Junos® OS Protocol-Independent Routing Properties Feature Guide
Junos® OS Protocol-Independent Routing Properties Feature Guide
Modified: 2017-08-16
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS Protocol-Independent Routing Properties Feature Guide
Copyright © 2017 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that
EULA.
Part 1 Overview
Chapter 1 Introduction to Protocol-Independent Routing Properties . . . . . . . . . . . . . . . 3
Protocol-Independent Routing Properties Overview . . . . . . . . . . . . . . . . . . . . . . . . 3
Routing Table Features in Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Part 3 Troubleshooting
Chapter 9 Troubleshooting Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Working with Problems on Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Isolating a Broken Network Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Identifying the Symptoms of a Broken Network Connection . . . . . . . . . . . . 169
Isolating the Causes of a Network Problem . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Taking Appropriate Action for Resolving the Network Problem . . . . . . . . . . . 171
Evaluating the Solution to Check Whether the Network Problem Is
Resolved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Identifying the Symptoms of a Broken Network Connection . . . . . . . . . . . . . . . . 173
Isolating the Causes of a Network Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Taking Appropriate Action for Resolving the Network Problem . . . . . . . . . . . . . . 175
Evaluating the Solution to Check Whether the Network Problem Is Resolved . . . 175
Chapter 10 Debugging and Trace Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Understanding Global Routing Protocol Tracing Operations . . . . . . . . . . . . . . . . . 177
Example: Tracing Global Routing Protocol Operations . . . . . . . . . . . . . . . . . . . . . 178
firewall-install-disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
forwarding-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
full . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
generate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
graceful-restart (Enabling Globally) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
import-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
import-rib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
independent-domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
indirect-next-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
indirect-next-hop-change-acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . 236
input (Routing Options RIB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
install (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
instance-export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
instance-import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
interface (Multicast Scoping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
interface (Multicast Static Routes) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
interface-routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
krt-nexthop-ack-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
longest-match (Static Routes) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
lsp-next-hop (Static Routes) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
martians . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
maximum-paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
maximum-prefixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
med-igp-update-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
metric (Aggregate, Generated, or Static Route) . . . . . . . . . . . . . . . . . . . . . . . . . . 256
metric (Qualified Next Hop on Static Route) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
multicast (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
next-hop (Access) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
next-hop (Access Internal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
no-delegate-processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
nonstop-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
options (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
p2mp-ldp-next-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
p2mp-lsp-next-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
passive (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
policy (Aggregate and Generated Routes) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
ppm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
precision-timers-max-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
preference (Access) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
preference (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
qualified-next-hop (Access) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
qualified-next-hop (Access-Internal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
qualified-next-hop (Static Routes) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
readvertise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
resolution-ribs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
resolve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
restart-duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
restart-duration (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
retain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
rib (General) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
rib (Route Resolution) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
rib-group (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
rib-groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
route (Access) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
route (Access-Internal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
route-distinguisher-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
route-record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
router-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
routing-options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
source-address (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
source-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
ssm-groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
static (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
tag (Access) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
tag (Routing Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
threshold (Multicast Forwarding Cache) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
traceoptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
unicast-reverse-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Chapter 12 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
clear bfd adaptation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
clear bfd session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
show bfd session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
show as-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
show as-path domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
show as-path summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
show interfaces routing summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
show route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
show route active-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
show route all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
show route best . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
show route brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
show route cumulative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
show route detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
show route exact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
show route export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
show route export vrf-target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
show route forwarding-table interface-name . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
show route hidden . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
show route inactive-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
show route instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
show route label-switched-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Part 3 Troubleshooting
Chapter 9 Troubleshooting Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Figure 20: Process for Diagnosing Problems in Your Network . . . . . . . . . . . . . . . 168
Figure 21: Network with a Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Part 1 Overview
Chapter 1 Introduction to Protocol-Independent Routing Properties . . . . . . . . . . . . . . . 3
Table 3: Routing Table Route Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Part 3 Troubleshooting
Chapter 9 Troubleshooting Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Table 4: Checklist for Working with Problems on Your Network . . . . . . . . . . . . . . 167
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• ACX Series
• SRX Series
• T Series
• MX Series
• M Series
• PTX Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see CLI Explorer.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xvi defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page of the Juniper Networks TechLibrary site
at http://www.juniper.net/techpubs/index.html, simply click the stars to rate the content,
and use the pop-up form to provide us with information about your experience.
Alternately, you can use the online feedback form at
http://www.juniper.net/techpubs/feedback/.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Overview
• Introduction to Protocol-Independent Routing Properties on page 3
Introduction to Protocol-Independent
Routing Properties
In Junos OS, routing capabilities and features that are not specific to any particular routing
protocol are collectively called protocol-independent routing properties. These features
often interact with routing protocols. In many cases, you combine protocol-independent
properties and routing policy to achieve a goal. For example, you define a static route
using protocol-independent properties, and then, using a routing policy, you can
redistribute the static route into a routing protocol, such as BGP, OSPF, or IS-IS.
• Global preference
• Martian routes
• Routing table—Contains all the routing information learned by all routing protocols.
(Some vendors refer to this kind of table as a routing information base [RIB].)
• Forwarding table—Contains the routes actually used to forward packets. (Some vendors
refer to this kind of table as a forwarding information base [FIB].)
By default, Junos OS maintains three routing tables: one for IP version 4 (IPv4) unicast
routes, a second for multicast routes, and a third for MPLS. You can configure additional
routing tables.
The Junos OS maintains separate routing tables for IPv4 and IP version 6 (IPv6) routes.
The Junos OS installs all active routes from the routing table into the forwarding table.
The active routes are routes that are used to forward packets to their destinations. The
Junos operating system kernel maintains a master copy of the forwarding table. It copies
the forwarding table to the Packet Forwarding Engine, which is the component responsible
for forwarding packets.
The Junos routing protocol process generally determines the active route by selecting
the route with the lowest preference value. The Junos OS provides support for alternate
and tiebreaker preferences, and some of the routing protocols, including BGP and MPLS,
use these additional preferences.
You can add martian addresses and static, aggregate, and generated routes to the Junos
routing tables, configuring the routes with one or more of the properties shown in
Table 3 on page 4.
Destination address X X X
Type of route X X X
Preference values X X X
Routes that are permanent fixtures in the routing and forwarding tables are often
configured as static routes. These routes generally do not change, and often include only
one or very few paths to the destination.
To create a static route in the routing table, you must, at minimum, define the route as
static and associate a next-hop address with it. The static route in the routing table is
inserted into the forwarding table when the next-hop address is reachable. All traffic
destined for the static route is transmitted to the next-hop address for transit.
You can specify options that define additional information about static routes that is
included with the route when it is installed in the routing table. All static options are
optional.
Related • Example: Configuring a Basic Set of Static Routes for Connecting to Stub Networks
Documentation on page 10
To create a static route in the routing table, you must, at minimum, define the route as
static and associate a next-hop address with it. The static route in the routing table is
inserted into the forwarding table when the next-hop address is reachable. All traffic
destined for the static route is transmitted to the next-hop address for transit.
You can specify options that define additional information about static routes that is
included with the route when it is installed in the routing table. All static options are
optional.
Example: Configuring a Basic Set of Static Routes for Connecting to Stub Networks
This example shows how to configure a basic set of static routes.
• Requirements on page 10
• Overview on page 10
• Configuration on page 11
• Verification on page 13
Requirements
Overview
There are many practical applications for static routes. Static routing is often used at the
network edge to support attachment to stub networks, which, given their single point of
entry and egress, are well suited to the simplicity of a static route. In Junos OS, static
routes have a global preference of 5. Static routes are activated if the specified next hop
is reachable.
In this example, you configure the static route 192.168.47.0/24 from the provider network
to the customer network, using the next-hop address of 172.16.1.2. You also configure a
static default route of 0.0.0.0/0 from the customer network to the provider network,
using a next-hop address of 172.16.1.1.
For demonstration purposes, some loopback interfaces are configured on Device B and
Device D. These loopback interfaces provide addresses to ping and thus verify that the
static routes are working.
Provider network
10.0.0.1
10.0.0.2
...
.1
172.16.1.0/24
.2
Customer network
192.168.47.5
192.168.47.6
g041171
...
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@B# set ge-1/2/0 unit 0 description B->D
user@B# set ge-1/2/0 unit 0 family inet address 172.16.1.1/24
user@B# set lo0 unit 57 family inet address 10.0.0.1/32
user@B# set lo0 unit 57 family inet address 10.0.0.2/32
[edit routing-options]
user@B# set static route 192.168.47.0/24 next-hop 172.16.1.2
[edit interfaces]
user@B# commit
[edit interfaces]
user@D# set ge-1/2/0 unit 1 description D->B
user@D# set ge-1/2/0 unit 1 family inet address 172.16.1.2/24
user@D# set lo0 unit 2 family inet address 192.168.47.5/32
user@D# set lo0 unit 2 family inet address 192.168.47.6/32
[edit routing-options]
user@D# set static route 0.0.0.0/0 next-hop 172.16.1.1
[edit]
user@D# commit
Results
Confirm your configuration by issuing the show interfaces and show routing-options
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
address 172.16.1.1/24;
}
}
}
lo0 {
unit 57 {
family inet {
address 10.0.0.1/32;
address 10.0.0.2/32;
}
}
}
Verification
Purpose Make sure that the static routes appear in the routing tables of Device B and Device D.
• Requirements on page 15
• Overview on page 15
• Configuration on page 16
• Verification on page 18
Requirements
Overview
There are many practical applications for static routes. Static routing is often used at the
network edge to support attachment to stub networks, which, given their single point of
entry and egress, are well suited to the simplicity of a static route. In Junos OS, static
routes have a global preference of 5. Static routes are activated if the specified next hop
is reachable.
In this example, you configure a static default route of ::/0, using a next-hop address
2001:db8:0:1:2a0:a502:0:1da.
For demonstration purposes, some loopback interfaces are configured on Device A and
Device E. These loopback interfaces provide addresses to ping and thus verify that the
static routes are working.
Provider network
2001:db8::1/128
2001:db8:0:1::/64
Customer network
2001:db8::5/128
g041176
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@A# set fe-1/2/0 unit 1 description to-E
user@A# set fe-1/2/0 unit 1 family inet6 address 2001:db8:0:1:2a0:a502:0:1da/64
2. On Device A, create a static route to Device E’s loopback address and set the
next-hop address.
[edit routing-options]
user@A# set rib inet6.0 static route 2001:db8::5/128 next-hop
2001:db8:0:1:2a0:a502:0:19da
[edit interfaces]
user@A# commit
[edit]
user@E# set interfaces fe-1/2/0 unit 25 description to-A
user@E# set interfaces fe-1/2/0 unit 25 family inet6 address
2001:db8:0:1:2a0:a502:0:19da/64
user@E# set interfaces lo0 unit 5 family inet6 address 2001:db8::5/128
5. On Device E, create a static default route and set the next-hop address.
[edit routing-options]
user@E# set rib inet6.0 static route ::/0 next-hop 2001:db8:0:1:2a0:a502:0:1da
[edit]
user@E# commit
Results
Confirm your configuration by issuing the show interfaces and show routing-options
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
family inet6 {
address 2001:db8::1/128 {
primary;
}
address 2001:db8::2/128;
address 2001:db8::3/128;
}
}
}
Verification
Purpose Make sure that the static routes appear in the routing tables of Device A and Device E.
Example: Configuring a Basic Set of Static Routes for Connecting to Stub Networks
• Requirements on page 19
• Overview on page 20
• Configuration on page 20
• Verification on page 23
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
There are many practical applications for static routes. Static routing is often used at the
network edge to support attachment to stub networks, which, given their single point of
entry and egress, are well suited to the simplicity of a static route. In Junos OS, static
routes have a global preference of 5. Static routes are activated if the specified next hop
is reachable.
In this example, you configure the static route 192.168.47.0/24 from the provider network
to the customer network, using the next-hop address of 172.16.1.2. You also configure a
static default route of 0.0.0.0/0 from the customer network to the provider network,
using a next-hop address of 172.16.1.1.
For demonstration purposes, some loopback interfaces are configured on Device B and
Device D. These loopback interfaces provide addresses to ping and thus verify that the
static routes are working.
Provider network
10.0.0.1
10.0.0.2
...
.1
172.16.1.0/24
.2
Customer network
192.168.47.5
192.168.47.6
g041171
...
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@B# set ge-1/2/0 unit 0 description B->D
user@B# set ge-1/2/0 unit 0 family inet address 172.16.1.1/24
user@B# set lo0 unit 57 family inet address 10.0.0.1/32
user@B# set lo0 unit 57 family inet address 10.0.0.2/32
[edit routing-options]
user@B# set static route 192.168.47.0/24 next-hop 172.16.1.2
[edit interfaces]
user@B# commit
[edit interfaces]
user@D# set ge-1/2/0 unit 1 description D->B
user@D# set ge-1/2/0 unit 1 family inet address 172.16.1.2/24
user@D# set lo0 unit 2 family inet address 192.168.47.5/32
user@D# set lo0 unit 2 family inet address 192.168.47.6/32
[edit routing-options]
user@D# set static route 0.0.0.0/0 next-hop 172.16.1.1
[edit]
user@D# commit
Results
Confirm your configuration by issuing the show interfaces and show routing-options
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the static routes appear in the routing tables of Device B and Device D.
This example shows how to configure static routes when the interfaces have IPv6
addresses.
• Requirements on page 24
• Overview on page 24
• Configuration on page 25
• Verification on page 27
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
There are many practical applications for static routes. Static routing is often used at the
network edge to support attachment to stub networks, which, given their single point of
entry and egress, are well suited to the simplicity of a static route. In Junos OS, static
routes have a global preference of 5. Static routes are activated if the specified next hop
is reachable.
In this example, you configure a static default route of ::/0, using a next-hop address
2001:db8:0:1:2a0:a502:0:1da.
For demonstration purposes, some loopback interfaces are configured on Device A and
Device E. These loopback interfaces provide addresses to ping and thus verify that the
static routes are working.
Provider network
2001:db8::1/128
2001:db8:0:1::/64
Customer network
2001:db8::5/128
g041176
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@A# set fe-1/2/0 unit 1 description to-E
user@A# set fe-1/2/0 unit 1 family inet6 address 2001:db8:0:1:2a0:a502:0:1da/64
2. On Device A, create a static route to Device E’s loopback address and set the
next-hop address.
[edit routing-options]
user@A# set rib inet6.0 static route 2001:db8::5/128 next-hop
2001:db8:0:1:2a0:a502:0:19da
[edit interfaces]
user@A# commit
[edit]
user@E# set interfaces fe-1/2/0 unit 25 description to-A
user@E# set interfaces fe-1/2/0 unit 25 family inet6 address
2001:db8:0:1:2a0:a502:0:19da/64
user@E# set interfaces lo0 unit 5 family inet6 address 2001:db8::5/128
5. On Device E, create a static default route and set the next-hop address.
[edit routing-options]
user@E# set rib inet6.0 static route ::/0 next-hop 2001:db8:0:1:2a0:a502:0:1da
[edit]
user@E# commit
Results
Confirm your configuration by issuing the show interfaces and show routing-options
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
family inet6 {
address 2001:db8::1/128 {
primary;
}
address 2001:db8::2/128;
address 2001:db8::3/128;
}
}
}
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the static routes appear in the routing tables of Device A and Device E.
Related • Example: Configuring a Basic Set of Static Routes for Connecting to Stub Networks
Documentation on page 10
• Example: Configuring Static Routes Between Logical Systems Within the Same Router
on page 29
Example: Configuring Static Routes Between Logical Systems Within the Same Router
This example shows how to configure static routes between logical systems. The logical
systems are configured in a single physical router and are connected by logical tunnel
interfaces.
• Requirements on page 29
• Overview on page 29
• Configuration on page 30
• Verification on page 33
Requirements
You must connect the logical systems by using logical tunnel (lt) interfaces. See Example:
Connecting Logical Systems Within the Same Device Using Logical Tunnel Interfaces on
MX Series Routers and EX Series Switches.
Overview
A static route is a hard-coded path in the device that specifies how the route gets to a
certain subnet by using a certain path. Routers that are connected to stub networks are
often configured to use static routes. A stub network is a network with no knowledge of
other networks. Stub networks send non-local traffic by way of a single path, with the
network aware only of a default route to non-local destinations. In this example, you
configure Logical System LS1 with a static route to the 10.10.10.0/30 network and define
the next-hop address as 192.168.10.2. You also configure Logical System LS1 with a static
route to the 192.168.10.0/30 network and define a next-hop address of 10.10.10.1.
Router R1
g040566
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Run the show interfaces terse command to verify that the router has a logical tunnel
(lt) interface.
2. Configure the logical tunnel interface on Logical System LS1 connecting to Logical
System LS2.
[edit]
user@host# set logical-systems LS1 interfaces lt-1/2/0 unit 0 description LS1->LS2
user@host# set logical-systems LS1 interfaces lt-1/2/0 unit 0 encapsulation ethernet
user@host# set logical-systems LS1 interfaces lt-1/2/0 unit 0 peer-unit 1
user@host# set logical-systems LS1 interfaces lt-1/2/0 unit 0 family inet address
192.168.10.1/30
3. Configure the logical tunnel interface on Logical System LS2 connecting to Logical
System LS1.
[edit]
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 1 description LS2->LS1
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 1 encapsulation ethernet
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 1 peer-unit 0
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 1 family inet address
192.168.10.2/30
4. Configure the logical tunnel interface on Logical System LS2 connecting to Logical
System LS3.
[edit]
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 9 description LS2->LS3
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 9 encapsulation ethernet
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 9 peer-unit 10
user@host# set logical-systems LS2 interfaces lt-1/2/0 unit 9 family inet address
10.10.10.1/30
5. Configure the logical tunnel interface on Logical System LS3 connecting to Logical
System LS2.
[edit]
user@host# set logical-systems LS3 interfaces lt-1/2/0 unit 10 description LS3->LS2
6. Configure the static route on Logical System LS1 connecting to the 10.10.10.0/30
network.
[edit]
user@host# set logical-systems LS1 routing-options static route 10.10.10.0/30
next-hop 192.168.10.2
7. Configure the static route on Logical System LS3 connecting to the 192.168.10.0/30
network.
[edit]
user@host# set logical-systems LS3 routing-options static route 192.168.10.0/30
next-hop 10.10.10.1
[edit]
user@host# commit
Results
Confirm your configuration by issuing the show logical-systems command. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
interfaces {
lt-1/2/0 {
unit 1 {
description LS2->LS1;
encapsulation ethernet;
peer-unit 0;
family inet {
address 192.168.10.2/30;
}
}
unit 9 {
description LS2->LS3;
encapsulation ethernet;
peer-unit 10;
family inet {
address 10.10.10.1/30;
}
}
}
}
}
LS3 {
interfaces {
lt-1/2/0 {
unit 10 {
description LS3->LS2;
encapsulation ethernet;
peer-unit 9;
family inet {
address 10.10.10.2/30;
}
}
}
}
routing-options {
static {
route 192.168.10.0/30 next-hop 10.10.10.1;
}
}
}
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the static routes appear in the routing tables of Logical Systems LS1 and
LS3. Also, make sure that the logical systems can ping each other.
A static route destination address can have multiple next hops associated with it. In this
case, multiple routes are inserted into the routing table, and route selection must occur.
Because the primary criterion for route selection is the route preference, you can control
the routes that are used as the primary route for a particular destination by setting the
route preference associated with a particular next hop. The routes with a lower route
preference are always used to route traffic. When you do not set a preferred route, the
Junos OS chooses in a random fashion one of the next-hop addresses to install into the
forwarding table.
In general, the default properties assigned to a static route apply to all the next-hop
addresses configured for the static route. If, however, you want to configure two possible
next-hop addresses for a particular route and have them treated differently, you can
define one as a qualified next hop.
Qualified next hops allow you to associate one or more properties with a particular
next-hop address. You can set an overall preference for a particular static route and then
specify a different preference for the qualified next hop. For example, suppose two
next-hop addresses (10.10.10.10 and 10.10.10.7) are associated with the static route
192.168.47.5/32. A general preference is assigned to the entire static route, and then a
different preference is assigned to only the qualified next-hop address 10.10.10.7. For
example:
route 192.168.47.5/32 {
next-hop 10.10.10.10;
qualified-next-hop 10.10.10.7 {
preference 6;
}
preference 2;
}
In this example, the qualified next hop 10.10.10.7 is assigned the preference 6, and the
next-hop 10.10.10.10 is assigned the preference 2.
NOTE: The preference and metric options in the [edit route route
qualified-next-hop] hierarchy only apply to the qualified next hops. The
qualified next-hop preference and metric override the route preference and
metric for that specific qualified next hop only, similar to how the route
preference overrides the default preference and metric (for that specific
route).
Related • Example: Configuring Static Route Preferences and Qualified Next Hops to Control
Documentation Static Route Selection on page 36
Example: Configuring Static Route Preferences and Qualified Next Hops to Control
Static Route Selection
• Requirements on page 37
• Overview on page 37
• Configuration on page 37
• Verification on page 40
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
In this example, the static route 192.168.47.0/24 has two possible next hops. Because
one link has higher bandwidth, this link is the preferred path. To enforce this preference,
the qualified-next-hop statement is included in the configuration on both devices. See
Figure 6 on page 37.
Provider network
10.0.0.1
10.0.0.2
...
.1 .1
Fast Ethernet Gigabit Ethernet
192.168.2.0/24 172.16.1.0/24
.2 .2
Customer network
192.168.47.5
192.168.47.6
g041172
...
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@B# set ge-1/2/0 unit 0 description B->D
user@B# set ge-1/2/0 unit 0 family inet address 172.16.1.1/24
user@B# set fe-1/2/1 unit 2 description secondary-B->D
user@B# set fe-1/2/1 unit 2 family inet address 192.168.2.1/24
user@B# set lo0 unit 57 family inet address 10.0.0.1/32
user@B# set lo0 unit 57 family inet address 10.0.0.2/32
[edit interfaces]
user@D# set ge-1/2/0 unit 1 description D->B
user@D# set ge-1/2/0 unit 1 family inet address 172.16.1.2/24
user@D# set fe-1/2/1 unit 3 description secondary-D->B
user@D# set fe-1/2/1 unit 3 family inet address 192.168.2.2/24
user@D# set lo0 unit 2 family inet address 192.168.47.5/32
user@D# set lo0 unit 2 family inet address 192.168.47.6/32
Results Confirm your configuration by issuing the show interfaces and show routing-options
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
}
lo0 {
unit 2 {
family inet {
address 192.168.47.5/32;
address 192.168.47.6/32;
}
}
}
If you are done configuring the devices, enter commit from configuration mode on both
devices.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the static routes appear in the routing tables of Device B and Device D.
Meaning The asterisks (*) in the routing tables show the active routes. The backup routes are
listed next.
Making Sure That the Backup Route Becomes the Active Route
Purpose If the primary route becomes unusable, make sure that the backup secondary route
becomes active.
Action 1. Disable the active route by deactivating the ge-1/2/0.0 interface on Device B.
user@B# commit
Related • Understanding Static Route Preferences and Qualified Next Hops on page 35
Documentation
• Verifying the Static Route Configuration on page 63
You can control the importation of static routes into the routing and forwarding tables
in a number of ways. Primary ways include assigning one or more of the following
attributes to the route:
• retain—Keeps the route in the forwarding table after the routing process shuts down
or the device reboots.
Route Retention
By default, static routes are not retained in the forwarding table when the routing process
shuts down. When the routing process starts up again, any routes configured as static
routes must be added to the forwarding table again. To avoid this latency, routes can be
flagged as retain, so that they are kept in the forwarding table even after the routing
process shuts down. Retention ensures that the routes are always in the forwarding table,
even immediately after a system reboot.
Readvertisement Prevention
Static routes are eligible for readvertisement by other routing protocols by default. In a
stub area where you might not want to readvertise these static routes under any
circumstances, you can flag the static routes as no-readvertise.
This example shows how to prevent a static route from being readvertised into OSPF,
thereby preventing the route from appearing in the routing and forwarding tables.
• Requirements on page 43
• Overview on page 43
• Configuration on page 44
• Verification on page 48
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
This example shows how to configure a routing policy that readvertises static routes into
OSPF, with the exception of one static route that is not readvertised because it is tagged
with the no-readvertise statement.
AS 23
.2
EBGP 10.0.3.0/30
.1
B
.1 10.0.2.2/30
AS 17 .2
g041173
OSPF
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device A:
[edit interfaces]
user@B# set fe-1/2/0 unit 3 description B->A
user@B# set fe-1/2/0 unit 3 family inet address 10.0.2.1/30
user@B# set fe-1/2/1 unit 6 description B->C
user@B# set fe-1/2/1 unit 6 family inet address 10.0.3.1/30
2. Configure one or more static routes and the autonomous system (AS) number.
[edit routing-options]
user@B# set static route 0.0.0.0/0 next-hop 10.0.3.2
user@B# set static route 192.168.0.0/24 next-hop 10.0.3.2
user@B# set autonomous-system 17
This policy exports static routes from the routing table into OSPF.
4. Include the no-readvertise statement to prevent the 192.168.0.0/24 route from being
exported into OSPF.
[edit routing-options]
user@B# set static route 192.168.0.0/24 no-readvertise
The BGP configuration forms an external BGP (EBGP) peer relationship with Device
C.
The OSPF configuration forms an OSPF peer relationship with Device A and applies
the send-static routing policy.
[edit protocols]
user@B# set bgp group ext type external
user@B# set bgp group ext peer-as 23
user@B# set bgp group ext neighbor 10.0.3.2
user@B# set ospf export send-static
user@B# set ospf area 0.0.0.0 interface fe-1/2/0.3
[edit interfaces ]
user@C# set fe-1/2/0 unit 7 description B->C
user@C# set fe-1/2/0 unit 7 family inet address 10.0.3.2/30
user@C# set lo0 unit 5 family inet address 192.168.0.1/32
[edit routing-options]
user@C# set autonomous-system 23
Results Confirm your configuration by issuing the show interfaces, show policy-options, show
protocols, and show routing-options commands. If the output does not display the intended
configuration, repeat the instructions in this example to correct the configuration.
}
}
unit 7 {
description B->C;
family inet {
address 10.0.3.2/30;
}
}
}
lo0 {
unit 5 {
family inet {
address 192.168.0.1/32;
}
}
}
If you are done configuring the devices, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action 1. On Device A, run the show route protocol ospf command to make sure that the
192.168.0.0/24 route does not appear in Device A’s routing table.
3. On Device A, rerun the show route protocol ospf command to make sure that the
192.168.0.0/24 route appears in Device A’s routing table.
Related • Understanding Static Route Control in Routing and Forwarding Tables on page 42
Documentation
• Verifying the Static Route Configuration on page 63
Junos OS automatically creates and maintains several routing tables. Each routing table
is used for a specific purpose. In addition to these automatically created routing tables,
you can create your own routing tables.
Each routing table populates a portion of the forwarding table. Thus, the forwarding table
is partitioned based on routing tables. This allows for specific forwarding behavior for
each routing table. For example, for VPNs, each VPN-based routing table has its own
VPN-specific partition in the forwarding table.
It is common for the routing software to maintain unicast routes and multicast routes in
different routing tables. You also might have policy considerations that would lead you
to create separate routing tables to manage the propagation of routing information.
Creating routing tables is optional. If you do not create any, Junos OS uses its default
routing tables, which are as follows:
• inet.0—For IP version 4 (IPv4) unicast routes. This table stores interface local and
direct routes, static routes, and dynamically learned routes.
• inet.1—For the IPv4 multicast forwarding cache. This table stores the IPv4 (S,G) group
entries that are dynamically created as a result of join state information.
• inet.3—For IPv4 MPLS. This table stores the egress address of an MPLS label-swiched
path (LSP), the LSP name, and the outgoing interface name. This routing table is used
only when the local device is the ingress node to an LSP.
• inet6.0—For IP version 6 (IPv6) unicast routes. This table stores interface local and
direct routes, static routes, and dynamically learned routes.
• inet6.1—For IPv6 multicast forwarding cache. This table stores the IPv6 (S,G) group
entries that are dynamically created as a result of join state information.
Another way to create the instance-name.inet.2 table is to use the rib-group statement.
See “Example: Exporting Specific Routes from One Routing Table Into Another Routing
Table” on page 58.
NOTE: Importing inet-vpn multicast routes from the bgp.l3vpn.2 table into
the instance-name.inet.2 table does not create the instance-name.inet.2
table. The import operation works only if the instance-name.inet.2 table
already exists.
• bgp.l2vpn.0—For Layer 2 VPN routes learned from BGP. This table stores routes learned
from other provider edge (PE) routers. The Layer 2 routing information is copied into
Layer 2 VPN routing and forwarding instances (VRFs) based on target communities.
• bgp.l3vpn.0—For Layer 3 VPN routes learned from BGP. This table stores routes learned
from other PE routers. Routes in this table are copied into a Layer 3 VRF when there is
a matching route table.
• l2circuit.0—For l2circuit routes learned from LDP. Routes in this table are used to send
or receive l2circuit signaling messages.
• mpls.0—For MPLS label switching operations. This table is used when the local device
is a transit router.
• iso.0—For IS-IS routes. When you are using IS-IS to support IP routing, this table contains
only the local device’s network entity title (NET).
