Ethernet
interfaces. To conserve space on the routers, there can be only 20
files of this information stored locally. Each file can be no more
than 1 MB in size.
TASK INTERPRETATION
To complete this task, you must configure the syslog file Monitor-agg-Eth on router R4 to
the facility level of any and the severity level of any. There must not be anymore then 20 files
stored locally and each of those files cannot be larger then 1 MB. Then, you must configure the
syslog to only collect information in regards to R4’s local aggregated Ethernet interfaces. To
accomplish this part of the task, you must use the match option. Through the use of regular
expressions you can configure the syslog file to collect only the necessary information.
TASK COMPLETION
[edit system ports]
lab@R4# up 1 edit syslog file Monitor-Agg-Eth
commit complete
TASK VERIFICATION
To verify this task, set the disable option on R4’s local aggregated Ethernet interfaces,
commit the configuration, delete the disable option, and commit the configuration again.
Then, examine the Monitor-Agg-Eth syslog file for evidence of recent activity on the
aggregated Ethernet interfaces.
[edit system syslog file Monitor-Agg-Eth]
lab@R4# top set interfaces ae0 disable
commit complete
commit complete
TASK 16
Configure all internal routers to send any commands executed by
users through the CLI to the server located at 172.27.155.1.
TASK INTERPRETATION
To complete this task, you must configure the syslog utility to use the
interactive-commands facility when sending information to the syslog server located at
172.27.155.1. Instead of specifying a file name for the syslog, use the host statement instead,
which allows you to specify the server’s IP address.
TASK COMPLETION
• R1:
[edit system ports]
lab@R1# up 1 edit syslog host 172.27.155.1
commit complete
commit complete
• R3:
[edit system ports]
lab@R3# up 1 edit syslog host 172.27.155.1
commit complete
• R4:
[edit system syslog file Monitor-Agg-Eth]
lab@R4# up
commit complete
• R5:
[edit interfaces ge-0/0/5]
lab@R5# top edit system syslog host 172.27.155.1
commit complete
To verify this task, issue a few commands on any of the routers and then log in to the internal
server. Once you log in to the internal server, issue the cat/var/log/messages command.
This command displays the syslog messages that arrived from you entering commands on the
router.
• R1:
[edit system syslog host 172.27.155.1]
lab@R1# top
[edit]
lab@R1# edit system syslog host 172.27.155.1
• Internal server:
CentOS release 5.3 (Final)
Kernel 2.6.18-128.el5 on an i686
TASK 17
Ensure that the configuration of all internal routers is backed up
every 15 minutes to the internal server located at 172.27.155.1. Use
SCP to encrypt these transmissions and store the configurations in
the /var/tmp/ directory on the server. Use the root username with
the password Clouds to authenticate with the internal server. Use
the same credentials to log into the internal server to examine
these files.
TASK INTERPRETATION
To complete this task, configuration archiving must be configured. Configure the router to send
its configuration using SCP every 15 minutes. Be aware that the transmit interval is configured
in minutes. Configure the transmit-interval statement with a value of 15 to complete this
part.
The syntax for SCP to transfer the configuration is as follows “scp://
username:password@172.27.155.1:/var/tmp/”. Be sure to encase the command in
quotes. Failing to do so results in a syntax error.
TASK COMPLETION
• R1:
[edit system syslog host 172.27.155.1]
lab@R1# up 2
[edit system]
lab@R1# edit archival
commit complete
• R2:
[edit system syslog host 172.27.155.1]
lab@R2# up 2
[edit system]
lab@R2# edit archival
commit complete
• R3:
[edit system syslog host 172.27.155.1]
lab@R3# up 2
[edit system]
lab@R3# edit archival
commit complete
• R4:
[edit system syslog host 172.27.155.1]
lab@R4# up 2
[edit system]
lab@R4# edit archival
commit complete
• R5:
[edit system syslog host 172.27.155.1]
lab@R5# up 2
[edit system]
lab@R5# edit archival
commit complete
TASK VERIFICATION.
Note
You must log in to the internal server using
the root username and the password
Clouds to verify this task.
To verify this task, you must access the internal server and examine the /var/tmp/ directory.
However, the minimum transfer interval is 15 minutes. You might need to come back to this task
after working through the lab further to examine the files.
[root@centos /]# ls /var/tmp/
R1_juniper.conf.gz_20110629_212753
R2_juniper.conf.gz_20110629_212751
R3_juniper.conf.gz_20110629_212737
R4_juniper.conf.gz_20110628_225807
R5_juniper.conf.gz_20110627_225747
vr-device_juniper.conf.gz_20110629_105758
TASK 18
The backbone-mtu.slax commit script is available to assist you in
checking core interface MTU values. The commit script is located on
the internal server at 172.27.155.1 in the /etc/ directory. Because
the commit script might change in the future, configure all
internal routers to refresh and retrieve the commit script through
SCP. Use the root username with the password Clouds to authenticate
with the internal server.
TASK INTERPRETATION
To complete this task, you must first configure the router to communicate with the internal server
using SCP. Remember to specify the username and the directory in which the file is located. Even
though you specify the commit script name after the file statement, you must also specify the
commit script name in the source.
Once you configure the router to retrieve the commit script, and before you issue the commit
command, be sure to issue the refresh command. This is a configuration mode command
that acts like a operational mode command. After you issue the refresh command, enter the
necessary password and the router retrieves the commit script.
TASK COMPLETION
• R1:
[edit system archival]
lab@R1# up 1 edit scripts commit
commit complete
• R2:
[edit system archival]
lab@R2# up 1 edit scripts commit
commit complete
• R3:
[edit system archival]
lab@R3# up 1 edit scripts commit
commit complete
• R4:
[edit system archival]
lab@R4# up 1 edit scripts commit
commit complete
• R5:
[edit system archival]
lab@R5# up 1 edit scripts commit
commit complete
TASK VERIFICATION
You can verify this task by examining the warning message you receive when you issue a commit.
If you do not receive a warning message or if the commit fails, the task is not complete.
[edit system scripts commit]
lab@R1# commit
warning: MTU on backbone interface ge-0/0/3.0 is not set to 4484 (1514) Please
change the interface's physical MTU to 4484
warning: MTU on backbone interface ge-0/0/6.0 is not set to 4484 (1514) Please
change the interface's physical MTU to 4484
commit complete
TASK 19
Change any interface physical MTU value to the MTU value the commit
script recommends.
TASK INTERPRETATION
The commit script you applied in the last task detects physical MTU values on core interfaces
that are incorrect. Do as the commit script advises and change the physical MTU values to what
it recommends.
TASK COMPLETION
• R1:
[edit system scripts commit]
lab@R1# top edit interfaces
[edit interfaces]
lab@R1# set ge-0/0/3 mtu 4484
[edit interfaces]
lab@R1# set ge-0/0/6 mtu 4484
[edit interfaces]
lab@R1# commit
commit complete
• R2:
[edit system scripts commit]
lab@R2# top edit interfaces
[edit interfaces]
lab@R2# set ge-0/0/1 mtu 4484
[edit interfaces]
lab@R2# commit
commit complete
• R3:
[edit system scripts commit]
lab@R3# top edit interfaces
[edit interfaces]
lab@R3# set ge-0/0/1 mtu 4484
[edit interfaces]
lab@R3# set ge-0/0/3 mtu 4484
[edit interfaces]
lab@R3# commit
commit complete
• R4:
[edit system scripts commit]
lab@R4# top edit interfaces
[edit interfaces]
lab@R4# set ge-0/0/5 mtu 4484
[edit interfaces]
lab@R4# commit
commit complete
• R5:
[edit system scripts commit]
lab@R5# top edit interfaces
[edit interfaces]
lab@R5# set ge-0/0/1 mtu 4484
[edit interfaces]
lab@R5# commit
commit complete
TASK VERIFICATION
If the commit script does not issue a warning about an incorrect interface MTU value then this
task is complete.
STOP Tell your instructor that you have completed this lab.
Overview
In this lab, you will be given a list of tasks specific to IS-IS implementation to accomplish in a
timed setting. You will have 1 hour and 15 minutes to complete the simulation.
By completing this lab, you will perform the following tasks:
• Routers R1, R2, R3, R4, and R5 must be configured to participate in your IS-IS
domain. Each router’s system ID must be based on its loopback address. Configure
each router to support only one IS-IS adjacency per router pairing. Loss of R3 or R4
must not isolate any internal router. Configure the IS-IS areas and levels as shown in
the “IS-IS Implementation” lab diagram.
• The loopback addresses of R1 and R2 must not appear in the routing table of R5.
However, loopback address to loopback address reachability from all internal routers
is required.
• The routes associated with the link between R2 and T1, and the routes associated
with the link between R5 and T2 must appear as internal IS-IS routes within your
network. However, the IPv6 routes from these links must not appear in R1’s routing
table but must appear in R2’s routing table. The [edit routing-options]
hierarchy level on R1 cannot be altered to accomplish this task.
• Configure R1 to receive RIP routes from C1. Then configure R1 to send a summary
route to C1 only when R2’s loopback address is present in R1’s routing table. This
summary route should represent your internal IPv4 address space. The routes
received from C1 must be present in area 49.0001 as IS-IS external routes. These
individual routes must not appear in the routing table of R5. However, you must
ensure that R5 can reach these destinations.
• Configure R3 and R5 to receive OSPF routes from DC3. Create the most specific
summary route possible that represents these routes and redistribute the summary
route into IS-IS. This summary route must appear on R4 with a metric that is greater
than 300. However, it must appear on R1 and R2 with a metric that is less than 74.
• The 10.100.100.0/24 prefix is being used to reach destinations behind DC1 through
static routing on R2 and R4. Redistribute this prefix into IS-IS. Ensure R2 is the
primary path and R4 is the backup path for this prefix for R1. Ensure R4 is the
primary path and R2 is the backup path for this prefix for R5.
Implementing IS-IS
In this lab part, you will become familiar with implementing IS-IS as the IGP in your network. You
will be given a list of tasks that will require you to configure and monitor IS-IS operations.
Note
We recommend that you spend some time
investigating the current operation of your
routers. During the real exam, you might be
given routers that are operating
inefficiently. Investigating operating issues
now might save you a lot of time
troubleshooting strange issues later.
TASK 1
Routers R1, R2, R3, R4, and R5 must be configured to participate in
your IS-IS domain. Each router’s system ID must be based on its
loopback address. Configure each router to support only one IS-IS
adjacency per router pairing. Loss of R3 or R4 must not isolate any
internal router. Configure the IS-IS areas and levels as shown in
the “IS-IS Implementation” lab diagram.
Question: Which AFI value must you use for the IS-IS areas?
Answer: You must use the private AFI value of 49 for the IS-IS
areas.
TASK INTERPRETATION
This task can be split into two smaller tasks, and then you can proceed with each task. First, you
must base the system ID for each router using its corresponding loopback address. The method
you use to do this can vary, but as long as the system ID in the ISO address resembles the IPv4
address on the loopback interface, the criterion for this part of the task is complete.
Second, you must configure each router to have only one IS-IS adjacency per router pairing.
Each interface can only participate in Level 1 or Level 2, but not both. This excludes the
loopback interface because no router pairing can occur from it participating in Level 1 and Level
2.
Confusion might be caused when attempting to decide which area ID you must assign to R3 and
R4. R1 and R2 must form Level 1 adjacencies with R3 and R4, which requires R3 and R4 to
have the same area ID as R1 and R2. To complete this part of the task, configure the area ID of
49.0001 on R1, R2, R3, and R4; then configure the area ID of 49.0002 on R5.
Also, remember to add the family iso statement to all internal interfaces. Forgetting to do so
results in a a malfunctioning IS-IS network which is difficult to troubleshoot later on.
Note
The last part of this task not only applies to
this task but all remaining tasks for the
IS-IS part of this lab. For example, when
applying a policy that leaks routes from one
level to the other, ensure that the loss of R3
or R4 does not stop the leaking of the
routes into that level.
TASK COMPLETION
• R1:
R1 (ttyd0)
login: lab
Password:
[edit]
lab@R1# edit interfaces
[edit interfaces]
lab@R1# set lo0.0 family iso address 49.0001.0172.0027.2551.00
[edit interfaces]
lab@R1# set ge-0/0/3.0 family iso
[edit interfaces]
lab@R1# set ge-0/0/6.0 family iso
[edit interfaces]
lab@R1# set ae1.0 family iso
[edit interfaces]
lab@R1# top edit protocols isis
commit complete
• R2:
login: lab
Password:
[edit]
lab@R2# edit interfaces
[edit interfaces]
lab@R2# set lo0.0 family iso address 49.0001.0172.0027.2552.00
[edit interfaces]
lab@R2# set ge-0/0/1.0 family iso
[edit interfaces]
lab@R2# set ae0.0 family iso
[edit interfaces]
lab@R2# top edit protocols isis
[edit interfaces]
lab@R2# commit
• R3:
R3 (ttyd0)
login: lab
Password:
[edit]
lab@R3# edit interfaces
[edit interfaces]
lab@R3# set lo0.0 family iso address 49.0001.0172.0027.2553.00
[edit interfaces]
lab@R3# set ge-0/0/1.0 family iso
[edit interfaces]
lab@R3# set ge-0/0/2.0 family iso
[edit interfaces]
lab@R3# set ge-0/0/3.0 family iso
[edit interfaces]
lab@R3# top edit protocols isis
commit complete
• R4:
R4 (ttyd0)
login: lab
Password:
[edit]
lab@R4# edit interfaces
[edit interfaces]
lab@R4# set lo0.0 family iso address 49.0001.0172.0027.2554.00
[edit interfaces]
lab@R4# set ge-0/0/5.0 family iso
[edit interfaces]
lab@R4# set ae0.0 family iso
[edit interfaces]
lab@R4# set ae1.0 family iso
[edit interfaces]
lab@R4# set ae2.0 family iso
[edit interfaces]
lab@R4# top edit protocols isis
• R5:
R5 (ttyd0)
login: lab
Password:
[edit]
lab@R5# edit interfaces
[edit interfaces]
lab@R5# set lo0.0 family iso address 49.0002.0172.0027.2555.00
[edit interfaces]
lab@R5# set ge-0/0/1.0 family iso
[edit interfaces]
lab@R5# set ae2.0 family iso
[edit interfaces]
lab@R5# top edit protocols isis
commit complete
• R2:
[edit protocols isis]
lab@R2# run show interfaces terse lo0.0
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.2 --> 0/0
iso 49.0001.0172.0027.2552
• R3:
[edit protocols isis]
lab@R3# run show interfaces terse lo0.0
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.3 --> 0/0
iso 49.0001.0172.0027.2553
• R5:
[edit protocols isis]
lab@R5# run show interfaces terse lo0.0
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.5 --> 0/0
iso 49.0002.0172.0027.2555
TASK 2
The loopback addresses of R1 and R2 must not appear in the routing
table of R5. However, loopback address to loopback address
reachability from all internal routers is required.
