Ajert 12 B SG
Ajert 12 B SG
Student Guide
/
r
This document is produced by Junlper Networks. Jnc.
This document or any part thereof may not be reproduced or transmitted in any form under penalty of law. without the prior written permission of Juniper Networks
Education Services.
Juniper Networks. the Juniper Networks logo. Junos. NetScreen, and ScreenOS are registered trademarks of Juniper Networks. Inc. in the United States and other
countries. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks reserves the right to change, modify. transfer. or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However. the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described Jn the software license provided with the software. or to the extent applicable, in an
agreement executed between you and Juniper Networks. or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software, may contain prohibitions against certain uses. and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.
Contents
This one-day course is designed to provide students with information about troubleshooting interior
gateway protocols, BGP, routing policy, multicast, and class of service (CoS). Students will gain
experience in monitoring and troubleshooting these topics through demonstration as well as
hands-on labs. The course exposes students to common troubleshooting commands and tools
used to troubleshoot various intermediate to advanced issues.
This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but
the lab environment does not preclude the course from being applicable to other Juniper hardware
platforms running the Junos OS. This course is based on Junos OS Release 12.1R5.5 for
SRX Series devices, and Release 12.3R1. 7 for EX Series switches.
Objectives
After successfully completing this course, you should be able to:
List common commands used to troubleshoot and verify various interior gateway
protocol (IGP) routing protocols.
Isolate different IGP issues.
List common commands used to troubleshoot and verify BGP.
Isolate different issues with BGP communication and configuration.
Isolate problems relating to routing policy structure and configuration.
Identify common commands for troubleshooting routing policy.
Verify and troubleshoot multicast.
Verify and troubleshoot class of service.
List common commands that are used to troubleshoot and verify the RIP routing
protocol.
Explain IGP support for 1Pv6.
List the general chassis components.
Identify different methods for troubleshooting major chassis components.
Troubleshoot redundant Routing Engine and Control Board communication.
Intended Audience
The primary audience for this course is the following:
Individuals responsible for configuring and monitoring devices running the Junos OS.
Course Level
Advanced Junos Enterprise Routing Troubleshooting is an advanced-level course.
Prerequisites
The following courses are the prerequisites for this course:
Junos Troubleshooting in the NOC (JTNOC); and
Advanced Junos Enterprise Routing (AJER).
Day 1
Chapter 1: Course Introduction
Chapter 2: IGP Troubleshooting
Troubleshooting IGPs Lab
Chapter 3: BGP Troubleshooting
Troubleshooting BGP Lab
Chapter 4: Policy Troubleshooting
Troubleshooting Routing Policy Lab
Chapter 5: Troubleshooting Advanced Features
Troubleshooting Advanced Features Lab
Appendix A: Additional IGP Troubleshooting
Appendix B: Additional Case Studies
Appendix C: SRX Hardware Troubleshooting
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CL! Input Text that you must enter. lab@San Jose> show route
CLI Undefined Text where the variable's value is Type set policy policy-name.
the user's discretion or text where
ping 10.0.�
the variable's value as shown in
GUI Undefined the lab guide might differ from the Select File > Save, and type
value the user must input filename in the Filename field.
according to the lab topology.
Technical Publications
You can print technical manuals and release notes directly from the Internet in a variety of formats:
Go to http://www.juniper.netjtechpubs/.
Locate the specific software or hardware release and title you need, and choose the
format in which you want to view or print the document.
Documentation sets and CDs are available through your local Juniper Networks sales office or
account representative.
Objectives
• After successfully completing this content, you will be
able to:
•Get to know one another
• Identify the objectives, prerequisites, facilities. and
materials used during this course
• Identify additional Education Services courses at
Juniper Networks
• Describe the Juniper Networks Certification Program
We Will Discuss:
Objectives and course content information;
Additional Juniper Networks, Inc. courses; and
The Juniper Networks Certification Program.
Introductions
• Before we get started ...
• What is your name?
• Where do you work?
• What is your primary role in your
organization?
• What kind of network experience
do you have?
• Are you certified on Juniper Networks?
• What is the most important thing for
you to learn in this training session?
Introductions
The slide asks several questions for you to answer during class introductions.
Course Contents
• Contents:
• Chapter 1: Course Introduction
• Chapter 2: IGP Troubleshooting
• Chapter 3: BGP Troubleshooting
• Chapter 4: Policy Troubleshooting
• Chapter 5: Troubleshooting Advanced Features
• Appendix A: Additional IGP Troubleshooting
• Appendix B: Additional Case Studies
• Appendix C: SRX Hardware Troubleshooting
Course Contents
The slide lists the topics we discuss in this course.
Prerequisites
• The prerequisites for this course are the following:
• Junos Troubleshooting in the NOC (JTNOC)
• Advanced Junos Enterprise Routing (AJER)
Prerequisites
The slide lists the prerequisites for this course.
Course Administration
• The basics:
• Sign-in sheet
• Schedule
• Class times
• Breaks
• Lunch
• Break and restroom facilities
• Fire and safety procedures
• Communications
• Telephones and wireless devices
• Internet access
Education Materials
• Available materials for classroom-based
and instructor-led online classes:
• Lecture material
• Lab guide
• Lab equipment
• Self-paced online courses also available
• http://www.juniper.netjtraining/technical_education
Additional Resources
• For those who want more:
• Juniper Networks Technical Assistance Center {JTAC)
• http//www.juniper.net;support;requesting-support.html
• Juniper Networks books
• http//www.juniper.net;books
• Hardware and software technical documentation
• Online: http//www.juniper.net;techpubs
• Portable libraries: http//www.juniper.net;techpubs/resources
• Certification resources
• http//www.juniper.net;training/certification/resources.html
Additional Resources
The slide provides links to additional resources available to assist you in the installation, configuration, and operation of
Juniper Networks products.
Satisfaction Feedback
(ii:1
G.1l Class
E}
G2i Feedback
�
1,21
Gi!l
==
Gi!l
Satisfaction Feedback
Juniper Networks uses an electronic survey system to collect and analyze your comments and feedback. Depending on the
class you are taking, please complete the survey at the end of the class, or be sure to look for an e-mail about two weeks
from class completion that directs you to complete an online survey form. (Be sure to provide us with your current e-mail
address.)
Submitting your feedback entitles you to a certificate of class completion. We thank you in advance for taking the time to
help us improve our educational offerings.
Courses
You can access the latest Education Services offerings covering a wide range of platforms at
http://www.juniper.neVtra ining/tech nical_ed ucation/.
Jun1Per
• Set yourself apart from your peers
• Capitalize on the promise of the New Network '.'\. Ti'> '
Certification Preparation
--
achievements
• Track your results in the app and
Game Center; share your network
through Facebook and Twitter
t••
www_juniper.netjjunosgenius
Junos Genius
The Junos Genius application takes certification exam preparation to a new level. With Junos Genius you can practice for
your exam with flashcards, simulate a live exam in a timed challenge, and even build a virtual network with device
achievements earned by challenging Juniper instructors. Download the app now and Unlock your Genius today!
Find Us Online
Jnet J http://www.juniper.net/jnet
http://www.juniper.net/facebook
tl!j http://www.juniper.net/youtube
, http://www.juniper.net/twitter
Find Us Online
The slide lists some online resources to learn and share information about Juniper Networks.
Questions
Any Questions?
If you have any questions or concerns about the class you are attending, we suggest that you voice them now so that your
instructor can best address your needs during class.
Objectives
We Will Discuss:
Useful commands that can be used to troubleshoot and verify correct operation of OSPF and IS-IS;
Isolating different OSPF issues; and
Isolating different IS-IS issues.
70SPF Troubleshooting
• IS-IS Troubleshooting
OSPF Troubleshooting
The slide lists the topics we will discuss. We discuss the highlighted topic first.
OSPF Overview (1 of 2)
• Link-state IGP
• Establishes adjacencies
• Floods LSAs to populate LSDB
• Runs SPF on the LSDB to calculate the best paths
• Multi-area operations
• Backbone area 0.0.0.0
• Other areas
• Regular. Stub. NSSA
• ABRs provide inter-area reachability
• Generate Type 3 and Type 4 LSAs
• ASBRs inject external routes
• Generate Type 5 or Type 7 (NSSA) LSAs
Link-State IGP
OSPF is an interior gateway protocol (IGP) based on the concept of a link-state database (LSDB). Each OSPF-speaking router
in the network tries to form adjacencies with each neighboring OSPF router. When these adjacencies are formed, each router
generates and floods Link State Advertisements (LSAs) into the network in a reliable manner. LSAs are placed into the LSDB
on each router where the SPF algorithm is calculated to find the best path to each end node in the network.
OSPF dynamically discovers and maintains neighbors through generation of periodic hello packets. OSPF uses sanity checks
that prevent neighbor discovery (and therefore, adjacency formation) when parameters such as the hello time, area type,
maximum transmission unit (MTU), or subnet mask are mismatched. Once the neighbors are discovered, OSPF routers
exchange information with the LSDB which results in LSDB synchronization and Full adjacency.
OSPF advertises and updates prefix information using LSAs, which are sent only upon detection of a change in network
reachability. LSAs are also reflooded periodically to prevent being aged out by other routers. OSPF routers forward all LSAs
through all OSPF-configured interfaces except the one on which an LSA was received. OSPF uses IP protocol number 89 and
the AIISPFRouters multicast address of 224.0.0.5 for protocol messages.
Continued on the next page.
OSPF Overview (2 of 2)
• Routing policies
• Default import action is to accept SPF calculated routes
• Default export action-do nothing
• Internal route preference is 10
• External route preference is 150
--
Area 0 0.0.
. 0
BGP
....._ --.. ...._. Internal routers have all OSPF links in the same area
ASBRs inject routing information from
outside the OSPF domain Maintain local area routing
Receive summary LSAs for inter-area reachability
• Adjacency
• Make sure your security policies permit OSPF protocol
messages
• Watch for mismatched parameters: area. netmask,
intervals, options. MTU
• Watch for mismatched IP subnet or the same IP address on
the neighbor interfaces
• Watch for mismatched authentication
• Passive link at both ends
• Point-to-point versus broadcast link
• LSDB integrity
• Duplicated Router ID's
• Broken area 0.0.0.0 or some areas not connected to area
0.0.0.0
• Virtual links
LSDB Integrity
One of the OSPF network problems that is often hard to troubleshoot is duplicated Router ID. Two neighboring routers will not
establish adjacency if they have an identical Router ID, however if the two routers with the same Router ID are not physically
connected it presents a more difficult problem. You can only detect the failure by monitoring the LSDB and SPF and
discovering regular routing flaps when some routes are continuously recalculated because the routers with the same Router
ID advertise different pieces of routing information. A good indicator of this issue would be continuous SPF runs.
Broken OSPF backbone area or an area that is not connected to the backbone present another issue. OSPF implements an
inter-area loop protection mechanism by ensuring that ABRs do not generate summary LSAs to the backbone area for the
summaries they receive in a non-backbone area. The missing summary routes would break the inter-area communications in
this scenario. To ensure that OSPF backbone area is contiguous and other areas are connected to it you should configure a
virtual link.