• Requirements on page 51
• Overview on page 51
• Configuration on page 51
• Verification on page 52
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
Creating routing tables is optional. You might have policy considerations that would lead
you to create separate routing tables to manage the propagation of routing information.
This capability is rarely used, but it is demonstrated here for completeness.
If you do not create any routing tables, Junos OS uses its default routing tables.
NOTE: If you want to add static, aggregate, generated, or martian routes only
to the default IPv4 unicast routing table (inet.0), you do not have to create
any routing tables because, by default, these routes are added to inet.0. You
can add these routes by including the static, aggregate, generate, and martians
statements.
To explicitly create a routing table, include the rib statement and child statements under
the rib statement.
The routing table name, routing-table-name, includes the protocol family, optionally
followed by a period and a number. The protocol family can be inet for the IPv4 family,
inet6 for the IPv6 family, or iso for the International Standards Organization (ISO) protocol
family. The number represents the routing instance. The first instance is 0.
This example shows how to configure a custom IPv4 routing table called inet.14. The
example also shows how to populate the routing table with a single static route.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit routing-options]
user@host# set rib inet.14 static route 10.2.0.0/16 discard
[edit]
user@host# commit
Results
Confirm your configuration by issuing the show routing-options command. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the static route appears in the custom routing table.
This example shows how to populate the routing table that is created when you configure
a virtual router.
• Requirements on page 53
• Overview on page 53
• Configuration on page 54
• Verification on page 57
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
You can install routes into more than one routing table. For example, you might want a
simple configuration that allows you to install a static route into the default routing table
inet.0, as well as a second routing table vpna.inet.0. Instead of configuring the same
static route for each routing table, you can use routing table groups to insert the route
into multiple tables. To create a routing table group, include the rib-groups statement.
This example shows how to export static routes, direct routes, and local routes from the
default IPv4 unicast routing table (inet.0) and import them into the IPv4 unicast routing
table of a virtual router called vpna (vpna.inet.0).
NOTE: To explicitly create a routing table, include the rib statement. In this
case, you do not need to use the rib statement because when you configure
a routing instance, Junos OS automatically creates the routing table
instance-nameinet.0.
In this example, Device A and Device B are directly connected to each other. Device A
also has a virtual router configured called vpna. Device A’s inet.0 routing table has direct
and local routes (also known as interface routes). These routes are imported into vpna’s
inet.0 routing table (vpna.inet.0). Device A also has a static route configured. This static
route is also imported into vpna.inet.0.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit routing-instances]
user@A# set vpna instance-type virtual-router
[edit interfaces]
user@A# set fe-1/2/0 unit 4 description A->B
user@A# set fe-1/2/0 unit 4 family inet address 10.0.2.2/30
user@A# set lo0 unit 1 family inet address 1.1.1.1/32
[edit routing-options]
user@A# set static route 192.168.1.0/24 discard
4. Include the direct and local routes in a routing table group called group1.
The interface-routes statement specifies direct and local routes to match against.
For an example of how to configure and apply a routing policy that specifies
particular routes for import and export, see “Example: Exporting Specific Routes
from One Routing Table Into Another Routing Table” on page 58.
[edit routing-options]
user@A# set interface-routes rib-group inet group1
[edit routing-options]
user@A# set static rib-group group1
The primary routing table determines the address family of the routing table group.
To configure an IPv4 group, specify inet.0 as the primary table. To configure an IPv6
group, specify inet6.0 as the primary routing table.
[edit routing-options]
user@A# set rib-groups group1 import-rib inet.0
[edit routing-options]
user@A# set rib-groups group1 import-rib vpna.inet.0
[edit routing-options]
user@A# commit
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device B:
[edit interfaces]
user@B# set fe-1/2/0 unit 3 description B->A
user@B# set fe-1/2/0 unit 3 family inet address 10.0.2.1/30
[edit]
user@B# commit
Results
Confirm your configuration by issuing the show interfaces, show routing-instances, and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
}
}
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the expected routes appear in the routing tables.
Meaning The static route and the interface routes appear in both routing tables.
Example: Exporting Specific Routes from One Routing Table Into Another Routing
Table
This example shows how to duplicate specific routes from one routing table into another
routing table within the same routing instance.
• Requirements on page 58
• Overview on page 58
• Configuration on page 58
• Verification on page 62
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
This example uses the auto-export statement and the rib-group statement to accomplish
the goal of exporting specific routes from one routing table to another.
• You can use the rib-group statement if it is necessary to import routes into tables other
than instance.inet.0. To use a RIB group with auto-export, the routing instance should
specify explicit vrf-import and vrf-export policies. The vrf-import and vrf-export policies
can be extended to contain additional terms to filter routes as needed for the RIB group.
In this example, access-internal routes are added into the vpna.inet.0 routing table. The
access-internal routes are also duplicated into the vpna.inet.2 routing table.
Configuration
• Configuring Specific Route Export Between Routing Tables on page 59
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
2. Configure the routing policy that specifies particular routes for import into vpna.inet.0
and export from vpna.inet.0.
[edit policy-options]
user@host# set community vpna-comm members target:63000:100
The vrf-import and vrf-export statements are used to apply the vpna-import and
vpna-export routing policies configured in 2.
4. Configure the RIB group, and import routes into the vpna.inet.2 routing table.
[edit routing-options]
user@host# set rib-groups rib-group-vpna-access-internal import-rib vpna.inet.2
5. Configure the auto-export statement to enable the routes to be exported from one
routing table into another.
[edit routing-options]
user@host# set auto-export family inet unicast rib-group
rib-group-vpna-access-internal
6. Configure BGP.
[edit routing-options]
user@host# set autonomous-system 63000
Results From configuration mode, confirm your configuration by entering the show interfaces,
show policy-options, show routing-options, and show routing-instances commands. If the
output does not display the intended configuration, repeat the instructions in this example
to correct the configuration.
then reject;
}
}
community vpna-comm members target:63000:100;
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly by running the show table route
vpna.inet.0 and show route table vpna.inet.2 commands.
Related
Documentation
Purpose Verify that the static routes are in the routing table and that those routes are active.
Action From the CLI, enter the show route terse command.
Sample Output
Meaning The output shows a list of the routes that are currently in the inet.0 routing table. Verify
the following information:
• Each configured static route is present. Routes are listed in ascending order by IP
address. Static routes are identified with an S in the protocol (P) column of the output.
• Each static route is active. Routes that are active show the next-hop IP address in the
Next hop column. If a route's next-hop address is unreachable, the next-hop address
is identified as Reject. These routes are not active routes, but they appear in the routing
table because the passive attribute is set.
• The preference for each static route is correct. The preference for a particular route is
listed in the Prf column of the output.
Hosting providers host multiple servers for multiple customers and want to conserve the
usage of their IP address space. Traditionally, when a hosting provider client adds new
servers, the servers are allocated a small block of IP addresses, such as a /29 block, and
the client’s servers are all located in that block of IP addresses.
In this configuration, each customer is allocated a /29 block of address space. For each
block, the network, broadcast, and gateway addresses are not available for server IP
addressing, which results in three IP addresses being used inefficiently. In addition, the
blocks consume unused IP addresses for future expansion.
Solution
This issue can be resolved by configuring the interface on the router with an address from
the reserved IPv4 prefix for shared address space (RFC 6598) and by using static routes
pointed at interfaces. IANA has recorded the allocation of an IPv4 /10 for use as shared
address space. The shared address space address range is 100.64.0.0/10.
The interface in the router gets allocated an IP address from the RFC 6598 space, so it
is not consuming publicly routable address space, and connectivity is handled with static
routes on an interface. The interface in the server is configured with a publicly routable
address, but the router interfaces are not. Network and broadcast addresses are consumed
out of the RFC 6598 space rather than the publicly routable address space.
In this configuration, each customer gets allocated individual IP addresses per server.
There is a static route that can be configured as a host route. The interface in the router
gets allocated an IP address from the RFC 6598 space, so it does not consume publicly
routable address space, and connectivity is handled with static routes out to an interface.
Configuration
The configuration would look like this for Customer A on the gateway router:
interfaces {
ge-1/0/1 {
unit 0 {
family inet {
address 100.64.0.1/30;
}
}
}
}
routing-options {
static {
route 203.0.113.10/32 {
qualified-next-hop ge-1/0/1.0;
}
route 203.0.113.11 {
qualified-next-hop ge-1/0/1.0;
}
}
}
With this configuration, no publicly routable IP addresses are wasted. It is worth noting
that when a packet is forwarded in this configuration from the router to the server of
Customer A’s server 203.0.113.10, the route is forwarded out to the interface ge-1/0/1.0
which has an IP address of 100.64.0.1.
This example shows a single host route per server, which is a 1:1 mapping. This could
equate to a large number of static host routes, if maintained. For scaling purposes, we
need to support nonhost routes in this environment. For example, if there were a Customer
C in this configuration that had eight servers, it would be much more efficient to allocate
a /29 route on the router that points out the interface on which the eight servers are
connected. If Customer C were allocated server IPs from 203.0.114.8 through 203.0.114.15
and these were connected via interface ge-1/0/2.0, this would look like:
The Connectionless Network Service (CLNS) is an ISO Layer 3 protocol that uses network
service access point (NSAP) reachability information instead of IPv4 or IPv6 prefixes.
You can configure static routes to exchange CLNS routes within a CLNS island. A CLNS
island is typically an IS-IS level 1 area that is part of a single IGP routing domain. An island
can contain more than one area. CLNS islands can be connected by VPNs.
• Requirements on page 69
• Overview on page 69
• Configuration on page 70
• Verification on page 71
Requirements
Before you begin, configure the network interfaces. See Interfaces Feature Guide for
Security Devices.
Overview
In this example, you configure static routes for CLNS. In the absence of an interior gateway
protocol (IGP) on a certain link, a routing device might need to be configured with static
routes for CLNS prefixes to be reachable by way of that link. This might be useful, for
example, at an autonomous system (AS) boundary.
When you configure static routes for CLNS, consider the following tasks:
• Specify the iso.0 routing table option to configure a primary instance CLNS static route.
• Specify the instance-name.iso.0 routing table option to configure a CLNS static route
for a particular routing instance.
• Specify the route nsap-prefix statement to configure the destination for the CLNS static
route.
• Specify the next-hop (interface-name | iso-net) statement to configure the next hop,
specified as an ISO network entity title (NET) or interface name.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
[edit]
user@host# commit
Results Confirm your configuration by issuing the show routing-options command. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
Verification
Purpose Make sure that the expected routes appear in the routing table.
47.0005.80ff.f800.0000.0108.0001.1921.6800.4212/152
*[Static/5] 00:00:25
> via t1-0/2/2.0
47.0005.80ff.f800.0000.eee0/84
*[Static/20] 00:04:01, metric 10, metric2 10
> to #75 0.12.0.34.0.56 via fe-0/0/1.0
47.0005.80ff.f800.0000.ffff.ffff/104
*[Static/5] 00:04:01, metric2 0
> via t1-0/2/2.0
The route aggregation methodology helps minimize the number of routing tables in an
IP network by consolidating selected multiple routes into a single route advertisement.
This approach is in contrast to non-aggregation routing, in which every routing table
contains a unique entry for each route. The aggregation methodology does not help
reduce the size of the routing-table on the router that does the aggregation. When you
configure an export policy that only advertises the aggregate but not the contributing
routes anymore, you then have the aggregation effect on the routers that receive updates.
An aggregate route becomes active when it has one or more contributing routes. A
contributing route is an active route that is a more specific match for the aggregate
destination. For example, for the aggregate destination 128.100.0.0/16, routes to
128.100.192.0/19 and 128.100.67.0/24 are contributing routes, but routes to 128.0.0.0./8
and 128.0.0.0/16 are not.
A route can only contribute to a single aggregate route. However, an active aggregate
route can recursively contribute to a less-specific matching aggregate route. For example,
an aggregate route to the destination 128.100.0.0/16 can contribute to an aggregate
route to 128.96.0.0/13.
When an aggregate route becomes active, it is installed in the routing table with the
following information:
• Reject next hop—If a more-specific packet does not match a more-specific route, the
packet is rejected and an ICMP unreachable message is sent to the packet’s originator.
• Preference value that results from the policy filter on the primary contributor, if a filter is
specified.
NOTE: You can configure only one aggregate route for each destination
prefix.
To configure aggregate routes in the default routing table (inet.0), include the
aggregate statement:
aggregate {
defaults {
... aggregate-options ...
}
route destination-prefix {
policy policy-name;
... aggregate-options ...
}
}
To configure aggregate routes in one of the other routing tables, or to explicitly configure
aggregate routes in the default routing table (inet.0), include the aggregate statement:
rib routing-table-name {
aggregate {
defaults {
... aggregate-options ...
}
route destination-prefix {
policy policy-name;
... aggregate-options ...
}
}
}
NOTE: You cannot configure aggregate routes for the IPv4 multicast routing
table (inet.1) nor the IPv6 multicast routing table (inet6.1).
• defaults—(Optional) Here you specify global aggregate route options. These are treated
as global defaults and apply to all the aggregate routes you configure in the aggregate
statement.
• route—Here you configure individual aggregate routes. In this part of the aggregate
statement, you optionally can configure aggregate route options. These options apply
to the individual destination only and override any options you configured in the defaults
part of the aggregate statement.
When you configure an individual aggregate route in the route part of the aggregate
statement, specify the destination of the route (in route destination-prefix) in one of the
following ways:
• default if this is the default route to the destination. This is equivalent to specifying an
IP address of 0.0.0.0/0.
After you have configured aggregate routes, you can have a protocol advertise the routes
by configuring a policy that is then exported by a routing protocol.
You can associate a routing policy when configuring an aggregate route’s destination
prefix in the routes part of the aggregate statement. Doing so provides the equivalent of
an import routing policy filter for the destination prefix. That is, each potential contributor
to an aggregate route, along with any aggregate options, is passed through the policy
filter. The policy then can accept or reject the route as a contributor to the aggregate
route and, if the contributor is accepted, the policy can modify the default preferences.
The following algorithm is used to compare two aggregate contributing routes in order
to determine which one is the primary or preferred contributor:
1. Compare the protocol’s preferences of the contributing routes. The lower the
preference, the better the route. This is similar to the comparison that is done while
determining the best route for the routing table.
2. Compare the protocol’s preferences2 of the contributing routes. The lower preference2
value is better. If only one route has preferences2, then this route is preferred.
3. The preference values are the same. Proceed with a numerical comparison of the
prefix values.
b. If the two prefixes are numerically equal, the primary contributor is the route that
has the smallest prefix length value.
4. At this point, the two routes are the same. The primary contributor does not change.
An additional next hop is available for the existing primary contributor.
A rejected contributor still can contribute to a less specific aggregate route. If you do not
specify a policy filter, all candidate routes contribute to an aggregate route.
To associate a routing policy with an aggregate route, include the policy statement when
configuring the route:
In the defaults and route parts of the aggregate statement, you can specify
aggregate-options, which define additional information about aggregate routes that is
included with the route when it is installed in the routing table. All aggregate options are
optional. Aggregate options that you specify in the defaults part of the aggregate
statement are treated as global defaults and apply to all the aggregate routes you
configure in the aggregate statement. Aggregate options that you specify in the route
part of the aggregate statement override any global aggregate options and apply to that
destination only.
To configure aggregate route options, include one or more of them in the defaults or route
part of the aggregate statement:
[edit]
routing-options {
aggregate {
(defaults | route) {
(active | passive);
as-path <as-path> <origin (egp | igp | incomplete)> <atomic-aggregate> <aggregator
as-number in-address>;
community [ community-ids ];
discard;
(brief | full);
(metric | metric2 | metric3 | metric4) metric <type type>;
(preference | preference2 | color | color2) preference <type type>;
tag metric type number;
}
}
}
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
To modify the default preference value, specify a primary preference value (preference).
You also can specify secondary preference value (preference2); and colors, which are
even finer-grained preference values (color and color2). To do this, include one or more
of the following statements:
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
32
The preference value can be a number in the range from 0 through 4,294,967,295 (2 – 1)
with a lower number indicating a more preferred route. For more information about
preference values, see Route Preferences Overview.
When you configure an individual route in the route part of the aggregate statement, or
when you configure the defaults for aggregate routes, you can specify a discard next hop.
This means that if a more specific packet does not match a more specific route, the
packet is rejected and a reject route for this destination is installed in the routing table,
but ICMP unreachable messages are not sent.
Being able to discard next hops allows you to originate a summary route, which can be
advertised through dynamic routing protocols, and allows you to discard received traffic
that does not match a more specific route than the summary route. To discard next hops,
include the discard option:
discard;
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement. community-value is the community identifier and
can be a number in the range from 0 through 65,535.
as-number:community-value
as-number is the AS number and can be a value in the range from 1 through 65,534.
You also can specify community-ids for communities as one of the following well-known
community names, which are defined in RFC 1997:
You can explicitly exclude BGP community information with an aggregate route using
the none option. Include none when configuring an individual route in the route portion
of the aggregate statement to override a community option specified in the defaults
portion of the statement.
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
as-path is the AS path to include with the route. It can include a combination of individual
AS path numbers and AS sets. Enclose sets in brackets ( [ ] ). The first AS number in the
path represents the AS immediately adjacent to the local AS. Each subsequent number
represents an AS that is progressively farther from the local AS, heading toward the origin
of the path.
NOTE: In Junos OS Release 9.1 and later, the numeric AS range is extended
to provide BGP support for 4-byte AS numbers, as defined in RFC 4893, BGP
Support for Four-octet AS Number Space. For the AS number, you can configure
a value from 1 through 4,294,967,295. All releases of Junos OS support 2-byte
AS numbers. The 2-byte AS number range is 1 through 65,535 (this is a subset
of the 4-byte range).
In Junos OS Release 9.2 and later, you can also configure a 4-byte AS number
using the AS-dot notation format of two integer values joined by a period:
<16-bit high-order value in decimal>.<16-bit low-order value in decimal>. For
example, the 4-byte AS number of 65,546 in plain-number format is
represented as 1.10 in the AS-dot notation format. You can specify a value in
the range from 0.0 through 65535.65535 in AS-dot notation format.
You also can specify the AS path using the BGP origin attribute, which indicates the origin
of the AS path information:
To attach the BGP ATOMIC_AGGREGATE path attribute to the aggregate route, specify
the atomic-aggregate option. This path attribute indicates that the local system selected
a less specific route rather than a more specific route.
To attach the BGP AGGREGATOR path attribute to the aggregate route, specify the
aggregator option. When using this option, you must specify the last AS number that
formed the aggregate route (encoded as two octets), followed by the IP address of the
BGP system that formed the aggregate route.
NOTE: Starting with Junos OS 13.2R1, a BGP route is hidden when the AS path
of an aggregate route—built from contributing routes— is more than half of
the maximum BGP packet size (4096 bytes). Such AS paths have the
OverflowASPathSize flag set for them. If you would like to leak such a BGP
route, whose AS path length can overflow, we recommend to add the AS
path statically in the default route configuration. For example:
To explicitly have all AS numbers from all contributing paths be included in the aggregate
route’s path, include the full option when configuring routes. Include this option when
configuring an individual route in the route portion of the aggregate statement to override
a retain option specified in the defaults portion of the statement.
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
Controlling Retention of Inactive Aggregate Routes in the Routing and Forwarding Tables
Static routes are only removed from the routing table if the next hop becomes
unreachable, which happens if there are no contributing routes. To have an aggregate
route remain continually installed in the routing and forwarding tables, include the passive
option when configuring the route:
Routes that have been configured to remain continually installed in the routing and
forwarding tables are marked with reject next hops when they are inactive.
To explicitly remove aggregate routes when they become inactive, include the active
option when configuring routes. Include this option when configuring an individual route
in the route portion of the aggregate statement to override a passive option specified in
the defaults portion of the statement.
13.2R1 Starting with Junos OS 13.2R1, a BGP route is hidden when the AS path of an
aggregate route—built from contributing routes— is more than half of the
maximum BGP packet size (4096 bytes).
• Requirements on page 81
• Overview on page 81
• Configuration on page 82
• Verification on page 86
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
In this example, Device R1 is connected to customer networks 10.200.1.0/24 and
10.200.2.0/24. For demonstration purposes, these routes are represented in this example
as loopback interfaces on Device R1.
Device R2 has static routes configured to reach Device R1’s customer networks. Device
R2 also has a routing policy configured to advertise all static routes to its neighbors in
autonomous system (AS) 65001.
Device R3 is in AS 65001 and receives the static routes from Device R2. When Device R3
sends information about these routes to Device ISP, the information is summarized as
a single aggregate route. The aggregate route is 10.200.0.0/16.
Device ISP injects a default route into AS 65001, and Device R3 advertises the default
route.
This example shows the configuration for all of the devices and the step-by-step
configuration on Device R3.
10.200.1.0/24
10.200.2.0/24
lo0:172.16.3.3
AS 65001
10.0.0.1/30 10.0.2.2/30
R1 R2 R3
10.0.0.2/30 10.0.2.1/30
10.0.45.2/30
AS 65003 AS 65001
lo0:172.16.2.2
10.0.45.1/30
ISP
g041179
AS 65000
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Device ISP set interfaces ge-1/2/0 unit 7 family inet address 10.0.45.1/30
set protocols bgp group ext type external
set protocols bgp group ext export advertise-default
set protocols bgp group ext peer-as 65001
set protocols bgp group ext neighbor 10.0.45.2
set policy-options policy-statement advertise-default term 1 from route-filter 0.0.0.0/0
exact
set policy-options policy-statement advertise-default term 1 then accept
set routing-options static route 0.0.0.0/0 discard
set routing-options autonomous-system 65000
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R3# set ge-1/2/0 unit 3 description R3->R2
user@R3# set ge-1/2/0 unit 3 family inet address 10.0.2.1/30
[edit routing-options]
user@R3# set autonomous-system 65001
5. Configure OSPF.
[edit routing-options]
user@R3# set aggregate route 10.200.0.0/16
The first term in this policy advertises the aggregate route. The second term prevents
more specific routes from being advertised.
8. Apply the aggregate route policy to the external BGP session with Device ISP.
9. Configure the routing policy to advertise the default route from Device ISP.
11. If you are done configuring the device, commit the configuration.
[edit]
user@R3# commit
Results
Confirm your configuration by issuing the show interfaces, show protocols, show
policy-options, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
}
group int {
type internal;
local-address 172.16.3.3;
neighbor 172.16.2.2;
}
}
ospf {
export send-default;
area 0.0.0.0 {
interface ge-1/2/0.3;
interface lo0.3 {
passive;
}
}
}
user@R3# show policy-options
policy-statement send-aggregate {
term 1 {
from protocol aggregate;
then accept;
}
term suppress-specific-routes {
from {
route-filter 10.200.0.0/16 longer;
}
then reject;
}
}
policy-statement send-default {
from {
route-filter 0.0.0.0/0 exact;
}
then accept;
}
user@R3# show routing-options
aggregate {
route 10.200.0.0/16;
}
autonomous-system 65001;
Verification
Confirm that the configuration is working properly.
Purpose Make sure that Device R3 has the specific static routes.
Meaning The output shows that Device R3 has the specific routes to the 10.200.1.0/24 and
10.200.2.0/24 networks.
Purpose Make sure that Device R3 does not send the specific static routes and only sends the
summarized aggregate route.
Meaning The output shows that Device R3 sends only the summarized route to Device ISP.
Configuring RSVP-Signaled
Point-to-Multipoint LSP
This process is illustrated in Figure 11 on page 90. Device PE1 is configured with a
point-to-multipoint LSP to Routers PE2, PE3, and PE4. When Device PE1 sends a packet
on the point-to-multipoint LSP to Routers P1 and P2, Device P1 replicates the packet and
forwards it to Routers PE2 and PE3. Device P2 sends the packet to Device PE4.
• You can add and remove branch LSPs from a main point-to-multipoint LSP without
disrupting traffic. The unaffected parts of the point-to-multipoint LSP continue to
function normally.
• You can configure a node to be both a transit and an outbound (egress) router for
different branch LSPs of the same point-to-multipoint LSP.
• You can enable link protection on a point-to-multipoint LSP. Link protection can provide
a bypass LSP for each of the branch LSPs that make up the point-to-multipoint LSP.
If any primary paths fail, traffic can be quickly switched to the bypass.
• Requirements on page 91
• Overview on page 91
• Configuration on page 92
• Verification on page 108
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
In this example, multiple routing devices serve as the transit, branch, and leaf nodes of
a single point-to-multipoint LSP. On the provider edge (PE), Device PE1 is the ingress
node. The branches go from PE1 to PE2, PE1 to PE3, and PE1 to PE4. Static unicast routes
on the ingress node (PE1) point to the egress nodes.
This example also demonstrates static routes with a next hop that is a point-to-multipoint
LSP, using the p2mp-lsp-next-hop statement. This is useful when implementing
filter-based forwarding.
Topology Diagram
P2 PE2 CE2
P4 PE4 CE4
g041174
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Device CE1 set interfaces ge-1/3/2 unit 0 family inet address 10.0.244.9/30
set interfaces ge-1/3/2 unit 0 description CE1-to-PE1
set routing-options static route 10.0.104.8/30 next-hop 10.0.244.10
set routing-options static route 10.0.134.8/30 next-hop 10.0.244.10
set routing-options static route 10.0.224.8/30 next-hop 10.0.244.10
Device CE2 set interfaces ge-1/3/3 unit 0 family inet address 10.0.224.9/30
set interfaces ge-1/3/3 unit 0 description CE2-to-PE2
set routing-options static route 10.0.244.8/30 next-hop 10.0.224.10
Device CE3 set interfaces ge-2/0/1 unit 0 family inet address 10.0.134.9/30
set interfaces ge-2/0/1 unit 0 description CE3-to-PE3
set routing-options static route 10.0.244.8/30 next-hop 10.0.134.10
Device CE4 set interfaces ge-3/1/3 unit 0 family inet address 10.0.104.10/30
set interfaces ge-3/1/3 unit 0 description CE4-to-PE4
set routing-options static route 10.0.244.8/30 next-hop 10.0.104.9
[edit interfaces]
user@PE1# set ge-2/0/2 unit 0 description PE1-to-CE1
user@PE1# set ge-2/0/2 unit 0 family inet address 10.0.244.10/30
user@PE1# set fe-2/0/10 unit 1 description PE1-to-P2
user@PE1# set fe-2/0/10 unit 1 family inet address 2.2.2.1/24
user@PE1# set fe-2/0/10 unit 1 family mpls
user@PE1# set fe-2/0/9 unit 8 description PE1-to-P3
user@PE1# set fe-2/0/9 unit 8 family inet address 6.6.6.1/24
user@PE1# set fe-2/0/9 unit 8 family mpls
user@PE1# set fe-2/0/8 unit 9 description PE1-to-P4
user@PE1# set fe-2/0/8 unit 9 family inet address 3.3.3.1/24
user@PE1# set fe-2/0/8 unit 9 family mpls
[edit protocols]
user@PE1# set rsvp interface fe-2/0/10.1
user@PE1# set rsvp interface fe-2/0/9.8
user@PE1# set rsvp interface fe-2/0/8.9
user@PE1# set rsvp interface lo0.1
user@PE1# set mpls interface fe-2/0/10.1
user@PE1# set mpls interface fe-2/0/9.8
user@PE1# set mpls interface fe-2/0/8.9
user@PE1# set mpls interface lo0.1
user@PE1# set ospf area 0.0.0.0 interface ge-2/0/2.0
user@PE1# set ospf area 0.0.0.0 interface fe-2/0/10.1
user@PE1# set ospf area 0.0.0.0 interface fe-2/0/9.8
user@PE1# set ospf area 0.0.0.0 interface fe-2/0/8.9
user@PE1# set ospf area 0.0.0.0 interface lo0.1
[edit protocols]
user@PE1# set mpls label-switched-path PE1-PE2 to 100.50.50.50
user@PE1# set mpls label-switched-path PE1-PE2 p2mp p2mp1
user@PE1# set mpls label-switched-path PE1-PE3 to 100.70.70.70
user@PE1# set mpls label-switched-path PE1-PE3 p2mp p2mp1
user@PE1# set mpls label-switched-path PE1-PE4 to 100.40.40.40
user@PE1# set mpls label-switched-path PE1-PE4 p2mp p2mp1
Link protection helps to ensure that traffic sent over a specific interface to a
neighboring router can continue to reach the router if that interface fails.
[edit protocols]
user@PE1# set mpls label-switched-path PE1-PE2 link-protection
user@PE1# set mpls label-switched-path PE1-PE3 link-protection
user@PE1# set mpls label-switched-path PE1-PE4 link-protection
[edit protocols]
user@PE1# set mpls traffic-engineering bgp-igp
This causes the ingress routes to be installed in the inet.0 routing table. By default,
MPLS performs traffic engineering for BGP only. You need to enable MPLS traffic
engineering on the ingress LSR only.
[edit protocols]
user@PE1# set ospf traffic-engineering
This causes the shortest-path first (SPF) algorithm to take into account the LSPs
configured under MPLS.
[edit routing-options]
user@PE1# set router-id 100.10.10.10
8. Configure static IP unicast routes with the point-to-multipoint LSP name as the
next hop for each route.
