Jir Lab Guide PDF
Jir Lab Guide PDF
Jir Lab Guide PDF
12.a
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an
agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software, may contain prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.
Contents
Lab 1: Protocol-Independent Routing (Detailed) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Part 1: Configuring and Monitoring Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Part 2: Configuring and Monitoring Static and Aggregate Routes . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Part 3: Working with Routing Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-16
Contents • iii
iv • Contents
Course Overview
This two-day course provides students with intermediate routing knowledge and configuration
examples. The course includes an overview of protocol-independent routing features, load
balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features.
Through demonstrations and hands-on labs, students will gain experience in configuring and
monitoring the Junos OS and monitoring device operations.This course uses Juniper Networks
SRX Series Services Gateways for the hands-on component, but the lab environment does not
preclude the course from being applicable to other Juniper hardware platforms running the Junos
OS. This course is based on Junos OS Release 12.1R1.9.
Objectives
After successfully completing this course, you should be able to:
• Describe typical uses of static, aggregate, and generated routes.
• Configure and monitor static, aggregate, and generated routes.
• Explain the purpose of Martian routes and add new entries to the default list.
• Describe typical uses of routing instances.
• Configure and share routes between routing instances.
• Describe load-balancing concepts and operations.
• Implement and monitor Layer 3 load balancing.
• Illustrate benefits of filter-based forwarding.
• Configure and monitor filter-based forwarding.
• Explain the operations of OSPF.
• Describe the role of the designated router.
• List and describe OSPF area types.
• Configure, monitor, and troubleshoot OSPF.
• Describe BGP and its basic operations.
• Name and describe common BGP attributes.
• List the steps in the BGP route selection algorithm.
• Describe BGP peering options and the default route advertisement rules.
• Configure and monitor BGP.
• Describe IP tunneling concepts and applications.
• Explain the basic operations of generic routing encapsulation (GRE) and IP over IP
(IP-IP) tunnels.
• Configure and monitor GRE and IP-IP tunnels.
• Describe various high availability features supported by the Junos OS.
• Configure and monitor some of the highlighted high availability features.
Intended Audience
This course benefits individuals responsible for configuring and monitoring devices running the
Junos OS.
Course Level
Junos Intermediate Routing is an intermediate-level course.
Day 1
Chapter 1: Course Introduction
Chapter 2: Protocol-Independent Routing
Lab 1: Protocol-Independent Routing
Chapter 3: Load Balancing and Filter-Based Forwarding
Lab 2: Load Balancing and Filter-Based Forwarding
Chapter 4: Open Shortest Path First
Lab 3: Open Shortest Path First
Day 2
Chapter 5: Border Gateway Protocol
Lab 4: Border Gateway Protocol
Chapter 6: IP Tunneling
Lab 5: IP Tunneling
Chapter 7: High Availability
Lab 6: High Availability
Appendix A: IPv6
Lab 7: IPv6 (Optional)
Appendix B: IS-IS
Lab 8: IS-IS (Optional)
Appendix C: RIP
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config.ini in the Filename field.
CLI Undefined Text where the variable’s value Type set policy policy-name.
is the user’s discretion and text
ping 10.0.x.y
where the variable’s value as
GUI Undefined shown in the lab guide might Select File > Save, and type
differ from the value the user filename in the Filename field.
must input.
Overview
This lab demonstrates configuration and monitoring of protocol-independent features on
devices running the Junos operating system. In this lab, you use the command-line
interface (CLI) to configure and monitor interfaces, static and aggregate routes, and
routing instances.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and verify proper operation of network interfaces.
• Configure and monitor static and aggregate routes.
• Configure routing instances and share routes between them using routing
table groups.
In this lab part, you configure network interfaces on your assigned device. You then
verify that the interfaces are operational and that the system adds the
corresponding routing table entries for the configured interfaces.
Note
The instructor will tell you the nature of your
access and will provide you with the
necessary details to access your assigned
device.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab1-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Navigate to the [edit interfaces] hierarchy level.Refer to the network
diagram and configure the interfaces for your assigned device. Use the VLAN-ID as
the logical unit value for the tagged interface. Use logical unit 0 for all other
interfaces. Remember to configure the loopback interface!
[edit]
lab@srxB-1# edit interfaces
[edit interfaces]
lab@srxB-1# set lo0 unit 0 family inet address address/32
[edit interfaces]
lab@srxB-1# set ge-0/0/3 unit 0 family inet address address/30
[edit interfaces]
lab@srxB-1# set ge-0/0/2 unit 0 family inet address address/30
[edit interfaces]
lab@srxB-1# set ge-0/0/1 unit 0 family inet address address/30
[edit interfaces]
lab@srxB-1# set ge-0/0/4 vlan-tagging
[edit interfaces]
lab@srxB-1# set ge-0/0/4 unit vlan-id vlan-id vlan-id
[edit interfaces]
lab@srxB-1# set ge-0/0/4 unit vlan-id family inet address address/24
[edit interfaces]
lab@srxB-1#
Step 1.5
Display the interface configuration and ensure that it matches the details outlined
on the network diagram for this lab. When you are comfortable with the interface
configuration, issue the commit-and-quit command to activate the
configuration and return to operational mode.
[edit interfaces]
lab@srxB-1# show
ge-0/0/0 {
description "MGMT Interface - DO NOT DELETE";
unit 0 {
family inet {
address 10.210.35.133/26;
}
}
}
ge-0/0/1 {
unit 0 {
family inet {
address 172.20.77.1/30;
}
}
}
ge-0/0/2 {
unit 0 {
family inet {
address 172.20.66.1/30;
}
}
}
ge-0/0/3 {
unit 0 {
family inet {
address 172.18.1.2/30;
}
}
}
ge-0/0/4 {
vlan-tagging;
unit 113 {
vlan-id 113;
family inet {
address 172.20.113.1/24;
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.1.1/32;
}
[edit interfaces]
lab@srxB-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxB-1>
Step 1.6
Issue the show interfaces terse command to verify the current state of the
recently configured interfaces.
lab@srxB-1> show interfaces terse
Interface Admin Link Proto Local Remote
ge-0/0/0 up up
ge-0/0/0.0 up up inet 10.210.35.133/26
gr-0/0/0 up up
ip-0/0/0 up up
lsq-0/0/0 up up
lt-0/0/0 up up
mt-0/0/0 up up
sp-0/0/0 up up
sp-0/0/0.0 up up inet
sp-0/0/0.16383 up up inet 10.0.0.1 --> 10.0.0.16
10.0.0.6 --> 0/0
128.0.0.1 --> 128.0.1.16
128.0.0.6 --> 0/0
ge-0/0/1 up up
ge-0/0/1.0 up up inet 172.20.77.1/30
ge-0/0/2 up up
ge-0/0/2.0 up up inet 172.20.66.1/30
ge-0/0/3 up up
ge-0/0/3.0 up up inet 172.18.1.2/30
ge-0/0/4 up up
ge-0/0/4.113 up up inet 172.20.113.1/24
ge-0/0/4.32767 up up
ge-0/0/5 up down
ge-0/0/6 up up
ge-0/0/7 up up
ge-0/0/8 up up
ge-0/0/9 up up
ge-0/0/10 up up
ge-0/0/11 up up
ge-0/0/12 up up
ge-0/0/13 up down
ge-0/0/14 up up
ge-0/0/15 up up
fxp2 up up
fxp2.0 up up tnp 0x1
gre up up
ipip up up
irb up up
lo0 up up
Step 1.7
Issue the show route command to view the current route entries.
lab@srxB-1> show route
Step 1.8
Use the ping utility to verify reachability to the neighboring devices connected to your
device. If necessary, check with the remote student team and your instructor to
ensure that their devices have the required configuration for the interfaces. The
following sample capture shows ping tests from srxB-1 to the Internet gateway,
srxD-2, and vr-device, which are all directly connected:
Note
Use Ctrl + c to stop a continuous ping
operation.
STOP Before continuing, ensure that the remote team in your pod is ready to
proceed.
In this lab part, you configure and monitor static and aggregate routes.
Step 2.1
Enter configuration mode and load the lab1-part2-start.config file from
the/var/home/lab/jir/ directory. Commit your configuration when complete.
[edit]
lab@srxB-1# load override jir/lab1-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.2
Refer to the network diagram for this lab and answer the following question.
Step 2.3
Enter configuration mode and define a default static route. Use the IP address
identified in the last step as the next hop for the default static route.
[edit]
lab@srxB-1# edit routing-options
[edit routing-options]
lab@srxB-1# set static route 0/0 next-hop address
[edit routing-options]
lab@srxB-1#
Step 2.4
Activate the newly added static route and issue the run show route
172.31.15.1 command.
[edit routing-options]
lab@srxB-1# commit
commit complete
[edit routing-options]
lab@srxB-1# run show route 172.31.15.1
Step 2.5
Issue the run ping 172.31.15.1 command to ping the Internet host.
Note
The Internet host should contain the
required routes to send traffic back to the
student devices.
[edit routing-options]
lab@srxB-1# run ping 172.31.15.1
PING 172.31.15.1 (172.31.15.1): 56 data bytes
64 bytes from 172.31.15.1: icmp_seq=0 ttl=64 time=1.321 ms
64 bytes from 172.31.15.1: icmp_seq=1 ttl=64 time=1.444 ms
64 bytes from 172.31.15.1: icmp_seq=2 ttl=64 time=1.405 ms
64 bytes from 172.31.15.1: icmp_seq=3 ttl=64 time=1.522 ms
64 bytes from 172.31.15.1: icmp_seq=4 ttl=64 time=7.270 ms
^C
--- 172.31.15.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.321/2.592/7.270/2.340 ms
Step 2.6
Use the preference statement to ensure that the default static route maintains
the default route preference of 5, and that all future static routes use a route
preference of 20.
[edit routing-options]
lab@srxB-1# set static route 0/0 preference 5
[edit routing-options]
lab@srxB-1# set static defaults preference 20
Note
Refer to the network diagram, as
necessary, for the next lab step.