[edit]
user@srx# show protocol ospf area O
virtual-link neighbor-id 192.168.1.2 transit-area 0.0.0.10;
• Routing
• Metric setting and suboptimal routing
• Missing loO.O interface
• Injecting 0/0 into Stub or NSSA area
• Incorrect route summarization
• Export pol icy
• Watch out for multiple redistribution points
• Prefix export limit
• Import policy
• Externals filtering
interface ge-0/1/1.0;
You can use both import and export policies in OSPF but the use of import policies is restricted to filtering external routes.
Use the import policies with caution because an incorrect policy can result in the black-holing of some traffic.This might
happen because OSPF routers across the domain will keep the external LSAs in their databases and SPF will keep
calculating the best path to those destinations but if a router on the path fails to install the routes in the routing table due to
misconfigured import policy it won't be able to forward the packets.
Be careful when configuring mutual redistribution between OSPF and other IGPs at several routers because it can lead to a
routing loop formation or suboptimal routing.The general guideline is to perform redistribution from a protocol with a lower
(better) preference to a protocol with a higher (worse) preference. If you perform redistribution from a protocol with a higher
preference to a protocol with a lower preference, beware.
U
• You want to check that OSPF is operational
� aser@srx> show ospf interface
Interface State Area DR :o BDR ID
ge-0/0/1.0 BDR 0.0.0.0 10.222.1.3 10. 222 .1. 2
ge-0/0/4.301 BDR 0.0.0.0 10.222.1.1 10.222.1.2
I....�������������������������������������
loO.O
ge-01016.0
DR
BDR
0.0.Q.0
0.0.0.1
10.222.1.2
10.222.1. 4
0.0.0.0
10.222.1.2
()
1
r�
LSDB Details
The command on the slide displays extensive output of the OSPF LSDB. It reveals the LSA contents and because LSAs is a
fundamental piece of information that OSPF routing is based on, the command is very important tool in OSPF
troubleshooting. The example on the slide shows a Router LSA Type 1. This LSA advertises 3 links, two of them are broadcast
links with a metric of 1 and one is a stub link with a metric of 0. The newer OSPF implementations support multi-topology
routing hence the LSA also shows the topology ID. The multi-topology routing is beyond the scope of this course.
00:07:01
00:07:01 SPF 0.000251
Stub 0.000055
0.000078
External
00:03:10 Interarea
00:03:10 0.000240
00:03:10 NSSA 0.000003
00:03:10 Cleanup 0.000123
---(more)---
05:34:31.290257 In IP (tos OxcO, ttl 1, id 44201, offset 0, flags [none], proto: OSPF
(89), length: 80) 10.222.0.2 > 224.0.0.5: OSPFv2, Hello, length 60 [len 48]
Router-ID 10.222.1.3, Backbone Area, Authentication Type: none (0)
Options (External, LLS]
Hello Ti.mer 10s, Dead Timer 40s, Mask 255.255.255.252, Priority 128
Designated Router 10.222.0.2, Backup Desi g nated Router 10.222.0.1
---(more)---
Debugging OSPF
To perform debugging functions of the OSPF routing use the Junos OS traceoptions function.The trace output is sent to a
named log file in /var I log directory.You can define various OSPF parameters to trace in the traceoptions configuration.
You can view the log file by using show log filename command or you can monitor the updates in the log file
dynamically with monitor start filename command. Remember to stop monitoring when you are done with the
monitor stop command.
The sample output on the slide shows a Hello packet received on ge-0/0/1.0 interface from a neighbor at the address
1 0.222. 0.1 with the full packet data.
You might also want to trace the protocol messages on a router interface by using the monitor traffic interface
interface-name command. This command is essentially a front end to a well known tcpdump utility.You can use various
filtering options in this command, for example, to capture only OSPF messages you can use the following filter:
user@srx> monitor traffic interface ge- 0/0/1.0 matching "dst 224.0.0.5"
r I"
No Check physical connection
Check security policies
Check settings at both sides
Check authentication �
""
Enable traceopt1ons '?§
'- .I 8
I
Watch for duplicate RID
Watch for flapping link i
/
Check LSDB
"" 8
No
Watch for ABR summaries received over non-
Routes are in -. backbone area
: the-routing table Check 0/0 in Stub and NSSA areas
Watch for prefix export limit
Check import and export policies
'- ,)
-�
I
•
Area1 'ge-0/0/6
R4 NSSA
. 5
ge-0/0/12 .
Troubleshooting RS Neighborship (1 of 3)
Troubleshooting RS Neighborship (2 of 3)
Troubleshooting RS Neighborship (3 of 3)
• Enable traceoptions
I [edit protocols ospf]
user@RS# show
t.racecptions {
file ospf. log;
flag packets;
flag error detail;
Troubleshooting R2 Neighborship (1 of 3)
Troubleshooting R2 Neighborship (2 of 3)
• Enable traceoptions
[edit protocols ospfJ
user@R2# show
traceoptions {
file ospf.log;
flag hello detail;
flag erro= detail;
Debugging OSPF at R2
You enable traceoptions to monitor OSPF packet flow. The show log osp£. log command output on the slide indicates
that the router ignores OSPF Hello packets due to authentication failure.
Troubleshooting R2 Neighborship (3 of 3)
• Collected data
• The previously active adjacencies failed all at one time
• Debugging reveals authentication issues
• Interfaces show a new authentication key rollover time
• Authentication issues began after the new key rollover
• Solution
• Make sure that all authentication keys match
• Check neighborship
user@R2> show ospf neighbor
Address Interface State ID Pri Dead
10.222.0.2 ae0.0 Full 10.222 .1.3 128 37
10.222.0.10 ael. 0 Full 10.222.1.l 128 36
10.222.0.6 ge-0/0/6.0 Full 10.222.1.4 128 39
Collected Data
By this time, you know that R2 authentication data does not match that of the R2 neighbors. R2 previously full adjacencies
all failed at one time. The detailed output of the show ospf interface command provides a clue that the
authentication was activated at a certain time.
Solution
Given the information collected you can conclude that R2 OSPF adjacencies fail due to misconfigured authentication
parameters that were activated by accident at the time you were troubleshooting the R5 adjacencies.
After you adjusted the authentication at R2, the new check with the show ospf neighbor command shows that all R2
neighbors are now in full adjacency.
• OSPF Troubleshooting
�IS-IS Troubleshooting
IS-IS Troubleshooting
The slide highlights the topic we discuss next.
Link-State IGP
IS-IS is another interior gateway protocol (IGP) also based on the concept of a link-state database (LSDB). As such, each
IS-IS-speaking router in the network attempts to form an adjacency with each neighboring IS-IS router, builds the database
and runs SPF algorithm to compute the optimal path to each destination.
IS-IS was initially designed for now legacy Connectionless Networking Protocol (CLNP) routing but was later extended to
support IP. This extended IS-IS is referred to as Integrated IS-IS. Routers running the Integrated IS-IS must support IP suit
protocols such as the ARP, and the Internet Control Message Protocol (ICMP).
IS-IS runs directly on the Data Link Layer (Layer 2) and does not need network service access point (NSAP) addresses on
each interface, just on the router itself. The router NSAP address referred to as Network Entity Title (NET) is mandatory and is
required to identify the area the router belongs and to provide identity to the router itself as a unique node in the IS-IS
domain similar to OSPF RID.
IS-IS dynamically discovers and maintains neighbors through generation of periodic Hello PDUs. Despite the fact that IS-IS
runs directly on Layer 2 and as such is Layer 3 independent, IS-IS uses sanity checks that prevent neighbor adjacency
formation when the link IP subnet is mismatched. IS-IS uses three different kinds of Hello PDU including LAN Hello PDU for
Level 1, LAN Hello PDU for Level 2, and point-to-point Hello PDU. Because IS-IS PDUs cannot be fragmented using IP
fragmentation mechanism IS-IS checks that every link on which it floods LSPs can handle PDUs up to at least 1492 bytes.
Continued on the next page.
IS-IS Overview (2 of 2)
• Routing policies
• ASBR's inject external routes
• External reachability TLV's (not used if wide metrics are configured)
• Internal route preference is 15/18 (L1/L2)
• External route preference is 160/165 (L1/L2)
• Default import action is to accept SPF calculated routes
• Cannot be modified
• Default export action is to accept direct routes on IS-IS
enabled links
.. .. . � .... '....
'
. �.. Maintain local area r outing
AS65000
Install 0/0 to the L1/L2 attached routers
···...
...·········
·•····.•.
. ....
IS-IS L2 backbone
Receives routing information from
all Level 1 areas
BGP
Ll/�;·;�uters connected to L and L2
ASBRs inject routing information from Set attached bit for inter-area ::J
outside the IS-IS domain connectivity
• Adjacency
• Family ISO missing
• Level 1 area mismatch
• Level 1 versus Level 2 interface
• IP subnet mismatch
• Authentication parameters mismatch
• Minimal MTU cannot accommodate IS-IS messages
• Passive link is configured
• Point-to-point versus Broadcast interface
• LSDB integrity
• Unique NET must be configured at every router
LSDB Integrity
One of the IS-IS network problems that is often hard to troubleshoot is duplicated System ID. System ID plays the same role
in IS-IS as Router ID does in OSPF. Recall that the System ID is configured as part of the NET address on the router loopback.
Two neighboring routers will not establish adjacency if they have an identical System ID, however if the two routers with the
same System ID are not physically connected it presents a more difficult problem. You can only detect the failure by
monitoring the LSDB and SPF and discovering regular routing flaps when some routes are continuously recalculated
because the routers with the same System ID advertise different pieces of routing information. A good indicator of this issue
would be continuous SPF runs.
• Routing
• Metrics
• Wide or narrow
• loO.O interface
• Route summarization
• External versus internal
• Route leaking
• Export pol icy
• Watch out for multiple redistribution points
• Prefix export limit
An example of a policy that can be used to summarize either internal or external IS-IS routes at a Ll/L2 router;
[edit policy-options policy-statement Ll-summary-route]
user@srx# show
term local-summary-route {
from {
protocol aggregate;
route-filter 10.0.4.0/22 exact;
to level 2;
then accept;
term suppress-specifics
from {
route-filter 10.0.4.0/22 longer;
to level 2;
then reject;
Be careful when configuring mutual redistribution between IS-IS and other IGPs at several routers because it can lead to a
routing loop formation or suboptimal routing. The general rule of thumb is when redistribution is performed from a protocol
with a lower (better) preference to a protocol with a higher (worse) preference it's not an issue, otherwise if redistribution is
performed from a protocol with a higher preference to a protocol with a lower preference, watch out.
---\more)---
.
Check family ISO is enabled
Check settings at both sides
Area. level. interface type, MTU, IP
. subnet
. Check authentication
Enable traceoptions u
....
......
..
.,)
.,, .
I
' 0
0
.