[edit routing-options]
user@PE1# set static route 5.5.5.0/24p2mp-lsp-next-hop p2mp1
user@PE1# set static route 7.7.7.0/24 p2mp-lsp-next-hop p2mp1
user@PE1# set static route 4.4.4.0/24 p2mp-lsp-next-hop p2mp1
[edit]
user@PE1# commit
Configuring the Transit and Egress LSRs (Devices P2, P3, P4, PE2, PE3, and PE4)
[edit]
user@P2# set interfaces fe-2/0/10 unit 2 description P2-to-PE1
user@P2# set interfaces fe-2/0/10 unit 2 family inet address 2.2.2.2/24
user@P2# set interfaces fe-2/0/10 unit 2 family mpls
user@P2# set interfaces fe-2/0/9 unit 10 description P2-to-PE2
user@P2# set interfaces fe-2/0/9 unit 10 family inet address 5.5.5.1/24
user@P2# set interfaces fe-2/0/9 unit 10 family mpls
user@P2# set interfaces lo0 unit 2 family inet address 100.20.20.20/32
[edit]
user@P2# set protocols rsvp interface fe-2/0/10.2
user@P2# set protocols rsvp interface fe-2/0/9.10
user@P2# set protocols rsvp interface lo0.2
user@P2# set protocols mpls interface fe-2/0/10.2
user@P2# set protocols mpls interface fe-2/0/9.10
user@P2# set protocols mpls interface lo0.2
user@P2# set protocols ospf area 0.0.0.0 interface fe-2/0/10.2
user@P2# set protocols ospf area 0.0.0.0 interface fe-2/0/9.10
user@P2# set protocols ospf area 0.0.0.0 interface lo0.2
[edit]
user@P2# set protocols ospf traffic-engineering
This causes the shortest-path first (SPF) algorithm to take into account the LSPs
configured under MPLS.
[edit]
user@P2# set routing-options router-id 100.20.20.20
[edit]
user@host# commit
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
unit 1 {
family inet {
address 100.10.10.10/32;
}
}
}
p2mp-lsp-next-hop p2mp1;
}
}
router-id 100.10.10.10;
unit 6 {
description P3-to-PE1;
family inet {
address 6.6.6.2/24;
}
family mpls;
}
}
fe-2/0/9 {
unit 11 {
description P3-to-PE3;
family inet {
address 7.7.7.1/24;
}
family mpls;
}
}
lo0 {
unit 6 {
family inet {
address 100.60.60.60/32;
}
}
}
}
}
fe-2/0/9 {
unit 12 {
description P4-to-PE4;
family inet {
address 4.4.4.1/24;
}
family mpls;
}
}
lo0 {
unit 3 {
family inet {
address 100.30.30.30/32;
}
}
}
}
family mpls;
}
}
lo0 {
unit 5 {
family inet {
address 100.50.50.50/32;
}
}
}
}
}
}
}
}
interface lo0.4;
}
mpls {
interface fe-2/0/10.4;
interface lo0.4;
}
ospf {
traffic-engineering;
area 0.0.0.0 {
interface ge-2/0/0.0;
interface fe-2/0/10.4;
interface lo0.4;
}
}
[edit interfaces]
user@CE1# set ge-1/3/2 unit 0 family inet address 10.0.244.9/30
user@CE1# set ge-1/3/2 unit 0 description CE1-to-PE1
2. Configure static routes from Device CE1 to the three other customer networks, with
Device PE1 as the next hop.
[edit routing-options]
user@CE1# set static route 10.0.104.8/30 next-hop 10.0.244.10
user@CE1# set static route 10.0.134.8/30 next-hop 10.0.244.10
user@CE1# set static route 10.0.224.8/30 next-hop 10.0.244.10
[edit]
user@CE1# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
[edit interfaces]
user@CE2# set ge-1/3/3 unit 0 family inet address 10.0.224.9/30
user@CE2# set ge-1/3/3 unit 0 description CE2-to-PE2
2. Configure a static route from Device CE2 to CE1, with Device PE2 as the next hop.
[edit routing-options]
user@CE2# set static route 10.0.244.8/30 next-hop 10.0.224.10
[edit]
user@CE2# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
[edit interfaces]
user@CE3# set ge-2/0/1 unit 0 family inet address 10.0.134.9/30
user@CE3# set ge-2/0/1 unit 0 description CE3-to-PE3
2. Configure a static route from Device CE3 to CE1, with Device PE3 as the next hop.
[edit routing-options]
user@CE3# set static route 10.0.244.8/30 next-hop 10.0.134.10
[edit]
user@CE3# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
[edit interfaces]
user@CE4# set ge-3/1/3 unit 0 family inet address 10.0.104.10/30
user@CE4# set ge-3/1/3 unit 0 description CE4-to-PE4
2. Configure a static route from Device CE4 to CE1, with Device PE4 as the next hop.
[edit routing-options]
[edit]
user@CE4# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
Verification
Confirm that the configuration is working properly.
Verifying Connectivity
Purpose Make sure that the devices can ping each other.
Action Run the ping command from CE1 to the interface on CE2 connecting to PE2.
Run the ping command from CE1 to the interface on CE3 connecting to PE3.
Run the ping command from CE1 to the interface on CE4 connecting to PE4.
Purpose Make sure that the ingress, transit, and egress LSRs are in the Up state.
Action Run the show mpls lsp p2mp command on all of the LSRs. Only the ingress LSR is shown
here.
Purpose Make sure that the routes are set up as expected by running the show route
forwarding-table command. Only the routes to the remote customer networks are shown
here.
• Understanding BFD for Static Routes for Faster Network Failure Detection on page 111
• Example: Configuring BFD for Static Routes for Faster Network Failure
Detection on page 116
• Understanding BFD Authentication for Static Route Security on page 122
• Example: Configuring BFD Authentication for Securing Static Routes on page 124
• Example: Enabling BFD on Qualified Next Hops in Static Routes for Route
Selection on page 130
Understanding BFD for Static Routes for Faster Network Failure Detection
The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. BFD works with a wide variety of network environments
and topologies. A pair of routing devices exchanges BFD packets. Hello packets are sent
at a specified, regular interval. A neighbor failure is detected when the routing device
stops receiving a reply after a specified interval. The BFD failure detection timers have
shorter time limits than the static route failure detection mechanisms, so they provide
faster detection.
The BFD failure detection timers can be adjusted to be faster or slower. The lower the
BFD failure detection timer value, the faster the failure detection and vice versa. For
example, the timers can adapt to a higher value if the adjacency fails (that is, the timer
detects failures more slowly). Or a neighbor can negotiate a higher value for a timer than
the configured value. The timers adapt to a higher value when a BFD session flap occurs
more than three times in a span of 15 seconds. A back-off algorithm increases the receive
(Rx) interval by two if the local BFD instance is the reason for the session flap. The
transmission (Tx) interval is increased by two if the remote BFD instance is the reason
for the session flap. You can use the clear bfd adaptation command to return BFD interval
timers to their configured values. The clear bfd adaptation command is hitless, meaning
that the command does not affect traffic flow on the routing device.
In Junos OS Release 9.1 and later, the BFD protocol is supported for IPv6 static routes.
Global unicast and link-local IPv6 addresses are supported for static routes. The BFD
protocol is not supported on multicast or anycast IPv6 addresses. For IPv6, the BFD
protocol supports only static routes and only in Junos OS Release 9.3 and later. IPv6 for
BFD is also supported for the eBGP protocol.
There are three types of BFD sessions based on the source from which BFD packets are
sent to the neighbors. Different types of BFD sessions and their descriptions are:
NOTE: Starting in Junos OS Release 16.1R1, the inline BFD sessions are
supported on integrated routing and bridging (IRB) interfaces.
To configure the BFD protocol for IPv6 static routes, include the bfd-liveness-detection
statement at the [edit routing-options rib inet6.0 static route destination-prefix] hierarchy
level.
In Junos OS Release 8.5 and later, you can configure a hold-down interval to specify how
long the BFD session must remain up before a state change notification is sent.
To specify the hold-down interval, include the holddown-interval statement in the BFD
configuration.
You can configure a number in the range from 0 through 255,000 milliseconds. The
default is 0. If the BFD session goes down and then comes back up during the hold-down
interval, the timer is restarted.
NOTE: If a single BFD session includes multiple static routes, the hold-down
interval with the highest value is used.
To specify the minimum transmit and receive intervals for failure detection, include the
minimum-interval statement in the BFD configuration.
This value represents both the minimum interval after which the local routing device
transmits hello packets and the minimum interval after which the routing device expects
to receive a reply from the neighbor with which it has established a BFD session. You can
configure a number in the range from 1 through 255,000 milliseconds. Optionally, instead
of using this statement, you can configure the minimum transmit and receive intervals
separately using the transmit-interval minimum-interval and minimum-receive-interval
statements.
To specify the minimum receive interval for failure detection, include the
minimum-receive-interval statement in the BFD configuration. This value represents the
minimum interval after which the routing device expects to receive a reply from a neighbor
with which it has established a BFD session. You can configure a number in the range
from 1 through 255,000 milliseconds. Optionally, instead of using this statement, you
can configure the minimum receive interval using the minimum-interval statement at the
[edit routing-options static route destination-prefix bfd-liveness-detection] hierarchy level.
To specify the number of hello packets not received by the neighbor that causes the
originating interface to be declared down, include the multiplier statement in the BFD
configuration.
The default value is 3. You can configure a number in the range from 1 through 255.
To specify a threshold for detecting the adaptation of the detection time, include the
threshold statement in the BFD configuration.
When the BFD session detection time adapts to a value equal to or higher than the
threshold, a single trap and a system log message are sent. The detection time is based
on the multiplier of the minimum-interval or the minimum-receive-interval value. The
threshold must be a higher value than the multiplier for either of these configured values.
For example if the minimum-receive-interval is 300 ms and the multiplier is 3, the total
detection time is 900 ms. Therefore, the detection time threshold must have a value
higher than 900.
To specify the minimum transmit interval for failure detection, include the transmit-interval
minimum-interval statement in the BFD configuration.
This value represents the minimum interval after which the local routing device transmits
hello packets to the neighbor with which it has established a BFD session. You can
configure a value in the range from 1 through 255,000 milliseconds. Optionally, instead
of using this statement, you can configure the minimum transmit interval using the
minimum-interval statement at the [edit routing-options static route destination-prefix
bfd-liveness-detection] hierarchy level.
To specify the threshold for the adaptation of the transmit interval, include the
transmit-interval threshold statement in the BFD configuration.
The threshold value must be greater than the transmit interval. When the BFD session
transmit time adapts to a value greater than the threshold, a single trap and a system
log message are sent. The detection time is based on the multiplier of the value for the
minimum-interval or the minimum-receive-interval statement at the [edit routing-options
static route destination-prefix bfd-liveness-detection] hierarchy level. The threshold must
be a higher value than the multiplier for either of these configured values.
To specify the BFD version, include the version statement in the BFD configuration. The
default is to have the version detected automatically.
To include an IP address for the next hop of the BFD session, include the neighbor
statement in the BFD configuration.
NOTE: You must configure the neighbor statement if the next hop specified
is an interface name. If you specify an IP address as the next hop, that address
is used as the neighbor address for the BFD session.
In Junos OS Release 9.0 and later, you can configure BFD sessions not to adapt to
changing network conditions.
To disable BFD adaptation, include the no-adaptation statement in the BFD configuration.
NOTE: If BFD is configured only on one end of a static route, the route is
removed from the routing table. BFD establishes a session when BFD is
configured on both ends of the static route.
BFD is not supported on ISO address families in static routes. BFD does
support IS-IS.
If you configure graceful Routing Engine switchover (GRES) at the same time
as BFD, GRES does not preserve the BFD state information during a failover.
16.1R1 Starting in Junos OS Release 16.1R1, the inline BFD sessions are supported on
integrated routing and bridging (IRB) interfaces.
15.1X49-D70 Starting with Junos OS Release 15.1X49-D70 and Junos OS Release 17.3R1, the
bfd-liveness-detection command includes the description field. The
description is an attribute under the bfd-liveness-detection object and it is
supported only on SRX Series devices. This field is applicable only for the static
routes.
15.1F6 Inline BFD is supported on PTX3000 routers with third-generation FPCs starting
in Junos OS Release 15.1F6 and 16.1R2.
15.1F3 Inline BFD is supported on PTX5000 routers with third-generation FPCs starting
in Junos OS Release 15.1F3 and 16.1R2.
13.3 Starting in Junos OS Release 13.3, inline BFD is supported only on static MX
Series routers with MPCs/MICs that have configured enhanced-ip.
• Example: Enabling BFD on Qualified Next Hops in Static Routes for Route Selection
on page 130
Example: Configuring BFD for Static Routes for Faster Network Failure Detection
This example shows how to configure Bidirectional Forwarding Detection (BFD) for static
routes.
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
There are many practical applications for static routes. Static routing is often used at the
network edge to support attachment to stub networks, which, given their single point of
entry and egress, are well suited to the simplicity of a static route. In Junos OS, static
routes have a global preference of 5. Static routes are activated if the specified next hop
is reachable.
In this example, you configure the static route 192.168.47.0/24 from the provider network
to the customer network, using the next-hop address of 172.16.1.2. You also configure a
static default route of 0.0.0.0/0 from the customer network to the provider network,
using a next-hop address of 172.16.1.1.
For demonstration purposes, some loopback interfaces are configured on Device B and
Device D. These loopback interfaces provide addresses to ping and thus verify that the
static routes are working.
Provider network
10.0.0.1
10.0.0.2
...
.1
172.16.1.0/24
.2
Customer network
192.168.47.5
192.168.47.6
... g041171
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@B# set ge-1/2/0 unit 0 description B->D
user@B# set ge-1/2/0 unit 0 family inet address 172.16.1.1/24
user@B# set lo0 unit 57 family inet address 10.0.0.1/32
user@B# set lo0 unit 57 family inet address 10.0.0.2/32
[edit routing-options]
user@B# set static route 192.168.47.0/24 next-hop 172.16.1.2
[edit routing-options]
user@B# set static route 192.168.47.0/24 bfd-liveness-detection minimum-interval
1000
set routing-options static route 192.168.47.0/24 bfd-liveness-detection description
Site-xxx
[edit protocols]
user@B# set bfd traceoptions file bfd-trace
user@B# set bfd traceoptions flag all
[edit]
user@B# commit
[edit interfaces]
user@D# set ge-1/2/0 unit 1 description D->B
user@D# set ge-1/2/0 unit 1 family inet address 172.16.1.2/24
user@D# set lo0 unit 2 family inet address 192.168.47.5/32
user@D# set lo0 unit 2 family inet address 192.168.47.6/32
[edit routing-options]
user@D# set static route 0.0.0.0/0 next-hop 172.16.1.1
[edit routing-options]
[edit protocols]
user@D# set bfd traceoptions file bfd-trace
user@D# set bfd traceoptions flag all
[edit]
user@D# commit
Results
Confirm your configuration by issuing the show interfaces, show protocols, and show
routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
}
}
Verification
Confirm that the configuration is working properly.
Purpose Verify that the BFD sessions are up, and view details about the BFD sessions.
Action From operational mode, enter the show bfd session extensive command.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
NOTE: The description Site- <xxx> is supported only on the SRX Series
devices.
If each client has more than one description field, then it displays "and more"
along with the first description field.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning The TX interval 1.000, RX interval 1.000 output represents the setting configured with the
minimum-interval statement. All of the other output represents the default settings for
BFD. To modify the default settings, include the optional statements under the
bfd-liveness-detection statement.
Purpose View the contents of the BFD trace file to assist in troubleshooting, if needed.
Action From operational mode, enter the file show /var/log/bfd-trace command.
Related • Understanding BFD for Static Routes for Faster Network Failure Detection on page 111
Documentation
Beginning with Junos OS Release 9.6, Junos OS supports authentication for BFD sessions
running over IPv4 and IPv6 static routes. BFD authentication is not supported on MPLS
OAM sessions. BFD authentication is only supported in the Canada and United States
version of the Junos OS image and is not available in the export version.
• keyed-md5—Keyed Message Digest 5 hash algorithm for sessions with transmit and
receive intervals greater than 100 ms. To authenticate the BFD session, keyed MD5
uses one or more secret keys (generated by the algorithm) and a sequence number
that is updated periodically. With this method, packets are accepted at the receiving
end of the session if one of the keys matches and the sequence number is greater than
or equal to the last sequence number received. Although more secure than a simple
password, this method is vulnerable to replay attacks. Increasing the rate at which the
sequence number is updated can reduce this risk.
• keyed-sha-1—Keyed Secure Hash Algorithm I for sessions with transmit and receive
intervals greater than 100 ms. To authenticate the BFD session, keyed SHA uses one
or more secret keys (generated by the algorithm) and a sequence number that is
updated periodically. The key is not carried within the packets. With this method,
packets are accepted at the receiving end of the session if one of the keys matches
and the sequence number is greater than the last sequence number received.
The authentication keychain contains one or more keychains. Each keychain contains
one or more keys. Each key holds the secret data and the time at which the key becomes
valid. The algorithm and keychain must be configured on both ends of the BFD session,
and they must match. Any mismatch in configuration prevents the BFD session from
being created.
BFD allows multiple clients per session, and each client can have its own keychain and
algorithm defined. To avoid confusion, we recommend specifying only one security
authentication keychain.
Related • Example: Configuring BFD Authentication for Securing Static Routes on page 124
Documentation
Requirements
Junos OS Release 9.6 or later (Canda and United States version).
BFD authentication is only supported in the Canada and United States version of the
Junos OS image and is not available in the export version.
Overview
You can configure authentication for BFD sessions running over IPv4 and IPv6 static
routes. Routing instances and logical systems are also supported.
[edit]
user@host> set routing-options static route ipv4 bfd-liveness-detection
authentication loose-check
Provider network
10.0.0.1
10.0.0.2
...
.1
172.16.1.0/24
.2
Customer network
192.168.47.5
192.168.47.6
g041171
...
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@B# set ge-1/2/0 unit 0 description B->D
user@B# set ge-1/2/0 unit 0 family inet address 172.16.1.1/24
[edit routing-options]
user@B# set static route 192.168.47.0/24 next-hop 172.16.1.2
[edit routing-options]
user@B# set static route 192.168.47.0/24 bfd-liveness-detection minimum-interval
1000
set routing-options static route 192.168.47.0/24 bfd-liveness-detection description
Site-xxx
[edit routing-options]
user@B# set static route 192.168.47.0/24 bfd-liveness-detection authentication
algorithm keyed-sha-1
This should match the keychain name configured at the [edit security authentication
key-chains] hierarchy level.
[edit routing-options]
user@B# set static route 192.168.47.0/24 bfd-liveness-detection authentication
key-chain bfd-kc4
6. On Device B, specify the unique security authentication information for BFD sessions:
• At least one key, a unique integer between 0 and 63. Creating multiple keys allows
multiple clients to use the BFD session.
• The time at which the authentication key becomes active, in the format
yyyy-mm-dd.hh:mm:ss.
[edit]
user@B# commit
The algorithm and keychain must be configured on both ends of the BFD session,
and they must match. Any mismatch in configuration prevents the BFD session
from being created.
Results
Confirm your configuration by issuing the show interfaces, show routing-options, and show
security commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
ge-1/2/0 {
unit 0 {
description B->D;
family inet {
address 172.16.1.1/24;
}
}
}
lo0 {
unit 57 {
family inet {
address 10.0.0.1/32;
address 10.0.0.2/32;
}
}
}
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show bfd session command.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning The command output shows that the BFD session is up.
Purpose View details about the BFD sessions and make sure that authentication is configured.
Action From operational mode, enter the show bfd session detail command.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning In the command output, Authenticate is displayed to indicate that BFD authentication is
configured.
Action From operational mode, enter the show bfd session extensive command.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning In the command output, Authenticate is displayed to indicate that BFD authentication is
configured. The output for the extensive command provides the keychain name, the
authentication algorithm, and the mode for each client in the session.
NOTE: The description Site- <xxx> is supported only on the SRX Series
devices.
If each client has more than one description field, then it displays "and more"
along with the first description field.
Related • Understanding BFD Authentication for Static Route Security on page 122
Documentation
Example: Enabling BFD on Qualified Next Hops in Static Routes for Route Selection
This example shows how to configure a static route with multiple possible next hops.
Each next hop has Bidirectional Forwarding Detection (BFD) enabled.
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
In this example, Device B has the static route 192.168.47.0/24 with two possible next
hops. The two next hops are defined using two qualified-next-hop statements. Each next
hop has BFD enabled.
BFD is also enabled on Device D because BFD must be enabled on both ends of the
connection.
A next hop is included in the routing table if the BFD session is up. The next hop is removed
from the routing table if the BFD session is down.
Provider network
10.0.0.1
10.0.0.2
...
.1 .1
Fast Ethernet Gigabit Ethernet
192.168.2.0/24 172.16.1.0/24
.2 .2
Customer network
192.168.47.5
192.168.47.6
g041172
...
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure a static route with two possible next hops, both with BFD enabled:
2. On Device B, configure the static route with two next hops, both with BFD enabled.
4. On Device D, configure a BFD-enabled default static route with two next hops to
the provider network.
In this case, BFD is enabled on the route, not on the next hops.
Results Confirm your configuration by issuing the show interfaces and show routing-options
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
address 192.168.2.1/24;
}
}
}
ge-1/2/0 {
unit 0 {
description B->D;
family inet {
address 172.16.1.1/24;
}
}
}
If you are done configuring the devices, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the static route appears in the routing table on Device B with two possible
next hops.
Meaning Both next hops are listed. The next hop 192.168.2.2 is the selected route.
Detect Transmit
Address State Interface Time Interval Multiplier
172.16.1.2 Up ge-1/2/0.0 0.720 0.240 3
192.168.2.2 Up fe-0/1/0.2 0.720 0.240 3
2 sessions, 2 clients
Cumulative transmit rate 8.3 pps, cumulative receive rate 8.3 pps
Meaning The output shows that the BFD sessions are up.
Purpose Demonstrate what happens when the BFD session is down for both next hops.
Detect Transmit
Address State Interface Time Interval Multiplier
172.16.1.2 Down ge-1/2/0.0 3.000 1.000 3
192.168.2.2 Down fe-0/1/0.2 3.000 1.000 3
2 sessions, 2 clients
Cumulative transmit rate 2.0 pps, cumulative receive rate 2.0 pps
Meaning As expected, when the BFD sessions are down, the static route is removed from the
routing table.
Purpose Demonstrate what happens when only one next hop has BFD enabled.
Detect Transmit
Address State Interface Time Interval Multiplier
192.168.2.2 Down fe-0/1/0.2 3.000 1.000 3
Meaning As expected, the BFD session is down for the 192.168.2.2 next hop. The 172.16.1.2 next hop
remains in the routing table, and the route remains active, because BFD is not a condition
for this next hop to remain valid.
Related • Example: Configuring Static Route Preferences and Qualified Next Hops to Control
Documentation Static Route Selection on page 36
• Understanding BFD for Static Routes for Faster Network Failure Detection on page 111
• Understanding the Default Routing Table Groups for Interface Routes on Packet
Transport Routers on page 137
• Understanding Indirect Next Hops on page 138
• Example: Optimizing Route Reconvergence by Enabling Indirect Next Hops on the
Packet Forwarding Engine on page 139
• Understanding Unicast Reverse Path Forwarding on page 149
• Example: Configuring Unicast Reverse-Path-Forwarding Check on page 150
Understanding the Default Routing Table Groups for Interface Routes on Packet
Transport Routers
On PTX Series Packet Transport Routers, the default interface-route routing table groups
differ from that of other Junos OS routing devices.
The PTX Series routers are MPLS transit platforms that do IP forwarding, typically using
interior gateway protocol (IGP) routes. Interface routes are directly connected and local
routes.
PTX Series routers are unlike other Junos OS routing devices in that they force an indirect
next-hop resolution. PTX Series routers need the indirect next hop be resolved to create
the chained composite next hop. This can cause routes to be hidden when the next-hop
type is unusable.
To prevent routes from being hidden, PTX Series platforms automatically copy the routes
in inet.0 into inet.2 and inet.3, and the routes in inet6.0 into inet6.2 and inet6.3.
The default interface routing table configuration on the PTX Series routers is as follows:
rib-group {
##
## 'junos-ifrg-inet0-to-inet2-and-inet3' was inherited from group 'junos-defaults'
##
inet junos-ifrg-inet0-to-inet2-and-inet3;
##
## 'junos-ifrg-inet60-to-inet62-and-inet63' was inherited from group 'junos-defaults'
##
inet6 junos-ifrg-inet60-to-inet62-and-inet63;
}
}
rib-groups {
##
## 'junos-ifrg-inet0-to-inet2-and-inet3' was inherited from group 'junos-defaults'
##
junos-ifrg-inet0-to-inet2-and-inet3 {
##
## 'inet.0' was inherited from group 'junos-defaults'
## 'inet.2' was inherited from group 'junos-defaults'
## 'inet.3' was inherited from group 'junos-defaults'
##
import-rib [ inet.0 inet.2 inet.3 ];
}
##
## 'junos-ifrg-inet60-to-inet62-and-inet63' was inherited from group 'junos-defaults'
##
junos-ifrg-inet60-to-inet62-and-inet63 {
##
## 'inet6.0' was inherited from group 'junos-defaults'
## 'inet6.2' was inherited from group 'junos-defaults'
## 'inet6.3' was inherited from group 'junos-defaults'
##
import-rib [ inet6.0 inet6.2 inet6.3 ];
}
}
Related • Chained Composite Next Hops for Transit Devices for VPNs
Documentation
• Example: Overriding the Default BGP Routing Policy on PTX Series Packet Transport
Routers
Junos OS supports the concept of an indirect next hop for all routing protocols that
support indirectly connected next hops, also known as third-party next hops.
Because routing protocols such as internal BGP (IBGP) can send routing information
about indirectly connected routes, Junos OS relies on routes from intra-AS routing
protocols (OSPF, IS-IS, RIP, and static) to resolve the best directly connected next hop.
The Routing Engine performs route resolution to determine the best directly connected
next hop and installs the route to the Packet Forwarding Engine.
By default, Junos OS does not maintain the route for indirect next hop to forwarding
next-hop binding on the Packet Forwarding Engine forwarding table. As a result, when
a rerouting event occurs, potentially thousands of route to forwarding next-hop bindings
must be updated, which increases the route convergence time. Figure 16 on page 139
illustrates the route to forwarding next-hop bindings with indirect next hop disabled.
You can enable Junos OS to maintain the indirect next hop to forwarding next-hop binding
on the Packet Forwarding Engine forwarding table. As a result, fewer route to forwarding
next-hop bindings need to be updated, which improves the route convergence time.
Figure 17 on page 139 illustrates the route to forwarding next-hop bindings with indirect
next hop enabled.
Related • Example: Optimizing Route Reconvergence by Enabling Indirect Next Hops on the
Documentation Packet Forwarding Engine on page 139
This example shows how to use indirect next hops to promote faster network convergence
(for example, in BGP networks) by decreasing the number of forwarding table changes
required when a change in the network topology occurs.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
In this example, several devices are connected over unequal-cost paths. From Device R1
to Device R2, the path through Device R3 has a higher IGP metric than the path through
Device R4. Device R1 has an internal BGP connection to Device R2. Device R0 injects
multiple routes into the network, and Device R1 advertises those routes to Device R2.
Because Device R2 is not directly connected to Device R1, Device R2’s forwarding table
contains indirect next hops. An interior gateway protocol, in this case OSPF, is running
on the internal links among Devices R1, R2, R3, and R4. Each router is advertising its
loopback interface IPv4 address.
On Device R2, the indirect-next-hop statement enables Junos OS to maintain the indirect
next hop to forwarding next-hop binding on the Packet Forwarding Engine forwarding
table. As a result, fewer route to forwarding next-hop bindings need to be updated, which
improves the route convergence time if a path fails.
R3
R0 R1 R2 R5
R4
g041189
The “CLI Quick Configuration” on page 140 section shows the full configuration on all of
the devices in Figure 18 on page 140. Otherwise, the example focuses on Device R0, Device
R1, and Device R2.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Configuring Device R0
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Configure the interfaces, including multiple routes that can be injected into the
network for demonstration purposes.
[edit interfaces]
user@R0# set fe-1/2/0 unit 1 family inet address 10.0.0.1/30
[edit routing-options]
user@R0# set static route 0.0.0.0/0 next-hop 10.0.0.2
[edit]
user@R0# commit
Configuring Device R1
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Configure the interfaces, including multiple routes that can be injected into the
network for demonstration purposes.