Step 2.7
Add a static route to the loopback address of the directly attached virtual router.
[edit routing-options]
lab@srxB-1# set static route local-vr-loopback/32 next-hop local-vr-address
Step 2.8
Activate the configuration and issue the run show route protocol static
command to view all static routes.
[edit routing-options]
lab@srxB-1# commit
commit complete
[edit routing-options]
lab@srxB-1# run show route protocol static
Step 2.9
Ping the loopback address of the directly attached virtual router.
Note
The virtual routers have a preconfigured
default static route using their directly
connected student devices as the next hop.
[edit routing-options]
lab@srxB-1# run ping local-vr-loopback
PING 192.168.1.2 (192.168.1.2): 56 data bytes
64 bytes from 192.168.1.2: icmp_seq=0 ttl=64 time=1.347 ms
64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=1.292 ms
64 bytes from 192.168.1.2: icmp_seq=2 ttl=64 time=7.350 ms
64 bytes from 192.168.1.2: icmp_seq=3 ttl=64 time=1.255 ms
64 bytes from 192.168.1.2: icmp_seq=4 ttl=64 time=2.460 ms
^C
--- 192.168.1.2 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.255/2.741/7.350/2.348 ms
Step 2.10
Add an aggregate route for the 10.1.0.0/16 prefix by issuing the set aggregate
route 10.1.0.0/16 command.
[edit routing-options]
lab@srxB-1# run show route protocol aggregate
[edit routing-options]
lab@srxB-1# run show route hidden detail
[edit routing-options]
lab@srxB-1# set aggregate route 172.20.64.0/18
[edit routing-options]
lab@srxB-1# commit
commit complete
[edit routing-options]
lab@srxB-1# run show route protocol aggregate detail
[edit routing-options]
lab@srxB-1# run show route 172.20.64.1
[edit routing-options]
lab@srxB-1# run ping 172.20.64.1
PING 172.20.64.1 (172.20.64.1): 56 data bytes
ping: sendto: No route to host
ping: sendto: No route to host
^C
--- 172.20.64.1 ping statistics ---
2 packets transmitted, 0 packets received, 100% packet loss
STOP Before continuing, ensure that the remote team in your pod is ready to
proceed.
In this lab part, you configure a routing instance and use routing table groups to
share routes between the master routing table and user-defined routing tables.
Step 3.1
Navigate to the top of the hierarchy and load the lab1-part3-start.config
file from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit routing-options]
lab@srxB-1# top
[edit]
lab@srxB-1# load override jir/lab1-part3-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 3.2
Navigate to the [edit routing-instances] hierarchy level. Define a routing
instance named instance-a that uses the virtual-router instance type and
includes the ge-0/0/1.0 and ge-0/0/2.0 interfaces.
[edit]
lab@srxB-1# edit routing-instances
[edit routing-instances]
lab@srxB-1# set instance-a instance-type virtual-router
[edit routing-instances]
lab@srxB-1# set instance-a interface ge-0/0/1.0
[edit routing-instances]
lab@srxB-1# set instance-a interface ge-0/0/2.0
[edit routing-instances]
lab@srxB-1#
[edit routing-instances]
lab@srxB-1# set instance-a routing-options static route remote-loopback/30
next-hop remote-ge-0/0/1-address
[edit routing-instances]
lab@srxB-1# set instance-a routing-options static route remote-vr-address/24
next-hop remote-ge-0/0/2-address
[edit routing-instances]
lab@srxB-1# set instance-a routing-options static route remote-vr-address/24
next-hop remote-ge-0/0/1-address
[edit routing-instances]
lab@srxB-1# show
instance-a {
instance-type virtual-router;
interface ge-0/0/1.0;
interface ge-0/0/2.0;
routing-options {
static {
route 192.168.2.0/30 next-hop [ 172.20.66.2 172.20.77.2 ];
route 172.20.114.0/24 next-hop [ 172.20.66.2 172.20.77.2 ];
}
}
}
Step 3.4
Activate the changes and display the routing tables using the run show route
command.
[edit routing-instances]
lab@srxB-1# commit
commit complete
[edit routing-instances]
lab@srxB-1# run show route
Step 3.5
Verify reachability to the remote student device using the run ping address
command, where address is the address assigned to the remote team’s ge-0/0/2
interface.
[edit routing-instances]
lab@srxB-1# run ping address
PING 172.20.66.2 (172.20.66.2): 56 data bytes
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
^C
--- 172.20.66.2 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Step 3.6
Add the routing-instance instance-a option to the command referenced
in the previous step.
[edit routing-instances]
lab@srxB-1# run ping address routing-instance instance-a
PING 172.20.66.2 (172.20.66.2): 56 data bytes
64 bytes from 172.20.66.2: icmp_seq=0 ttl=64 time=1.222 ms
64 bytes from 172.20.66.2: icmp_seq=1 ttl=64 time=1.207 ms
Step 3.7
Attempt to ping the loopback address of the remote student device. Source the ping
operation from the instance-a routing instance.
[edit routing-instances]
lab@srxB-1# run ping remote-loopback-address routing-instance instance-a
PING 192.168.2.1 (192.168.2.1): 56 data bytes
36 bytes from 172.20.66.2: Destination Net Unreachable
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 229f 0 0000 40 01 a74b 172.20.66.1 192.168.2.1
^C
--- 192.168.2.1 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Step 3.8
Navigate to the [edit routing-options] hierarchy level. Issue the set
rib-groups inet.0-to-instance-a import-rib [inet.0
instance-a.inet.0] command to create a routing table group that imports
routes from inet.0 into instance-a.inet.0.
[edit routing-instances]
lab@srxB-1# top edit routing-options
[edit routing-options]
lab@srxB-1# set rib-groups inet.0-to-instance-a import-rib [inet.0
instance-a.inet.0]
[edit routing-options]
lab@srxB-1#
Step 3.9
Issue the set rib-groups instance-a-to-inet.0 import-rib
[instance-a.inet.0 inet.0] command to create a routing table group that
imports routes from instance-a.inet.0 into inet.0.
[edit routing-options]
lab@srxB-1# set rib-groups instance-a-to-inet.0 import-rib [instance-a.inet.0
inet.0]
Step 3.10
Apply the inet.0-to-instance-a routing table group to import interface and
static routes from the inet.0 routing table to the instance-a.inet.0 routing
table. Activate the changes and display the instance-a.inet.0 routing table to
ensure that the routes were properly imported.
[edit routing-options]
lab@srxB-1# set interface-routes rib-group inet inet.0-to-instance-a
[edit routing-options]
lab@srxB-1# set static rib-group inet.0-to-instance-a
[edit routing-options]
lab@srxB-1# commit
commit complete
[edit routing-options]
lab@srxB-1# run show route table instance-a.inet.0
lab@srxB-1>
Note
Ensure that the remote team finishes the
previous step before proceeding.
Step 3.13
Attempt to ping the loopback address of the remote student device from the master
inet.0 instance and user-defined instance-a instance.
lab@srxB-1> ping remote-loopback-address
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: icmp_seq=0 ttl=64 time=1.414 ms
64 bytes from 192.168.2.1: icmp_seq=1 ttl=64 time=7.248 ms
64 bytes from 192.168.2.1: icmp_seq=2 ttl=64 time=1.376 ms
^C
--- 192.168.2.1 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.376/3.346/7.248/2.759 ms
Step 3.14
Log out of your assigned device using the exit command.
lab@srxB-1> exit
srxB-1 (ttyu0)
login:
Overview
This lab demonstrates configuration and monitoring of load balancing and filter-based
forwarding (FBF) on devices running the Junos operating system. In this lab, you use the
command-line interface (CLI) to configure and monitor load balancing and FBF.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and monitor the effects of a load-balancing policy.
• Configure and monitor FBF.
In this lab part, you add static routes to your remote partner. You then verify the
default load-balancing behavior. Finally, you configure and monitor load balancing.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Issue the configure
command to enter configuration mode and load the reset configuration file using
the load override /var/home/lab/jir/lab2-start.config
command. After the configuration has been loaded, commit the changes using the
commit command.
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Define two static routes to the loopback addresses of the remote team’s device and
the remote virtual router and the remote subnet that connects the remote team’s
device and the remote virtual router. Both static routes should include two next-hop
addresses of the remote team’s ge-0/0/2 and ge-0/0/1 interfaces. Refer to the
network diagram for this lab as necessary. Once you are satisfied with the
configuration, activate the changes and return to operational mode.
[edit]
lab@srxB-1# edit routing-options
[edit routing-options]
lab@srxB-1# set static route remote-loopback/30 next-hop
remote-ge-0/0/2-address
[edit routing-options]
lab@srxB-1# set static route remote-loopback/30 next-hop
remote-ge-0/0/1-address
[edit routing-options]
lab@srxB-1# set static route remote-vr-address/24 next-hop
remote-ge-0/0/2-address
[edit routing-options]
lab@srxB-1# set static route remote-vr-address/24 next-hop
remote-ge-0/0/1-address
[edit routing-options]
lab@srxB-1# show
static {
defaults {
preference 20;
}
route 0.0.0.0/0 {
next-hop 172.18.1.1;
preference 5;
}
route 192.168.1.2/32 next-hop 172.20.113.10;
[edit routing-options]
lab@srxB-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxB-1>
Step 1.5
Display the routing table entries for the loopback addresses of the remote team’s
device, the remote virtual router, and the remote subnet that connects the remote
team’s device and the remote virtual router.
lab@srxB-1> show route remote-loopback/30
Step 1.6
Display the forwarding table entries for the same destination prefixes and answer
the question that follows.
Step 1.7
Enter configuration mode and navigate to the [edit policy-options]
hierarchy level.
lab@srxB-1> configure
Entering configuration mode
[edit]
lab@srxB-1# edit policy-options
[edit policy-options]
lab@srxB-1#
Step 1.8
Define a load-balancing policy named balance-traffic that will load-balance
traffic over all equal-cost paths.