Check LSDB
Check authentication
Rl Area 49.0001
( '\
I ge-O
I
I
)
Troubleshooting R3 Adjacencies (1 of 6)
Troubleshooting R3 Adjacencies (2 of 8)
Troubleshooting R3 Adjacencies (3 of 6)
• Enable traceoptions
[edit protocols isis]
user@R3# show
traceoptions {
file isis.log;
flag hello detail;
flag error detail;
Troubleshooting R3 Adjacencies (4 of 8)
• Check the IS-IS statistics again
• There are still Hello drops
user@R3> clear isis statistics
Troubleshooting R3 Adjacencies (5 of 6)
• Enable traceoptions at R2 and check the trace log
user@R2> show log isis.log
Mar 15 05:05:53.413277 Sending PTP IIH on ae0.0
Mar 15 05:05:53�413405 max area O, circuit type 11
Mar 15 05:05:53.413476 ptp adjacency tlv length 5
�..ar 15 05:05:53.413527 neighbor state down
---(more)---
Debugging IS-IS at R2
You then enable traceoptions on R2 to see if R2 sends the Hello PDUs. The traceoptions log file indicates that R2 does send the
Hello PDUs but they are point-to-point IS-IS Hello PDUs whereas R3 log file shows that R3 sends Level 2 LAN IS-IS PDUs.
Troubleshooting R3 Adjacencies (6 of 6)
• Solution
• Make sure that the aeO.O interface at both R2 and R3 is
configured as either point-to-point or broadcast interface.
Solution
To ensure that the remaining neighbor adjacency is up, you must configure the aeO.O interface at both sides as either
point-to-point or broadcast.
Summary
• In this content, we:
• Listed useful common commands that are used to
troubleshoot and verify OSPF and IS-IS
• Isolated different OSPF issues
• Isolated different IS-IS issues
We Discussed:
Useful commands that can be used to troubleshoot and verify correct operation of OSPF and IS-IS;
Isolating different OSPF issues; and
Isolating different IS-IS issues.
Review Questions
1. Which LSA types are not forwarded into an OSPF
NSSA area with no summaries?
2. Which OSPF parameters must match to ensure
adjacency formation?
3. Why is a partitioned OSPF backbone area disruptive
in a multi-area OSPF network?
4. What are the different forms of IS-IS
authentication?
5. Why is NET uniqueness a mandatory requirement in
IS-IS networks?
Review Questions
1.
2.
3.
4.
5.
2.
OSI'!' area, nctmask, 1 lcllo and Dead intervals, OSP!' options, and interface MTU must match for neighbors to become adjacent.
3.
Partitioned OSPI., backbone area results in areas, attached to the isolated islands of the backbone area, inability to communicate to each
other.
4.
13y default IS-IS PD Us arc not authenticated. IS-IS supports simple text and MDS authentication types. In IS-IS you can explicitly
define which IS-IS PDUs to authenticate.
5.
IS-IS NET provides a router identity in an IS-IS domain. Duplicated NET results in inability of SPF process to correctly identify the
IS-IS node and as a result has a severe im pact on a network.
Objectives
• After successfully completing this content, you will be
able to:
• List common commands used to troubleshoot and verify
BGP
• Isolate different issues with BGP communication and
configuration
We Will Discuss:
Common commands that are used in Border Gateway Protocol (BGP) troubleshooting; and
Isolating different BGP communication and configuration issues.
BGP Overview
The slide lists the topics we will discuss. We discuss the highlighted topic first.
BGP Overview (1 of 3)
• BGP protocol summary
• Path-vector protocol used for interdomain routing
• Views the Internet as a collection of autonomous systems
• Prefers the path with the least number of entries in the AS-Path
• Able to maintain massive amounts of routing data
• Implies careful design and accurate administration
• Establishes neighborship with configured peers
• Uses TCP for reliable transport
• Client;server model, listens to TCP port 179
• Requires underlying routing for the protocol messages delivery
• Recursive route lookup for routes learned from indirect peers
BGP Overview (2 of 3)
• BGP routing
• Sends update message that carries NLRI along with BGP
attributes
• Mandatory and optional attributes
• Allows extensive control using policy
• Supports routing for various protocol families
• 1Pv4 unicast only by default
• Session family may differ from NLRI family
• 1Pv4 sessions can be used to convey 1Pv6 NLRls
• BGP next hop must be of the same family as NLRI
BGP Routing
BGP advertises route reachability (NLRI), along with various attributes that describe the path to that prefix. Attributes,
combined with the extensive features of Junos routing policy, provide the ability to build a scalable set of rules that dictate
whether a network wants to filter an incoming route or influence the path of a neighbor.
All BGP route attributes fall into one of the following categories based on whether all BGP speakers are expected to
understand the attribute and whether the attribute has local-AS or end-to-end scope:
Well-known mandatory
Well-known discretionary
Optional transitive
Optional nontransitive
Continued on the next page.
Next hop: Well-known mandatory attribute that carries the IP address of a BGP speaker;
Local preference: Well-known discretionary attribute used to influence BGP path selection with regard to the
desired egress point for traffic from within an AS;
AS path: Well-known mandatory attribute that lists the AS numbers that will be crossed when forwarding to the
associated NLRI;
Origin: Well-known mandatory attribute that identifies the original source of a route as being learned from an
IGP, EGP, or unknown source;
Multi-exit discriminator. (Optional) Nontransitive attribute, which is added on updates sent over EBGP links, and
is then advertised by IBGP within the receiving AS to influence its outbound routing;
Community: (Optional) Transitive attribute that allows for the arbitrary grouping of routes that share one or more
characteristics via the addition of a common community tag value.
BGP is the extensible protocol that supports routing for various protocol families, for example 1Pv6 or virtual private network
(VPN) specific families. When you configure 1Pv4 BGP peering, BGP supports 1Pv4 unicast routing only by default. Vise versa
the 1Pv6 BGP sessions support only 1Pv6 unicast routing by default. You can however configure 1Pv4 BGP to enable support
of 1Pv6 routes as shown in the following example:
[edit protocols bgp]
user@srx# show
group ebgp {
family inet
unicast;
family inet6
unicast;
neighbor 10.1.254.1;
}
Note that you must explicitly enable 1Pv4 unicast family if you configure additional families support.
If an 1Pv4 BGP session is used to convey 1Pv6 routes BGP must use the BGP next hop of the same protocol family as the
NLRls for example, 1Pv6. BGP uses an 1Pv4-mapped 1Pv6 address as the BGP next hop in this case for example,
::ffff:192.168.1.1.
BGP Overview (3 of 3)
• BGP routing
• Keeps all routes in the routing table
• Active and inactive
• Stores filtered/unresolved routes in a hidden compartment
• Runs elaborate multi-step route selection algorithm
• Advertises only active routes by default
• BGP defaults
• Both IBGP and EBGP default preference is 170
• Default routing policies
• Import action is to accept BGP learned routes
• Export action is to advertise BGP only routes
BGP Overview
BGP uses three different storage tables known as Routing Information Bases (RIBs) to maintain routing knowledge. A
separate Adjacency-RIB-IN exists for each established BGP peer to store all routes received from that peer. RIB-LOCAL is
where BGP stores routes used for traffic forwarding. A separate Adjacency-RIB-OUT table is also created for each established
BGP peer to house the routes that are to be advertised to that peer.
A BGP speaker that is presented with two or more updates, specifying the same prefix, performs a route selection process to
select the best BGP path for that prefix. Once the best path is selected, the route is installed in the route table, where it may
become active if the same prefix is not being learned by a protocol with a better preference, for instance OSPF. BGP can
move only active BGP routes in the routing table into the Adjacency-RIB-OUT tables and advertise them to BGP peers. To
override this default action, you can use the advertise-inactive command.
Some of the routes received by BGP are not installed in the routing table. There are several reasons for this behavior:
Unresolvable BGP next hop;
A route is filtered by an import policy;
A martian route is received.
The Ju nos operating system marks these kinds of routes as hidden and maintains them in an isolated RIB. You can view
the hidden routes by using the show route hidden command.
Continued on the next page.
BGP Defaults
In the Junos OS, BGP routes have the preference value of 170 regardless of the session type the route was learned from, IBGP
or EBGP.
You can use both import and export policies in BGP to achieve fine-grained control over BGP route selection and propagation.
By default, an implicit BGP import policy accepts all BGP received routes that pass sanity checks of loop prevention and
which BGP next hop is reachable. A BGP implicit export policy advertises all BGP active routes out of the local routing table.
IBGP Overview
• IBGP specifics
• IBGP sessions are usually established between loopback
addresses
• Uses IGP to maintain sessions regardless of physical topology
• BGP speakers do not propagate IBGP-received routes to
other IBGP peers
• Fully meshed IBGP design
• Route reflection or Confederation
• By default, IBGP peers do not change the next hop for routes
received from EBGP peers
• Put external interface in IGP using the passive option. or
• Use next-hop self in a policy to cause the router to use its own
IP address as the next hop
IBGP Overview
IBGP sessions are typically established using loopback interface peering. The IGP is used to maintain reachability between
the loopback addresses regardless of the physical topology, allowing the IBGP sessions to stay up even when the physical
topology changes. The physical topology is relevant in one respect, each router along the path between BGP speakers must
have enough information to make consistent routing decisions about packet forwarding. In many cases, this requirement
means that all routers along all possible physical paths between BGP speakers must run BGP.
IBGP updates do not alter the AS path attribute. Because loops become a concern, BGP speakers never send routes to IBGP
peers that they learned from other IBGP peers. For all lBGP speakers in an AS to have consistent routing information, there
must be a full mesh of IBGP sessions between them.The two primary ways to eliminate the need for a full BGP mesh are
route reflection and BGP confederations.
Route reflection allows a special BGP speaker, route reflector, to re-advertise an IBGP-learned route to another IBGP speaker.
The route reflector does not change the existing BGP attributes but adds two new attributes to IBGP updates to address
concerns about BGP loops that could otherwise occur, given that IBGP updates do not modify the AS path, cluster list, and
originator ID. Route reflection can represent a single point of failure, making it common to add redundancy by deploying
multiple route reflectors. Normally, each route reflector establishes an IBGP session with each client in the cluster, and the
two route reflectors are then joined using a non-client IBGP session.
Confederation use is rare in enterprise networks.
Continued on the next page.
EBGP Overview
• EBGP specifics
• EBGP sessions are usually established using the IP
addresses of the physically connected interfaces
• Sometimes an indirect peer address session is preferred
• Redundant paths. load sharing
• Use mul tihop configuration to establish EBGP session to indirect
peers
• A static route for the peer address is required
• Per-prefix load sharing can be achieved by enabling
multipath
• Two peering sessions to the same router
• Two peering sessions to different routers in the same neighboring
autonomous system
EBGP Overview
EBGP normally peers to a neighbor using an address on the directly connected link between the routers. As a result, no route
recursion is needed to resolve the BGP peering address to a next hop forwarding address. For security reasons, the TIL for
EBGP sessions is set to 1 by default, which prevents attempts to peer from a remote link. This behavior can be altered by
configuring the multi hop option for the EBGP session.
When multiple physical links connect two routers that are to be EBGP peers the mul tihop configuration provides a
redundant solution. In this case, if one of the point-to-point links fails, reachability on the alternate link still exists. This
approach allows per-prefix load sharing.
For the multihop EBGP session each router must have IP routing capability to the remote router's loopback address. Usually
a static route is used for this purpose. Note that when multi hop is configured, the Junos OS sets the TIL value to 64, by
default.