TASK INTERPRETATION
By default, Level 1 routes are advertised to any Level 2 router. You must restrict this default
behavior by employing some form of restrictive route leaking. This restrictive route leaking must
occur on the border routers R3 and R4. An export policy must be configured that stops the
advertisement of R1’s and R2’s loopback addresses into Level 2. Then, on R3 and R4, you must
create and inject an aggregate route into Level 2 that represents those loopback addresses.
Although the task does not specify the route leaking direction, it is recommended to create a
policy that uses the to level option. This option directs which level the policy leaks routes to.
This helps clarify the policy and reduces unnecessary LSP flooding that can occur.
[edit routing-options]
lab@R3# set aggregate route 172.27.255/30
[edit routing-options]
lab@R3# top edit policy-options policy-statement leak-routes
commit complete
• R4:
[edit protocols isis]
lab@R4# top edit routing-options
[edit routing-options]
lab@R4# set aggregate route 172.27.255/30
[edit routing-options]
lab@R4# top edit policy-options policy-statement leak-routes
commit complete
• R4:
[edit protocols isis]
lab@R4# run show route 172.27.255/30
• R5:
[edit protocols isis]
lab@R5# run show route 172.27.255/30
TASK 3
The routes associated with the link between R2 and T1, and the
routes associated with the link between R5 and T2 must appear as
internal IS-IS routes within your network. However, the IPv6 routes
from these links must not appear in R1’s routing table but must
appear in R2’s routing table. The [edit routing-options] hierarchy
level on R1 cannot be altered to accomplish this task.
TASK INTERPRETATION
In the first part of this task, you must enable IS-IS on the ge-0/0/5 interface on R5 and the
ge-0/0/2 interface on R2. Then you must place these interfaces within the IS-IS protocol of the
respective routers. Place these interfaces into passive mode to inject these interface routes as
internal routes in your IS-IS domain. Route leaking on R3 and R4 is required to advertise these
routes to R1 and R2. Update your recently configured route leaking policy to accomplish this
part of the task.
The last task states that the IPv6 routes associated with these links cannot be present in R1’s
routing table. If the task allowed you to alter the [edit routing-options] hierarchy level,
you could simply add the IPv6 prefix in question to the martian route list, but this is not a
method you can use to accomplish this task. Also, you cannot use route leaking to accomplish
this task because R2 must have this route in its routing table. The only means necessary to
accomplish this task is to disable IPv6 routing on R2 by issuing the no-ipv6-routing
command under the [edit protocols isis] hierarchy level.
TASK COMPLETION
• R2:
[edit protocols isis]
lab@R2# set interface ge-0/0/2 passive
commit complete
• R5:
[edit protocols isis]
lab@R5# set interface ge-0/0/5 passive
commit complete
• R3:
[edit protocols isis]
lab@R3# top edit policy-options policy-statement leak-routes term r5-IPv4-int
commit complete
• R4:
[edit protocols isis]
lab@R4# top edit policy-options policy-statement leak-routes term r5-IPv4-int
commit complete
• R1:
[edit protocols isis]
lab@R1# set no-ipv6-routing
commit complete
TASK VERIFICATION
You can verify this task by examining the routing tables on R1, R2, and R5. The necessary routes
must appear in those routing tables. Also, verify that the IPv6 routes from R2 and R5 do not
appear in R1’s routing table.
• R1:
[edit protocols isis]
lab@R1# run show route protocol isis
• R2:
[edit protocols isis]
lab@R2# run show route protocol isis
• R5:
[edit protocols isis]
lab@R5# run show route protocol isis
Answer: No. The task does not state that the summary route
must be the most specific summary route possible. You can use
the 172.27.0.0/16 summary route to accomplish this task.
TASK INTERPRETATION
To complete this task, you must first configure R1 to exchange RIP routes with C1. You must
configure a generate route on R1 that is attached to a policy that allows it to accept only R2’s
loopback address as a contributing route, and then export this generate route into RIP through a
policy. The RIP routes on R1 that are being received from C1 must now be exported into IS-IS.
By default, the Junos OS does not flood Level 1 external routes to Level 2 routers. R5 does not
receive these routes and no action is required to accomplish this part of the task. However, you
must create aggregate routes on R3 and R4, which represents these routes, and flood these
aggregate routes into Level 2, which then allows R5 to reach these destinations.
TASK COMPLETION
• R1:
[edit protocols isis]
lab@R1# set export isis-out
[edit routing-options]
lab@R1# set generate route 172.27/16 policy isis-present
[edit routing-options]
lab@R1# top edit policy-options policy-statement rip-out term gen-rip
commit complete
• R3:
[edit policy-options policy-statement leak-routes]
lab@R3# top set routing-options aggregate route 172.16.16/21
commit complete
• R4:
[edit policy-options policy-statement leak-routes]
lab@R4# top set routing-options aggregate route 172.16.16/21
commit complete
TASK VERIFICATION
To verify this task, examine the routing tables of R1 and R5. The RIP routes should be present on
R1 and the summary route should be present on R5. Next, examine the generate route on R1
using the show route 172.16.16/21 exact detail command. In this output, you can
see that the only contributing route is the loopback address of R2. To ensure R1 is advertising
the generate route to C1, issue the show route advertising-protocol rip
172.27.0.29 command. Then, to ensure reachability from R5 to the prefixes C1 is
advertising, issue the ping 172.16.16.1 detail count 2 command on R5.
• R1:
[edit policy-options policy-statement isis-present term isis]
lab@R1# run show route 172.16.16/21
• R5:
[edit protocols isis]
lab@R5# run show route 172.16.16/21
TASK 5
Configure R3 and R5 to receive OSPF routes from DC3. Create the most
specific summary route possible that represents these routes and
redistribute the summary route into IS-IS. This summary route must
appear on R4 with a metric that is greater than 300. However, it
must appear on R1 and R2 with a metric that is less than 84.
TASK INTERPRETATION
To complete this task, you must first configure R3 and R5 to communicate through OSPF with
DC3. After establishing OSPF adjacencies, R3 and R5 receive OSPF routes in the 10.22.0.0/21
range. You must then create an aggregate route that represents these prefixes, and then
redistribute it into IS-IS. Be aware that when you redistribute the aggregate route into IS-IS, you
should not specify which protocol it originates from in the policy. Doing so might cause problems
when redistributing the route from R3 and R5. R3 might receive the redistributed aggregate
route from R5 with a route preference of 18. This preference is lower than the aggregate route
preference of 130 and causes R3 not to advertise its locally created aggregate route. When
creating the policy that redistributes the 10.22.0.0/21 prefix into IS-IS, remember to apply a
metric value to the route which is greater than 300.
By default, Level 2 external routes do not flood to Level 1 routers. You must adjust the route
leaking policy on R4 to allow the flooding of this route from R4 to the Level 1 routers; R1 and R2.
To ensure R4 receives the 10.22.0.0/21 prefix with a metric value that is greater than 300, you
must enable Level 2 wide metrics on R3, R4, and R5. This setting allows the prefix to appear on
these routers with a metric value that is greater than 300. By not enabling Level 1 wide metrics
on R1, R2, R3, and R4, the metric value is less than 84 on R1 and R2.
commit complete
• R4:
[edit policy-options policy-statement leak-routes term lvl-1-ext]
lab@R4# top set protocols isis level 2 wide-metrics-only
commit complete
• R5:
[edit protocols isis]
lab@R5# up 1 edit ospf
commit complete
TASK VERIFICATION
To verify this task, examine the routing tables on R1, R2, and R4. The 10.22.0.0/21 prefix
appears on R1 and R2 with a metric value that is less than 84. The same prefix appears on R4
with a metric value that is greater than 300.
• R1:
[edit policy-options policy-statement isis-out term rip-isis]
lab@R1# run show route 10.22/21
• R4:
[edit policy-options policy-statement leak-routes term lvl-2-ext]
lab@R4# run show route 10.22/21
TASK INTERPRETATION
To complete this task, you must redistribute the 10.100.100.0/24 static route found on R2 and
R4 into IS-IS. Redistributing the static route on R2 is fairly straightforward, however you must
leak this route into Level 2 to accomplish the redundancy criterion. It might be helpful to add a
tag value to the route when you redistribute it into IS-IS. This allows you to easily identify the
route in the route leaking policy found on R3.
To redistribute the static route on R4, you must add two terms to R4’s route leaking policy. The
first term must redistribute the route into Level 2. The second term must redistribute the route
into Level 1. However, when injecting the route into Level 1, you must add a metric value that
makes it less preferable than the static route R2 is injecting into Level 1.
Then, you must configure a route leaking policy on R3 to leak the 10.100.100.0/24 prefix, that is
present in Level 1, into Level 2. This satisfies the redundancy criterion for this task.
commit complete
• R4:
[edit policy-options policy-statement leak-routes term lvl-2-ext]
lab@R4# up 1 edit term static-DC-lvl-1
commit complete
• R3:
[edit protocols isis]
lab@R3# top edit policy-options policy-statement leak-routes term
DC1-lvl-1-to-lvl-2
commit complete
• R5:
[edit protocols isis]
lab@R5# run show route 10.100.100/24
TASK 7
Configure all interfaces participating in a level 2 adjacency to
monitor the adjacencies using sub-second link failure detection. If
the local router is the DR for a level 1 broadcast segment, the
interface involved must have an IS-IS hold-time value of 2 seconds.
TASK INTERPRETATION
To achieve sub-second failover capabilities with all Level 2 adjacencies, you must configure BFD
on the interfaces that require it. Configure BFD with a minimum-interval value of 333
milliseconds or less. This gives a Detect time value of less than one second.
To complete the next part of this task, you must adjust the hold-time value for all Level 1
adjacencies to 6 seconds. Alternatively, you can configure the hello-interval value to 2
seconds which results in a 6 second hold-time value. There is no need to configure non-DR
interfaces differently than DR interfaces. Configuring all Level 1 interfaces with a hold-time
value of 6 results in DR interfaces having a hold-time value of 2. If you configure DR
interfaces with a hold-time value of 2 the resulting hold-time value is actually 1 second.
TASK COMPLETION
• R1:
[edit policy-options policy-statement isis-out term rip-isis]
lab@R1# top edit protocols isis
commit complete
• R2:
[edit policy-options policy-statement static-isis term DC1-prefix]
lab@R2# top edit protocols isis
commit complete
• R3:
[edit policy-options policy-statement leak-routes term DC1-lvl-1-to-lvl-2]
lab@R3# top edit protocols isis
commit complete
• R4:
[edit policy-options policy-statement leak-routes]
lab@R4# top edit protocols isis
commit complete
commit complete
TASK VERIFICATION
To verify the hold-time values, issue the show isis interface detail command on
R1, R2, R3, and R4. To verify the BFD detection and failover timers, issue the show bfd
session command on R3, R4, and R5.
• R1:
[edit protocols isis]
lab@R1# run show isis interface detail
IS-IS interface database:
ae1.0
Index: 76, State: 0x6, Circuit id: 0x1, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 2.000 6 R4.04 (not us)
ge-0/0/3.0
Index: 77, State: 0x6, Circuit id: 0x2, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 0.666 2 R1.02 (us)
ge-0/0/6.0
Index: 74, State: 0x6, Circuit id: 0x3, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 0.666 2 R1.03 (us)
lo0.0
Index: 65, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled
Adjacency advertisement: Advertise
• R2:
[edit protocols isis]
lab@R2# run show isis interface detail
IS-IS interface database:
ae0.0
Index: 74, State: 0x6, Circuit id: 0x1, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 2.000 6 R4.05 (not us)
ge-0/0/1.0
Index: 70, State: 0x6, Circuit id: 0x1, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 2.000 6 R1.02 (not us)
ge-0/0/2.0
Index: 71, State: 0x4, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 0 64 10 Passive
2 0 64 10 Passive
lo0.0
Index: 65, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 0 64 0 Passive
2 0 64 0 Passive
lo0.32768
Index: 64, State: 0x4, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 0 64 0 Passive
2 0 64 0 Passive
• R3:
[edit protocols isis]
lab@R3# run show isis interface detail
IS-IS interface database:
2 sessions, 2 clients
Cumulative transmit rate 13.3 pps, cumulative receive rate 13.3 pps
• R4:
[edit protocols isis]
lab@R4# run show isis interface detail
IS-IS interface database:
ae0.0
Index: 75, State: 0x6, Circuit id: 0x5, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 0.666 2 R4.05 (us)
ae1.0
Index: 76, State: 0x6, Circuit id: 0x4, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 10 0.666 2 R4.04 (us)
ae2.0
Index: 77, State: 0x6, Circuit id: 0x3, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 10 s
2 sessions, 2 clients
Cumulative transmit rate 13.3 pps, cumulative receive rate 13.3 pps
• R5:
[edit protocols isis]
lab@R5# run show bfd session
Detect Transmit
Address State Interface Time Interval Multiplier
172.27.0.21 Up ae2.0 0.450 0.150 3
172.27.0.26 Up ge-0/0/1.0 0.450 0.150 3
2 sessions, 2 clients
Cumulative transmit rate 13.3 pps, cumulative receive rate 13.3 pps
TASK 8
Configure the routers in both areas to authenticate hello PDUs
using the unencrypted password of Juniper. Configure the routers in
area 49.0001 to authenticate LSPs using the encrypted password of
JuniperRocks. No routing disruption can occur between R3 and R4
during this process.
commit complete
• R2:
[edit protocols isis]
lab@R2# set interface all level 1 hello-authentication-type simple
commit complete
commit complete
• R4:
[edit protocols isis]
lab@R4# set interface ae0 level 1 hello-authentication-type simple
commit complete
• R5:
[edit protocols isis]
lab@R5# set interface all level 2 hello-authentication-type simple
Commit complete
TASK VERIFICATION
To verify this task, issue the show isis authentication command on all the internal
routers. Also, examine the IS-IS adjacencies to ensure that they were maintained. You will need
to remove the no-authentication-check option on R3 and R4 to truly verify this task.