[edit policy-options]
lab@srxB-1# set policy-statement balance-traffic then load-balance per-packet
Step 1.11
Navigate to the [edit forwarding-options] hierarchy level and configure
your device to evaluate Layer 3 and Layer 4 port data when performing the
load-balancing hash operation for IP version 4 (IPv4) traffic. Activate the
configuration changes and return to operational mode.
[edit routing-options forwarding-table]
lab@srxB-1# top edit forwarding-options
[edit forwarding-options]
lab@srxB-1# set hash-key family inet layer-3
[edit forwarding-options]
lab@srxB-1# set hash-key family inet layer-4
[edit forwarding-options]
lab@srxB-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxB-1>
Step 1.12
Perform a series of traceroute operations (at least three instances) from your
assigned device to the loopback address assigned to the remote virtual router.
lab@srxB-1> traceroute remote-vr-loopback
traceroute to 192.168.2.2 (192.168.2.2), 30 hops max, 40 byte packets
1 172.20.66.2 (172.20.66.2) 1.563 ms 4.989 ms 172.20.77.2 (172.20.77.2)
1.543 ms
2 192.168.2.2 (192.168.2.2) 3.768 ms 3.292 ms 2.894 ms
Note
The results illustrated in this lab step may
not be the same for all Junos platforms.
Some platforms will not allow this type of
verification and will require you to pass
traffic through the device i.e. not sourced
from the device (as in this step).
[edit]
lab@srxB-1# load override jir/lab2-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.2
Enter configuration mode and navigate to the [edit firewall family inet]
hierarchy level.
lab@srxB-1> configure
Entering configuration mode
[edit]
lab@srxB-1# edit firewall family inet
[edit routing-instances]
lab@srxB-1# set instance-66 instance-type forwarding
[edit routing-instances]
lab@srxB-1#
[edit routing-instances]
lab@srxB-1# set instance-66 routing-options static route remote-vr-address/24
next-hop remote-ge-0/0/2-interface
Step 2.7
Use the copy command to copy the contents defined in the instance-66 routing
instance to a new routing instance named instance-77.
[edit routing-instances]
lab@srxB-1# copy instance-66 to instance-77
[edit routing-instances]
lab@srxB-1# show
instance-66 {
instance-type forwarding;
routing-options {
static {
route 192.168.2.0/30 next-hop 172.20.66.2;
route 172.20.114.0/24 next-hop 172.20.66.2;
}
}
}
instance-77 {
instance-type forwarding;
routing-options {
static {
route 192.168.2.0/30 next-hop 172.20.66.2;
route 172.20.114.0/24 next-hop 172.20.66.2;
}
}
}
Step 2.8
Issue the edit instance-77 command to navigate to the [edit
routing-instances instance-77] hierarchy level. Next, issue the
replace pattern 66 with 77 command to modify the next-hop addresses
for the static routes.
[edit routing-instances]
lab@srxB-1# edit instance-77
[edit routing-options]
lab@srxB-1# set rib-groups fbf-rib-group import-rib [inet.0 instance-66.inet.0
instance-77.inet.0]
[edit routing-options]
lab@srxB-1#
Step 2.10
Issue the set interface-routes rib-group inet fbf-rib-group
command to apply the newly defined routing table group to import interface routes
between the master and user-defined routing instances.
[edit routing-options]
lab@srxB-1# set interface-routes rib-group inet fbf-rib-group
Step 2.11
Activate the configuration and issue the run show route command to ensure
that the routing tables for the user-defined routing instances have the required
routing information.
[edit routing-options]
lab@srxB-1# commit
commit complete
[edit routing-options]
lab@srxB-1# run show route
...TRIMMED...
Note
The next lab steps require you to log in to
the virtual router attached to your team’s
device. The virtual routers are logical
devices created on a J Series Services
Router. Refer to the management network
diagram for the IP address of the virtual
router device.
Step 2.12
Open a separate Telnet session to the virtual router device.
vr-device (ttyp0)
login: username
Password:
NOTE: This router is divided into many virtual routers used by different teams.
Please only configure your own virtual router.
b1@vr-device>
Step 2.14
From your assigned virtual router, perform several traceroute operations (at least
three instances) to the loopback address assigned to the remote virtual router.
Note
Remember to reference the appropriate
instance name when sourcing Internet
Control Message Protocol (ICMP) traffic
from a virtual router. The instance names
match the virtual router names listed on
the network diagram for this lab.
Step 2.15
Using your local virtual router’s loopback address as the source address, perform a
new series of traceroute operations (at least three instances) to the loopback
address assigned to the remote virtual router.
Note
Remember to reference the appropriate
instance name when sourcing traffic from a
virtual router. The instance names match
the virtual router names listed on the
network diagram for this lab.
Step 2.16
Use the ping utility to verify that your assigned virtual router can reach the Internet
host. Remember to reference the appropriate routing instance.
b1@vr-device> ping 172.31.15.1 routing-instance vrvlan-id
PING 172.31.15.1 (172.31.15.1): 56 data bytes
36 bytes from 172.20.113.1: Destination Net Unreachable
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 7ab4 0 0000 40 01 23b6 172.20.113.10 172.31.15.1
^C
--- 172.31.15.1 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Step 2.17
Return to the session opened to your assigned student device.
From the session opened to your assigned student device, navigate to the [edit
routing-instances] hierarchy level and define a default static route that
directs matching traffic to the inet.0 routing table for both routing instances.
Activate the configuration change and return to operational mode.
[edit routing-options]
lab@srxB-1# top edit routing-instances
[edit routing-instances]
lab@srxB-1# set instance-66 routing-options static route 0/0 next-table inet.0
[edit routing-instances]
lab@srxB-1# set instance-77 routing-options static route 0/0 next-table inet.0
[edit routing-instances]
lab@srxB-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxB-1>
Step 2.18
Issue the show route table instance-66 protocol static command
and ensure that the default static route was installed and directs traffic to the
inet.0 routing table.
lab@srxB-1> show route table instance-66 protocol static
Step 2.19
Return to the session opened to the virtual router.
From the session opened to the virtual router, perform the ping test to the Internet
host again. Remember to reference the appropriate routing instance.
b1@vr-device> ping 172.31.15.1 routing-instance vrvlan-id
PING 172.31.15.1 (172.31.15.1): 56 data bytes
64 bytes from 172.31.15.1: icmp_seq=0 ttl=63 time=2.888 ms
64 bytes from 172.31.15.1: icmp_seq=1 ttl=63 time=2.953 ms
64 bytes from 172.31.15.1: icmp_seq=2 ttl=63 time=2.941 ms
64 bytes from 172.31.15.1: icmp_seq=3 ttl=63 time=2.794 ms
64 bytes from 172.31.15.1: icmp_seq=4 ttl=63 time=4.225 ms
^C
--- 172.31.15.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 2.794/3.160/4.225/0.535 ms
Step 2.20
Return to the session opened to your assigned student device.
From the session opened to your assigned student device, log out of your assigned
device using the exit command.
lab@srxB-1> exit
srxB-1 (ttyu0)
login:
Overview
This lab demonstrates configuration and monitoring of the Open Shortest Path First
(OSPF) protocol. In this lab, you use the command-line interface (CLI) to configure,
monitor, and troubleshoot OSPF.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and monitor a multi-area OSPF network.
• Perform basic OSPF troubleshooting.
In this lab part, you configure and monitor a multi-area OSPF network. You will first
load a baseline configuration. Next you define a router ID for your assigned device.
You then configure your device to participate in a multi-area OSPF network and verify
operations using CLI operational mode commands.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Issue the configure
command to enter configuration mode and load the reset configuration file using
the load override /var/home/lab/jir/lab3-start.config
command. After the configuration has been loaded, commit the changes using the
commit command.
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab3-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Navigate to the [edit routing-options] hierarchy level and define the router
ID on your router using the IP address assigned to your local lo0 interface as the
input value.
[edit]
lab@srxB-1# edit routing-options
[edit routing-options]
lab@srxB-1# set router-id local-loopback-address
[edit routing-options]
lab@srxB-1#
Step 1.5
Navigate to the [edit protocols ospf] hierarchy level and configure OSPF
Area 0. Refer to the network diagram as necessary and remember to include lo0.0.
[edit routing-options]
lab@srxB-1# top edit protocols ospf
Step 1.9
Display routes advertised to and received from OSPF using the run show ospf
route command.
[edit protocols ospf]
lab@srxB-1# run show ospf route
Topology default Route Table:
Step 1.10
Associate a metric of 100 with the ge-0/0/2.0 interface and activate the change.
[edit protocols ospf]
lab@srxB-1# set area 0 interface ge-0/0/2.0 metric 100
Note
Before proceeding, ensure that the remote
team in your pod finishes the previous step.
Step 1.11
Reissue the run show ospf route command to see your changes.
Step 1.12
Issue the run show route protocol ospf command to view OSPF routes
installed in the routing table.
[edit protocols ospf]
lab@srxB-1# run show route protocol ospf
Step 1.13
Configure your device to function as an area border router (ABR), joining Area 0 with
a second area (either Area 1 or Area 2, depending on your assigned device). Refer to
the network diagram for this lab for the area and interface details. Once it is
configured, activate the configuration changes and return to operational mode.
[edit protocols ospf]
lab@srxB-1# set area area interface ge-0/0/4.vlan-id
lab@srxB-1>
Step 1.14
Issue the show ospf neighbor command to verify the current OSPF adjacency
details.
lab@srxB-1> show ospf neighbor
Address Interface State ID Pri Dead
172.20.77.2 ge-0/0/1.0 Full 192.168.2.1 128 33
172.20.66.2 ge-0/0/2.0 Full 192.168.2.1 128 33
172.20.113.10 ge-0/0/4.113 Full 192.168.1.2 128 37
Step 1.15
Issue the show ospf database command to display the current OSPF database.
lab@srxB-1> show ospf database
[edit]
lab@srxB-1# edit policy-options
[edit policy-options]
lab@srxB-1#
Step 1.17
Define a new routing policy named inject-default-route. Include a single
term named match-default-route that matches and accepts the default static
route into OSPF.