[edit interfaces]
user@R1# set fe-1/2/0 unit 2 family inet address 10.0.0.2/30
user@R1# set fe-1/2/1 unit 5 family inet address 10.0.0.5/30
user@R1# set fe-1/2/2 unit 9 family inet address 10.0.0.9/30
2. Configure BGP.
[edit protocols]
user@R1# set bgp export send-local
user@R1# set bgp export send-static
user@R1# set bgp group int type internal
user@R1# set bgp group int local-address 1.1.1.1
user@R1# set bgp group int neighbor 2.2.2.2
3. Configure OSPF.
[edit protocols]
user@R1# set ospf area 0.0.0.0 interface fe-1/2/1.5
user@R1# set ospf area 0.0.0.0 interface fe-1/2/2.9
user@R1# set ospf area 0.0.0.0 interface lo0.2
[edit]
user@R1# set policy-options policy-statement send-local from protocol local
user@R1# set policy-options policy-statement send-local from protocol direct
user@R1# set policy-options policy-statement send-local then accept
5. Configure a set of static routes to the set of interfaces configured on Device R0.
[edit]
user@R1# set routing-options static route 1.1.0.2/32 next-hop 10.0.0.1
user@R1# set routing-options static route 1.1.0.1/32 next-hop 10.0.0.1
user@R1# set routing-options static route 1.1.0.3/32 next-hop 10.0.0.1
user@R1# set routing-options static route 1.1.0.4/32 next-hop 10.0.0.1
user@R1# set routing-options static route 1.1.0.5/32 next-hop 10.0.0.1
user@R1# set routing-options static route 1.1.0.6/32 next-hop 10.0.0.1
[edit]
user@R1# set routing-options autonomous-system 65500
[edit]
user@R1# commit
Configuring Device R2
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Configure the interfaces, including multiple routes that can be injected into the
network for demonstration purposes.
[edit interfaces]
user@R2# set fe-1/2/0 unit 14 family inet address 10.0.0.14/30
user@R2# set fe-1/2/1 unit 18 family inet address 10.0.0.18/30
user@R2# set fe-1/2/2 unit 21 family inet address 10.0.0.21/30;
2. Configure BGP.
[edit]
user@R2# set protocols bgp export send-local
user@R2# set protocols bgp group int type internal
user@R2# set protocols bgp group int local-address 2.2.2.2
user@R2# set protocols bgp group int family inet unicast
user@R2# set protocols bgp group int family inet-vpn unicast
user@R2# set protocols bgp group int neighbor 1.1.1.1
3. Configure OSPF.
[edit]
user@R2# set protocols ospf area 0.0.0.0 interface fe-1/2/0.14
user@R2# set protocols ospf area 0.0.0.0 interface fe-1/2/1.18
user@R2# set protocols ospf area 0.0.0.0 interface lo0.3
[edit]
[edit]
user@R2# set routing-options autonomous-system 65500
[edit]
user@R2# set routing-options forwarding-table indirect-next-hop
[edit]
user@R2# commit
Results
Confirm your configuration by issuing the show interfaces, show protocols, show
policy-options, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
}
neighbor 1.1.1.1;
}
}
ospf {
area 0.0.0.0 {
interface fe-1/2/0.14;
interface fe-1/2/1.18;
interface lo0.3;
}
}
Configure Device R3, Device R4, and Device R5, as shown in “CLI Quick Configuration” on
page 140.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that Device R2 is configured to maintain the indirect next hop to forwarding
next-hop binding on the Packet Forwarding Engine forwarding table.
Meaning The 0x3 flag in the output indicates that Device R2 is configured to maintain the indirect
next hop to forwarding next-hop binding on the Packet Forwarding Engine forwarding
table. When the indirect-next-hop statement is deleted or deactivated from the
configuration, this flag changes to 0x2. Junos MX series routers with Trio Modular Port
Concentrator (MPC) chipset supports indirect-next-hop by default and can not be
disabled. Thus, even if indirect-next-hop is not configured under forwarding-options, the
feature will work by default. Thus, 0x3 flag is not applicable for Trio Modular Port
Concentrator (MPCs).
the destination. If the packet is from a valid path, the router or switch forwards the packet
to the destination address. If it is not from a valid path, the router or switch discards the
packet. Unicast RPF is supported for the IPv4 and IPv6 protocol families, as well as for
the virtual private network (VPN) address family.
Unicast reverse path forwarding (RPF) helps protect against DoS and DDoS attacks by
verifying the unicast source address of each packet that arrives on an ingress interface
where unicast RPF is enabled.
This example shows how to help defend ingress interfaces against denial-of-service
(DoS) and distributed denial-of-service (DDoS) attacks by configuring unicast RPF to
filter incoming traffic.
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
Large amounts of unauthorized traffic such as attempts to flood a network with fake
(bogus) service requests in a DoS attack can consume network resources and deny
service to legitimate users. One way to help prevent DoS and DDoS attacks is to verify
that incoming traffic originates from legitimate network sources.
Unicast RPF helps ensure that a traffic source is legitimate (authorized) by comparing
the source address of each packet that arrives on an interface to the forwarding table
entry for its source address. If the device uses the same interface that the packet arrived
on to reply to the packet's source, this verifies that the packet originated from an
authorized source, and the device forwards the packet. If the device does not use the
same interface that the packet arrived on to reply to the packet's source, the packet
might have originated from an unauthorized source, and the device discards the packet.
In this example, Device B has unicast RPF configured. Device A is using OSPF to advertise
a prefix for the link that connects to Device D. OSPF is enabled on the links between
Device B and Device C and the links between Device A and Device C, but not on the links
between Device A and Device B. Therefore, Device B learns about the route to Device D
through Device C.
This example also includes a fail filter. When a packet fails the unicast RPF check, the
fail filter is evaluated to determine if the packet should be accepted anyway. The fail
filter in this example allows Device B’s interfaces to accept Dynamic Host Configuration
Protocol (DHCP) packets. The filter accepts all packets with a source address of 0.0.0.0
and a destination address of 255.255.255.255.
D E
10.0.0.18 10.0.0.22
10.0.0.17 10.0.0.21
10.0.0.1 10.0.0.2 10.0.0.9 10.0.0.10
A B C
10.0.0.5 10.0.0.6 10.0.0.13 10.0.0.14
10.0.0.29 10.0.0.25 10.0.0.26 10.0.0.30
g041186
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Device B set interfaces fe-1/2/0 unit 2 family inet rpf-check fail-filter rpf-special-case-dhcp
set interfaces fe-1/2/0 unit 2 family inet address 10.0.0.2/30
set interfaces fe-1/1/1 unit 6 family inet rpf-check fail-filter rpf-special-case-dhcp
set interfaces fe-1/1/1 unit 6 family inet address 10.0.0.6/30
Configuring Device A
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.
To configure Device A:
[edit interfaces]
user@A# set fe-1/2/0 unit 1 family inet address 10.0.0.1/30
2. Configure OSPF.
[edit]
user@A# commit
Configuring Device B
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.
To configure Device B:
[edit interfaces]
user@B# set fe-1/2/0 unit 2 family inet address 10.0.0.2/30
2. Configure OSPF.
[edit interfaces]
user@B# set fe-1/2/0 unit 2 family inet rpf-check fail-filter rpf-special-case-dhcp
4. (Optional) Configure the fail filter that gets evaluated if a packet fails the RPF check.
[edit]
user@B# commit
Results
Confirm your configuration by issuing the show firewall, show interfaces, show protocols,
show routing-options, and show policy-options commands. If the output does not display
the intended configuration, repeat the instructions in this example to correct the
configuration.
fe-0/1/1 {
unit 25 {
family inet {
address 10.0.0.25/30;
}
}
}
fe-1/1/1 {
unit 29 {
family inet {
address 10.0.0.29/30;
}
}
}
}
}
}
user@B# show interfaces
fe-1/2/0 {
unit 2 {
family inet {
rpf-check fail-filter rpf-special-case-dhcp;
address 10.0.0.2/30;
}
}
}
fe-1/1/1 {
unit 6 {
family inet {
rpf-check fail-filter rpf-special-case-dhcp;
address 10.0.0.6/30;
}
}
}
fe-0/1/1 {
unit 9 {
family inet {
rpf-check fail-filter rpf-special-case-dhcp;
address 10.0.0.9/30;
}
}
}
fe-0/1/0 {
unit 13 {
family inet {
rpf-check fail-filter rpf-special-case-dhcp;
address 10.0.0.13/30;
}
}
}
Enter the configurations on Device C, Device D, and Device E, as shown in “CLI Quick
Configuration” on page 151.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that the interfaces on Device B have unicast RPF enabled.
Meaning The uRPF flag confirms that unicast RPF is enabled on this interface.
Purpose Use the ping command to make sure that Device B blocks traffic from unexpected source
addresses.
Action From Device A, ping Device B’s interfaces, using 10.0.0.17 as the source address.
Purpose Use the ping command to make sure that Device B does not block traffic when the RPF
check is deactivated.
Martian addresses are host or network addresses about which all routing information is
ignored. When received by the routing device, these routes are ignored. They commonly
are sent by improperly configured systems on the network and have destination addresses
that are obviously invalid.
In IPv6, the loopback address and the multicast resolve and discard routes are the default
martian addresses.
In Junos OS Release 10.4R5 and later, the reserved IPv6 multicast address space (ff00::/8
and ff02::/16) is added to the list of martian addresses.
In Junos OS Release 9.6 and later, you can configure Class E addresses on interfaces.
Class E addresses are treated like any other unicast address for the purpose of forwarding.
To allow Class E addresses to be configured on interfaces, you must remove the Class
E prefix from the list of martian addresses. To remove the Class E prefix from the list of
martian addresses include the martians 240/4 orlonger allow statement at the [edit
routing-options] hierarchy level.
To view the default and configured martian routes, run the show route martians command.
inet.0:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
inet.1:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
inet.2:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
inet.3:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
inet6.1:
::1/128 exact -- disallowed
inet6.2:
::1/128 exact -- disallowed
ff00::/8 exact -- disallowed
ff02::/16 exact -- disallowed
inet6.3:
::1/128 exact -- disallowed
ff00::/8 exact -- disallowed
ff02::/16 exact -- disallowed
Related • Example: Configuring Class E Martian Addresses for Routing on page 160
Documentation
This example shows how to remove the Class E prefix from the list of martian addresses.
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
In this example, Junos OS defaults are modified to allow the 240.0.0.0/4 address block.
This block of addresses is known as the experimental Class E addresses. In Junos OS
Release 9.6 and later, you can configure Class E addresses on interfaces and use them
for forwarding traffic. However, to do this, you must first allow routing on this address
block.
This example also shows how to modify the martian addresses in the IPv6 routing table,
inet6.0.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit routing-options]
user@host# set martians 240.0.0.0/4 orlonger allow
2. Allow Class E addresses in the routing table that is used for the IPv4 multicast
forwarding cache.
[edit routing-options]
user@host# set rib inet.1 martians 240.0.0.0/4 orlonger allow
3. Allow Class E addresses in the routing table that is used for multicast reverse path
forwarding (RPF) lookup.
[edit routing-options]
user@host# set rib inet.2 martians 240.0.0.0/4 orlonger allow
4. Allow Class E addresses in the routing table that stores MPLS LSP information.
[edit routing-options]
user@host# set rib inet.3 martians 240.0.0.0/4 orlonger allow
[edit routing-options]
user@host# set rib inet6.0 martians fd00::/8 orlonger
[edit]
user@host# commit
Results
Confirm your configuration by issuing the show routing-options command. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
Verification
Confirm that the configuration is working properly.
• Verifying That the 240.0.0.0/4 Routes Are Now Accepted on page 163
• Verifying That the fd00::/8 Routes Are Now Rejected on page 163
Purpose Make sure that the 240.0.0.0/4 route appears in the routing tables as allowed.
inet.1:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- allowed
inet.2:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- allowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
inet.3:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- allowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
Purpose Make sure that the fd00::/8 route appears in the IPv6 unicast routing table as disallowed.
Troubleshooting
• Troubleshooting Network Issues on page 167
• Debugging and Trace Operations on page 177
Problem Description: This checklist provides links to troubleshooting basics, an example network,
and includes a summary of the commands you might use to diagnose problems with the
router and network.
2. Isolating the Causes of a Network Problem on page 170 show < configuration | interfaces | protocols | route >
4. Evaluating the Solution to Check Whether the Network Problem show route (ip-address | hostname)
Is Resolved on page 172 ping (ip-address | hostname) count 3
traceroute (ip-address | hostname)
By applying the standard four-step process illustrated in Figure 20 on page 168, you can
isolate a failed node in the network. Note that the functionality described in this section
is not supported in versions 15.1X49, 15.1X49-D30, or 15.1X49-D40.
Before you embark on the four-step process, however, it is important that you are prepared
for the inevitable problems that occur on all networks. While you might find a solution
to a problem by simply trying a variety of actions, you can reach an appropriate solution
more quickly if you are systematic in your approach to the maintenance and monitoring
of your network. To prepare for problems on your network, understand how the network
functions under normal conditions, have records of baseline network activity, and carefully
observe the behavior of your network during a problem situation.
Figure 21 on page 168 shows the network topology used in this topic to illustrate the process
of diagnosing problems in a network.
so-0/0/0–.12.2 so-0/0/1–.23.1
R1 R2 R3
so-0/0/0–.12.1 so-0/0/1–.23.2
so-0/0/1–.15.2
so-0/0/2–.26.2 so-0/0/3–.36.2
R5 R6
g003255
lo0: .5 lo0: .6
I-BGP
Key:
so-0/0/X: 10.1.x.x/30 E-BGP
lo0: 10.0.0.x/32
The network in Figure 21 on page 168 consists of two autonomous systems (ASs). AS
65001 includes two routers, and AS 65002 includes three routers. The border router (R1)
in AS 65001 announces aggregated prefixes 100.100/24 to the AS 65002 network. The
problem in this network is that R6 does not have access to R5 because of a loop between
R2 and R6.
3. Taking Appropriate Action for Resolving the Network Problem on page 171
4. Evaluating the Solution to Check Whether the Network Problem Is Resolved on page 172
Problem Description: The symptoms of a problem in your network are usually quite obvious, such
as the failure to reach a remote host.
Solution To identify the symptoms of a problem on your network, start at one end of your network
and follow the routes to the other end, entering all or one of the following Junos OS
command-line interfaces (CLI) operational mode commands:
Sample Output
user@R6> ping 10.0.0.5
PING 10.0.0.5 (10.0.0.5): 56 data bytes
36 bytes from 10.1.26.1: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 e2db 0 0000 01 01 a8c6 10.1.26.2 10.0.0.5
^C
--- 10.0.0.5 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Meaning
The sample output shows an unsuccessful ping command in which the packets are being
rejected because the time to live is exceeded. The output for the show route command
shows the interface (10.1.26.1) that you can examine further for possible problems. The
traceroute command shows the loop between 10.1.26.1 (R2) and 10.1.26.2 (R6), as indicated
by the continuous repetition of the two interface addresses.
Problem Description: A particular symptom can be the result of one or more causes. Narrow down
the focus of your search to find each individual cause of the unwanted behavior.
Solution To isolate the cause of a particular problem, enter one or all of the following Junos OS
CLI operational mode command:
user@host> show < configuration | bgp | interfaces | isis | ospf | route >
Your particular problem may require the use of more than just the commands listed
above. See the appropriate command reference for a more exhaustive list of commonly
used operational mode commands.
Sample Output
user@R6> show interfaces terse
Interface Admin Link Proto Local Remote
so-0/0/0 up up
so-0/0/0.0 up up inet 10.1.56.2/30
iso
so-0/0/2 up up
so-0/0/2.0 up up inet 10.1.26.2/30
iso
so-0/0/3 up up
so-0/0/3.0 up up inet 10.1.36.2/30
iso
[...Output truncated...]
Meaning
The sample output shows that all interfaces on R6 are up. The output from R2 shows
that a static route [Static/5] configured on R2 points to R6 (10.1.26.2) and is the preferred
route to R5 because of its low preference value. However, the route is looping from R2
to R6, as indicated by the missing reference to R5 (10.1.15.2).
Problem Description: The appropriate action depends on the type of problem you have isolated.
In this example, a static route configured on R2 is deleted from the [routing-options]
hierarchy level. Other appropriate actions might include the following:
To resolve the problem in this example, enter the following Junos OS CLI commands:
[edit]
user@R2# delete routing-options static route destination-prefix
user@R2# commit and-quit
user@R2# show route destination-prefix
Sample Output
[edit]
user@R2# delete routing-options static route 10.0.0.5/32
[edit]
user@R2# commit and-quit
commit complete
Exiting configuration mode
Meaning
The sample output shows the static route deleted from the [routing-options] hierarchy
and the new configuration committed. The output for the show route command now
shows the BGP route as the preferred route, as indicated by the asterisk (*).
Problem Description: If the problem is solved, you are finished. If the problem remains or a new
problem is identified, start the process over again.
You can address possible causes in any order. In relation to the network in “Isolating a
Broken Network Connection” on page 168, we chose to work from the local router toward
the remote router, but you might start at a different point, particularly if you have reason
to believe that the problem is related to a known issue, such as a recent change in
configuration.
Solution To evaluate the solution, enter the following Junos OS CLI commands:
Sample Output
user@R6> show route 10.0.0.5
Meaning
The sample output shows that there is now a connection between R6 and R5. The show
route command shows that the BGP route to R5 is preferred, as indicated by the asterisk
(*). The ping command is successful and the traceroute command shows that the path
from R6 to R5 is through R2 (10.1.26.1), and then through R1 (10.1.12.1).
Problem Description: The symptoms of a problem in your network are usually quite obvious, such
as the failure to reach a remote host.
Solution To identify the symptoms of a problem on your network, start at one end of your network
and follow the routes to the other end, entering all or one of the following Junos OS
command-line interfaces (CLI) operational mode commands:
Sample Output
user@R6> ping 10.0.0.5
PING 10.0.0.5 (10.0.0.5): 56 data bytes
36 bytes from 10.1.26.1: Time to live exceeded
Vr HL TOS Len ID Flg off TTL Pro cks Src Dst
4 5 00 0054 e2db 0 0000 01 01 a8c6 10.1.26.2 10.0.0.5
^C
--- 10.0.0.5 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Meaning
The sample output shows an unsuccessful ping command in which the packets are being
rejected because the time to live is exceeded. The output for the show route command
shows the interface (10.1.26.1) that you can examine further for possible problems. The
traceroute command shows the loop between 10.1.26.1 (R2) and 10.1.26.2 (R6), as indicated
by the continuous repetition of the two interface addresses.
Problem Description: A particular symptom can be the result of one or more causes. Narrow down
the focus of your search to find each individual cause of the unwanted behavior.
Solution To isolate the cause of a particular problem, enter one or all of the following Junos OS
CLI operational mode command:
user@host> show < configuration | bgp | interfaces | isis | ospf | route >
Your particular problem may require the use of more than just the commands listed
above. See the appropriate command reference for a more exhaustive list of commonly
used operational mode commands.
Sample Output
user@R6> show interfaces terse
Interface Admin Link Proto Local Remote
so-0/0/0 up up
so-0/0/0.0 up up inet 10.1.56.2/30
iso
so-0/0/2 up up
so-0/0/2.0 up up inet 10.1.26.2/30
iso
so-0/0/3 up up
so-0/0/3.0 up up inet 10.1.36.2/30
iso
[...Output truncated...]
Meaning
The sample output shows that all interfaces on R6 are up. The output from R2 shows
that a static route [Static/5] configured on R2 points to R6 (10.1.26.2) and is the preferred
route to R5 because of its low preference value. However, the route is looping from R2
to R6, as indicated by the missing reference to R5 (10.1.15.2).
Problem Description: The appropriate action depends on the type of problem you have isolated.
In this example, a static route configured on R2 is deleted from the [routing-options]
hierarchy level. Other appropriate actions might include the following:
To resolve the problem in this example, enter the following Junos OS CLI commands:
[edit]
user@R2# delete routing-options static route destination-prefix
user@R2# commit and-quit
user@R2# show route destination-prefix
Sample Output
[edit]
user@R2# delete routing-options static route 10.0.0.5/32
[edit]
user@R2# commit and-quit
commit complete
Exiting configuration mode
Meaning
The sample output shows the static route deleted from the [routing-options] hierarchy
and the new configuration committed. The output for the show route command now
shows the BGP route as the preferred route, as indicated by the asterisk (*).
Problem Description: If the problem is solved, you are finished. If the problem remains or a new
problem is identified, start the process over again.
You can address possible causes in any order. In relation to the network in “Isolating a
Broken Network Connection” on page 168, we chose to work from the local router toward
the remote router, but you might start at a different point, particularly if you have reason
to believe that the problem is related to a known issue, such as a recent change in
configuration.
Solution To evaluate the solution, enter the following Junos OS CLI commands:
Sample Output
user@R6> show route 10.0.0.5
Meaning
The sample output shows that there is now a connection between R6 and R5. The show
route command shows that the BGP route to R5 is preferred, as indicated by the asterisk
(*). The ping command is successful and the traceroute command shows that the path
from R6 to R5 is through R2 (10.1.26.1), and then through R1 (10.1.12.1).
Global routing protocol tracing operations track all general routing operations and record
them in a log file. To set protocol-specific tracing operations and to modify the global
tracing operations for an individual protocol, configure tracing for that protocol.
Using the traceoptions statement, you can specify the following global routing protocol
tracing flags:
• config-internal—Configuration internals
• general—All normal operations and routing table changes (a combination of the normal
and route trace operations)
• parse—Configuration parsing
• state—State transitions
• timer—Timer usage
NOTE: Use the all flag with caution. This flag might cause the CPU to become
very busy.
This example shows how to list and view files that are created when you enable global
routing trace operations.
Requirements
You must have the view privilege.
Overview
To configure global routing protocol tracing, include the traceoptions statement at the
[edit routing-options] hierarchy level:
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <disable>;
}
The flags in a traceoptions flag statement are identifiers. When you use the set command
to configure a flag, any flags that might already be set are not modified. In the following
example, setting the timer tracing flag has no effect on the already configured task flag.
Use the delete command to delete a particular flag.
This example shows how to configure and view a trace file that tracks changes in the
routing table. The steps can be adapted to apply to trace operations for any Junos OS
hierarchy level that supports trace operations.
TIP: To view a list of hierarchy levels that support tracing operations, enter
the help apropos traceoptions command in configuration mode.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit]
user@host# commit
4. View the tracing operations in real time by running the monitor start command with
an optional match condition.
6. Halt the monitor command by pressing Enter and typing monitor stop.
[Enter]
user@host> monitor stop
7. When you are finished troubleshooting, consider deactivating trace logging to avoid
any unnecessary impact to system resources.
[edit routing-options]
user@host# deactivate traceoptions
user@host# commit
[edit routing-options]
user@host# show
inactive: traceoptions {
file routing-table-changes size 10m files 10;
flag route;
}
static {
inactive: route 1.1.1.2/32 next-hop 10.0.45.6;
}
[edit routing-options]
user@host# activate traceoptions
user@host# commit
Results
From configuration mode, confirm your configuration by entering the show routing-options
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
Verification
Confirm that the configuration is working properly.
Purpose Make sure that events are being written to the log file.
Configuration Statements
Syntax access {
route ip-prefix</prefix-length> {
metric route-cost;
next-hop next-hop;
preference route-distance;
qualified-next-hop next-hop;
tag tag-number
}
Syntax access-internal {
route ip-prefix</prefix-length> {
next-hop next-hop;
qualified-next-hop next-hop
}
active
Description Determine whether static, aggregate, or generated routes are removed from the routing
and forwarding tables when they become inactive. Static routes are only removed from
the routing table if the next hop becomes unreachable. This can occur if the local or
neighbor interface goes down. Routes that have been configured to remain continually
installed in the routing and forwarding tables are marked with reject next hops when they
are inactive.
• active—Remove a route from the routing and forwarding tables when it becomes
inactive.
• passive—Have a route remain continually installed in the routing and forwarding tables
even when it becomes inactive.
Include the active statement when configuring an individual route in the route portion of
the static statement to override a passive option specified in the defaults portion of the
statement.
Default active
aggregate (Routing)
Syntax aggregate {
defaults {
... aggregate-options ...
}
route destination-prefix {
policy policy-name;
... aggregate-options ...
}
}
• (brief | full);
• community [ community-ids ];
• discard;
defaults—Specify global aggregate route options. These options only set default attributes
inherited by all newly created aggregate routes. These are treated as global defaults
and apply to all the aggregate routes you configure in the aggregate statement. This
part of the aggregate statement is optional.
Description Associate BGP autonomous system (AS) path information with a static, aggregate, or
generated route.
In Junos OS Release 9.1 and later, the numeric range for the AS number is extended to
provide BGP support for 4-byte AS numbers as defined in RFC 4893, BGP Support for
Four-octet AS Number Space. RFC 4893 introduces two new optional transitive BGP
attributes, AS4_PATH and AS4_AGGREGATOR. These new attributes are used to
propagate 4-byte AS path information across BGP speakers that do not support 4-byte
AS numbers. RFC 4893 also introduces a reserved, well-known, 2-byte AS number, AS
23456. This reserved AS number is called AS_TRANS in RFC 4893. All releases of Junos
OS support 2-byte AS numbers.
In Junos OS Release 9.2 and later, you can also configure a 4-byte AS number using the
AS-dot notation format of two integer values joined by a period: <16-bit high-order value
in decimal>.<16-bit low-order value in decimal>. For example, the 4-byte AS number
of 65,546 in plain-number format is represented as 1.10 in the AS-dot notation format.
You can specify a value in the range from 0.0 through 65535.65535 in AS-dot notation
format.
Options aggregator—(Optional) Attach the BGP aggregator path attribute to the aggregate route.
You must specify the last AS number that formed the aggregate route (encoded as
two octets) for as-number, followed by the IP address of the BGP system that formed
the aggregate route for ip-address.
origin egp—(Optional) BGP origin attribute that indicates that the path information
originated in another AS.
origin igp—(Optional) BGP origin attribute that indicates that the path information
originated within the local AS.
origin incomplete—(Optional) BGP origin attribute that indicates that the path information
was learned by some other means.
auto-export
Syntax auto-export {
disable;
family inet {
disable;
flow {
disable;
rib-group rib-group;
}
multicast {
disable;
rib-group rib-group;
}
unicast {
disable;
rib-group rib-group;
}
}
family inet6 {
disable;
multicast {
disable;
rib-group rib-group;
}
unicast {
disable;
rib-group rib-group;
}
}
family iso {
disable;
unicast {
disable;
rib-group rib-group;
}
}
traceoptions {
file filename <files number> <size maximum-file-size> <world-readable |
no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
This statement enables you to leak routes between VPN routing and forwarding (VRF)
instances that are locally configured on a provider edge (PE) router. Auto export is always
applied on the local PE router, because it applies to only local prefix leaking by evaluating
the export policy of each VRF and determining which route targets can be leaked. The
standard VRF import and export policies affect remote PE prefix leaking.
You can use this statement as an alternative to using the VRF import and export policies.
family—Address family.
autonomous-system
An autonomous system (AS) is a set of routing devices that are under a single technical
administration and that generally use a single interior gateway protocol (IGP) and metrics
to propagate routing information within the set of routing devices. An AS appears to other
ASs to have a single, coherent interior routing plan and presents a consistent picture of
what destinations are reachable through it. ASs are identified by a number that is assigned
by the Network Information Center (NIC) in the United States (http://www.isi.edu).
If you are using BGP on the routing device, you must configure an AS number.
The AS path attribute is modified when a route is advertised to an EBGP peer. Each time
a route is advertised to an EBGP peer, the local routing device prepends its AS number
to the existing path attribute, and a value of 1 is added to the AS number.
In Junos OS Release 9.1 and later, the numeric range is extended to provide BGP support
for 4-byte AS numbers as defined in RFC 4893, BGP Support for Four-octet AS Number
Space. RFC 4893 introduces two new optional transitive BGP attributes, AS4_PATH and
AS4_AGGREGATOR. These new attributes are used to propagate 4-byte AS path
information across BGP speakers that do not support 4-byte AS numbers. RFC 4893
also introduces a reserved, well-known, 2-byte AS number, AS 23456. This reserved AS
number is called AS_TRANS in RFC 4893. All releases of Junos OS support 2-byte AS
numbers.
In Junos OS Release 9.3 and later, you can also configure a 4-byte AS number using the
AS-dot notation format of two integer values joined by a period: <16-bit high-order value
in decimal>.<16-bit low-order value in decimal>. For example, the 4-byte AS number
of 65,546 in plain-number format is represented as 1.10 in the AS-dot notation format.
[edit]
routing-options {
autonomous-system 65546;
}
Range: 0.0 through 65535.65535 in AS-dot notation format for 4-byte numbers
[edit]
routing-options {
autonomous-system 1.10;
}
Range: 1 through 65,535 in plain-number format for 2-byte AS numbers (this is a subset
of the 4-byte range)
[edit]
routing-options {
autonomous-system 60000;
}
NOTE: When you specify the same AS number in more than one routing
instance on the local routing device, you must configure the same number
of loops for the AS number in each instance. For example, if you configure a
value of 3 for the loops statement in a VRF routing instance that uses the
same AS number as that of the master instance, you must also configure a
value of 3 loops for the AS number in the master instance.
bfd
Syntax bfd {
traceoptions {
file filename <files number> <match regular-expression> <size size> <world-readable |
no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
Description Configure trace options for Bidirectional Forwarding Protocol (BFD) traffic.
Default If you do not include this statement, no BFD tracing operations are performed.
Options disable—(Optional) Disable the BFD tracing operation. You can use this option to disable
a single operation when you have defined a broad group of tracing operations, such
as all.
file filename—Name of the file to receive the output of the tracing operation. Enclose the
name in quotation marks. All files are placed in the /var/log directory . We recommend
that you place global routing protocol tracing output in the routing-log file.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file
is overwritten.