Multihomed connections from an enterprise network to the ISP provide redundant BGP connectivity. If the paths from both
connections are equal-cost, the default BGP behavior is to select the single best route to a destination. The result is that BGP
uses only one of the links to forward traffic. As long as both links are up, you may want to use both, sharing the traffic
between them to increase the bandwidth. Multipath BGP allows the traffic to be load-balanced across the two links. The
multipath configuration can be used across several peering sessions to the same EBGP peer or different EBGP peers in
the same neighboring autonomous system.
-
a .\
MPLSWAN
----
/fltemet '6>· •• ,·· AS 65003'•,,.
Yl
-
VPN �, ;o
------ . .. . . •"' HQ
···..............·......... . ··
Branch '���
..
Offices
BGP Troubleshooting
The slide highlights the topic we discuss next.
I §....
Check export policy �
ti
i
Check inactive routes
N oa
- dvertise community
Check BGP family for the session
I
.
Cl
I
Check for prefix limit
Active: TCP timeout has occurred and the TCP session is not established yet. System continues to listen for
completion of TCP session.
When two BGP peers cannot establish a BGP session, the BGP state field in the show bgp summary command is Active
or Connect, indicating that the BGP session is not established. When the BGP state is Idle, the local BGP implementation
cannot try to establish the session.
Session problems often occur because the TCP session between a pair of peers cannot effectively transmit data between
the routers-not because of a problem with BGP itself. When the TCP session fails to work properly, the BGP session times
out, and BGP signals the problem by sending hold-time expired messages to the system log files.
The recursive routing failure occurs if a BGP router receives a BGP route and the recursive lookup of this route's BGP next
hop results in using the route itself. This failure would result in BGP session failure and constant deletion and reinsertion of
BGP routes into the routing table. The Junos OS performs a sanity check for this kind of failure and if it is detected, it marks
the offending route as hidden, and ignores it.
If routes are not being advertised you might suspect an incorrect export filtering policy. Recall that by default BGP advertises
all active BGP routes to its peers. An incorrect export policy can filter the routes that you want to advertise.
Often BGP ASBRs employ the route aggregation by configuring aggregate or generated routes and exporting these routes to
BGP. Recall that for an aggregate route to be active it must have at least one active contributing route in the routing table.
A BGP route can become inactive if it is shadowed by the same route learned from a protocol with a lower preference. Recall
that you can make BGP advertise the inactive routes by configuring advertise-inactive option.
Some routes might be tagged with one of the well-known communities regulating the route propagation. The no-export,
no-export-subconfed, and no-advertise. are the three well-known community values.
The no-export community tells routers to distribute routes with this community tag within their autonomous system, but
no further. The no-export- subconfed community tells routers not to distribute routes with this community tag to
external BGP peers. The no-advertise community tells routers not to advertise these routes to other BGP peers at all.
If mistakenly configured this communities will set a scope on the BGP route propagation thus preventing the routes
advertisements.
• Use traceoptions
user@srx> show log bgp.log
I 04:23:22.887679 In IP (cos OxcO, ttl 1, id 34525, offset O, flags (none], proto: TCP
(6), length: 170) 10.1.254.1.179 > 10.1.254.2.57891: P 79:197(118) ack 98 win 16365
<nop,nop,timestamp 834133740 836758381>: BGP, length: 118
Keepalive Message (4), length: 19
Update Message (2), length: 76
origin (1), length: 1, Flags [T]: IGP
AS Path (2), length: 6, Flags [Tl: 100
Next Hop (3), length: 4, Flags [TJ: 10.1.254.1
Updated routes:
10.1.100.0/24
10 .1.101. 0/24
---(more)---
Ri RR RR R2
.1
ISPA ISPB
222.0.0/30 ·
10.1.2
� ,,, "4.0/30
,1
ft., ,,, .13
AS 100 10. AS� : 102 2012;30 AS 200
....,, .14 I
{
,
'i}AR4
10.222.020/30 �
• Solution:
• The neighbor in AS 100 should correct their AS number
Solution
The neighboring autonomous system is misconfigured. They should correct the setting.
Debugging BGP at R1
You then enable the traceoptions at R1 to debug BGP operations. You examine the trace log file for BGP message flow
between the two IBGP neighbors. The debugging shows that the neighbors follow the standard BGP session establishment
rules by exchanging with open messages, then keepalive messages, then update messages.
• R1 advertises routes to R4
user@Rl> show route advertising-protocol bgp 10.222.1.5
Debugging BGP at R4
You proceed to debugging BGP at R4. You enable traceoptions to trace only BGP update messages. The trace log file lookup
does not show any received BGP update messages.
then {
count fragrnencs;
discard;
term 2
then accept;
Filter: block-frags
Counters:
Name Bytes Packets
fragments 376755 2899
Collected Information
You found out that the initial phase of the IBGP session between Rl and R4 is going flawlessly but then when Rl starts
advertising the BGP NLRls in BGP update messages, which are essentially bigger TCP packets, the R3 router on the way of
this messages fragments them due to low MTU on its link to R4. The firewall filter on R4 the drops the fragments.
Solution
You can either configure the BGP path MTU discovery option or set the IP MTU on all the links to a higher value to ensure that
the BGP packets will not be fragmented, or you can modify the firewall filter settings to accept the fragments.
Summary
• In this content, we:
• Listed common commands used to troubleshoot and verify
BGP
• Isolated different issues with BGP communication and
configuration
We Discussed:
Common commands used to troubleshoot and verify BGP; and
Isolating different issues with BGP communication and configuration.
Review Questions
Review Questions
1.
2.
3.
4.
5.
By default BGP advertises all active BGP routes received from ll3GP peers to EBGP peers only, and all active BGP routes received
from EBGP peers ro both IBGP and EBGP peers.
2.
Route reflectors are allowed to advertise BGP routes learned from ll3GP peers ro other 113GP peers. Route reflectors advertise all
active I BGP routes received from clients to other clients and non-clients, and all active I BGP routes received from non-clients to
clients only.
3.
On directly connected EBGP sessions, TCP uses MTU-sized packets. If there is an MTU mismatch between the two sides of the TCP
connection, large BGP packets cannot be delivered, which tears the BGP session down.
4.
The valid ways to solve the BGP next-hop problem are: Next-hop-self policy; lGP passive interfaces; Export direct routes into IGP;
Static routes.
5.
The router is actively trying to form the BGP session.
Objectives
We Will Discuss:
Isolating problems relating routing policy structure and configuration; and
Identifying common commands for troubleshooting routing policy.
Policy Overview
Policy is a powerful tool that lets you manipulate routes you receive or advertise. Policy can change a router's default
decision process by changing route attributes or by filtering received or advertised routes. Policy is required to control the
routing information redistributed among routing protocols.
You can apply an export policy to routing table information installed in the forwarding table. Some Junos OS features such as
per-flow load balancing and CoS-based forwarding employ this routing policy application.
Another application that relies on routing policy is Remote Triggered Black Hole (RTBH). RTBH is a technique for the
mitigation of denial of service (DoS) attacks. RTBH is based on triggered BGP advertisement of a route, which has to be
blackholed, tagged with a specific community and matching on this community in an import policy, that sets the route next
hop to discard.
[edit policy-options]
user@srx# show
policy-statement black-hole-filter
from {
community rtbh;
then {
next-hop discard;
! Neighbors!
Policy Direction
All policy processing in the Junos operating system occurs with respect to the routing table. The import policies are applied to
the routes received from routing protocols prior to inclusion in the routing table.
The export policies are applied only to active routes in the routing table. The exception to this rule is the use of the
advertise-inactive option in BGP. This option allows policies to process the best BGP routes even if they are inactive.
You can also apply the export policies to the routes exported to the forwarding table.
then accept;
term 2 {
from
protocol
level 2;
then accept;
Policy Processing
To solve a complex set of route manipulation tasks you can apply multiple policies to a single protocol application point. This
combination of multiple policies together is referred to as policy chain. The Junos OS evaluates policies in the chain from left
to right based on the order in which they are applied to a routing protocol. The Junos OS checks through each policy term
match criteria and performs the associated action when the match occurs. If the first policy does not match or if the match is
associated with a nonterminating action, the route is evaluated against the next policy in the chain. Policy chain processing
stops once a route meets a terminating action.
The Junos OS ultimately applies the default policy for a given protocol when no terminating actions occur while evaluating
the policy chain. Note that the default policy is different for different protocols. The default policy is always completes with a
conclusive action of either accept or reject. To override the default protocol policy action you can configure a statement
default-action [accept I reject] at any point within a policy.
exact
then accept;
Prefix L.ists
• Prefix lists notes
• Used as a policy match criterion
• prefix-list is a list of exact matches
• prefix-list-filter allows various match types
• Action applies to all matching prefixes
• Provide efficient way of reusing the code
• Configured under [edit policy-opt ions] hierarchy
fedit policy-options] [edit policy-options)
user@srx show user@srx show
prefiK-list rfc1918 policy-statement rejecc-rfc1918
10.0.0.0/8; from {
172.16.0.0/20; prefix-list-filter rfc1918 crlonger;
192.168.0.0/16;
then {
reject;
Prefix Lists
Prefix lists provide an efficient way of grouping prefixes to simplify policy creation and maintenance. A prefix list is a named
set of routes. You define a prefix list under the [edit policy-options] hierarchy. You can use prefix lists as a policy
match criterion. When a prefix list is referenced in a policy, the policy evaluates the routes in the list as a series of exact route
filter statements. A match on any one route within the prefix list causes the action specified in the then clause to be taken.
The Junos OS allows you to configure a prefix-list-filter as a policy match condition. In this case the policy evaluates the
routes in the list of route filters along with the specified match type.
You can use a prefix list in many policies. This allows you to simplify policy creation and modification by effectively reusing
the same piece of configuration and keep the routes of interest in a single place.
Using Regex
The slide highlights the topic we discuss next.
Regex Operators
Regex Examples (1 of 2)
• AS-Path regex examples
• "65001 . 65002"-This regex matches an AS Path with a length of 3 where
the first AS is 65001 and the last AS is 65002. The AS in the middle of the path
can be any single AS number
• "(65001165002) ?"-This regex matches an AS Path with a length of 1. The
AS in the path must be either 65001 or 65002
• "65001 . *"-This regex matches an AS Path with a length of at least 1. The
first AS number must be 65001. and it can be followed by any other AS number
any number of times or no AS numbers. This regex is often used to represent all
BGP routes from a particular neighboring AS network
• ". * 65001"-This regex matches an AS Path with a length of at least 1. The
last AS number must be 65001. and it can be preceded by any other AS number
any number of times or no AS numbers. This regex is often used to represent all
BGP routes that originated from a particular AS network
• "() "-This regex matches an AS Path with a length of 0. The null AS Path
represents all BGP routes native to your local Autonomous system
Regex Examples (2 of 2)
f �20HJun,pe,Netwo"'5.lflc.AIILgMs,eser.ed
:r . :_,,.. ,, - ' j'
JUntPer
hi.,.....J
Worldwide Education Services ........,un,pe<nel I 19
�������������������������������-
Extern 20.20.1.0 10.222.1.3 Ox80000060 1647 Ox22 Oxlf2d 36
--- (more} ---
......
AS path: 100 I
10.1.106.0/24 *[BGP/170] 02:17:06, localpref 200
Case Study
The slide highlights the topic we discuss next.
ISPA ISPB
AS 100 AS200
term 2 {
from as-pat� aslOO;
then {
communi�y set aslOO-comm;
term 3
then
community set no-export;
term 2 {
from as-path aslOO;
then {
communi�y set aslOO-comm;
accept;
term 3
then {
cornmuni�y set no-export;
communi�y add aslOO-comm;
user@Rl> show route 10. 3. 100/24 detail I match 11 (communities) I (as path) u
AS path: 100 300 I
Communities: 65000:100 no-export
Final Checks
You repeat you verification of the route received from the ISPs. You first check the hidden routes and discover that the BGP
routes tagged with communities *:777 or *:888 are successfully filtered out. Then you check that all received routes are
tagged with community 65000:100. The output confirms this tagging. Finally, you check that the received routes originated
in an AS other than the neighboring AS. The output confirms this as well.
Summary
• In this content, we:
• Isolated problems relating routing policy structure and
configuration
• Identified common commands used for troubleshooting
routing policy
We Discussed:
Isolating problems relating routing policy structure and configuration; and
Identifying common commands used for troubleshooting routing policy.
Review Questions
1. If you want to redistribute OSPF routes to BGP, what
kind of policy should you use: import or export, and
which protocol should you apply this policy to?
2. Which routes match the route-filter 192.168.0.0/16
upto /18?
3. What does the "?" character mean in AS-path
regular expressions?
4. How can you test a policy against all the entries in
the routing table?
5. How can you test the results of your BGP export
policy?
Review Questions
1.
2.
3.
4.
5.
You should apply an export policy matching and accepting OSPF routes to protocol BGL�
2.
The routes in the following list match: 192.168.0.0/16, 192.168.0.0/17, 192.168.128/17, 192.168.0.0/18, 192.168.64.0/18,
192.168.128.0/18, and 192.168.192.0/18.
3.
The"?" character is the rcgex operator that matches O or 1 occurrence of an AS number in an AS path.
4.
You use the test policy policy-name O. 0. 0. 0/0 command to test the policy against all the entries in the routing table.
5.
You use the show route advertising-protocol bgp neighbor command to display the routes after export policy
processing.
Objectives
We Will Discuss:
Verifying and troubleshooting multicast; and
Verifying and troubleshooting Class of Service (CoS).
Agenda:
Troubleshooting Advanced Features
7Multicast Troubleshooting
• Multicast Case Study
• Cos Troubleshooting
• Cos Case Study
Multicast Troubleshooting
The slide lists the topics we will discuss. We discuss the highlighted topic first.
• What is multicast?
• One-to-many network-wide delivery to interested receivers
only
• Multicast components:
• Source
• Unicast source address (S,)
• Receivers
• Multicast group address (.G)
• Network
• Multicast-enabled routers running multicast routing protocols
• Forwarding is based on incoming interface and outgoing interface
list
What Is Multicast?
Multicast defines the concept of a one-to-many communications stream. Unlike broadcast traffic that is not forwarded by
routers multicast can operate network-wide. The network is responsible for replicating the data and delivering it only to
listeners that have expressed their interest. Links that connect to uninterested listeners do not carry the traffic. This method
provides efficient use of resources because traffic flows only through links that connect to end hosts that want to receive the
data.
Multicast Components
A multicast source is any device that originates multicast IP packets. In multicast distribution source is associated with a
unicast address.
Multicast packet is a packet with multicast destination address. All multicast 1Pv4 addresses fall in the range of 224.0.0.0
through 239.255.255.255. Multicast addresses do not have a mask length associated with them for forwarding purposes. A
multicast address is also called a multicast group address.
Because there can be multiple receivers, the path that multicast packets take may have several branches. A multicast data
path is known as a distribution tree. Multicast traffic flows through the distribution tree in the downstream direction.
Multicast-enabled routers keep track of the incoming and outgoing interfaces for each group, which is known as multicast
forwarding state.
Multicast Overview (2 of 2)
• Service model
• Any Source Multicast (ASM)
• Source discovery is a function of the network
• Source Specific Multicast (SSM)
• Out-of-band Source discovery
Multicast Routing (1 of 4)
• IGMP
• Network edge, host subscription management
• Version 1, Version 2 (default) - ASM only
• Version 3 is mandatory in SSM model, supports ASM
• Backward compatible with IGMPv1, IGMPv2
• MLD
• 1Pv6 equivalent of IGMP
• MLD version 1. similar to IGMPv2
• MLD version 2, similar to IGMPv3
• A sub-protocol of ICMPv6
IGMP Protocol
Hosts use the Internet Group Membership Protocol (IGMP) to inform routers about which multicast groups they want to join,
and routers use IGMP to verify that a host is still interested in listening to a group. There are three versions of IGMP, all
supported by the Junos OS:
IGMP Version 1 is the original IGMP version. In IGMPv1 if a host wants to leave a group it stops sending report
messages, and after some time, the router assumes the host is no longer interested in the group and stops
forwarding traffic for that group.
IGMP Version 2 (default) adds explicit leave functionality so hosts can report to the router when they are no
longer interested in a group.
IGMP Version 3 adds source filtering so the host can include and exclude specific sources when requesting
multicast packets. Source filtering is required for SSM.
Note that IGMPv1 and IGMPv2 support only ASM model, whereas IGMPv3 supports both ASM and SSM models.
IGMPv3 is backward compatible with earlier IGMP versions. In general, a mix of IGMP versions among hosts on a LAN is
permissible, while a mix of IGMP versions among routers on a LAN is not recommended.
Continued on the next page.
MLD Protocol
MLD is the equivalent 1Pv6 protocol for 1Pv4's IGMP. It is used between routers and hosts to signal interest in receiving
specific 1Pv6 multicast sessions.
MLD is a sub-function of the ICMPv6 protocol. Its messages are carried inside ICMPv6, and the next-header value is 58. The
source address for MLD is always a link-local 1Pv6 source address. The MLD packet has a time to live (TIL) of 1 and includes
an 1Pv6 router alert header.
Multicast Routing (2 of 4)
• PIM
• Ensures loop-free forwarding
• RPF check (looks in the inet. O table (default) or in the inet. 2
table)
• Management of distribution trees
• Shortest path tree (SPT)
• Shared or rendezvous point tree (RPT)
• Maintains event-driven, dynamic routes
• Tuples of (S.G) for SPT or (*.G) for RPT
• Stored in the inet. 1 routing table
PIM Protocol
Reverse path forwarding (RPF) is a central concept in multicast routing. Routers set up forwarding state in the opposite
direction of unicast, from receiver to the root of the distribution tree. Routers perform the RPF check to determine the
interface that is topologically closest to the root of the tree. The RPF interface becomes the incoming interface for the group.
By default, the Junos OS uses the inet. o routing table for the RPF check. Thus, the unicast topology and multicast topology
are identical. If you must have a separate topology for multicast forwarding, you can achieve this by changing the table the
RPF check uses. In the Junos OS, the inet. 2 table is reserved for this purpose.
Continued on the next page.
inet2 -rpf
import-rib inet.2;
The RPF check is performed in respect to the root of the distribution tree.There are two types of the multicast distribution
trees: Shortest path tree (SPT) and rendezvous point tree (RPT) also referred to as shared tree.In a shortest path tree (SPT),
the root of the distribution tree is the source. In a shared tree, the root of the distribution tree is a special router somewhere
in the core of a network. This core router is called a rendezvous point (RP). Routers built the RPT when source for a given
group is not known.
In contrast to unicast routing multicast routing is largely event-driven. For example, a join message is generated when a
router wishes to receive multicast traffic for a given group.As a result of this join, a multicast distribution tree is instantiated,
which adds the interface on which the join was received in the outgoing interface list for that group. After some period of
time, lack of continued join activity results in this state timing out, the removal of the distribution tree and the removal of the
interface from the outgoing interface list. In unicast routing, the absence or presence of a route is not a function of an actual
need to use the route, in contrast, a multicast route is a dynamic entry that is based on the presence of an active sender and
at least one interested receiver.
Routers keep the multicast routes or forwarding states in terms of (S,G) and (*,G) state.The "S" refers to the unicast IP
address of the source, the 'G' represents the specific multicast group IP address.The"*' is a wild card used to denote any
source sending to group G. These multicast forwarding states are cached in the inet. 1 routing table.
Multicast Routing (3 of 4)
• PIM
• Dense distribution mode
• Flood and prune
• Prune signals no interest in receiving multicast traffic
• Graft overrides previous prune messages
• Sparse distribution mode
• Explicit subscriptions only
• Join signals interest in receiving multicast
• Prune sent to unsubscribe from multicast traffic
• RP is required for source discovery in ASM model
Multicast Routing (4 of 4)
• MSDP
• Communicates information about active sources
• lnterdomain multicast
• Anycast-RP application
• Typically runs on PIM-SM RP routers
• MSDP sets up peer relationships using TCP
• Not included in 1Pv6 multicast stack of protocols
MSDP Protocol
MSDP shares multicast source information between RPs so that sources and receivers can meet, even if they have
associated with different RPs. MSDP-speaking routers form peer relationships, similar to BGP peers, over a TCP connection.
MSDP uses TCP port 639. Two MSDP peers can be in the same PIM-SM domain or in two separate domains.
Within a domain, MSDP enables creation of multiple RPs, facilitating redundancy and load balancing. Anycast RP is the
primary example of intradomain MSDP. The concept of Anycast RP, in general, is to have multiple devices performing the
exact same role in the network, and with the exact same unicast address (anycast address). The clients connect to the
nearest device with the required anycast address.
Between different domains, MSDP enables RPs to exchange source information from their respective domains, allowing
interdomain source discovery to occur.
MSDP is abandoned in 1Pv6 multicast because it does not scale well enough. Instead two different approaches are used in
intradomain Anycast RP and interdomain multicast.
The Anycast RP in 1Pv6 is based on PIM-Anycast concept. In PIM-Anycast RPs forward PIM register messages they receive
from source aware routers to the other RPs that are explicitly configured in RP-set. Note that you can use this technique with
1Pv4 multicast as well.
To allow interdomain 1Pv6 muticast using the ASM model, the embedded RP solution was developed. The domain owning the
multicast address provides the RP information as part of the complete 1Pv6 group address.
R3 R5
LAN 1
IGMPReport
(*.Gi)
R3 R5
Multicast Troubleshooting-Part 1
The most common type of multicast issue is the RPF failure. RPF checks are used both at the control and data plane of
multicast routing. Control plane involves PIM signaling-some PIM messages are subject to RPF checks. For example, PIM
(*,G) joins are sent toward the shortest path to RP, and PIM (S,G) joins are sent toward the shortest path to the source. Next,
the BSR/RP address in the BSR messages is subject to RPF check as well.
Data plane RPF checks are performed every time a multicast data packet is received. The source IP address in the packet
should be reachable through the incoming interface.