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 1.20
Issue the run show route 0/0 exact command to view the current routing
table entries for the default route.
[edit protocols ospf]
lab@srxB-1# run show route 0/0 exact
Step 1.21
Issue the save /var/tmp/working-ospf.config command to save the
current OSPF configuration.
[edit protocols ospf]
lab@srxB-1# save /var/tmp/working-ospf.config
Wrote 17 lines of configuration to '/var/tmp/working-ospf.conf'
In this lab part, you perform basic OSPF troubleshooting. First, you modify your
device’s current configuration to make it incompatible with the attached virtual
router. You then enable OSPF traceoptions to log protocol activity. Finally, you display
the traceoptions log and the OSPF statistics to view the associated errors.
Step 2.1
Return to the top of the hierarchy and load the lab3-part2-start.config file
from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit]
lab@srxB-1# load override jir/lab3-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.2
Issue the run show ospf statistics to display the current OSPF errors and
statistics.
[edit]
lab@srxB-1# run show ospf statistics
Receive errors:
None
Step 2.3
Navigate to the [edit protocols ospf] hierarchy and rename the
nonbackbone area (Area 1 or Area 2 depending on your assigned device) to
area 3.
[edit]
lab@srxB-1# top edit protocols ospf
Step 2.5
Define traceoptions for OSPF so that OSPF errors write to a file named
trace-ospf. Include the detail option with the error flag to capture
additional details for the OSPF errors. Activate the configuration change using the
commit command.
[edit protocols ospf]
lab@srxB-1# set traceoptions file trace-ospf
Step 2.7
Issue the run show ospf statistics command to verify any current error
counters.
[edit protocols ospf]
lab@srxB-1# run show ospf statistics
Receive errors:
17 area mismatches
Step 2.10
Issue the run show ospf statistics command to verify the current error
counters.
[edit protocols ospf]
lab@srxB-1# run show ospf statistics
Receive errors:
39 area mismatches
8 stub area mismatches
Step 2.11
Issue the delete command and confirm the operation to delete the current OSPF
configuration. Next, issue the load merge /var/tmp/
working-ospf.config command to load the configuration you saved earlier in
this lab. Activate the restored configuration and return to operational mode using
the commit and-quit command.
[edit protocols ospf]
lab@srxB-1# delete
Delete everything under this level? [yes,no] (no) yes
lab@srxB-1>
Step 2.13
Log out of your assigned device using the exit command.
lab@srxB-1> exit
srxB-1 (ttyu0)
login:
Overview
This lab demonstrates configuration and monitoring of the Border Gateway Protocol
(BGP). In this lab, you use the command-line interface (CLI) to configure and monitor BGP.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and monitor BGP.
• Export aggregate routes to an EBGP peer.
• Configure and apply a next-hop self policy.
In this lab part, you configure and monitor internal BGP (IBGP). You first define the
autonomous system (AS) number for your device. Next, you establish IBGP peering
sessions using loopback addresses. You then monitor the established IBGP peering
sessions using CLI operational mode commands.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Issue the configure
command to enter configuration mode and load the reset configuration file using
the load override /var/home/lab/jir/lab4-start.config
command. After the configuration has been loaded, commit the changes using the
commit command.
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab4-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Navigate to the [edit routing-options] hierarchy level and define the AS
number designated for your network. Refer to the network diagram for this lab as
necessary.
[edit]
lab@srxB-1# edit routing-options
[edit routing-options]
lab@srxB-1# set autonomous-system 64700
[edit routing-options]
lab@srxB-1#
Step 1.5
Navigate to the [edit protocols bgp] hierarchy level. Configure a BGP group
named my-int-group that includes the three devices within your assigned
network as IBGP peers. Use the loopback address assigned to your device as the
local address and the remote loopback addresses of the devices within your AS
number as the peer addresses. When you are satisfied with the newly defined BGP
configuration, issue the commit command to activate the changes.
[edit routing-options]
lab@srxB-1# top edit protocols bgp
Step 1.6
Configure the my-int-group for the internal BGP session type. Next, issue the
commit command to activate the configuration.
[edit protocols bgp]
lab@srxB-1# set group my-int-group type internal
Step 1.8
Issue the run show route receive-protocol bgp neighbor command,
where neighbor is the loopback address of each IBGP peer.
[edit protocols bgp]
lab@srxB-1# run show route receive-protocol bgp local-vr-loopback-address
In this lab part, you configure and monitor EBGP. You first establish an EBGP peering
session with the external peer. You then advertise aggregate routes to your EBGP
peer to represent the prefixes reachable from your AS. Finally, you monitor the
established EBGP peering session using CLI operational mode commands.
Step 2.1
Return to the top of the hierarchy and load the lab4-part2-start.config file
from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit protocols bgp]
lab@srxB-1# top
[edit]
lab@srxB-1# load override jir/lab4-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Note
Before proceeding, ensure the remote
student team in your pod has finished the
previous step.
Step 2.3
Issue the run show bgp summary command to view the current BGP summary
information.
Step 2.4
Issue the run show bgp neighbor address command to view details for the
EBGP peering session. Replace address with the IP address value assigned to your
EBGP peer. Use the generated output to answer the following questions:
[edit protocols bgp]
lab@srxB-1# run show bgp neighbor address
Peer: 172.18.1.1+179 AS 65510 Local: 172.18.1.2+62658 AS 64700
Type: External State: Established Flags: <Sync>
Last State: OpenConfirm Last Event: RecvKeepAlive
Last Error: None
Options: <Preference PeerAS Refresh>
Holdtime: 90 Preference: 170
Step 2.5
Display the BGP routes received from the EBGP peer using the run show route
receive-protocol bgp address command, where address is the IP
address value assigned to your EBGP peer.
[edit protocols bgp]
lab@srxB-1# run show route receive-protocol bgp address
Step 2.6
Issue the run show route advertising-protocol bgp address
command, where address is the IP address value assigned to your EBGP peer.
[edit protocols bgp]
lab@srxB-1# run show route advertising-protocol bgp address
[edit routing-options]
lab@srxB-1# set aggregate route 172.21.0.0/22
[edit routing-options]
lab@srxB-1# set aggregate route 172.22.0.0/22
[edit routing-options]
lab@srxB-1# set aggregate route 192.168.1.0/30
[edit routing-options]
lab@srxB-1# set aggregate route 192.168.2.0/30
[edit routing-options]
lab@srxB-1# show aggregate
route 172.20.64.0/18;
route 172.21.0.0/22;
route 172.22.0.0/22;
route 192.168.1.0/30;
route 192.168.2.0/30;
[edit routing-options]
lab@srxB-1#
Step 2.10
Navigate to the [edit policy-options] hierarchy and define a new policy
named adv-aggregates that includes two terms. Name the first term
match-aggregate-routes. It should match and accept the defined aggregate
routes. Ensure that you match the aggregate protocol. Name the second term
deny-other. It should reject all other routes.
[edit routing-options]
lab@srxB-1# top edit policy-options
[edit policy-options]
lab@srxB-1# edit policy-statement adv-aggregates
Step 2.13
Examine the routing table entry for the aggregate route representing the loopback
addresses for the remote side to determine why it is not being advertised into BGP.
[edit protocols bgp]
lab@srxB-1# run show route remote-loopback/30
Step 2.14
Decrease the route preference for the aggregate route representing the loopback
addresses of the remote student and virtual router devices to 19. Activate the
change and issue the run show route remote-loopback/30 command to
verify that the aggregate route is now active.
[edit protocols bgp]
lab@srxB-1# top edit routing-options aggregate
Step 2.15
Verify that the effects of the route preference change by issuing the run show
route advertising-protocol bgp address command, where address
is the IP address value assigned to your EBGP peer.
In this lab part, you define and apply a next-hop self policy to alter the next-hop
value associated with routes received from your EBGP peer. You monitor the effects
of this policy.
Note
The following lab steps require you to log in
to the virtual router attached to your team’s
device. The virtual routers are logical
devices created on a J Series Services
Router. Refer to the management network
diagram for the IP address of the virtual
router.
Step 3.1
Return to the top of the hierarchy and load the lab3-part2-start.config file
from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit routing-options aggregate]
lab@srxB-1# top
[edit]
lab@srxB-1# load override jir/lab4-part3-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 3.2
Open a separate Telnet session to the virtual router.
Step 3.3
Log in to the virtual router attached to your team’s device using the login information
shown in the following table:
vr-device (ttyp0)
login: username
Password:
NOTE: This router is divided into many virtual routers used by different teams.
Please only configure your own virtual router.
b1@vr-device>
Step 3.4
From your assigned virtual router, issue the show route table
vrvlan-id.inet.0 protocol bgp command, where vlan-id is the value
assigned to your virtual router.
b1@vr-device> show route table vrvlan-id.inet.0 protocol bgp
Step 3.5
View the hidden routes by issuing the show route table
vr11vlan-id.inet.0 hidden extensive command, where vlan-id is
the value assigned to your virtual router.
b1@vr-device> show route table vrvlan-id.inet.0 hidden extensive
[edit policy-options]
lab@srxB-1# set policy-statement change-next-hop then next-hop self
[edit policy-options]
lab@srxB-1#
Step 3.7
Navigate to the [edit protocols bgp] hierarchy and apply the
change-next-hop policy as an export policy to the my-int-group BGP group.
Activate the changes and return to operational mode using the commit and-quit
command.
[edit policy-options]
lab@srxB-1# top edit protocols bgp
lab@srxB-1>
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 3.8
Return to the Telnet session opened to the virtual router attached to your assigned
device.