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
Range: 2 through 1000 files
Default: 2 files
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. These are the BFD protocol tracing options:
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then, the oldest trace file is
overwritten.
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace–control—To add this statement to the configuration.
Related • Example: Configuring BFD for Static Routes for Faster Network Failure Detection on
Documentation page 116
Syntax bfd-liveness-detection {
description Site- xxx;
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
holddown-interval milliseconds;
local-address ip-address;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
minimum-receive-ttl number;
multiplier number;
neighbor address;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
Description Configure bidirectional failure detection timers and authentication criteria for static
routes.
local-address ip-address—Enable a multihop BFD session and configure the source address
for the BFD session.
minimum-receive-ttl number—Configure the time to live (TTL) for the multihop BFD
session.
Range: 1 through 255
Default: 255
multiplier number—Configure number of hello packets not received by the neighbor that
causes the originating interface to be declared down.
Range: 1 through 255
Default: 3
neighbor address—Configure a next-hop address for the BFD session for a next hop
specified as an interface name.
Related • Example: Configuring BFD for Static Routes for Faster Network Failure Detection on
Documentation page 116
• Example: Configuring BFD Authentication for Securing Static Routes on page 124
brief
Description Configure all AS numbers from all contributing paths to be included in the aggregate or
generated route’s path.
• brief—Include only the longest common leading sequences from the contributing AS
paths. If this results in AS numbers being omitted from the aggregate route, the BGP
ATOMIC_ATTRIBUTE path attribute is included with the aggregate route.
• full—Include all AS numbers from all contributing paths in the aggregate or generated
route’s path. Include this option when configuring an individual route in the route portion
of the generate statement to override a retain option specified in the defaults portion
of the statement.
Default full
color
Syntax color {
metric-value;
<type metric_type>
}
You can also specify a primary route preference (by including the color statement in the
configuration), and a secondary preference that is used as a tiebreaker (by including the
color2 statement). You can also mark route preferences with additional route tiebreaker
information by specifying a primary route preference and a tiebreaker route preference
(by including the preference and preference2 statements in the configuration).
If the Junos OS routing table contains a dynamic route to a destination that has a better
(lower) preference value than the static, aggregate, or generated route, the dynamic
route is chosen as the active route and is installed in the forwarding table.
type metric_type—(Optional) External metric type for routes exported by OSPF. When
routes are exported to OSPF, type 1 routes are advertised in type 1 externals, and
routes of any other type are advertised in type 2 externals. Note that if a
qualified-next-hop metric value is configured, this value overrides the route metric.
Range: 1 through 16
Description Associate BGP community information with a static, aggregate, or generated route.
For more information about BGP community attributes, see the “Configuring the Extended
Communities Attribute” section in the Routing Policies, Firewall Filters, and Traffic
Policers Feature Guide.
For specifying the BGP community attribute only, you also can specify community-ids as
one of the following well-known community names defined in RFC 1997:
• no-export—Routes containing this community name are not advertised outside a BGP
confederation boundary.
• no-llgr—Marks routes which a BGP speaker does not want to be retained by LLGR. The
Notification message feature does not have any associated configuration parameters.
As defined in RFC 8092, BGP large community uses 12-byte encoding and the format for
BGP large community-ids is:
large: global-administrator:assigned-number:assigned-number
assigned-number is a 4-byte value used to identify the local provider. BGP large community
uses two 4-byte assigned number to identify the local provider.
confederation
If you administer multiple ASs that contain a very large number of BGP systems, you can
group them into one or more confederations. Each confederation is identified by its own
AS number, which is called a confederation AS number. To external ASs, a confederation
appears to be a single AS. Thus, the internal topology of the ASs making up the
confederation is hidden.
The BGP path attributes NEXT_HOP, LOCAL_PREF, and MULTI_EXIT_DISC, which normally
are restricted to a single AS, are allowed to be propagated throughout the ASs that are
members of the same confederation.
Because each confederation is treated as if it were a single AS, you can apply the same
routing policy to all the ASs that make up the confederation.
Grouping ASs into confederations reduces the number of BGP connections required to
interconnect ASs.
If you are using BGP, you can enable the local routing device to participate as a member
of an AS confederation. To do this, include the confederation statement.
Specify the AS confederation identifier, along with the peer AS numbers that are members
of the confederation.
Note that peer adjacencies do not form if two BGP neighbors disagree about whether
an adjacency falls within a particular confederation.
destination-networks
Description Specify the IPv4 prefix range for the destination network. Only tunnels within the specified
IPv4 prefix range can be created.
Syntax disable;
discard
Syntax discard;
Description Do not forward packets addressed to this destination. Instead, drop the packets, do not
send ICMP unreachable messages to the packets’ originators, and install a reject route
for this destination into the routing table.
To propagate static routes into the routing protocols, include the discard statement when
you define the route, along with a routing policy.
Default When an aggregate route becomes active, it is installed in the routing table with a reject
next hop, which means that ICMP unreachable messages are sent.
dynamic-tunnels
Related • Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks
Documentation
Description Apply one or more policies to routes being exported from the routing table into the
forwarding table.
In the export statement, list the name of the routing policy to be evaluated when routes
are being exported from the routing table into the forwarding table. Only active routes
are exported from the routing table.
You can reference the same routing policy one or more times in the same or a different
export statement.
You can apply export policies to routes being exported from the routing table into the
forwarding table for the following features:
export-rib
Description Specify the name of the routing table from which Junos OS should export routing
information. For any individual RIB group, only one table can be specified in the export-rib
statement.
The export-rib statement specifies the source table from which routing information is
advertised.
One common use of the export-rib statement is interdomain routing. The export RIB is
the table used when BGP extracts routes to advertise to peers. In multicast interdomain
routing, for example, the export RIB is likely to be inet.2.
Another use of export-rib is dynamic route leaking between the global routing table
(inet.0) and a VRF routing table (instance.inet.0). For example, you can use a RIB group
to copy routes learned in the VRF into the global routing table, inet.0, or copy routes
learned in inet.0 into a VRF. You define the use of this RIB group in the VRF’s BGP
configuration. In a routing policy you can do dynamic filtering of routes. For instance, you
can use an import policy to only copy routes with certain communities into the global
routing table.
For example:
rib-groups {
rib-interface-routes-v4 {
import-rib [ inet.0 VRF.inet.0 ];
}
rib-import-VRF-routes-to-inet0-v4 {
export-rib VRF.inet.0;
import-rib [ VRF.inet.0 inet.0 ];
import-policy rib-import-VRF-routes-to-inet0-v4;
}
rib-import-inet0-routes-to-VRF-v4 {
export-rib inet.0;
import-rib [ inet.0 VRF.inet.0 ];
import-policy rib-import-inet0-routes-to-VRF-v4;
}
}
routing-options {
interface-routes {
rib-group {
inet rib-interface-routes-v4;
}
}
}
protocols {
bgp {
group iBGP-peers {
type internal;
family inet {
unicast {
rib-group rib-import-inet0-routes-to-VRF-v4;
}
}
}
}
}
routing-instances {
VRF {
routing-options {
interface-routes {
rib-group {
inet rib-interface-routes-v4;
}
}
}
protocols {
bgp {
group peersin-VRF {
family inet {
unicast {
rib-group rib-import-VRF-routes-to-inet0-v4;
}
}
}
}
}
}
}
Related • Example: Exporting Specific Routes from One Routing Table Into Another Routing
Documentation Table on page 58
fate-sharing
Syntax fate-sharing {
group group-name {
cost value;
from address <to address>;
}
}
Description Specify a backup path in case the primary path becomes unusable.
You specify one or more objects with common characteristics within a group. All objects
are treated as /32 host addresses. The objects can be a LAN interface, a router ID, or a
point-to-point link. Sequence is insignificant.
Changing the fate-sharing database does not affect existing established LSPs until the
next CSPF reoptimization. The fate-sharing database does affect fast-reroute detour
path computations.
from address—Address of the router or address of the LAN/NBMA interface. For example,
an Ethernet network with four hosts in the same fate-sharing group would require
you to list all four of the separate from addresses in the group.
group group-name—Each fate-sharing group must have a name, which can have a
maximum of 32 characters, including letters, numbers, periods (.), and hyphens (-).
You can define up to 512 groups.
to address—(Optional) Address of egress router. For point-to-point link objects, you must
specify both a from and a to address.
filter
Syntax filter {
input filter-name;
}
Description Specify the name of the routing table from which Junos OS should export routing
information.
firewall-install-disable
Syntax firewall-install-disable;
Description Disable installing flow-specification firewall filters in the firewall process (dfwd).
Default For PTX Series routers, this statement appears in the default configuration, preventing
installation of flow-specification firewall filters into dfwd. For other models, this setting
is omitted from the default configuration, allowing installation of flow-specification
firewall filters into dfwd.
flow
Syntax flow {
route name {
match {
match-conditions;
}
term-order (legacy | standard);
then {
actions;
}
}
firewall-install-disable;
term-order (legacy | standard);
validation {
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
}
Default legacy
forwarding-table
Syntax forwarding-table {
chained-composite-next-hop;
export [ policy-name ];
(indirect-next-hop | no-indirect-next-hop);
(indirect-next-hop-change-acknowledgements |
no-indirect-next-hop-change-acknowledgements;)
krt-nexthop-ack-timeout interval;
unicast-reverse-path (active-paths | feasible-paths);
}
full
See brief
generate
Syntax generate {
defaults {
generate-options;
}
route destination-prefix {
policy policy-name;
generate-options;
}
}
Description Configure generated routes, which are used as routes of last resort.
Options defaults—(Optional) Specify global generated route options. These options only set
default attributes inherited by all newly created generated routes. These are treated
as global defaults and apply to all the generated routes you configure in the generate
statement.
• (active | passive);
• (brief | full);
• community [ community-ids ];
• discard;
Syntax graceful-restart {
disable;
helper-disable;
maximum-helper-recovery-time seconds;
maximum-helper-restart-time seconds;
notify-duration seconds;
recovery-time seconds;
restart-duration seconds;
stale-routes-time seconds;
}
Description You configure the graceful restart routing option globally to enable the feature, but not
to enable graceful restart for all routing protocols in a routing instance. Because all routing
protocols are not usually run on every routing instance, you must also configure graceful
restart for individual routing protocols running on a routing instance, including the main
routing instance. You can, optionally, modify the global settings at the individual protocol
level.
NOTE:
• For VPNs, the graceful-restart statement allows a router whose VPN control
plane is undergoing a restart to continue to forward traffic while recovering
its state from neighboring routers.
• For BGP, if you configure graceful restart after a BGP session has been
established, the BGP session restarts and the peers negotiate graceful
restart capabilities.
Options The remaining statements are explained separately. See CLI Explorer.
import
Description Specify one or more import policies to use for route resolution.
import-policy
Description Apply one or more policies to routes imported into the routing table group. The
import-policy statement complements the import-rib statement and cannot be used
unless you first specify the routing tables to which routes are being imported.
Related • Example: Exporting Specific Routes from One Routing Table Into Another Routing
Documentation Table on page 58
import-rib
Description Specify the name of the routing table into which Junos OS should import routing
information. The first routing table name you enter is the primary routing table. Any
additional names you enter identify secondary routing tables. When a protocol imports
routes, it imports them into the primary and any secondary routing tables. If the primary
route is deleted, the secondary route also is deleted. For IPv4 import routing tables, the
primary routing table must be inet.0 or routing-instance-name.inet.0. For IPv6 import
routing tables, the primary routing table must be inet6.0.
In Junos OS Release 9.5 and later, you can configure an IPv4 import routing table that
includes both IPv4 and IPv6 routing tables. Including both types of routing tables permits
you, for example, to populate an IPv6 routing table with IPv6 addresses that are
compatible with IPv4. In releases prior to Junos OS Release 9.5, you could configure an
import routing table with only either IPv4 or IPv6 routing tables.
Related • Example: Exporting Specific Routes from One Routing Table Into Another Routing
Documentation Table on page 58
independent-domain
The independent domain uses transitive path attribute 128 (attribute set) messages to
tunnel the independent domain’s BGP attributes through the internal BGP (IBGP) core.
This improves the transparency of Layer 3 VPN services for customer networks by
preventing the IBGP routes that originate within an autonomous system (AS) in the
customer network from being sent to a service provider’s AS. Similarly, IBGP routes that
originate within an AS in the service provider’s network are prevented from being sent to
a customer AS.
NOTE: In Junos OS Release 10.3 and later, if BGP receives attribute 128 and
you have not configured an independent domain in any routing instance, BGP
treats the received attribute 128 as an unknown attribute.
Related • Example: Tunneling Layer 3 VPN IPv6 Islands over an IPv4 Core Using IBGP and
Documentation Independent Domains
indirect-next-hop
Description Enable indirectly connected next hops for route convergence. This statement is
implemented on the Packet Forward Engine to speed up forwarding information base
(FIB) updates. Configuring this statement significantly speeds convergence times. The
only downside of configuring this statement is that some additional FIB memory overhead
is required. Unless routes have an extremely high number of next hops, this increased
memory usage should not be noticeable.
NOTE:
• When virtual private LAN service (VPLS) is configured on the routing device,
the indirect-next-hop statement is configurable at the [edit routing-options
forwarding-table] hierarchy level. However, this configuration is not
applicable to indirect nexthops specific to VPLS routing instances.
Default Disabled.
Related • Example: Optimizing Route Reconvergence by Enabling Indirect Next Hops on the
Documentation Packet Forwarding Engine on page 139
indirect-next-hop-change-acknowledgements
Syntax (indirect-next-hop-change-acknowledgements |
no-indirect-next-hop-change-acknowledgements);
Description Configure the routing protocol process (rpd) to request an acknowledgement when
creating a new forwarding next hop.
During an indirect next-hop change sequence, the routing device might create a new
forwarding next hop that is referenced by the indirect next hop. If the
indirect-next-hop-change-acknowledgements statement is configured, the routing protocol
process requests an acknowledgement when creating the new forwarding next hop.
When the routing protocol process receives the acknowledgement, this indicates that
all PICs have received the new forwarding next hop and it is then safe to change the
indirect next hop to reference the new forwarding next hop. This prevents packet loss
when changing the indirect next hop by ensuring that all PICs have consistent state
information for the new forwarding next hop.
The routing protocol process is not requesting an acknowledgement for the indirect next
hop itself. Rather, the routing protocol process is requesting an acknowledgement for
the new forwarding next hop that the indirect next hop is going to reference. In the case
when the forwarding next hop is an existing one (meaning that it is already installed in
the forwarding table), the routing protocol process does not request an acknowledgement,
even if the indirect-next-hop-change-acknowledgements statement is configured.
Default Disabled by default in all platforms except PTX Series, where it is enabled by default.
Related • Example: Optimizing Route Reconvergence by Enabling Indirect Next Hops on the
Documentation Packet Forwarding Engine on page 139
Description Configure whether Junos OS installs all static routes into the forwarding table. Even if
you configure a route so it is not installed in the forwarding table, the route is still eligible
to be exported from the routing table to other protocols.
Options install—Explicitly install all static routes into the forwarding table. Include this statement
when configuring an individual route in the route portion of the static statement to
override a no-install option specified in the defaults portion of the statement.
no-install—Do not install the route into the forwarding table, even if it is the route with
the lowest preference.
Default: install
instance-export
Description Apply one or more policies to routes being exported from a routing instance.
Related • Routing Policies, Firewall Filters, and Traffic Policers Feature Guide
Documentation
instance-import
Description Apply one or more policies to routes being imported into a routing instance.
Related • Routing Policies, Firewall Filters, and Traffic Policers Feature Guide
Documentation
Options interface-names—Names of the interfaces on which to configure scoping. Specify the full
interface name, including the physical and logical address components. To configure
all interfaces, you can specify all.
NOTE: You cannot apply a scoping policy to a specific routing instance. All
scoping policies are applied to all routing instances. However, you can apply
the scope statement to a specific routing instance.
You can also configure multicast packets to be forwarded over a static route, such as a
static route associated with an LSP next hop. Multicast packets are accepted on an
interface and forwarded over a static route in the forwarding table. This is useful when
you want to enable multicast traffic on a specific interface without configuring PIM on
the interface.
You cannot enable multicast traffic on an interface and configure PIM on the same
interface simultaneously.
Static routes must be configured before you can enable multicast on an interface.
Configuring the interface statement alone does not install any routes into the routing
table. This feature relies on the static route configuration.
interface-routes
Syntax interface-routes {
family (inet | inet6) {
export {
lan;
point-to-point;
}
}
rib-group group-name;
}
Description Associate a routing table group with the routing device’s interfaces, and specify routing
table groups into which interface routes are imported.
By default, IPv4 interface routes (also called direct routes) are imported into routing
table inet.0, and IPv6 interface routes are imported into routing table inet6.0. If you are
configuring alternate routing tables for use by some routing protocols, it might be
necessary to import the interface routes into the alternate routing tables. To define the
routing tables into which interface routes are imported, you create a routing table group
and associate it with the routing device’s interfaces.
To create the routing table groups, include the passive statement at the
[edit routing-options] hierarchy level.
If you have configured a routing table, configure the OSPF primary instance at the [edit
protocols ospf] hierarchy level with the statements needed for your network so that
routes are installed in inet.0 and in the forwarding table. Make sure to include the routing
table group.
To export LAN routes, include the lan option. To export point-to-point routes, include
the point-to-point option.
Only local routes on point-to-point interfaces configured with a destination address are
exportable.
Related • Example: Importing Direct and Static Routes Into a Routing Instance on page 53
Documentation
• Example: Configuring Multiple Routing Instances of OSPF
krt-nexthop-ack-timeout
Description For indirect next-hop and multicast next-hop change acknowledgements, configure the
time interval for which to wait for the next-hop acknowledgement. The routing protocol
process (rpd) waits for the specified time period before changing the route to point to
the new next hop.
If the acknowledgement is not received within the time period, it is assumed to have been
received and the route is made to point to the new next hop.
Related • Example: Optimizing Route Reconvergence by Enabling Indirect Next Hops on the
Documentation Packet Forwarding Engine on page 139
Syntax longest-match;
Release Information Statement introduced in Junos OS Release 15.1 for EX Series switches.
Description Specify the static route on the device to resolve and determine the packet’s next-hop
interface using the Longest Match Routing Rule (most specific entry), sometimes referred
to as the longest prefix match or maximum prefix length match. The Longest Match
Routing Rule is an algorithm used by IP routers to select an entry from a routing table.
The router uses the longest (prefix) match to determine the egress (outbound) interface
and the address of the next device to which to send a packet. Typically, the static route
prefers the directly connected subnet route for resolving the next hop rather than
performing a longest prefix match with any other available routes.
NOTE: (Required) You must include the resolve next-hop option to specify
the longest-match statement. Next-hop options define additional information
about static routes that are included with the route when it is installed in the
routing table. You alter the default next-hop resolution behavior using the
resolve next-hop option.
2. While processing the header, the router compares the destination IP address, bit-by-bit,
with the entries in the routing table.
The entry that has the longest number of network bits that match the IP destination
address is always the best match (or best path) as shown in the following example:
• 192.168.1.32/28
• 192.168.1.0/24
• 192.168.0.0/16
192.168.1.0/24 11000000.10101000.00000001.00000000
192.168.0.0/16 11000000.10101000.00000000.00000000
Related • Understanding Static Route Preferences and Qualified Next Hops on page 35
Documentation
Description Specify an LSP as the next hop for a static route, and configure an independent metric
or preference on that next-hop LSP.
martians
Syntax martians {
destination-prefix match-type <allow>;
}
Options allow—(Optional) Explicitly allow a subset of a range of addresses that has been
disallowed. The allow option is the only supported action.
• default—Default route to use when routing packets do not match a network or host in
the routing table. This is equivalent to specifying the IP address 0.0.0.0/0.
• longer—The route’s mask length is greater than the specified mask length.
• orlonger—The route’s mask length is equal to or greater than the specified mask length.
• through destination-prefix—The route matches the first prefix, the route matches the
second prefix for the number of bits in the route, and the number of bits in the route is
less than or equal to the number of bits in the second prefix.
• upto prefix-length—The route’s mask length falls between the two destination prefix
lengths, inclusive.
Related • Example: Configuring Class E Martian Addresses for Routing on page 160
Documentation
maximum-paths
Description Configure a limit for the number of routes installed in a routing table based upon the
route path.
OSPF 10.10.10.0/24
ISIS 10.10.10.0/24
These are two routes, but only one destination (prefix). The maximum-paths
limit applies the total number of routes (two). The maximum-prefixes limit
applies to the total number of unique prefixes (one).
Options log-interval seconds—(Optional) Minimum time interval (in seconds) between log
messages.
Range: 5 through 86,400
log-only—(Optional) Sets the route limit as an advisory limit. An advisory limit triggers
only a warning, and additional routes are not rejected.
NOTE: When the number of routes reaches the threshold value, routes are
still installed into the routing table while warning messages are sent. When
the number of routes reaches the path-limit value, then additional routes are
rejected.
Related • Limiting the Number of Paths and Prefixes Accepted from CE Routers in Layer 3 VPNs
Documentation
maximum-prefixes
Description Configure a limit for the number of routes installed in a routing table based upon the
route prefix.
Using a prefix limit, you can curtail the number of prefixes received from a CE router in a
VPN. Prefix limits apply only to dynamic routing protocols and are not applicable to static
or interface routes.
OSPF 10.10.10.0/24
ISIS 10.10.10.0/24
These are two routes, but only one destination (prefix). The maximum-paths
limit applies the total number of routes (two). The maximum-prefixes limit
applies to the total number of unique prefixes (one).
Options log-interval seconds—(Optional) Minimum time interval (in seconds) between log
messages.
Range: 5 through 86,400
log-only—(Optional) Sets the prefix limit as an advisory limit. An advisory limit triggers
only a warning, and additional routes are not rejected.
NOTE: When the number of routes reaches the threshold value, routes are
still installed into the routing table while warning messages are sent. When
the number of routes reaches the prefix-limit value, then additional routes
are rejected.
Related • Limiting the Number of Paths and Prefixes Accepted from CE Routers in Layer 3 VPNs
Documentation
med-igp-update-interval
Description Configure a timer for how long to delay updates for the multiple exit discriminator (MED)
path attribute for BGP groups and peers configured with the metric-out igp offset
delay-med-update statement. The timer delays MED updates for the interval configured
unless the MED is lower than the previously advertised attribute or another attribute
associated with the route has changed or if the BGP peer is responding to a refresh route
request.
Related • Example: Associating the MED Path Attribute with the IGP Metric and Delaying MED
Documentation Updates
• metric-out
metric
Description Specify the metric value for an aggregate, generated, or static route. You can specify up
to four metric values, starting with metric (for the first metric value) and continuing with
metric2, metric3, and metric4.
When routes are exported to OSPF, type 1 routes are advertised in type 1 externals, and
routes of any other type are advertised in type 2 externals. Note that if a
qualified-next-hop metric value is configured, this value overrides the route metric.
Range: 1 through 16
Syntax multicast {
forwarding-cache {
threshold suppress value <reuse value>;
}
interface interface-name {
enable;
}
local-address address
scope scope-name {
interface [ interface-names ];
prefix destination-prefix;
}
ssm-groups {
address;
}
}
NOTE: You cannot apply a scoping policy to a specific routing instance. All
scoping policies are applied to all routing instances. However, you can apply
the scope statement to a specific routing instance.
next-hop (Access)
Description Configure the next-hop address for an access route. Access routes are typically
unnumbered interfaces.
Options next-hop—Specific next-hop address you want to assign to the access route.
Description Configure the next-hop address for an internal access route. Access routes are typically
unnumbered interfaces.
Options next-hop—Specific next-hop address you want to assign to the internal access route.
no-delegate-processing
Syntax no-delegate-processing;
Release Information Statement introduced in Junos OS Release 10.1 for EX Series switches.
Description Disable distributed periodic packet management (PPM) processing and run all PPM
processing on the Routing Engine.
PPM processing cannot be completely disabled on EX Series switches. You can only
configure whether PPM processing is distributed between the access ports (EX3200 and
EX4200 switches) or the line cards (EX8200 switches) and the Routing Engine or is
handled just on the Routing Engine.
BEST PRACTICE: Generally, you should only disable distributed PPM if Juniper
Networks Customer Service advised you to do so. You should only disable
distributed PPM if you have a compelling reason to disable it.
nonstop-routing
Syntax nonstop-routing;
Description For routing platforms with two Routing Engines, configure a master Routing Engine to
switch over gracefully to a backup Routing Engine and to preserve routing protocol
information.
Default disabled
Syntax options {
syslog (level level | upto level level);
}
Description Configure the types of system logging messages sent about the routing protocols process
to the system message logging file. These messages are also displayed on the system
console. You can log messages at a particular level, or up to and including a particular
level.
Options level level—Severity of the message. It can be one or more of the following levels, in order
of decreasing urgency:
• info—Informational messages.
• notice—Conditions that are not error conditions, but might warrant special handling.
p2mp-ldp-next-hop
Syntax p2mp-ldp-next-hop {
root-address root-address{
lsp-id id;
}
}
Description Specify a point-to-multipoint LDP label-switched path (LSP) as the next hop for a static
route, and configure a root and provide an lsp-id on that LDP-signalled label-switched
path.
Options root-address root address— Specify the root address of the point-to-multipoint LSP.
lsp-id id— Specify the generic LSP identifier. The range is 1 through 65535.
Related
Documentation
p2mp-lsp-next-hop
Syntax p2mp-lsp-next-hop {
metric metric;
preference preference;
}
Description Specify a point-to-multipoint LSP as the next hop for a static route, and configure an
independent metric or preference on that next-hop LSP.
See active
Description Associate a routing policy when configuring an aggregate or generated route’s destination
prefix in the routes part of the aggregate or generate statement. This provides the
equivalent of an import routing policy filter for the destination prefix. That is, each potential
contributor to an aggregate route, along with any aggregate options, is passed through
the policy filter. The policy then can accept or reject the route as a contributor to the
aggregate route.
If the contributor is accepted, the policy can modify the default preferences. The
contributor with the numerically smallest prefix becomes the most preferred, or primary,
contributor. A rejected contributor still can contribute to a less specific aggregate route.
If you do not specify a policy filter, all candidate routes contribute to an aggregate route.
The following algorithm is used to compare two generated contributing routes in order
to determine which one is the primary or preferred contributor:
1. Compare the protocol’s preference of the contributing routes. The lower the preference,
the better the route. This is similar to the comparison that is done while determining
the best route for the routing table.
2. Compare the protocol’s preference2 of the contributing routes. The lower preference2
value is better. If only one route has preference2, then this route is preferred.
3. The preference values are the same. Proceed with a numerical comparison of the
prefixes’ values.
b. If the two prefixes are numerically equal, the primary contributor is the route that
has the smallest prefix length value.
At this point, the two routes are the same. The primary contributor does not change. An
additional next hop is available for the existing primary contributor.
A rejected contributor still can contribute to less specific generated route. If you do not
specify a policy filter, all candidate routes contribute to a generated route.
ppm
Syntax ppm {
no-delegate-processing;
}
Description (M120, M320, MX Series, T Series, TX Matrix routers, M7i and M10i routers with Enhanced
CFEB [CFEB-E], EX Series switches, and QFX Series only) Disable distributed periodic
packet management (PPM) to the Packet Forwarding Engine (on routers), to access
ports (on EX3200 and EX4200 switches, and QFX Series), or to line cards (on EX6200
and EX8200 switches).
After you disable PPM, PPM processing continues to run on the Routing Engine.
In Junos OS Release 8.2, PPM was moved from the Routing Engine to the Packet
Forwarding Engine, access ports, or line cards. The no-delegate-processing statement
disables the default behavior and restores the legacy behavior.
Default Distributed PPM processing is enabled for all protocols that use PPM.
redistribution-timer— Ensures that link aggregation (and STP) work properly for the
periodic packet management (PPM) daemons on the aggregation and satellite
devices. A value of 120 is recommended for MXVC-ISSU.
precision-timers-max-period
Description Support of precision-timers in the kernel is a feature where the kernel takes over
auto-generation of BGP keepalives right after the switchover from standby to master
event occurs. The kernel in the RE continues this auto-generation until the BGP protocol
is able to take over the session or until a maximum period has elapsed since the switchover
event occurred. The maximum period for which the kernel auto-generates keepalives on
behalf of BGP after a switchover event from standby to master ranges from 60 seconds
to 1800 seconds. The default value is 600 seconds.
preference (Access)
Syntax preference {
metric-value;
<type metric_type>
}
Description Preference value for a static, aggregate, or generated route. You also can specify a
secondary preference value, as well as color values, which are even finer-grained
preference values.
You can specify a primary route preference (by including the preference statement in
the configuration), and a secondary preference that is used as a tiebreaker (by including
the preference2 statement). You can also mark route preferences with additional route
tiebreaker information by specifying a color and a tiebreaker color (by including the color
and color2 statements in the configuration).
If the Junos OS routing table contains a dynamic route to a destination that has a better
(lower) preference value than the static, aggregate, or generated route, the dynamic
route is chosen as the active route and is installed in the forwarding table.