One common reason for many issues with multicast routing is the PIM and IGP topology inconsistency. Multicast normally
should be deployed in a single IGP domain with PIM enabled on all links running the IGP. Note that PIM is also required on
the multicast source facing interfaces and the receiver LAN interfaces.
In the Junos OS, IGMPv2 is automatically enabled on the interfaces configured in PIM.
In PIM-SM ASM network distribution of RP information is critical to overall multicast routing.
If BSR RP distribution method is used you need to ensure a Bootstrap router is configured and the other routers aware of its
presence. Check that the Bootstrap router collects and distributes the RP information. Check that other routers receive this
information.
Continued on the next page.
Multicast Troubleshooting-Part 2
In Anycast RP domain make sure that the RPs advertise the active sources they learned from the source DRs to the other
RPs. There are two methods that are used to exchange with the active source messages: MSDP protocol, and configuration
of RP set in PIM on the RPs, which allows the RPs to forward PIM register messages to the other RPs in the set.
If MSDP is used, check that MSDP session is established between the RPs. If the session is established, check that the RPs
generate the source active(SA) messages and these messages are received and not filtered by the other RPs. MSDP allows
you to configure SA message limits. Ensure that theses limits are not exceeded.
Recall that the multicast range of 232.0.0.0/8 is reserved for SSM operations. By default, receiver DRs do not accept(* ,G)
IGMP reports. Recall that IGMPv3 is required for SSM operations. Source DRs do not send PIM register messages for the
groups in SSM range. Should RPs receive the register message for a group in SSM range, it ignores it. All PIM routers do not
send PIM join messages and ignore PIM joins for a group in SSM range. You can override this default behavior in the Junos
configuration.
The Junos OS allows you to apply routing policies to control various multicast protocol messages. Check that the policies do
not prevent normal protocol message flows.
Make sure that your security policies or firewall filters allow both the multicast protocol messages and multicast data
packets.
You can configure multicast scoping to control multicast data traffic distribution. An incorrectly configured multicast scope
will block multicast data on the interfaces where the scope is applied.
Interface: ge-0/0/13.0
Querier: 10.222.2.2
State: Up Timeout: None Version: 2 Groups:
Immediate leave: Off
Promiscuous mode: Off
Passive: Off
Configured Par��eters:
IGMP Query Interval: 125.0
IGMP Query Response Interval: 10.0
--- {more) ---
10.222.3.0/24
Protocol: OSPF
Inteiface: ge-0/0/4.301
Neighbor: 10.222.0.10
Group: 239.1.1.1
Source: *
RP: 10.222.1.3
Fla.gs: sparse,rptree 1 wildcard
Upstrearn interface: aeO. 0
Downstream neighbors:
Interface: ge-0/0/6.0
Group: 239.1.1.1
Source: 10.222.3.2
Flags: sparse,spt
Upstream int.erface: ge-0/0/4.301
Downstream neighbors:
Interface: ge-0/0/6.D
Group: 2 3 9. 1 . 1. 1
Source: 10.222.3.2/32
Upstream interface: ge-0/0/4.301
Do�NUstream interface list:
ge-0/0/6.0
You can also find the multicast forwarding information in the inet. 1 table by using the show route table inet .1
command. This command provides essentially the same list of multicast routes as the show multicast route
command, however, the latter produces a more convenient output.
Source 10.222.3.2
Prefix 10.222.3.0/24
Upstream interface ge-0/Q/4.301
Upstream neighbor 10.222.0.10
- - "
- -'
-= M"M'""f,c/j,g'JFif''U11[= ""
" 1'l!l1Pff� www4Urupe,.not I23
" 7;Wo]l��J,!Slm/i!,$
- ----:WlliiE®iLefAJ:filW-jp'x �40,.::: 9%'£ - f - Y
BSR
10.222.1.3
.____......._ __
Pri Local address
100 10.222.1.2
Pri State
0 InEligible
Timeout
73
�
09:43:57.508299 Cut IP {tos OxcO, ttl 1, id 23186, offset 0, flags [none], proto: PIM
(103), length: 54) 10.222.0.9 > 224.0.0.13: 10.222.0.9 > 224.0.0.13:PIMv2, length 34
Hello, cksum Oxb67d {correct)
Hold Time Option (1), length 2, Value: 1m45s
Lfu'{ Prune Delay Option (2}, length 4, Value:
T-bit=l, LAN delay 500ms, Override interval 2000ms
---(more)---
Debugging PIM
To perform debugging functions of the PIM routing use the Junos traceoptions function. The trace output is sent to a named
log file in /var /log directory. You can define various PIM parameters to trace in the traceoptions configuration.
You can view the log file by using show log filename command or you can monitor the updates in the log file
dynamically with the monitor start filename command. Do not forget to stop monitoring when you are done, using
the monitor stop command.
The example on the slide shows a trace log entry of a PIM join message sent to 10.222.0.2 neighbor with the message
details.
You can trace the protocol messages on a router interface by using the monitor traffic interface
interface-name command. This command is essentially a front end to a well known tcpdump utility. You can use various
filtering options in this command. For example, to capture only PIM messages, you can use the following filter:
user@srx> monitor traffic interface ge-0/0/1.0 matching "dst 224.0.0.13"
The example on the slide shows a captured PIM hello message.
:::::========================::::C::.c ID
interface
e ·-
Check JGMP and PIM are enabled on tl1e receiver B
facing interface
i ,g
:::::::========================:C::.5;::;,'§
Watch for ASM reports in SSM range
Try static lGMP joins !;:: 8.
Agenda:
Troubleshooting Advanced Features
• Multicast Troubleshooting
�Multicast Case Study
• Cos Troubleshooting
• Cos Case Study
10.222.1254 RP ·- _ - __ - . RP 102221.254
.5 MSDP .
r:l
10-222.0.12/30
OSPF .14
131 5
•.21 .22.=-· R
R4 . • Receiver
10.222.0.2G/:,Q .
address-family INET
RP address Type Mode Holdtime Timeout Groups Group prefixes
10.222.1.254 bootstrap sparse 150 146 224.0.0.0/4
Group: 239.1.1.l
Source: *
RP: 10.222.1.254
Flags: sparse,rptree,wildcard
Upstream in�erface: ge-0/0/12.0
Group: 239.1.1.1
Source: *
RP: 10.222.1.254
Flags: sparse,rptree,wildcard
I Upstream interface: Local I
Source 10.222.3.2
Prefix 10.222.3.0/24
Upstream interface ge-0/0/1.305
Upstream neighbor Direct
---
�P address Type Holdtime Timeout Groups Group prefixes
10.222.1.254 bootstrap 150 146 0 224.0.0.0/4
�
__
64 bytes from 10.222 .1. 254: icmp_seq=O ttl=64 time=4. 323 ms
RR: 10.222.1.254
._______ 10.222.0.18
�
___
-�'$'��.�
V2 Register O 851 0
V2 Register Stop O O O
.......___ �
c 2014Ja-Netwo,!cs, Inc. All rijJIII,, .....;:!., ��:i'�::Tiffiru� Worldwide Education Services ,1 WWWl\Jn,per net I 34
• Check R3 RP information
user@R3> show pi.rn rps extensive
Instance: PIM�master
Address family INET
RP: 10_222.1.254
Learned via: static configuration I
1"1oae: ::;parse
Time Active: 01:54:45
Holdtime: 0 I
Device Index: 132
Subunit: 32769
Interface: ppeD.32769
Static RP Ove.rr.i..de: Off
---(more)---
• Solution:
• Configure R3 RP as local instead of static
• Check PIM signaling all over again
user@R5> show p.:i.m join
I I
Group: 239.1.1.1
Source: 10. 222. 3. 2
��ags: sparse,sp�
Upstream in-.:erface: ge-0/0/12.D
Solution
You modify the R3 RP settings and run the verification round again. This time R5 successfully joins the SPT and is receiving
multicast traffic for the 239.1.1.1 group.
Agenda:
Troubleshooting Advanced Features
1111
Multicast Troubleshooting
1111
Multicast Case Study
7CoS Troubleshooting
1111
Cos Case Study
Cos Troubleshooting
The slide highlights the topic we discuss next.
Cos at a Glance
The convergence of voice and data networks is critical to network ability to provide guaranteed service level for the traffic
kinds of different nature. Allowing fair and even competition among the different applications by having no traffic
differentiation does not work because different types of traffic have different requirements. Typically, data packets are large
and utilize large amounts of bandwidth. Besides, the data communication has a bursty nature. In voice communication,
packet transmission is much more sensitive to delay and jitter. Cos provides the ability to treat some packets differently as
they transit a network.
Cos is an end-to-end mechanism, enabling Cos on one router does not provide the entire solution.
If all the nodes in a Cos domain do not implement a common set of CoS processing rules, also known as per hop behavior
(PHB), the end-to-end performance of the network cannot be predicted.
Cos Overview (2 of 3)
• CoS components:
• Policing
• Single-rate two-color policers
• Process traffic at either ingress or egress
• Soft action or hard action policers
• Queuing
• Traffic goes to an outgoing queue based on its classification
• Scheduling
• Define queue processing parameters
• Rewrite rules
• Process traffic at egress
• Mark packet cos fields based on prior classification
Cos Overview (3 of 3)
• CoS components
• Forwarding Class is the central component in the Cos
framework
• Defines Per Hop Behavior (PHB)
f
• Classifiers map trafic to a Forwarding Class
• Forwarding Classes are bound to outgoing queues
• Queues are bound to schedulers
• Rewrite rules act on the Forwarding Class classification
• Loss Priority
• Set by classifiers or policers
• Schedulers act on Loss Priority in case of congestion
Ingress
Egress
Filter: cos-classifier
Policers:
Name Bytes Packets
vo-policer
Checking BA Classifiers
The show class-of-service classifier command lists all system BA classifiers. The command takes a classifier
name or classifier type as a filtering argument. The example command on the slide shows a BA classifier of DSCP type called
enterprise-cos.
CT-.1ill0iS�"��=w t
�
'g"'
JllrnP""� - * · -�m�nServlces -�-
�
www4Ufl,pe1:ne1153
�..,rjf\fyg < """ , x To�
Agenda:
Troubleshooting Advanced Features
III
Multicast Troubleshooting
III
Multicast Case Study
III
CoS Troubleshooting
7CoS Case Study
18 ge-0/0/2
�22016/30
R2 0
3
2
•
102::� 0;30 R
ge.Q/0/6
OSPF 10.222.0.12/30
.14
.131
''iii'�
.21 ge-0/0/12 .224,�
R4 Host 8
10222.0.20/30
10222.2.2
VoIP Troubleshooting (1 of 7)
• Check the path VoIP packets take
user@host-a> traceroute 10.222.2.2
traceroute to 10.222.2.2 (10.222.2.2) 1 30 hops max, 40 byte packets
1 10.222.3.1 {10.222.3.1) 1.812 ms 1.415 ms 1.339 ms
10.222.0.17 (10.222.0.17) 2.040 ms 1.860 ms 1. 783 ms
3 10.222.0.1 (10.222.0.1) 2.196 ms 2.157 ms 2.091 ms
4 10.222.0.6 (10.222.0.6) 2.301 ms Z.440 ms 2.262 ms
5 10.222.2.2 (10.222.2.2) 2.317 ms 2.388 ms 2.472 ms
then {
policer vo-po.l 1.cer;
I loss-priori�y low;
forwarding-class voice; I
accept;
VoIP Troubleshooting (2 of 7)
• Check the policer drops
user@Rl> show firewall filter cos-classifier
Fi:�e�: cos-class:fier
Policers:
a s
e P
���� ����� B y _t s c_k et 0
�
e � �
�N-a_m _� � �� �������� -- � �� �� �� - �
vo-pa.licer
_ _ _
�
low
assur d-forwarding
lo-..; e
2 2 normal
nc 3 3
I low
normal
VoIP Troubleshooting (3 of 7)
• Check the VoIP packets queuing and queue drops
user@Rl> show interfaces queue ge-0/0/2 I find 11 Queue: 1 11
Queue: 1, Forwarding classes: voice
Queued:
Packets 121 O pps
Bytes 12342 O bps
Transmitted:
Packets 121 O pps
12342 O bps
I
Bvtes
Tail-dropped packets O pps
RED-dropped packets O pps
VoIP Troubleshooting (4 of 7)
__
000000 data high
101110 voice low I
..t 1vuvu nc .low
....____ �
VoIP Troubleshooting (5 of 7)
• Check the VoIP packets queuing and queue drops at
R3
user@R3> show interfaces queue aeO I .find egress
Egress queues: 8 supported, 4 in use
. . .
Queue: 1, Forwarding classes: voice
\.lU0Ueu:
I
Packets : 20000 0 pps
Bytes : 11080000 0 bps
Transmitted:
Packets : 19130 0 p ps
Bytes : 10598020 0 bps
Tail -dropped packets
...� .... -uroppeu paCl'\..SLS
:
:
870
u
I 6 pps
0 pps
---(more)---
VoIP Troubleshooting (6 of 7)
• Check the aeO Cos settings
user@R3> show class-of-service interface aeO
Physical interface: aeO, Index: 156
Queues suooorted: 8, Queues in use: 4
I Scheduler �ap: <default>, Index: 2 I
conges�ion not�rica�ion: uisauLea
VoIP Troubleshooting (7 of 7)
• Collected information:
• R3 correctly identifies VoIP packets and puts them into
queue 1 but then some packets get dropped due to the
default scheduler's action
• Solution:
• Configure interface aeO CoS parameters according to the
Cos domain requirements
• Scheduler map. etc.
Collected Information
At this point you can conclude that R3 correctly identifies VoIP packets and puts them into queue 1, but then some packets
get dropped due to the default schedulers applied to the interface.
Solution
You have to configure the aeO.O CoS parameters according to the network requirements and cos design to ensure
consistent Cos processing end-to -end.
Summary
• In this content, we:
• Verified and troubleshot multicast
• Verified and troubleshot Cos
We Discussed:
Verifying and troubleshooting multicast; and
Verifying and troubleshooting Cos.
Review Questions
1. What is the purpose of the RPF check in multicast
routing?
2. Name two specific configuration requirements when
using Auto-RP with PIM sparse mode.
3. Which methods are used to ensure that all RPs
discover active sources in Anycast RP?
4. What is the purpose of the forwarding class in the
Junos OS Cos framework?
5. How much of interface bandwidth is allocated to the
Expedited Forwarding forwarding class by
default?
Review Questions
1.
2.
3.
4.
5.
The R PF check prevents looping and duplication of multicast packets. Lt ensures packets arc forwarded only away from the source
down to the receivers.
2.
For Auto-RP you must enable sparse-dense mode on the interfaces, and you must explicitly configure the Auto-RP dense groups:
224.0.1.39 and 224.0.0.40.
3.
ln an Anycast RP application, all RPs must be aware of active sources. Ln IPv4 multicast the two methods that RPs can use to advertise
the active sources arc MSDP protocol and RP set configuration.
4.
All packets entering an SRX device are classified to a forwarding class. The main function of forwarding classes is to determine the
output queue to which a packet is assigned.
5.
By default, the Expedited Forwarding class does not have an attached scheduler, hence no bandwidth is allocated to it.
Pathfinder http://pathfinder.juniper.net
http:j/www.juniper.net;techpubs/content-
Content Explorer
applications/content-explorer
Feature Explorer http:j/pathfinder.juniper.netjfeature-explorer
Learning Bytes www.juniper.net;learningbytes
Installation and
www.juniper.net;courses
configuration courses
http://forums.juniper.netjt5/Training-Certification-
J-Net Forum
and/bd-p/Training_and_Certification
Certification program www.juniper.net;certification
Courses http:j/www.juniper.net;training/technical_education
Translation tools http:j/www.juniper.net;customers/support;#task
www.juniper.net
Advanced Junos Enterprise Routing Troubleshooting
www.juniper.net
Advanced Junos Enterprise Routing
Troubleshooting
Objectives
• After successfully completing this content, you will be
able to:
• List common commands that are used to troubleshoot and
verify the RIP routing protocol
• Isolate different IGP issues
• Explain IGP support for 1Pv6
We Will Discuss:
Common commands used to troubleshoot and verify the RIP routing protocol;
RIP Troubleshooting
The slide lists the topics we will discuss. We discuss the highlighted topic first.
RIP Overview (1 of 2)
• Distance-vector IGP
• Depends on split horizon. timers. and count to infinity to
resolve loops
• Mode and versions
• 1Pv4
• version 1 (legacy) or version 2 (default)
• You can modify send/receive mode
• 1Pv6: RIPng
• Similar in most respects to RIPv2
• Separate configuration hierarchy
• Default RIP preference is 100
RIP Overview (2 of 2)
ge-0/0/13.0: 0 routes learned; 16 routes advertised; timeout 180s; update interval 30s
Counter Total Last 5 min Last minute
Updates Sent 31 Hi 2
Triggered Updates Sent 1 0 0
Responses Sent 0 (j 0
Bad Messages 0
---(more)---
Debugging RIP
To perform debugging functions of the RIP routing use the JU NOS traceoptions function. The trace output is sent to a named
log file in /var /log directory.You can define various RIP parameters to trace in the traceoptions configuration.
You can view the log file by using show log filename command or you can monitor the updates in the log file
dynamically with monitor start filename command. Do not forget to stop monitoring when you are done with the
monitor stop command.
The example output on the slide shows a received update message carrying several routes.
Note that you should not normally use traceoptions in a stable production network because the debugging process
consumes additional processing resources.
::::,
'Q.O
;;::
,-����������������---- c:
Check export policy o
O
Enable traceoptions
::,
=
policies at the network edge but
the testing revealed that RIP
e.
routers cannot reach other IGP
subnets outside of RIP_ 10.2 .OA/30 1.5
.6
• Similarly, the R1 router cannot R4 2110.222.0.20;30 .2
• Traceroute
user@RIP> traceroute 192.166.1.1
traceroute to 192.168.1.1 (192.168 .1.1), 30 hops max, 40 byte packets
1 10.222.0.30 (10.222.0.30) 3.394 ms 1. 727 ms 1.557 ms
2 10.222.0.21 (10.222.0.21) 1.807 ms 1.750 ms 1. 727 ms
3 10.222.0.25 (10.222.0.25) 1.699 ms 2.081 ms 1.545 ms
4 10.222.0.30 (10.222.0.30) 1.790 ms 2.010 ms 1.874 ms
5 10.222.0.21 (10.222.0.21) 1. 915 ms 1.947 ms 1.773 ms
--- (more) ---
then reject;
Solution: Part 1
The troubleshooting revealed that the routing loop was formed due to the default route redistribution from a protocol with a
higher preference (OSPF external 150) to a protocol with a lower preference (RIP 100) at two routers R4 and R5. One of the
possible solutions to this problem is configuring a RIP import policy filtering the default route from the RIP at R4 and R5.
The slide shows an example of the import policy. You apply the policy and monitor the results. Now R4 shows that it has only
one source of the default route---OSPF.
• Solution
• Test the RIP router again
user@RIP> ping 192 .168 .1.1
PING 192.168.1.1 (192.165.1.1): 56 data bytes
64 bytes from 192.168.1.1: icmp_seq=O tt1=63 time=l.429 ms
64 bytes from 192.168.1.1: icmp_seq=l ttl=63 cime= l.333 ms
'C
--- 192.168.1.1 ping statistics ---
2 packets transmitted, 2 packets received, 0\ packet loss
round-trip min/avg/max/stddev = 1.333/1.381/1.429/0.048 ms
Solution: Part 2
You then run ping and traceroute tests at the RIP router. This time the tests are successful.
Troubleshooting R1 Routing (1 of 4)
Troubleshooting R1 Routing (2 of 4)
• Check the OSPF LSDB
user@R3> show ospf database external
OSPF AS SCOPE link state database
Type ID Adv Rt r Seq Age Opt Cksum Len
Extern 20.20.0.0 110.222.1.31 Ox80000017 512 Ox22 Oxbcd9 36
Extern 20.20 .1.0 10.222.1.3 Ox80000017 512 Ox22 Oxble3 36
Extern 20.20.2.0 10.222.1.3 Ox80000017 512 Ox22 Oxa6ed 36
--- (more) ---
Troubleshooting R1 Routing (3 of 4)
• No routes
• Any ideas?
Troubleshooting R1 Routing (4 of 4)
• Solution:
• Modify or remove the policy
Solution
You must either adjust the import policy settings or completely remove the policy depending on your further goals.
Suboptimal Routing (1 of 3)
• Test the path to the RIP domain
user@R2> traceroute 20.20.0.1
traceroute to 20.20.0.1 (20.20.0.1), 30 hops max, 40 byte packets
1 10.222.0.2 (10.222.0.2) 6.464 ms 7.586 ms 1.613 ms
2 10.222.0.14 (10.222.0.14) 1.893 ms 2.749 ms 1.846 ms
3 20.20.0.1 (20.20.0.1) 2.240 ms 2.169 ms 2.163 ms
Suboptimal Routing (2 of 3)
Suboptimal Routing (3 of 3)
• Check the volume of the RIP routes
user@R4> show route sul?lmary I match RIP
RIP: 17 routes, 17 active
• Solution:
• Adjust the prefix export limit setting
Solution
The prefix export limit threshold is lower than the amount of external routes the R4 IS-IS export policy redistributes. So you
adjust the prefix export limit setting or modify you export policy settings depending on your further goals.
Troubleshooting RS Reachability (1 of 3)
• Test the R5 reachability
user@R2> ping 10.222.1.5
PING 10.222.1.5 (10.222.1.5): 56 data bytes
ping: sendto: No route to host
ping: sendto: No route to host
·c
--- 10.222.1.5 ping statistics
2 packets transmitted, 0 packets received, 100% packet loss
Troubleshooting RS Reachability (2 of 3)
Troubleshooting RS Reachability (3 of 3}
• Watch for export policy issues
rip-to-isis;
pre ix export-limit 100;
• Solution:
• Delete the second term in the export policy
ml "!;(•
�[.J8JP€f Worldwide Education Services I ,.._;un!J)ernet I 2B
-.-·, """"'f I
,
Solution
You then delete the second term in the export policy.
• RIP Troubleshooting
• IGP Troubleshooting Case Studies
7IGP Support for 1Pv6
OSPFv3
• 1Pv6: OSPFv3
• Fundamental mechanics of OSPF unchanged
• Separate router reachability and prefix reachability LSAs
• Relies on IPSec for authentication
• Supports both 1Pv6 and 1Pv4 realms
• Separate configuration stanza
Summary
• In this content, we:
• Listed common commands used to troubleshoot and verify
the RIP routing protocol
• Isolated different IGP issues
• Explained IGP support for 1Pv6
We Discussed:
Common commands used to troubleshoot and verify the RIP routing protocol;
Isolating different RIP issues; and
IGP support for 1Pv6.
Review Questions
1. Which command is used to view the routes
advertised out of a RIP interface as a result of your
RIP export policy?
2. Which command output displays that an IS-IS
Level 2 router has an overload bit set?
3. What configuration is required for IS-IS to support
1Pv6?
Review Questions
1.
2.
3.
You can use the show rip advertising-protocol command to view the routes that arc advertised out of a RIP interface as
a result of your RIP export policy.
2.
You can use the show isis database command to determine that an IS-IS Level 2 router is overloaded.
3.
IS-IS natively supports both 1Pv4 and 1Pv6 so no special configuration is reguired.
Objectives
• After successfully completing this content, you will be
able to:
• Isolate different BGP issues
• Isolate different routing policy issues
We Will Discuss:
Isolating different BGP issues; and
Isolating different routing policy issues.
_ll
R1 does not ISPA
. 1022200/30 · 102f54013�,
isPs
.. ,
receive I Pv6 AS 100
.s .......... _...... 13 # ..
..
10.222 t.12130 .
AS 200
routes from .... ,, 14
,
.e . /AS 65000',. ·• I I
, ________
IS p A_ l R3 ;21 R4
.2�
I
10.222.0.20/30
.,,.,,
10 .1.101.0/24
AS path: 100 I
> to 10.2.254.1 via ge-0/0/4.304
• Solution:
• Make sure that IBGP receivers can resolve BGP next hop
using a specific route
• For example, next-hop-self, IGP passive, and so forth
Solution
You must ensure that the BGP next hop is reachable at both R1 and R2 with a specific route. For that you can either apply a
next-hop-self policy or configure IGP passive interfaces on the connections to the ISP.
Mar 19 05:52:48.577588 bgp_nexthop_sanity: peer 10.1.254.1 (External �..S 100} next hop
Mar 19 05:52:48.576506 BGP RECV fdcd:l:a: :/48
C201<1J-lletworle,ln<.Mn.,,..;....,_. ,°
���t!Jnjp� Worldwide Education Services www;un,pornet I 10
��JI. I
Debugging BGP
You then enable traceoption to debug BGP protocol operations. You look up BGP update messages in the trace log file. The
log reveals that R1 does receive the 1Pv6 routes and the BGP next hop of the routes is the 1Pv4-mapped 1Pv6 address.
I
Interface Admin Link Proto Local Remote
I
ge-0/0/4.303 up up �in;;,; ;.; a.,,...-..a ;,.;O,.;.. ,;;.1.;.;. ;.;
e t l 2 Sa.,;4.;.. �2/""3:-'0�-- ---,
inet6 fdcd:1:a:O:ffff::2/126 :-,-:":""!'
fe80::b2c6:9a01:2f73:27S4/64
• Solution:
• Configure 1Pv4-mapped 1Pv6 address on the interface or
• Enable accept-remote-nexthop and replace the BGP
next hop with the 1Pv6 address of the connected neighbor
with an import policy
Solution
You can configure an 1Pv4-mapped 1Pv6 address on the upstream interface to ensure that the router can reach the BGP 1Pv6
next hop, or you can configure Rl to accept remote next hops with the accept-remote-nexthop knob and apply an
import policy replacing the BGP next hop attribute with the EBGP peer 1Pv6 address.
I
-�o....
10.1/16 J AS 100
ISPA
' ( '··--------"'<i>'' '
�;_7_;s'pi :io
10.2f20 4/30 I
I .5
., 1022200;30
',,
"-,., .-"
;
I
,�' .1311
102fs4:0/3�
f 1.2/30
ISPB
...-'
AS 200 110.2/16 I
----.I l
!
t 10.222..
1 10 I
,,.,Ji(..._
AS 65000 ....
I .6 ,._ ',, .14
.222/16 ,! ,.
.,,
R3 .,1 R4
________
.,.
10.222.0.20/30 J
/
__
Name: as200 Index: Flags: <Export Eval>
Export: [ (ent-agg-export && ent-bgp-export) JI
(more)
...._____ �
__
Pz:efix Next.hop MED Lclpref AS path
• 10.222.12e.0/17 self 1
* 20.20.128.0/17 Self I
.....____ �
A Destination
* 10.1.100.0/24
• 10 .1.101. 0/24
P Prf
B 170
B 170
Metric 1
100
100
Metric Next hop
>10.222.0.1
>Hi.222.0.1
AS path
100 100 100 I
100 100 100 I
I
---(more)---
..
* 10 .1.100.0/24 Self 100 100 100 I
.
10.222.0.0/16 Self I
10.222.128.0/17 Self
* 20.20.0.0/16 Self
20.20.128.0/17 Self I
Summary
• In this content, we:
• Isolated different BGP issues
• Isolated different routing policy issues
We Discussed:
Isolating different BGP issues; and
Troubleshooting different routing policy issues.
Objectives
• After successfully completing this content, you will be
able to:
• List the general chassis components
• Identify different methods for troubleshooting major chassis
components
• Troubleshoot redundant Routing Engine and Control Board
communication
We Will Discuss:
A list the general chassis components;
Identifying different methods for troubleshooting major chassis components; and
Troubleshooting redundant Routing Engine and Control Board communication.
For further information about supported modules, consult hardware documentation for your specific SRX Series Services
Gateways.
• Card overview
• 1/0 cards (IOCs)
• Flex IOCs
•Services Processing Cards (SPCs)
• Switch Control Boards (SCBs)
• Routing Engine
• Major redundant components
•SCBs
• Power supplies
• Cooling system
Notwodc5,1'""Allri!#II$--, • /U��
;)("ii�I
-�rldwfi:leEducatlonSenrices
=
I wwwJunlpernet 18
• Junos Chassis
Management Architecture
Power control
• The chassisd process
12c bus
• Runs on the Routing Engine
• Detects insertion/removal
of hardware components
• Monitors environmental Fan
sensors
parameters
Board Board Board
• Controls fan speed µkernel µkernel µkernel
Useful Commands
• Verifying the operational status and environmental
parameters
show chassis hardware
show chassis environment
show chassis specific-board
• The specific board changes with the platform
• Details are in the CU Reference Guide
Hardware inventory:
Item Version Part number Serial number Description
Chassis JN10B7005AGA SRX 5800
Midplane REV 03 710-013698 TR0779 SRX 5800 Backplane
FPM Board REV 03 710-014974 KC3406 Front Panel Display
PDM Rev 03 740-013110 QCS1122504F Power Distribution Module
PEM 1 Rev 03 740-013683 QCS1134703V DC Power Entry Module
PEM 2 Rev 03 740-013683 QCS1134 700E DC Power Entry Module
Continued on the next page.
nodeO:
Temperature Issues
A fan failure will be noticed by the chassisd process, which will trigger an alarm. Using the show chassis alarm
command will tell you which fan tray must be replaced. Pay special attention when pulling out fan trays; it is very easy to get
your fingers to touch the spinning fan blades. Follow the procedure and the precautions outlined in the hardware guide.
Each platform has three fan speed temperature thresholds. The actual values change with every platform. If a fan fails, the
temperature thresholds lower to reflect the reduced cooling capability. A fan failure should be taken very seriously, especially
if the air conditioning at the device site is not optimal because the risk is a complete device shutdown.
Power Supplies
If a drop in voltage is detected, the chassisd process will assert an alarm.
user@srx> show chassis alarms
1 alarms currently active
Alarm time Class Description
2007-01-10 15:47:18 UTC Major PEM 1 Input Failure
This alarm in turn will cause a SNMP trap to be sent to the network management stations. The failure is also logged to both
messages and chassisd files.
user@srx> show log messages I find failure
Jan 10 15:47:18 srx chassisd[l300]: CHASSISD_PEM_INPUT_BAD· status failure for power
supply 1 (status bits: Ox4e); check circuit breaker
Note that input failure means the power supply detects no input power. This message could mean a hardware failure,
but also a power circuit problem, or an open circuit breaker.
Continued on the next page.
Redundancy
The slide highlights the topic we discuss next.
Hardware Redundancy
• Most platforms include some form of hardware
redundancy
• Routing Engines
• GRES or NSR
• Control Boards
• Often paired with Routing Engines
• Fabric redundancy
• Power supplies
• Cooling subsystem
Hardware Redundancy
Most platforms include some form of hardware redundancy:
Routing Engines: In Graceful Routing Engine Switchover configuration, only one Routing Engine is running
routing protocol and managing the device. A keepalive mechanism ensures that in the case of failure the
backup Routing Engine will assume mastership. The protocols will go down, but impact to traffic will be limited
or none. In non-stop-routing configuration, both Routing Engines are active at the same time acting as one. The
state is replicated between them, so that in case of a failure all routing protocols will stay up. This is a very
complex feature, and is not supported for all protocols and all hardware configurations yet. Refer to the
technical documentation to understand if its benefits outweigh any potential tradeoff.
Control board: On many platforms, Control Board redundancy is tied to Routing Engine redundancy. It is also
worth noting that on some platforms (most notably several of the MX Series routers) the Control Board also
provide fabric-in other words, a redundant CB also provides redundant fabric.
Continued on the next page.
Replace Routing Engine, SCB, or Both on High End Series Chassis Cluster: Part 1
Parts listed below have the chassis cluster-id stored on non-volatile memory (Flash). Replacing them on high end chassis
cluster requires a specific procedure to avoid service impact due to chassis cluster issue. KB19909 contains more details
about the Location of Chassis Cluster ID in SRX High End Series.
SRX5800 and SRX5600: Switch Control Board (SCB) in SCB slot O
SRX3600 and SRX3400:Routing Engine (RE)
SRX1400: Routing Engine (RE)
On High end SRX devices, RMA node replacement requires specific procedure too. The KB21134 describes the procedure in
detail.
Replace Routing Engine, SCB, or Both on High End Series Chassis Cluster: Part 2
The slide describes the remainder of the procedure.
DATA CENTER
------..
( Internet)
_..,.
L
Summary
• In this content, we:
• Listed the general chassis components
• Identified different methods for troubleshooting major
chassis components
• Troubleshot redundant Routing Engine and Control Board
communication
We Discussed:
A list the general chassis components.
Identifying different methods for troubleshooting major chassis components. and
Troubleshooting redundant Routing Engine and Control Board (CB) communication.
Review Questions
Review Questions
1.
2.
3.
4.
2.
The chassisd is responsible for managing and monitoring hardware.
3.
The hardware guide and the Juniper Networks Knowledge Base arc available to you when troubleshooting hardware issues.
4.
PPP can detect an address mismatch on a point-to-point link.