From the Telnet session opened to the virtual router attached to your assigned
device, issue the show route table vrvlan-id.inet.0 protocol bgp
extensive command, where vlan-id is the value assigned to your virtual router.
b1@vr-device> show route table vrvlan-id.inet.0 protocol bgp extensive
srxB-1 (ttyu0)
login:
Overview
This lab demonstrates using the command-line interface (CLI) to configure and monitor a
generic routing encapsulation (GRE) tunnel.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and monitor a GRE tunnel.
• Use the defined GRE tunnel to merge two remote OSPF domains.
In this lab part, you configure and monitor a GRE tunnel. Using static routes, you
direct traffic to the remote subnets in your pod through the newly formed GRE
tunnel.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Issue the configure
command to enter configuration mode and load the reset configuration file using
the load override /var/home/lab/jir/lab5-start.config
command. After the configuration has been loaded, commit the changes using the
commit command.
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab5-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Navigate to the [edit interfaces] hierarchy level. Next, disable the ge-0/0/1
and ge-0/0/2 interfaces. Finally, set the mtu of the ge-0/0/3 interface to 1524.
[edit]
lab@srxB-1# edit interfaces
[edit interfaces]
lab@srxB-1# set ge-0/0/1 disable
[edit interfaces]
lab@srxB-1# set ge-0/0/2 disable
[edit interfaces]
lab@srxB-1# set ge-0/0/3 mtu 1524
[edit interfaces]
lab@srxB-1#
Step 1.5
Define a new GRE interface and tunnel using the IP address assigned to the
loopback interface on your device as the source address and the IP address
assigned to the loopback interface on the remote student device as the destination
address. Use unit 0 for the logical point-to-point interface.
[edit interfaces]
lab@srxB-1# set gr-0/0/0 unit 0 tunnel source local-loopback-address
[edit interfaces]
lab@srxB-1# set gr-0/0/0 unit 0 tunnel destination remote-loopback-address
[edit interfaces]
lab@srxB-1# show gr-0/0/0
unit 0 {
tunnel {
source 192.168.1.1;
destination 192.168.2.1;
}
family inet;
}
Step 1.6
Activate the changes and issue the run show interfaces terse gr-0/0/0
command to verify the state of the newly defined GRE interface.
[edit interfaces]
lab@srxB-1# commit
commit complete
[edit interfaces]
lab@srxB-1# run show interfaces terse gr-0/0/0
Interface Admin Link Proto Local Remote
gr-0/0/0 up up
gr-0/0/0.0 up up inet
Step 1.7
Navigate to the [edit routing-options static] hierarchy and modify the
static routes for the subnets associated with the remote team to use only the newly
defined GRE interface. Ensure that you delete the current next-hop values assigned
to those static routes.
[edit interfaces]
lab@srxB-1# top edit routing-options static
Note
In the current state, the routing table
purges the static route for the remote
partners loopback prefix when the
gr-0/0/0.0 interface goes down. Once the
remote loopback prefix is removed from the
routing table, the remote tunnel endpoint
address is resolved through the default
BGP route received from the EBGP peer.
Once the remote tunnel endpoint address
is resolved through the default BGP route,
the gr-0/0/0.0 interface returns to the up
state and the GRE tunnel re-establishes.
When the GRE tunnel is re-established, the
static route for the remote partners
loopback prefix is added back to the
routing table, at which time the same
problem repeats. This cycle continues until
corrective action is taken. You will correct
this issue in a subsequent step.
Step 1.9
Define a new static route for the remote tunnel endpoint address (the loopback
address of the remote student device) using the local ge-0/0/3 address as the next
hop. Issue the commit command to activate the changes.
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 1.12
Use the ping utility to verify reachability to the remote virtual router. Use a
destination host address of the remote partner’s virtual router. Use a source host
address of your local ge-0/0/4 interface (172.20.11v.1). Refer to the network
diagram for this task as necessary.
[edit routing-options static]
lab@srxB-1# run ping remote-vr-address source local-ge-0/0/4-address
PING 172.20.114.10 (172.20.114.10): 56 data bytes
64 bytes from 172.20.114.10: icmp_seq=0 ttl=63 time=1.970 ms
64 bytes from 172.20.114.10: icmp_seq=1 ttl=63 time=2.126 ms
64 bytes from 172.20.114.10: icmp_seq=2 ttl=63 time=1.846 ms
64 bytes from 172.20.114.10: icmp_seq=3 ttl=63 time=8.237 ms
64 bytes from 172.20.114.10: icmp_seq=4 ttl=63 time=2.082 ms
64 bytes from 172.20.114.10: icmp_seq=5 ttl=63 time=7.248 ms
64 bytes from 172.20.114.10: icmp_seq=6 ttl=63 time=4.234 ms
^C
--- 172.20.114.10 ping statistics ---
7 packets transmitted, 7 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.846/3.963/8.237/2.521 ms
In this lab part, you configure the GRE interface to participate in OSPF, thus allowing
the GRE tunnel to merge the two remote OSPF domains back to a single OSPF
domain. You will then re-enable the ge-0/0/1 and ge-0/0/2 interfaces and ensure
that the gr-0/0/0.0 interface serves as the backup link for OSPF area 0.
Step 2.1
Return to the top of the hierarchy and load the lab5-part2-start.config file
from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit routing-options static]
lab@srxB-1# top
[edit]
lab@srxB-1# load override jir/lab5-part2-start.config
load complete
[edit]
lab@srxB-1#
Step 2.2
Verify the current state of the OSPF neighbors using the run show ospf
neighbor command.
[edit]
lab@srxB-1# run show ospf neighbor
Address Interface State ID Pri Dead
172.20.113.10 ge-0/0/4.113 Full 192.168.1.2 128 37
Step 2.3
Navigate to the [edit protocols ospf] hierarchy level and add the
gr-0/0/0.0 interface under OSPF Area 0.0.0.0.
[edit]
lab@srxB-1# edit protocols ospf
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 2.4
Activate the configuration change by issuing the commit command and then issue
the run show ospf neighbor command several times to verify that a new
OSPF neighbor was added and that the new neighbor session is stable.
[edit protocols ospf]
lab@srxB-1# commit
commit complete
lab@srxB-1>
Step 2.6
Issue the show route address command, where address represents the
value assigned to the loopback interface address of the remote student device.
lab@srxB-1> show route remote-loopback-address
Step 2.7
Issue the show ospf neighbor command several times to verify that the new
OSPF neighbor has been added and that the new neighbor session is stable.
lab@srxB-1> show ospf neighbor
Address Interface State ID Pri Dead
192.168.2.1 gr-0/0/0.0 Full 192.168.2.1 128 36
172.20.113.10 ge-0/0/4.113 Full 192.168.1.2 128 32
Step 2.8
Enter configuration mode and re-enable the ge-0/0/1 and ge-0/0/2 interfaces.
Activate the changes using the commit command.
lab@srxB-1> configure
Entering configuration mode
[edit]
lab@srxB-1# delete interfaces ge-0/0/1 disable
[edit]
lab@srxB-1# delete interfaces ge-0/0/2 disable
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.9
Ensure that the remote team in your pod has finished the previous task, then issue
the run show ospf neighbors command.
Step 2.10
Add a metric value of 200 to the gr-0/0/0.0 interface under the [edit
protocols ospf area 0.0.0.0] hierarchy to ensure that the tunnel serves
as a backup path when the ge-0/0/1.0 and ge-0/0/2.0 interfaces are operational.
Activate the configuration change using the commit command.
[edit]
lab@srxB-1# set protocols ospf area 0 interface gr-0/0/0.0 metric 200
[edit]
lab@srxB-1# show protocols ospf area 0
interface lo0.0;
interface ge-0/0/1.0;
interface ge-0/0/2.0 {
metric 100;
}
interface gr-0/0/0.0 {
metric 200;
}
[edit]
lab@srxB-1# commit
commit complete
Step 2.11
Issue the run show ospf route command to confirm that OSPF routes are not
currently using the gr-0/0/0.0 interface.
Step 2.12
Disable the ge-0/0/1 and ge-0/0/2 interfaces once again. Commit your changes
and issue the run show ospf route command to confirm that the remote OSPF
routes are now learned through the gr-0/0/0 interface.
[edit]
lab@srxB-1# set interfaces ge-0/0/1 disable
[edit]
lab@srxB-1# set interfaces ge-0/0/2 disable
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1# run show ospf route
Topology default Route Table:
Step 2.13
Re-enable the ge-0/0/1 and ge-0/0/2 interfaces. Activate the configuration
changes and return to operational mode using the commit and-quit command.
[edit]
lab@srxB-1# delete interfaces ge-0/0/1 disable
[edit]
lab@srxB-1# delete interfaces ge-0/0/2 disable
[edit]
lab@srxB-1# commit and-quit
commit complete
Exiting configuration mode
Step 2.14
Log out of your assigned device using the exit command.
lab@srxB-1> exit
srxB-1 (ttyu0)
login:
Overview
This lab demonstrates how to configure and monitor some high availability (HA) features
using the command-line interface (CLI).
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and monitor graceful restart.
• Configure and monitor the Bidirectional Forwarding Detection (BFD) protocol.
• Configure and monitor the Virtual Router Redundancy Protocol (VRRP).
In this lab part, you configure and monitor graceful restart. Before enabling graceful
restart, you perform some verification tasks using the directly attached virtual
router. You then enable graceful restart and perform the same verification tasks to
determine the impact that graceful restart can have in a network. You should refer to
the diagram for this lab part for topological details.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Issue the configure
command to enter configuration mode and load the reset configuration file using
the load override /var/home/lab/jir/lab6-start.config
command. After the configuration has been loaded, commit the changes using the
commit command.
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab6-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Note
This lab part requires you to log in to the
virtual router attached to your team’s
device. Refer to the management network
diagram for the IP address of the virtual
router.
Step 1.4
Open a separate Telnet session to the virtual router.