Options metric_value—The metric value for an aggregate, a generated, or a static route to determine
the best route among multiple routes to a destination
32
Range: 0 through 4,294,967,295 (2 – 1)
Default: 5 (for static routes), 130 (for aggregate and generated routes)
type metric_type—(Optional) External metric type for routes exported by OSPF. When
routes are exported to OSPF, type 1 routes are advertised in type 1 externals, and
routes of any other type are advertised in type 2 externals. Note that if a
qualified-next-hop metric value is configured, this value overrides the route metric.
Range: 1 through 16
prefix
• multicast
qualified-next-hop (Access)
Options next-hop—Specific qualified next-hop address you want to assign to the access route.
qualified-next-hop (Access-Internal)
Description Configure the qualified next-hop address for an internal access route.
Options next-hop—Specific qualified next-hop address you want to assign to the internal access
route.
Description Configure a static route with multiple possible next hops, each of which can have its own
preference value, IGP metric that is used when the route is exported into an IGP, and
Bidirectional Forwarding Detection (BFD) settings. If multiple links are operational, the
one with the most preferred next hop is used. The most preferred next hop is the one
with the lowest preference value.
Related • Example: Enabling BFD on Qualified Next Hops in Static Routes for Route Selection
Documentation on page 130
readvertise
Description Configure whether static routes are eligible to be readvertised by routing protocols:
Default Static routes are eligible to be readvertised (that is, exported from the routing table into
dynamic routing protocols) if a policy to do so is configured. To mark an IPv4 static route
as being ineligible for readvertisement, include the no-readvertise statement.
Options readvertise—Readvertise static routes. Include the readvertise statement when configuring
an individual route in the route portion of the static statement to override a
no-readvertise option specified in the defaults portion of the statement.
resolution
Syntax resolution {
rib routing-table-name {
import [ policy-names ];
inet-import [ policy-names ];
inet-resolution-ribs [ routing-table-names ];
inet6-import [ policy-names ];
inet6-resolution-ribs [ routing-table-names ];
iso-import [ policy-names ];
iso-resolution-ribs [ routing-table-names ];
resolution-family resolution-family;
resolution-ribs [ routing-table-names ];
}
}
Description Configure the router to perform custom route resolution on protocol next hops of routes
in a certain routing table. The protocol next hop is used to determine the forwarding next
hop.
For example, you might want to direct inet.2 route resolution to use topology routing
tables :red.inet.0 and :blue.inet.0 for protocol next-hop IP address lookups. Or you might
want to direct bgp.l3vpn.0 to use the information in inet.0 to resolve routes, thus overriding
the default behavior, which is to use inet.3.
You can specify up to two routing tables in the resolution-ribs statement. The route
resolution scheme first checks the first-listed routing table for the protocol next-hop
address. If the address is found, it uses this entry. If it is not found, the resolution scheme
checks the second-listed routing table. Hence, only one routing table is used for each
protocol next-hop address. For example, if you configure resolution rib bgp.l3vpn.0
resolution-ribs [inet.0 inet.3], inet.0 is checked first and then inet.3 is checked.
NOTE: Customizing route resolution might cause the routing protocol process
(rpd) to consume more memory resources than it ordinarily would. When
you customize route resolution, we recommend that you check the memory
resources by running the show system processes and the show task memory
commands. For more information, see Routing Protocol Process Overview.
Options inet-import [ policy-names ]—(Optional) Import policy for IPv4 family resolution tree.
inet6-import [ policy-names ]—(Optional) Import policy for IPv6 family resolution tree.
Enabling the inet6-resolution-ribs option causes the static LSP route resolution to
happen over the more preferred resolving route (lowest protocol preference) among
the longest-matching-prefix routes in both the inet6.0 and inet6.3 routing tables.
iso-import [ policy-names ]—(Optional) Import policy for ISO family resolution tree.
resolution-ribs
Description Specify one or more routing tables to use for route resolution.
This statement enables you to override the default routing tables that Junos OS uses for
route resolution. For example, suppose that the resolution routing table is inet.3, but you
want to allow fallback resolution through inet.0. One example use case is overriding the
bgp.rtarget.0 (family route-target) routing table resolution from using only inet.3 to using
both inet.3 and inet.0.
resolve
Syntax resolve;
Description Statically configure routes to be resolved to a next hop that is not directly connected.
The route is resolved through the inet.0 and inet.3 routing tables.
NOTE: You cannot configure both resolve and retain options for a statically
configured route because resolved next hops cannot be retained.
Default Static routes can point only to a directly connected next hop.
restart-duration
Hierarchy Level [edit logical-systems logical-system-name protocols (isis | ospf | ospf3 | pim)
graceful-restart],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
(ospf | ospf3 | pim) graceful-restart],
[edit protocols (esis | isis | ospf | ospf3 | pim) graceful-restart],
[edit routing-instances routing-instance-name protocols (ospf | ospf3 | pim) graceful-restart],
[edit routing-options graceful-restart]
Additionally, you can individually configure the duration of the graceful restart period for
the End System-to-Intermediate System (ES-IS), Intermediate System-to-Intermediate
System (IS-IS), Open Shortest Path First (OSPF), and OSPFv3 protocols and for Protocol
Independent Multicast (PIM) sparse mode.
Default:
The default value varies according to whether the graceful restart period is being set
globally or for a particular protocol:
• ES-IS—180
• IS-IS—210
• OSPF/OSPFv3—180
• PIM—60
retain
Description Configure statically configured routes to be deleted from or retained in the forwarding
table when the routing protocol process shuts down normally:
NOTE: You cannot configure both retain and resolve options for a statically
configured route because resolved next hops cannot be retained.
Default Statically configured routes are deleted from the forwarding table when the routing
protocol process shuts down normally. Doing this greatly reduces the time required to
restart a system that has a large number of routes in its routing table.
Options no-retain—Delete statically configured routes from the forwarding table when the routing
protocol process shuts down normally. To explicitly specify that routes be deleted
from the forwarding table, include the no-retain statement. Include this statement
when configuring an individual route in the route portion of the static statement to
override a retain option specified in the defaults portion of the statement.
retain—Have a static route remain in the forwarding table when the routing protocol
process shuts down normally. Doing this greatly reduces the time required to restart
a system that has a large number of routes in its routing table.
rib (General)
Explicitly creating a routing table with routing-table-name is optional if you are not adding
any static, martian, aggregate, or generated routes to the routing table and if you also
are creating a routing table group.
NOTE: The IPv4 multicast routing table (inet.1) and the IPv6 multicast routing
table (inet6.1) are not supported for this statement.
Default If you do not specify a routing table name with the routing-table-name option, the software
uses the default routing tables, which are inet.0 for unicast routes and inet.1 for the
multicast cache.
In a routing instance, the routing table name must include the routing instance name.
For example, if the routing instance name is link0, the routing table name might be
link0.inet6.0.
• protocol is the protocol family. It can be inet6 for the IPv6 family, inet for the IPv4 family,
iso for the ISO protocol family, or instance-name.iso.0 for an ISO routing instance.
• identifier is a positive integer that specifies the instance of the routing table.
Default: inet.0
Description Configure which routing table groups interface routes are imported into.
Options group-name—Name of the routing table group. The name must start with a letter and
can include letters, numbers, and hyphens. It generally does not make sense to
specify more than a single routing table group.
Related • Example: Importing Direct and Static Routes Into a Routing Instance on page 53
Documentation
• Example: Exporting Specific Routes from One Routing Table Into Another Routing
Table on page 58
rib-groups
Syntax rib-groups {
group-name {
export-rib group-name;
import-policy [ policy-names ];
import-rib [ group-names ];
}
}
Description Group one or more routing tables to form a routing table group. A routing protocol can
import routes into all the routing tables in the group and can export routes from a single
routing table.
Each routing table group must contain one or more routing tables that Junos OS uses
when importing routes (specified in the import-rib statement) and optionally can contain
one routing table group that Junos OS uses when exporting routes to the routing protocols
(specified in the export-rib statement).
The first routing table you specify is the primary routing table, and any additional routing
tables are the secondary routing tables.
The primary routing table determines the address family of the routing table group. To
configure an IP version 4 (IPv4) routing table group, specify inet.0 as the primary routing
table. To configure an IP version 6 (IPv6) routing table group, specify inet6.0 as the
primary routing table. If you configure an IPv6 routing table group, the primary and all
secondary routing tables must be IPv6 routing tables (inet6.x).
In Junos OS Release 9.5 and later, you can include both IPv4 and IPv6 routing tables in
an IPv4 import routing table group using the import-rib statement. In releases prior to
Junos OS Release 9.5, you can only include either IPv4 or IPv6 routing tables in the same
import-rib statement. The ability to configure an import routing table group with both
IPv4 and IPv6 routing tables enables you, for example, to populate the inet6.3 routing
table with IPv6 addresses that are compatible with IPv4. Specify inet.0 as the primary
routing table, and specify inet6.3 as a secondary routing table.
NOTE: If you configure an import routing table group that includes both IPv4
and IPv6 routing tables, any corresponding export routing table group must
include only IPv4 routing tables.
If you have configured a routing table, configure the OSPF primary instance at the
[edit protocols ospf] hierarchy level with the statements needed for your network so that
routes are installed in inet.0 and in the forwarding table. Make sure to include the routing
table group. For more information, see Example: Configuring Multiple Routing Instances
of OSPF.
After specifying the routing table from which to import routes, you can apply one or more
policies to control which routes are installed in the routing table group. To apply a policy
to routes being imported into the routing table group, include the import-policy statement.
Options group-name—Name of the routing table group. The name must start with a letter and
can include letters, numbers, and hyphens.
Related • Example: Exporting Specific Routes from One Routing Table Into Another Routing
Documentation Table on page 58
route (Access)
Options ip-prefix</prefix-length>—Specific route prefix that you want to assign to the access
route.
route (Access-Internal)
Options ip-prefix</prefix-length>—Specific route prefix that you want to assign to the internal
access route.
route-distinguisher-id
route-record
Syntax route-record;
Description Export the AS path and routing information to the traffic sampling process.
Before you can perform flow aggregation, the routing protocol process must export the
AS path and routing information to the sampling process.
NOTE: Starting with Junos OS Release 15.1, when you commit a minor
configuration change, the routing protocol process sends only AS paths that
are active routes to the FPCs. Not all known AS paths are sent to the FPC,
thereby considerably reducing the memory and CPU usage, resulting in a
faster route record database update.
router-id
The router identifier is used by BGP and OSPF to identify the routing device from which
a packet originated. The router identifier usually is the IP address of the local routing
device. If you do not configure a router identifier, the IP address of the first interface to
come online is used. This is usually the loopback interface. Otherwise, the first hardware
interface with an IP address is used.
NOTE: We strongly recommend that you configure the router identifier under
the [edit routing-options] hierarchy level to avoid unpredictable behavior if
the interface address on a loopback interface changes.
You must configure a router-id in order for BGP and OSPF to function in a routing instance.
Use the show route instance detail command to display the router-id value for a routing
instance. If the router-id is 0.0.0.0, then the routing instance has no router-id.
For more information about the router identifier in OSPF, see Example: Configuring an
OSPF Router Identifier.
NOTE: If you run OSPF for IPv6 or BGP for IPv6 in a routing instance, you
must configure an IPv4 router identifier (router-id) in the routing instance
itself. In other words, the IPv4 router-id in the main routing instance is not
inherited by other routing instances. Even if you run only IPv6 OSPF or BGP
in a routing instance, the IPv4 router-id must be configured because OSPF
and BGP, even when used exclusively with IPv6, use the IPv4 router-id for
handshaking. If you do not configure the IPv4 router-id in the IPv6 OSPF or
BGP routing instance, then the IPv6 protocols will use invalid IPv4 address
0.0.0.0 and the adjacencies and connections will fail.
routing-options
scope
Description Specify the source address for the generic routing encapsulation (GRE) tunnels. The
source address specifies the address used as the source for the local tunnel endpoint.
This address can be any local address on the router, typically the router ID or the loopback
address.
source-routing
Syntax source-routing {
(ip | ipv6)
}
Source routing allows a sender of a packet to partially or completely specify the route
the packet takes through the network. In contrast, in non-source routing protocols, routers
in the network determine the path based on the packet's destination.
Default Disabled
ssm-groups
By default, the SSM group multicast address is limited to the IP address range from
232.0.0.0 through 232.255.255.255. However, you can extend SSM operations into another
Class D range by including the ssm-groups statement in the configuration. The default
SSM address range from 232.0.0.0 through 232.255.255.255 cannot be used in the
ssm-groups statement. This statement is for adding other multicast addresses to the
default SSM group addresses. This statement does not override the default SSM group
address range.
IGMPv3 supports SSM groups. By utilizing inclusion lists, only sources that are specified
send to the SSM group.
Options ip-addresses—List of one or more additional SSM group addresses separated by a space.
Syntax static {
defaults {
static-options;
}
rib-group group-name;
route destination-prefix {
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
local-address ip-address;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
minimum-receive-ttl number;
multiplier number;
neighbor address;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
version (1 | automatic);
}
next-hop address;
next-hop options;
qualified-next-hop address {
bfd-liveness-detection {
authentication {
algorithm (keyed-md5 | keyed-sha-1 | meticulous-keyed-md5 |
meticulous-keyed-sha-1 | simple-password);
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
holddown-interval milliseconds;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
metric metric;
preference preference;
}
static-options;
}
}
Description Configure static routes to be installed in the routing table. You can specify any number
of routes within a single static statement, and you can specify any number of static
options in the configuration.
Options defaults—(Optional) Specify global static route options. These options only set default
attributes inherited by all newly created static routes. These are treated as global
defaults and apply to all the static routes you configure in the static statement.
NOTE: Specifying the global static route options does not create default
routes. These options only set default attributes inherited by all newly created
static routes.
route—Configure individual static routes. In this part of the static statement, you optionally
can configure static route options. These options apply to the individual destination
only and override any options you configured in the defaults part of the static
statement.
When you configure an individual static route in the route part of the static statement,
specify the destination of the route (in route destination-prefix) in one of the following
ways:
• default if this is the default route to the destination. This is equivalent to specifying an
IP address of 0.0.0.0/0.
• nsap-prefix—nsap-prefix is the network service access point (NSAP) address for ISO.
IPv4 or IPv6 address of the next hop to the destination, specified as:
• discard—Do not forward packets addressed to this destination. Instead, drop the
packets, do not send ICMP (or ICMPv6) unreachable messages to the packets’
originators, and install a reject route for this destination into the routing table.
If you use the next-table action, the configuration must include a term qualifier that
specifies a different table than the one specified in the next-table action. In other words,
the term qualifier in the from statement must exclude the table in the next-table action.
In the following example, the first term contains rib vrf-customer2.inet.0 as a matching
condition. The action specifies a next-hop in a different routing table,
vrf-customer1.inet.0. The second term does the opposite by using rib vrf-customer1.inet.0
in the match condition and vrf-customer2.inet.0 In the next-table action.
term 1 {
from {
protocol bgp;
rib vrf-customer2.inet.0;
community customer;
}
then {
next-hop next-table vrf-customer1.inet.0;
}
}
term 2 {
from {
protocol bgp;
rib vrf-customer1.inet.0;
community customer;
}
then {
next-hop next-table vrf-customer2.inet.0;
}
}
NOTE: Within a routing instance, you cannot configure a static route with
the next-table inet.0 statement if any static route in the main routing
instance is already configured with the next-table statement to point to
the inet.0 routing table of the routing instance. For example, if you configure
on the main routing instance a static route 192.168.88.88/32 with the
next-table test.inet.0 statement and the routing instance test is also
configured with a static route 192.168.88.88/32 with the next-table inet.0
statement, the commit operation fails. Instead, you must configure a routing
table group both on the main instance and on the routing instance, which
enables you to install the static route into both routing tables.
• receive—Install a route for this next-hop destination into the routing table.
The receive option forces the packet to be sent to the Routing Engine.
• For receiving packets on a link's subnet address, with zeros in the host portion of the
address
• reject—Do not forward packets addressed to this destination. Instead, drop the packets,
send ICMP (or ICMPv6) unreachable messages to the packets’ originators, and install
a reject route for this destination into the routing table.
You can specify one or more of the following in static-options. Each of the options is
explained separately.
• (active | passive);
• community [ community-ids ];
• (install | no-install);
• (readvertise | no-readvertise);
• (resolve | no-resolve);
• (retain | no-retain);
tag (Access)
Syntax threshold {
log-warning value;
suppress value;
reuse value;
mvpn-rpt-suppress value;
mvpn-rpt-reuse value;
}
Description Configure the suppression, reuse, and warning log message thresholds for multicast
forwarding cache limits. You can configure the thresholds globally for the multicast
forwarding cache or individually for the IPv4 and IPv6 multicast forwarding caches.
Configuring the threshold statement globally for the multicast forwarding cache or
including the family statement to configure the thresholds for the IPv4 and IPv6 multicast
forwarding caches are mutually exclusive.
When MVPN RPT suppression is active, for all PE routers in excess of the threshold
(including RP PEs), MVPN will not add new (*,G) forwarding entries to the
forwarding-cache. Changes are visible once the entries in the current forwarding-cache
have timed out or are deleted.
To use mvpn-rpt-suppress and/or mvpn-rpt-reuse, you must first configure the general
suppress threshold. If suppress is configured but mvpn-rpt-suppress is not, both
mvpn-rpt-suppress and mvpn-rpt-reuse will inherit and use the value set for the general
suppress.
Options reuse or mvpn-rpt-reusevalue (Optional) Value at which to begin creating new multicast
forwarding cache entries. If configured, this number should be less than the suppress
value.
Range: 1 through 200,000
traceoptions
Syntax traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <disable>;
}
Description Define tracing operations that track all routing protocol functionality in the routing device.
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options Values:
disable—(Optional) Disable the tracing operation. You can use this option to disable a
single operation when you have defined a broad group of tracing operations, such
as all.
file filename—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. We
recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then, the oldest trace file
is overwritten. Note that if you specify a maximum number of files, you also must
specify a maximum file size with the size option.
Range: 2 through 1000 files
Default: 10 files
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. These are the global routing protocol tracing
options:
• condition-manager—Condition-manager events
• config-internal—Configuration internals
• general—All normal operations and routing table changes (a combination of the normal
and route trace operations)
• parse—Configuration parsing
• regex-parse—Regular-expression parsing
• state—State transitions
• timer—Timer usage
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then, the oldest trace file is
overwritten. Note that if you specify a maximum file size, you also must specify a
maximum number of trace files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
unicast-reverse-path
Description Control the operation of unicast reverse-path-forwarding check. This statement enables
the RPF check to be used when routing is asymmetrical.
Options active-paths—Consider only active paths during the unicast reverse-path check.
Operational Commands
Description Clear adaptation for Bidirectional Forwarding Detection (BFD) sessions. BFD is a simple
hello mechanism that detects failures in a network. Configured BFD interval timers can
change, adapting to network situations. Use this command to return BFD interval timers
to their configured values.
The clear bfd adaptation command is hitless, meaning that the command does not affect
traffic flow on the routing device.
Additional Information For more information, see the description of the bfd-liveness-detection configuration
statement in the Junos Routing Protocols Configuration Guide.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
discriminator discr-number—(Optional) Drop the local BFD session matching the specified
discriminator.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description Display information about active Bidirectional Forwarding Detection (BFD) sessions.
address address—(Optional) Display information about the BFD session for the specified
neighbor address.
client rsvp-oam
(brief | detail | extensive | summary)
| vpls-oam
(brief | detail | extensive | instance instance-name | summary)—(Optional) Display
information about RSVP-OAM or VPLS-OAM BFD sessions in the specified level of
output. For VPLS-OAM, display the specified level of output or display information
about all of the BFD sessions for the specified VPLS routing instance.
• Example: Configuring BFD for Static Routes for Faster Network Failure Detection on
page 116
Output Fields Table 6 on page 317 describes the output fields for the show bfd session command. Output
fields are listed in the approximate order in which they appear.
Address Address on which the BFD session is active. brief detail extensive
none
State State of the BFD session: Up, Down, Init (initializing), or Failing. brief detail extensive
none
Interface Interface on which the BFD session is active. brief detail extensive
none
Detect Time Negotiated time interval, in seconds, used to detect BFD control packets. brief detail extensive
none
Transmit Interval Time interval, in seconds, used by the transmitting system to send BFD control brief detail extensive
packets. none
Multiplier Negotiated multiplier by which the time interval is multiplied to determine the detail extensive
detection time for the transmitting system.
Session up time How long a BFD session has been established. detail extensive
Client Protocol or process for which the BFD session is active: ISIS, OSPF, DHCP, Static, detail extensive
or VGD.
TX interval Time interval, in seconds, used by the host system to transmit BFD control brief detail extensive
packets. none
RX interval Time interval, in seconds, used by the host system to receive BFD brief detail extensive
control packets. none
keychain Name of the security authentication keychain being used by a specific client. extensive
algo BFD authentication algorithm being used for a specific client: keyed-md5, extensive
keyed-sha-1, meticulous-keyed-md5, meticulous-keyed-sha-1, or simple-password.
mode Level of BFD authentication enforcement being used by a specific client: strict extensive
or loose. Strict enforcement indicates that authentication is configured at both
ends of the session (the default). Loose enforcement indicates that one end of
the session might not be authenticated.
Local diagnostic Local diagnostic information about failing BFD sessions. detail extensive
Following are the expected values for Local Diagnostic output field:
• None—No diagnostic
• CtlExpire—Control detection time expired
• EchoExpire—Echo detection time expired
• NbrSignal—Neighbor signalled session down
• FwdPlaneReset—Forwarding plane reset
• PathDown—Path down
• ConcatPathDown—Concatenated path down
• AdminDown—Administratively down
Remote diagnostic Remote diagnostic information about failing BFD sessions. detail extensive
Following are the expected values for Remote Diagnostic output field:
• None—No diagnostic
• CtlExpire—Control detection time expired
• EchoExpire—Echo detection time expired
• NbrSignal—Neighbor signalled session down
• FwdPlaneReset—Forwarding plane reset
• PathDown—Path down
• ConcatPathDown—Concatenated path down
• AdminDown—Administratively down
Remote state Reports whether the remote system's BFD packets have been received and detail extensive
whether the remote system is receiving transmitted control packets.
Replicated The replicated flag appears when nonstop routing or graceful Routing Engine detail extensive
switchover is configured and the BFD session has been replicated to the backup
Routing Engine.
Min async interval Minimum amount of time, in seconds, between asynchronous control packet extensive
transmissions across the BFD session.
Min slow interval Minimum amount of time, in seconds, between synchronous control packet extensive
transmissions across the BFD session.
Local min TX Minimum amount of time, in seconds, between control packet transmissions extensive
interval on the local system.
Local min RX Minimum amount of time, in seconds, between control packet detections on extensive
interval the local system.
Remote min TX Minimum amount of time, in seconds, between control packet transmissions extensive
interval on the remote system.
Remote min TX Minimum amount of time, in seconds, between control packet detections on extensive
interval the remote system.
Threshold for Threshold for notification if the detection time increases. extensive
detection time
Local discriminator Authentication code used by the local system to identify that BFD session. extensive
Remote Authentication code used by the remote system to identify that BFD session. extensive
discriminator
Echo mode Information about the state of echo transmissions on the BFD session. extensive
Prefix LDP FEC address associated with the BFD session. All levels
Egress, Destination Displays the LDP FEC destination address. This field is displayed only on a router All levels
at the egress of an LDP FEC, where the BFD session has an LDP Operation,
Administration, and Maintenance (OAM) client.
Remote is The BFD session on the remote peer is running on its Packet Forwarding Engine. extensive
control-plane In this case, when the remote node undergoes a graceful restart, the local peer
independent can help the remote peer with the graceful restart.
The following BFD sessions are not distributed to the Packet Forwarding Engine:
tunnel-encapsulated sessions, and sessions over integrated routing and bridging
(IRB) interfaces.
Session ID The BFD session ID number that represents the protection using MPLS fast detail extensive
reroute (FRR) and loop-free alternate (LFA).
clients Total number of clients that are hosting active BFD sessions. All levels
Cumulative Total number of BFD control packets transmitted per second on all All levels
transmit rate active sessions.
Cumulative receive Total number of BFD control packets received per second on all active sessions. All levels
rate
Multi-hop, Minimum time to live (TTL) accepted if the session is configured for multihop. extensive
min-recv-TTL
route table Route table used if the session is configured for multihop. extensive
local address Local address of the source used if the session is configured for multihop. extensive
The source IP address for outgoing BFD packets from the egress side of an
MPLS BFD session is based on the outgoing interface IP address.
Sample Output
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
The output for the show bfd session brief command is identical to that for the show bfd
session command.
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps
1 sessions, 1 clients
Cumulative transmit rate 2.5 pps, cumulative receive rate 2.5 pps
2 sessions, 2 clients
Cumulative transmit rate 200.0 pps, cumulative receive rate 200.0 pps
1 sessions, 1 clients
Cumulative transmit rate 1.2 pps, cumulative receive rate 1.2 pps
20 sessions, 20 clients
1 sessions, 1 clients
Cumulative transmit rate 5.0 pps, cumulative receive rate 5.0 pps
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.6 Up ae0.1 90.000 30.000 3
Detect Transmit
Address State Interface Time Interval Multiplier
1.0.0.2 Up ae0.0 90.000 30.000 3
1 sessions, 1 clients
Cumulative transmit rate 5.0 pps, cumulative receive rate 5.0 pps
show as-path
Description Display the distribution of autonomous system (AS) paths that the local routing device
is using (usually through the routing table). Use this command to debug problems for
AS paths and to understand how AS paths have been manipulated through a policy
(through the as-path-prepend action) or through aggregation.
AS paths are stored in a hash table. A hash table is one method for fast lookup. Each
entry in the table is called a bucket. Junos OS computes a hash value that indicates in
which bucket the AS path is stored. The AS paths are dispersed among the hash buckets
so that a manageable number of AS paths is stored in each bucket. Only unique AS paths
are stored. Duplicate AS paths increase a reference count, but do not increase the number
of AS paths stored in the hash table.
Options none—Display basic information about AS paths that the local routing device is using
(same as brief).
Output Fields Table 7 on page 327 lists the output fields for the show as-path command. Output fields
are listed in the approximate order in which they appear.
AS path AS path through which the route was learned. The letters at the end of the AS All levels
path indicate the path origin, providing an indication of the state of the route at
the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
• Atomic—Route is an aggregate of several route prefixes.
• Aggregator—Routing device has summarized a range of prefixes.
unique-count Number of unique autonomous systems (ASs) present in the AS path detail
Sample Output
show as-path
user@host> show as-path
Total AS paths: 30382
Bucket 0 Count: 36
I
14203 2914 174 31752 I
14203 2914 701 21512 I
14203 2914 1239 26632 I
14203 2914 1239 29704 I
14203 2914 4323 10248 I
14203 2914 4766 23560 I
14203 2914 6395 32776 I
14203 2914 7911 11272 I
14203 2914 12180 18440 I
14203 2914 17408 17416 I
14203 2914 701 702 24586 I
14203 2914 1239 4657 9226 I
...
references 3
AS path: 14203 2914 7911 11272 I
domain 1, neighbor as: 14203, length 4, segments 1, unique-count 6,
references 2
AS path: 14203 2914 12180 18440 I
domain 1, neighbor as: 14203, length 4, segments 1, unique-count 3,
references 3
AS path: 14203 2914 17408 17416 I
domain 1, neighbor as: 14203, length 4, segments 1, unique-count 8,
references 3
AS path: 14203 2914 701 702 24586 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 4,
references 3
AS path: 14203 2914 1239 4657 9226 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 5,
references 7
AS path: 14203 2914 1239 7132 16394 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 7,
references 2
AS path: 14203 2914 1299 8308 34826 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 8,
references 2
AS path: 14203 2914 3320 5603 28682 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 4,
references 2
AS path: 14203 2914 3491 1680 33802 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 14,
references 2
AS path: 14203 2914 3549 7908 27658 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 6,
references 2
AS path: 14203 2914 3549 20804 30730 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 24,
references 2
AS path: 14203 2914 7018 2687 9226 I
domain 1, neighbor as: 14203, length 5, segments 1, unique-count 4,
references 3
AS path: 14203 2914 174 9318 9318 23564 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 2
AS path: 14203 2914 701 3786 3786 23564 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 2
AS path: 14203 2914 701 4761 4795 9228 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 14
AS path: 14203 2914 1239 7132 5673 18444 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 2
AS path: 14203 2914 3491 20485 24588 24588 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 4
AS path: 14203 2914 5511 2200 1945 2060 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 2
AS path: 14203 2914 7911 14325 14325 14348 I
domain 1, neighbor as: 14203, length 6, segments 1, unique-count 4,
references 2
AS path: 14203 2914 701 4637 9230 9230 9230 I
domain 1, neighbor as: 14203, length 7, segments 1, unique-count 4,
references 3
Options none—(Optional) Display AS path domain information for all routing instances.
Output Fields Table 8 on page 331 lists the output fields for the show as-path domain command. Output
fields are listed in the approximate order in which they appear
Sample Output
AS paths are stored in a hash table. A hash table is one method for fast lookup. Each
entry in the table is called a bucket. Junos OS computes a hash value that indicates in
which bucket the AS path is stored. The AS paths are dispersed among the hash buckets
so that a manageable number of AS paths is stored in each bucket. Only unique AS paths
are stored. Duplicate AS paths increase a reference count, but do not increase the number
of AS paths stored in the hash table.
Options none—(Optional) Display AS path summary information for all routing instances.
Output Fields Table 9 on page 334 lists the output fields for the show as-path summary command.
Output fields are listed in the approximate order in which they appear.
Sample Output
Description Display a summary of the state of the router interfaces. Use this command for performing
router diagnostics only, when you are determining whether the routing protocols and the
Junos OS differ about the state of an interface.
Options none—Display summary information about the state of all router interfaces on all logical
systems.
Additional Information For information about how to configure routing protocols, see the Junos OS Routing
Protocols Library. For information about related operational mode commands for routing
instances and protocols, see the CLI Explorer.
Output Fields Table 10 on page 336 lists the output fields for the show interfaces routing summary
command. Output fields are listed in the approximate order in which they appear.
n protocol protocol Type and number of routing protocols and number of related
interfaces interfaces in the up state.
Trans Number of times the interface has transitioned from Down to Up.
Sample Output
show route
Options none—Display brief information about all active entries in the routing tables.
all—(Optional) Display information about all routing tables, including private, or internal,
routing tables.
private—(Optional) Display information only about all private, or internal, routing tables.
Output Fields Table 11 on page 340 describes the output fields for the show route command. Output
fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
destination-prefix Route destination (for example:10.0.0.1/24). Sometimes the route information is presented in another
format, such as:
[ protocol, preference ] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
weeks:days How long the route been known (for example, 2w4d 13:11:14, or 2 weeks, 4 days, 13 hours, 11 minutes,
hours:minutes:seconds and 14 seconds).
metric Cost value of the indicated route. For routes within an AS, the cost is determined by the IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the local AS number associated with the AS path if more than one AS number
is configured on the routing device, or if AS path prepending is configured.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
encapsulated Extended next-hop encoding capability enabled for the specified BGP community for routing IPv4
traffic over IPv6 tunnels. When BGP receives routes without the tunnel community, V40V6 tunnels
are not created and BGP routes are resolved without encapsulation.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that the origin of the prefix is not verified against the database. This is because
the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
to Next hop to the destination. An angle bracket (>) indicates that the route is the selected route.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
interface that is actually used is followed by the word Selected. This field can also contain the following
information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
• lsp-path-name—Name of the LSP used to reach the next hop.
• label-action—MPLS label and operation occurring at the next hop. The operation can be pop (where
a label is removed from the top of the stack), push (where another label is added to the label stack),
or swap (where a label is replaced by another label). For VPNs, expect to see multiple push
operations, corresponding to the inner and outer labels required for VPN routes (in the case of a
direct PE-to-PE connection, the VPN route would have the inner label push only).
Private unicast (Enhanced subscriber management for MX Series routers) Indicates that an access-internal route is
managed by enhanced subscriber management. By contrast, access-internal routes not managed
by enhanced subscriber management are displayed with associated next-hop and media access
control (MAC) address information.
balance Distribution of the load based on the underlying operational interface bandwidth for equal-cost
multipaths (ECMP) across the nexthop gateways in percentages.
Sample Output
show route
user@host> show route
inet.0: 11 destinations, 12 routes (11 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1:65500:1:10.0.0.20/240
*[MVPN/70] 19:53:41, metric2 1
Indirect
1:65500:1:10.0.0.40/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
[BGP/170] 19:53:26, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
1:65500:1:10.0.0.60/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
[BGP/170] 19:53:25, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
The following sample output shows a VPN route with composite next hops enabled. The
first Push operation corresponds to the outer label. The second Push operation
corresponds to the inner label.
2001:db8::10:255:185:19/128
*[Direct/0] 05:11:27
> via lo0.0
2001:db8::11:11:11:0/120
*[BGP/170] 00:28:58, localpref 100
AS path: 2000 I, validation-state: unverified
> to 2001:db8::13:14:2:2 via ge-1/1/4.0
2001:db8::13:14:2:0/120*[Direct/0] 00:45:07
> via ge-1/1/4.0
2001:db8::13:14:2:1/128*[Local/0] 00:45:18
Local via ge-1/1/4.0
fe80::2a0:a50f:fc71:71d5/128
*[Direct/0] 05:11:27
> via lo0.0
fe80::5e5e:abff:feb0:933e/128
*[Local/0] 00:45:18
Local via ge-1/1/4.0
2001:db8::11:11:11:10/128,*,proto=6,dstport=80,srcport=65535/term:1
*[BGP/170] 00:28:58, localpref 100, from 2001:db8::13:14:2:2
AS path: 2000 I, validation-state: unverified
Fictitious
2001:db8::11:11:11:30/128,*,icmp6-type=128,len=100,dscp=10/term:2
*[BGP/170] 00:20:54, localpref 100, from 2001:db8::13:14:2:2
AS path: 2000 I, validation-state: unverified
Fictitious
*[IS-IS/18] 00:01:01
Fictitious
PREFIX { Node { AS:100 ISO:0100.0505.0505.00 } { IPv4:10.10.10.10/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:01:01
Fictitious
PREFIX { Node { AS:100 ISO:0100.0606.0606.00 } { IPv4:10.10.10.10/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:01:01
Fictitious
PREFIX { Node { AS:100 ISO:0100.0707.0707.00 } { IPv4:10.10.10.10/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:01:01
Fictitious
PREFIX { Node { AS:100 ISO:0100.0a0a.0a0a.00 } { IPv4:10.10.10.10/32 } ISIS-L2:0
}/1152
*[IS-IS/18] 00:01:01
Fictitious
Address: 0xa1a2ac4
Next-hop reference count: 298
Next hop:
State: <Active NotInstall>
Local AS: 100
Age: 7:58
Validation State: unverified
Task: IS-IS
AS path: I
Prefix SID: 1000, Flags: 0xe0, Algo: 0
Task: IS-IS
AS path: I
Prefix SID: 1005, Flags: 0xe0, Algo: 0
Description Display all active routes for destinations. An active route is a route that is selected as the
best path. Inactive routes are not displayed.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
The output for the show route active-path brief command is identical to that for the show
route active-path command. For sample output, see show route active-path on page 357.
AS path: I
AS path: I
AS path: I
TSI:
KRT in-kernel 10.255.71.50/32 -> {172.16.100.1}
IS-IS level 2, LSP fragment 0
*IS-IS Preference: 15
Level: 1
Next hop type: Router, Next hop index: 397
Next-hop reference count: 4
Next hop: 172.16.100.1 via so-2/1/3.0, selected
State: ‹Active Int›
Local AS: 200
Age: 24:08 Metric: 10
Task: IS-IS
Announcement bits (4): 0-KRT 2-IS-IS 5-Resolve tree 2 6-Resolve
tree 3
AS path: I
AS path: I
Description Display information about all routes in all routing tables, including private, or internal,
tables.
Options none—Display information about all routes in all routing tables, including private, or
internal, tables.
Output Fields In Junos OS Release 9.5 and later, only the output fields for the show route all command
display all routing tables, including private, or hidden, routing tables. The output field
table of the show route command does not display entries for private, or hidden, routing
tables in Junos OS Release 9.5 and later.
Sample Output
The following example displays a snippet of output from the show route command and
then displays the same snippet of output from the show route all command:
Receive
1 *[MPLS/0] 2d 02:24:39, metric 1
Receive
2 *[MPLS/0] 2d 02:24:39, metric 1
Receive
800017 *[VPLS/7] 1d 14:00:16
> via vt-3/2/0.32769, Pop
800018 *[VPLS/7] 1d 14:00:26
> via vt-3/2/0.32772, Pop
Description Display the route in the routing table that is the best route to the specified address or
range of addresses. The best route is the longest matching route.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Age: 2d 1:44:20
Task: IF
AS path: I
Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via fxp1.0, selected
State: <NotBest Int>
Inactive reason: No difference
Age: 2d 1:44:20
Task: IF
AS path: I
The output for the show route best extensive command is identical to that for the show
route best detail command. For sample output, see show route best detail on page 365.
Description Display brief information about the active entries in the routing tables.
Output Fields For information about output fields, see the Output Field table of the show route
command.
Sample Output
Description Shows the cumulative number of either IPv4 or IPv6 routes in the VRF table.
vpn-family (inet.0 | inet6.0)— Enter inet.0 for IPv4 routes or inet6.0 for IPv6 routes.
Output Fields
destinations Number of destinations for which there are VRF routes in the routing table.
Sample Output
Description Display detailed information about the active entries in the routing tables.
Options none—Display all active entries in the routing table on all systems.
Output Fields Table 12 on page 370 describes the output fields for the show route detail command.
Output fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
route-destination Route destination (for example:10.0.0.1/24). The entry value is the number of routes for this destination,
(entry, announced) and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:
label stacking (Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the
label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.
• S=0 route indicates that a packet with an incoming label stack depth of 2 or more exits this routing
device with one fewer label (the label-popping operation is performed).
• If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).
[protocol, preference] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value.
Preference2 values are signed integers, that is, Preference2 values can be either positive or negative
values. However, Junos OS evaluates Preference2 values as unsigned integers that are represented
by positive values. Based on the Preference2 values, Junos OS evaluates a preferred route differently
in the following scenarios:
• Route A = 4294967096
• Route B = 200
Here, Junos OS considers the lesser Preference2 value and Route B with a Preference2 value of 200
is preferred because it is less than 4294967096.
• Combination of signed and unsigned Preference2 values
When Preference2 values of two routes are compared, and for one route the Preference2 is a signed
value, and for the other route it is an unsigned value, Junos OS prefers the route with the positive
Preference2 value over the negative Preference2 value. For example, consider the following signed
and unsigned Preference2 values:
• Route A = -200
• Route B = 200
In this case, Route B with a Preference2 value of 200 is preferred although this value is greater than
-200, because Junos OS evaluates only the unsigned value of the Preference2 value.
Level (IS-IS only). In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into smaller areas.
This organization is accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1
systems route within an area. When the destination is outside an area, they route toward a Level 2
system. Level 2 intermediate systems route between areas and toward other ASs.
Next-hop type Type of next hop. For a description of possible values for this field, see Table 13 on page 376.
Flood nexthop branches Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
exceed maximum only a subset of the flood next-hop branches were installed in the kernel.
message
Next hop Network layer address of the directly reachable neighboring system.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
Label operation MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).
Protocol next hop Network layer address of the remote routing device that advertised the prefix. This address is used
to derive a forwarding next hop.
Indirect next hop Index designation used to specify the mapping between protocol next hops, tags, kernel export policy,
and the forwarding next hops.
State State of the route (a route can be in more than one state). See Table 14 on page 378.
Metricn Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
MED-plus-IGP Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.
TTL-Action For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
Announcement bits The number of BGP peers or protocols to which Junos OS has announced this route, followed by the
list of the recipients of the announcement. Junos OS can also announce the route to the KRT for
installing the route into the Packet Forwarding Engine, to a resolve tree, a L2 VC, or even a VPN. For
example, n-Resolve inet indicates that the specified route is used for route resolution for next hops
found in the routing table.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• Recorded—The AS path is recorded by the sample process (sampled).
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the number that precedes the AS path. This number represents the number
of ASs present in the AS path, when calculated as defined in RFC 4271. This value is used in the
AS-path merge process, as defined in RFC 4893.
• [ ]—If more than one AS number is configured on the routing device, or if AS path prepending is
configured, brackets enclose the local AS number associated with the AS path.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that the origin of the prefix is not verified against the database. This is because
the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
ORR Generation-ID Displays the optimal route reflection (ORR) generation identifier. ISIS and OSPF interior gateway
protocol (IGP) updates filed whenever any of the corresponding ORR route has its metric valued
changed, or if the ORR route is added or deleted.
FECs bound to route Point-to-multipoint root address, multicast source address, and multicast group address when
multipoint LDP (M-LDP) inband signaling is configured.
Primary Upstream When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, the primary upstream
path. MoFRR transmits a multicast join message from a receiver toward a source on a primary path,
while also transmitting a secondary multicast join message from the receiver toward the source on
a backup path.
RPF Nexthops When multipoint LDP with MoFRR is configured, the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.
Label Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.
weight Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.
Prefixes bound to route Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.
Communities Community path attribute for the route. See Table 15 on page 380 for all possible values for this field.
Label-Base, range First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.
status vector Layer 2 VPN and VPLS network layer reachability information (NLRI).
Accepted The LongLivedStale flag indicates that the route was marked LLGR-stale by this router, as part of the
LongLivedStale operation of LLGR receiver mode. Either this flag or the LongLivedStaleImport flag may be displayed
for a route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accepted The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
LongLivedStaleImport from a peer, or by import policy. Either this flag or the LongLivedStale flag may be displayed for a
route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and import into the inet.0 routing table
ImportAccepted Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
LongLivedStaleImport configured neighbors and imported into the inet.0 routing table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy.
Primary Routing Table In a routing table group, the name of the primary routing table in which the route resides.
Secondary Tables In a routing table group, the name of one or more secondary tables in which the route resides.
Table 13 on page 376 describes all possible values for the Next-hop Types output field.
Indirect (indr) Used with applications that have a protocol next hop
address that is remote. You are likely to see this next-hop
type for internal BGP (IBGP) routes when the BGP next
hop is a BGP neighbor that is not directly connected.
Unilist (ulst) List of unicast next hops. A packet sent to this next hop
goes to any next hop in the list.
Table 14 on page 378 describes all possible values for the State output field. A route can
be in more than one state (for example, <Active NoReadvrt Int Ext>).
Always Compare MED Path with a lower multiple exit discriminator (MED) is
available.
Cisco Non-deterministic MED Cisco nondeterministic MED is enabled, and a path with a
selection lower MED is available.
Cluster list length Length of cluster list sent by the route reflector.
Ex Exterior route.
IGP metric Path through next hop with lower IGP metric is available.
Inactive reason Flags for this route, which was not selected as best for a
particular destination.
Int Ext BGP route received from an internal BGP peer or a BGP
confederation peer.
Interior > Exterior > Exterior via Direct, static, IGP, or EBGP path is available.
Interior
Next hop address Path with lower metric next hop is available.
NotBest Route not chosen because it does not have the lowest MED.
Not Best in its group Incoming BGP AS is not the best of a group (only one AS can
be the best).
Route Metric or MED comparison Route with a lower metric or MED is available.
Unusable path Path is not usable because of one of the following conditions:
Table 15 on page 380 describes the possible values for the Communities output field.
area-number 4 bytes, encoding a 32-bit area number. For AS-external routes, the value is 0. A nonzero value
identifies the route as internal to the OSPF domain, and as within the identified area. Area
numbers are relative to a particular OSPF domain.
bandwidth: local AS Link-bandwidth community value used for unequal-cost load balancing. When BGP has
number:link-bandwidth-number several candidate paths available for multipath purposes, it does not perform unequal-cost
load balancing according to the link-bandwidth community unless all candidate paths have
this attribute.
domain-id-vendor Unique configurable number that further identifies the OSPF domain.
options 1 byte. Currently this is only used if the route type is 5 or 7. Setting the least significant bit in
the field indicates that the route carries a type 2 metric.
origin (Used with VPNs) Identifies where the route came from.
ospf-route-type 1 byte, encoded as 1 or 2 for intra-area routes (depending on whether the route came from a
type 1 or a type 2 LSA); 3 for summary routes; 5 for external routes (area number must be0);
7 for NSSA routes; or 129 for sham link endpoint addresses.
route-type-vendor Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x8000. The format is
area-number:ospf-route-type:options.
rte-type Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x0306. The format is
area-number:ospf-route-type:options.
target Defines which VPN the route participates in; target has the format 32-bit IP address:16-bit
number. For example, 10.19.0.0:100.
unknown IANA Incoming IANA codes with a value between 0x1 and 0x7fff. This code of the BGP extended
community attribute is accepted, but it is not recognized.
unknown OSPF vendor Incoming IANA codes with a value above 0x8000. This code of the BGP extended community
community attribute is accepted, but it is not recognized.
Sample Output
Interface: so-0/3/0.0
State: <Active NoReadvrt Int>
Local AS: 69
Age: 1:30:20
Task: IF
Announcement bits (1): 3-Resolve tree 2
AS path: I
...
...
...
...
Address: 0x92544f0
Next-hop reference count: 2
Next hop: 172.16.0.2 via lt-1/2/0.7 weight 0x1
Label-switched-path R2-to-R200-p2mp
Label operation: Pop
Next hop: 172.16.0.2 via lt-1/2/0.5 weight 0x8001
Label operation: Pop
State: <Active Int>
Age: 1:29 Metric: 1
Task: RSVP
Announcement bits (1): 0-KRT
AS path: I...
Age: 1:31:44
Task: IF
AS path: I
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Label-base: 800008, range: 8
Localpref: 100
Router ID: 10.255.70.103
Primary Routing Table bgp.l2vpn.0
...
Task: BGP_2.10.1.1.6+58198
AS path: 2 I
Accepted MultipathContrib
Localpref: 100
Router ID: 172.16.1.3
show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint LSPs)
user@host> show route label 299872 detail
mpls.0: 13 destinations, 13 routes (13 active, 0 holddown, 0 hidden)
299872 (1 entry, 1 announced)
*LDP Preference: 9
Next hop type: Flood
Next-hop reference count: 3
Address: 0x9097d90
Next hop: via vt-0/1/0.1
Next-hop index: 661
Label operation: Pop
Address: 0x9172130
Next hop: via so-0/0/3.0
Next-hop index: 654
Label operation: Swap 299872
State: **Active Int>
Local AS: 1001
Age: 8:20 Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
FECs bound to route: P2MP root-addr 10.255.72.166, grp 232.1.1.1,
src 192.168.142.2
show route label detail (Multipoint LDP with Multicast-Only Fast Reroute)
user@host> show route label 301568 detail
Description Display only the routes that exactly match the specified address or range of addresses.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Description Display policy-based route export information. Policy-based export simplifies the process
of exchanging route information between routing instances.
Options none—(Same as brief.) Display standard information about policy-based export for all
instances and routing tables on all systems.
Output Fields Table 16 on page 393 lists the output fields for the show route export command. Output
fields are listed in the approximate order in which they appear.
Table or table-name Name of the routing tables that either import or export routes. All levels
Routes Number of routes exported from this table into other tables. If a particular route brief none
is exported to different tables, the counter will only increment by one.
Export Whether the table is currently exporting routes to other tables: Y or N (Yes or No). brief none
Import Tables currently importing routes from the originator table. (Not displayed for detail
tables that are not exporting any routes.)
Flags (instance keyword only) Flags for this feature on this instance: detail
• config auto-policy—The policy was deduced from the configured IGP export
policies.
• cleanup—Configuration information for this instance is no longer valid.
• config—The instance was explicitly configured.
Options (instance keyword only) Configured option displays the type of routing tables the detail
feature handles:
• unicast—Indicates instance.inet.0.
• multicast—Indicates instance.inet.2.
• unicast multicast—Indicates instance.inet.0 and instance.inet.2.
Import policy (instance keyword only) Policy that route export uses to construct the import-export detail
matrix. Not displayed if the instance type is vrf.
Type (instance keyword only) Type of routing instance: forwarding, non-forwarding, or detail
vrf.
Sample Output
Description Display the VPN routing and forwarding (VRF) target communities for which policy-based
route export is currently distributing routes. This command is relevant when there are
overlapping virtual private networks (VPNs).
brief | detail—(Optional) Display the specified level of output. If you do not specify a
level of output, the system defaults to brief.
Output Fields Table 17 on page 395 lists the output fields for the show route export vrf-target command.
Output fields are listed in the approximate order in which they appear.
Route target Target communities for which auto-export is currently distributing routes. brief none
Family Routing table entries for the specified family. brief none
• unicast—Indicates instance.inet.0.
• multicast—Indicates instance.inet.2.
• unicast multicast—Indicates instance.inet.0 and instance.inet.2.
Import Number of routing tables that are currently importing routes with this target brief none
community. Omitted for tables that are not importing routes.
Export Number of routing tables that are currently exporting routes with this target brief none
community. Omitted for tables that are not exporting routes.
Target Target communities, family, and options for which auto-export is currently detail
distributing routes.
Import table(s) Name of the routing tables that are importing a particular route target. detail
Export table(s) Name of the routing tables that are exporting a particular route target. detail
Sample Output
List of Sample Output show route forwarding-table interface-name fe-0/1/1 on page 398
show route forwarding-table interface-name all on page 398
show route forwarding-table interface-name all detail on page 399
Output Fields Table 18 on page 397 lists the output fields for the show route forwarding-table
interface-name command. Output fields are listed in the approximate order in which they
appear.
Name Name of the interface (for example fe-0/1/1, lo0, ae0, and so on). All levels
Afam Configured address family (for example inet, tnp, inet6, and so on). detail extensive
Address Address of the interface. The address can be a MAC address, IPv4 address, IPv6 All levels
address, and so on.
Ierr Number of packets received on the interface with errors. All levels
Opkts Number of packets transmitted or sent from the interface. All levels
Oerr Number of packets transmitted or sent from the interface with errors. All levels
Coll Number of packets that experienced collisions on the interface. All levels
Sample Output
...
...
Description Display only hidden route information. A hidden route is unusable, even if it is the best
path.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field table for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Unusable
10.12.1.0/24 [BGP/170] 03:44:10, localpref 100, from 10.4.4.4
AS path: 100 I
Unusable
10.12.80.4/30 [BGP/170] 03:44:10, localpref 100, from 10.4.4.4
AS path: I
Unusable
...
...
The output for the show route hidden extensive command is identical to that of the show
route hidden detail command. For sample output, see show route hidden detail on
page 401.
Description Display routes for destinations that have no active route. An inactive route is a route that
was not selected as the best path.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Restart Complete
+ = Active Route, - = Last Active, * = Both
The output for the show route inactive-path extensive command is identical to that of
the show route inactive-path detail command. For sample output, see show route
inactive-path detail on page 404.
Options none—(Same as brief) Display standard information about all routing instances.
brief | detail | summary—(Optional) Display the specified level of output. If you do not
specify a level of output, the system defaults to brief. (These options are not available
with the operational keyword.)
Related • Example: Transporting IPv6 Traffic Across IPv4 Using Filter-Based Tunneling
Documentation
• Example: Configuring the Helper Capability Mode for OSPFv3 Graceful Restart
Output Fields Table 19 on page 408 lists the output fields for the show route instance command. Output
fields are listed in the approximate order in which they appear.
Operational Routing Instances (operational keyword only) Names of all operational routing —
instances.
Type Type of routing instance: forwarding, l2vpn, no-forwarding, vpls, All levels
virtual-router, or vrf.
State State of the routing instance: active or inactive. brief detail none
Interfaces Name of interfaces belonging to this routing instance. brief detail none
Restart State Status of graceful restart for this instance: Pending or Complete. detail
Path selection timeout Maximum amount of time, in seconds, remaining until graceful detail
restart is declared complete. The default is 300.
Tables Tables (and number of routes) associated with this routing instance. brief detail none
Route-distinguisher Unique route distinguisher associated with this routing instance. detail
Vrf-import VPN routing and forwarding instance import policy name. detail
Vrf-export VPN routing and forwarding instance export policy name. detail
Vrf-import-target VPN routing and forwarding instance import target community detail
name.
Vrf-export-target VPN routing and forwarding instance export target community name. detail
Fast-reroute-priority Fast reroute priority setting for a VPLS routing instance: high, medium, detail
or low. The default is low.
Primary rib Primary table for this routing instance. brief none summary
Sample Output
Restart Complete
BGP-L:
Router ID: 10.69.104.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.104
Route-distinguisher: 10.255.14.176:104
Vrf-import: [ BGP-L-import ]
Vrf-export: [ BGP-L-export ]
Tables:
BGP-L.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
BGP-L.mpls.0 : 3 routes (3 active, 0 holddown, 0 hidden)
Restart Complete
L2VPN:
Router ID: 0.0.0.0
Type: l2vpn State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.512
Route-distinguisher: 10.255.14.176:512
Vrf-import: [ L2VPN-import ]
Vrf-export: [ L2VPN-export ]
Tables:
L2VPN.l2vpn.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
LDP:
Router ID: 10.69.105.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.105
Route-distinguisher: 10.255.14.176:105
Vrf-import: [ LDP-import ]
Vrf-export: [ LDP-export ]
Tables:
LDP.inet.0 : 5 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
OSPF:
Router ID: 10.69.101.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.101
Route-distinguisher: 10.255.14.176:101
Vrf-import: [ OSPF-import ]
Vrf-export: [ OSPF-export ]
Vrf-import-target: [ target:11111
Tables:
OSPF.inet.0 : 8 routes (7 active, 0 holddown, 0 hidden)
Restart Complete
RIP:
Router ID: 10.69.102.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.102
Route-distinguisher: 10.255.14.176:102
Vrf-import: [ RIP-import ]
Vrf-export: [ RIP-export ]
Tables:
RIP.inet.0 : 6 routes (6 active, 0 holddown, 0 hidden)
Restart Complete
STATIC:
Router ID: 10.69.100.1
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.100
Route-distinguisher: 10.255.14.176:100
Vrf-import: [ STATIC-import ]
Vrf-export: [ STATIC-export ]
Tables:
STATIC.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
master
default
LDP.inet6.0 0/0/0
LDP.l2circuit.0 0/0/0
OSPF vrf
OSPF.inet.0 7/0/0
OSPF.iso.0 0/0/0
OSPF.inet6.0 0/0/0
RIP vrf
RIP.inet.0 6/0/0
RIP.iso.0 0/0/0
RIP.inet6.0 0/0/0
STATIC vrf
STATIC.inet.0 4/0/0
STATIC.iso.0 0/0/0
STATIC.inet6.0 0/0/0
Options brief | detail | extensive | terse—(Optional) Display the specified level of output.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Release Information Command introduced in Junos OS Release 11.4 for T-Series routers.
Command introduced in Junos OS Release 12.3 for MX Series routers.
Description (T320, T640, and T1600 routers only) Display route localization details.
Output Fields Table 20 on page 417 lists the output fields for the show route localization command.
Output fields are listed in the approximate order in which they appear.
Protocols IPv4 (inet) or IPv6 (inet6) traffic configured for route localization.
Sample Output
Description Display the martian (invalid and ignored) entries associated with each routing table.
Options none—Display standard information about route martians for all routing tables.
Related • Example: Configuring Class E Martian Addresses for Routing on page 160
Documentation
• Understanding Martian Addresses on page 159
Output Fields Table 21 on page 419 lists the output fields for the show route martians command. Output
fields are listed in the approximate order in which they appear
table-name Name of the route table in which the route martians reside.
Sample Output
inet.0:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
inet.1:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
inet.2:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
inet.3:
0.0.0.0/0 exact -- allowed
0.0.0.0/8 orlonger -- disallowed
127.0.0.0/8 orlonger -- disallowed
192.0.0.0/24 orlonger -- disallowed
240.0.0.0/4 orlonger -- disallowed
224.0.0.0/4 exact -- disallowed
224.0.0.0/24 exact -- disallowed
...
inet6.0:
::1/128 exact -- disallowed
ff00::/8 exact -- disallowed
ff02::/16 exact -- disallowed
inet6.1:
::1/128 exact -- disallowed
inet6.2:
::1/128 exact -- disallowed
ff00::/8 exact -- disallowed
ff02::/16 exact -- disallowed
inet6.3:
::1/128 exact -- disallowed
ff00::/8 exact -- disallowed
ff02::/16 exact -- disallowed
...
Description Display the entries in the routing table that are being sent to the specified next-hop
address.
Options brief | detail | extensive | terse—(Optional) Display the specified level of ouput.
next-hop—Next-hop address.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
Local AS: 1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
Description Display the route entries in the routing table that were learned from a particular protocol.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
• ccc—Circuit cross-connect
• frr—Precomputed protection route or backup route used when a link goes down
• l2circuit—Layer 2 circuit
• local—Local address
• tunnel—Dynamic tunnel
NOTE: EX Series switches run a subset of these protocols. See the switch
CLI for details.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
State:
*BGP Preference: 1/-101
Next hop type: Indirect, Next hop index: 0
Address: 0xc007f30
Next-hop reference count: 2
Source: 1.1.1.1
Next hop type: Router, Next hop index: 614
Next hop: 20.1.1.2 via ge-0/0/1.0, selected
Label-switched-path lsp1
Label operation: Push 1000126, Push 1000125, Push 1000124, Push 1000123, Push
299872(top)
Label TTL action: prop-ttl, prop-ttl, prop-ttl, prop-ttl, prop-ttl(top)
Load balance label: Label 1000126: None; Label 1000125: None; Label 1000124: None;
Label 1000123: None; Label 299872: None;
Label element ptr: 0xc007860
Label parent element ptr: 0xc0089a0
Label element references: 1
Label element child references: 0
Label element lsp id: 0
Session Id: 0x140
Protocol next hop: 1.1.1.4
Label operation: Push 1000126, Push 1000125, Push 1000124, Push 1000123(top)
Label TTL action: prop-ttl, prop-ttl, prop-ttl, prop-ttl
Load balance label: Label 1000126: None; Label 1000125: None; Label 1000124: None;
Label 1000123: None;
Indirect next hop: 0xae8d300 1048576 INH Session ID: 0x142
State:
Local AS: 5 Peer AS: 5
Age: 22:43 Metric2: 2
Validation State: unverified
Task: BGP_5.1.1.1.1
Announcement bits (2): 0-KRT 7-Resolve tree 2
AS path: I
Accepted
Route Labels: 1000123(top) 1000124 1000125 1000126
Localpref: 100
Router ID: 1.1.1.1
inet.0: 335827 destinations, 335828 routes (335378 active, 0 holddown, 450 hidden)
192.168.64.0/21 (1 entry, 1 announced)
TSI:
KRT in-kernel 1.9.0.0/16 -> {indirect(342)}
Page 0 idx 1 Type 1 val db31a80
Nexthop: Self
AS path: [69] 10458 14203 2914 4788 4788 I
Communities: 2914:410 2914:2403 2914:3400
Path 1.9.0.0 from 192.168.69.71 Vector len 4. Val: 1
*BGP Preference: 170/-101
Next hop type: Indirect
Next-hop reference count: 1006502
Source: 192.168.69.71
Next hop type: Router, Next hop index: 324
Next hop: 192.168.167.254 via fxp0.0, selected
Protocol next hop: 192.168.69.71
Indirect next hop: 8e166c0 342
State: <Active Ext>
Local AS: 69 Peer AS: 10458
inet.0: 335843 destinations, 335844 routes (335394 active, 0 holddown, 450 hidden)
+ = Active Route, - = Last Active, * = Both
47.0005.80ff.f800.0000.0108.0001.0102.5516.5001/152
*[Direct/0] 25w4d 04:13:21
> via lo0.0
2001:db8::10:255:165:1/128
*[Direct/0] 25w4d 04:13:21
> via lo0.0
fe80::2a0:a5ff:fe12:ad7/128
...
Options none—Display standard information about all routing table entries using a prefix range.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
...
...
Description Display the entries in the next-hop resolution database. This database provides for
recursive resolution of next hops through other prefixes in the routing table.
Options none—Display standard information about all entries in the next-hop resolution database.
Output Fields Table 22 on page 448 describes the output fields for the show route resolution command.
Output fields are listed in the approximate order in which they appear.
routing-table-name Name of the routing table whose prefixes are resolved using the entries in the
route resolution database. For routing table groups, this is the name of the
primary routing table whose prefixes are resolved using the entries in the route
resolution database.
Originating RIB Name of the routing table whose active route was used to determine the
forwarding next-hop entry in the resolution database. For example, in the case
of inet.0 resolving through inet.0 and inet.3, this field indicates which routing
table, inet.0 or inet.3, provided the best path for a particular prefix.
Forwarding next Number of forwarding next hops. The forwarding next hop is the network layer
hops address of the directly reachable neighboring system (if applicable) and the
interface used to reach it.
Sample Output
Forwarding nexthops: 1
10.31.1.5/32 Originating RIB: inet.0
Node path count: 1
Forwarding nexthops: 0
10.31.2.0/30 Originating RIB: inet.0
Metric: 2 Node path count: 1
Forwarding nexthops: 2
10.31.11.0/24 Originating RIB: inet.0
Node path count: 1
Forwarding nexthops: 1
Description Display the entries in the routing table that were learned from snooping.
Options none—Display the entries in the routing table that were learned from snooping.
brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
best address/prefix—(Optional) Display the longest match for the provided address and
optional prefix.
exact address/prefix—(Optional) Display exact matches for the provided address and
optional prefix.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
<snip>
logical-system: default
0.0,0.1,0.0,232.1.1.65,100.1.1.2/112*[Multicast/180] 00:07:36
Multicast (IPv4) Composite
0.0,0.1,0.0,232.1.1.66,100.1.1.2/112*[Multicast/180] 00:07:36
Multicast (IPv4) Composite
0.0,0.1,0.0,232.1.1.67,100.1.1.2/112*[Multicast/180] 00:07:36
<snip>
Restart Complete
+ = Active Route, - = Last Active, * = Both
0.15,0.1,0.0,0.0.0.0,0.0.0.0,2/120*[Multicast/180] 00:08:21
Multicast (IPv4) Composite
0.15,0.1,0.0,0.0.0.0,0.0.0.0,2,17/128*[Multicast/180] 00:08:21
Multicast (IPv4) Composite
<snip>
Description Display the entries in the routing table that were learned from a particular address. The
Source field in the show route detail command output lists the source for each route, if
known.
Options brief | detail | extensive | terse—(Optional) Display the specified level of output. If you
do not specify a level of output, the system defaults to brief.
Output Fields For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.
Sample Output
10.255.70.103:1:3:1/96
*[BGP/170] 12:12:24, localpref 100, from 10.255.70.103
AS path: I
> via so-0/3/0.0, label-switched-path green-r1-r3
10.255.70.103:2:3:1/96
*[BGP/170] 12:12:24, localpref 0, from 10.255.70.103
AS path: I
> via so-0/3/0.0, label-switched-path green-r1-r3
10.255.70.103:1:3:1/96
*[BGP/170] 12:12:24, localpref 100, from 10.255.70.103
AS path: I
> via so-0/3/0.0, label-switched-path green-r1-r3
10.255.70.103:2:3:1/96
*[BGP/170] 12:12:24, localpref 0, from 10.255.70.103
AS path: I
> via so-0/3/0.0, label-switched-path green-r1-r3
Restart Complete
10.255.70.103:1:3:1/96 (1 entry, 1 announced)
*BGP Preference: 170/-101
Route Distinguisher: 10.255.70.103:1
Next-hop reference count: 7
Source: 10.255.70.103
Protocol next hop: 10.255.70.103
Indirect next hop: 2 no-forward
State: <Secondary Active Int Ext>
Local AS: 69 Peer AS: 69
Age: 12:14:00 Metric2: 1
Task: BGP_69.10.255.70.103+179
Announcement bits (1): 0-green-l2vpn
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Label-base: 800008, range: 8
Localpref: 100
Router ID: 10.255.70.103
Primary Routing Table bgp.l2vpn.0
Task: BGP_69.10.255.70.103+179
Announcement bits (1): 0-green-l2vpn
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Label-base: 800008, range: 8
Localpref: 100
Router ID: 10.255.70.103
Primary Routing Table bgp.l2vpn.0
Forwarding nexthops: 1
Nexthop: via so-0/3/0.0
Description Display summary statistics about the entries in the routing table.
CPU utilization might increase while the device learns routes. We recommend that you
use the show route summary command after the device learns and enters the routes into
the routing table. Depending on the size of your network, this might take several minutes.
If you receive a “timeout communicating with routing daemon” error when using the show
route summary command, wait several minutes before attempting to use the command
again. This is not a critical system error, but you might experience a delay in using the
command-line interface (CLI).
Options none—Display summary statistics about the entries in the routing table.
Output Fields Table 23 on page 461 lists the output fields for the show route summary command. Output
fields are listed in the approximate order in which they appear.
destinations Number of destinations for which there are routes in the routing table.
Restart complete All protocols have restarted for this routing table.
Restart state:
This indicates that OSPF, LDP, and VPN protocols did not restart for
LDP.inet.0 routing table.
• vpls_1.l2vpn.0: 1 destinations, 1 routes (1 active, 0
holddown, 0 hidden)
Restart Complete
This indicates that all protocols have restarted for vpls_1.l2vpn.0 routing
table.
Limit/Threshold Displays the configured route limits for the routing table set with the
maximum-prefixes and the maximum-paths statements. If you do not
configure route limits for the routing table, the show output does not
display this information.
protocol-name Name of the protocol from which the route was learned. For example,
OSPF, RSVP, and Static.
Sample Output
show route summary table (with Route Limits Configured for the Routing Table)
user@host> show route summary table VPN-A.inet.0
Autonomous system number: 100
Router ID: 10.255.182.142
Options brief | detail | extensive | terse—(Optional) Display the specified level of output.
routing-table-name—Display route entries for all routing tables whose names begin with
this string (for example, inet.0 and inet6.0 are both displayed when you run the show
route table inet command).
Output Fields Table 11 on page 340 describes the output fields for the show route table command. Output
fields are listed in the approximate order in which they appear.
Restart complete All protocols have restarted for this routing table.
Restart state:
• Pending:protocol-name—List of protocols that have not yet completed graceful restart for this
routing table.
• Complete—All protocols have restarted for this routing table.
This indicates that OSPF, LDP, and VPN protocols did not restart for the LDP.inet.0 routing table.
• vpls_1.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
This indicates that all protocols have restarted for the vpls_1.l2vpn.0 routing table.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
route-destination Route destination (for example:10.0.0.1/24). The entry value is the number of routes for this destination,
(entry, announced) and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:
• inclusive multicast Ethernet tag route—Type of route destination represented by (for example,
3:100.100.100.10:100::0::10::100.100.100.10/384):
• route distinguisher—(8 octets) Route distinguisher (RD) must be the RD of the EVPN instance
(EVI) that is advertising the NLRI.
• Ethernet tag ID—(4 octets) Identifier of the Ethernet tag. Can set to 0 or to a valid Ethernet tag
value.
• IP address length—(1 octet) Length of IP address in bits.
• originating router’s IP address—(4 or 16 octets) Must set to the provider edge (PE) device’s IP
address. This address should be common for all EVIs on the PE device, and may be the PE device's
loopback address.
label stacking (Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the
label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.
• S=0 route indicates that a packet with an incoming label stack depth of 2 or more exits this routing
device with one fewer label (the label-popping operation is performed).
• If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).
[protocol, preference] Protocol from which the route was learned and the preference value for the route.
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
Level (IS-IS only). In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into smaller areas.
This organization is accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1
systems route within an area. When the destination is outside an area, they route toward a Level 2
system. Level 2 intermediate systems route between areas and toward other ASs.
Next-hop type Type of next hop. For a description of possible values for this field, see Table 13 on page 376.
Flood nexthop Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
branches exceed only a subset of the flood next-hop branches were installed in the kernel.
maximum message
Next hop Network layer address of the directly reachable neighboring system.
via Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.
• Balance—Balance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.
Label operation MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).
Protocol next hop Network layer address of the remote routing device that advertised the prefix. This address is used
to derive a forwarding next hop.
Indirect next hop Index designation used to specify the mapping between protocol next hops, tags, kernel export policy,
and the forwarding next hops.
State State of the route (a route can be in more than one state). See Table 14 on page 378.
Metricn Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.
MED-plus-IGP Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.
TTL-Action For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
Announcement bits The number of BGP peers or protocols to which Junos OS has announced this route, followed by the
list of the recipients of the announcement. Junos OS can also announce the route to the kernel routing
table (KRT) for installing the route into the Packet Forwarding Engine, to a resolve tree, a Layer 2 VC,
or even a VPN. For example, n-Resolve inet indicates that the specified route is used for route resolution
for next hops found in the routing table.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• Recorded—The AS path is recorded by the sample process (sampled).
• ?—Incomplete; typically, the AS path was aggregated.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the number that precedes the AS path. This number represents the number
of ASs present in the AS path, when calculated as defined in RFC 4271. This value is used in the
AS-path merge process, as defined in RFC 4893.
• [ ]—If more than one AS number is configured on the routing device, or if AS path prepending is
configured, brackets enclose the local AS number associated with the AS path.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.
A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.
• ( )—Parentheses enclose a confederation.
• ( [ ] )—Parentheses and brackets enclose a confederation set.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• Unverified—Indicates that the origin of the prefix is not verified against the database. This is because
the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
FECs bound to route Indicates point-to-multipoint root address, multicast source address, and multicast group address
when multipoint LDP (M-LDP) inband signaling is configured.
Primary Upstream When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, indicates the primary
upstream path. MoFRR transmits a multicast join message from a receiver toward a source on a
primary path, while also transmitting a secondary multicast join message from the receiver toward
the source on a backup path.
RPF Nexthops When multipoint LDP with MoFRR is configured, indicates the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.
Label Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.
weight Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.
Prefixes bound to route Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.
Communities Community path attribute for the route. See Table 15 on page 380 for all possible values for this field.
Label-Base, range First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.
status vector Layer 2 VPN and VPLS network layer reachability information (NLRI).
Accepted The LongLivedStale flag indicates that the route was marked LLGR-stale by this router, as part of the
LongLivedStale operation of LLGR receiver mode. Either this flag or the LongLivedStaleImport flag might be displayed
for a route. Neither of these flags is displayed at the same time as the Stale (ordinary GR stale) flag.
Accepted The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
LongLivedStaleImport from a peer, or by import policy. Either this flag or the LongLivedStale flag might be displayed for a
route. Neither of these flags is displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and import into the inet.0 routing table
ImportAccepted Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
LongLivedStaleImport configured neighbors and imported into the inet.0 routing table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy.
Primary Routing Table In a routing table group, the name of the primary routing table in which the route resides.
Secondary Tables In a routing table group, the name of one or more secondary tables in which the route resides.
Table 13 on page 376 describes all possible values for the Next-hop Types output field.
Indirect (indr) Used with applications that have a protocol next hop
address that is remote. You are likely to see this next-hop
type for internal BGP (IBGP) routes when the BGP next
hop is a BGP neighbor that is not directly connected.
Unilist (ulst) List of unicast next hops. A packet sent to this next hop
goes to any next hop in the list.
Table 14 on page 378 describes all possible values for the State output field. A route can
be in more than one state (for example, <Active NoReadvrt Int Ext>).
Always Compare MED Path with a lower multiple exit discriminator (MED) is
available.
Cisco Non-deterministic MED Cisco nondeterministic MED is enabled, and a path with a
selection lower MED is available.
Cluster list length Length of cluster list sent by the route reflector.
Ex Exterior route.
IGP metric Path through next hop with lower IGP metric is available.
Inactive reason Flags for this route, which was not selected as best for a
particular destination.
Int Ext BGP route received from an internal BGP peer or a BGP
confederation peer.
Interior > Exterior > Exterior via Direct, static, IGP, or EBGP path is available.
Interior
Next hop address Path with lower metric next hop is available.
NotBest Route not chosen because it does not have the lowest MED.
Not Best in its group Incoming BGP AS is not the best of a group (only one AS can
be the best).
Route Metric or MED comparison Route with a lower metric or MED is available.
Unusable path Path is not usable because of one of the following conditions:
Table 15 on page 380 describes the possible values for the Communities output field.
area-number 4 bytes, encoding a 32-bit area number. For AS-external routes, the value is 0. A nonzero value
identifies the route as internal to the OSPF domain, and as within the identified area. Area
numbers are relative to a particular OSPF domain.
bandwidth: local AS Link-bandwidth community value used for unequal-cost load balancing. When BGP has
number:link-bandwidth-number several candidate paths available for multipath purposes, it does not perform unequal-cost
load balancing according to the link-bandwidth community unless all candidate paths have
this attribute.
domain-id-vendor Unique configurable number that further identifies the OSPF domain.
options 1 byte. Currently this is only used if the route type is 5 or 7. Setting the least significant bit in
the field indicates that the route carries a type 2 metric.
origin (Used with VPNs) Identifies where the route came from.
ospf-route-type 1 byte, encoded as 1 or 2 for intra-area routes (depending on whether the route came from a
type 1 or a type 2 LSA); 3 for summary routes; 5 for external routes (area number must be0);
7 for NSSA routes; or 129 for sham link endpoint addresses.
route-type-vendor Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x8000. The format is
area-number:ospf-route-type:options.
rte-type Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x0306. The format is
area-number:ospf-route-type:options.
target Defines which VPN the route participates in; target has the format 32-bit IP address:16-bit
number. For example, 10.19.0.0:100.
unknown IANA Incoming IANA codes with a value between 0x1 and 0x7fff. This code of the BGP extended
community attribute is accepted, but it is not recognized.
unknown OSPF vendor Incoming IANA codes with a value above 0x8000. This code of the BGP extended community
community attribute is accepted, but it is not recognized.
Sample Output
192.168.24.1:1:4:1/96
*[BGP/170] 01:08:58, localpref 100, from 192.168.24.1
AS path: I
> to 10.0.16.2 via fe-0/0/1.0, label-switched-path am
10.255.71.15:100:10.255.71.17/32
*[BGP/170] 00:03:59, MED 1, localpref 100, from
10.255.71.15
AS path: I
> via so-2/1/0.0, Push 100020, Push 100011(top)
10.255.71.15:200:10.255.71.18/32
6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100
Router ID: 10.255.245.12
6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100
show route table bgp.rtarget.0 (When Proxy BGP Route Target Filtering Is Configured)
user@host> show route table bgp.rtarget.o
bgp.rtarget.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
100:100:100/96
*[RTarget/5] 00:03:14
Type Proxy
for 10.255.165.103
for 10.255.166.124
Local
2:100.100.100.2:100::0::00:26:88:5f:67:b0/304
*[BGP/170] 11:00:05, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
2:100.100.100.2:100::0::00:51:51:51:51:51/304
*[BGP/170] 11:00:05, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
2:100.100.100.3:100::0::00:52:52:52:52:52/304
*[BGP/170] 10:59:58, localpref 100, from 100.100.100.3
AS path: I, validation-state: unverified
> to 100.64.13.3 via ge-2/0/8.0, label-switched-path R0toR2
2:100.100.100.3:100::0::a8:d0:e5:5b:01:c8/304
*[BGP/170] 10:59:58, localpref 100, from 100.100.100.3
AS path: I, validation-state: unverified
> to 100.64.13.3 via ge-2/0/8.0, label-switched-path R0toR2
3:100.100.100.2:100::1000::100.100.100.2/304
*[BGP/170] 11:00:16, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
3:100.100.100.2:100::2000::100.100.100.2/304
*[BGP/170] 11:00:16, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.64.12.2 via xe-2/2/0.0, label-switched-path R0toR1
3:100.100.100.10:100::0::10::100.100.100.10/384
*[EVPN/170] 01:37:09
Indirect
3:100.100.100.2:100::2000::100.100.100.2/304
*[EVPN/170] 01:37:12
Indirect
::10.255.245.195/128
*[LDP/9] 00:00:22, metric 1
> via so-1/0/0.0
::10.255.245.196/128
*[LDP/9] 00:00:08, metric 1
> via so-1/0/0.0, Push 100008
47 00 05 80 ff f8 00 00 00 01 08 00 01
SPRING-Capabilities: - SRGB block [Start: 800000,
Range: 256, Flags: 0xc0]
SPRING-Algorithms:
- Algo: 0
LINK { Local { AS:4170512532 BGP-LS ID:4170512532 ISO:3245.3412.3456.00 }.{
IPv4:8.65.1.105 } Remote { AS:4170512532 BGP-LS ID:4170512532 ISO:4284.3300.5067)
TSI:
Page 0 idx 0, (group ibgp type Internal) Type 1 val 0xa62f3cc (adv_entry)
Advertised metrics:
Nexthop: Self
Localpref: 100
AS path: [4170512532] I
Communities:
Path LINK { Local { AS:4170512532 BGP-LS ID:4170512532 ISO:3245.3412.3456.00 }.{
IPv4:8.65.1.105 } Remote { AS:4170512532 BGP-LS ID:4170512532 ISO:4284.33000
*IS-IS Preference: 15
Level: 1
Next hop type: Fictitious, Next hop index: 0
Address: 0x95dfc64
Next-hop reference count: 9
State: <Active NotInstall>
Local AS: 4170512532
Age: 6:05
Validation State: unverified
Task: IS-IS
Announcement bits (1): 0-BGP_RT_Background
AS path: I
Color: 32768
Maximum bandwidth: 1000Mbps
Reservable bandwidth: 1000Mbps
Unreserved bandwidth by priority:
0 1000Mbps
1 1000Mbps
2 1000Mbps
3 1000Mbps
4 1000Mbps
5 1000Mbps
6 1000Mbps
7 1000Mbps
Metric: 10
TE Metric: 10
LAN IPV4 Adj-SID - Label: 299776, Flags: 0x30,
Weight: 0, Nbr: 10.220.1.83
10.1.1.195:NoCtrlWord:1:1:Local/96
*[L2CKT/7] 00:50:47
> via so-0/1/2.0, Push 100049
via so-0/1/3.0, Push 100049
10.1.1.195:NoCtrlWord:1:1:Remote/96
*[LDP/9] 00:50:14
Discard
10.1.1.195:CtrlWord:1:2:Local/96
*[L2CKT/7] 00:50:47
> via so-0/1/2.0, Push 100049
via so-0/1/3.0, Push 100049
10.1.1.195:CtrlWord:1:2:Remote/96
*[LDP/9] 00:50:14
Discard
1:1:0:10.255.14.216:232.1.1.1/144
*[MVPN/70] 01:23:05, metric2 1
Indirect
1:1:1:10.255.14.218:232.1.1.1/144
*[BGP/170] 00:57:49, localpref 100, from 10.255.14.218
AS path: I
> via so-0/0/0.0, label-switched-path r0e-to-r1
1:1:2:10.255.14.217:232.1.1.1/144
*[BGP/170] 00:57:49, localpref 100, from 10.255.14.217
AS path: I
> via so-0/0/1.0, label-switched-path r0-to-r2
1:10.255.2.202:65536:10.255.2.202/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.202
AS path: I
> via so-0/1/3.0
1:10.255.2.203:65536:10.255.2.203/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.203
AS path: I
> via so-0/1/0.0
1:10.255.2.204:65536:10.255.2.204/432
*[MVPN/70] 00:57:23, metric2 1
Indirect
5:10.255.2.202:65536:128:::192.168.90.2:128:ffff::1/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.202
AS path: I
> via so-0/1/3.0
6:10.255.2.203:65536:64500:128:::10.12.53.12:128:ffff::1/432
*[PIM/105] 00:02:37
Multicast (IPv6)
7:10.255.2.202:65536:64500:128:::192.168.90.2:128:ffff::1/432
*[MVPN/70] 00:02:37, metric2 1
Indirect
AS path: I
AS path: 64500 I
Communities: traffic-rate:0:0
Validation state: Accept, Originator: 10.12.99.5
Via: 10.12.44.0/24, Active
Localpref: 100
Router ID: 10.255.71.161
user@host> show route table green.l2vpn.0 (VPLS Multihoming with FEC 129)
green.l2vpn.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.1.1.2:100:10.1.1.2/96 AD
*[VPLS/170] 1d 03:11:03, metric2 1
Indirect
10.1.1.4:100:10.1.1.4/96 AD
*[BGP/170] 1d 03:11:02, localpref 100, from 10.1.1.4
AS path: I, validation-state: unverified
> via ge-1/2/1.5
10.1.1.2:100:1:0/96 MH
*[VPLS/170] 1d 03:11:03, metric2 1
Indirect
10.1.1.4:100:1:0/96 MH
*[BGP/170] 1d 03:11:02, localpref 100, from 10.1.1.4
AS path: I, validation-state: unverified
> via ge-1/2/1.5
10.1.1.4:NoCtrlWord:5:100:100:10.1.1.2:10.1.1.4/176
*[VPLS/7] 1d 03:11:02, metric2 1
> via ge-1/2/1.5
10.1.1.4:NoCtrlWord:5:100:100:10.1.1.4:10.1.1.2/176
*[LDP/9] 1d 03:11:02
Discard
Nexthop: Self
AS path: [2] I
Communities: target:2:1
Path 10.0.0.0 from 10.3.0.0 Vector len 4. Val: 1
@BGP Preference: 170/-1
Route Distinguisher: 2:1
Next hop type: Indirect
Address: 0x258059e4
Next-hop reference count: 2
Source: 2.2.0.0
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0, selected
Label operation: Push 707633
Label TTL action: prop-ttl
Session Id: 0x17d8
Protocol next hop: 10.2.0.0
Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c
State: <Secondary Active Int Ext ProtectionPath ProtectionCand>
Local AS: 2 Peer AS: 2
Age: 23 Metric2: 35
Validation State: unverified
Task: BGP_172.16.2.0.0+34549
AS path: I
Communities: target:2:1
Import Accepted
VPN Label: 16
Localpref: 0
Router ID: 10.2.0.0
Primary Routing Table bgp.l3vpn.0
Composite next hops: 1
Protocol next hop: 10.2.0.0 Metric: 35
Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0
Session Id: 0x17d8
2.2.0.0/32 Originating RIB: inet.3
Metric: 35 Node path count: 1
Forwarding nexthops: 1
Nexthop: 10.1.1.1 via ge-1/1/9.0
BGP Preference: 170/-1
Route Distinguisher: 2:1
Next hop type: Indirect
Address: 0x9347028
Next-hop reference count: 3
Source: 10.3.0.0
Next hop type: Router, Next hop index: 702
Next hop: 10.1.4.2 via ge-1/0/0.0, selected
Label operation: Push 634278
Label TTL action: prop-ttl
Session Id: 0x17d9
Protocol next hop: 10.3.0.0
Push 16
Composite next hop: 0x93463a0 1048575 INH Session ID: 0x17da
Indirect next hop: 0x91e8800 1048574 INH Session ID: 0x17da
State: <Secondary NotBest Int Ext ProtectionPath ProtectionCand>
VPN Label: 16
Localpref: 0
Router ID: 10.3.0.0
Primary Routing Table bgp.l3vpn.0
Composite next hops: 1
Protocol next hop: 10.3.0.0 Metric: 70
Push 16
Composite next hop: 0x93463a0 1048575 INH Session ID:
0x17da
Indirect next hop: 0x91e8800 1048574 INH Session ID:
0x17da
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.1.4.2 via ge-1/0/0.0
Session Id: 0x17d9
10.3.0.0/32 Originating RIB: inet.3
Metric: 70 Node path count: 1
Forwarding nexthops: 1
Nexthop: 10.1.4.2 via ge-1/0/0.0
#Multipath Preference: 255
Next hop type: Indirect
Address: 0x24afca30
Next-hop reference count: 1
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0, selected
Label operation: Push 707633
Label TTL action: prop-ttl
Session Id: 0x17d8
Next hop type: Router, Next hop index: 702
Next hop: 10.1.4.2 via ge-1/0/0.0
Label operation: Push 634278
Label TTL action: prop-ttl
Session Id: 0x17d9
Protocol next hop: 10.2.0.0
Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c Weight 0x1
Source: 10.2.3.4
Protocol next hop: 10.2.3.4
Indirect next hop: 0x2 no-forward INH Session ID: 0x0
State: Local AS: 17 Peer AS:17 Age:21:12 Metric2:1 Validation State:
unverified
Task: BGP_17.1.2.3.4+50756
AS path: I
Communities: target:1111:8388708 encapsulation0:0:0:0:3
Import Accepted
Route Label: 100
ESI: 00:00:00:00:00:00:00:00:00:00
Localpref: 100
Router ID: 10.2.3.4
Secondary Tables: default-switch.evpn.0
Indirect next hops: 1
Protocol next hop: 10.2.3.4 Metric: 1
Indirect next hop: 0x2 no-forward INH Session ID: 0x0
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.10.10.1 via xe-0/0/1.0
Session Id: 0x2
1.2.3.4/32 Originating RIB: inet.0
Metric: 1 Node path count: 1
Forwarding nexthops: 2
Nexthop: 10.92.78.102 via em0.0
Import Accepted
Localpref: 100
Router ID: 10.2.3.4
Secondary Tables: default-switch.evpn.0
Indirect next hops: 1
Protocol next hop: 10.2.3.4 Metric: 1
Indirect next hop: 0x2 no-forward INH Session ID: 0x0
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.10.10.1 via xe-0/0/1.0
Session Id: 0x2
10.2.3.4/32 Originating RIB: inet.0
Metric: 1 Node path count: 1
Forwarding nexthops: 2
Nexthop: 10.92.78.102 via em0.0
NOTE: For BGP routes, the show route terse command displays the local
preference attribute and MED instead of the metric1 and metric2 values. This
is mostly due to historical reasons.
To display the metric1 and metric2 value of a BGP route, use the show route
extensive command.
Output Fields Table 28 on page 502 describes the output fields for the show route terse command.
Output fields are listed in the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
• +—A plus sign indicates the active route, which is the route installed from the routing table into the
forwarding table.
• - —A hyphen indicates the last active route.
• *—An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.
• ?—Not evaluated. Indicates that the route was not learned through BGP.
• I—Invalid. Indicates that the prefix is found, but either the corresponding AS received from the EBGP
peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.
• N—Unknown. Indicates that the prefix is not among the prefixes or prefix ranges in the database.
• V—Valid. Indicates that the prefix and autonomous system pair are found in the database.
• A—Aggregate
• B—BGP
• C—CCC
• D—Direct
• G—GMPLS
• I—IS-IS
• L—L2CKT, L2VPN, LDP, Local
• K—Kernel
• M—MPLS, MSDP
• O—OSPF
• P—PIM
• R—RIP, RIPng
• S—Static
• T—Tunnel
Prf Preference value of the route. In every routing metric except for the BGP LocalPref attribute, a lesser
value is preferred. In order to use common comparison routines, Junos OS stores the 1's complement
of the LocalPref value in the Preference2 field. For example, if the LocalPref value for Route 1 is 100,
the Preference2 value is -101. If the LocalPref value for Route 2 is 155, the Preference2 value is -156.
Route 2 is preferred because it has a higher LocalPref value and a lower Preference2 value.
Metric 1 First metric value in the route. For routes learned from BGP, this is the MED metric.
Metric 2 Second metric value in the route. For routes learned from BGP, this is the IGP metric.
Next hop Next hop to the destination. An angle bracket (>) indicates that the route is the selected route.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:
• I—IGP.
• E—EGP.
• ?—Incomplete; typically, the AS path was aggregated.
Sample Output