Once you have verified the correct authentication keys have been configured you do not need to
reconfigure the no-authentication-check feature.
• R3:
[edit protocols isis]
lab@R3# delete no-authentication-check
commit complete
• R4:
[edit protocols isis]
lab@R4# delete no-authentication-check
commit complete
• R1:
[edit protocols isis]
lab@R1# run show isis authentication
Interface Level IIH Auth CSN Auth PSN Auth
ae1.0 1 Simple MD5 MD5
ge-0/0/3.0 1 Simple MD5 MD5
ge-0/0/6.0 1 Simple MD5 MD5
• R2:
[edit protocols isis]
lab@R2# run show isis authentication
Interface Level IIH Auth CSN Auth PSN Auth
ae0.0 1 Simple MD5 MD5
ge-0/0/1.0 1 Simple MD5 MD5
• R5:
[edit protocols isis]
lab@R5# run show isis authentication
Interface Level IIH Auth CSN Auth PSN Auth
ae2.0 2 Simple None None
ge-0/0/1.0 2 Simple None None
TASK 9
All IS-IS LSPs should be valid for one hour.
TASK INTERPRETATION
To complete this task, you must adjust the LSP lifetime on each internal router to 3,600 seconds.
This allows the LSPs to remain valid in the IS-IS link state database for 1 hour.
commit complete
• R2:
[edit protocols isis]
lab@R2# set lsp-lifetime 3600
commit complete
• R3:
[edit protocols isis]
lab@R3# set lsp-lifetime 3600
commit complete
• R4:
[edit protocols isis]
lab@R4# set lsp-lifetime 3600
commit complete
• R5:
[edit protocols isis]
lab@R5# set lsp-lifetime 3600
commit complete
• R2:
[edit protocols isis]
lab@R2# run show isis overview
Instance: master
Router ID: 172.27.255.2
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 3600
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Enabled
Restart duration: 210 sec
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Wide metrics are enabled, Narrow metrics are enabled
• R4:
[edit protocols isis]
lab@R4# run show isis overview
Instance: master
Router ID: 172.27.255.4
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 3600
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Enabled
Restart duration: 210 sec
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Wide metrics are enabled
• R5:
[edit protocols isis]
lab@R5# run show isis overview
Instance: master
STOP Tell your instructor that you have completed this lab.
In this lab, you will be given a list of tasks specific to OSPF implementation to accomplish in a
timed setting. You will have 1 hour and 15 minutes to complete the simulation.
By completing this lab, you will perform the following tasks:
• Configure all internal routers to route traffic using OSPF. Configure the OSPF areas as
shown on the “OSPF Implementation” lab diagram.
• Ensure that no OSPF DR or BDR exists among your internal routers.
• Routers R1, R3, and R4 must authenticate all OSPF exchanges within Area 0 using
the unencrypted password of Juniper.
• Ensure that all OSPF links with the following bandwidth values are assigned the
following OSPF cost values.
– 1 Gbps = 50
– 2 Gbps = 25
– 3 Gbps = 16
• If R4 reboots, configure it to wait 240 seconds after the OSPF instance has started
before passing transit traffic.
• Configure the OSPF adjacencies over the ae0 link to be declared down if 2 hello
packets are missed.
• The interface routes for the links between R5 and T2, and R2 and T1 must appear on
Area 0 routers as internal OSPF routes. No OSPF adjacencies can form over these
links.
• Configure R1 to exchange RIP routes with C1. Create the most specific summary
route possible that represents these routes and redistribute the summary route into
OSPF. This summary route must be present on R2.
• Configure R3 and R5 to receive RIP routes from DC3. All other routers in your OSPF
domain must be able to reach these destinations. However, the primary path to these
destinations must lead through R3. Even R5 must use R3 as the primary path for
these destinations.
• No Type 5 or Type 3 LSAs are allowed in Area 2. R5 must use R3 to reach unknown
destinations. R5 must use R4 to reach unknown destinations only if the link between
R5 and R3 fails. Configure R3 to attach a metric of 10 and R4 to attach a metric of 5
to their respective default routes they inject into Area 2.
Implementing OSPF
In this lab part, you will become familiar with implementing OSPF as the IGP in your network. You
will be given a list of tasks that will require you to configure and monitor OSPF operations.
TASK 1
Configure all internal routers to route traffic using OSPF.
Configure the OSPF areas as shown on the “OSPF Implementation” lab
diagram.
Answer: You must configure the OSPF Area 0, Area 1, and Area
2.
TASK INTERPRETATION
To complete this task, you must configure the OSPF area boundaries as shown on the “OSPF
Implementation” lab diagram. However, if you read on to the seventh task for this part, you will
find that you must redistribute IPv6 routes into OSPF. This requires you to configure OSPFv2 and
OSPFv3 to accommodate both IPv4 and IPv6 routes within your network. Configuring both
protocols now will save you time and effort.
Although not explicitly shown, place the loopback interface within Area 0 if the router is
participating in Area 0. For non-Area 0 routers, place the loopback interface in the area in which
the routers reside. This part of the task is only necessary for OSPFv2 and is not applicable for
OSPFv3.
TASK COMPLETION
• R1:
Welcome to the cloud
password is Clouds
R1 (ttyd0)
login: lab
Password:
[edit]
lab@R1# edit protocols ospf
commit complete
• R2:
Welcome to the cloud
password is Clouds
R2 (ttyd0)
login: lab
Password:
[edit]
lab@R2# edit protocols ospf
commit complete
• R3:
Welcome to the cloud
password is Clouds
R3 (ttyd0)
login: lab
Password:
[edit]
lab@R3# edit protocols ospf
commit complete
• R4:
Welcome to the cloud
password is Clouds
R4 (ttyd0)
login: lab
Password:
[edit]
lab@R4# edit protocols ospf
commit complete
• R5:
Welcome to the cloud
password is Clouds
R5 (ttyd0)
login: lab
Password:
[edit]
lab@R5# edit protocols ospf
commit complete
TASK VERIFICATION
Issue the show ospf neighbors and show ospf3 neighbors commands on all internal
routers to verify the operation of OSPFv2 and OSPFv3. The task is complete if all adjacencies
reach the Full state.
• R1:
[edit protocols ospf3]
lab@R1# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.9 ae1.0 Full 172.27.255.4 128 39
172.27.0.13 ge-0/0/6.0 Full 172.27.255.3 128 39
172.27.0.2 ge-0/0/3.0 Full 172.27.255.2 128 35
• R3:
[edit protocols ospf3]
lab@R3# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.14 ge-0/0/1.0 Full 172.27.255.1 128 33
172.27.0.18 ge-0/0/2.0 Full 172.27.255.4 128 34
172.27.0.25 ge-0/0/3.0 Full 172.27.255.5 128 32
• R4:
[edit protocols ospf3]
lab@R4# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.10 ae1.0 Full 172.27.255.1 128 36
172.27.0.17 ge-0/0/5.0 Full 172.27.255.3 128 32
172.27.0.5 ae0.0 Full 172.27.255.2 128 38
172.27.0.22 ae2.0 Full 172.27.255.5 128 37
• R5:
[edit protocols ospf3]
lab@R5# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.21 ae2.0 Full 172.27.255.4 128 35
172.27.0.26 ge-0/0/1.0 Full 172.27.255.3 128 37
TASK 2
Ensure that no OSPF DR or BDR exists among your internal routers.
Answer: Currently, one DR and one BDR are present for each
OSPFv2 and OSPFv3 pairing. Before completing this task, you
have 14 DRs and 14 BDRs in your network.
TASK INTERPRETATION
You might believe you can accomplish this task by setting the OSPF interface priority value to 0,
which renders the router ineligible to be the DR or BDR for that broadcast domain. However,
doing so causes all OSPF adjacencies to become stuck in the two-way state so LSA exchanges
cannot occur.
To accomplish this task, you must configure all OSPF links with point-to-point interfaces.
Because the router does not consider the link to be a broadcast domain there is no need for a
DR or BDR. Technically, you must also set the loopback interface for all routers as an OSPF
point-to-point or passive interface. Although, failing to do so on a real exam will likely not result
in point loss.
TASK COMPLETION
• R1:
[edit protocols ospf3]
lab@R1# set area 0 interface ae1 interface-type p2p
commit complete
• R2:
[edit protocols ospf3]
lab@R2# set area 1 interface ae0 interface-type p2p
commit complete
• R3:
[edit protocols ospf3]
lab@R3# set area 0 interface ge-0/0/2 interface-type p2p
commit complete
• R4:
[edit protocols ospf3]
lab@R4# set area 0 interface ge-0/0/5 interface-type p2p
commit complete
• R5:
[edit protocols ospf3]
lab@R5# set area 2 interface ge-0/0/1 interface-type p2p
commit complete
TASK VERIFICATION
To verify this task, issue the show ospf interface and show ospf3 interface
commands. The State field must indicate either PtToPt or DRother for the task to be
complete.
• R1:
[edit protocols ospf]
lab@R1# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ae1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ge-0/0/6.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
ge-0/0/3.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 1
• R3:
[edit protocols ospf]
lab@R3# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ge-0/0/1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ge-0/0/2.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
ge-0/0/3.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
• R4:
[edit protocols ospf]
lab@R4# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ae1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ge-0/0/5.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
ae0.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 1
ae2.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
• R5:
[edit protocols ospf]
lab@R5# run show ospf interface
TASK 3
Routers R1, R3, and R4 must authenticate all OSPF exchanges within
area 0 using the unencrypted password of Juniper.
TASK INTERPRETATION
To complete this task configure the interfaces that are within Area 0 on R1, R3, and R4 to use
plain text authentication. Then use a key value of Juniper.
TASK COMPLETION
• R1:
[edit protocols ospf]
lab@R1# set area 0 interface ae1 authentication simple-password Juniper
commit complete
• R3:
[edit protocols ospf]
lab@R3# set area 0 interface ge-0/0/1 authentication simple-password Juniper
commit complete
• R4:
[edit protocols ospf]
lab@R4# set area 0 interface ge-0/0/5 authentication simple-password Juniper
commit complete
TASK VERIFICATION
To verify this task, issue the show ospf neighbor command on R1, R3, and R4. If the OSPF
adjacencies in Area 0 remain in the Full state, then the task is complete.
• R1:
[edit protocols ospf]
lab@R1# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.9 ae1.0 Full 172.27.255.4 128 37
172.27.0.13 ge-0/0/6.0 Full 172.27.255.3 128 33
172.27.0.2 ge-0/0/3.0 Full 172.27.255.2 128 34
• R3:
[edit protocols ospf]
lab@R3# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.14 ge-0/0/1.0 Full 172.27.255.1 128 36
172.27.0.18 ge-0/0/2.0 Full 172.27.255.4 128 33
172.27.0.25 ge-0/0/3.0 Full 172.27.255.5 128 39
• R4:
[edit protocols ospf]
lab@R4# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.10 ae1.0 Full 172.27.255.1 128 36
172.27.0.17 ge-0/0/5.0 Full 172.27.255.3 128 39
172.27.0.5 ae0.0 Full 172.27.255.2 128 39
172.27.0.22 ae2.0 Full 172.27.255.5 128 37
TASK 4
Ensure that all OSPF links with the following bandwidth values are
assigned the following OSPF cost values.
TASK INTERPRETATION
At first, this task might seem complex with the cost, or metric, values that you must apply to
different interfaces. One very time-consuming method to accomplish this task is to configure
each OSPF interface to the specific metric value that the task lists. This method is inferior and
unnecessary. The quick and superior method is to use the reference-bandwidth
command, which automatically calculates interface cost values. To complete this task, use the
reference-bandwidth command with a value of 50g on each router.
Note
Remember to configure OSPFv2 and
OSPFv3 with the correct
reference-bandwidth value.
Forgetting to do so results in two different
routing topologies.
TASK COMPLETION
• R1:
[edit protocols ospf]
lab@R1# set reference-bandwidth 50g
commit complete
• R2:
[edit protocols ospf]
lab@R2# set reference-bandwidth 50g
commit complete
commit complete
• R4:
[edit protocols ospf]
lab@R4# set reference-bandwidth 50g
commit complete
• R5:
[edit protocols ospf]
lab@R5# set reference-bandwidth 50g
commit complete
TASK VERIFICATION
To verify this task, issue show ospf interface detail and show ospf3 interface
detail commands on each internal router. The output must display the cost values defined by
the task.
• R1:
[edit protocols ospf]
lab@R1# run show ospf interface detail
Interface State Area DR ID BDR ID Nbrs
ae1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.10, Mask: 255.255.255.252, MTU: 1500, Cost: 25
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTC
Protection type: None
Topology default (ID 0) -> Cost: 25
• R2:
[edit protocols ospf]
lab@R2# run show ospf interface detail
Interface State Area DR ID BDR ID Nbrs
ae0.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.5, Mask: 255.255.255.252, MTU: 1500, Cost: 16
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: None
Protection type: None
• R3:
[edit protocols ospf]
lab@R3# run show ospf interface detail
Interface State Area DR ID BDR ID Nbrs
ge-0/0/1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.13, Mask: 255.255.255.252, MTU: 1500, Cost: 50
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTC
Protection type: None
Topology default (ID 0) -> Cost: 50
ge-0/0/2.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.17, Mask: 255.255.255.252, MTU: 1500, Cost: 50
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTC
Protection type: None
Topology default (ID 0) -> Cost: 50
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
Type: LAN, Address: 172.27.255.3, Mask: 255.255.255.255, MTU: 65535, Cost: 0
Adj count: 0, Passive
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
• R4:
[edit protocols ospf]
lab@R4# run show ospf interface detail
Interface State Area DR ID BDR ID Nbrs
ae1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.9, Mask: 255.255.255.252, MTU: 1500, Cost: 25
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTC
Protection type: None
Topology default (ID 0) -> Cost: 25
ge-0/0/5.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.18, Mask: 255.255.255.252, MTU: 1500, Cost: 50
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTC
Protection type: None
Topology default (ID 0) -> Cost: 50
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
Type: LAN, Address: 172.27.255.4, Mask: 255.255.255.255, MTU: 65535, Cost: 0
Adj count: 0, Passive
• R5:
[edit protocols ospf]
lab@R5# run show ospf interface detail
Interface State Area DR ID BDR ID Nbrs
ae2.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
Type: P2P, Address: 172.27.0.22, Mask: 255.255.255.252, MTU: 1500, Cost: 25
Adj count: 1
TASK 5
If R4 reboots, configure it to wait 240 seconds after the OSPF
instance has started before passing transit traffic.
TASK INTERPRETATION
To complete this task, you must configure R4 to enter the overloaded mode for 240 seconds with
OSPFv2 and OSPFv3 when the router reboots. Use the overload timeout 240 command at
the [edit protocols ospf] and [edit protocols ospf3] hierarchy levels to
accomplish this task.
commit complete
TASK VERIFICATION
To verify this task, examine a prefix from a router that is reachable through R4; this cannot be an
address that resides on R4. Next, you can reboot the router, or bounce the OSPF protocol, and
examine the prefix again. Traffic now avoids R4 for 240 seconds. However, verifying this task by
rebooting R4, or bouncing OSPF, might take more time than it is worth. You can also verify this
task by removing the timeout option and examining prefixes that route through R4.
Note
If you verify this task by removing the
timeout option, be sure to replace it once
you finish your verification.
• R5:
[edit protocols ospf]
lab@R5# run show route 172.27.255.2
• R4:
[edit protocols ospf]
lab@R4# delete overload timeout
commit complete
• R5:
[edit protocols ospf]
lab@R5# run show route 172.27.255.2
• R4:
[edit protocols ospf]
lab@R4# up 1 set ospf3 overload timeout 240
commit complete
• R5:
[edit protocols ospf]
lab@R5# run show route 172.27.255.2
TASK INTERPRETATION
By default, the Junos OS declares an OSPF adjacency down if it misses 4 hello packets in a 40
seconds window. To complete this task, you must configure R2 and R4 to declare the adjacency
between them as down if 2 hello packets are missed. To accomplish this criteria, change the
hello-interval to 20 seconds or the dead-interval to 20 seconds.
Note
Notice that the task refers to more than
one OSPF adjacency. Remember to
configure the OSPFv3 adjacency with the
correct hello-interval or
dead-interval setting.
TASK COMPLETION
• R2:
[edit protocols ospf]
root@R2# set area 1 interface ae0 dead-interval 20
commit complete
• R4:
[edit protocols ospf]
root@R4# set area 1 interface ae0 dead-interval 20
commit complete
• R4:
[edit protocols ospf]
root@R4# run show ospf interface ae0.0 detail | match hello
Hello: 10, Dead: 20, ReXmit: 5, Not Stub
TASK 7
The interface routes for the links between R5 and T2, and R2 and T1
must appear on area 0 routers as internal OSPF routes. No OSPF
adjacencies can form over these links.
TASK INTERPRETATION
To complete this task, you must apply the OSPF passive option to R5’s ge-0/0/5 interface and
R2’s ge-0/0/2 interface, which places these interfaces in their respective areas.
As with previous tasks, this task applies to OSPFv2 and OSPFv3. Remember to configure the
passive option for the necessary interfaces within each protocol.
TASK COMPLETION
• R2:
commit complete
• R5:
[edit protocols ospf]
root@R5# set area 2 interface ge-0/0/5 passive
commit complete
TASK VERIFICATION
Issue the show ospf interface ge-0/0/2.0 detail and show ospf3 interface
ge-0/0/2.0 detail commands on R2. Then issue the show ospf interface ge-0/
0/5.0 detail and show ospf3 interface ge-0/0/5.0 detail commands on R5.
These commands display the current interface mode, which should be passive.
Examine the routing table of an ABR to determine if the interface routes are now internal OSPF
routes. If the two IPv4 and the two IPv6 routes in question appear in the ABR’s routing table as
internal OSPF routes, this task is complete.
• R2:
[edit protocols ospf]
root@R2# run show ospf interface ge-0/0/2.0 detail
Interface State Area DR ID BDR ID Nbrs
ge-0/0/2.0 DRother 0.0.0.1 0.0.0.0 0.0.0.0 0
Type: LAN, Address: 172.27.0.37, Mask: 255.255.255.252, MTU: 1500, Cost: 50
Adj count: 0, Passive
Hello: 10, Dead: 40, ReXmit: 5, Not Stub
Auth type: None
Protection type: None
Topology default (ID 0) -> Passive, Cost: 50
• R1:
[edit protocols ospf]
root@R1# run show route 172.27.0.56/30
TASK INTERPRETATION
To complete this task, configure the RIP protocol on R1 to exchange RIP routes with C1. When
R1 receives the RIP routes, create an aggregate route that represents these routes, and
redistribute that aggregate route into OSPF.
The key requirement of this task is to have this summary route appear on R2. Currently, Area 1
is not an OSPF stub area and Type 5 LSAs are accepted; the summary route from R1 is present
on R2 without further intervention. This part of the task might seem simple, but keep in mind for
later tasks that because of this task, Area 1 must not restrict Type 5 LSAs.
TASK COMPLETION
• R1:
[edit protocols ospf]
lab@R1# up 1 edit rip group rip
commit complete
commit complete
TASK VERIFICATION
To verify this task examine R2’s routing table for the external OSPF route that represents the RIP
routes.
• R2:
[edit protocols ospf]
lab@R2# run show route 172.16.16/21
commit complete
commit complete
• R5:
[edit protocols ospf]
lab@R5# up 1 edit rip group rip
commit complete
commit complete
TASK VERIFICATION
To verify this task, issue the show route 10.22/21 command on R1, R4, and R5. Each
router must have specific routing information that points towards R3 for the RIP routes
advertised by DC3. Then, the routers must have a less specific 10.22.0.0/21 route that points
towards R5. Then, R5 must prefer the external OSPF routes over its locally received RIP routes
for this prefix. Once you verify these criteria, you can consider the task complete.
• R1:
[edit protocols ospf]
lab@R1# run show route 10.22/21
• R5:
[edit protocols ospf]
lab@R5# run show route 10.22/21
TASK INTERPRETATION
Restricting LSA flooding is a function of OSPF stub areas. A totally-stubby area restricts the
flooding of Type 5 and Type 3 LSAs into the area, however the ABR injects a default route as a
Type 3 LSA. To accomplish this task, you must configure Area 2 as a not-so-stubby totally-stubby
area. This results in both ABRs injecting default routes into the area as Type 7 LSAs.
You must configure the R3 to inject its default routes, one for IPv4 and one for IPv6, with a
metric value of 10. Then, configure R4 to inject its default routes, one for IPv4 and one for IPv6,
with a metric value of 5. This action creates a problem when attempting to ensure R5 uses R3 to
reach unknown destinations. To overcome this restriction, configure R3 to attach a metric type
value of 1 to its default routes, then configure R4 to attach a metric type value of 2 to its default
routes.
Note
As with previous tasks, remember about
OSPFv3. You must configure both protocols
for this task.
TASK COMPLETION
• R3:
[edit protocols ospf]
lab@R3# set area 2 nssa default-lsa default-metric 10
commit complete
• R4:
[edit protocols ospf]
lab@R4# set area 2 nssa default-lsa default-metric 5
commit complete
• R5:
[edit protocols ospf]
lab@R5# set area 2 nssa
commit complete
TASK VERIFICATION
To verify this task, examine the OSPF database and routing table on R5. The OSPF database
must not contain any Type 3 or Type 5 LSAs. The routing table must direct traffic to R3 to reach
unknown destinations.
• R5:
[edit protocols ospf]
lab@R5# run show ospf database
Question: Can you introduce the interface route into your OSPF
domain through the use of the passive option?
TASK INTERPRETATION
To complete this task, you must first configure a policy on R5 that exports the 172.27.0.96/28
prefix into OSPF. Then the other routers in your OSPF domain distribute this route as a Type 5
LSA. This Type 5 LSA is now present on R2 and you must configure an import policy that blocks
this route from being installed into R2’s routing table.
commit complete
• R2:
[edit protocols ospf]
lab@R2# top edit policy-options policy-statement ospf-import term DC3
commit complete
TASK 12
Redistribute the static routes found on R5 into OSPF. These specific
routes must be present in area 2 but cannot be present in area 1.
However, R2 must be able to reach these destinations.
TASK INTERPRETATION
To complete this task, you must first redistribute the static routes found on R5 into OSPF. Then
on the ABRs, R3 and R4, summarize the routes into Area 0 from Area 2 using the area-range
command. Note that these routes are Type 7 LSAs and you must configure the area-range
command under the [edit protocols ospf area 0.0.0.2 nssa] hierarchy level.
TASK COMPLETION
• R5:
[edit protocols ospf]
lab@R5# top edit policy-options policy-statement stat-ospf term statics
commit complete
• R3:
[edit protocols ospf3]
lab@R3# up 1 edit ospf area 2
commit complete
• R4:
[edit protocols ospf3]
lab@R4# up 1 edit ospf area 2
commit complete
TASK VERIFICATION
To verify this task, examine the routing table on R3 and R4. You must see the specific OSPF
external routes that represent the static routes that R5 redistributed into OSPF earlier. Then,
examine the routing table on R2—it must contain the summary route which represents the
specific OSPF external routes. This task is complete if R2 only has the summary route and lacks
the specific OSPF external routes.
• R3:
[edit protocols ospf area 0.0.0.2]
lab@R3# run show route 10.255/19
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# run show route 10.255/19
STOP Tell your instructor that you have completed this lab.
Overview
In this lab, you will be given a list of tasks specific to IS-IS troubleshooting to accomplish in a
timed setting. You will have 1 hour to complete the simulation.
The lab is available in two formats. In the high-level format, you are given only the list of tasks to
be accomplished. To better prepare you for the real JNCIE exam, we recommend that you make
your best effort at accomplishing the tasks with only the high-level lab guide.
The lab is also available in a detailed format. The detailed format contains a discussion
regarding the interpretation of each task, followed by step-by-step instructions. You might find
more than one method for accomplishing each task.
By completing this lab, you will perform the following tasks:
– Ensure that all IS-IS adjacencies have reached the Up state. Any adjacencies
that require authentication must authenticate properly.
– Ensure that all routers have IPv4 and IPv6 IS-IS routes present in their routing
tables.
– Ensure that the loss of any interface on a router cannot remove a router from
the IS-IS topology.
– To reduce the size of the IS-IS link-state database ensure that the interface
routes of all core facing interfaces are not present in the database. However,
you must ensure that all routers can ping each other’s loopback addresses.
– R4 is using the ae1 link to send traffic to the loopback address of R1. Ensure
that this traffic uses the ae0 link if the ae1 link fails.
– Ensure that R5 can communicate with the destinations advertised by the
customer router attached to R1. Also, ensure that R5 is receiving this routing
information from R3 and R4. You can verify this step by pinging the 172.16.16.1
address.
Troubleshooting IS-IS
In this lab part, you will examine and troubleshoot a malfunctioning network which has
incorporated IS-IS as its IGP. You are given a list of criteria that your network must meet to
consider this lab part complete.
TASK 1
Access the CLI for your routers using either the console, Telnet, or SSH as directed by your
instructor. Refer to the management network diagram for the IP address associated with your
devices. Log in as user lab with the password lab123.
Ensure that all IS-IS adjacencies have reached the Up state. Any
adjacencies that require authentication must authenticate properly.
TASK INTERPRETATION
When you examine your network you will find many problems that affect the IS-IS adjacency
formations. You must examine each router and fix any problems that are restricting the
adjacencies from reaching the Up state.
TASK COMPLETION
You must now examine the network for malfunctioning IS-IS adjacencies. A good place to start is
to issue the show isis adjacencies command on each router. You will notice that no
adjacencies have formed on any of the routers. This malady can be caused by many different
issues and so it is best to examine the interfaces on the routers using the show isis
interface and show interface terse | match down commands.
• R1:
R1 (ttyd0)
login: lab
Password:
[edit]
lab@R1# run show isis adjacency
[edit]
lab@R1# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ae1.0 1 0x1 R1.00 Disabled 15/15
ge-0/0/3.0 1 0x1 R1.00 Disabled 30/30
ge-0/0/6.0 0 0x1 Disabled Disabled 30/30
lo0.0 0 0x1 Passive Passive 0/0
lo0.32768 0 0x1 Passive Passive 0/0
[edit]
lab@R1# run show interfaces terse | match down
ae0 up down
vlan up down
login: lab
Password:
[edit]
lab@R2# run show isis adjacency
[edit]
lab@R2# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ae0.0 1 0x1 Down Disabled 10/10
ge-0/0/2.0 0 0x1 Passive Passive 10/10
lo0.0 0 0x1 Passive Passive 0/0
lo0.32768 0 0x1 Passive Passive 0/0
[edit]
lab@R2# run show interfaces terse | match down
ge-0/0/7 down up
ge-0/0/7.0 up down aenet --> ae0.0
ae0 up down
ae0.0 up down inet 172.27.0.5/30
vlan up down
• R3:
R3 (ttyd0)
login: lab
Password:
[edit]
lab@R3# run show isis adjacency
[edit]
lab@R3# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ge-0/0/3.0 2 0x1 Disabled Point to Point 1/1
lo0.0 0 0x1 Disabled Passive 0/0
[edit]
lab@R3# run show interfaces terse | match down
vlan up down
• R4:
R4 (ttyd0)
login: lab
Password:
[edit]
lab@R4# run show isis adjacency
[edit]
lab@R4# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ae0.0 1 0x2 Down Disabled 10/10
lo0.0 0 0x1 Disabled Passive 0/0
[edit]
lab@R4# run show interfaces terse | match down
ae0 up down
ae0.0 up down inet 172.27.0.6/30
vlan up down
• R5:
R5 (ttyd0)
login: lab
Password:
[edit]
lab@R5# run show isis adjacency
[edit]
lab@R5# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ae2.0 2 0x1 Disabled R5.00 99/99
ge-0/0/1.0 2 0x1 Disabled R5.00 199/199
ge-0/0/5.0 0 0x1 Passive Passive 199/199
lo0.0 0 0x1 Passive Passive 0/0
lo0.32768 0 0x1 Passive Passive 0/0
To rectify the current issues seen on R1, you must take the ge-0/0/6 interface out of the IS-IS
disabled state. Simply removing the interface under IS-IS accomplishes this task because the
interface all statement has previously been configured.
• R2:
[edit]
lab@R2# edit interfaces
[edit interfaces]
lab@R2# show ge-0/0/7
description "Connection to R4 AE0";
disable;
gigether-options {
802.3ad ae0;
}
[edit interfaces]
lab@R2# delete ge-0/0/7 disable
[edit interfaces]
lab@R2# show ge-0/0/1
description "Connection to R1";
unit 0 {
family inet {
address 172.27.0.2/30;
}
family inet6 {
address 2008:4498::2/126;
}
}
[edit interfaces]
lab@R2# set ge-0/0/1.0 family iso
[edit interfaces]
lab@R2# commit
commit complete
[edit interfaces]
lab@R2# run show interfaces terse ge-0/0/1
[edit interfaces]
lab@R2# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ae0.0 1 0x1 R2.00 Disabled 3/3
ge-0/0/1.0 1 0x2 R2.00 Disabled 10/10
ge-0/0/2.0 0 0x1 Passive Passive 10/10
lo0.0 0 0x1 Passive Passive 0/0
lo0.32768 0 0x1 Passive Passive 0/0
• R3:
[edit]
lab@R3# run show interfaces terse ge*
Interface Admin Link Proto Local Remote
ge-0/0/0 up up
ge-0/0/0.0 up up inet 10.94.170.10/20
ge-0/0/1 up up
ge-0/0/1.0 up up inet 172.27.0.13/30
inet6 2008:4489::d/126
fe80::5668:29ff:fe7a:93b2/64
ge-0/0/2 up up
ge-0/0/2.0 up up inet 172.27.0.17/30
inet6 2008:4489::13/126
fe80::5668:29ff:fe7a:b48b/64
ge-0/0/3 up up
ge-0/0/3.0 up up inet 172.27.0.26/30
iso
inet6 2008:4489::1a/126
fe80::5668:29ff:fe7a:9ac9/64
ge-0/0/4 up up
ge-0/0/4.0 up up inet 172.27.0.103/28
ge-0/0/5 up up
ge-0/0/5.0 up up inet 138.1.2.4/24
[edit]
lab@R3# edit interfaces
[edit interfaces]
lab@R3# set ge-0/0/1.0 family iso
[edit interfaces]
lab@R3# set ge-0/0/2.0 family iso
[edit interfaces]
lab@R3# top edit protocols isis
commit complete
• R4:
[edit]
lab@R4# run monitor traffic interface ae1.0 detail no-resolve
Address resolution is OFF.
Listening on ae1.0, capture size 1514 bytes
[edit]
lab@R4# edit protocols isis
commit complete
• R1:
[edit protocols isis]
lab@R1# run show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/6.0 0172.0027.2553 1 Up 1 56:68:29:7a:93:b2
• R2:
[edit interfaces]
lab@R2# run show isis adjacency
• R3:
[edit protocols isis]
lab@R3# run show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/1.0 0172.0027.2551! 1 Up 4 56:68:29:7a:8e:3a
ge-0/0/2.0 R4 2 Up 22 56:68:29:7a:85:91
ge-0/0/3.0 R5 2 Up 8 56:68:29:7a:b2:4d
• R4:
[edit protocols isis]
lab@R4# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae2.0 R5 2 Up 18 52:54:0:0:4b:4
ge-0/0/5.0 R3 2 Up 7 56:68:29:7a:b4:8b
• R5:
[edit]
lab@R5# run show isis adjacency
It still appears that most routers have some very serious issues with forming IS-IS adjacencies.
To troubleshoot these issues further, you must take a closer look at the protocol interaction by
enabling traceoptions. Configure traceoptions on R1 and R2. These traceoptions should contain
the flags error detail and hello detail. After you create the traceoptions, commit the
configuration and wait 1 minute before viewing the traceoptions file. This gives the router time to
populate the file with helpful information concerning the IS-IS adjacency issues.
• R1:
[edit protocols isis]
lab@R1# set traceoptions file isis-adj-issue.log
commit complete
commit complete
Note
Fixing the adjacency issue with R2 now
appears to have broken the adjacency with
R3, which is why you must check and
re-check the status of your network while
you configure or troubleshoot. A task might
be designed to break a previously
completed task, and you might not notice it
until later in the exam, at which point it is
very difficult to troubleshoot the new issue.
Examine the traceoptions on R1 again to view the problem with the adjacency with R3. You
might also notice in the previous output that R1 believes R2 is found through its ae1 and ge-0/
0/3 interface, which signifies another issue that must be addressed later.
• R1:
[edit protocols isis]
lab@R1# run show log isis-adj-issue.log | match ge-0/0/6
Jan 24 21:11:34.622705 ISIS L1 periodic xmit to 01:80:c2:00:00:14 interface ge-0/
0/6.0
Jan 24 21:11:34.623333 Received L1 LAN IIH, source id 0172.0027.2553 on ge-0/0/6.0
Jan 24 21:11:34.623658 ERROR: IIH from 0172.0027.2553 with no matching areas,
interface ge-0/0/6.0
commit complete
• R1:
[edit protocols isis]
lab@R1# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae1.0 R2 1 Up 7 52:54:0:1:0:3
ge-0/0/3.0 R2 1 Up 1 56:68:29:7a:ab:5b
ge-0/0/6.0 0172.0027.2553 1 Up 1 56:68:29:7a:93:b2
• R2:
Now, configure the traceoptions on R2 with the flags that were mentioned earlier.
[edit interfaces]
lab@R2# top edit protocols isis
commit complete
• R4:
[edit protocols isis]
lab@R4# run show interfaces lo0.0 terse
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.4 --> 0/0
iso 49.0001.0172.0027.2554
Answer: From the output you can determine that the system ID
is determined from the loopback address. This means that R2’s
system ID must be changed to 49.0001.0172.0027.2552.
• R2:
[edit protocols isis]
lab@R2# top delete interfaces lo0.0 family iso
commit complete
Note
Remember to deactivate the traceoptions
once you are done using them. While not
specific to accomplishing this task, it is
always considered good practice to never
leave traceoptions running when they are
not needed.
• R1:
[edit protocols isis]
lab@R1# deactivate traceoptions
commit complete
• R2:
[edit protocols isis]
lab@R2# deactivate traceoptions
commit complete
TASK VERIFICATION
To verify this task, issue the show isis adjacency command on all routers. Each router
must have the correct adjacencies in the Up state.
• R1:
[edit protocols isis]
lab@R1# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae1.0 0172.0027.2554 1 Up 8 52:54:0:1:0:3
ge-0/0/3.0 R2 1 Up 1 56:68:29:7a:ab:5b
ge-0/0/6.0 0172.0027.2553 1 Up 1 56:68:29:7a:93:b2
• R2:
[edit protocols isis]
lab@R2# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae0.0 0172.0027.2554 1 Up 1 52:54:0:1:0:2
ge-0/0/1.0 R1 ! 1 Up 4 56:68:29:7a:a0:ed
• R3:
[edit protocols isis]
lab@R3# run show isis adjacency
• R4:
[edit protocols isis]
lab@R4# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae0.0 0172.0027.2552 1 Up 4 52:54:0:0:c0:2
ae1.0 0172.0027.2551! 1 Up 21 52:54:0:0:4:3
ae2.0 R5 2 Up 24 52:54:0:0:4b:4
ge-0/0/5.0 R3 2 Up 7 56:68:29:7a:b4:8b
• R5:
[edit]
lab@R5# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae2.0 R4 2 Up 6 52:54:0:1:0:4
ge-0/0/1.0 R3 2 Up 25 56:68:29:7a:9a:c9
TASK 2
Ensure that all routers have IPv4 and IPv6 IS-IS routes present in
their routing tables.
• R2:
[edit protocols isis]
lab@R2# run show route summary
Router ID: 172.27.255.2
• R3:
[edit protocols isis]
lab@R3# run show route summary
Router ID: 172.27.255.3
• R4:
[edit protocols isis]
lab@R4# run show route summary
Router ID: 172.27.255.4
• R5:
[edit]
lab@R5# run show route summary
Router ID: 172.27.255.1
After viewing the routing tables on each router, you will notice that R1 has no IPv4 or IPv6 IS-IS
routes. R2, R3, R4, and R5 have IPv4 IS-IS routes, but no IPV6 IS-IS routes. Issuing the show
isis overview command on each router can help lead you in the right direction.
• R2:
[edit protocols isis]
lab@R2# run show isis overview
Instance: master
Router ID: 172.27.255.2
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 3600
Reference bandwidth: 4230196224
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled
Traffic engineering: enabled
Restart: Enabled
Restart duration: 210 sec
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Wide metrics are enabled, Narrow metrics are enabled
• R4:
[edit protocols isis]
lab@R4# run show isis overview
Instance: master
Router ID: 172.27.255.4
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 3600
Reference bandwidth: 4230196224
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled
Traffic engineering: enabled
Restart: Enabled
Restart duration: 210 sec
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Wide metrics are enabled
Answer: You must look at what the outputs are not saying. For
instance, all the routers except R1 show that IPv4 traffic is
enabled for IS-IS. From this information, you can deduce that
IPv6 routing for IS-IS has been disabled on every router, and R1
also has IPv4 routing for IS-IS disabled.
commit complete
• R2:
[edit protocols isis]
lab@R2# show
inactive: traceoptions {
file isis-adj-issue;
flag error detail;
flag hello detail;
}
export static-isis;
reference-bandwidth 30g;
lsp-lifetime 3600;
no-ipv6-routing;
level 2 disable;
...
commit complete
commit complete
• R4:
[edit protocols isis]
lab@R4# show
export leak-routes;
reference-bandwidth 30g;
lsp-lifetime 3600;
no-ipv6-routing;
level 2 wide-metrics-only;
...
commit complete
• R5:
[edit]
lab@R5# edit protocols isis
commit complete
Examining the routing table gives some very interesting results. R1 and R2 still do not have any
IPv4 or IPv6 IS-IS routes. Issuing the show isis adjacency command on the routers also
reveals confusing results. The adjacency between R1 and R2 has been lost, and all routers with
Level 1 adjacencies are not resolving their partners host names.
• R1:
[edit protocols isis]
lab@R1# run show route summary
Router ID: 172.27.255.1
• R2:
[edit protocols isis]
lab@R2# run show route summary
Router ID: 172.27.255.2
• R3:
[edit protocols isis]
lab@R3# run show route summary
Router ID: 172.27.255.3
• R4:
[edit protocols isis]
lab@R4# run show route summary
Router ID: 172.27.255.4
• R5:
[edit protocols isis]
lab@R5# run show route summary
Router ID: 172.27.255.1
Monitoring the traffic on R1’s ge-0/0/3 interface reveals that the issue is a misconfigured IPv4
address on that interface. Configuring the correct IPv4 address on the ge-0/0/3 interface
resolves the adjacency issue.
Unlike the other Level 1 adjacencies, the system name resolves to the host name with the
adjacency between R1 and R2. An undiscovered problem still exists that is causing the other
Level 1 adjacencies to fail host name resolution.
• R1:
[edit protocols isis]
lab@R1# run monitor traffic interface ge-0/0/3 detail no-resolve
Address resolution is OFF.
Listening on ge-0/0/3, capture size 1514 bytes
commit complete
TASK VERIFICATION
After resolving the adjacency issue between R1 and R2, all routers now have IPv4 and IPv6 IS-IS
routes. However, it is obvious that a great deal of routing information is still missing. For the
moment, this task can be considered complete, but keep in mind that later tasks could cause
specific routes to disappear which will cause you to revisit this task.
• R1:
[edit interfaces ge-0/0/3 unit 0]
lab@R1# run show route summary
Lab 4–28 • IS-IS Troubleshooting www.juniper.net
JNCIE Service Provider Bootcamp
Router ID: 172.27.255.1
• R2:
[edit protocols isis]
lab@R2# run show route summary
Router ID: 172.27.255.2
• R3:
[edit protocols isis]
lab@R3# run show route summary
Router ID: 172.27.255.3
• R4:
[edit protocols isis]
lab@R4# run show route summary
Router ID: 172.27.255.4
• R5:
[edit]
lab@R5# run show route summary
Router ID: 172.27.255.1
• R2:
[edit protocols isis]
lab@R2# run show interfaces lo0.0 terse
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.2 --> 0/0
iso 49.0001.0172.0027.2552
• R3:
[edit protocols isis]
lab@R3# run show interfaces lo0.0 terse
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.3 --> 0/0
iso 49.0001.0172.0027.2553
• R4:
[edit protocols isis]
lab@R4# run show interfaces lo0.0 terse
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.4 --> 0/0
iso 49.0001.0172.0027.2554
• R5:
[edit]
lab@R5# run show interfaces lo0.0 terse
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.1 --> 0/0
172.27.255.5 --> 0/0
iso
[edit]
lab@R5# run show interfaces terse
[edit interfaces]
lab@R5# delete ae2.0 family iso address 49.0002.0172.0027.2555.00
[edit interfaces]
lab@R5# set lo0.0 family iso address 49.0002.0172.0027.2555.00
[edit interfaces]
lab@R5# commit
commit complete
TASK VERIFICATION
Examine the loopback interface on R5 for the ISO address. If the ISO address is present on the
loopback interface this task is complete.
• R5:
[edit interfaces]
lab@R5# run show interfaces lo0.0 terse
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.1 --> 0/0
172.27.255.5 --> 0/0
iso 49.0002.0172.0027.2555
TASK INTERPRETATION
For this task, you must create and apply a policy on each router that blocks direct routes from
being exported into IS-IS. However, allow each router to advertise its loopback address. Also,
ensure that you allow R1 and R5 to advertise the direct routes associated with their interfaces
that are running in the IS-IS passive mode. Then, ensure that each router can ping every other
router’s loopback address. If there are any problems, troubleshoot the issues until they are
resolved.
TASK COMPLETION
• R1:
[edit interfaces ge-0/0/3 unit 0]
lab@R1# top edit policy-options policy-statement local-routes term
allowed-interfaces
commit complete
commit complete
• R3:
[edit protocols isis]
lab@R3# top edit policy-options policy-statement local-routes term
allowed-interfaces
commit complete
• R4:
[edit protocols isis]
lab@R4# top edit policy-options policy-statement local-routes term
allowed-interfaces
commit complete
• R5:
[edit interfaces]
lab@R5# top edit policy-options policy-statement local-routes term
allowed-interfaces
commit complete
• R1:
[edit protocols isis]
lab@R1# run show route protocol isis
• R2:
[edit protocols isis]
lab@R2# run show route protocol isis
• R3:
[edit protocols isis]
lab@R3# run show route protocol isis
• R4:
[edit protocols isis]
lab@R4# run show route protocol isis
• R5:
[edit protocols isis]
lab@R5# run show route protocol isis
The core-facing interface routes are no longer present, but R1 and R2 still have no way to reach
R3’s, R4’s, or R5’s loopback addresses. Examining the IS-IS link-state database on R1 and R2
reveals that they are not receiving LSPs from R3, R4, and R5. The reverse is true if you examine
the databases on R3, R4, and R5. This means that R1 and R2 are not receiving LSPs from R3
and R4 with the attached bit set. This does not allow R1 and R2 to install a default route to reach
prefixes that are out of their area.
• R1:
[edit protocols isis]
lab@R1# run show isis database
IS-IS level 1 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
R1.00-00 0x5 0xab56 2312 L1 Overload
R2.00-00 0x3 0x4450 2285 L1 Overload
R2.02-00 0x1 0xd3d3 2202 L1
3 LSPs
• R2:
[edit protocols isis]
lab@R2# run show isis database
IS-IS level 1 link-state database:
Lab 4–38 • IS-IS Troubleshooting www.juniper.net
JNCIE Service Provider Bootcamp
LSP ID Sequence Checksum Lifetime Attributes
R1.00-00 0x5 0xab56 2300 L1 Overload
R2.00-00 0x3 0x4450 2276 L1 Overload
R2.02-00 0x1 0xd3d3 2194 L1
3 LSPs
• R3:
[edit protocols isis]
lab@R3# run show isis database
IS-IS level 1 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
R3.00-00 0x3 0xb05d 1412 L1 L2 Attached
R3.02-00 0x1 0x8f7 1354 L1 L2
2 LSPs
• R4:
[edit protocols isis]
lab@R4# run show isis database
IS-IS level 1 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
R4.00-00 0x4 0x2a4f 1382 L1 L2 Attached
R4.02-00 0x1 0x95b1 1316 L1 L2
R4.03-00 0x1 0xb7ad 1341 L1 L2
3 LSPs
Answer: No. Only traffic that has another possible path that
normally would pass through the overloaded router is effected.
However, this might cause problems with a task you have not yet
attempted. Make special note that the routers are overloaded
and move on.
Enabling the correct traceoptions flags can help you determine if LSP authentication failure is
occurring. Activate the traceoptions on R1 and R2, remove the hello detail flag, and add
the csn detail flag. Then, change the file name to lsp-auth-issue.log to differentiate
it with the last traceoptions file you created.
• R1:
[edit protocols isis]
lab@R1# activate traceoptions
commit complete
commit complete
• R2:
[edit protocols isis]
lab@R2# activate traceoptions
commit complete
commit complete
commit complete
• R2:
[edit protocols isis]
lab@R2# set level 1 authentication-key juniper
commit complete
• R3:
[edit protocols isis]
lab@R3# set level 1 authentication-key juniper
commit complete
• R4:
commit complete
• R1:
[edit protocols isis]
lab@R1# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae1.0 R4 1 Up 6 52:54:0:1:0:3
ge-0/0/3.0 R2 1 Up 1 56:68:29:7a:ab:5b
ge-0/0/6.0 R3 1 Up 1 56:68:29:7a:93:b2
• R2:
[edit protocols isis]
lab@R2# run show isis adjacency
Interface System L State Hold (secs) SNPA
ae0.0 R4 1 Up 1 52:54:0:1:0:2
ge-0/0/1.0 R1 1 Up 4 56:68:29:7a:a0:ed
The System field now resolves to the host name for all Level 1 adjacencies. R1 and R2 are now
receiving LSPs from R3 and R4 which contain an attached bit. This allows them to install a
default IS-IS route into their routing tables.
Now you can ping to verify loopback to loopback reachability. Remember to source the pings
from the local router’s loopback address.
• R1:
[edit protocols isis]
lab@R1# run ping 172.27.255.2 source 172.27.255.1 count 2 rapid
PING 172.27.255.2 (172.27.255.2): 56 data bytes
!!
--- 172.27.255.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.059/3.821/4.582/0.761 ms
• R2:
[edit protocols isis]
lab@R2# run ping 172.27.255.1 source 172.27.255.2 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
• R3:
[edit protocols isis]
lab@R3# run ping 172.27.255.1 source 172.27.255.3 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.494/4.146/4.798/0.652 ms
• R4:
[edit protocols isis]
lab@R4# run ping 172.27.255.1 source 172.27.255.4 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 2.498/3.141/3.783/0.642 ms
• R5:
[edit protocols isis]
lab@R5# run ping 172.27.255.1 source 172.27.255.5 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.075/0.081/0.087/0.006 ms
• R5:
[edit protocols isis]
lab@R5# run traceroute 172.27.255.2 source 172.27.255.5
traceroute to 172.27.255.2 (172.27.255.2) from 172.27.255.5, 30 hops max, 40 byte
packets
1 172.27.0.101 (172.27.0.101) 5.918 ms 5.079 ms 5.860 ms
2 172.27.0.105 (172.27.0.105) 5.673 ms 5.204 ms 5.875 ms
3 172.27.0.101 (172.27.0.101) 6.666 ms 6.516 ms 6.561 ms
4 172.27.0.105 (172.27.0.105) 6.662 ms 6.215 ms 6.464 ms
5 172.27.0.101 (172.27.0.101) 7.162 ms 7.212 ms 7.936 ms
6 172.27.0.105 (172.27.0.105) 7.590 ms 8.848 ms 7.245 ms
7 172.27.0.101 (172.27.0.101) 8.755 ms 8.134 ms 8.856 ms
8 172.27.0.105 (172.27.0.105) 8.698 ms 8.208 ms 8.908 ms
9 172.27.0.101 (172.27.0.101) 9.628 ms 9.214 ms 8.839 ms
...
Answer: You can eliminate the routing loop by raising the OSPF
external preference to 152, lowering the IS-IS Level 2 internal
preference to 16, or applying an import policy on R5 that blocks
the route from being installed into the routing table.
Question: Can you determine why the ping test to R1’s loopback
address from R5 worked, while the ping to R2’s loopback
address from R5 did not work?
• R5:
[edit protocols isis]
lab@R5# run show route 172.27.255.1
commit complete
TASK VERIFICATION
To verify this task, ping the loopback address of each router. Remember to source the ping from
the local routers loopback address. Also, examine the routing table to ensure no core interface
routes are present.
• R1:
[edit protocols isis]
lab@R1# run ping 172.27.255.2 source 172.27.255.1 count 2 rapid
PING 172.27.255.2 (172.27.255.2): 56 data bytes
!!
--- 172.27.255.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.339/5.521/7.703/2.182 ms
• R2:
[edit protocols isis]
lab@R2# run ping 172.27.255.1 source 172.27.255.2 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
• R3:
• R4:
[edit protocols isis]
lab@R4# run ping 172.27.255.1 source 172.27.255.4 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.874/2.181/2.488/0.307 ms
• R5:
[edit protocols isis]
lab@R5# run ping 172.27.255.1 source 172.27.255.5 count 2 rapid
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 4.188/4.852/5.516/0.664 ms
commit complete
• R4:
[edit protocols isis]
lab@R4# run show route 172.27.255.1
With the ae1 link being non-operational, the traffic uses the ge-0/0/5 interface on R4 to reach
R1. To begin troubleshooting this issue, ensure that the interface metric for ae0 is lower than
the interface metric for ge-0/0/5. Also, it might be helpful to examine the IS-IS link-state
database for further clues.
• R4:
[edit protocols isis]
lab@R4# run show isis interface detail ae0.0
IS-IS interface database:
ae0.0
Index: 84, State: 0x6, Circuit id: 0x2, Circuit type: 1
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1 1 64 16 0.666 2 R4.02 (us)
Question: Can you determine why the traffic is using the higher
cost interface?
To resolve this problem, you must have R2 advertise its LSP without the overload bit set.
Examine R2’s configuration to attempt to determine why this is occurring.
• R2:
[edit protocols isis]
lab@R2# show
inactive: traceoptions {
file lsp-auth-issue.log;
flag error detail;
flag csn detail;
}
export [ static-isis local-routes ];
reference-bandwidth 30g;
lsp-lifetime 3600;
level 2 disable;
R2 is not using the overload statement and the show isis overview command does not
show that the overload bit is set. It is time to take a closer look at the internal IS-IS operations on
R2. Enable IS-IS traceoptions on R2 with only the error detail flag set. Then, wait a minute
for the traceoptions file to fill up with information.
• R2:
[edit protocols isis]
lab@R2# activate traceoptions
commit complete
commit complete
R2 is clearly overloaded because it is exceeding the maximum number of external routes allowed
to export into IS-IS. In the IS-IS protocol configuration, R2 has the prefix-export-limit
statement set to a value of 1, and it is exporting two static routes into IS-IS. Configure the
prefix-export-limit statement to have a value of 2. This removes R2 from the overloaded
mode.
• R2:
[edit protocols isis]
lab@R2# show | match prefix
prefix-export-limit 1;
commit complete
TASK VERIFICATION
To verify this task, examine R4’s routing table to find R1’s loopback address. If the route points
towards R2 over the ae0 link, then the task is complete. Also, remember to restore the ae1 link
when you finish verifying this task.
• R4:
[edit protocols isis]
lab@R4# run show route 172.27.255.1
• R1:
[edit protocols isis]
lab@R1# top delete interfaces ae1 disable
commit complete
TASK 6
Ensure that R5 can communicate with the destinations advertised by
the customer router attached to R1. Also, ensure that R5 is
receiving this routing information from R3 and R4. You can verify
this step by pinging the 172.16.16.1 address.
TASK INTERPRETATION
This task requires you to enable communication between R5 and the destinations that are being
advertised by the customer router.
• R2:
[edit protocols isis]
lab@R2# run show route 172.16.16/21
• R3:
[edit protocols isis]
lab@R3# run show route 172.16.16/21
• R4:
[edit protocols isis]
lab@R4# run show route 172.16.16/21
• R5:
[edit protocols isis]
lab@R5# run show route 172.16.16/21
If you remember from early outputs R1 is currently overloaded. This might have something to do
with the prefix-export-limit statement that it has configured.
• R1:
[edit protocols isis]
lab@R1# run show isis database
IS-IS level 1 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
R1.00-00 0x47 0x892a 3596 L1 Overload
R2.00-00 0x33 0xd0df 2679 L1
Lab 4–62 • IS-IS Troubleshooting www.juniper.net
JNCIE Service Provider Bootcamp
R2.02-00 0x30 0xa07f 2889 L1
R3.00-00 0x2d 0xfb92 1716 L1 L2 Attached
R3.02-00 0x27 0xf1bf 2128 L1 L2
R4.00-00 0x2b 0xf436 727 L1 L2 Attached
R4.02-00 0x23 0x9f9f 1960 L1 L2
R4.03-00 0x2 0xec4a 877 L1 L2
8 LSPs
commit complete
• R2:
[edit protocols isis]
lab@R2# run show route 172.16.16/21
• R3:
[edit protocols isis]
lab@R3# run show route 172.16.16/21
• R4:
[edit protocols isis]
lab@R4# run show route 172.16.16/21
• R5:
[edit protocols isis]
lab@R5# run show route 172.16.16/21
The routing information is now present on all routers participating in Level 1, but it still is not
present on R5.
• R4:
[edit protocols isis]
lab@R4# top edit policy-options policy-statement leak-routes term lvl-1-ext
Remove the level 1 match condition from the route leaking policies on R3 and R4. Then,
examine the routing table on R5 for the routing information.
• R3:
[edit policy-options policy-statement leak-routes term lvl-1-ext]
lab@R3# delete from level 1
commit complete
commit complete
• R5:
[edit protocols isis]
lab@R5# run show route 172.16.16/21
• R3:
[edit policy-options policy-statement leak-routes term lvl-1-ext]
lab@R3# run show route 172.16.16/21
• R4:
[edit policy-options policy-statement leak-routes term lvl-1-ext]
lab@R4# run show route 172.16.16/21
Answer: You can fix this problem by setting the preference value
of the aggregate routes on R3 and R4 to a number below 18.
commit complete
• R4:
[edit policy-options policy-statement leak-routes term lvl-1-ext]
lab@R4# top set routing-options aggregate route 172.16.16.0/21 preference 14
commit complete
TASK VERIFICATION
To verify this task, examine the IS-IS link-state database to ensure R5 is receiving a copy of the
summary route from R3 and R4. Then, ping the 172.16.16.1 address to ensure communication.
Remember to source the ping from the loopback address of R5.
• R5:
[edit protocols isis]
lab@R5# run show isis database R3 detail | match 172.16.16.0/21
IP prefix: 172.16.16.0/21 Metric: 10 Internal Up
STOP Tell your instructor that you have completed this lab.
Overview
In this lab, you will be given a list of tasks specific to OSPF troubleshooting to accomplish in a
timed setting. You will have 1 hour to complete the simulation.
By completing this lab, you will perform the following tasks:
– Ensure that all OSPF adjacencies have reached the Full state. Any
adjacencies that require authentication must authenticate properly to reach the
Full state.
– Ensure that each router can reach the loopback address of all other routers in
the network.
– R4 has been unstable in the past and must remain overloaded. However, there
will be consistently over 1.5 Gbps of traffic coming from DC3 that will be using
R5. For this reason, ensure that R4 must be the primary exit of Area 2 for
unknown destinations.
– Most traffic exiting Area 1 is using R1 because of the stability problems of R4.
However, the 1 Gbps link between R1 and R2 cannot handle the load. Ensure
that R1 is used as the primary exit point for all IPv4 traffic in
Area 1. However, IPv4 traffic cannot use R4 as the secondary exit point for the
area. Ensure that R4 is used as the primary exit point for all IPv6 traffic in Area
1. However, IPv6 traffic cannot use R1 as the secondary exit point for the area.
– Ensure that R2 can reach the destinations located on the T2 router; which are
in the 10.255.0.0/19 prefix range. You can ping the 10.255.3.1 addresses to
verify this step.
Troubleshooting OSPF
In this lab part, you will examine and troubleshoot a malfunctioning network which has
incorporated OSPF as its IGP. You are given a list of criteria that your network must meet to
consider this lab part complete.
TASK 1
Ensure that all OSPF adjacencies have reached the Full state. Any
adjacencies that require authentication must authenticate properly
to reach the Full state.
Question: Must you consider both OSPFv2 and OSPFv3 for this
task?
TASK INTERPRETATION
Examine each router’s OSPFv2 and OSPFv3 adjacencies. Troubleshoot any adjacency issues you
find until the adjacencies reach the Full state.
TASK COMPLETION
• R1:
R1 (ttyd0)
login: lab
Password:
[edit]
lab@R1# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.9 ae1.0 Exchange 172.27.255.5 128 38
[edit]
lab@R1# run show ospf3 neighbor
ID Interface State Pri Dead
172.27.255.5 ae1.0 Full 128 18
Neighbor-address fe80::5254:ff:fe01:3
• R2:
R2 (ttyd0)
login: lab
Password:
[edit]
lab@R2# run show ospf neighbor
[edit]
lab@R2# run show ospf3 neighbor
• R3:
R3 (ttyd0)
login: lab
Password:
[edit]
lab@R3# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.18 ge-0/0/2.0 Full 172.27.255.5 128 27
172.27.0.25 ge-0/0/3.0 Full 172.27.255.5 128 27
[edit]
lab@R3# run show ospf3 neighbor
ID Interface State Pri Dead
172.27.255.5 ge-0/0/2.0 Full 128 8
Neighbor-address fe80::5668:29ff:fe7a:8591
172.27.255.5 ge-0/0/3.0 Full 128 27
Neighbor-address fe80::5668:29ff:fe7a:b24d
• R4:
R4 (ttyd0)
login: lab
Password:
[edit]
lab@R4# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.10 ae1.0 ExStart 172.27.255.1 128 34
172.27.0.17 ge-0/0/5.0 Full 172.27.255.3 128 29
[edit]
lab@R4# run show ospf3 neighbor
• R5:
R5 (ttyd0)
login: lab
Password:
[edit]
lab@R5# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.26 ge-0/0/1.0 Full 172.27.255.3 128 27
[edit]
lab@R5# run show ospf3 neighbor
ID Interface State Pri Dead
172.27.255.3 ge-0/0/1.0 Full 128 26
Neighbor-address fe80::5668:29ff:fe7a:9ac9
Examine the OSPF interfaces by issuing the show ospf interface and show ospf3
interface commands.
[edit]
lab@R1# run show ospf3 interface
Interface State Area DR ID BDR ID Nbrs
ae1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ge-0/0/6.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 0
ge-0/0/3.0 PtToPt 1.0.0.1 0.0.0.0 0.0.0.0 0
• R2:
[edit]
lab@R2# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ae0.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 0
ge-0/0/1.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 0
ge-0/0/2.0 DRother 0.0.0.1 0.0.0.0 0.0.0.0 0
lo0.0 DRother 0.0.0.1 0.0.0.0 0.0.0.0 0
[edit]
lab@R2# run show ospf3 interface
Interface State Area DR ID BDR ID Nbrs
ae0.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 0
ge-0/0/1.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 0
ge-0/0/2.0 DRother 0.0.0.1 0.0.0.0 0.0.0.0 0
• R3:
[edit]
lab@R3# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ge-0/0/1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 0
ge-0/0/2.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
ge-0/0/3.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
[edit]
lab@R3# run show ospf3 interface
Interface State Area DR ID BDR ID Nbrs
ge-0/0/1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 0
ge-0/0/2.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ge-0/0/3.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
• R4:
[edit]
lab@R4# run show ospf interface
[edit]
lab@R4# run show ospf3 interface
Interface State Area DR ID BDR ID Nbrs
ae1.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ge-0/0/5.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.0 1
ae0.0 PtToPt 0.0.0.1 0.0.0.0 0.0.0.0 0
ae2.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 0
• R5:
[edit]
lab@R5# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ae2.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 0
ge-0/0/1.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
ge-0/0/5.0 DRother 0.0.0.2 0.0.0.0 0.0.0.0 0
lo0.0 DRother 0.0.0.2 0.0.0.0 0.0.0.0 0
[edit]
lab@R5# run show ospf3 interface
Interface State Area DR ID BDR ID Nbrs
ae2.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 0
ge-0/0/1.0 PtToPt 0.0.0.2 0.0.0.0 0.0.0.0 1
ge-0/0/5.0 DRother 0.0.0.2 0.0.0.0 0.0.0.0 0
On R1, change Area 1.0.0.1 to Area 1 in OSPFv3. Then, examine its OSPFv3 adjacency states.
• R1:
[edit]
lab@R1# edit protocols ospf3
commit complete
Monitor the traffic between R1 and R2 by issuing the monitor traffic interface
ge-0/0/3 detail no-resolve command.
• R1:
[edit protocols ospf3]
lab@R1# run monitor traffic interface ge-0/0/3 detail no-resolve
Address resolution is OFF.
Listening on ge-0/0/3, capture size 1514 bytes
For now, remove the nssa statement from R2 for Area 1 under OSPFv2 and OSPFv3. Then
examine the OSPF adjacencies on R2.
• R2:
[edit]
lab@R2# edit protocols
[edit protocols]
lab@R2# delete ospf area 1 nssa
[edit protocols]
lab@R2# delete ospf3 area 1 nssa
[edit protocols]
lab@R2# commit
commit complete
[edit protocols]
lab@R2# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.6 ae0.0 Full 172.27.255.5 128 16
172.27.0.1 ge-0/0/1.0 Full 172.27.255.1 128 25
[edit protocols]
lab@R2# run show ospf3 neighbor
ID Interface State Pri Dead
172.27.255.5 ae0.0 Full 128 31
Neighbor-address fe80::5254:ff:fe01:2
172.27.255.1 ge-0/0/1.0 Full 128 10
Neighbor-address fe80::5668:29ff:fe7a:a0ed
Although, monitoring the interface will allow you to discover the problem, traceoptions is also a
viable troubleshooting tool as well. Configure traceoptions on R1 for OSPFv2 and OSPFv3.
Configure the flag error detail and the flag hello detail statements under the
traceoptions.
• R1:
[edit protocols ospf3]
lab@R1# up 1
[edit protocols]
lab@R1# set ospf traceoptions file ospf-adj.log
[edit protocols]
lab@R1# set ospf traceoptions flag hello detail
[edit protocols]
lab@R1# set ospf traceoptions flag error detail
[edit protocols]
lab@R1# set ospf3 traceoptions file ospf-adj.log
[edit protocols]
lab@R1# set ospf3 traceoptions flag hello detail
[edit protocols]
lab@R1# set ospf3 traceoptions flag error detail
[edit protocols]
lab@R1# commit
commit complete
[edit protocols]
lab@R1# run show log ospf-adj.log | find 172.27.0.13
Jan 25 12:03:26.458628 OSPF rcvd Hello 172.27.0.13 -> 224.0.0.5 (ge-0/0/6.0 IFL 73
area 0.0.0.0)
Jan 25 12:03:26.458666 Version 2, length 44, ID 172.27.255.3, area 0.0.0.0
Jan 25 12:03:26.458685 checksum 0x0, authtype 1
Jan 25 12:03:26.458701 mask 255.255.255.0, hello_ivl 5, opts 0x2, prio 128
Jan 25 12:03:26.458718 dead_ivl 20, DR 0.0.0.0, BDR 0.0.0.0
Jan 25 12:03:26.458737 OSPF packet ignored: netmask 255.255.255.0 mismatch from
172.27.0.13 on intf ge-0/0/6.0 area 0.0.0.0
[edit protocols]
lab@R1# run show log ospf-adj.log | match fe80 | match ge-0/0/6
Jan 25 12:08:24.800280 OSPF rcvd Hello fe80::5668:29ff:fe7a:93b2 -> ff02::5 (ge-0/
0/6.0 IFL 73 area 0.0.0.0)
Jan 25 12:08:24.800382 OSPF packet ignored: hello interval mismatch 20 from
fe80::5668:29ff:fe7a:93b2 on intf ge-0/0/6.0 area 0.0.0.0
Jan 25 12:08:44.695623 OSPF rcvd Hello fe80::5668:29ff:fe7a:93b2 -> ff02::5 (ge-0/
0/6.0 IFL 73 area 0.0.0.0)
Jan 25 12:08:44.695733 OSPF packet ignored: hello interval mismatch 20 from
fe80::5668:29ff:fe7a:93b2 on intf ge-0/0/6.0 area 0.0.0.0
...
[edit protocols]
lab@R1# run show log ospf-adj.log | find 172.27.0.9
Jan 25 12:13:11.955362 OSPF restart signaling: Received DBD with LLS data from nbr
ip=172.27.0.9 id=172.27.255.5.
Jan 25 12:13:11.955398 OSPF restart signaling: Add LLS data for DbD packet on
interface ae1.0.
Jan 25 12:13:12.232777 OSPF hello from 172.27.255.5 (IFL 70, area 0.0.0.0) absorbed
...
Monitor the ae1 interface on R1 to discover the adjacency problem between R1 and R4.
...
18:24:19.203897 In IP (tos 0xc0, ttl 1, id 2632, offset 0, flags [none], proto:
OSPF (89), length: 52) 172.27.0.9 > 224.0.0.5: OSPFv2, Database Description,
length 32
Router-ID 172.27.255.5, Backbone Area, Authentication Type: simple (1)
Simple text password: Juniper
Options [External, Opaque], DD Flags [Init, More, Master], MTU: 1496,
Sequence: 0xac1eecd6
18:24:19.204948 Out IP (tos 0xc0, ttl 1, id 39476, offset 0, flags [none], proto:
OSPF (89), length: 112) 172.27.0.10 > 224.0.0.5: OSPFv2, Database Description,
length 92
Router-ID 172.27.255.1, Backbone Area, Authentication Type: simple (1)
Simple text password: Juniper
Options [External, Opaque], DD Flags [none], MTU: 1500, Sequence:
0xac1eecd6
Advertising Router 172.27.255.1, seq 0x80000043, age 1575s, length 28
Router LSA (1), LSA-ID: 172.27.255.1
Options: [External, Demand Circuit]
Advertising Router 172.27.255.1, seq 0x80000023, age 289s, length 8
Summary LSA (3), LSA-ID: 172.27.0.0
Options: [External, Demand Circuit]
Advertising Router 172.27.255.1, seq 0x8000001b, age 718s, length 16
External LSA (5), LSA-ID: 172.16.16.0
Options: [External, Demand Circuit]
Change the IPv4 netmask on R3’s ge-0/0/1 interface from /24 to /30. Next, change the
OSPFv3 hello-interval and dead-interval on R1’s ge-0/0/6 interface to 20 and 60,
respectively. Then change the family inet mtu value to 1496 on R1’s ae1 interface.
Alternatively, you can change the family inet mtu value on R4 to 1500. Examine the status
of the OSPF adjacencies once you have committed the configuration. Also, remember to
deactivate the traceoptions.
• R3:
[edit]
lab@R3# edit interfaces ge-0/0/1
commit complete
• R1:
[edit protocols]
lab@R1# deactivate ospf traceoptions
[edit protocols]
lab@R1# deactivate ospf3 traceoptions
[edit protocols]
lab@R1# set ospf3 area 0 interface ge-0/0/6.0 hello-interval 20 dead-interval 60
[edit protocols]
lab@R1# top edit interfaces ae1.0
commit complete
[edit]
lab@R4# run show interfaces terse lo0.0
Interface Admin Link Proto Local Remote
lo0.0 up up inet 172.27.255.5 --> 0/0
inet6 ::172.27.255.4/32
fe80::5668:290f:fc7a:8eed
[edit]
lab@R4# delete interfaces lo0.0 family inet address 172.27.255.5/32
[edit]
lab@R4# set interfaces lo0.0 family inet address 172.27.255.4
[edit]
lab@R4# commit
commit complete
[edit]
lab@R4# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.10 ae1.0 Full 172.27.255.1 128 31
172.27.0.17 ge-0/0/5.0 Full 172.27.255.3 128 26
172.27.0.5 ae0.0 Full 172.27.255.2 128 18
[edit]
lab@R4# run show ospf3 neighbor
ID Interface State Pri Dead
172.27.255.1 ae1.0 Full 128 16
Neighbor-address fe80::5254:ff:fe00:403
172.27.255.3 ge-0/0/5.0 Full 128 9
Neighbor-address fe80::5668:29ff:fe7a:b48b
172.27.255.2 ae0.0 Full 128 39
Neighbor-address fe80::5254:ff:fe00:c002
172.27.255.5 ae2.0 Exchange 128 37
Neighbor-address fe80::5254:ff:fe00:4b04
Changing the loopback address of R4 to the correct address did not solve the problem between
R4 and R5, but it is a step in the right direction. Monitor the ae2 interface on R4 to troubleshoot
this problem further.
• R4:
17:09:18.074283 In IP6 (class 0xc0, hlim 1, next-header: OSPF (89), length: 28)
fe80::5254:ff:fe00:4b04 > ff02::5: OSPFv3, Database Description, length 28
Router-ID 172.27.255.5, Area 0.0.0.2
Options [V6, Router], DD Flags [Init, More, Master], MTU 1486, DD-Sequence
0xac1c26fb
17:09:18.075175 Out IP6 (class 0xc0, hlim 1, next-header: OSPF (89), length: 88)
fe80::5254:ff:fe01:4 > ff02::5: OSPFv3, Database Description, length 88
Router-ID 172.27.255.4, Area 0.0.0.2
Options [V6, Router], DD Flags [none], MTU 1500, DD-Sequence 0xac1c26fb
Advertising Router 172.27.255.4, seq 0x80000001, age 29s, length 8
NSSA LSA (7), Area Local Scope, LSA-ID 0.0.0.1
Advertising Router 172.27.255.4, seq 0x80000001, age 37s, length 32
Intra-Area Prefix LSA (9), Area Local Scope, LSA-ID 0.0.0.1
Advertising Router 172.27.255.4, seq 0x80000001, age 37s, length 44
Link LSA (8), Link Local Scope, LSA-ID 0.0.0.4
...
17:09:21.161369 Out IP (tos 0xc0, ttl 1, id 37428, offset 0, flags [none], proto:
OSPF (89), length: 64) 172.27.0.21 > 224.0.0.5: OSPFv2, Hello, length 44
Router-ID 172.27.255.4, Area 0.0.0.2, Authentication Type: none (0)
Options [NSSA]
Hello Timer 5s, Dead Timer 20s, Mask 255.255.255.252, Priority 128
17:09:21.859849 In IP (tos 0xc0, ttl 1, id 15867, offset 0, flags [none], proto:
OSPF (89), length: 64) 172.27.0.22 > 224.0.0.5: OSPFv2, Hello, length 44
Router-ID 172.27.255.5, Area 0.0.0.2, Authentication Type: none (0)
Options [NSSA]
Hello Timer 5s, Dead Timer 40s, Mask 255.255.255.252, Priority 128
commit complete
• R5:
[edit]
lab@R5# edit interfaces ae2
commit complete
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.10 ae1.0 Full 172.27.255.1 128 35
172.27.0.17 ge-0/0/5.0 Full 172.27.255.3 128 26
TASK VERIFICATION
To verify this task, examine the OSPFv2 and OSPFv3 adjacencies on each router. If all the
adjacencies reach the Full state, then the task is complete.
• R1:
[edit interfaces ae1 unit 0]
lab@R1# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.9 ae1.0 Full 172.27.255.4 128 32
172.27.0.13 ge-0/0/6.0 Full 172.27.255.3 128 19
172.27.0.2 ge-0/0/3.0 Full 172.27.255.2 128 29
• R2:
[edit protocols]
lab@R2# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.6 ae0.0 Full 172.27.255.4 128 16
172.27.0.1 ge-0/0/1.0 Full 172.27.255.1 128 27
[edit protocols]
lab@R2# run show ospf3 neighbor
ID Interface State Pri Dead
172.27.255.4 ae0.0 Full 128 39
Neighbor-address fe80::5254:ff:fe01:2
172.27.255.1 ge-0/0/1.0 Full 128 10
Neighbor-address fe80::5668:29ff:fe7a:a0ed
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.10 ae1.0 Full 172.27.255.1 128 35
172.27.0.17 ge-0/0/5.0 Full 172.27.255.3 128 29
172.27.0.5 ae0.0 Full 172.27.255.2 128 16
172.27.0.22 ae2.0 Full 172.27.255.5 128 36
• R5:
[edit interfaces ae2]
lab@R5# run show ospf neighbor
Address Interface State ID Pri Dead
172.27.0.21 ae2.0 Full 172.27.255.4 128 38
172.27.0.26 ge-0/0/1.0 Full 172.27.255.3 128 25
• R2:
[edit protocols]
lab@R2# run ping 172.27.255.1 rapid count 2
PING 172.27.255.1 (172.27.255.1): 56 data bytes
36 bytes from 172.27.0.26: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 a5b5 0 0000 01 01 bcb6 172.27.0.5 172.27.255.1
.36 bytes from 172.27.0.26: Time to live exceeded
www.juniper.net OSPF Troubleshooting • Lab 5–19
JNCIE Service Provider Bootcamp
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 a5b7 0 0000 01 01 bcb4 172.27.0.5 172.27.255.1
.
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 0 packets received, 100% packet loss
[edit protocols]
lab@R2# run ping 172.27.255.3 rapid count 2
PING 172.27.255.3 (172.27.255.3): 56 data bytes
!!
--- 172.27.255.3 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.876/4.392/4.908/0.516 ms
[edit protocols]
lab@R2# run ping 172.27.255.4 rapid count 2
PING 172.27.255.4 (172.27.255.4): 56 data bytes
!!
--- 172.27.255.4 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.887/4.476/5.064/0.588 ms
[edit protocols]
lab@R2# run ping 172.27.255.5 rapid count 2
PING 172.27.255.5 (172.27.255.5): 56 data bytes
!!
--- 172.27.255.5 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 5.887/6.425/6.963/0.538 ms
• R3:
[edit interfaces ge-0/0/1]
lab@R3# run ping 172.27.255.1 rapid count 2
PING 172.27.255.1 (172.27.255.1): 56 data bytes
36 bytes from 172.27.0.26: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 380c 0 0000 01 01 29fe 172.27.0.103 172.27.255.1
.36 bytes from 172.27.0.26: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 380d 0 0000 01 01 29fd 172.27.0.103 172.27.255.1
.
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 0 packets received, 100% packet loss
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# run ping 172.27.255.1 rapid count 2
PING 172.27.255.1 (172.27.255.1): 56 data bytes
36 bytes from 172.27.0.105: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 a2b2 0 0000 01 01 bfac 172.27.0.18 172.27.255.1
.36 bytes from 172.27.0.105: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 a2b3 0 0000 01 01 bfab 172.27.0.18 172.27.255.1
.
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 0 packets received, 100% packet loss
Issuing a traceroute from any router helps pinpoint the area in which the routing loop is
occurring.
• R2:
[edit protocols]
lab@R2# run traceroute 172.27.255.1
traceroute to 172.27.255.1 (172.27.255.1), 30 hops max, 40 byte packets
1 172.27.0.1 (172.27.0.1) 8.902 ms 8.087 ms 8.137 ms
2 172.27.0.13 (172.27.0.13) 9.504 ms 10.524 ms 13.744 ms
3 172.27.0.105 (172.27.0.105) 10.694 ms 11.224 ms 11.853 ms
4 172.27.0.26 (172.27.0.26) 8.692 ms 14.503 ms 8.565 ms
5 172.27.0.105 (172.27.0.105) 12.784 ms 14.159 ms 13.812 ms
...
29 172.27.0.105 (172.27.0.105) 40.676 ms 36.593 ms 37.463 ms
30 172.27.0.26 (172.27.0.26) 36.736 ms 21.349 ms 23.143 ms
Answer: The traffic is going to R1, R3, R5, and back to R3. The
routing loop is occurring between R3 and R5.
Examine the routing tables of R2, R3, and R5 to gather more information on the routing loop.
• R2:
[edit protocols]
lab@R2# run show route 172.27.255.1
• R3:
[edit interfaces ge-0/0/1]
lab@R3# run show route 172.27.255.1
• R5:
[edit interfaces ae2]
lab@R5# run show route 172.27.255.1
Examine R1 to ensure that it is properly advertising its loopback address into the network. Fix
any problems that you might find.
• R1:
[edit interfaces ae1 unit 0]
lab@R1# run show ospf interface lo0.0 detail
Interface State Area DR ID BDR ID Nbrs
lo0.0 DRother 0.0.0.0 0.0.0.0 0.0.0.0 0
Type: LAN, Address: 172.27.25.1, Mask: 255.255.255.255, MTU: 65535, Cost: 0
Adj count: 0, Passive
• R1:
[edit interfaces ae1 unit 0]
lab@R1# up 2 edit lo0.0
commit complete
TASK VERIFICATION
This task is complete when each router can reach the loopback address of every other router in
the internal network.
• R2:
[edit protocols]
lab@R2# run ping 172.27.255.1 rapid count 2
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.358/3.678/3.997/0.319 ms
[edit protocols]
lab@R2# run ping 172.27.255.3 rapid count 2
PING 172.27.255.3 (172.27.255.3): 56 data bytes
!!
--- 172.27.255.3 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 4.395/5.136/5.876/0.740 ms
[edit protocols]
lab@R2# run ping 172.27.255.5 rapid count 2
PING 172.27.255.5 (172.27.255.5): 56 data bytes
!!
--- 172.27.255.5 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 5.250/7.474/9.699/2.224 ms
• R3:
[edit interfaces ge-0/0/1]
lab@R3# run ping 172.27.255.1 rapid count 2
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 3.183/3.539/3.896/0.357 ms
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# run ping 172.27.255.1 rapid count 2
• R5:
[edit interfaces ae2]
lab@R5# run ping 172.27.255.1 rapid count 2
PING 172.27.255.1 (172.27.255.1): 56 data bytes
!!
--- 172.27.255.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 4.963/5.235/5.507/0.272 ms
TASK INTERPRETATION
To complete this task you must configure Area 2 to use R4 as the primary exit for any unknown
destinations. This task is complicated by the criterion that R4 must remain in the overloaded
state. You must configure Area 2 to use R4 for any traffic for which R5 does not have specific
routing information. Note that this task applies to OSPFv2 and OSPFv3.
TASK COMPLETION
Begin this task by examining the default routes on R5 in the routing table. Then, examine the
default LSAs in the OSPF link-state database.
• R5:
[edit interfaces ae2]
lab@R5# run show route 0/0 exact detail
On R4 in Area 2, change the metric type value for the default LSA to 1 for OSPFv2 and OSPFv3.
Alternatively, you can simply remove the default-type statement and R4 will advertise the
default LSA with a Type 1 metric.
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# show
nssa {
default-lsa {
default-metric 1;
metric-type 2;
type-7;
}
no-summaries;
}
area-range 10.255.0.0/19 restrict;
interface ae2.0 {
interface-type p2p;
hello-interval 5;
dead-interval 40;
}
commit complete
TASK VERIFICATION
To verify this task, examine the routing table on R5. If the default route points towards R4, then
this task is complete.
• R5:
[edit interfaces ae2]
lab@R5# run show route 0/0 exact
TASK INTERPRETATION
Completing this task requires you to turn Area 1 into a totally stubby area. Configuring only a
stub area might satisfy the criteria of this task, however a totally stubby area will force more
traffic to use the designated ABR.
TASK COMPLETION
To complete this task, configure R1 and R4 as ABRs for Area 1. Then configure Area 1 to be a
NSSA area. Next, configure R1 as the primary exit point for IPv4 traffic by using the
no-summaries and default-metric commands under Area 1 in OSPFv2. When
configuring Area 1 under OSPFv3 on R1, set the no-summaries command but omit the
default-metric command. Then, configure R4 as the primary exit point for IPv6 traffic by
using the no-summaries and default-metric commands under Area 1 in OSPFv3. When
configuring Area 1 under OSPFv2 on R4 set the no-summaries command but omit the
default-metric command.
Remember to configure R2 as a NSSA router within Area 1. Forgetting to do so causes R2 to lose
all of its OSPF adjacencies.
• R1:
[edit interfaces lo0 unit 0]
lab@R1# top edit protocols ospf area 1
commit complete
• R4:
[edit protocols ospf3 area 0.0.0.2]
lab@R4# up 2 edit ospf area 1
commit complete
• R2:
[edit protocols]
lab@R2# set ospf area 1 nssa
[edit protocols]
lab@R2# set ospf3 area 1 nssa
[edit protocols]
lab@R2# commit
commit complete
TASK VERIFICATION
To verify this task, examine the inet.0 and inet6.0 routing tables on R2. If R1 is the primary exit
point for IPv4 traffic, and R4 is the primary exit point for all IPv6 traffic, the task is complete.
• R2:
[edit protocols]
lab@R2# run show route protocol ospf table inet.0
[edit protocols]
lab@R2# run show route protocol ospf table inet6.0
[edit protocols]
lab@R2# run ping 10.255.3.1 count 2
PING 10.255.3.1 (10.255.3.1): 56 data bytes
36 bytes from 172.27.0.1: Destination Net Unreachable
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 9eb8 0 0000 40 01 21d4 172.27.0.2 10.255.3.1
Examine the routing table on R1, R3, and R4 to gain further insight on the problem.
• R3:
[edit interfaces ge-0/0/1]
lab@R3# run show route 10.255.3.1
• R4:
[edit protocols ospf3 area 0.0.0.1]
lab@R4# run show route 10.255.3.1
Question: Can you determine why R1 does not have this prefix
in its routing table?
• R4:
Remove the restrict statement at the end of the area-range statement on R3 and R4.
Doing this allows the 10.255.0.0/19 prefix to be flooded into Area 0.
• R3:
[edit protocols ospf area 0.0.0.2]
lab@R3# delete nssa area-range 10.255.0.0/19 restrict
commit complete
• R4:
[edit protocols ospf area 0.0.0.2]
lab@R4# delete nssa area-range 10.255.0.0/19 restrict
commit complete
TASK VERIFICATION
To verify this task, ping the 10.255.3.1 address from R2. If R2 can communicate with the
10.255.3.1 address then the task is complete.
• R2:
[edit protocols]
lab@R2# run ping 10.255.3.1 rapid count 2
PING 10.255.3.1 (10.255.3.1): 56 data bytes
!!
--- 10.255.3.1 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 6.648/7.057/7.467/0.410 ms
STOP Tell your instructor that you have completed this lab.