Step 1.5
Log in to the virtual router attached to your team’s device using the login information
shown in the following table:
vr-device (ttyp0)
login: username
Password:
NOTE: This router is divided into many virtual routers used by different teams.
Please only configure your own virtual router.
b1@vr-device>
Step 1.6
Initiate a continuous ping from your assigned virtual router to the loopback address
of the remote virtual router. Refer to the network diagram for this lab part as
necessary.
Note
Remember to reference the appropriate
instance name when sourcing Internet
Control Message Protocol (ICMP) traffic
from a virtual router. The instance names
match the virtual router names listed on
the network diagram for this lab.
lab@srxB-1>
Step 1.8
Return to the session opened to the attached virtual router.
From the session opened to the attached virtual router, monitor the ping operation
for a moment. Next, type Ctrl + c to stop the continuous ping operation.
...TRIMMED...
64 bytes from 192.168.2.2: icmp_seq=15 ttl=62 time=2.965 ms
64 bytes from 192.168.2.2: icmp_seq=16 ttl=62 time=3.191 ms
36 bytes from 172.20.117.1: Destination Net Unreachable
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 5641 0 0000 40 01 409f 172.20.117.10 192.168.2.2
...TRIMMED...
b1@vr-device>
Step 1.9
Return to the session opened to your assigned student device.
From your assigned student device, enter configuration mode and navigate to the
[edit routing-options] hierarchy level.
lab@srxB-1> configure
Entering configuration mode
[edit]
lab@srxB-1# edit routing-options
[edit routing-options]
lab@srxB-1#
Step 1.10
Enable graceful restart and activate the change using the commit command.
[edit routing-options]
lab@srxB-1# set graceful-restart
[edit routing-options]
lab@srxB-1# commit
commit complete
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 1.11
Return to the session opened to the attached virtual router.
From the session opened to the attached virtual router, initiate a continuous ping
from your assigned virtual router to the loopback address of the remote virtual
router.
Note
Remember to reference the appropriate
instance name when sourcing ICMP traffic
from a virtual router. The instance names
match the virtual router names listed on
the network diagram for this lab.
Step 1.15
Navigate to the [edit protocols bgp] hierarchy level and disable graceful
restart for the EBGP neighbor defined under the my-ext-group BGP group.
[edit routing-options]
lab@srxB-1# top edit protocols bgp
Step 1.17
Re-enable graceful restart for the EBGP peering session. Issue the commit
command to activate the change.
[edit protocols bgp]
lab@srxB-1# delete group my-ext-group neighbor address graceful-restart
In this lab part, you configure and monitor BFD. You should refer to the diagram for
this lab part for topological details.
Step 2.1
Return to the top of the hierarchy and load the lab6-part2-start.config file
from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit protocols ospf]
lab@srxB-1# top
[edit]
lab@srxB-1# load override jir/lab6-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.2
Issue the run show bfd session command to determine whether your student
device has any active BFD sessions.
[edit]
lab@srxB-1# run show bfd session
0 sessions, 0 clients
Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
Step 2.3
Enable BFD on the interfaces participating in OSPF (except lo0.0). Use 300 ms as
the minimum transmit and receive interval value. Activate the configuration changes
using the commit command.
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 2.4
Issue the run show bfd session command to determine whether your student
device has any active BFD sessions.
[edit protocols ospf]
lab@srxB-1# run show bfd session
Detect Transmit
Address State Interface Time Interval Multiplier
172.20.66.2 Up ge-0/0/2.0 0.900 0.300 3
172.20.77.2 Up ge-0/0/1.0 0.900 0.300 3
172.20.113.10 Up ge-0/0/4.113 1.200 0.400 3
192.168.2.1 Up gr-0/0/0.0 0.900 0.300 3
4 sessions, 4 clients
Cumulative transmit rate 12.5 pps, cumulative receive rate 12.5 pps
Step 2.5
Issue the run show bgp neighbor address command, where address
represents the value assigned to the EBGP peer connected to your student device.
[edit protocols ospf]
lab@srxB-1# run show bgp neighbor address
Peer: 172.18.1.1+179 AS 65510 Local: 172.18.1.2+55908 AS 64700
Type: External State: Established Flags: <Sync>
Last State: OpenConfirm Last Event: RecvKeepAlive
Last Error: None
Export: [ adv-aggregates ]
Options: <Preference AdvertiseInactive GracefulRestart PeerAS Refresh>
Holdtime: 90 Preference: 170
Number of flaps: 0
Peer ID: 10.10.10.10 Local ID: 192.168.1.1 Active Holdtime: 90
Keepalive Interval: 30 Peer index: 0
BFD: disabled, down
Local Interface: ge-0/0/3.0
NLRI for restart configured on peer: inet-unicast
NLRI advertised by peer: inet-unicast
NLRI for this session: inet-unicast
Step 2.6
Navigate to the [edit protocols bgp] hierarchy and enable BFD for the EBGP
peering session. Use a minimum interval value of 300 ms for this BFD session and
activate the change using the commit command.
[edit protocols ospf]
lab@srxB-1# up 1 edit bgp
5 sessions, 5 clients
Cumulative transmit rate 15.8 pps, cumulative receive rate 15.8 pps
In this lab part, you configure and monitor VRRP. You should refer to the diagram for
this lab part for topological details. Note that the lab diagram used for this lab part is
different than the lab diagram used for the previous parts of this lab.
Step 3.1
Return to the top of the hierarchy and load the lab6-part3-start.config file
from the/var/home/lab/jir/ directory. Commit your configuration when
complete.
[edit protocols bgp]
lab@srxB-1# top
[edit]
lab@srxB-1# load override jir/lab6-part3-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 3.2
Navigate to the [edit interfaces ge-0/0/4] hierarchy and define two new
logical interfaces using the details provided on the network diagram for this lab part.
Step 3.4
Configure VRRP on the newly defined logical interfaces. Associate the new logical
interface with the lower VLAN-ID with the lower VRRP Group and the new logical
interface with the higher VLAN-ID with higher VRRP Group. Refer to the network
diagram associated with this lab part for all interface and VRRP configuration
variables for your assigned pod and device.
[edit interfaces ge-0/0/4]
lab@srxB-1# edit unit vlan-id family inet address address/24
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 3.5
Activate the configuration changes using the commit command then issue the run
show vrrp command to determine the current VRRP state for each VRRP group.
A sample output from both srxB-1 and srxB-2 follows:
[edit interfaces ge-0/0/4]
lab@srxB-1# commit
commit complete
Step 3.6
Open a separate Telnet session to the virtual router.
vr-device (ttyp0)
login: username
Password:
NOTE: This router is divided into many virtual routers used by different teams.
Please only configure your own virtual router.
b1@vr-device>
Step 3.8
From the virtual routers associated with your pod, ping the Internet host listed on the
network diagram. Note that each virtual router used in this lab part has a default
static route with the virtual IP (VIP) address associated with each respective subnet
as the gateway address.
Note
Remember to reference the appropriate
instance name when sourcing ICMP traffic
from a virtual router. The instance names
match the virtual router names listed on
the network diagram for this lab.
Step 3.9
From the virtual routers associated with your pod, ping the gateway address for each
virtual router’s respective subnet.
Note
Remember to reference the appropriate
instance name when sourcing ICMP traffic
from a virtual router. The instance names
match the virtual router names listed on
the network diagram for this lab.
Step 3.10
Return to the session opened to your assigned student device.
From your assigned student device, enable the accept-data configuration option
for both VRRP groups. Activate the configuration changes using the commit
command.
[edit interfaces ge-0/0/4]
lab@srxB-1# edit unit vlan-id family inet address address/24
Step 3.12
Return to the session opened to your assigned student device.
From your assigned student device, enable the interface tracking option for the
VRRP group for which your device is currently functioning as master VRRP router.
Track the ge-0/0/3.0 interface and reduce the priority value by 101 if the tracked
interface goes down. Activate the configuration change and return to the root of the
configuration hierarchy.
Note
If you are assigned srxX-1, you should
enable interface tracking only for
vrrp-group 1z. If you are assigned
srxX-2, you should enable interface
tracking only for vrrp-group 2z.
[edit]
lab@srxB-1#
Step 3.13
Disable the ge-0/0/3.0 interface and activate the change using the commit
command.
[edit]
lab@srxB-1# set interfaces ge-0/0/3 unit 0 disable
[edit]
lab@srxB-1# commit
commit complete
Step 3.14
Issue the run show vrrp track command to view the current interface
tracking details.
[edit]
lab@srxB-1# run show vrrp track
Track Int State Speed VRRP Int Group VR State Current prio
ge-0/0/3.0 down 0 ge-0/0/4.203 12 backup 99
Step 3.15
Re-enable the ge-0/0/3.0 interface and activate the change by using the commit
command.
[edit]
lab@srxB-1# delete interfaces ge-0/0/3 unit 0 disable
[edit]
lab@srxB-1# commit
commit complete
Step 3.16
Verify the current status of the tracked interface and its associated VRRP group by
issuing the run show vrrp track command.
[edit]
lab@srxB-1# run show vrrp track
Track Int State Speed VRRP Int Group VR State Current prio
ge-0/0/3.0 up 1g ge-0/0/4.203 12 master 200
[edit]
lab@srxB-1# commit and-quit
commit complete
Exiting configuration mode
lab@srxB-1> exit
srxB-1 (ttyu0)
login:
Overview
This lab demonstrates configuration and monitoring of IP version 6 (IPv6) interfaces on
devices running the Junos operating system. In this lab, you use the command-line
interface (CLI) to configure and monitor interfaces, static routing, basic OSPF, and generic
routing encapsulation (GRE) tunnels.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and verify proper operation of IPv6 network interfaces.
• Configure and monitor static IPv6 routing.
• Configure and monitor OSPF with IPv6 interfaces.
• Configure a GRE interface to tunnel IPv6 traffic over an IP version 4 (IPv4)
network.
In this lab part, you will configure network interfaces on your assigned device. You
will then verify that the interfaces are operational and that the system adds the
corresponding route table entries for the configured interfaces.
Note
Depending on the class, the lab equipment
used might be remote from your physical
location. The instructor will inform you as to
the nature of your access and will provide
you with the details needed to access your
assigned device.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab7-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Enable IPv6 on the router using the set security forwarding-options
family inet6 mode packet-based command. Activate the configuration
using the commit command.
[edit]
lab@srxB-1# set security forwarding-options family inet6 mode packet-based
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 1.5
Issue the run show route table inet6 to display the contents of the IPv6
route table.
[edit]
lab@srxB-1# run show route table inet6
[edit]
lab@srxB-1#
[edit]
lab@srxB-1# run show route all
[edit interfaces]
lab@srxB-1# set lo0 unit 0 family inet6 address address/128
[edit interfaces]
ab@srxA-1# set ge-0/0/3 unit 0 family inet6 address address/64
[edit interfaces]
lab@srxB-1# set ge-0/0/2 unit 0 family inet6 address address/64
Step 1.7
Display the interface configuration and ensure that it matches the details outlined
on the network diagram for this lab. When you are comfortable with the interface
configuration, issue the commit-and-quit command to activate the
configuration and return to operational mode.
[edit interfaces]
lab@srxB-1# show
ge-0/0/0 {
description "MGMT Interface - DO NOT DELETE";
unit 0 {
family inet {
address 10.210.35.133/26;
}
}
}
ge-0/0/2 {
unit 0 {
family inet6 {
address 2001:172:20:66::1/64;
}
}
}
ge-0/0/3 {
unit 0 {
family inet6 {
address 2001:172:18:1::2/64;
}
}
}
lo0 {
unit 0 {
family inet6 {
address 2001:192:168:1::1/128;
}
}
}
lab@srxB-1>
Step 1.8
Issue the show interfaces terse command to verify the current state of the
recently configured interfaces.
lab@srxB-1> show interfaces terse
Interface Admin Link Proto Local Remote
ge-0/0/0 up up
ge-0/0/0.0 up up inet 10.210.35.133/26
gr-0/0/0 up up
ip-0/0/0 up up
lsq-0/0/0 up up
lt-0/0/0 up up
mt-0/0/0 up up
sp-0/0/0 up up
sp-0/0/0.0 up up inet
sp-0/0/0.16383 up up inet 10.0.0.1 --> 10.0.0.16
10.0.0.6 --> 0/0
128.0.0.1 --> 128.0.1.16
128.0.0.6 --> 0/0
ge-0/0/1 up up
ge-0/0/2 up up
ge-0/0/2.0 up up inet6 2001:172:20:66::1/64
fe80::226:88ff:fee1:5482/64
ge-0/0/3 up up
ge-0/0/3.0 up up inet6 2001:172:18:1::2/64
fe80::226:88ff:fee1:5483/64
ge-0/0/4 up up
ge-0/0/5 up down
ge-0/0/6 up up
ge-0/0/7 up up
ge-0/0/8 up up
ge-0/0/9 up up
ge-0/0/10 up up
ge-0/0/11 up up
ge-0/0/12 up down
ge-0/0/13 up down
ge-0/0/14 up up
ge-0/0/15 up up
fxp2 up up
fxp2.0 up up tnp 0x1
gre up up
ipip up up
irb up up
lo0 up up
lo0.0 up up inet6 2001:192:168:1::1
fe80::226:880f:fce1:5480
lo0.16384 up up inet 127.0.0.1 --> 0/0
lo0.16385 up up inet 10.0.0.1 --> 0/0
Step 1.10
Use the ping utility to verify reachability to the neighboring devices connected to your
device. If needed, check with the remote student team and your instructor to ensure
that their devices have the required configuration for the interfaces. The following
sample capture shows ping tests from srxB-1 to the Internet gateway and
srxB-2, which are all directly connected:
Note
The first ping of the 25 might be lost and
show up as a “.” (period).
STOP Before continuing, ensure that the remote team in your pod is ready to
proceed.
In this lab part, you will configure and monitor a default static IPv6 route.
Step 2.1
Enter configuration mode and load the lab7-part2-start.config file from
the/var/home/lab/jir/ directory. Commit your configuration when complete.
lab@srxB-1> configure
[edit]
lab@srxB-1# load override jir/lab7-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.2
Attempt to ping the Internet host referenced on the network diagram for this lab.
Note
[edit]
lab@srxB-1# run ping 2001:172:31:15::1
PING6(56=40+8+8 bytes) 2001:192:168:1::1 --> 2001:172:31:15::1
ping: sendmsg: No route to host
ping6: wrote 2001:172:31:15::1 16 chars, ret=-1
ping: sendmsg: No route to host
ping6: wrote 2001:172:31:15::1 16 chars, ret=-1
ping: sendmsg: No route to host
ping6: wrote 2001:172:31:15::1 16 chars, ret=-1
Step 2.3
Define a default static route. Use the IP address identified in the last step as the
next hop for the default static route.
[edit]
lab@srxB-1# edit routing-options rib inet6.0
Step 2.5
Issue the ping 2001:172:31:15::1 command to ping the Internet host.
Note
The Internet host should contain the
required routes to send traffic back to the
student devices.
STOP Notify your instructor that you have finished Part 2. Before proceeding,
ensure that the remote team within your pod is ready to continue on to
Part 3.
In this lab part, you will configure and monitor an IPv6 interface in OSPF. You will
configure a single OSPF Area 0 based on the network diagram for this lab. Finally,
you will perform some verification tasks to ensure that OSPF works properly.
Step 3.1
Enter configuration mode and load the lab7-part3-start.config file from
the/var/home/lab/jir/ directory. Commit your configuration when complete.
lab@srxB-1> configure
[edit]
lab@srxB-1# load override jir/lab7-part3-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Note
RIP and OSPF both require new versions to
support IPv6. These new versions are
known as RIPng and OSPFv3. No changes
are necessary for IS-IS because it supports
IPv6 natively.
Step 3.2
Define OSPF Area 0 and include the internal interface that connects to the remote
team’s device. Ensure that you also include the lo0 interface. Also, recall that only
OSPF version 3 supports IPv6. Issue the show command to view the resulting
configuration.
Note
Remember to specify the appropriate
logical interface! If the logical unit is not
specified, the Junos OS assumes a logical
unit of zero (0).
[edit]
lab@srxB-1# edit protocols ospf3
Step 3.3
Activate the candidate configuration using the commit and-quit command to
return to operational mode. Issue the show ospf3 neighbor command to verify
OSPF neighbor adjacency state information.
Note
The OSPF adjacency state for each
neighbor is dependent on that neighbor’s
configuration. Ensure that the neighboring
team has added the required OSPF
configuration and committed the changes.
The virtual routers contain preconfigured
settings added by your instructor.
2001:192:168:2::1/128
*[OSPF3/10] 00:01:33, metric 1
> to fe80::226:88ff:fee1:4f02 via ge-0/0/2.0
ff02::5/128 *[OSPF3/10] 00:02:22, metric 1
MultiRecv
5 sessions, 5 clients
Cumulative transmit rate 15.8 pps, cumulative receive rate 15.8 pps
In this lab part, you configure a GRE tunnel to carry IPv6 traffic over IPv4. You should
refer to the diagram for this lab part for topological details. Note that the lab diagram
used for this lab part is slightly different from the lab diagram used for the previous
parts of this lab.
Step 4.1
Enter configuration mode and load the lab7-part4-start.config file from
the/var/home/lab/jir/ directory. Commit your configuration when complete.
lab@srxB-1> configure
[edit]
lab@srxB-1# load override jir/lab7-part4-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 4.2
First, delete the protocols and routing-options stanzas. Second, delete
interfaces ge-0/0/2, ge-0/0/3 and the loopback interface.
[edit]
lab@srxB-1# delete protocols
[edit]
lab@srxB-1# delete routing-options
[edit]
lab@srxB-1# edit interfaces
[edit interfaces]
lab@srxB-1# delete lo0
[edit interfaces]
lab@srxB-1#
[edit interfaces]
lab@srxB-1# set ge-0/0/3 unit 0 family inet address address/30
[edit interfaces]
lab@srxB-1# top edit routing-options
[edit routing-options]
lab@srxB-1# set static route remote-loopback-address/32 next-hop address
[edit routing-options]
lab@srxB-1#l
Step 4.4
Display your changes and ensure they match the details outlined on the network
diagram for this lab. When you are comfortable with the interface configuration,
issue the commit-and-quit command to activate the configuration and return to
operational mode.
[edit routing-options]
lab@srxB-1# top
[edit]
lab@srxB-1# show interfaces
ge-0/0/0 {
description "MGMT Interface - DO NOT DELETE";
unit 0 {
family inet {
address 10.210.35.133/26;
}
}
}
ge-0/0/3 {
unit 0 {
family inet {
address 172.18.1.2;
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.1.1/32;
}
}
}
lab@srxB-1>
Step 4.5
At this point, you now have a basic IPv4 network. Test the reachability of the remote
student device’s loopback using the ping command. Be sure to source the ping from
your device’s loopback.
lab@srxB-1> ping remote-loopback-address source local-loopback-address rapid
PING 192.168.2.1 (192.168.2.1): 56 data bytes
!!!!!
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.890/4.365/8.045/2.677 ms
Step 4.6
Define a new GRE interface and tunnel using the IP address assigned to the
loopback interface on your device as the source address and the IP address
assigned to the loopback interface on the remote student device as the destination
address. Use unit 0 for the logical point-to-point interface.
lab@srxB-1> configure
Entering configuration mode
[edit]
lab@srxB-1# edit interfaces
[edit interfaces]
lab@srxB-1# set gr-0/0/0 unit 0 family inet
[edit interfaces]
lab@srxB-1# set gr-0/0/0 unit 0 tunnel source local-loopback-address
[edit interfaces]
lab@srxB-1# set gr-0/0/0 unit 0 tunnel destination remote-loopback-address
[edit interfaces]
lab@srxB-1# run show interfaces terse gr-0/0/0
Interface Admin Link Proto Local Remote
gr-0/0/0 up up
gr-0/0/0.0 up up inet
Step 4.8
Configure an IPv6 address on your tunnel interface. Refer to the lab diagram for the
IPv6 address to use. When you are satisfied, activate your changes with the commit
command.
[edit interfaces]
lab@srxB-1# set gr-0/0/0 unit 0 family inet6 address address/64
[edit interfaces]
lab@srxB-1# commit
commit complete
Step 4.9
Verify you can reach the remote student device’s IPv6 tunnel address using the ping
command.
[edit interfaces]
lab@srxB-1# run ping remote-IPv6-address count 3
PING6(56=40+8+8 bytes) 2001:c0ff:ee:100::1 --> 2001:c0ff:ee:100::2
16 bytes from 2001:c0ff:ee:100::2, icmp_seq=0 hlim=64 time=2.830 ms
Step 4.10
Issue a run show route 2001:c0ff:ee:100::z command to show that the
IPv6 destination is, indeed, the tunnel interface.
[edit interfaces]
lab@srxB-1# run show route remote-IPv6-address
2001:c0ff:ee:100::/64
*[Direct/0] 00:31:30
> via gr-0/0/0.0
Step 4.11
Issue a run show interfaces gr-0/0/0.0 command. Note the IP-Header
line.
[edit interfaces]
lab@srxB-1# run show interfaces gr-0/0/0.0
Logical interface gr-0/0/0.0 (Index 65) (SNMP ifIndex 546)
Flags: Point-To-Point SNMP-Traps 0x0
IP-Header 192.168.2.1:192.168.1.1:47:df:64:0000000000000000
...TRIMMED...
Step 4.12
Issue a run show route address command to see how our encapsulated IPv6
packets are leaving the router, where address is the remote team’s loopback
address.
[edit interfaces]
lab@srxB-1# run show route remote-loopback-address
Step 4.13
Exit configuration mode and log out of your assigned device using the exit
command.
[edit interfaces]
lab@srxB-1# exit configuration-mode
Exiting configuration mode
srxB-1 (ttyu0)
login:
STOP
Tell your instructor that you have completed Lab 7.
Overview
This lab demonstrates configuration and monitoring of the IS-IS protocol. In this lab, you
use the command-line interface (CLI) to configure, monitor, and troubleshoot IS-IS.
The lab is available in two formats: a high-level format designed to make you think through
each step and a detailed format that offers step-by-step instructions complete with
sample output from most commands.
By completing this lab, you will perform the following tasks:
• Configure and monitor a multi-level IS-IS network.
• Perform basic IS-IS troubleshooting.
In this lab part, you configure and monitor a multi-level IS-IS network. You will first
define a router ID for your assigned device. You then configure your device to
participate in a multi-level IS-IS network and verify operations using CLI operational
mode commands.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the management network diagram to
determine the management address of your student device.
Step 1.2
Access the CLI at your station using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your team’s station. The following example uses a simple Telnet
access to srxB-1 with the Secure CRT program as a basis:
Step 1.3
Log in to the student device with the username lab using a password of lab123.
Note that both the name and password are case-sensitive. Issue the configure
command to enter configuration mode and load the reset configuration file using
the load override /var/home/lab/jir/lab8-start.config
command. After the configuration has been loaded, commit the changes using the
commit command.
login: lab
Password:
[edit]
lab@srxB-1# load override jir/lab8-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
Step 1.4
Navigate to the [edit routing-options] hierarchy level and define the router
ID on your router using the IP address assigned to the lo0 interface as the input
value.
[edit]
lab@srxB-1# edit routing-options
[edit routing-options]
lab@srxB-1# set router-id local-loopback-address
[edit routing-options]
lab@srxB-1#
Step 1.5
Navigate to the [edit interfaces] hierarchy level and add family ISO and the
Network Entity Title (NET) address to the lo0 interface. Pad each octet of the router
ID with leading zeros to form the system ID portion of the NET address. For instance,
if the router’s lo0 address is 192.168.1.1, the system ID portion of the net address
will be 1921.6800.1001. The N-selector (SEL) field is 00.
[edit routing-options]
lab@srxB-1# top edit interfaces
[edit interfaces]
lab@srxB-1# set lo0 unit 0 family iso address IS-IS-area.1921.6800.z001.00
[edit interfaces]
lab@srxB-1# show lo0
unit 0 {
family inet {
address 192.168.1.1/32;
}
family iso {
address 49.0001.1921.6800.1001.00;
}
}
[edit interfaces]
lab@srxB-1# set ge-0/0/2 unit 0 family iso
[edit interfaces]
lab@srxB-1# set ge-0/0/4 unit vlan-id family iso
Step 1.7
Navigate to the [edit protocols isis] hierarchy level and configure IS-IS
levels. Make interfaces lo0, ge-0/0/1 and ge-0/0/2 level 2 only. Refer to the
network diagram as necessary and remember to include lo0.0.
[edit interfaces]
lab@srxB-1# top edit protocols isis
Note
Before proceeding, ensure that the remote
student team in your pod finishes the
previous step.
Step 1.8
Activate the configuration and issue the run show isis adjacency command.
[edit protocols isis]
lab@srxB-1# commit
commit complete
Step 1.9
Issue the run show isis interface command to display IS-IS interface
details.
[edit protocols isis]
lab@srxB-1# run show isis interface
IS-IS interface database:
Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric
ge-0/0/1.0 2 0x3 Disabled srxB-1.03 10/10
ge-0/0/2.0 2 0x2 Disabled srxB-1.02 10/10
lo0.0 0 0x1 Disabled Passive 0/0
Step 1.10
Issue the run show isis database command to display the IS-IS database
details.
[edit protocols isis]
lab@srxB-1# run show isis database
IS-IS level 1 link-state database:
Step 1.11
Display routes advertised to and received from IS-IS using the run show isis
route command.
[edit protocols isis]
lab@srxB-1# run show isis route
IS-IS routing table Current version: L1: 3 L2: 5
IPv4/IPv6 Routes
----------------
Prefix L Version Metric Type Interface NH Via
192.168.2.1/32 2 5 10 int ge-0/0/1.0 IPV4 srxB-2
ge-0/0/2.0 IPV4 srxB-2
Note
Before proceeding, ensure that the remote
team in your pod finishes the previous step.
Step 1.12
Issue the run show route protocol isis command to view IS-IS routes
installed in the routing table.
[edit protocols isis]
lab@srxB-1# run show route protocol isis
Step 1.13
Configure your device with a Level 1 adjacency to the virtual router. Refer to the
network diagram for this lab for the area and interface details. Once it is configured,
activate the configuration changes and return to operational mode.
[edit protocols isis]
lab@srxB-1# set interface ge-0/0/4.vlan-id level 2 disable
lab@srxB-1>
Step 1.14
Issue the show isis adjacency command to verify the current IS-IS adjacency
details.
lab@srxB-1> show isis adjacency
Interface System L State Hold (secs) SNPA
Step 1.15
Issue the show isis database command to display the current IS-IS database.
lab@srxB-1> show isis database
IS-IS level 1 link-state database:
LSP ID Sequence Checksum Lifetime Attributes
srxB-1.00-00 0x5 0xa6f 682 L1 L2 Attached
srxB-1.04-00 0x1 0x9793 682 L1 L2
vr-device.00-00 0xf3a 0x56eb 680 L1 L2
3 LSPs
[edit]
lab@srxB-1# edit protocols isis
In this lab part, you perform basic IS-IS troubleshooting. First, you modify your
device’s current configuration to make it incompatible with the attached virtual
router by loading the Part 2 starting configuration. You then enable IS-IS
traceoptions to log protocol activity. Finally, you display the traceoptions log to view
the associated errors.
Step 2.1
Return to the top of the hierarchy and load the lab8-part2-start.config file
from the/var/home/lab/jir/ directory. This file will modify your IS-IS
configuration and cause inconsistencies. Commit your configuration when complete.
[edit]
lab@srxB-1# load override jir/lab8-part2-start.config
load complete
[edit]
lab@srxB-1# commit
commit complete
[edit]
lab@srxB-1#
Step 2.2
Issue the run show isis adjacency command.
[edit]
lab@srxB-1# run show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/1.0 srxB-2 2 Up 24 0:26:88:e1:4d:1
ge-0/0/2.0 srxB-2 2 Up 24 0:26:88:e1:4d:2
Step 2.3
Navigate to [edit protocols isis] and define traceoptions for IS-IS so that
IS-IS errors write to a file named trace-isis. Include the detail option with the
error flag to capture additional details for the ISIS errors. Activate the
configuration change using the commit command.
[edit]
lab@srxB-1# edit protocols isis
Step 2.5
Navigate to [edit interfaces lo0 unit 0] and delete the incorrect
NET address and set the correct address. Configure IS-IS Level 1 for simple
authentication with juniper as the password.
[edit protocols isis]
lab@srxB-1# top edit interfaces lo0 unit 0
Step 2.7
Issue the delete command and confirm the operation to delete the current IS-IS
configuration. Issue the load merge /var/tmp/working-isis.config
command to load the configuration you saved previously in this lab. Activate the
restored configuration and return to operational mode using the commit
and-quit command.
lab@srxB-1>
Step 2.8
Verify that the IS-IS adjacencies have returned to the Up state between your device
and the directly attached virtual router.
lab@srxB-1> show isis adjacency
Interface System L State Hold (secs) SNPA
ge-0/0/1.0 srxB-2 2 Up 24 0:26:88:e1:4d:1
ge-0/0/2.0 srxB-2 2 Up 26 0:26:88:e1:4d:2
ge-0/0/4.113 vr-device 1 Up 23 0:24:dc:a:ac:1
Step 2.9
Log out of your assigned device using the exit command.
lab@srxB-1> exit
srxB-1 (ttyu0)
login: