SG 247882
SG 247882
Implementation of
IBM j-type Ethernet
Switches and Routers
Introduction to Ethernet fundamentals and
IBM j-type Ethernet switches and routers
Sangam Racherla
Norman Bogard
Gareth Edwards
Nathan Flowers
Paul Ionescu
Gabriel Slomovitz
See Keong Soon
ibm.com/redbooks
International Technical Support Organization
February 2011
SG24-7882-00
Note: Before using this information and the product it supports, read the information in “Notices” on
page xi.
This edition applies to IBM j-type Ethernet switches and routers operating on Junos Software Version 10.1.
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
The team who wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers . . 67
Contents v
9.4 Configuring a port VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
9.4.1 Access ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
9.4.2 Trunk ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
9.4.3 Routed VLAN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
9.5 Configuring the Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
9.5.1 Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
9.5.2 Rapid Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
9.5.3 Multiple Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
9.5.4 VLAN Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
9.5.5 BPDU protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
9.5.6 Loop protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
9.5.7 Root protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
9.6 Link Layer Discovery Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
9.6.1 Understanding LLDP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
9.6.2 LLDP TLVs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
9.6.3 Considerations for LLDP and LLDP-MED. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
9.6.4 Configuring and monitoring LLDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
9.7 More information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Contents vii
13.3.10 Configuring SNMP trap groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
13.3.11 Configuring MIB views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
13.3.12 Tracing SNMP activity on a device running Junos software . . . . . . . . . . . . . . 421
13.3.13 Configuring the SNMP log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
13.4 Overview and configuration of SNMPv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
13.4.1 SNMPv3 configuration statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
13.4.2 Minimum SNMPv3 configuration on a device running Junos software . . . . . . . 426
13.4.3 Configuring the local engine ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
13.4.4 Creating SNMPv3 users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
13.4.5 Configuring the SNMPv3 authentication type . . . . . . . . . . . . . . . . . . . . . . . . . . 429
13.4.6 Configuring the encryption type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
13.4.7 Example: Defining SNMPv3 users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
13.4.8 Defining access privileges for an SNMP group. . . . . . . . . . . . . . . . . . . . . . . . . 434
13.4.9 Configuring the access privileges granted to a group . . . . . . . . . . . . . . . . . . . . 435
13.4.10 Example: Defining access privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
13.4.11 Assigning security names to groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
13.4.12 Configuring SNMPv3 traps on a device running Junos software . . . . . . . . . . 440
13.4.13 Configuring the SNMPv3 trap notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
13.4.14 Configuring the trap notification filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
13.4.15 Configuring the trap target address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
13.4.16 Example: Configuring the tag list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
13.4.17 Defining and configuring the trap target parameters. . . . . . . . . . . . . . . . . . . . 445
13.4.18 Configuring SNMP informs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
13.4.19 Configuring the remote engine and remote user. . . . . . . . . . . . . . . . . . . . . . . 448
13.4.20 Configuring the inform notification type and target address . . . . . . . . . . . . . . 449
13.4.21 Configuring the SNMPv3 community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
13.5 MIB support in Junos software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
13.5.1 Standard SNMP MIBs supported by Junos software . . . . . . . . . . . . . . . . . . . . 451
13.5.2 Loading MIB files to a network management station . . . . . . . . . . . . . . . . . . . . 457
13.6 Using sFlow to monitor on a j-type e-series Ethernet switch. . . . . . . . . . . . . . . . . . . 458
13.6.1 sFlow components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
13.6.2 Configuring sFlow technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
13.6.3 Checking the results of a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
13.6.4 Summary of the sFlow configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
13.6.5 Viewing the collected data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
13.7 Configuring system log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
13.7.1 Minimum and default system logging configuration . . . . . . . . . . . . . . . . . . . . . 464
13.7.2 Displaying and interpreting system log messages . . . . . . . . . . . . . . . . . . . . . . 480
13.8 More information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Contents ix
x Implementation of IBM j-type Ethernet Switches and Routers
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not give you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
AIX® POWER® System p®
BladeCenter® Redbooks® System x®
IBM® Redbooks (logo) ®
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
The data center is the strategic heart of today’s high-performance enterprise. It unifies the
critical systems, applications, and storage services that are needed for business success.
With a data center solution designed by IBM® and Juniper Networks, companies can
centralize their infrastructure with a comprehensive solution that combines best-in-class
products with well-defined practices for the enterprise.
IBM j-type data center solutions running Junos software provide operational agility and
efficiency, dramatically simplifying the network and delivering unprecedented savings. With
this solution, a network design has fewer devices, interconnections, and network tiers.
Beyond the obvious cost advantages, the design offers the following key benefits:
Reduces latency
Simplifies device management
Delivers significant power, cooling, and space savings
Eliminates multiple system failure points
Performs pervasive security
The high-performance data center is built around IBM j-type e-series Ethernet switches,
m-series routers, and s-series firewalls. This new family of powerful products helps to shape
the next generation of dynamic infrastructure.
IBM j-type e-series Ethernet switches meet escalating demands while controlling costs. They
provide operational simplicity and efficiency for interconnecting data centers and enabling
optimal communications between servers, storage, and users.
IBM j-type m-series Ethernet routers are high-performance routers with powerful switching
and security capabilities. They are designed for deployments in the data center, core and
aggregation configurations, and WAN Edge configurations. They have advanced routing
features such as Multiprotocol Label Switching (MPLS) network virtualization and low-latency
multicast.
This IBM Redbooks® publication targets IT professionals who sell, design, or administer
IBM j-type networking solutions. It provides information about IBM j-type Ethernet switches
and routers and includes the following major topics:
Introduction to Ethernet fundamentals and IBM j-type Ethernet switches and routers
Initial hardware planning and configuration
Other configuration topics including Virtual Chassis configuration, Layer 1, Layer 2, and
Layer 3 configurations, and security features
Network management features of Junos software and maintenance of the IBM j-type
series hardware
Sangam Racherla is an IT Specialist and Project Leader working at the ITSO in San Jose,
CA. He has 10 years of experience in the IT field and has been with the ITSO for the past
seven years. Sangam has extensive experience in installing and supporting the ITSO lab
equipment for various Redbooks projects. He has expertise in working with Microsoft®
Windows®, Linux®, IBM AIX®, System x®, and System p® servers, and various SAN and
storage products. Sangam holds a degree in electronics and communication engineering.
Norman Bogard is a Senior Technical Sales Specialist with IBM Advanced Technical Skills
Organization. He has been supporting Ethernet networking since 1987, storage area
networks (SAN) since 1996, and network-attached storage (NAS) since IBM’s entry into the
sector in 2001. He began his career in IT in 1984 with Intel® Corporation and came into IBM
through the acquisition of Sequent Computers.
Gareth Edwards is an IT Specialist for STG in IBM Australia specializing in Storage and IBM
POWER® systems. He has 20 years of experience in the IT industry and has been with IBM
since 2006. Gareth’s current area of expertise includes the planning and implementation of
midrange and enterprise servers, storage, and storage networks. He is certified on IBM
Midrange Storage Systems and Cisco Networking.
Nathan Flowers is a Network Engineer and has been with IBM for 20 years. He started his
career in the National Support Center in Atlanta, GA, providing dealer support for PC, XT, AT,
PS/2s, and Thinkpad systems. After moving to IBM in Raleigh, he joined the development
group of the Network Hardware Division as an Asynchronous Transfer Mode (ATM) and
Ethernet network engineer in 1998. Nathan has had many roles in the networking
environment including IBM BladeCenter® networking solutions and BladeCenter and System
x networking education. He is currently in the SAN Central and Solutions support group,
where he provides product engineering and solutions support for IBM Data Center
Networking products. He holds a Bachelor of Science degree in computer science from
Kennesaw State University.
Paul Ionescu is a Senior IT Specialist working for IBM Global Technology Services Romania
with more than 10 years of networking experience. Paul joined IBM in 2000. He is currently
focused on network engineering projects for the Internet Service Provider (ISP),
telecommunications, and banking industries. He is a Juniper Networks Certified Internet
Expert (JNCIE-M), Cisco Certified Internetworking Expert (CCIE), and Certified Information
Systems Security Professional (CISSP).
See Keong Soon is an Advisory IT Specialist for IBM Global Technology Services in
Malaysia. He has eight years of experience and specializes in network and security
technologies. Among many previous appointments he has held, See Keong served as a
network lead to implement many large-scale network and security projects. His areas of
expertise include planning, designing, and implementation of various network and security
technologies for a wide range of clients.
Tamikia Barrow
Jon Tate
Margaret Ticknor
ITSO, Raleigh Center
Mark Bayus
Jim Blue
William Champion
Jason Daniel
Steve Grillo
Doris Konieczny
George Pappas
Doug Vassello
Jeffrey Walls
IBM US
Greg Basset
Sean Capshaw
Yue Chen
Vaishali Ghiya
Steve Gonzales
Charles Goldberg
John Nishikawa
Sara Riley
Chris Rogers
Mark Rosche
Steven Smith
Preface xv
Fraser Street
Jeremy Wallace
Juniper Networks
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our books to be as helpful as possible. Send us your comments about this book or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Preface xvii
xviii Implementation of IBM j-type Ethernet Switches and Routers
1
Fiber optic cabling is more expensive than copper cabling. The optical components for
devices and switches and the cost of any customer cabling is typically more expensive to
install. However, the higher costs are often easily justified by the benefits of fiber optic cabling.
Fiber optic cabling provides for longer distance and is resistant to the signaling being
distorted by electromagnetic interference.
Copper cabling
An Ethernet uses two forms of copper cabling: coaxial and twisted pair.
Coaxial cabling
The early Ethernet used coaxial copper cabling in two sizes:
10BASE2 (RG58/RG6) “Thinnet” for distances up to 185 meters
10BASE5 (RG8/11) “Thicknet” for distances up to 500 meters
For coaxial cabling, the common connector types used are BNC (Figure 1-3) and Type F
(Figure 1-4).
Twisted-pair cabling
Twisted-pair copper cabling is a common media for Ethernet networking installations.
Twisted-pair cabling is available as Unshielded Twisted-Pair (UTP) or Shielded Twisted-Pair
(STP). This shielding helps prevent electromagnetic interference.
Cat 3 10 Mb Ethernet
Cat 5e 1 Gb Ethernet
Cat 6 10 Gb Ethernet
Short Distance - 55 m (180 ft.)
Cat 6a 10 Gb Ethernet
The connector used for Ethernet twisted-pair cabling is likely the one most people recognize
and associate with networking, the RJ45 connector, which is shown in Figure 1-5.
Pinouts
1--------------1
2--------------2
3--------------3
4--------------4
5--------------5
6--------------6
7--------------7
8--------------8
An Ethernet operating in 10/100 Mb mode only uses two pairs, pairs 1-2 and 3-6. An Ethernet
operating in 1 Gb mode uses all four pairs: pairs 1-2, 3-6, 4-5, and 7-8. Distances up to 100
meters are supported.
Damaged twisted pair: If a twisted-pair cable is damaged, so that pair 4-5 or pair 7-8 is
unable to communicate, the link is unable to communicate in 1 Gbps mode. If the devices
are set to autonegotiate speed, the devices successfully operate in 100 Mbps mode.
Pinouts
1--------------3
2--------------6
3--------------1
4--------------4
5--------------5
6--------------2
7--------------7
8--------------8
Ethernet ports without crossover are known as Medium Dependent Interface (MDI). Ports
with crossover are known as Medium Dependent Interface Crossover (MDIX). The “X” means
crossover. Some ports can sense whether crossover is needed and configure the port
properly. This function is often referred to as Auto MDIX. For Gigabit Ethernet, the auto
crossover function is an optional part of the 1000 Base-T Ethernet standard.
Two modes of fiber optic signaling are explained in this chapter, single-mode and multimode.
The difference between the modes is the wavelength of the light used for the transmission as
illustrated in Figure 1-8.
Multimode fiber
Multimode fiber (MMF) uses short wavelength light to transmit data and requires a cable with
a larger core for transmission (Figure 1-8 on page 8). The core diameter for multimode
cabling can be 50 or 62.5 microns in diameter as illustrated in Figure 1-10.
The color of the outer coating is sometimes used to identify if a cable is a multimode or
single-mode fiber cable, but the color is not a reliable method. The TIA-598C standard
suggests the outer coating to be yellow for single mode fiber and orange for multimode fiber
for civilian applications. This guideline is not always implemented as illustrated in Figure 1-11,
which shows a blue cable. The reliable method is to look at the specifications of the cable
printed on the outer coating of the cabling. See also Figure 1-12 on page 10 and Figure 1-13
on page 10.
Connector types
The most common connector type for fiber optic media used in networking today is the LC
connector, which is shown in Figure 1-14.
Other connectors that are commonly encountered in Ethernet networks are the SC connector
(Figure 1-15), and the ST connector (Figure 1-16).
Some equipment might use a larger transceiver known as a Gigabit Interface Converter
(GBIC), which is shown in Figure 1-17. As technology advancements have been made,
smaller transceivers have been introduced providing much higher port density, such as small
form-factor pluggable (SFP), 10-Gigabit SFP+, or 10-Gigabit SFP-XFP. See also Figure 1-18
to compare the different transceivers.
Figure 1-18 From left to right: SFP-MMF, SFP-SMF, SFP+-MMF, XFP-MMF, and XFP-SMF
Hub
A network hub has the same functional properties of a segment using coax cabling to
interconnect devices. It operates as a share media segment.
The difference is that the hub allows for much easier cabling. The cables plug into the hub,
and the hub internally forms the share media segment. A network hub connects multiple
devices as a single shared media segment. All frames are viewable by all the devices
attached to the hub because it forms a shared media segment.
Repeater
A network repeater is similar in function to a network hub in that it forms a common shared
media segment with all of the attached devices. The difference is a repeater receives the
incoming signal and then “repeats” or regenerates the signal at new signal quality and
strength as it is sent out the other ports of the repeater.
In contrast, a hub is a passive device that allows the original signal to pass through to the
other devices that are connected to the segment. A repeater is often used in environments in
which signal loss occurs in a segment because of media length or other environmental
factors.
A network segment can be one of two types, a shared media or switched segment.
The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) access method is the
protocol that Ethernet devices follow when operating in half duplex mode which is required for
a shared media segment. The CSMA/CD Access Method has three parts.
Carrier Sense requires a device to “listen” on the media and wait until no other transmissions
are occurring before attempting to transmit. With multiple access, multiple nodes can be
connected to the same media at the same time.
Collision Detection recognizes when two nodes have attempted to transmit at the same time
and notifies the other nodes on the segment that the previous transmission is invalid. This
notification function is known as jamming. Jamming consists of sending a special 32-bit
sequence.
Switched segment
Devices on a switched segment can communicate directly to the network switch without any
interference by other intermediate devices. Switched segments allow for full duplex
communications.
Speed
Speed in an Ethernet refers to rates such as 10 Mbps, 100 Mbps, 1000 Mbps (1 Gbps), or
10 Gbps. The standards for higher speeds such as 40 and 100 Gbps are in draft form now.
Autonegotiation
In an Ethernet, the speed and duplex of a device attached to a segment must match.
Autonegotiation of the speed and duplex of a device usually works well, but it is not 100%
reliable. The problems usually occur with older 10/100 devices. Newer devices rarely have an
issue negotiating with each other.
One step to reduce negotiation problems is to ensure that both devices on a switch segment
are configured the same. Either configure both devices for autonegotiation, or “hard code”
(manually configure) both the speed and duplex settings of both devices to the same settings.
Table 1-2 lists the classes of powered devices and associated power levels.
The maximum payload size for a standard Ethernet frame is 1500 bytes. The total frame size
of 1518 bytes.
With jumbo frames, devices provide better performance because they do not need to process
as many frames (frame headers). The result is less processor utilization and less bandwidth
to transmit header information and less idle time of link because of interframe gaps.
Concurrent use of jumbo and standard frames sizes in some networks can impact
performance of latency-sensitive applications. End-to-End network devices must support
jumbo frames. Otherwise frames are discarded.
The interframe gap (IFG) is also referred to as interframe spacing or interpacket gap (IPG).
To search for the registered owner of an Organizationally Unique Identifier (OUI), see the
IEEE Standards Association website at:
http://standards.ieee.org/regauth/oui/index.shtml
Within the first byte of a MAC address, 2 bits provide additional information as illustrated in
Figure 1-25.
Looking at the first byte of a MAC address in more detail, bit 0 and bit 1 have specific
functions. Bit 0 of the first octet is the multicast bit. If the value of the bit is 0, the frame is a
unicast frame. If the value is 1, the frame is a multicast frame.
Bit 1 of the first octet is the locally administered address bit. If the value of the bit is 0, the
MAC address is a globally unique address (manufacturer’s assigned or burned-in address). If
the value is 1, the MAC address is a locally administered MAC address that is assigned by the
user or administrator.
Another way to express the same idea is a bridge that maintains one broadcast domain
(Layer 2) while isolating collision domains (Layer 1). Bridges began as PCs with multiple NICs
installed with a special bridging application running that performs the bridging function. MAC
addresses of attached devices are learned on each port.
What is the difference between a bridge and a Layer 2 switch? From a functional standpoint,
the answer is that there is no difference. A simple way to explain the difference is that a bridge
is a device that performs the function of maintaining the broadcast domain while isolating the
collision domain.
As stated previously, the MAC addresses of devices attached to a switch are added to the
MAC table of the switch along with the port on which the MAC address was learned. This
method is accomplished by monitoring incoming source MAC addresses and adding any new
MAC addresses to the table. If a device moves from one port to another, the MAC entry in the
table is updated with the new port. Also, if a device is powered off, removed from the network,
or is not sending traffic in the network, the MAC entry is removed. The removal occurs after
the time at which any traffic received from this MAC address has exceeded an expiration time
value of the switch.
Frame forwarding
This section examines how a Layer 2 switch forwards traffic in different cases.
D B
A F
Hub
MAC Address Table
MA C P ort
1 3 5 A 1
G 4
Network Switch / Bridge
D 5
B 5
2 4 6
E G C
The MAC address entries are dynamically populated by monitoring the source MAC address
of frames coming into the ports. MAC entries age out of the table so that devices that are not
sending frames will be removed. The age-out time is vendor-dependent; some vendors allow
for the time-out value to be a configurable parameter. The age-out time can also vary
depending on other protocols or features that are enabled on the switch.
If a device is moved from one port to another port, the MAC address is learned, the old entry
in the MAC table is deleted, and a new entry is added with the new port.
D B
A F
Hub
MAC Address Table
MA C P ort
1 3 5 A 1
G 4
Network Switch / Bridge
D 5
B 5
2 4 6
E G C
Figure 1-28 Unicast frame forwarding, MAC learned
This method is not the same as a broadcast because the frames that are forwarded are
unicast frames (frame with the specific MAC address of the destination device). Some
vendors refer to the process as flooding. The frames are sent down all paths to reach the
destination device.
D B
A F
Hub
MAC Address Table
MA C P ort
1 3 5 A 1
G 4
Network Switch / Bridge
D 5
B 5
2 4 6
E G C
Figure 1-31 shows two methods for maintaining isolation of VLAN traffic between switches.
The second method is VLAN tagging over a single link in which each frame in tagged with its
VLAN ID. This method is highly scalable because only a single link is required to provide
connectivity to many VLANs, which provides for better utilization of the link capacity when
VLAN traffic is not uniform.
The protocol for VLAN tagging of frames in a LAN environment is defined by the IEEE 802.1
P/Q standard.
Inter-Switch Link (ISL): ISL is another protocol for providing the VLAN tagging function in
a network. This protocol is not compatible with the IEEE 802.1P/Q standard.
Tagged frames
The IEEE 802.1P/Q standard provides a methodology for added information such as VLAN
membership and priority to the frame as shown in Figure 1-32.
Switch ports: Some vendors use terms other than access mode for ports operating in
single VLAN mode. The switch ports of those vendors might be configured to operate in
single VLAN mode by configuring a Port VLAN ID (PVID) and adding the port as a member
of the VLAN.
With the IEEE 802.1Q specification, untagged traffic on a multi-VLAN port can be associated
with a single VLAN, which is referred to as the “native” VLAN for the port (Figure 1-33). By
using this provision, traffic with no VLAN tag can be received and associated with the VLAN
that is configured as the PVID or native VLAN. Outbound traffic for this VLAN on a port
configured in this manner is transmitted with no tag so that the receiving device can receive
the frame in an untagged format.
This method provides compatibility with existing devices or devices that are configured in
single VLAN mode and attached to a port configured as a multi-VLAN port.
Variations in the meaning of trunk: The term trunk is used to express different ideas in
the networking industry. When using this term, keep in mind that others might use the term
in a different manner. The term trunk can mean a port operating in multiple VLAN mode or
it can mean a link aggregated port.
4 – 1 Gbps Links
• L ink aggregation: Multiple phys ical links combined to operate as a s ingle larger
logical link. (L AC P – IE E E 802.3ad)
• S ingle s es s ion typically s ent over s ingle phys ical link
• H as hing algorithm us ed to s elect trans mis s ion link
Link aggregation provides greater bandwidth between the devices at each end of the
aggregated link. Another advantage of link aggregation is increased availability, because the
aggregated link is composed of multiple member links. If one member link fails, the
aggregated link continues to carry traffic over the remaining member links.
Each of devices interconnected by the aggregated link uses a hashing algorithm to determine
on which of the member links frames will be transmitted. The hashing algorithm might use
varying information in the frame to make the decision. This algorithm might include a source
MAC, destination MAC, source IP, destination IP and more. It might also include a
combination of these values.
STP uses the information provided by the BPDUs to elect a root bridge, identify root ports for
each switch, identify designated ports for each physical LAN segment, and prune specific
redundant links to create a loop-free tree topology. All leaf devices calculate the best path to
the root device and place their ports in blocking or forwarding states based on the best path to
the root. The resulting tree topology provides a single active Layer 2 data path between any
two end stations.
RSTP was originally defined in the IEEE 802.1w draft specification and later incorporated into
the IEEE 802.1D-2004 specification.
In an MSTP region, a group of bridges can be modeled as a single bridge. An MSTP region
contains multiple spanning tree instances (MSTIs). MSTIs provide different paths for different
VLANs. This functionality facilitates better load sharing across redundant links.
An MSTP region can support up to 64 MSTIs, and each instance can support anywhere from
1 through 4094 VLANs.
MSTP was originally defined in the IEEE 802.1s draft specification and later incorporated into
the IEEE 802.1Q-2003 specification.
BPDU protection
BPDU protection can help prevent STP misconfigurations that can lead to network outages.
Receipt of BPDUs on certain interfaces in an STP, RSTP, VSTP, or MSTP topology, can lead
to network outages.
Loop protection
Loop protection increases the efficiency of STP, RSTP, VSTP, and MSTP by preventing ports
from moving into a forwarding state that might result in a loop opening in the network.
A blocking interface can transition to forwarding state in error if the interface stops receiving
BPDUs from its designated port on the segment. Such a transition error can occur when there
is a hardware error on the switch or software configuration error between the switch and its
neighbor.
When loop protection is enabled, the spanning tree topology detects root ports and blocked
ports and ensures that both keep receiving BPDUs. If a loop-protection-enabled interface
stops receiving BPDUs from its designated port, it reacts as it might react to a problem with
the physical connection on this interface. It does not transition the interface to a forwarding
state, but instead transitions it to a loop-inconsistent state. The interface recovers and then
transitions back to the spanning-tree blocking state as soon as it receives a BPDU.
You must enable loop protection on all switch interfaces that have a chance of becoming root
or designated ports. Loop protection is most effective when enabled in the entire switched
network. When you enable loop protection, you must configure at least one action (alarm,
block, or both).
An interface can be configured for either loop protection or root protection, but not for both.
Root protection
Root protection increases the stability and security of STP, RSTP, VSTP, and MSTP by
limiting the ports that can be elected as root ports. A root port elected through the regular
process has the possibility of being wrongly elected. A user bridge application running on a
PC can also generate BPDUs and interfere with root port election. With root protection,
network administrators can manually enforce the root bridge placement in the network.
Root protection is enabled on interfaces that should not receive superior BPDUs from the root
bridge and should not be elected as the root port. These interfaces become designated ports
and are typically on an administrative boundary. If the bridge receives superior STP BPDUs
on a port that has root protection enabled, that port transitions to a root-prevented STP state
(inconsistency state), and the interface is blocked. This blocking prevents a bridge that should
not be the root bridge from being elected the root bridge. After the bridge stops receiving
superior STP BPDUs on the interface with root protection, the interface returns to a listening
state, followed by a learning state, and ultimately back to a forwarding state. Recovery back to
the forwarding state is automatic.
When root protection is enabled on an interface, it is enabled for all the STP instances on that
interface. The interface is blocked only for instances for which it receives superior BPDUs.
LLDP-capable devices transmit information in Type Length Value (TLV) messages to neighbor
devices. Device information can include specifics, such as chassis and port identification and
system name and system capabilities. The TLVs use this information from parameters that
have already been configured in Junos software from Juniper Networks.
LLDP-MED goes one step further, exchanging IP-telephony messages between the switch
and the IP telephone. These TLV messages provide detailed information about the PoE
policy. With the PoE Management TLVs, the switch ports can advertise the power level and
power priority needed. For example, the switch can compare the power needed by an IP
telephone running on a PoE interface with available resources. If the switch cannot meet the
resources required by the IP telephone, the switch can negotiate with the telephone until a
compromise on power is reached.
The switch also uses these protocols to ensure that voice traffic gets tagged and prioritized
with the correct values at the source itself. For example, 802.1p class-of-service (COS) and
802.1Q tag information can be sent to the IP telephone.
1.5.1 IP routing
A router forwards Layer 3 packets from one logical network (IP subnet) to another as shown in
Figure 1-37. A router provides for connectivity at the Layer 3 level of the network while
broadcasts are isolated to the separated Layer 2 networks or broadcast domains.
Receive
Recei ve Discard
Frame Packet
Packet
Send ICMP
Error Message to
No
Checksum Source
OK?
No
Yes
ARP
Send ARP Response
TTL – 1, No
Request Received?
TTL > 0?
No
Yes Yes
Yes
MAC in ARP Transmit
Lookup
C ache? Packet
Route
No
Transmit
Route No Defaul t Yes TTL – 1
Forward
Frame
Found? Packet
TTL >to0?
Host
Route?
or Next Hop’s
Yes MAC Address
The MAC address of a target host is learned by the transmitting host sending a request as a
Layer 2 broadcast to all devices. This request is known as an ARP request. The ARP request
contains the IP and MAC address of the requesting device for the response to be sent.
The device with the target IP address responds to the request with the target’s MAC address.
This response is known as an ARP reply. The sending station receives the ARP reply and
updates the ARP cache. Now the sending device has the information necessary to send the
packet to the target device.
Binary:
• Unique, 32-bit identification
11000000101010000100011001111101
for device (NIC, router, and Hex:
so on) C0 A8 46 7D
• Commonly written as
four decimal numbers
• Dotted quad notation
• Each quad number is the
decimal of 8 bits
192 . 168 . 70
11000000 10101000 01000110
. 125
01111101
Figure 1-39 IPv4 addresses
IP address classes
IPv4 address were initially assigned to users on a class basis. Different classes provide a
different number of usable addresses as shown in Table 1-3.
IPv4 address consumption: In the 1980s, fear of consuming all of the IPv4 addresses
available in the Internet fueled ideas about to how to overcome the limitation of only having
approximately 4 000 000 000 000 IPv4 address available for use. Some solutions were
implemented to provide methods to more efficiently use the IPv4 address space.
• A subnet mask identifies the bits of the 32 bit IP address that are the network portion of the
address and which are the host portion of the address.
Address:
11000000101010000100011001111101
Mask:
11111111111111111111111100000000
^-------------Network------------^^--Host--^
When an IP device communicates with another IP host, the device compares the bits of the
local IP address masked by the subnet masked with the bits of the target IP address masked
by the same subnet mask. If the masked bits of the two addresses match, the target address
is on the same subnet as the sending device. If they do not match, the target device is on a
remote subnet.
In each subnet, two addresses are reserved that cannot be assigned as host addresses:
Network ID
The network ID for a subnet is the address in which hosts bits of the masked address are
all zeros. The network ID is the first address in the subnet. The network ID is used to
reference the subnet in routing tables.
Broadcast Address
The broadcast address for a subnet is the address in which hosts bits of the masked
address are all ones. The broadcast address is the last address in the subnet.
2001:0db8:0000:0000:0000:0000:c0a8:467d
^----Network Prefix----^^------------Host---------^
• 64-bit network prefix portion and 64-bit host portion
• Acceptable notations
• 2001:0db8:0000:0000:0000:0000:c0a8:467d
• 2001:0db8:0:0:0:0:c0a8:467d
• 2001:0db8::0000:0000:0000:c0a8:467d
• 2001:db8::c0a8:467d
For details about IPv6 addressing, see Internet Engineering Task Force (IETF) RFC 4291 at
the following address:
http://tools.ietf.org/html/rfc4291
Route table
A route table is a list of the known subnets in a network and the desired path to reach each
subnet. The tables contain subnets learned from local interfaces, static routes, or learned
routes from routing protocols. For each subnet, the route table contains the IP address of the
next router in the path if the subnet is a remote subnet or the interface if the subnet is a local
subnet to the router.
Routing protocols
Routing protocols provide a dynamic method for updating route tables in the routers of an IP
network. If routing protocols are not used, the routes must be manually configured by the use
of static routes. Many routing protocols are used in the industry.
Default route
A default route is a parameter that is configured in a router that indicates where to forward
packets with destination subnets that are not contained in the route table of the router.
The other two IBM j-type e-series Ethernet switches (shown in Figure 2-2) are chassis based.
Table 2-1 Cross-reference of IBM j-type e-series Ethernet switches to Juniper Networks models
IBM description IBM machine type and model Juniper Networks model
The IBM Ethernet Switch J48E combines the high availability and carrier-class reliability of
modular systems with the economics and flexibility of stackable platforms. It provides a
high-performance, scalable solution for top-of-rack and end-of-row applications in a data
center.
By offering a full suite of Layer 2 and Layer 3 switching capabilities as part of the base
software, the IBM Ethernet Switch J48E can also satisfy a variety of high-performance branch
and campus deployments. A single 48-port switch can be deployed initially. Then as
requirements grow, integrated Virtual Chassis technology allows up to 10 switches to be
interconnected over a 128 gigabit-per-second (Gbps) back plane and managed as a single
device. This capability delivers a scalable, pay-as-you-grow solution for supporting escalating
customer requirements. Optional Gigabit Ethernet (GbE) and 10 Gigabit Ethernet (10 GbE)
uplink modules enable high-speed connectivity to aggregation- or core-layer switches.
The IBM Ethernet Switch J48E includes features for high availability, such as redundant,
hot-swappable internal power supplies and field-replaceable, multi-blower fan trays to
maximize uptime. In addition, the switch offers Class 3 Power over Ethernet (PoE). It delivers
15.4 watts on the first eight ports to support networked devices. Such devices include
top-of-rack security cameras and wireless LAN (WLAN) access points for low-density
converged networks.
Resiliently interconnected through a 128 Gbps virtual backplane or front-panel 10 GbE uplink
modules, a fully loaded Virtual Chassis configuration can support up to 480
10/100/1000BASE-T ports plus up to 20 10 GbE uplink ports. Virtual Chassis technology
helps to lower capital expenses by requiring a lower up-front investment than existing chassis
systems. It can also help dramatically reduce operating expenses by enabling up to 10
interconnected IBM Ethernet Switch J48Es to be operated and managed as a single logical
device.
This incremental, pay-as-you-grow model, combined with the compact form factor of the IBM
Ethernet Switch J48E, helps data centers to reduce up front and recurring rack space usage.
It also saves on costly power and cooling.
Virtual Chassis
Virtual Chassis technology provides exceptional device and link high availability using the
virtual backplane protocol and operating system software. Each set of interconnected
switches automatically takes full advantage of multiple available Routing Engines to deliver
graceful protocol restart. Graceful Routing Engine Switchover (GRES) and non-stop
forwarding ensure uninterrupted operation in the rare event of an individual switch failure. For
added device and link high availability, the IBM Ethernet Switch J48E can be configured to
address many different requirements. For example, a single 10-switch Virtual Chassis
configuration can be configured as two 5-switch Virtual Chassis configurations.
Location independence
Virtual Chassis technology can also be extended across the front-panel 10 GbE uplink ports
to interconnect switches that are separated by more than a few meters. This configuration
creates a single virtual switch that spans multiple telecommunications closets, floors, or even
datacenter server racks.
A scalable IBM Ethernet Switch J48E top-of-rack deployment takes full advantage of Virtual
Chassis technology. It uses a minimum amount of space with small form-factor switches that
scale with high-density wire-speed ports, lowering heating and cooling costs while conserving
space. With Virtual Chassis technology, up to 10 units can interoperate and be managed as a
single device. In doing so, this technology dramatically simplifies configuration and
management while reducing operational costs and simplifying cabling. Fewer uplinks are
required when up to 10 top-of-rack switches are configured as a single virtual device, further
lowering cost and complexity. Most importantly, the servers attached to the top-of-rack
devices are interconnected by a single, high-bandwidth, low-latency switch. These servers do
not need to rely on traffic going to an aggregation switch for server-to-server communications.
Configurations that require end-of-row deployments can also take advantage of Virtual
Chassis technology. Such configuration can deploy a small form-factor IBM Ethernet Switch
J48E that scales with high-density wire-speed ports as needed, lowering heating and cooling
costs while conserving space.
Carrier-class reliability
The IBM Ethernet Switch J48E with Virtual Chassis technology provides the same
high-availability features as modular chassis-based systems. Each switch supports internal
redundant, load-sharing, hot-swappable power supplies, and a field-replaceable
Common features
The IBM Ethernet Switch J48E includes the following common features:
Full Layer 2 and Layer 3 Ethernet switching
Virtual Chassis technology
With this technology, up to 10 switches can be interconnected as a single logical device,
supporting up to 480 ports in top-of-rack or end-of-row applications for a data center.
Interconnected switches in a Virtual Chassis configuration
These switches share a single control plane and operating system and automatically
assign master (active) and backup (hot-standby) Routing Engines
Integrated application-specific integrated circuit (ASIC)-based Packet Forwarding Engine
and integrated Routing Engine that deliver switching and routing functionality at wire rates
Front-panel LCD display
This panel offers a flexible interface for starting a device, rolling back configurations,
reporting switch alarm and LED status, or restoring the switch to its default settings.
Eight ports of IEEE 802.3af compatible Class 3 PoE
Easy, centralized software upgrades
The ability for all IBM j-type Ethernet switches and routers to run the modular, fault-tolerant
Junos operating system
Specifications
Table 2-2 lists the specifications for the IBM Ethernet Switch J48E.
100BASEFX/1000BASE-X 4 per platform (by using an optional four-port GbE uplink module)
(SFP) port densities Up to 40 in a Virtual Chassis configuration
10GBASE-X port densities 2 per switch (by using an optional two-port 10 GbE uplink module)
Up to 20 in a Virtual Chassis configuration
Hardware
The IBM Ethernet Switch J48E requires the following hardware:
Single rack unit-height device (1RU)
48 10/100/1000BASE-T front-panel ports
Optional GbE or 10 GbE front-panel uplink modules for connecting to other switches or
upstream devices
Scalable to 480 server access ports with up to 20 10 GbE uplinks to the core
Back-panel Virtual Chassis ports that interconnect up to 10 switches over 128 Gbps
backplane
Redundant, internal hot-swappable power supplies
Hot-swappable fan tray with redundant blowers
Dual Routing Engines with GRES
Single management interface
The IBM Ethernet Switch J08E and IBM Ethernet Switch J16E deliver the performance,
scalability, and high availability that is required to support high-density datacenter, cloud
computing, and enterprise campus environments. The high-density, high-performance J08E
and J16E are also used for aggregating access switches that are deployed in top-of-rack or
end-of-row applications in a data center. These switches also support Gigabit Ethernet server
access in end-of-row deployments in a data center. The J08E delivers up to 960 million
packets per second (Mpps) of high-density, wire-speed 10 GbE performance. The J16E
delivers approximately 1.9 billion packets per second (Bpps) of 10 GbE performance. Both
systems are designed to provide sufficient capacity to support the most demanding
datacenter networks.
Line cards
The J08E and J16E can accommodate various combinations of the following Ethernet line
card options.
The Exx 48 Port 1 GbE RJ-45 line card (Figure 2-3) offers the following features:
48 RJ-45 10/100/1000BASE-T interfaces
Line-rate for any packet size or type (64 - 9216 bytes)
48 Gbps, 71 million packets per second
10–25 micron () port-to-port latency depending on packet size
Eight queues, 42 MB buffer per port
The Exx 48 Port 100FX/1000B-X line card (Figure 2-4) offers the following features:
48 small form-factor pluggable (SFP) 100/1000BASE-X interfaces
Line-rate for any packet size or type (64 - 9216 bytes)
48 Gbps, 71 million packets per second
10 - 25 port-to-port latency depending on packet size
Eight queues, 42 MB buffer per port
Fully configured, a single J08E can support up to 384 GbE or 64 10 GbE ports at wire speed
for all packet sizes. The J16E can support twice that number, 768 GbE or 128 10 GbE
wire-speed ports for all packet sizes. Up to three 14 rack-unit (RU) J08Es or two 21 RU J16Es
can fit in a standard 42RU wiring rack. This combination enables up to 1,536 line-rate GbE or
256 line-rate 10 GbE ports in a single rack and delivers one of the highest port densities in the
industry.
Both switches also feature a switch fabric that provides a central crossbar matrix through
which all data traffic passes. The fabric can deliver up to 320 Gbps (full duplex) per slot. It
enables scalable wire-rate performance on all ports for packets of any size. Plus it provides a
built-in migration path to support 100 GbE deployments without requiring any changes to the
network infrastructure.
In addition, the line cards used by both switches include custom-designed ASIC-based
Packet Forwarding Engines that process network traffic at wire rates. They also include a
line-card processor that ensures control plane scalability.
All major switch components are hot-swappable. Also, all central functions are available in
redundant configurations designed to provide high operational availability by allowing
continuous system operation during maintenance or repairs.
Common features
The IBM Ethernet Switch J08E and J16E have the following common features:
High-performance 8-slot (J08E) and 16-slot (J16E) switches that support a data center
and campus LAN core and aggregation layer deployments
Scalable switch fabric that delivers up to 320 Gbps per slot
The support of 48-port 10/100/1000BASE-T and 100BASE-FX/1000BASE-X line cards up
to 384 (J08E) or 768 (J16E) GbE ports per chassis
J08E description
The IBM Ethernet Switch J08E features a passive backplane design that supports a capacity
of up to 6.2 terabits per second (Tbps). It is a high-performance, high-density platform that
reduces cost and complexity, while improving overall scalability and providing carrier-class
reliability in the datacenter.
An optional second SRE module for hot-standby resiliency and up to six power supplies can
provide component redundancy.
The J08E SRE module, shown in Figure 2-6, performs two functions. It incorporates switch
fabric, control plane, and management plane functionality into a single module. It includes an
integrated Routing Engine that features a 1.2 GHz processor with 2 GB of DRAM and 2 GB of
flash memory. The Routing Engine on the SRE module includes a central CPU that performs
all system control functions and maintains the hardware forwarding table and routing protocol
states for the switch.
Specifications
Table 2-3 lists the specifications for the IBM Ethernet Switch J08E.
10/100/1000BASE-T port 48 per Exx 48 Port 1 GbE RJ-45 line card; 384 per chassis
densities
100BASE-FX/1000BASE-X 48 per Exx 48 Port 100FX/1000B-X line card; 384 per chassis
(SFP) port densities
10GBASE-X port densities 8 per Exx 8 Port 10 GbE line card; 64 per chassis
Resiliency Six power supply bays for N+1 or N+N redundancy; field-replaceable
fan trays; redundant SRE; GRES
QoS queues/port 8
J16E description
The IBM Ethernet Switch J16E delivers a backplane capacity of up to 12.4 Tbps. It is
designed for core datacenter deployments and demanding cloud computing and Internet
exchange environments.
The J16E Routing Engine module supports control and management plane functionality with
an integrated Routing Engine featuring a 1.2 GHz processor with 2 GB of DRAM and 2 GB of
flash memory. Similar to the J08E, the Routing Engine of the J16E includes a CPU that
performs all system control functions and maintains the hardware forwarding table and
routing protocol states for the switch.
The switch fabric for the J16E is spread across eight rear-accessible switch fabric modules.
All eight switch fabric modules are always active. They enable the switch to support line-rate
Layer 2 and Layer 3 switching on all ports for packets of any size.
Specifications
Table 2-4 lists the specifications for the IBM Ethernet Switch J16E.
Dimensions (W x H x D) 17.25 x 36.5 x 26.5 in. (43.9 x 92.7 x 67.4 cm.); 21 rack units
10/100/1000BASE-T port 48 per Exx 48 Port 1GbE RJ-45 line card; 768 per chassis
densities
100BASE-FX/1000BASE-X 48 per Exx 48 Port 100FX/1000B-X line card; 768 per chassis
(SFP) port densities
10GBASE-X port densities 8 per Exx 8 Port 10 GbE line card; 128 per chassis
Resiliency Six power supply bays for N+1 or N+N redundancy; field-replaceable
fan trays; redundant SRE; GRES
QoS queues/port 8
Hardware
The IBM Ethernet Switch J08E and J16E have the following hardware requirements:
14 (J08E) rack-unit (RU) and 21 (J16E) RU chassis
8 (J08E) and 16 (J16E) dedicated I/O slots
6.2 (J08E) and 12.4 (J16E) Tbps backplane capacity
320 Gbps (full duplex) per slot fabric capacity
Full 10 GbE line-rate forwarding (even under failure conditions)
Dedicated data, control, and management planes
LCD panel for system monitoring
Energy efficient: 200,000 packets per second per watt
Up to six load-sharing power supplies
6,000 W (J08E) and 15,000 W (J16E) maximum power configurations
Redundant fans and controllers
Side-to-side airflow
Figure 2-8 shows the IBM j-type m-series Ethernet router portfolio.
If you are familiar with the Juniper Networks products, Table 2-5 provides a cross-reference
between the IBM j-type m-series Ethernet routers and the models offered by Juniper
Networks.
Table 2-5 Cross-reference of IBM j-type m-series Ethernet routers to Juniper Networks models
IBM description IBM machine type and model Juniper networks
model
IBM j-type m-series Ethernet routers with powerful switching and security capabilities deliver
the reliability and flexibility needed to accelerate new business innovations. These routers
offer innovations with advanced routing features, a single Junos operating system across all
members of the j-type family, and high performance ASICs.
Optimized for Ethernet, these routers can be used to bring high performance, scalability, and
availability to aggregation and core deployments in a data center, and WAN Edges.
All three j-type m-series Ethernet routers address high performance networking requirements
that benefit from advanced routing features. These features include network virtualization with
The following sections provide information about the IBM Ethernet routers in depth.
Routing Engine
Each Routing Engine is a PC-based platform that runs the Junos operating system. Software
processes that run on the Routing Engine maintain the routing tables. They manage the
routing protocols used on the router. They also provide the interface for system management
and user access to the router. They also control the router interfaces and some chassis
components. Routing Engines communicate with dense port concentrators through dedicated
out-of-band management channels. They provide a clear distinction between the control and
forwarding planes. The Routing Engine is mounted within the switch control board as shown
in Figure 2-9.
Figure 2-9 Switch control board carrier and Routing Engine daughter card
Integrated into the switch control board is the switch fabric, which interconnects all of the
dense port concentrators within the chassis. The switch control board also has the Routing
Dense port concentrator cards for the IBM j-type m-series Ethernet routers enable cost- and
performance-optimized Ethernet services. Dense port concentrators are interchangeable
across the IBM j-type m-series Ethernet router portfolio to reduce costs and increase
flexibility.
Dense port concentrators come in various types to enable robust solution design. Some
dense port concentrators can switch and route to allow for a mid-range solution that can
operate as either a Layer 3 router or Layer 2 switch. Others include scaled-down switching
and routing functions for cost-optimized solutions. Yet others offer enhanced queuing for
high-performance solutions that can support per-VLAN queuing, up to 64,000 queues per
card. With this ability, providers can deploy business Ethernet services with committed
bandwidths and QoS characteristics, increasing revenue opportunities. Figure 2-11 on
page 54 shows dense port concentrators.
Ethernet services
Ethernet services ensure that the IBM j-type m-series Ethernet routers deliver cost savings
without sacrificing performance, reliability, scalability, or functionality. They also provide both
switching and high performance Ethernet routing functionality.
High performance
With exceptional performance, IBM j-type m-series Ethernet routers satisfy critical
applications. They include voice, video, and data, with packet forwarding up to 720 Mpps and
throughput up to 960 Gbps.
MPLS in the enterprise provides great flexibility and reliability for deploying important
applications. It enables consolidation of disparate networks onto a single network. It also
delivers control through traffic segmentation and provides resiliency with fast re-route and
traffic engineering.
With the virtualization capabilities of MPLS, one physical network can be configured and
operate as many separate virtual networks.
High availability
IBM Ethernet routers are designed to provide the highest level of redundancy and resiliency.
Both hardware and software high availability features ensure that critical services and
customers stay connected at all times.
Low-latency multicast
The low-latency multicasting feature enables efficient streaming of financial, video, media,
and IPTV content. Network performance is optimized while decreasing the amount of flow
replication. The result is an excellent end-user experience and bandwidth savings.
Interface scalability
The IBM j-type m-series Ethernet router chassis scales in size with choices of 2, 6 or 11 slots
that can be populated with line cards for access or network interfaces. With up to 11 line card
slots, the IBM Ethernet Router J11M supports up to 44 10 GbE ports or 440 GbE ports.
Advanced QoS
IBM j-type m-series Ethernet routers offer superior QoS at the interface level, which improves
port density, can reduce costs, and enables the network to ensure that services receive the
appropriate level of service regardless of traffic conditions. With this level of QoS, enterprises
can deliver various Layer 2 and Layer 3 services over Ethernet, such as the following
examples:
VLAN/transparent LAN
L2/L3 VPNs
Voice over IP (VoIP), with guaranteed service-level agreements (SLAs)
Figure 2-12 IBM j-type m-series virtualization features and usage for the data center
Network virtualization
Network virtualization improves network utilization, scalability, and resiliency.
Management virtualization
Management virtualization improves routing utilization.
Logical routers
Logical routers segment a physical router into multiple independent routers that perform
independent routing tasks. This technology virtualizes the configuration and operation of a
physical router into subsets, for increased manageability and protection. Enterprise
customers wanting increased privacy and security, for example, can assign departments to
separate virtual routing instances.
Virtual router
Virtual router provides multiple routing instances for the same physical router. This
functionality keeps routing instances separate. Hence, overlapping IP addresses can exist in
the virtual router instances. The virtual router functionality is a subset of the logical router
functionality because there is no separation of management of the different virtual routers.
Link aggregation
Link aggregation provides a mechanism for combining multiple physically separate Layer 2
links as a single logical link. It helps enterprise data centers scale more bandwidth than a
single Ethernet link can provide. It also enables savings on the expense of a higher-speed
Ethernet link. This technology can also help enterprise data centers provide redundant links
for greater resiliency. Thus datacenter managers can incrementally scale their investments by
increasing utilization of existing resources while deriving increased security.
Service virtualization
Service virtualization offers many flexible options for secure virtual connectivity:
Layer 2 VPN
Layer 2 VPN offers Layer 2 services, over MPLS, to build point-to-point connections that
connect different sites. Layer 2 VPNs are used to transport Layer 2 packets, across MPLS
networks, without any knowledge of Layer 3 information of the networks, in the VPN. With
this technology, data centers transport their existing L2 services, such as ATM, over an
IP/MPLS network, minimizing capital expenses. This technology can also be used to
transport Ethernet, allowing increased scalability.
VPLS
VPLS provides Ethernet-based point-to-multipoint communication over IP/MPLS
networks. It allows geographically dispersed datacenter LANs to connect to each other
across an MPLS backbone while maintaining Layer 2 connectivity. That is, VPLS creates a
virtual network giving perception (to the constituent nodes) that they are on the same
Ethernet LAN. Therefore, VPLS can provide an efficient and cost-effective method for data
migration across enterprise data centers.
Layer 3 VPN
Layer 3 VPN provides private links between data center sites that share common routing
information. A Layer 3 VPN is aware of routes within the network the VPN interconnects.
For example, by mapping Layer 3 VPNs to virtual security zones in an advanced firewall,
such as the IBM j-type Ethernet appliances, customers can layer many security policies
together selectively by traffic type.
VPLS can help datacenter managers migrate data between specific servers in co-located
data centers. Enterprises no longer need dedicated Layer 2 links between the data centers.
The ability to selectively apply VPLS to specific VLANs is crucial to most enterprises that are
interested in migrating only specific application data and not all the data in the data center.
This ability enables greater scalability of the datacenter infrastructure.
Common features
The IBM j-type m-series Ethernet routers have the following features:
High performance Ethernet L2, L2VPN, L3, or L3VPN router
Delivers advanced routing features, including network virtualization with MPLS, low
latency multicast, and QoS, without compromising performance
Redundant hardware and high availability features that ensure that the network is always
up and running:
– Redundant hardware: cooling, power supplies, Routing Engines, and switch control
boards
– Modular operating system
– Separate data and control planes
– Graceful restart
– Non-stop routing
– MPLS Fast Reroute (FRR)
– VPLS multi-homing
Excellent performance to ensure that services and customers stay connected:
– Powered by custom-designed ASICs
– Enhanced QoS capabilities
– Additional packet processing flexibility
– Scaling enhancements including route lookup, next hop, logical interface scaling, and
interface accounting
– Additional control storage capacity to provide headroom for future features of the Junos
operating system
– Enhanced multicast
Operational efficiencies and simplicity delivered through the Junos operating system
Each chassis scaling in size with choices of 2, 6, or 11 slots that can be populated with line
cards for access or network interfaces
Flexible port densities and WAN interfaces (dense port-count line cards)
Simultaneous support for Layer 2 and Layer 3 Ethernet services
Model features
Table 2-6 are the individual features of each IBM j-type routing product.
Figure 2-13 illustrates how Junos software runs on the entire IBM j-type infrastructure.
IBM provides high-performance network devices that create a responsive and trusted
environment for accelerating the deployment of services and applications over a single
network. Junos software is the foundation of these high-performance networks.
See IBM j-type Ethernet Appliance Implementation, SG24-7883, for information about the
IBM j-type Ethernet Appliances shown in Figure 2-13.
The following sections examine each of these key advantages a little closer.
The Junos software is preinstalled on your IBM j-type equipment when you receive it from the
factory. Thus, when you first power on the system, all software starts automatically. You need
only to configure the software so that the system can participate in the network. You can
upgrade the Junos software as new features are added or software problems are fixed. You
normally obtain new software by downloading the software installation packages from the IBM
Support Web page onto your system or onto another system on your local network. You then
install the software upgrade onto the IBM j-type system. IBM j-type systems run only binary
files supplied by IBM.
Each Junos software image includes a digitally signed manifest of executable programs that
are registered with the system only if the signature can be validated. Junos software does not
run any binary file without a registered signature. This feature protects the system against
unauthorized software and activity that might compromise the integrity of your IBM j-type
system.
For additional information about the Junos operating system, see Chapter 4, “Fundamental
concepts of the Junos operating system” on page 107.
The network infrastructure is complex, typically consisting of multiple layers of devices, with
an overlay of security that is configured separately at each layer. As a result of the network
simplification, the number of devices has been reduced and associated power has been
reduced. Also the space taken by devices has been reduced, and cooling requirements have
been reduced, resulting in significant operational expenditure (OPEX) savings.
With IBM Data Center Network infrastructure solutions, enterprise data centers benefit from
the following advantages:
Reduced complexity
All j-type routing and switching platforms use the same instance of the Junos operating
system software for simpler feature deployments and upgrades. The virtualization of
security services results in few physical devices to manage, thus preventing datacenter
sprawl.
Fewer layers of connectivity
The IBM j-type e-series Ethernet switches with Virtual Chassis technology greatly simplify
the data center. This technology reduces switch ports, links, switches, and aggregation
layers, while improving performance, resiliency, and availability, managed space, and
power costs. By simplifying the architecture and decreasing the number of devices,
businesses can reduce power, space, and cooling expenses to create a greener, more
energy-efficient data center.
Support for high performance and high resiliency
Using the top-of-rack j-type e-series Ethernet switches with Virtual Chassis technology
and the j-type s-series Ethernet appliance, organizations can scale performance and
increase resiliency while reducing the amount of equipment in the data center.
Network security services
The IBM j-type s-series Ethernet appliance delivers integrated services with scalable
performance to consolidate network security by requiring fewer devices and providing
centralized policy control and visibility to improve operational efficiency in the data center.
IBM high-performance network solutions for datacenter networks simplify the network design,
security, and management of the data center, as shown in Figure 2-14 on page 64.
Consolidate
layers,
minimize
devices
Minimize the
number of
devices to
manage Virtualized management
Single
operating
system
2008 2009 2010
DC Switches
Single software release train for all devices
LAN Switches
Routers
The key criteria for IBM Data Center Network simplification consists of the following areas:
Consolidation of the network layers:
– Simplifies the architecture
– Reduces space, power, and cooling requirements
– Eliminates the aggregation layer
– Offers great scalability and features
– Reduces latency
Virtualization of the access layer and minimization of the number of devices to manage:
– Require fewer switches to manage (up to one-tenth)
– Reduce uplinks
– Reduce latency across racks
– Optimize space, power, and cooling
– Offer end-of-row chassis features at top-of-rack economics
– Provide deployment flexibility (end-of-row or top-of-rack)
Single operating system instead of multiple operating systems for the entire network:
– Use only one operating system.
– Install only one release.
– Must understand only one architecture.
– Feature parity provided and reduced certification time for new releases.
For more information about the IBM Data Center Network solution simplification, see IBM
j-type Data Center Networking Introduction, SG24-7820.
http://www.ibm.com/systems/networking/hardware/j-type/index.html
You can find all of the following documents on the IBM support site at this address:
http://www.ibm.com/systems/support/supportsite.wss/brandmain?brandind=5375876
For more information about the IBM j-type Ethernet switches and the related hardware, see
the following documentation:
IBM Ethernet Switch J48E Complete Hardware Guide, GA32-0663
IBM Ethernet Switch J48E Quick Start, GA32-0664
IBM Ethernet Switch J08E Complete Hardware Guide, GA32-0665
IBM Ethernet Switch J08E Quick Start, GA32-0666
IBM Ethernet Switch J16E Complete Hardware Guide, GA32-0667
IBM Ethernet Switch J16E Quick Start, GA32-0668
For more information about the IBM j-type Ethernet routers the related hardware, see the
following documentation:
IBM j-type m-series Ethernet Router Dense Port Concentrators (DPC) Guide, GA32-0661
IBM j-type m-series Ethernet Routing Engine Installation Instructions, GA32-0682
IBM j-type m-series Ethernet Services PIC Guide, GA32-0662
IBM Ethernet Router J02M Hardware Guide, GA32-0655
IBM Ethernet Router J02M Quick Start, GA32-0656
IBM Ethernet Router J06M Hardware Guide, GA32-0657
IBM Ethernet Router J06M Quick Start, GA32-0658
IBM Ethernet Router J11M Hardware Guide, GA32-0659
IBM Ethernet Router J11M Quick Start, GA32-0660
JUNOS Software IBM j-type m-series Ethernet Routers Solutions Guide, GA32-0683
For more information about the Junos software, see the following documentation:
Juniper Web Device Manager for IBM j-type Ethernet Switches and Routers Interface
User Guide, GA32-0688
JUNOS Software Access Privilege Configuration Guide, GA32-0696
JUNOS Software Broadband Subscriber Management Solutions Guide, GA32-0709
JUNOS Software Class of Service Configuration Guide, GA32-0738
JUNOS Software CLI User Guide, GA32-0697
JUNOS Software Configuration and Diagnostic Automation Guide, GA32-0679
JUNOS Software Ethernet Routing Engine Media Upgrade Kit, GA32-0681
JUNOS Software Feature Guide, GA32-0739
JUNOS Software Hierarchy and RFC Reference, GA32-0712
For information about a particular hardware model and a step-by-step procedure for installing
the system, see the appropriate documents listed in 3.5, “More information” on page 105.
The following sections provide details about power for the IBM j-type Ethernet switches and
routers.
3.1.1 Power specifications and requirements for IBM Ethernet Switch J48E
The power supply in an IBM Ethernet Switch J48E is a hot-removable and hot-insertable
field-replaceable unit (FRU). You can install this FRU (Figure 3-1) on the rear panel without
powering off the switch or disrupting the switching function.
These switches have an internal redundant power supply, making the power supply fully
redundant.
Wait time for powering on or off a switch: After powering on a switch, wait for at least 60
seconds before powering it off. After powering off a switch, wait for at least 60 seconds
before powering it back on.
After a switch has been powered on, it can take up to 60 seconds for status indicators to
indicate that the power supply is functioning normally. Such status indicators include LEDs
on the power supply, show chassis command output, and messages on the LCD. Ignore
error indicators that are displayed during the first 60 seconds.
The power cord retainer clips extend from the power supply by approximately 3 inches.
Table 3-1 The ac power supply LEDs in an IBM Ethernet Switch J48E
LED State and description
AC OK Off—Disconnected from power or power is not coming into the power supply.
On—Power is coming into the power supply.
Unlit AC and DC OK LED lights: If the AC OK LED and the DC OK LED are unlit, either
the ac power cord is installed improperly or the power supply fuse has failed. If the AC OK
LED is lit and the DC OK LED is unlit, the ac power supply is not installed properly or the
power supply has an internal failure.
Table 3-2 lists ac power cord specifications provided for each country or region.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 69
Figure 3-2 illustrates the plug on the power cord for each country or region listed in Table 3-2
on page 69.
Six ac power supplies are installed in the switches. Power supplies are installed at the bottom
of the chassis in slots PSU 0 through PSU 5 (left to right). All power supplies are accessible
from the front of the chassis.
CAUTION:
Table 3-3 provides the status information for the LEDs of the power supply.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 71
LED State Description
Yellow The power supply has been disabled internally by the system.
Each ac power supply comes with a power retainer that holds the power cord in place
(Figure 3-4). The power retainer has a clip and an adjustment nut. The L-shaped ends of the
clip hook into the bracket holes on each side of the ac appliance inlet on the faceplate. The
adjustment nut holds the power cord in the correct position. For instructions to install the
power retainer, see the appropriate hardware guide listed in 3.5, “More information” on
page 105.
Each power supply connects to the backplane in an IBM j-type e-series Ethernet switch. The
backplane and the mid-plane distribute the output power produced by the power supplies to
different switch components. Each ac power supply provides power to all the components in
the switch.
Each power supply has its own fan and is cooled by its own internal cooling system. The
airflow is from the front of the power supply to the back. Hot air exhausts from the rear of the
chassis.
Each detachable ac power cord is 2.5 meters (approximately 8 feet) long. The appliance
coupler at the female end of the cord inserts into the ac appliance inlet on the faceplate of the
ac power supply. The coupler type is C19 as described by International Electrotechnical
Commission (IEC) standard 60320. The plug at the male end of the power cord fits into the
power source outlet that is standard for your geographical location.
Guidelines for North America: In North America, ac power cords must not exceed 4.5
meters (approximately 15 feet) in length, to comply with National Electrical Code (NEC)
Sections 400-8 (NFPA 75, 5-2.2) and 210-52 and Canadian Electrical Code (CEC) Section
4-010(3). The cords shipped with the switch are in compliance.
Table 3-4 lists the ac power cord specifications, by country or region, for an IBM e-series
modular switch.
Table 3-4 The ac power cord specifications for an IBM e-series modular switch
Country or region Electrical specifications Plug standards
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 73
Figure 3-5 shows the plug on the power cord for each country and region.
CAUTION:
The ac power cord for an IBM e-series modular switch is intended for use with the switch
only and not for any other use.
CAUTION:
For installations that require a separate grounding conductor to the chassis, use the
protective earthing terminal on the IBM e-series modular switch chassis to connect to earth
ground. Before switch installation begins, a licensed electrician must attach a cable lug to
the grounding cables that you supply.
For installations that require a separate grounding conductor to the chassis, the switch must
be adequately grounded before power is connected to ensure proper operation and to meet
safety and electromagnetic interference (EMI) requirements. To ground a switch, connect a
grounding cable to earth ground, and then attach it to the chassis grounding points.
Two pairs of threaded inserts (Power Entry Module (PEM) nuts) are provided on the chassis
for connecting the switch to earth ground. The first pair is on the right side toward the top rear
corner of the chassis. The second pair is on the rear of chassis toward the right bottom corner
of the chassis. Both pairs of grounding points fit UNC ¼-20 screws. The grounding points are
spaced at 0.625 in. (15.86 mm).
Earthing terminals: An IBM Ethernet Switch J16E has two protective earthing terminals
provided on the chassis. Only one of these protective earthing terminals must be
permanently connected to the earth.
Grounding is provided to an ac-powered switch when you plug its power supplies into
grounded ac power receptacles.
The grounding cable that you provide for the switch must be 2 AWG (33.6 mm2), minimum
60°C wire, or as permitted by the local code.
CAUTION:
3.1.3 Power specifications and requirements for IBM Ethernet Routers J02M,
J06M, and J11M
The IBM Ethernet j-type routers use ac power supplies. The power supplies connect to the
mid plane, which distributes the different output voltages produced by the power supplies to
the router components, depending on their voltage requirements. Each power supply is
cooled by its own internal cooling system.
Redundant power supplies are hot removable and hot insertable. The J02M and J06M
Ethernet j-type routers both have two power supplies that provide full redundancy. The J11M
Ethernet j-type router has four power supplies and provides full redundancy. Routers that are
configured with two power supplies are shipped with a blank panel installed over the power
supply slots that are not populated.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 75
Requirements for the ac power circuit breaker for IBM j-type Ethernet
routers
Each ac power supply has a single ac appliance inlet in the chassis directly above the power
supply that requires a dedicated ac power feed. Use a dedicated customer site circuit breaker
rated for 15 A (250 VAC) minimum for each ac power supply, or as required by local code.
Detachable ac power cords, each 2.5 m (approximately 8 ft) long, are supplied with the router.
The C19 appliance coupler at the female end of the cord inserts into the ac appliance inlet
coupler, type C20 (right angle) as described by IEC standard 60320. The plug at the male end
of the power cord fits into the power source receptacle that is standard for your geographical
location.
Table 3-6 provides specifications for the ac power cord provided for each country or region.
Table 3-6 Specifications for the ac power cord for J02M and J06M routers
Country or region Electrical specifications Plug standards
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 77
Figure 3-8 shows the plug on the ac power cord provided for each country or region.
Figure 3-8 The ac cord plug types for the J02M and J06M routers
Each ac power supply provides power to all components in the router. Four ac power supplies
provide full power redundancy. If one power supply fails or is removed, the remaining power
supplies instantly assume the entire electrical load without interruption. Three power supplies
provide the maximum configuration with full power while the router is operational. Each ac
power supply has a corresponding ac appliance inlet in the chassis directly above the power
supply. Each inlet requires a dedicated ac power feed and a dedicated 15 A (250 VAC) circuit
breaker.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 79
J11M ac power supply LEDs
Each ac power supply faceplate contains three LEDs that indicate the status of the power
supply as shown in Table 3-7.
AC OK Green Off The ac power applied to the power supply is not within the
normal operating range.
DC OK Green Off The dc power outputs generated by the power supply are
not within the normal operating ranges.
The ac power cord specifications for the J02M and J06M routers
Each ac power supply has a single ac appliance inlet on the power supply that requires a
dedicated ac power feed. Most sites distribute power through a main conduit that leads to
frame-mounted power distribution panels. One of these panels can be at the top of the rack
that houses the router. An ac power cord connects each power supply to the power
distribution panel.
Detachable ac power cords, each 2.5 m (approximately 8 ft.) long, are supplied with the
router. The C19 appliance coupler at the female end of the cord inserts into the ac appliance
inlet coupler, type C20 (right angle) as described by IEC standard 60320. The plug at the
male end of the power cord fits into the power source receptacle that is standard for your
geographical location.
Table 3-8 provides specifications for the ac power cord provided for each country or region.
Figure 3-10 The ac cord plug types for the J11M router
CAUTION:
The ac power cord for an IBM e-series modular switch is intended for use with the switch
only and not for any other use.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 81
J11M chassis grounding specifications
To meet safety and EMI requirements and to ensure proper operation, the router must be
adequately grounded before power is connected. To ground the routers, you must connect a
grounding cable to earth ground and then attach it to the chassis grounding points using the
two screws that are provided. Two threaded inserts (PEM nuts) are provided on the right of
the lower rear of the chassis for connecting the router to earth ground as shown in
Figure 3-11.
CAUTION:
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 83
The fan tray is at the rear of the chassis and provides side-to-rear chassis cooling as shown in
Figure 3-13.
The fan tray used in the switch comes with load-sharing redundancy that can tolerate a single
fan failure at room temperature (below 45° C/113° F) to still provide sufficient cooling.
Temperature sensors in the chassis monitor the temperature within the chassis. The system
raises an alarm if the fan fails or if the temperature inside the chassis rises above permitted
levels. If the temperature inside the chassis rises above the threshold, the system shuts down
automatically and the temperature shutdown LED on the rear panel is lit.
Both fan trays install vertically on the front of the chassis, one on the top left and the other on
the bottom left. The top and bottom fan trays are identical and interchangeable. Both fan trays
can be removed and replaced from the front of the chassis. The switch continues to operate
for a limited time (2 minutes) after a fan tray has been removed.
Replacing the fan tray: You must replace the fan tray within 2 minutes of removing it or
the system will shut down.
The switch has side-to-side airflow in the front of the chassis. The air intake to cool the
chassis from the mid plane to the chassis front is on the right side of the chassis. Air is pulled
into the chassis and is pushed through the line card cage toward the fan trays. Hot air
exhausts from the left side of the chassis.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 85
Figure 3-15 shows how the air flows through the switches. The air intake to cool the power
supplies is in the front of each power supply unit. The exhaust for the hot air collected from
the power supplies is on the rear of the chassis at the bottom. See the side view in
Figure 3-15 for this airflow.
Cooling for the rear of the chassis and the switch fabric modules is done with front-to-side
airflow. The air intake to cool the chassis from the midplane to the chassis rear is on the front
of the chassis, just below the slots for the power supplies. Air is pulled in from the chassis front
toward the chassis rear and then pulled to the top of the chassis by the top fan tray. The hot air
is forced to turn left and exhausts from the left side of the chassis as shown in Figure 3-16 on
page 87.
The Routing Engine module monitors the temperature of switch components. Under normal
operating conditions, the fans in the fan trays run at less than full speed. Each fan tray has two
fan tray controllers.
In each fan tray, the fans are numbered 1 through 9. Fans 1 through 5 are controlled by the
first fan tray controller. Fans 6 through 9 are controlled by the second fan tray controller. If one
fan tray controller fails, the other fan tray controller keeps the remaining fans in the fan tray
working. This way, the switch can continue to operate normally while the remaining working
fans cool the chassis sufficiently.
If the ambient temperature rises above the threshold 113°F (45°C), the speed of the working
fans is automatically adjusted to keep the temperature within the acceptable range, 32°F
(0°C) through 104°F (40°C).
The fan trays continue to operate indefinitely and provide sufficient cooling even when a
single fan fails, if the room temperature is within the operating range.
CAUTION:
Do not block the air intake below the power supply slots.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 87
The J02M and J06M cooling system
The cooling system components work together to keep all router components within the
acceptable temperature range. Figure 3-17 illustrates the airflow of the J02M cooling system.
The routers have one fan tray and one air filter that installs vertically in the rear of the router.
The fan tray contains three or six fans depending on system model. The air intake to cool the
chassis is on the side of the chassis next to the air filter. Air is pulled through the chassis
toward the fan tray, where it is exhausted out the side of the system. The air intake to cool the
power supplies is in the front of the router above the craft interface. The exhaust for the power
supplies is on the rear bulkhead power supplies.
Figure 3-19 Fan tray and air filter for the J02M cooling system
Figure 3-20 Fan tray and filter for the J06M cooling system
The host subsystem monitors the temperature of the router components. When the router is
operating normally, the fans function at lower than full speed. If a fan fails or the ambient
temperature rises above a threshold, the speed of the remaining fans is automatically
adjusted to keep the temperature within the acceptable range. If the ambient maximum
temperature specification is exceeded and the system cannot be adequately cooled, the
Routing Engine shuts down the system by disabling output power from each PEM.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 89
Monitor the status of the fans. A fan tray contains multiple fans that work in unison to cool the
router components. If one fan fails, the host subsystem adjusts the speed of the remaining
fans to maintain proper cooling.
The cooling system components work together to keep all router components within the
acceptable temperature range. Figure 3-21 shows three views of the airflow of the J11M
router.
The router has two fan trays in the front of the router that install horizontally above and below
the card cage. Each fan tray contains six fans. The fan trays are interchangeable and are
hot-insertable and hot-removable (Figure 3-22).
Figure 3-23 Air filter and air filter tray for the J11M
The host subsystem monitors the temperature of the router components. When the router is
operating normally, the fans function at lower than full speed. If a fan fails or the ambient
temperature rises above a threshold, the speed of the remaining fans is automatically
adjusted to keep the temperature within the acceptable range. If the ambient maximum
temperature specification is exceeded and the system cannot be adequately cooled, the
Routing Engine shuts down the system by disabling output power from each PEM.
A single air intake is in the front of the router. Air is pushed up through the dense port
concentrator card cage and through the upper fan tray. There it combines in a common
exhaust plenum and is exhausted out the upper rear of the system.
Monitor the status of the fans. A fan tray contains multiple fans that work in unison to cool the
router components. If one fan fails, the host subsystem adjusts the speed of the remaining
fans to maintain proper cooling. A red alarm is triggered when a fan fails, and a yellow alarm
and red alarm are triggered when a fan tray is removed.
3.3 Racks
Various racks are used for the IBM j-type Ethernet switches and routers as explained in the
following sections.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 91
If you are installing multiple switches to function as a Virtual Chassis, you must install the
switches in a rack or cabinet. One pair of mounting brackets, for mounting the switch on two
posts, is supplied with each switch. You can order a four-post rack-mount kit separately.
Additionally, the IBM Ethernet Switch J48E can be mounted in a cabinet that contains a 19-in.
rack as defined in Cabinets, Racks, Panels, and Associated Equipment (document number
EIA-310-D). This document is published by the Electronics Industry Association, which you
can find at the following address:
http://www.eia.org
Table 3-9 summarizes the cabinet requirements and specifications for IBM Ethernet Switch
J48E.
Table 3-9 Cabinet requirements and specifications for IBM Ethernet Switch J48E
Cabinet requirement Guidelines for IBM Ethernet Switch J48E
Cabinet size and The minimum cabinet size for accommodating an IBM Ethernet Switch J48E is 23.62 in.
clearance (60 cm) wide and 30.0 in. (76.2 cm) deep. Large cabinets improve airflow and reduce the
chance of overheating. To accommodate a single switch in a two-post or four-post rack,
the cabinet must be at least 1 U high. A U is the standard rack unit defined in Cabinets,
Racks, Panels, and Associated Equipment (document number EIA-310–D) published by
the Electronics Industry Association.
With adequate cooling air and airflow clearance, you can stack up to 42 IBM Ethernet
Switch J48E units in a cabinet with a two-post or four-post rack that has at least 42 U of
usable vertical space. The rack must meet the strength requirements to support the
weight.
The minimum total clearance inside the cabinet is 29.2 in. (74.17 cm) between the inside
of the front door and the inside of the rear door.
Cabinet airflow When you mount the switch in a cabinet, ensure that ventilation through the cabinet is sufficient
requirements to prevent overheating. Consider the following requirements list when planning for chassis
cooling:
Ensure that the cool air supply you provide through the cabinet adequately dissipates the
thermal output of the switch (or switches).
Ensure that the cabinet allows the chassis hot exhaust air to exit the cabinet without
recirculating into the switch. An open cabinet (without a top or doors) that employs hot air
exhaust extraction from the top allows the best airflow through the chassis. If the cabinet
contains a top or doors, perforations in these elements assist with removing the hot air
exhaust. For an illustration of chassis airflow, see Figure 3-25 on page 94.
The switch fans exhaust hot air through the rear of the chassis. Install the switch in the
cabinet in a way that maximizes the open space at the rear of the chassis to provide
maximum clearance for critical airflow.
Route and dress all cables to minimize the blockage of airflow to and from the chassis.
Ensure that the spacing of rails and adjacent racks allows for the proper clearance around
the switch and rack as specified in “Clearance requirements for airflow and hardware
maintenance for an IBM Ethernet Switch J48E” on page 93.
Figure 3-24 Clearance requirements for airflow and hardware maintenance for IBM Ethernet Switch
J48E
You must ensure that the exhaust from other equipment does not blow into the intake vents of
the chassis in the following situations:
You are mounting the switch in a rack or cabinet with other equipment.
You are placing it on the desktop or floor near other equipment.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 93
Figure 3-25 Airflow through the IBM Ethernet Switch J48E chassis
Additionally, the IBM Ethernet Switch J08E and J16E can be mounted in a cabinet that
contains a 19-in. rack as defined in Cabinets, Racks, Panels, and Associated Equipment
(document number EIA-310-D) published by the Electronics Industry Association.
Table 3-10 on page 95 summarizes the cabinet requirements and specifications for IBM
e-series modular switches.
Installation: The switch can be installed only in a four-post rack or cabinet. Installation in a
two-post rack or cabinet is not supported.
Cabinet size and The minimum cabinet size for accommodating the switch is 23.62 in. (60 cm) wide and
clearance 36.0 in. (91.4 cm) deep. Large cabinets improve airflow and reduce the chance of
overheating. To accommodate a single switch in a four-post rack, the cabinet must be at
least 21 U high (or 22 U if you install the power cord tray, which is optional for the
four-post rack). A U is the standard rack unit defined in Cabinets, Racks, Panels, and
Associated Equipment (document number EIA-310–D) published by the Electronics
Industry Association.
With adequate cooling air and airflow clearance, you can stack two J16E switches, or
three J08E switches, in a cabinet with a four-post rack that has at least 42 U of usable
vertical space. (44 U or 45 U are required if you install the optional power cord trays.) In
all cases, the rack must meet the strength requirements to support the weight of the
installed switches.
Cabinet airflow When you mount the switch in a cabinet, ensure that ventilation through the cabinet is
requirements sufficient to prevent overheating. Consider the following requirements list when planning for
chassis cooling:
Ensure that the cool air supply you provide through the cabinet adequately dissipates the
thermal output of the switch (or switches).
Ensure that the cabinet allows the chassis hot exhaust air to exit the cabinet without
recirculating into the switch. An open cabinet (without a top or doors) that employs hot air
exhaust extraction from the top allows the best airflow through the chassis. If the cabinet
contains a top or doors, perforations in these elements assist with removing the hot air
exhaust.
The switch fans exhaust hot air through the right side of the chassis (the left side when
you face the front of the chassis, where the fan tray slides in). Install the switch in the
cabinet in a way that maximizes the open space on the fan tray side of the chassis. This
maximizes the clearance for critical airflow.
Route and dress all cables to minimize the blockage of airflow to and from the chassis.
Ensure that the spacing of rails and adjacent racks allows for the proper clearance
around the switch and rack as specified in “Clearance requirements for airflow and
hardware maintenance for the IBM j-type e-series modular switches”
If you are mounting the switches in a rack or cabinet along with other equipment, ensure that
the exhaust from other equipment does not blow into the intake vents of the IBM e-series
modular switches.
Leave adequate space at the front of the switches for service personnel to remove and install
hardware components. NEBS GR-63 recommends that you allow at least 30 in. (76.2 cm) in
front of the rack or cabinet and 24 in. (61 cm) behind the rack or cabinet.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 95
3.3.3 IBM Ethernet Routers J02M, J06M, and J11M
You can mount the IBM Ethernet Routers in four-post open or Telco racks. Two-post open
rack installations are not supported. For more information about the open rack requirements,
see the appropriate hardware guide listed in 3.5, “More information” on page 105.
Additionally, the IBM Ethernet Routers can be mounted in a cabinet that contains a 19-in. rack
as defined in Cabinets, Racks, Panels, and Associated Equipment (document number
EIA-310-D) published by the Electronics Industry Association.
Installation: The switch can be installed only in a four-post rack or cabinet. Installation in a
two-post rack or cabinet is not supported.
Table 3-11 Cabinet requirements and specifications for an IBM m-series Ethernet Router
Cabinet requirements Guidelines for the IBM m-series Ethernet Router
Cabinet size and The minimum cabinet size that can accommodate the routers is 482-mm wide and
clearance 800-mm deep. A cabinet larger than the minimum requirement provides better airflow
and reduces the chance of overheating. To accommodate a single router, the cabinet
must be at least J02M and J06M = 13 U high, or J11M = 16 U high. A U is the standard
rack unit defined in Cabinets, Racks, Panels, and Associated Equipment (document
number EIA-310–D) published by the Electronics Industry Association.
If you provide adequate cooling air and airflow clearance in a cabinet that has at least 42
U of usable vertical space, you can stack two IBM Ethernet Router J11M units with the
standard cable manger installed, four IBM Ethernet Router J06M units with the standard
cable manager installed, or seven IBM Ethernet Router J02M units with the standard
cable manager installed. In all cases, the rack must meet the strength requirements to
support the weight.
The minimum front and rear clearance requirements depend on the mounting
configuration you choose. The minimum total clearance inside the cabinet is 30.7 in. (780
mm) between the inside of the front door and the inside of the rear door.
Cabinet airflow When you install the router in a cabinet, you must ensure that ventilation through the cabinet
requirements is sufficient to prevent overheating. Consider the following requirements when planning for
chassis cooling:
Airflow must always be from front to back with respect to the rack. If the device has
side-to-rear airflow, make provisions to ensure that fresh air from the front of the rack is
supplied to the inlets, and exhaust exits the rear of the rack. The device must not
interfere with the cooling of other systems in the rack. Fillers must be used as
appropriate in the rack to ensure that heated exhaust air is not recirculated back to the
front of the rack. Use care around cables to ensure no leakage of air in situations where
recirculation might result.
Ensure that the cool air supply you provide through the cabinet can adequately dissipate
the thermal output of the routers.
Ensure that the cabinet allows the chassis hot exhaust air to exit from the cabinet without
recirculating into the routers. An open cabinet (without a top or doors) that employs hot
air exhaust extraction from the top allows the best airflow through the chassis. If the
cabinet contains a top or doors, perforations in these elements assist with removing the
hot air exhaust.
Route and dress all cables to minimize the blockage of airflow to and from the chassis.
Ensure that the spacing of rails and adjacent racks allows for the proper clearance
around the router and rack as specified in “Clearance requirements for airflow and
hardware maintenance for the IBM j-type m-series Ethernet routers”.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 97
Figure 3-26 Airflow of the J02M
Leave adequate space at the front of the switches for service personnel to remove and install
hardware components. NEBS GR-63 recommends that you allow at least 30 in. (76.2 cm) in
front of the rack or cabinet and 24 in. (61 cm) behind the rack or cabinet.
3.4 Cabling
This section provides details about cabling for the IBM j-type Ethernet switches and routers.
All IBM j-type Ethernet switches and routers use the same cable types for the interfaces.
Therefore, we do not break this section into various equipment types, but rather discuss cable
types that apply to the IBM j-type Ethernet switches and routers.
Console port
The cable used for the console port is an RS-232 (EIA-232) serial cable with an RJ45 on one
end and a DB9 on the other end. The ports are configured as data terminal equipment (DTE).
Table 3-12 details the pinout for the DB9 end.
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 99
Table 3-13 details the pinout for the RJ45 end.
Aux port: The port labeled Aux has the same cable requirements as the console port.
This port is an auto-sensing 10/100-Mbps Ethernet RJ-45 receptacle that accepts a standard
Ethernet cable for connecting the system to a management LAN (or other device that
supports out-of-band management). Table 3-14 describes the RJ-45 connector pinout.
1 TX +
2 TX -
3 RX +
4 Termination network
5 Termination network
6 RX -
7 Termination network
8 Termination network
1 TD + Transmit data
2 TD - Transmit data
3 RD + Receive data
6 RD - Receive data
Optical ports
Throughout the IBM j-type Ethernet switches and routers, optical ports are used for various
types of connectivity, such as the following examples:
100Base-FX
1000Base-SX
1000Base-LX
1000Base-LH (or 1000Base-ZX)
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 101
10GBase-SR
10GBase-LR
10GBase-LRM
Virtual Chassis Interconnect
All optical ports use standard small form-factor pluggable (SFP), or 10 gigabit small
form-factor pluggable (XFP) transceivers that require Lucent Connectors (LCs).
Optical cables
Fiber-optic cables used with j-type equipment must match the specifications of the transceiver
that is used for that particular port. Certain details, such as the mode (single mode, or
multimode), must be correct for the exact transceiver. Other details, such as size (50 micron
or 62.5 micron), must be sufficient for the particular connection, such as the distance that the
signal must traverse.
On the J48E, you can configure a Virtual Chassis by using fiber-optic cables, which were
explained earlier in this chapter. Alternatively, you can use a 68-pin connector cable to
interconnect switches to form a Virtual Chassis. The cable is provided with the switch.
A1 GND
A2 P1TXP0
A3 P1TXN0
A4 GND
A5 P1TXP1
A6 P1TXN1
A7 GND
A8 P1TXP2
A9 P1TXN2
A10 GND
A11 P1TXP3
A12 P1TXN3
A13 GND
A14 NC
A15 NC
A16 GND
A17 NC
A18 NC
A19 NC
A20 NC
A21 NC
A22 GND
A23 P2TXP0
A24 P2TXN0
A25 GND
A26 P2TXP1
A27 P2TXN1
A28 GND
A29 P2TXP2
A30 P2TXN2
A31 GND
A32 P2TXP3
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 103
Pin number Pin name
A33 P2TXN3
A34 GND
B1 GND
B2 P1RXP0
B3 P1RXN0
B4 GND
B5 P1RXP1
B6 P1RXN1
B7 GND
B8 P1RXP2
B9 1RXN2
B10 GND
B11 P1RXP3
B12 P1RXN3
B13 GND
B14 NC
B15 NC
B16 NC
B17 NC
B18 NC
B19 NC
B20 NC
B21 NC
B22 GND
B23 P2RXP0
B24 P2RXN0
B25 GND
B26 P2RXP1
B27 P2RXN1
B28 GND
B29 P2RXP2
B30 P2RXN2
B31 GND
B32 P2RXP3
B33 P2RXN3
B34 GND
Alternately, an IBM Ethernet Switch J48E has an FRU uplink module on the front panel.
http://www.ibm.com/systems/support/supportsite.wss/brandmain?brandind=5375876
The installation of each model of the IBM j-type e-series and m-series systems is
documented in both the quick start and hardware guides for each system type. For additional
information and step-by-step installation procedures, see the following appropriate
documentation:
IBM Ethernet Switch J48E Complete Hardware Guide, GA32-0663
IBM Ethernet Switch J48E Quick Start, GA32-0664
IBM Ethernet Switch J08E Complete Hardware Guide, GA32-0665
IBM Ethernet Switch J08E Quick Start, GA32-0666
IBM Ethernet Switch J16E Complete Hardware Guide, GA32-0667
IBM Ethernet Switch J16E Quick Start, GA32-0668
For more information about the IBM j-type Ethernet routers the related hardware, see the
following documentation:
IBM j-type m-series Ethernet Router Dense Port Concentrators (DPC) Guide, GA32-0661
IBM j-type m-series Ethernet Routing Engine Installation Instructions, GA32-0682
IBM j-type m-series Ethernet Services PIC Guide, GA32-0662
IBM Ethernet Router J02M Hardware Guide, GA32-0655
IBM Ethernet Router J02M Quick Start, GA32-0656
IBM Ethernet Router J06M Hardware Guide, GA32-0657
IBM Ethernet Router J06M Quick Start, GA32-0658
IBM Ethernet Router J11M Hardware Guide, GA32-0659
IBM Ethernet Router J11M Quick Start, GA32-0660
JUNOS Software IBM j-type m-series Ethernet Routers Solutions Guide, GA32-0683
For more information about Junos software, see the following documentation:
Juniper Web Device Manager for IBM j-type Ethernet Switches and Routers Interface
User Guide, GA32-0688
JUNOS Software Access Privilege Configuration Guide, GA32-0696
JUNOS Software Broadband Subscriber Management Solutions Guide, GA32-0709
JUNOS Software Class of Service Configuration Guide, GA32-0738
JUNOS Software CLI User Guide, GA32-0697
Chapter 3. Initial hardware planning of IBM j-type Ethernet switches and routers 105
JUNOS Software Configuration and Diagnostic Automation Guide, GA32-0679
JUNOS Software Ethernet Routing Engine Media Upgrade Kit, GA32-0681
JUNOS Software Feature Guide, GA32-0739
JUNOS Software Hierarchy and RFC Reference, GA32-0712
JUNOS Software High Availability Configuration Guide, GA32-0670
JUNOS Software IBM j-type m-series Ethernet Routers Layer 2 Configuration Guide,
GA32-0708
JUNOS Software Installation and Upgrade Guide, GA32-0695
JUNOS Software Interfaces Command Reference, GA32-0672
JUNOS Software JUNOScript API Guide, GA32-0674
JUNOS Software MPLS Applications Configuration Guide, GA32-0702
JUNOS Software Multicast Protocols Configuration Guide, GA32-0703
JUNOS Software NETCONF API Guide, GA32-0678
JUNOS Software Network Interfaces Configuration Guide, GA32-0706
JUNOS Software Network Management Configuration Guide, GA32-0698
JUNOS Software Policy Framework Configuration Guide, GA32-0704
JUNOS Software Routing Protocols and Policies Command Reference, GA32-0673
JUNOS Software Services Interfaces Configuration Guide, GA32-0707
JUNOS Software Subscriber Access Configuration Guide, GA32-0711
JUNOS Software System Basics and Services Command Reference, GA32-0671
JUNOS Software System Log Messages Reference, GA32-0675
JUNOS Software VPNs Configuration Guide, GA32-0705
JUNOScope Software User Guide, GA32-0670
One OS
Branch Core
Single operating system across platforms
One OS Flexible and operationally efficient infrastructure
One Release
9.5 10.0 10.1
Single software release train of feature supersets
3Q09 4Q09 1Q10
Stable, predictable delivery of new functionality
One Release Train
One Architecture
–API–
Module
x
Modular software, interfaces to integrate and adapt
Highly available, secure, and evolutionary software
One Architecture
Routing Engine
User
Forwarding
table Kernel
Embedded microkernel
The Junos software runs on the Routing Engine. As mentioned, the Junos software
processes run on top of the kernel, which enables communication between processes and
provides a direct link to the Packet Forwarding Engine software. The Junos software can be
used to configure routing protocols and router interface properties and to monitor and
troubleshoot protocol and network connectivity problems.
The following processes are among the most important Junos software processes:
Routing Engine kernel
The Routing Engine kernel provides the underlying infrastructure for all Junos software
processes. It also provides the link between the routing tables and the forwarding table of
the Routing Engine. It is also responsible for all communication with the Packet Forwarding
Engine.
Initialization process
An initialization process starts and monitors all the other software processes when the
router boots. If a software process terminates or fails to start, the initialization process
attempts to restart it a limited number of times and logs any failure information for further
investigation.
Management process
The management process manages the configuration of the router and all user
commands. The management process is responsible for notifying other daemons when a
new configuration is committed.
Routing protocol process
The routing protocol process controls the routing protocols that run on the router. This
process starts all configured routing protocols and handles all routing messages. It
maintains one or more routing tables, which consolidate the routing information learned
from all routing protocols. From this routing information, the routing protocol process
determines the active routes to network destinations and installs these routes into the
forwarding table of the Routing Engine. Finally, it implements a routing policy that you can
use to control the routing information that is transferred between the routing protocols and
the routing table. You can also filter routing information using routing policy and set the
properties associated with routes.
Interface process
With the interface process, you can configure and control the physical interface devices
and logical interfaces that are present in a device. You can configure interface properties
such as the interface location, the interface encapsulation, and interface-specific
properties. You can configure the interfaces currently present in the router and interfaces
that are not present but that you might add later. The Junos interface process
communicates through the kernel with the interface process in the Packet Forwarding
Engine. With this feature, you can track the status and condition of the interface of the
router.
Chassis process
With the chassis process, you can configure and control the properties of the router,
including conditions that trigger alarms. The chassis process on the Routing Engine
communicates directly with its peer processes running on the Packet Forwarding Engine.
The Packet Forwarding Engine receives the forwarding table and bridging table from the
Routing Engine through an internal link. Forwarding table and bridging table updates are a
high priority for the software kernel.
The Packet Forwarding Engine forwards packets based on the Layer 2 and Layer 3 forwarding
tables provided by the Routing Engine. It also implements several advanced services.
Examples of advanced services include policies that provide rate limiting, firewall filters, and
class of service.
Commit
Load Candidate Verified Active
Configuration Configuration Configuration
CLI Rollback
Checks
The router can have a maximum of 49 rollback configurations (1–49) saved on the system.
On the router, the active configuration file and the first three rollback files (juniper.conf.gz.1,
juniper.conf.gz.2, juniper.conf.gz.3) are in the /config directory. If the recommended
rescue.conf.gz rescue file is saved on the system, this file must also be saved in the /config
directory. The factory default files are in the /etc/config directory.
Two mechanisms are used to propagate the configurations between the Routing Engines
within a router:
Synchronization
This mechanism propagates a configuration from one Routing Engine to a second Routing
Engine within the same router chassis. To synchronize the configurations of a router, use
the commit synchronize command-line interface (CLI) command. If one of the Routing
Engines is locked, the synchronization fails. If synchronization fails because of a locked
configuration file, you can use the commit synchronize force command. This command
overrides the lock and synchronizes the configuration files.
Distribution
This mechanism propagates a configuration across the routing plane on a multichassis
router. Distribution occurs automatically. No user command is available to control the
distribution process. If a configuration is locked during a distribution of a configuration, the
locked configuration does not receive the distributed configuration file. Therefore, the
synchronization fails. You must clear the lock before the configuration and resynchronize
the routing planes.
The CLI also provides various UNIX utilities, such as the following examples:
Emacs-style keyboard sequences so that you can move around on a command line and
scroll through recently executed commands
Regular expression matching to locate and replace values and identifiers in a
configuration, filter command output, or log file entries
Store and archive router files on a UNIX-based file system
Exit from the CLI environment and create a UNIX C shell or Bourne shell to navigate the
file system
Manage switch processes
The CLI has two modes, operational mode and configuration mode.
For more information about operational mode, see Chapter 6, “User interface” on page 143.
For more information about configuration mode, see Chapter 6, “User interface” on page 143.
http://www.juniper.net/techpubs/en_US/junos10.1/information-products/topic-collect
ions/config-guide-system-basics/config-guide-system-basics.pdf
For more information about Junos CLI, see the CLI User Guide at the following web address:
http://www.juniper.net/techpubs/en_US/junos10.1/information-products/topic-collect
ions/swconfig-cli/swconfig-cli.pdf
While this book only focuses on the IBM j-type Ethernet switches and the routers, all these
devices were part of the configuration and testing of examples. See IBM j-type Ethernet
Appliance Implementation, SG24-7883, for more information about the IBM j-type Ethernet
Appliances shown in Figure 5-1 on page 118.
Figure 5-1 illustrates how each device cables with other devices in the lab environment. Three
units of IBM Ethernet Switch J48Es are interconnected to build a single management switch
called a Virtual Chassis switch. IBM Ethernet switches and routers are interconnected in full
mesh topology. Connections of IBM Ethernet routers and appliances have a full mesh
topology to provide change flexibility to different examples in later chapters.
5.2 Initial setup for the J08E, J16E, and J48E switches
Before configuring an IBM J08E, IBM J16E, or IBM J48E switch, the switch must be physically
mounted and connected to the appropriate electrical outlets. The amount of planning and
preparation that is required for the installation depends on the switch model that is being
installed. Switch models have specific installation requirements, which are covered in
Chapter 3, “Initial hardware planning of IBM j-type Ethernet switches and routers” on page 67.
After the switch is installed and turned on, you must set the initial configuration parameters.
All of the j-type E series switches require the same initial setup.
When you turn on or restart the switch, the following actions occur:
1. The power-on self-test (POST) diagnostic tests run.
2. The Junos operating system loads.
By connecting to the switch console port using a terminal emulator, such as PuTTY, you can
monitor the switch POST tests and Junos load as they progress. Example 5-1 shows a typical
startup process.
Output of the software load process: The output of the software load process is
provided as an example. The output will differ depending on the system hardware and
configuration.
[email protected]:/volume/build/junos/10.0/release/10.0R3.10/obj-powerpc
/bsd/sys/compile/JUNIPER-EX
Timecounter "decrementer" frequency 37500000 Hz quality 0
cpu0: Freescale e500v2 core revision 2.2
cpu0: HID0 80004080<EMCP,TBEN,EN_MAS7_UPDATE>
real memory = 513802240 (490 MB)
avail memory = 502706176 (479 MB)
ETHERNET SOCKET BRIDGE initialising
Initializing EXSERIES platform properties ...
nexus0: <PPC e500 Nexus device>
ocpbus0: <on-chip peripheral bus> on nexus0
openpic0: <OpenPIC in on-chip peripheral bus> iomem 0xfef40000-0xfef600b3 on
ocpbus0
uart0: <16550 or compatible> iomem 0xfef04500-0xfef0450f irq 58 on ocpbus0
uart0: console (9600,n,8,1)
uart1: <16550 or compatible> iomem 0xfef04600-0xfef0460f irq 58 on ocpbus0
lbc0: <Freescale 8533 Local Bus Controller> iomem
0xfef05000-0xfef05fff,0xff000000-0xffffffff irq 22 on ocpbus0
cfi0: <AMD/Fujitsu - 8MB> iomem 0xff800000-0xffffffff on lbc0
syspld0 iomem 0xff000000-0xff00ffff on lbc0
tsec0: <eTSEC ethernet controller> iomem 0xfef24000-0xfef24fff irq 45,46,50 on
ocpbus0
tsec0: hardware MAC address 00:1f:12:3b:88:7f
miibus0: <MII bus> on tsec0
e1000phy0: <Marvell 88E1112 Gigabit PHY> on miibus0
e1000phy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX-FDX, auto
pcib0: <Freescale MPC8544 PCI host controller> iomem
0xfef08000-0xfef08fff,0xf0000000-0xf3ffffff on ocpbus0
pci0: <PCI bus> on pcib0
pci0: <serial bus, USB> at device 18.0 (no driver attached)
ehci0: <Philips ISP156x USB 2.0 controller> mem 0xf0001000-0xf00010ff irq 22 at
device 18.2 on pci0
usb0: EHCI version 1.0
usb0: <Philips ISP156x USB 2.0 controller> on ehci0
usb0: USB revision 2.0
uhub0: Philips EHCI root hub, class 9/0, rev 2.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
umass0: STMicroelectronics ST72682 High Speed Mode, rev 2.00/2.10, addr 2
pcib1: <Freescale MPC8544 PCI Express host controller> iomem
0xfef0a000-0xfef0afff,0xe0000000-0xe3ffffff,0xec000000-0xec0fffff irq 42 on
ocpbus0
pci1: <PCI bus> on pcib1
pcib2: <PCI-PCI bridge> at device 0.0 on pci1
pci2: <PCI bus> on pcib2
Amnesiac (ttyu0)
Running the ezsetup script: To run the ezsetup script, the switch must have the
factory default configuration. If you have configured anything on the switch and want to
run the ezsetup script, revert to the factory default configuration.
10.In the Management Options panel, select the management scenario, either in-band or
out-of-band.
J08E and J16E switches: On J08E and J16E switches, only the out-of-band
management option is available.
The configuration is committed as the active configuration for the switch. You can now log in
with the CLI or the J-Web interface to continue configuring the switch. If you use the J-Web
interface to continue configuring the switch, the web session is redirected to the new
management IP address. If the connection cannot be made, the J-Web interface shows
instructions for starting a J-Web session.
Switch transition: The switch will transition to initial setup mode only when the switch
is in the factory default configuration.
Configuration time limit: You must complete the initial configuration using the J-Web
interface within 10 minutes. The switch exits EZSetup mode after 10 minutes and
reverts to the default factory configuration. Then the PC loses connectivity to the
switch.
On the IBM J48E, J08E, or J16E switch, the LCD shows a count-down timer after you
connect the switch to the management PC.
3. From the PC, open a web browser, type http://192.168.1.1 in the address field, and
press Enter.
4. In the J-Web login window, type root as the user name, leave the password field blank,
and click Log In (see Figure 5-3).
9. In the Manage Access panel (Figure 5-8), select options to enable Telnet, SSH, and
SNMP services. For SNMP, you can configure the read community, location, and contact.
In this example, we selected the Telnet option. Click Next.
The configuration is committed as the active switch configuration. You can now log in with the
CLI or the J-Web interface to continue configuring the switch. If you use the J-Web interface
to continue configuring the switch, the web session is redirected to the new management IP
address. If the connection cannot be made, the J-Web interface shows instructions for
starting a J-Web session.
Loss of connectivity: After the configuration takes effect, you might lose connectivity
between the PC and the switch. To renew the connection, release and renew the IP
address by entering the appropriate commands on the management PC or by removing
and re-inserting the Ethernet cable.
3. In the Edit System Identity window (Figure 5-11), enter the information as shown in
Table 5-1 on page 132.
Host Name Defines the host name of the switching Type the host name.
platform.
Domain Name Defines the network or subnetwork to Type the domain name.
which the machine belongs.
Root Password Sets the root password that user root Type a plain-text password. The system encrypts the
can use to log in to the switching password.
platform. Note: After a root password is defined, it is required when
you log in to the J-Web user interface or the CLI.
Confirm Root Verifies that the root password has Retype the password.
Password been typed correctly.
DNS Name Specifies the domains to be searched. To add an IP address, click Add.
Servers To edit an IP address, click Edit.
To delete an IP address, click Delete.
Domain Search Specifies the domains to be searched. To add a domain, click Add.
To edit a domain click Edit.
To delete a domain, click Delete.
The LCD panel has a backlight. If the LCD panel is idle for 60 seconds, the backlight turns off.
You can turn on the backlight by pressing the Menu or Enter button once. After turning on the
backlight, you can toggle between the LCD menus by pressing the Menu button and navigate
through the menu options by pressing the Enter button.
Chassis viewer: The chassis viewer in the J-Web interface also shows the LCD panel.
From the J-Web interface, you can view real-time status information in the LCD panel.
The LCD operates in boot mode during switch reboot. The boot mode shows the key
milestones in the switch boot process. The boot mode does not have any menu options. After
the boot process is complete, the LCD automatically reverts to the Idle menu.
In an IBM J48E switch that is not a member of a Virtual Chassis, the first line of the LCD
panel shows the slot number, the role of the switch, and the host name. For a stand-alone
IBM J48E switch, the slot number is always 00, and the role is always RE (for master).
In a J48E switch that is a member of a Virtual Chassis, the first line of the LCD panel shows
the following information:
The slot number (the member ID for the Virtual Chassis member)
Role of the switch in a Virtual Chassis (RE for master, BK for backup, and LC for linecard
member)
Host name
In the idle mode, line two of the Idle menu shows the Status LED modes of the network port
and the total number of alarms in the system. The number of alarms is updated every second.
With the status mode, you can get status information for the following items:
Switch fabric in SRE modules in IBM J08E switches
Routing Engine and switch fabric in switch fabric modules in IBM J16E switches
Power supplies
Fan tray or trays and chassis temperature
With the maintenance mode, you can cycle through options for configuring and
troubleshooting the switch:
System halt
Reboot system
Load rescue configuration
Revert to factory default configuration
EZSetup
LCD panel menus for IBM J08E and IBM J16E switches
The LCD has three menus: Idle, Status, and Maintenance. In each of these menus, line one
of the LCD panel shows the host name of the switch. You can toggle between the LCD menus
by pressing the Menu button and navigate through the menu options by pressing the Enter
button.
Table 5-2 IBM J08E and J16E switch LCD panel menus
Menu Description
In a base configuration switch, the master SRE or Routing Engine module is gracefully halted
but not powered off. Press Enter on your management device or power cycle the switch to start
it again.
In a redundant configuration, the backup SRE or Routing Engine module takes over mastership
when the master SRE or Routing Engine module is halted. To completely halt the switch, use
the request system halt other-routing-engine CLI command to halt the backup SRE or
Routing Engine module before halting the master SRE or Routing Engine module. Press Enter
on your management device or power cycle the switch to start it again.
Press Menu to go to the next option in the Maintenance menu.
SYSTEM REBOOT? Choose one of the following options:
Press Enter to reboot the master SRE or Routing Engine module. Press Enter again to confirm
the reboot.
Press Menu to go to the next option in the Maintenance menu.
LOAD RESCUE? Choose one of the following options:
Press Enter to roll back the switch to the previous valid configuration. Press Enter again to
confirm the rollback.
Press Menu to go to the next option in the Maintenance menu.
FACTORY DEFAULT? Choose one of the following options:
Press Enter to restore the switch to the factory default configuration. Press Enter again to
confirm the restoration. The LCD flashes a success or failure message and returns to the Idle
menu.
Press Menu to go to the next option in the Maintenance menu.
ENTER EZSETUP? Choose one of the following options:
Press Enter to launch EZSetup. Press Enter again to confirm the launch. EZSetup configures
DHCP and enables the J-Web user interface on the switch. The LCD flashes a success or
failure message for approximately 10 seconds and returns to the Idle menu.
Press Menu to go to the next option in the Maintenance menu.
EZSetup: You can use the EZSetup option only if the switch is in the factory default configuration.
You can disable the Maintenance menu in the LCD panel by using the set chassis lcd
maintenance-menu disable command in the CLI.
Maintenance The Maintenance menu has the following options to configure and troubleshoot the switch:
SYSTEM HALT? Select this option by using the Enter button to halt the switch. Press the Enter
button again to confirm the halt.
Press the Menu button to go to the next option in the Maintenance menu.
SYSTEM REBOOT? Select this option by using the Enter button to reboot the switch. Press the
Enter button again to confirm the reboot.
Press the Menu button to go to the next option in the Maintenance menu.
LOAD RESCUE? Select this option by using the Enter button to roll back the switch to the rescue
configuration. Press the Enter button again to confirm the rollback.
Press the Menu button to go to the next option in the Maintenance menu.
FACTORY DEFAULT? Select this option by using the Enter button to restore the switch to the
factory default configuration. Press the Enter button again to confirm the restoration.
Press the Menu button to go to the next option in the Maintenance menu.
ENTER EZSETUP? Select this option by using the Enter button to launch EZSetup. Press the
Enter button again to confirm the launch.
Press the Menu button to go to the next option in the Maintenance menu.
Note: You can use this option only if the switch is in the factory default configuration.
EXIT MAINT MENU? Select this option to exit the Maintenance menu.
You can disable the Maintenance menu in the LCD panel by using the set chassis lcd
maintenance-menu disable command in the CLI.
A major alarm (red) indicates a critical error condition that requires immediate action. A minor
alarm (yellow) indicates a noncritical condition that requires monitoring or maintenance. A
minor alarm that is not checked might cause interruption in service or performance
degradation.
SYS (System) Green On steadily: The Junos software for EX Series switches has been
loaded on the switch.
MST (Master) Green On steadily: The switch is the master in the Virtual Chassis
configuration.
A major alarm (red) indicates a critical error condition that requires immediate action.
Amber alarm: The amber glow of the Alarm LED that indicates a minor alarm closely
resembles the red glow that indicates a major alarm.
5.4 Initial setup for the J02M, J06M, and J11M routers
The IBM J02M, J06M, and J11M Multiservice Edge Routers are shipped with the Junos
software preinstalled and ready to be configured when the router is powered on. Three copies
of the software are provided:
One on a compact flash card in the Routing Engine
One on a rotating hard disk in the Routing Engine
One on a USB flash drive that can be inserted into the slot in the Routing Engine faceplate
When the router boots, it first attempts to start the image on the USB flash drive. If a USB
flash drive is not inserted into the Routing Engine or the attempt otherwise fails, the router
next tries the compact flash card (if installed) and finally the hard disk.
Before you configure the router, you must gather the following information:
The name that the router will use in the network
The domain name that the router will use
The IP address and prefix length information for the Ethernet interface
The IP address of a default router
The IP address of a DNS server
The password for the root user
This procedure connects the router to the network but does not enable it to forward traffic. For
complete information about enabling the router to forward traffic, including examples, see
Chapter 10, “Layer 3: Routing configuration” on page 273.
[edit]
root#
[edit]
root# set system root-authentication ssh-rsa public-key string
While most of the configuration steps in this book use CLI, this chapter provides a brief
introduction for the J-Web GUI. For more information about the J-Web GUI, see the J-Web
User Interface Guide at:
http://jnpr.net/techpubs/en_US/junos10.1/information-products/topic-collections/
jweb-user-guide/frameset.html
The J-Web GUI is installed by default on IBM j-type Ethernet switches. It is not installed on
IBM j-type Ethernet routers. You must install the J-Web GUI on routers when you want to use
it.
Use Internet Explorer version 6.0 and later, or Firefox version 2.0 and later to access the
J-Web interface.
An SSL certificate includes identifying information such as a public key and a signature made
by a certificate authority (CA). When you access the routing platform through HTTPS, an SSL
handshake authenticates the server, and the client and begins a secure session. If the
information does not match or the certificate has expired, you are unable to access the
routing platform through HTTPS.
Without SSL encryption, communication between your routing platform and the browser is
sent in the open and can be intercepted. You must enable HTTPS access on your WAN
interfaces.
On j-type switches, and routers, HTTP access is enabled by default on the built-in
management interfaces. By default, HTTPS access is supported on any interface with an SSL
server certificate.
To install the SSL certificate and enable HTTPS, follow the procedure as outlined in
“Configuring secure web access” on page 146.
Figure 6-2 Edit Management Access window: Services and Certificates tabs
To configure web access settings in the J-Web interface, enter the information in the Edit
Management Access window as follows:
HTTP web access
– Enable HTTP Access: To enable HTTP access, select the Enable HTTP check box on
the Services tab.
– Enable HTTP on All Interfaces: To enable HTTP access on all interfaces, select the
Enable on all interfaces check box on the Services tab.
– To enable HTTP on select interfaces, clear the Enable on all interfaces check box on
the Services tab, select the interface, and move it to the appropriate list by clicking the
direction arrows:
• To enable HTTP access on an interface, add the interface to the Selected interfaces
list.
• To disable HTTP access on an interface, add the interface to the Available
interfaces list.
JUNOScript over SSL: With JUNOScript over SSL, you can enable secured SSL
access to the JUNOScript XML scripting API. A JUNOScript client, such as
JUNOScope, is required.
To verify that web access is enabled correctly, connect to the router by using one of the
following methods:
For HTTP access, in your web browser, type http://URL or http://IP address.
For HTTPS access, in your web browser, type https://URL or https://IP address.
On the left side of the window is the configuration hierarchy. When you click one of the
configuration hierarchy options, the information about the hierarchy is displayed on the main
portion of the window. Here you can view or edit the configuration. In the top right corner of
the window, you see Add, Edit, and Delete buttons for performing the configuration.
The CLI Tools option, on the bottom of configuration hierarchy, provides a flexible text editor
that functions similarly to the CLI of Junos.
For example, on the interface hierarchy, the Monitor tab provides statistics in graphical and
colorful pie charts and graphs. If you move the mouse pointer to various part of the window,
you are presented with more detailed information.
You can perform maintenance of your Ethernet devices by using the following options:
Files. You can download and delete log files and temporary files to keep the compact-flash
device from becoming full.
Configuration Management. With this option, you can retrieve historical configuration files
and compare the differences between configurations.
Software. This option provides easy ways to upgrade and downgrade the Junos software.
Licenses. This option shows the installed licenses and feature summary.
Reboot. With this option, you can schedule various methods of rebooting the switch.
Customer Support. Use this option to view detailed information of the switch that you can
use when contacting Technical Assistance Center (TAC) for technical assistance.
You can use quick and useful troubleshooting tools such as Ping, Traceroute, Packet capture,
RPM, and CLI Terminal to investigate the network problem.
The CLI also provides various UNIX utilities, such as the following examples:
Emacs-style keyboard sequences so that you can move around on a command line and
scroll through recently executed commands
Regular expression matching to locate and replace values and identifiers in a
configuration, filter command output, or log file entries
Store and archive router files on a UNIX-based file system
Exit from the CLI environment and create a UNIX C shell or Bourne shell to navigate the
file system
Manage switch processes
Operational mode is where you can troubleshoot and monitor the software, router, and
network. The right angle bracket (>) is the identifier in operational mode as shown in the
following example:
user@J48E>
When you first enter the switches and routers by using Telnet, SSH, or direct console access,
you see a login prompt. After entering the correct user name and password, you are placed
directly into operational mode shown in Example 6-1.
login: ibm
Password:
An exception case of being placed into operational mode is when you log in as root user. In
this case, you are placed in the shell (designated by the percent sign (%)) and must start the
CLI manually by using the cli command as shown in Example 6-2.
root@J48E:RE:0% cli
{master:0}
root@J48E>
The commands are run from the default CLI level (user@switch>). For example, to see the
brief routes of current routing table, you can enter the show route brief command as shown
in Example 6-3.
Command completion
The command completion feature saves a lot of time and energy because it provides syntax
checking as you type. You no longer must type a command on a line and press Enter to find
that the command is either invalid or not supported on that version of software. In Junos, any
error or ambiguity is detected early, and the router and switch present a list of possible valid
completions.
Command completion is accomplished using either the Spacebar or the Tab key. To complete
a command, statement, or option that you partially typed, press the Tab key or the Spacebar.
If the partially typed letters uniquely identify a command, the complete command name is
displayed. Otherwise, a beep indicates that you have entered an ambiguous command and
the possible completions are displayed. This completion feature also applies to other strings,
such as file names, interface names, user names, and configuration statements.
For example, to view the configuration of a certain Gigabit Ethernet interface, you can type
the command as shown in Example 6-4.
The Spacebar is used until a variable is reached and the interface name is used when the Tab
key must be used. (The Spacebar completes only commands and not variables.)
In Example 6-4, the syntax checker goes word by word each time that the Spacebar or Tab
key is used and minimum characters are typed to avoid ambiguity.
Emacs
Junos software defaults to a VT100 terminal type. With this terminal type, users of keyboard
arrow keys can have any additional configuration modification. You can use Emacs-style
keystrokes so that you can move the cursor around the command line, edit the command line,
or delete specific characters or words. The following Emacs keystrokes are useful:
Ctrl+B Moves the cursor left one character.
Ctrl+A Moves the cursor to the beginning of the command line.
Ctrl+F Moves the cursor right one character.
Ctrl+E Moves the cursor to the end of the command line.
Ctrl+D Deletes the character over the cursor.
Ctrl+K Deletes from the cursor to the end of the line.
Ctrl+U Deletes all the characters and negates the current command.
Ctrl+W Deletes the entire word to the left of the cursor.
Ctrl+L Redraws the current line.
Ctrl+P Scrolls backward through the previously typed commands. You also can use the
Up arrow for this purpose.
Ctrl+N Scrolls forward through the previously typed commands. You also can use the
Down arrow for this purpose.
Ctrl+R Search the previous CLI history for a search string.
Pipe commands
Another useful feature of Junos CLI is the use of pipe commands to control the output of any
command. When a command, such as show, is issued, the data is placed into a buffer and is
displayed when the Enter key is pressed. A pipe command can be used to alter the display
buffer.
The following sections examine the most common applications of pipe commands.
Context-sensitive help
The Junos CLI provides context-sensitive help at any point in a command line. The help
indicates which options are acceptable at the current point in the command and provides a
brief description about each command or command option.
To receive help at any time while in the Junos CLI, type a question mark (?) as shown in
Example 6-11. You do not need to press Enter.
ibm@J48E> clear ?
Possible completions:
arp Clear address resolution information
auto-configuration Clear auto-configuration action
bfd Clear Bidirectional Forwarding Detection information
bgp Clear Border Gateway Protocol information
captive-portal Clear 802.1X session
chassis Clear chassis information
......
Syntax
address address {
arp ip-address (mac | multicast-mac) mac-address <publish>;
broadcast address;
destination address;
.....
Hierarchy Level
Release Information
Description
The candidate configuration becomes the active configuration when the commit command is
issued and no syntax errors are detected. The old active configuration is saved as a file called
rollback 1.
Junos software saves the last active configuration and the previous 49 configurations. Every
time a commit command is issued, the saved file moves down to the list of 49. The first commit
creates rollback1. The second commit becomes rollback 1, and the old rollback then
becomes rollback 2. Figure 6-9 illustrates the rollback process.
{master:0}[edit]
ibm@J48E#
.....
ibm@J48E> edit
Entering configuration mode
{master:0}[edit]
ibm@J48E#
With configure exclusive, only a single user can configure the router. In exclusive mode, no
other users can change the configuration besides the single user that entered exclusively.
With configure private, multiple users can configure different pieces of the configuration.
Using private mode, each user gets a copy of the current configuration, and only changes that
they make will be applied. If two users attempt to make the same change, such as changing
an IP address to the same interface, the change is rejected, and both users exit the
configuration mode to resolve their conflict.
When in a certain directory, you can use multiple ways to navigate the directory tree with such
commands as up and top, as shown in the following examples:
You use the up command to move up one level in the hierarchy, as illustrated in
Figure 6-12.
Example 6-17 shows how to move up two levels by using the up n command.
Example 6-18 shows moving to the top of the hierarchy using the top command.
{master:0}[edit]
ibm@J48E#
For example, to remove the Telnet service from the router, change the previous set command
to a delete command shown in Example 6-19.
For example, you can view only the portions that you want to view from the root hierarchy as
shown in Example 6-20.
[edit]
ibm@J48E#
The rollback command modifies only the candidate configuration. You must issue a commit
command to activate the changes.
Saving a configuration
You can save the candidate configuration to an ASCII file. The file is saved to user’s home
directory. You can provide the full path name if you prefer to save the file in another directory.
The save command only saves the configuration in its current hierarchy (and below) along
with the statement hierarchy that contains it. To save the entire candidate configuration, you
must issue the save command at the top level of the configuration hierarchy.
[edit]
ibm@J48E#
Loading a configuration
You can retrieve the previously saved configuration by using the load command. The load
command has several options for specific details of the operation.
load override filename Completely overrides an existing configuration.
load merge filename Combines the current configuration with the configuration being
loaded.
load replace filename Replaces existing statements in the current configuration.
load factory-default Loads the factory-default configuration.
After load operation is completed, you must run a commit command to activate the changes of
the configuration.
Comparing configurations
Junos software has a useful pipe command, compare command, that you can use to compare
two files. With this command, any two files, including rollback files, active files, and candidate
files, can be compared so that you can see the differences.
For example, the candidate and active configurations can be compared as shown in
Example 6-22.
[edit]
You can also compare the active configuration with rollback configurations or saved files as
shown in Example 6-23.
Example 6-23 Comparing an active configuration with rollback and saved files
[edit]
ibm@J48E> show configuration| compare rollback number
.....
You can use the run ping command from the interface directory in configuration mode as
shown in Example 6-24.
In addition to the fixed ports, a Virtual Chassis offers up to forty 1 Gigabit Ethernet (SFP)
uplink ports or twenty 10 Gigabit Ethernet (XFP) uplink ports.
Figure 7-1 shows the Virtual Chassis ports on the IBM Ethernet Switch J48E rear panel.
Figure 7-1 Virtual Chassis ports on an IBM Ethernet Switch J48e rear panel
Figure 7-2 shows the front and rear views of five J48E switches that are connected using a
Virtual Chassis port cable.
Ports on the uplink module are then configured to function as Virtual Chassis ports so that the
interconnected switches are recognized as members of the same Virtual Chassis
configuration. Multiple uplinks can be used to interconnect extended Virtual Chassis
configurations for increased bandwidth and path redundancy.
With Junos Software Version 9.6, up to four Gigabit-Ethernet uplink-module ports or two 10
Gigabit-Ethernet uplink-module ports configured as Virtual Chassis ports can be combined to
form a single point-to-point connection called a link aggregation group (LAG) or bundle. A
LAG provides more bandwidth than a single link. Creating a LAG over Virtual Chassis ports
creates a bigger “pipe” for forwarding traffic between Virtual Chassis member switches
connected by those ports and greater operational redundancy.
Figure 7-3 shows the uplink modules in the front panel of an IBM Ethernet Switch J48E.
Figure 7-3 Virtual Chassis ports on an IBM Ethernet Switch J48E front panel
For example, Figure 7-4 shows three member switches in a Virtual Chassis configuration with
the respective port number indicated.
One member is assigned the master role and is responsible for managing other members in
the Virtual Chassis configuration. Another member is assigned a backup role and takes over
the master role if the master switch fails. All other members are assigned the linecard role.
The system runs a mastership election algorithm to determine member roles in a Virtual
Chassis.
Master role
The member switch that operates in the master role in a Virtual Chassis configuration has full
control over the Virtual Chassis configuration. It performs the following functions:
Serves as the active Routing Engine for the Virtual Chassis configuration.
Manages the member switches in the Virtual Chassis configuration.
Runs Junos for the Virtual Chassis configuration.
Runs the chassis management processes and network control protocols.
Calculates and maintains the forwarding table and distributes it to the local processor and
then to Packet Forwarding Engines in all member switches.
Receives and transmits routing information.
Represents all member switches. (The host name and other properties that are assigned
to the master switch during setup apply to all members of the Virtual Chassis
configuration.)
Holds the active and master copy of the entire Virtual Chassis configuration. Copies of the
active configuration can also be synchronized to all member switches by using the commit
sync command-line interface (CLI) command.
Backup role
The member switch that functions in the backup role in a Virtual Chassis configuration
performs the following functions:
Serves as the backup Routing Engine for the Virtual Chassis configuration.
Maintains synchronization with the master switch so that it can take over the master role if
the master fails.
You must have at least two member switches in a Virtual Chassis configuration to have a
backup member.
Linecard role
Each member that functions in the linecard role in a Virtual Chassis configuration performs
the following functions:
Runs Junos for IBM Ethernet Switch J48Es in a linecard role.
Detects switch error conditions, such as an unplugged cable, on any interfaces that have
been configured on it through the master switch and relays this information to the master
switch.
Receives updates about forwarding information from the master switch and programs
these updates into the local Packet Forwarding Engine.
A member in a linecard role does not run full network control protocols. If a master or backup
switch fails, one of the line card switches takes over the backup role. A Virtual Chassis
configuration must have at least three members to include a line card member.
Member ID numbering
When an IBM Ethernet Switch J48E powers on, it receives a member ID, which is displayed
on its front-panel LCD. If the switch powers on as a stand-alone switch, its member ID is 0.
When the switch interconnects with other IBM Ethernet Switch J48Es in a Virtual Chassis
configuration, the master switch assigns a member ID (0-9) to the switch. The member ID is
based on various factors, including the order in which the switch was added to the Virtual
Chassis configuration. As each switch is added and powered on, it receives the next lowest
available (unused) member ID.
The member ID distinguishes the member switches from each other. You use the member ID
in the following ways:
Assign a mastership priority value to a member switch.
Configure interfaces for a member switch (a function that is similar to a slot number on an
IBM Ethernet Switch J08E or IBM Ethernet Switch J16E modular platform).
Apply various operational commands to a member switch.
View the status or characteristics of a member switch and its ports.
Member location: Members can be physically located in any order in a Virtual Chassis
configuration. They do not need to be placed in order of member ID.
When an IBM Ethernet Switch J48E powers on, it receives the default mastership priority
value of 128. A stand-alone IBM Ethernet Switch J48E can be connected to an existing
Virtual Chassis configuration, which implicitly includes its own master. In this case, you must
explicitly configure the mastership priority of the members that you want to function as the
master and backup switches.
The election algorithm uses the following sequence to assign member roles and elect master
and backup switches. The master role is assigned to the switch with the highest ranking. The
backup role is assigned to the switch with the second highest ranking. Other switches
become line cards.
1. Select the member with the highest user-configured mastership priority. (One is the
lowest, and 255 is the highest possible value.)
2. Select the member that was the master switch the last time the Virtual Chassis
configuration started.
3. In a Virtual Chassis configuration merge scenario, select the master member that has the
highest number of current members in the existing Virtual Chassis configuration. A merge
scenario occurs when two active Virtual Chassis configurations, each with its own master,
are combined.
To ensure that a specific member is elected as the master switch during initial Virtual Chassis
installation, follow these steps:
1. Power on only the switch that you want to configure as the master switch of the Virtual
Chassis configuration.
2. Configure the mastership priority of that member to have the highest possible value (255).
3. Without connecting to the master switch, power on all other member switches individually.
Reset their configurations to the factory default values by using either the front LCD menu
or a CLI command.
4. Connect all other members to the master switch while they are powered off.
5. Power on the other member switches.
6. Continue to configure other member switches through the master switch, as desired. These
member switches default to a mastership priority of 128 if no previous configuration exists.
You must download the required software package to the master switch in the Virtual Chassis
configuration. Then you can upgrade the new member switch to the stored software version
by using the CLI command shown in Example 7-3.
This command downloads the image from the master switch through the Virtual Chassis
ports to the specified member and then reboots the member. The member does not need to
be directly connected to the master switch.
With Junos operating system Release 10.0, the automatic software upgrade feature
(Example 7-4) is available. This feature automatically upgrades the software version on new
member switches when joining a Virtual Chassis configuration to the same version of the Junos
operating system running on the master switch. This feature is disabled by default. You must
explicitly enable it and specify a path, either to a local directory or a remote server location,
where new Virtual Chassis switch members can obtain the appropriate software image.
{master:0}[edit virtual-chassis]
root# set auto-sw-update package-name </image-path>
When interconnecting the switches through dedicated Virtual Chassis ports, the maximum
Virtual Chassis port cable length is 5 meters. If you are extending the Virtual Chassis
configuration beyond this length, uplink ports offer a greater distance to interconnect two
switches in different locations.
Connect switches in a Virtual Chassis configuration in a ring topology for resiliency and
speed. A ring configuration provides up to 128 Gbps of bandwidth between member switches.
You can interconnect switches in a Virtual Chassis configuration by using one of three cabling
methods, which are described in the following sections.
The daisy-chained ring configuration provides a simple and intuitive method for
interconnecting devices. The maximum height or breadth of the Virtual Chassis is 5 meters as
shown in Figure 7-7.
The braided ring configuration extends the Virtual Chassis height or breadth to 22.5 meters
(73.8188 ft) as shown in Figure 7-8.
Multiple uplinks can be grouped together for additional bandwidth and link redundancy.
Each member switch in this configuration must be configured to enable uplink ports as Virtual
Chassis ports before interconnecting with each other as shown in Example 7-5.
Figure 7-11 Top-of-rack deployment in a data center with daisy-chained ring cabling configuration (single switch per rack
shown for simplification)
Figure 7-12 Top-of-rack deployment in a data center with braided-ring cabling configuration (single switch per rack shown
for simplification)
The Virtual Chassis configuration can be extended across multiple racks and across rows in a
data center, as shown in Figure 7-13.
Figure 7-13 Top-of-rack deployment in a data center with multiple racks and rows (single switch per rack shown for
simplification)
Figure 7-14 End-of-row deployment in a data center (single switch per rack shown for simplification)
For best practice, always reset all member switches to the factory default configuration before
adding these switches to the Virtual Chassis configuration. This procedure prevents
unexpected behavior during the addition of the new member. Factory defaults can be loaded
as shown in Example 7-6.
{master:0}[edit]
root@J48E# set system root-authentication plain-text-password
New password:
Retype new password:
{master:0}[edit]
root@J48E# commit
configuration check succeeds
commit complete
LCD menus: In addition to using CLI commands, you can use LCD menus on a switch to
load the default configuration from the factory.
Figure 7-15 shows a Virtual Chassis of three IBM Ethernet Switch J48Es. The setup of this
Virtual Chassis configuration uses the dynamic method.
Figure 7-15 A Virtual Chassis of three IBM Ethernet Switch J48Es running in dynamic mode
login: root
Logging to master
root@:RE:0% cli
{master:0}
root>
{master:0}
e. Assign the highest mastership priority to the switch as shown in Example 7-8.
Example 7-9 Viewing the status of the backup switch in a Virtual Chassis
root> show virtual-chassis status
{master:0}
h. Assign the backup switch the same mastership priority as the master switch, as shown
in Example 7-10, which prevents mastership preemption if the master fails and then
recovers.
{master:0}[edit virtual-chassis]
root# set member 1 mastership-priority 255
{master:0}
In this configuration, you must select two members that you want to make eligible for election
as the master and backup switches. When you list these two members in the preprovisioned
configuration, you designate the member role as a Routing Engine. One member then
functions as the master switch of the Virtual Chassis configuration, and the other functions as
the backup switch.
Additional members, which are not eligible for election as the master or backup switch, can be
specified as line cards in the preprovisioned configuration.
The preprovisioned configuration provides the option of not explicitly assigning a role to a
member switch. This member switch is eligible for election as the backup switch if the master
or the backup switch fails. It can also become the master switch if both the master and backup
switches fail.
The mastership priority value is assigned by the switch software based on the specified role:
The master and backup switches are assigned a mastership priority of 129.
A line card switch is assigned a mastership priority of 0, making it ineligible to participate
in the master election.
A switch that is not explicitly assigned a role is configured with a mastership priority of 128,
making it eligible to participate in the master election.
Figure 7-16 A Virtual Chassis of three IBM Ethernet Switch J48Es running in preprovisioned mode
Before you build the Virtual Chassis in preprovisioned mode, complete these prerequisite
tasks:
Make a list of the serial numbers of all the switches to be connected in a Virtual Chassis
configuration.
Determine the desired role (Routing Engine or line card) of each switch. If you configure
the member with a Routing Engine role, it is eligible to function as a master or backup. If
you configure the member with a linecard role, it is not eligible to become a master or
backup.
To build a new Virtual Chassis with the preprovisioning method, follow these steps:
1. Set up the IBM Ethernet Switch J48Es as a master switch with preprovisioned mode:
a. Install the required power supplies.
b. Place the switch in the desired location.
c. If the new switch was previously configured, reset the configuration to the factory
default values.
d. Power up the switch.
e. When logging in the switch, specify the preprovisioned configuration mode as shown in
Example 7-12.
Example 7-13 Setting the serial number and role of the member switches
{master:0}[edit virtual-chassis]
root# set member 0 serial-number BP0208174896 role routing-engine
{master:0}[edit virtual-chassis]
{master:0}[edit virtual-chassis]
root# set member 2 serial-number 134002W role line-card
{master:0}[edit virtual-chassis]
root# commit
configuration check succeeds
commit complete
g. After the commit command is issued, view the Virtual Chassis information by using the
show virtual-chassis status command as shown in Example 7-14. You see that the
switch is running in preprovisioning mode and it becomes a master switch. Also, its
mastership priority is assigned 129 by the system.
{master:0}
2. Set up an IBM Ethernet Switch J48E as a backup switch (RE1) with preprovisioned mode:
a. Install the required power supplies.
b. Power up the switch and load the factory default configuration if the switch was
previously configured.
c. Power off the switch.
d. Place the switch in the desired location.
e. Connect the switch to the existing members of the Virtual Chassis configuration with a
Virtual Chassis port cable.
f. Power up the switch.
Similar to the preprovisioned mode where the serial number and role of member
switches are configured during the master switch configuration, the switch is assigned
its role based on the serial number by the master switch. Example 7-15 shows the
backup switch configuration in a preprovisioned mode.
3. Set up an IBM Ethernet Switch J48E as a line card switch with preprovisioned mode:
a. Install the required power supplies.
b. Power up the switch and load the factory default configuration if the switch was
previously configured.
c. Power off the switch.
d. Place the switch in the desired location.
e. Connect the switch to existing members of the Virtual Chassis with a Virtual Chassis
port cable.
f. Power up the switch.
With the serial number preset during master switch configuration, the switch is
assigned as a line card switch, and its mastership priority is 0. This configuration
makes it ineligible to be a master or backup switch as shown in Example 7-16.
Example 7-16 Viewing the line card switch configuration in preprovisioned mode
root> show virtual-chassis status
{master:0}
Mastership priority: You cannot modify the mastership priority when you are using a
preprovisioned configuration. The mastership priority values are generated automatically
and controlled by the role that is assigned to the member switch in the configuration file.
The two Routing Engines are assigned the same mastership priority value. However, the
member that was powered on first has higher prioritization according to the master election
algorithm.
Example 7-17 shows that the mastership priority cannot be changed when running in
preprovisioned mode.
{master:0}[edit virtual-chassis]
root# commit
[edit virtual-chassis]
'member 0'
Can't have mastership priority configuration with preprovisioned set
{master:0}[edit virtual-chassis]
Before you add a new switch to an existing Virtual Chassis configuration in the same
telecommunications closet, complete these prerequisite tasks:
Install required power supplies in the new switch.
Place the new switch in the desired location.
Confirm that the new switch is powered off.
If expanding a pre-provisioned configuration, make a note of the serial number on the back
of the switch. Then edit the existing Virtual Chassis pre-provisioning configuration to
include the serial number and the role of the new switch.
Add a new switch to the existing Virtual Chassis as explained in the following steps:
1. If the new member switch was previously configured, power it on, reset the configuration to
the factory default values, and then power it off.
2. Interconnect the new switch to at least one member of the existing Virtual Chassis
configuration by using the dedicated Virtual Chassis ports.
3. Power on the new switch.
Example 7-18 Viewing the status of the new switch in Virtual Chassis
root> show virtual-chassis status
If you are using a preprovisioned configuration, the member ID is assigned to the serial
number of the member in the configuration file. For example, the new switch has a serial
number of 134002W. You can configure the new switch to a member ID of 8 and a role of
line card as shown in Example 7-19.
Example 7-19 Configuring the new switch to member ID 8 and a linecard role
{master:0}[edit]
root# set virtual-chassis member 8 serial-number 134002W
{master:0}[edit]
root# set virtual-chassis member 8 serial-number line-card
{master:0}[edit]
5. Confirm the new switch in the Virtual Chassis by entering the show virtual-chassis
status command in preprovisioned mode as shown in Example 7-20. The new switch is
added as member ID 8, and a role of line card is configured.
Example 7-20 Adding a new switch to the existing Virtual Chassis in preprovisioned mode
root# run show virtual-chassis status
{master:0}[edit]
Configure the uplink ports on both sides of the link as Virtual Chassis ports.
Figure 7-18 shows how two IBM Ethernet Switch J48Es form a Virtual Chassis in the same
telecommunications closet. A new switch is added to the existing Virtual Chassis from a
remote telecommunications closet.
Figure 7-18 Adding a new switch to the existing Virtual Chassis from remote telecommunications closet
Before you add a new switch from a remote telecommunications closet to an existing Virtual
Chassis configuration, complete these prerequisite tasks:
Install the required power supplies and uplink modules in the new switch.
If the new switch was previously configured, reset the configuration to the factory default
values.
Power on the new switch as a stand-alone device to configure its uplink port as a Virtual
Chassis port. Example 7-21 shows the configuration on port 0 of PIC 1. You must also
configure an uplink port on one of the existing Virtual Chassis switches that is to be
connected by the new switch.
{master:0}
{master:0}
Example 7-23 Viewing the new switch in the Virtual Chassis using an uplink port
{master:0}
root> show virtual-chassis status
{master:0}
The following sections provide information about replacing a member switch in various
situations.
In some cases, you must perform this procedure when the same switch has the following
requirements:
Change the power supply if it is running on a single power supply or installation.
Change the new uplink module.
Figure 7-19 Replacing a different switch with the same configuration of a switch
Before you replace a switch and reapply configuration, view the current Virtual Chassis
configuration. Example 7-24 shows two switches in the Virtual Chassis.
Example 7-24 Viewing the current Virtual Chassis before replacing the switch
{master:0}
root> show virtual-chassis
{master:0}
{master:0}[edit]
{master:0}
5. View the replacement switch change. Its member ID is now renumbered to 1 as shown in
Example 7-27.
{master:0}
{master:0}
When member ID 2 is removed from the Virtual Chassis, its member ID is retained in the
Virtual Chassis. However, as shown in Example 7-29, its status is Not Present, and it is not
assigned to other new switches.
{master:0}
To reuse member ID 2, you can enter the request virtual-chassis recycle member-id 2
command as shown in Example 7-30. This command frees member ID 2 for re-assignment of
the next switch.
{master:0}
*******
root> show virtual-chassis
{master:0}
The Virtual Chassis configuration can be accessed and managed remotely using Secure
Shell (SSH) or Telnet to a global management interface of a Virtual Chassis called the Virtual
Management Ethernet (VME) interface.
VME is a logical interface that represents any of the out-of-band management ports on the
member switches. When you connect to the Virtual Chassis configuration using the VME IP
address, the connection is redirected to the master member as shown in Figure 7-21.
{master:0}[edit]
{master:0}[edit]
ibm@J48E-VC# commit synchronize
fpc0:
configuration check succeeds
fpc1:
commit complete
fpc2:
commit complete
fpc0:
commit complete
{master:0}[edit]
{master:0}[edit]
********
ibm@J48E-VC# commit
fpc0:
configuration check succeeds
fpc1:
commit complete
fpc2:
commit complete
fpc0:
commit complete
{master:0}[edit]
7.5.1 Verifying the member ID, status, and role of a Virtual Chassis member
To view member ID and role of individual members within the Virtual Chassis configuration,
enter the CLI command shown in Example 7-34.
{master:0}
fpc1:
--------------------------------------------------------------------------
Interface Type Trunk Status Speed Neighbor
or ID (mbps) ID Interface
PIC / Port
vcp-0 Dedicated 1 Up 32000 0 vcp-0
vcp-1 Dedicated 2 Up 32000 2 vcp-0
fpc2:
--------------------------------------------------------------------------
Interface Type Trunk Status Speed Neighbor
or ID (mbps) ID Interface
PIC / Port
vcp-0 Dedicated 1 Up 32000 1 vcp-1
vcp-1 Dedicated 2 Up 32000 0 vcp-1
{master:0}
ibm@J48E-VC>
The output shows the status of VCP of each member switch and its peering connection to
other member switch.
Before reading this chapter, you must have a basic understanding of networking concepts. If
necessary, see Chapter 1, “Fundamentals of Ethernet networking” on page 1, and IBM j-type
Data Center Networking Introduction, SG24-7820, for a short introduction.
We used a generic wireless access point to demonstrate Power over Ethernet (PoE)
capabilities of the IBM J48E switch. This access point was powered inline from the IBM
Ethernet Switch J48E. Here only the connections that are relevant to this chapter are
presented.
Juniper
0 M ASTER
® ACO/LT
1 ONLINE
MX960
NE T W O R KS
NC C NO NC C NO
PEM 0 1 2 3 FAN OFFLINE
EX8208 FAN
ALM
Juniper
RE 0 RE 1
OK FAIL OK FAIL OK
OK FAIL OK FAIL OK FAIL OK FAIL OK FAIL OK FAIL FAIL OK FAIL OK F AIL OK FAIL OK FAIL OK FAIL
®
0 1 2 3 4 5 0 1 2 6 7 8 9 10 11
! N ETW OR KS
SYS
MST EX8208
O NLINE ONL INE ONLINE ONL INE ONLINE ONLINE ONLINE ONLINE ONLINE ONLINE ONLINE ONLINE ONLINE ONLINE
15 17 31 33
EX8200 48T
ON ST
ge-1/0/0
1
SC B
SC B
DP C 4x10GE
2
D PC 40xG E
ON
3 ST
0 1 2 3 4 5 6 7
ge-1/0/16
EX8200 8XS
0/0
TUNNE L
LINK ON M S A UX CO NSOL E MGMT
ST S F
SRE0 U SB
RE SET
RE-S-1 300
EX8208 -SRE320
ge-2/0/0 ge-1/0/17
ON
ST
SF
EX8208- SF320-S
xe-3/0/1
0/0
TUNNE L
LINK
5
15 17 31 33
EX8200 48F
ON ST
xe-2/0/0 xe-3/0/0
6
0/0
TUNNE L
LINK
E I E I
N ON N ON
A A
B B
L STANDB Y L STANDBY
E E
J11M J08E
EX4200 8PoE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 2 5 26 2 7 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 4 6 47
ge-2/0/0 xe-1/1/1
EX4200 8PoE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 2 5 26 2 7 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 4 6 47
EX4200 8PoE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 2 5 26 2 7 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 4 6 47
Wireless AP
J48E-VC
PoE client
Figure 8-1 Network topology for the Layer 1 configuration
To change the default link parameters on Gigabit Ethernet interfaces for IBM j-type Ethernet
switches, enter the following configuration level command:
set interface ge-fpc/pic/port ether-options [ speed [ auto-negotiation [ 10m-100m]
| 10m | 100m | 1g ] | link-mode [ automatic | full-duplex | half-duplex ] |
flow-control | no-flow-control | auto-negotiation | no-auto-negotiation ]
For a detailed explanation of the options for this command, see the JUNOS Software System
Basics and Services Command Reference at the following web page:
http://www-01.ibm.com/support/docview.wss?uid=isg3T7000141&aid=1
After you commit the configuration by using the commit command, you can check the status of
the interface by entering the following command:
{master}[edit]
ibm@J08E-re0> show interface type-fpc/pic/port
{master}
ibm@J08E-re0> configure
Entering configuration mode
{master}[edit]
ibm@J08E-re0# run show interfaces ge-1/0/0
Physical interface: ge-1/0/0, Enabled, Physical link is Up
Interface index: 129, SNMP ifIndex: 245
Link-level type: Ethernet, MTU: 1514, Speed: 100mbps, Duplex: Full-Duplex, BPDU
Error: None, MAC-REWRITE Error: None,
Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled,
Auto-negotiation: Enabled,
Remote fault: Online
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Current address: 00:26:88:87:e2:31, Hardware address: 00:26:88:87:e2:31
Last flapped : 2010-05-05 14:34:21 UTC (00:45:01 ago)
Input rate : 0 bps (0 pps)
Output rate : 1768 bps (1 pps)
Active alarms : None
Active defects : None
{master}[edit]
ibm@J08E-re0#
If you must check the auto-negotiation status of a particular link, enter the following
command:
ibm@J08E-re0> show interface type-fpc/pic/port media
Example 8-2 shows how to set the interface ge-1/0/0 of a J08E switch with a speed of
100 Mbps, full-duplex, and no flow control. It also shows how to verify the settings.
Example 8-2 Gigabit Ethernet options for IBM j-type Ethernet switches
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/0 ether-options speed 100m
{master}[edit]
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/0 ether-options no-flow-control
{master}[edit]
ibm@J08E-re0# show interfaces ge-1/0/0
ether-options {
no-flow-control;
link-mode full-duplex;
speed {
100m;
}
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show interfaces ge-1/0/0 media
Physical interface: ge-1/0/0, Enabled, Physical link is Up
Interface index: 129, SNMP ifIndex: 245
Link-level type: Ethernet, MTU: 1514, Speed: 100mbps, Duplex: Full-Duplex, BPDU
Error: None, MAC-REWRITE Error: None, <---- speed and duplex configuration
Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled,
Auto-negotiation: Enabled,
Remote fault: Online
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Current address: 00:26:88:87:e2:31, Hardware address: 00:26:88:87:e2:31
Last flapped : 2010-05-05 14:34:21 UTC (00:00:06 ago) <-- link flapped 6s ago
Input rate : 0 bps (0 pps)
Output rate : 0 bps (0 pps)
Active alarms : None
Active defects : None
MAC statistics:
Input bytes: 431430816, Input packets: 550850, Output bytes: 431661792, Output
packets: 562085
Autonegotiation information:
Negotiation status: Complete <---- we still have link negotiation, but fixed
Link partner:
Link mode: Full-duplex, Flow control: Symmetric, Remote fault: OK, Link
partner Speed: 100 Mbps <------- Note the partner duplex, speed, and flow control
Local resolution:
Flow control: None, Remote fault: Link OK <--- Note the local flow control
If you change the speed and duplex of a link, the auto-negotiation of link parameters is still
active to communicate the fixed values to the partner. To completely disable the
auto-negotiation of link parameters, enter the following command:
{master}[edit]
ibm@J08E# set interfaces type-fpc/pic/port ether-options no-auto-negotiation
This command disables the link auto-negotiation as demonstrated in Example 8-3 where
interface ge-1/0/0 is connected back to interface ge-1/0/16.
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show interfaces ge-1/0/0 media
Physical interface: ge-1/0/0, Enabled, Physical link is Up
Interface index: 129, SNMP ifIndex: 245
Link-level type: Ethernet, MTU: 1514, Speed: 100mbps, Duplex: Full-Duplex, BPDU
Error: None,
MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled, Flow
control: Disabled,
Auto-negotiation: Disabled, Remote fault: Online
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Current address: 00:26:88:87:e2:31, Hardware address: 00:26:88:87:e2:31
Last flapped : 2010-05-05 15:57:36 UTC (00:13:52 ago)
Input rate : 0 bps (0 pps)
Output rate : 0 bps (0 pps)
Active alarms : None
Active defects : None
MAC statistics:
Input bytes: 431443246, Input packets: 550906, Output bytes: 431704003, Output
packets: 562276
Autonegotiation information:
Negotiation status: No-autonegotiation <----- auto-negotiation is disabled
{master}[edit]
ibm@J08E-re0# run show interfaces ge-1/0/16 media
Physical interface: ge-1/0/16, Enabled, Physical link is Up
Interface index: 145, SNMP ifIndex: 261
{master}[edit]
ibm@J08E-re0#
By default, the SFP+ uplink module operates in the 10 Gb mode and supports only SFP+
transceivers. If you have not changed the module from the default setting and you want to use
SFP+ transceivers, you are not required to configure the operating mode.
To set the operating mode of an SFP+ uplink module, change the operating mode to the
appropriate mode for the transceiver type that you want to use by using one of the following
configuration level commands:
[edit]
ibm@J48E# set chassis fpc 0 pic 1 sfpplus pic-mode 1g
[edit]
ibm@J48E# set chassis fpc 0 pic 1 sfpplus pic-mode 10g
If the switch is running Junos Release 10.1 or later, the changed operating mode takes effect
immediately unless a port on the SFP+ uplink module is a Virtual Chassis port (VCP). If any
port on the SFP+ uplink module is a VCP, the changed operating mode does not take effect
until the next reboot of the switch.
Packet Forwarding Engine: During the operating mode change, the Packet Forwarding
Engine is restarted. In a Virtual Chassis configuration, this restart means that the Flexible
PIC Concentrator connection with the master is dropped and then reconnected.
You can see whether the operating mode has been changed to the new mode that you
configured by entering the following operational level command:
show chassis pic fpc-slot slot-number pic-slot 1
To change the speed on 10/100/1000 copper interfaces, use the following command:
[edit]
ibm@J11M# set interfaces ge-fpc/pic/port speed [ 10m | 100m | 1g ]
For fixed full-duplex capability on 10/100/1000 copper interfaces, use the following command:
[edit]
ibm@J11M# set interfaces ge-fpc/pic/port link-mode full-duplex
Example 8-4 demonstrates how to set the interface ge-2/0/0 of a J11M router with a speed of
100 Mbps, full-duplex, and no flow-control.
Example 8-4 Gigabit Ethernet options for IBM j-type Ethernet routers
[edit]
ibm@J11M-re0# set interfaces ge-2/0/0 speed 100m
[edit]
ibm@J11M-re0# set interfaces ge-2/0/0 link-mode full-duplex
[edit]
ibm@J11M-re0# set interfaces ge-2/0/0 gigether-options no-flow-control
[edit]
ibm@J11M-re0# show interfaces ge-2/0/0
speed 100m;
link-mode full-duplex;
gigether-options {
[edit]
ibm@J11M-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
[edit]
Example 8-5 shows how to set the description of interface xe-3/0/0 to “Link to backbone”, set
its MTU value to 4096, and disable the interface ge-1/0/0.
{master}[edit]
ibm@J08E-re0# set interfaces xe-3/0/0 mtu 4096
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/0 disable
{master}[edit]
ibm@J08E-re0# commit
{master}[edit]
ibm@J08E-re0# run show interfaces xe-3/0/0 descriptions
Interface Admin Link Description
xe-3/0/0 up down Link to backbone
{master}[edit]
ibm@J08E-re0# run show interfaces xe-3/0/0
Physical interface: xe-3/0/0, Enabled, Physical link is Down
Interface index: 225, SNMP ifIndex: 140
Description: Link to backbone
Link-level type: Ethernet, MTU: 4096, Speed: 10Gbps, Duplex: Full-Duplex, BPDU
Error: None, <--------- note the MTU size on this line
MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled, Flow
control: Enabled
Device flags : Present Running
Interface flags: Hardware-Down SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Current address: 00:26:88:87:e2:91, Hardware address: 00:26:88:87:e2:91
Last flapped : Never
Input rate : 0 bps (0 pps)
Output rate : 0 bps (0 pps)
Active alarms : LINK
Active defects : LINK
{master}[edit]
ibm@J08E-re0# run show interfaces ge-1/0/0
Physical interface: ge-1/0/0, Administratively down, Physical link is Down
Interface index: 129, SNMP ifIndex: 245 <---- note the “Administratively down”
Link-level type: Ethernet, MTU: 1514, Speed: 100mbps, Duplex: Full-Duplex, BPDU
Error: None,
MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled, Flow
control: Disabled,
Auto-negotiation: Disabled, Remote fault: Online
Device flags : Present Running Down
Interface flags: Hardware-Down Down SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Current address: 00:26:88:87:e2:31, Hardware address: 00:26:88:87:e2:31
Last flapped : 2010-05-05 19:42:10 UTC (00:03:03 ago)
Input rate : 0 bps (0 pps)
Output rate : 0 bps (0 pps)
Active alarms : LINK
Active defects : LINK
{master}[edit]
To disable PoE on all interfaces of a J48E switch, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface all disable
To disable PoE on a specific interface of a J48E switch, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface type-fpc/pic/port disable
To enable PoE on all interfaces of a J48E switch, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface all
To enable PoE on a specific interface of an IBM J48E, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface type-fpc/pic/port
To enable PoE on all interfaces that were previously disabled, use the following command:
{master:0}[edit]
ibm@J48E-VC# delete poe interface all disable
To enable PoE on a specific interface that was previously disabled, use the following
command:
{master:0}[edit]
ibm@J48E-VC# delete poe interface type-fpc/pic/port disable
By default, the power management mode is static. To change the power management mode
to class, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe management class
To change the power management mode back to default static mode, use the following
command:
{master:0}[edit]
ibm@J48E-VC# set poe management static
To set the power priority for all interfaces, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface type-fpc/pic/port priority [ low | high ]
To set the maximum PoE wattage available for all interfaces, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface all maximum-power max_power_between_0..15.4
To set the maximum PoE wattage that is available for a specific interface, use the following
command:
{master:0}[edit]
ibm@J48E-VC# set poe interface type-fpc/pic/port maximum-power
max_power_between_0..15.4
To enable logging of PoE power consumption with the default telemetries settings for all
interfaces, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface all telemetries
To enable logging of PoE power consumption with the default telemetries settings for a
specific interface, use the following command:
{master:0}[edit]
ibm@J48E-VC# set poe interface type-fpc/pic/port telemetries
To reserve a specified wattage of power for the switch during a spike in PoE consumption, use
the following command. The default is 0.
{master:0}[edit]
ibm@J48E-VC# set poe guard-band guard_band_value_between_0..19_watts
Example 8-6 shows the PoE configuration from three J48E switches bundled in a virtual
chassis configuration.
{master:0}[edit]
ibm@J48E-VC# set poe interface ge-0/0/0 disable
{master:0}[edit]
ibm@J48E-VC# set poe interface all telemetries interval 1 duration 24
{master:0}[edit]
ibm@J48E-VC# set poe management class
{master:0}[edit]
ibm@J48E-VC# set poe guard-band 15
{master:0}[edit]
ibm@J48E-VC# set poe interface ge-0/0/1 priority high
{master:0}[edit]
ibm@J48E-VC# set poe interface all priority low
{master:0}[edit]
ibm@J48E-VC# set poe interface ge-0/0/1 maximum-power 7
{master:0}[edit]
ibm@J48E-VC# set poe interface all maximum-power 15.4
{master:0}[edit]
ibm@J48E-VC# show poe
management class;
guard-band 15;
interface all {
priority low;
maximum-power 15.4;
telemetries {
interval 1;
duration 24;
}
}
interface ge-0/0/0 {
disable;
}
interface ge-0/0/1 {
priority high;
maximum-power 7;
telemetries;
}
{master:0}[edit]
ibm@J48E-VC# commit
fpc0:
configuration check succeeds
fpc1:
commit complete
fpc2:
commit complete
fpc0:
commit complete
{master:0}[edit]
ibm@J48E-VC#
To view the status of the PoE controller, use the following command:
{master:0}
ibm@J48E-VC> show poe controller
To view a history of power consumption on the specified interface, use the following
command:
{master:0}
ibm@J48E-VC> show poe telemetries interface type-fpc/pic/port all
Example 8-7 shows the output of the PoE verification commands. A PoE device is attached
on port ge-2/0/0.
{master:0}
ibm@J48E-VC> show poe controller
Controller Maximum Power Guard band Management
index power consumption
0 130 W 0W 0W Static
1 130 W 0W 0W Static
{master:0}
ibm@J48E-VC> show poe telemetries interface ge-2/0/0 all
Sl No Timestamp Power Voltage
1 02-20-2010 21:10:33 UTC 3.8W 50.5V
2 02-20-2010 21:09:33 UTC 3.8W 50.5V
3 02-20-2010 21:08:33 UTC 0.0W 50.6V
4 02-20-2010 21:07:33 UTC 0.0W 50.6V
5 02-20-2010 21:06:33 UTC 0.0W 50.6V
{master:0}
ibm@J48E-VC> show poe interface ge-2/0/0
PoE interface status:
PoE interface : ge-2/0/0
Administrative status : Enabled
Operational status : ON
Power limit on the interface : 15.4W
Priority : Low
Power consumed : 3.7W
Class of power device : 3
{master:0}
ibm@J48E-VC>
http://www.ibm.com/systems/support/supportsite.wss/brandmain?brandind=5375876
For additional information and step-by-step installation procedures, see the following
documentation that is appropriate for your switch:
IBM Ethernet Switch J48E Complete Hardware Guide, GA32-0663
IBM Ethernet Switch J48E Quick Start, GA32-0664
IBM Ethernet Switch J08E Complete Hardware Guide, GA32-0665
IBM Ethernet Switch J08E Quick Start, GA32-0666
IBM Ethernet Switch J16E Complete Hardware Guide, GA32-0667
IBM Ethernet Switch J16E Quick Start, GA32-0668
For more information about the IBM j-type Ethernet routers the related hardware, see the
following documentation:
IBM j-type m-series Ethernet Router Dense Port Concentrators (DPC) Guide, GA32-0661
IBM j-type m-series Ethernet Routing Engine Installation Instructions, GA32-0682
IBM j-type m-series Ethernet Services PIC Guide, GA32-0662
IBM Ethernet Router J02M Hardware Guide, GA32-0655
IBM Ethernet Router J02M Quick Start, GA32-0656
IBM Ethernet Router J06M Hardware Guide, GA32-0657
For more information about Junos software, see the following documentation:
Juniper Web Device Manager for IBM j-type Ethernet Switches and Routers Interface
User Guide, GA32-0688
JUNOS Software Access Privilege Configuration Guide, GA32-0696
JUNOS Software Broadband Subscriber Management Solutions Guide, GA32-0709
JUNOS Software Class of Service Configuration Guide, GA32-0738
JUNOS Software CLI User Guide, GA32-0697
JUNOS Software Configuration and Diagnostic Automation Guide, GA32-0679
JUNOS Software Ethernet Routing Engine Media Upgrade Kit, GA32-0681
JUNOS Software Feature Guide, GA32-0739
JUNOS Software Hierarchy and RFC Reference, GA32-0712
JUNOS Software High Availability Configuration Guide, GA32-0670
JUNOS Software IBM j-type m-series Ethernet Routers Layer 2 Configuration Guide,
GA32-0708
JUNOS Software Installation and Upgrade Guide, GA32-0695
JUNOS Software Interfaces Command Reference, GA32-0672
JUNOS Software JUNOScript API Guide, GA32-0674
JUNOS Software MPLS Applications Configuration Guide, GA32-0702
JUNOS Software Multicast Protocols Configuration Guide, GA32-0703
JUNOS Software NETCONF API Guide, GA32-0678
JUNOS Software Network Interfaces Configuration Guide, GA32-0706
JUNOS Software Network Management Configuration Guide, GA32-0698
JUNOS Software Policy Framework Configuration Guide, GA32-0704
JUNOS Software Routing Protocols and Policies Command Reference, GA32-0673
JUNOS Software Services Interfaces Configuration Guide, GA32-0707
JUNOS Software Subscriber Access Configuration Guide, GA32-0711
JUNOS Software System Basics and Services Command Reference, GA32-0671
JUNOS Software System Log Messages Reference, GA32-0675
JUNOS Software VPNs Configuration Guide, GA32-0705
JUNOScope Software User Guide, GA32-0670
Before reading this chapter, you must have a basic understanding of networking concepts. If
necessary, see Chapter 1, “Fundamentals of Ethernet networking” on page 1, and IBM j-type
Data Center Networking Introduction, SG24-7820, for a short introduction.
EX8208 FAN
ALM
! Juniper
NE TW O RKS
® SYS
MST EX8208
ge-1/0/11
15 17 31 33
EX8200 48T
ON ST
ge-2/0/1 ge-1/0/1 2
ge-1/0/12
EX 4200 8 PoE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 1 41 5 16 17 18 19 20 21 22 23 242 5 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
ge-2/0/2 ge-1/0/2
ON
3 ST
0 1 2 3 4 5 6 7
EX8200 8XS
ON MS A UX CONSOLE MGMT
ST SF
SRE0 USB
RE SE T
EX 4200 8 PoE
EX8208-SRE320
0 1 2 3 4 5 6 7 8 9 10 11 12 13 1 41 5 16 17 18 19 20 21 22 23 242 5 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
ge-1/0/13
ON
ST
ge-2/0/3 ge-1/0/3
SF
EX8208- SF320- S
SRE1
EX 4200 8 PoE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 1 41 5 16 17 18 19 20 21 22 23 242 5 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
ge-2/0/4 ge-1/0/4 5
EX8200 48F
15 17
ON ST
31 33 ge-1/0/14
6
J48E-VC xe-3/0/0 7
ge-1/0/15
xe-3/0/1
PSU 0 PSU 1 PSU 2 PSU 3 PSU 4 PSU 5
E I E I
N ON N ON
A A
B B
L S TANDB Y L STANDB Y
E E
J08E
The number of interfaces that can be grouped into a LAG and the total number of LAGs
supported on a switch vary by switch model. Table 9-1 lists the maximum number of
interfaces per LAG and the maximum number of LAGs they support for the IBM j-type
Ethernet switches.
Table 9-1 Maximum interfaces per LAG and maximum LAGs per equipment
Equipment model Maximum interfaces per LAG Maximum LAGs
J48E 8 64
Physical Ethernet ports: You can combine physical Ethernet ports belonging to different
member switches of a Virtual Chassis configuration to form a LAG.
where x is the device count between 1 and the maximum number of LAGs supported by the
platform.
where:
x is the LAG number.
y is the number of interfaces in this LAG with values between 1 and the maximum number
of interfaces per LAG supported by the platform.
To configure the inet protocol family on a LAG in IBM j-type Ethernet switches and routers,
use the following command:
{master}[edit]
ibm@J08E-re0# set interfaces aex unit 0 family inet
To verify the LACP interface parameters and negotiation status, use the following command:
{master}
ibm@J08E-re0> show lacp interfaces [aex]
where aex is a defined LAG interface and is an optional argument. If aex is not specified, all
LAG interfaces are listed.
where aex is a defined LAG interface and is an optional argument. If aex is not specified,
statistics for all LAG interfaces are listed.
To clear the LACP statistics on all or specific interface, use the following command:
{master}
ibm@J08E-re0> clear lacp statistics interfaces [aex]
where aex is a defined LAG interface and is an optional argument. If aex is not specified,
statistics for all LAG interfaces are cleared.
{master}[edit]
ibm@J08E-re0# set interfaces ae0 aggregated-ether-options minimum-links 3
{master}[edit]
ibm@J08E-re0# set interfaces ae0 unit 0 family ethernet-switching
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/2 ether-options 802.3ad ae0
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/3 ether-options 802.3ad ae0
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/4 ether-options 802.3ad ae0
{master}[edit]
ibm@J08E-re0# show interfaces ae0
aggregated-ether-options {
minimum-links 3;
}
unit 0 {
family ethernet-switching;
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# exit
Exiting configuration mode
{master}
ibm@J08E-re0> show interfaces ae0 extensive
Physical interface: ae0, Enabled, Physical link is Up <------ link is up
Interface index: 234, SNMP ifIndex: 508, Generation: 237
Link-level type: Ethernet, MTU: 1514, Speed: 4Gbps, BPDU Error: None,
MAC-REWRITE Error: None, <------------------ note the LAG speed of 4 Gbps
Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled, Minimum
links needed: 3,
Minimum bandwidth needed: 0
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Current address: 00:26:88:87:e2:01, Hardware address: 00:26:88:87:e2:01
Last flapped : 2010-05-06 19:24:36 UTC (00:38:55 ago)
Statistics last cleared: Never
Traffic statistics:
Input bytes : 1611836522 0 bps
Output bytes : 1307667066 0 bps
Input packets: 2089876 0 pps
Output packets: 959763 0 pps
IPv6 transit statistics:
Input bytes : 0
Logical interface ae0.0 (Index 65) (SNMP ifIndex 509) (Generation 138)
Flags: SNMP-Traps 0x0 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 0 0 0 0
Output: 992 0 102005 0
Link:
ge-1/0/1.0
Input : 0 0 0 0
Output: 13 0 2192 0
ge-1/0/2.0
Input : 0 0 0 0
Output: 1072 0 120878 0
ge-1/0/3.0
Input : 0 0 0 0
Output: 115 0 25841 0
ge-1/0/4.0
Input : 0 0 0 0
Output: 115 0 25841 0
Marker Statistics: Marker Rx Resp Tx Unknown Rx Illegal Rx
ge-1/0/1.0 0 0 0 0
ge-1/0/2.0 0 0 0 0
ge-1/0/3.0 0 0 0 0
ge-1/0/4.0 0 0 0 0
Protocol eth-switch, Generation: 157, Route table: 0
Flags: None
{master}
ibm@J08E-re0> show lacp interfaces ae0
Aggregated interface: ae0 <--- LACP not active on ae0, no information, and no
statistics
{master}
ibm@J08E-re0> show lacp statistics interfaces ae0
{master}
ibm@J08E-re0>
Example 9-1 on page 227 shows that a LAG with the name ae0 that has four active gigabit
member links. No information is available about the LACP and the LACP statistics because
the LACP protocol is not enabled on the LAG.
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/1 disable <--------- shut down this interface
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/2 disable <--------- shut down this interface
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show interfaces ae0 extensive
Physical interface: ae0, Enabled, Physical link is Down <---the interface is down
Interface index: 234, SNMP ifIndex: 508, Generation: 237
Link-level type: Ethernet, MTU: 1514, Speed: Unspecified, BPDU Error: None,
MAC-REWRITE Error: None,
Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled, Minimum
links needed: 3, <------------------------- minimum of links 3, but we only have 2
Minimum bandwidth needed: 0
Device flags : Present Running
Interface flags: Hardware-Down SNMP-Traps Internal: 0x0
Current address: 00:26:88:87:e2:01, Hardware address: 00:26:88:87:e2:01
Last flapped : 2010-05-06 20:20:30 UTC (00:00:21 ago)
Statistics last cleared: Never
Traffic statistics:
Input bytes : 1611836522 0 bps
Output bytes : 1307667066 0 bps
Input packets: 2089876 0 pps
Output packets: 959763 0 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Input errors:
Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Giants: 0, Policed discards:
0, Resource errors: 0
Output errors:
Carrier transitions: 234, Errors: 0, Drops: 0, MTU errors: 0, Resource errors:
0
{master}[edit]
ibm@J08E-re0# delete interfaces ge-1/0/2 disable <--- enable the interface again
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show interfaces ae0 extensive
Physical interface: ae0, Enabled, Physical link is Up <---- the interface is up
Interface index: 234, SNMP ifIndex: 508, Generation: 237
Link-level type: Ethernet, MTU: 1514, Speed: 3Gbps, BPDU Error: None,
MAC-REWRITE Error: None, <--------------------------------- link speed is 3 Gpbs
Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled, Minimum
links needed: 3,
Minimum bandwidth needed: 0
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Current address: 00:26:88:87:e2:01, Hardware address: 00:26:88:87:e2:01
Last flapped : 2010-05-06 20:27:58 UTC (00:00:04 ago)
Statistics last cleared: Never
Traffic statistics:
Logical interface ae0.0 (Index 65) (SNMP ifIndex 509) (Generation 138)
Flags: SNMP-Traps 0x0 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 0 0 0 0
Output: 1506 0 154833 0
Link:
ge-1/0/1.0 <-- down
Input : 0 0 0 0
Output: 556 0 62813 0
ge-1/0/2.0
Input : 0 0 0 0
Output: 1111 0 129473 0
ge-1/0/3.0
Input : 0 0 0 0
Output: 164 0 37650 0
ge-1/0/4.0
Input : 0 0 0 0
Output: 164 0 37650 0
Marker Statistics: Marker Rx Resp Tx Unknown Rx Illegal Rx
ge-1/0/1.0 0 0 0 0
ge-1/0/2.0 0 0 0 0
ge-1/0/3.0 0 0 0 0
ge-1/0/4.0 0 0 0 0
Protocol eth-switch, Generation: 157, Route table: 0
Flags: None
Example 9-3 Configuring an LACP-enabled LAG on only one side of the LAG
{master}[edit]
ibm@J08E-re0# set interfaces ae0 aggregated-ether-options lacp active
{master}[edit]
ibm@J08E-re0# show interfaces ae0
aggregated-ether-options {
minimum-links 3;
lacp {
active;
}
}
unit 0 {
family ethernet-switching;
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show interfaces ae0 extensive
Physical interface: ae0, Enabled, Physical link is Down <---- LAG port is down
Interface index: 234, SNMP ifIndex: 508, Generation: 237
Link-level type: Ethernet, MTU: 1514, Speed: Unspecified, BPDU Error: None,
MAC-REWRITE Error: None,
Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled, Minimum
links needed: 3,
Minimum bandwidth needed: 0
Device flags : Present Running
Interface flags: Hardware-Down SNMP-Traps Internal: 0x0
Current address: 00:26:88:87:e2:01, Hardware address: 00:26:88:87:e2:01
Last flapped : 2010-05-06 21:24:21 UTC (00:02:11 ago)
Statistics last cleared: Never
Traffic statistics:
Input bytes : 1611897152 0 bps
Logical interface ae0.0 (Index 65) (SNMP ifIndex 509) (Generation 138)
Flags: Hardware-Down Device-Down SNMP-Traps 0x0 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 0 0 0 0
Output: 3194 0 328697 0
Link:
ge-1/0/1.0 <-- down
Input : 0 0 0 0
Output: 556 0 62813 0
ge-1/0/2.0
Input : 0 0 0 0
Output: 2916 0 331534 0
ge-1/0/3.0
Input : 0 0 0 0
Output: 281 0 65847 0
ge-1/0/4.0
Input : 0 0 0 0
Output: 281 0 65847 0
LACP info: Role System System Port Port Port
priority identifier priority number key
ge-1/0/1.0 Actor 0 00:26:88:87:e3:f0 127 577 1
ge-1/0/1.0 Partner 0 00:00:00:00:00:00 0 0 0
ge-1/0/2.0 Actor 0 00:26:88:87:e3:f0 127 578 1
ge-1/0/2.0 Partner 0 00:00:00:00:00:00 0 0 0
ge-1/0/3.0 Actor 0 00:26:88:87:e3:f0 127 579 1
ge-1/0/3.0 Partner 0 00:00:00:00:00:00 0 0 0
ge-1/0/4.0 Actor 0 00:26:88:87:e3:f0 127 580 1
ge-1/0/4.0 Partner 0 00:00:00:00:00:00 0 0 0
LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx
ge-1/0/1.0 0 0 0 0
ge-1/0/2.0 0 131 0 0
ge-1/0/3.0 0 131 0 0
ge-1/0/4.0 0 131 0 0
Marker Statistics: Marker Rx Resp Tx Unknown Rx Illegal Rx
ge-1/0/1.0 0 0 0 0
ge-1/0/2.0 0 0 0 0
ge-1/0/3.0 0 0 0 0
ge-1/0/4.0 0 0 0 0
Protocol eth-switch, Generation: 157, Route table: 0
{master}[edit]
ibm@J08E-re0# run show lacp interfaces
Aggregated interface: ae0
LACP state: Role Exp Def Dist Col Syn Aggr Timeout Activity
ge-1/0/1 Actor No Yes No No No Yes Fast Active
ge-1/0/1 Partner No Yes No No No Yes Fast Passive
ge-1/0/2 Actor No Yes No No No Yes Fast Active
ge-1/0/2 Partner No Yes No No No Yes Fast Passive
ge-1/0/3 Actor No Yes No No No Yes Fast Active
ge-1/0/3 Partner No Yes No No No Yes Fast Passive
ge-1/0/4 Actor No Yes No No No Yes Fast Active
ge-1/0/4 Partner No Yes No No No Yes Fast Passive
LACP protocol: Receive State Transmit State Mux State
ge-1/0/1 Port disabled No periodic Detached
ge-1/0/2 Defaulted Fast periodic Detached
ge-1/0/3 Defaulted Fast periodic Detached
ge-1/0/4 Defaulted Fast periodic Detached
{master}[edit]
ibm@J08E-re0# run show lacp statistics interfaces
Aggregated interface: ae0
LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx
ge-1/0/1 0 1 0 0
ge-1/0/2 0 84 0 0
ge-1/0/3 0 84 0 0
ge-1/0/4 0 84 0 0
{master}[edit]
ibm@J08E-re0#
As indicated in the output of the show commands from Example 9-3 on page 233, the LAG is
inactive because we enabled LACP only on one side of the LAG. The LACP is only active on
one side of the LAG as you can see in the output of the show lacp statistics interfaces
command. We used the same commands to configure LACP on the other side of the LAG on
J48E. Example 9-4 shows how to verify, on the J08E switch, that the LAG is up and that LACP
communication exists between the LAG peers.
Example 9-4 Verifying that LAG is up and LACP communication exists on both LAG sides
{master}[edit]
ibm@J08E-re0# run clear lacp statistics interfaces
{master}[edit]
ibm@J08E-re0# run show interfaces ae0 extensive
Physical interface: ae0, Enabled, Physical link is Up <---- LAG interface is up
Interface index: 234, SNMP ifIndex: 508, Generation: 237
Link-level type: Ethernet, MTU: 1514, Speed: 3Gbps, BPDU Error: None,
MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled, Flow
control: Disabled,
Minimum links needed: 3, Minimum bandwidth needed: 0
Device flags : Present Running
Interface flags: SNMP-Traps Internal: 0x0
Current address: 00:26:88:87:e2:01, Hardware address: 00:26:88:87:e2:01
Last flapped : 2010-05-06 21:29:03 UTC (16:45:29 ago)
Logical interface ae0.0 (Index 65) (SNMP ifIndex 509) (Generation 138)
Flags: SNMP-Traps 0x0 Encapsulation: ENET2
Statistics Packets pps Bytes bps
Bundle:
Input : 0 0 0 0
Output: 275 0 28325 0
Link:
ge-1/0/1.0 <-- down
Input : 0 0 0 0
Output: 0 0 0 0
ge-1/0/2.0
Input : 0 0 0 0
Output: 294 0 32904 0
ge-1/0/3.0
Input : 0 0 0 0
Output: 18 0 4338 0
ge-1/0/4.0
Input : 0 0 0 0
Output: 18 0 4338 0
LACP info: Role System System Port Port Port
priority identifier priority number key
ge-1/0/1.0 Actor 0 00:26:88:87:e3:f0 127 577 1
ge-1/0/1.0 Partner 0 00:00:00:00:00:00 0 0 0
ge-1/0/2.0 Actor 0 00:26:88:87:e3:f0 127 578 1
ge-1/0/2.0 Partner 127 00:19:e2:57:3a:00 127 642 2
ge-1/0/3.0 Actor 0 00:26:88:87:e3:f0 127 579 1
ge-1/0/3.0 Partner 127 00:19:e2:57:3a:00 127 643 2
ge-1/0/4.0 Actor 0 00:26:88:87:e3:f0 127 580 1
ge-1/0/4.0 Partner 127 00:19:e2:57:3a:00 127 644 2
LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx
ge-1/0/1.0 0 0 0 0
ge-1/0/2.0 551 550 0 0
ge-1/0/3.0 551 550 0 0
ge-1/0/4.0 551 550 0 0
Marker Statistics: Marker Rx Resp Tx Unknown Rx Illegal Rx
ge-1/0/1.0 0 0 0 0
ge-1/0/2.0 0 0 0 0
ge-1/0/3.0 0 0 0 0
{master}[edit]
ibm@J08E-re0# run show lacp interfaces
Aggregated interface: ae0
LACP state: Role Exp Def Dist Col Syn Aggr Timeout Activity
ge-1/0/1 Actor No Yes No No No Yes Fast Active
ge-1/0/1 Partner No Yes No No No Yes Fast Passive
ge-1/0/2 Actor No No Yes Yes Yes Yes Fast Active
ge-1/0/2 Partner No No Yes Yes Yes Yes Fast Active
ge-1/0/3 Actor No No Yes Yes Yes Yes Fast Active
ge-1/0/3 Partner No No Yes Yes Yes Yes Fast Active
ge-1/0/4 Actor No No Yes Yes Yes Yes Fast Active
ge-1/0/4 Partner No No Yes Yes Yes Yes Fast Active
LACP protocol: Receive State Transmit State Mux State
ge-1/0/1 Port disabled No periodic Detached
ge-1/0/2 Current Fast periodic Collecting distributing
ge-1/0/3 Current Fast periodic Collecting distributing
ge-1/0/4 Current Fast periodic Collecting distributing
{master}[edit]
ibm@J08E-re0# run show lacp statistics interfaces
Aggregated interface: ae0
LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx
ge-1/0/1 0 0 0 0
ge-1/0/2 49 49 0 0
ge-1/0/3 49 49 0 0
ge-1/0/4 49 49 0 0
{master}[edit]
ibm@J08E-re0#
As shown in Example 9-4 on page 235, the ae0 LAG is up, with both Tx and Rx LACP
packets. Therefore, the LACP is working on both sides of the LAG, and all member interfaces
are active except the one that we disabled in Example 9-2 on page 230. We left this interface
disabled on purpose to observe the difference between an active interface and a disabled or
non-connected interface.
IBM j-series switches have an untagged factory default VLAN named default. On an IBM
J48E switch with a factory default configuration, switching is enabled on all interfaces. In
addition, a VLAN named default is created, and all interfaces are placed into this VLAN.
VLANs 0 and 4095 are reserved by Junos. Therefore, you cannot use them in your network.
To view the status of the VLAN after you committed the configuration, use the following
command:
{master}
ibm@J08E-re0> show vlans [vlan_name] [ brief | extensive ]
Example 9-5 shows the configuration and verification of VLANs, users, servers, and voice on
a J08E switch. We use 100, 200, and 300 as 802.1Q VLAN tags for these VLANs.
{master}[edit]
ibm@J08E-re0# set vlans Servers vlan-id 200
{master}[edit]
ibm@J08E-re0# set vlans Voice vlan-id 300
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# show vlans
Servers {
vlan-id 200;
}
Users {
vlan-id 100;
}
Voice {
vlan-id 300;
}
{master}[edit]
{master}[edit]
ibm@J08E-re0# run show vlans brief
Ports
Name Tag Primary Address Active/Total
Servers 200
Users 100
Voice 300
default
{master}[edit]
ibm@J08E-re0# run show vlans Users extensive
VLAN: Users, Created at: Fri May 7 18:42:54 2010
802.1Q Tag: 100, Internal index: 6, Admin State: Enabled, Origin: Static
Protocol: Port Mode, Mac aging time: 300 seconds
Number of interfaces: Tagged 0 (Active = 0), Untagged 0 (Active = 0)
{master}[edit]
ibm@J08E-re0#
where:
type-fpc/pic/port.unit is the logical interface we want to configure
vlan-name is the name of the VLAN or VLAN ID.
To see interface status and VLAN assignment, use the following command:
{master}
ibm@J08E-re0> show ethernet-switching interfaces [ type-fpc/pic/port.unit ]
To see the switching table (MAC table), use the following command:
{master}
ibm@J08E-re0> show ethernet-switching table [ brief | extensive | summary ]
Example 9-6 shows how to create VLANs Users, Servers, and Voice with a VLAN ID of 100,
200, and 300. This example then assign ports ge-1/0/11.0 and ge-1/0/12.0 to the Users VLAN
and ports ge-1/0/13.0 and ge-1/0/14.0 to the Servers VLAN. It also shows how to move in the
Junos configuration hierarchy to shorten the command length.
{master}[edit vlans]
ibm@J08E-re0# exit
{master}[edit] <------- We returned to the previous configuration hierarchy level
ibm@J08E-re0#
{master}[edit]
ibm@J08E-re0# edit interfaces <-------- Move in the Junos configuration hierarchy
{master}[edit interfaces]
{master}[edit interfaces]
ibm@J08E-re0# top
{master}[edit] <---------- We returned to the top configuration hierarchy level
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
{master}[edit]
ibm@J08E-re0# run show vlans brief
Ports
Name Tag Primary Address Active/Total
Servers 200 0/2
Users 100 0/2
Voice 300
default
{master}[edit]
ibm@J08E-re0# run show vlans
Name Tag Interfaces
Servers 200
ge-1/0/13.0, ge-1/0/14.0
Users 100
ge-1/0/11.0, ge-1/0/12.0
Voice 300
None
default
None
{master}[edit]
ibm@J08E-re0#
To assign and allow VLANs on a trunk interface on an IBM j-type switch, use the following
command:
{master}[edit]
ibm@J08E-re0# set interfaces type-fpc/pic/port.unit family ethernet-switching vlan
members vlan-names
where:
type-fpc/pic/port.unit is the trunk interface.
vlan-names are the VLANs assigned on the trunk.
To specify more than one VLAN, enclose them in square brackets, for example [ Vlan1 vlan2
vlanX ]. To specify all VLANs, use the keyword all.
To specify which VLAN is existing or untagged on a trunk, use the following command:
{master}[edit]
ibm@J08E-re0# set interfaces type-fpc/pic/port.unit family ethernet-switching
native-vlan-id vlan-name
Example 9-7 shows the configuration of trunk port xe-3/0/0 and xe-3/0/1. On xe-3/0/0, all
VLANs are allowed, and the existing or untagged VLAN is the default VLAN. On xe-3/0/1, only
the Users and Servers VLANs are allowed. Again, this example shows moving deeper into
the Junos configuration hierarchy to shorten the command length.
{master}[edit]
ibm@J08E-re0# run show vlans
Name Tag Interfaces
Servers 200
ge-1/0/13.0, ge-1/0/14.0, xe-3/0/0.0*, xe-3/0/1.0*
Users 100
ge-1/0/11.0, ge-1/0/12.0, xe-3/0/0.0*, xe-3/0/1.0*
Voice 300
xe-3/0/0.0*
default
xe-3/0/0.0*
{master}[edit]
ibm@J08E-re0# run show vlans brief
Ports
Name Tag Primary Address Active/Total
Servers 200 2/4
Users 100 2/4
Voice 300 1/1
default 1/1
{master}[edit]
ibm@J08E-re0# run show vlans extensive
VLAN: Servers, Created at: Fri May 7 18:42:54 2010
802.1Q Tag: 200, Internal index: 5, Admin State: Enabled, Origin: Static
Protocol: Port Mode, Mac aging time: 300 seconds
Number of interfaces: Tagged 2 (Active = 2), Untagged 2 (Active = 0)
xe-3/0/0.0*, tagged, trunk
xe-3/0/1.0*, tagged, trunk
ge-1/0/13.0, untagged, access
ge-1/0/14.0, untagged, access
{master}
ibm@J08E-re0> show ethernet-switching interfaces
Interface State VLAN members Tag Tagging Blocking
ge-1/0/11.0 down Users 100 untagged blocked by STP
ge-1/0/12.0 down Users 100 untagged blocked by STP
ge-1/0/13.0 down Servers 200 untagged blocked by STP
ge-1/0/14.0 down Servers 200 untagged blocked by STP
xe-3/0/0.0 up default untagged unblocked
Servers 200 tagged unblocked
Users 100 tagged unblocked
Voice 300 tagged unblocked
xe-3/0/1.0 up Servers 200 tagged blocked by STP
Users 100 tagged blocked by STP
{master}
ibm@J08E-re0>
The RVI must be configured as part of a broadcast domain or VPLS routing instance for
Layer 3 traffic to be routed out of it. The RVI supports IPv4, IPv6, Multiprotocol Label
Switching (MPLS), and IS-IS traffic. At least one Layer 2 logical interface must be operational
for the RVI to be operational. You must configure a broadcast domain or VPLS routing
instance for the RVI just as you might configure a VLAN on the switch. Multicast data,
broadcast data, or unicast data is switched between ports within the same RVI broadcast
Jumbo frames of up to 9,216 bytes are supported on an RVI. To route jumbo data packets on
the RVI, configure the jumbo MTU size on the member physical interfaces of the RVI and not
on the RVI itself (the vlan interface). However, for jumbo control packets, for example, to ping
the RVI with a packet size of 6000 bytes or more, you must explicitly configure the jumbo MTU
size on the vlan interface (the RVI).
Example 9-8 shows how to configure an RVI using a new VLAN named RV, with vlan-id 500,
and binding with Layer 3 interface vlan.555. A different number for vlan-id and the unit of the
vlan interface are used to clearly illustrate the linking process.
{master}[edit]
ibm@J08E-re0# set vlans RV vlan-id 500
{master}[edit]
ibm@J08E-re0# set interfaces ge-1/0/15.0 family ethernet-switching vlan members RV
{master}[edit]
ibm@J08E-re0# set interfaces vlan.555 family inet address 10.1.1.1/24
{master}[edit]
ibm@J08E-re0# set vlans RV l3-interface vlan.555
{master}[edit]
ibm@J08E-re0#commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}
ibm@J08E-re0> show interfaces vlan terse
Interface Admin Link Proto Local Remote
vlan up up
vlan.555 up up inet 10.1.1.1/24
{master}
ibm@J08E-re0> show vlans
Name Tag Interfaces
RV 500
ge-1/0/15.0
default
{master}
ibm@J08E-re0> show ethernet-switching table
Ethernet-switching table: 3 entries, 0 learned
VLAN MAC address Type Age Interfaces
default * Flood - All-members
RV * Flood - All-members
RV 00:26:88:87:e2:00 Static - Router
{master}
ibm@J08E-re0> show vlans RV extensive
VLAN: RV, Created at: Sun May 9 02:43:15 2010
802.1Q Tag: 500, Internal index: 9, Admin State: Enabled, Origin: Static
Layer 3 interface: vlan.555 (UP) <----------------- link to L3 interface
IPV4 addresses:
10.1.1.1/24(Primary)
Protocol: Port Mode, Mac aging time: 300 seconds
Number of interfaces: Tagged 0 (Active = 0), Untagged 1 (Active = 0)
ge-1/0/15.0, untagged, access
{master}
ibm@J08E-re0>
You use the following same operational commands to check the status of your spanning-tree
configuration, regardless of which STP is configured:
{master}
ibm@J08E-re0> show spanning-tree bridge
{master}
ibm@J08E-re0> show spanning-tree interface
{master}[edit]
ibm@J08E-re0# set protocols stp
You can further customize STP timers and options under the STP protocol configuration
hierarchy as shown in Example 9-9.
{master}[edit]
ibm@J08E-re0# set protocols stp
{master}[edit]
ibm@J08E-re0# edit protocols stp
For example, if a switch supports only STP and interconnects with a switch running RSTP,
that switch discards the RSTP Bridge Protocol Data Units (BPDU). The RSTP-capable
switch, upon receiving STP BPDUs, reverts to STP mode, thus allowing interoperability
between the two devices.
If the default configuration was removed, you can configure RSTP by using the following
command:
{master}[edit]
ibm@J08E-re0# set protocols rstp
{master}[edit]
ibm@J08E-re0# edit protocols rstp
With an MSTP region, a group of bridges can be modeled as a single bridge. An MSTP region
contains multiple spanning tree instances (MSTIs). MSTIs provide different paths for different
VLANs. This functionality facilitates better load sharing across redundant links. An MSTP
region can support up to 64 MSTIs. Each instance can support anywhere from 1 through
4094 VLANs.
Because the MSTP encodes region information after the standard RSTP BPDU, a switch
running the RSTP interprets the MSTP BPDUs as RSTP BPDUs. This behavior facilitates full
compatibility between devices running MSTP and devices running the STP or RSTP. All
RSTP switches outside of an MST region view the MST region as a single RSTP switch.
The common spanning tree (CST) interconnects all MST regions and STP devices that are
not bound to a particular region. It facilitates end-to-end paths within an MSTP environment.
All MSTP environments contain a CST, which is used to interconnect individual MST regions
and independent STP devices. A single root bridge is elected and tasked with path calculation
for the CST. Each MST region is treated as a virtual bridge within the environment, regardless
of the number of devices that participate in the MST region.
The common and internal spanning tree (CIST) is a single topology that connects all switches
(STP, RSTP, and MSTP devices) through an active topology. The CIST includes a single
spanning tree as calculated by the STP and RSTP with the logical continuation of connectivity
through MST regions. The CIST is calculated by MSTP and ensures connectivity between
LANs and devices within a bridged network.
To create an MSTP region and assign a revision level use the following commands:
{master}[edit]
ibm@J08E-re0# set protocols mstp configuration-name region_name
{master}[edit]
ibm@J08E-re0# set protocols mstp revision-level revision_level
where:
region_name is the name of the MSTP region.
revision_level is the revision_level of the MSTP region.
The region_name and revision_level must mach on all routers in the same region.
To create an MSTI in an MSTP region and assign VLANs to it, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols mstp msti msti_id vlan vlans
{master}[edit]
ibm@J08E-re0# set protocols mstp revision-level 1
{master}[edit]
ibm@J08E-re0# set protocols mstp msti 1 vlan Voice
{master}[edit]
ibm@J08E-re0# set protocols mstp msti 2 vlan [ Users Servers ]
{master}[edit]
ibm@J08E-re0# set protocols mstp msti 2 bridge-priority 32k
{master}[edit]
ibm@J08E-re0# set protocols mstp msti 2 interface xe-3/0/1.0 priority 64
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# show protocols mstp
configuration-name region1;
revision-level 1;
msti 1 {
vlan Voice;
}
msti 2 {
bridge-priority 32k;
vlan [ Users Servers ];
interface xe-3/0/1.0 {
priority 64;
}
}
{master}[edit]
{master}
ibm@J08E-re0> show spanning-tree mstp configuration
MSTP information
Context identifier : 0
Region name : region1
Revision : 1
Configuration digest : 0x69cc9b4dbdadc69662236e912f2f5cf0
{master}
ibm@J08E-re0> show spanning-tree bridge
{master}
ibm@J08E-re0> show spanning-tree interface
{master}
ibm@J08E-re0> show spanning-tree interface xe-3/0/0.0 detail
{master}
ibm@J08E-re0>
By default, the VSTP runs the RSTP, but the stand-alone RSTP and VSTP cannot run
simultaneously on a switch. VSTP can be enabled for up to 253 VLANs.
You can further customize RSTP timers and options under the VSTP configuration hierarchy
as shown in Example 9-12.
{master}[edit]
ibm@J08E-re0# set protocols vstp vlan Users bridge-priority 32k
{master}[edit]
ibm@J08E-re0# edit protocols vstp vlan Servers
You enable BPDU protection on switch interfaces that are connected to user devices or on
interfaces on which no BPDUs are expected, such as edge ports. If BPDUs are received on a
protected interface, the interface is disabled and stops forwarding frames.
You can configure BPDU protection on a switch with or without a spanning tree. This type of
topology typically consists of a non-STP switch connected to an STP switch through a trunk
interface.
To configure BPDU protection on a switch with a spanning tree, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols <stp|rstp|mstp|vstp> bpdu-block-on-edge
After fixing the misconfiguration in the topology that triggered the BPDUs being sent to an
interface, you can unblock the interface in either of the following ways:
If the disable-timeout statement is included in the BPDU configuration, the interface
automatically returns to service after the timer expires. To set this timer, use the following
command:
{master}[edit ethernet-switching-options]
ibm@J08E-re0# set bpdu-block disable-timeout timeout interface interface
Use the operational mode command:
{master}
ibm@J08E-re0> clear ethernet-switching bpdu-error
Disabling the BPDU protection configuration does not unblock the interface.
A blocking interface can make the transition to the forwarding state in error if the interface
stops receiving BPDUs from its designated port on the segment. Such a transition error can
occur when a hardware error happens on the switch or software configuration error between
the switch and its neighbor.
When loop protection is enabled, the spanning-tree topology detects root ports and blocked
ports and ensures that both keep receiving BPDUs. If a loop-protection-enabled interface
stops receiving BPDUs from its designated port, it reacts as it might react to a problem with
the physical connection on this interface. It does not change the interface to a forwarding
state, but instead changes it to a loop-inconsistent state. The interface recovers, and then it
changes back to the spanning-tree blocking state as soon as it receives a BPDU.
You must enable loop protection on all switch interfaces that have a chance of becoming root
or designated ports. Loop protection is most effective when enabled in the entire switched
network. When you enable loop protection, you must configure at least one action (alarm,
block, or both).
An interface can be configured for either loop protection or root protection, but not for both.
To receive an alarm when loop protection fired on an interface, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rstp interface interface bpdu-timeout-action alarm
Enable root protection on interfaces that must not receive superior BPDUs from the root
bridge and that must not be elected as the root port. These interfaces become designated
ports and are typically located on an administrative boundary. If the bridge receives superior
STP BPDUs on a port that has root protection enabled, that port transitions to a
root-prevented STP state (inconsistency state), and the interface is blocked. This blocking
prevents a bridge that must not be the root bridge from being elected the root bridge. After the
bridge stops receiving superior STP BPDUs on the interface with root protection, the interface
returns to a listening state, followed by a learning state, and back to a forwarding state.
Recovery back to the forwarding state is automatic.
When root protection is enabled on an interface, it is enabled for all the STP instances on that
interface. The interface is blocked only for instances for which it receives superior BPDUs.
Otherwise, it participates in the spanning-tree topology.
An interface can be configured for either root protection or loop protection, but not for both. To
configure root protection for an interface, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rstp interface interface no-root-port
LLDP-capable devices transmit information in Type Length Value (TLV) messages to neighbor
devices. Device information can include such specifics as chassis and port identification,
system name, and system capabilities. The TLVs take this information from parameters that
have already been configured in the Junos software.
LLDP-MED goes one step further by exchanging IP-telephony messages between the switch
and the IP telephone. These TLV messages provide detailed information about the Power
over Ethernet (PoE) policy. With the PoE Management TLVs, the switch ports can advertise
the power level and power priority that are needed. For example, the switch can compare the
power that is needed by an IP telephone running on a PoE interface with available resources.
If the switch cannot meet the resources that are required by the IP telephone, the switch can
negotiate with the telephone until a compromise on power is reached.
IBM j-type Ethernet switches and routers support the following 802.3 TLVs:
Power via MDI A TLV that advertises MDI power support, Power Sourcing Equipment
(PSE) power pair, and power class information.
MAC/PHY configuration status
A TLV that advertises information about the physical interface, such as
autonegotiation status and support and MAU type. The information is
not configurable, but is based on the physical interface structure.
Link aggregation A TLV that advertises if the port is aggregated and its aggregated port
ID.
Maximum frame size A TLV that advertises the Maximum Transmission Unit (MTU) of the
interface that is sending LLDP frames.
Port VLAN A TLV that advertises the VLAN name configured on the interface.
IBM j-type Ethernet switches and routers support the following LLDP-MED TLVs:
LLDP MED capabilities
A TLV that advertises the primary function of the port. The capabilities
values range 0 through 15:
0 Capabilities
1 Network Policy
2 Location Identification
3 Extended Power via MDI-PSE
4 Inventory
5–15 Reserved
LLDP-MED device class values
0 Class not defined.
1 Class 1 Device.
Configuring LLDP
LLDP is enabled on all interfaces by default. If it is disabled, you can enable LLDP by
configuring it on all interfaces or specific interfaces. To configure LLDP on all interfaces or on
a specific interface, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols lldp interface all
You can adjust the settings for LLDP advertisements for troubleshooting or verification
purposes. For normal operations, do not adjust these settings from the default values.
To change the default 30 seconds interval at which LLDP advertisements are sent, use the
following command:
{master}[edit]
ibm@J08E-re0# set protocols lldp advertisement-interval 5..32768
Configuring LLDP-MED
LLDP-MED is enabled on all interfaces by default. If it is disabled, you can enable LLDP-MED
by configuring it on all interfaces or on specific interfaces. To configure LLDP-MED on all
interfaces or on a specific interface, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols lldp-med interface all
You can specify the number of LLDP-MED advertisements that are sent from the switch in the
first second after it has detected an LLDP-capable device. The default is 3. To change the
default value to another value, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols lldp-med fast-start 1..10
You can configure the location information that is advertised from the switch to the
LLDP-MED device. You can specify a civic-based location (geographic location) or a location
based on an emergency location identification string (ELIN). To specify a location by
geography, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols lldp-med interface interface_name location
civic-based civic-options
For a detailed description of civic-options, see the appropriate documentation listed in the
9.7, “More information” on page 270. For a sample configuration of civic-options, see
Example 9-13 on page 265.
To specify a location using an ELIN 10-digit number (area code and telephone number), use
the following command:
{master}[edit]
ibm@J08E-re0# set protocols lldp-med interface interface_name location elin
10-digit-elin-number
To verify the LLDP and LLDP-MED status, use the following command:
{master}
ibm@J08E-re0> show lldp detail
To view detailed LLDP information about a neighbor, use the following command:
{master}
ibm@J08E-re0> show lldp neighbors interface interface-name
To view LLDP and LLDP-MED statistics and counters, use the following command:
{master}
ibm@J08E-re0> show lldp statistics
Example 9-13 shows the configuration and verification of LLDP and LLDP-MED on an IBM
J08E switch.
{master}[edit]
ibm@J08E-re0# set protocols lldp interface ge-1/0/1.0 disable
{master}[edit]
ibm@J08E-re0# edit protocols lldp-med
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# show protocols
rstp;
lldp {
advertisement-interval 5;
interface all;
interface ge-1/0/1.0 {
disable;
}
}
lldp-med {
interface all;
interface ge-1/0/3.0 {
location {
civic-based {
country-code US;
ca-type {
1 {
ca-value "El Dorado County";
}
2 {
ca-value CA;
}
3 {
ca-value Somerset;
}
6 {
ca-value "Mount Aukum Road";
}
19 {
ca-value 6450;
}
21 {
ca-value "Holiday Market";
}
}
}
}
}
interface ge-1/0/2.0 {
{master}[edit]
ibm@J08E-re0# exit
Exiting configuration mode
{master}
ibm@J08E-re0> show lldp detail
LLDP : Enabled
Advertisement interval : 5 seconds
Transmit delay : 2 seconds
Hold timer : 4 seconds
Notification interval : 0 Second(s)
Config Trap Interval : 0 seconds
Connection Hold timer : 300 seconds
{master}
ibm@J08E-re0> show lldp neighbors interface xe-3/0/0.0
LLDP Neighbor Information:
Local Information:
Index: 37 Time to live: 20 Time mark: Mon May 10 14:48:22 2010 Age: 2 secs
Local Interface : xe-3/0/0.0
Local Port ID : 519
Neighbour Information:
Chassis type : Mac address
Chassis ID : 00:26:88:87:e3:f0
Port type : Locally assigned
Port ID : 206
Port description : xe-3/0/1.0
System name : J08E-re0
System Description : Juniper Networks, Inc. IBM 4274-E08 J08E , version 10.1R1.8
Build date: 2010-02-12 17:35:26 UTC
System capabilities
Supported: Bridge Router
Enabled : Bridge Router
Management Info
Type : IPv4
Address : 10.1.1.30
Port ID : 34
Subtype : 1
Interface Subtype : 2
OID : 1.3.6.1.2.1.31.1.1.1.1.34
Organization Info
OUI : 0.18.15
Subtype : 1
Index : 1
Info : 0000010000
Organization Info
OUI : 0.18.15
Subtype : 3
Index : 2
Info : 0100000000
Organization Info
OUI : 0.18.15
Subtype : 4
Index : 3
Info : 05EA
Organization Info
OUI : 0.18.15
Subtype : 3
Index : 5
Info : 0064055573657273
{master}
ibm@J08E-re0> show lldp local-information
Chassis ID : 00:26:88:87:e3:f0
System name : J08E-re0
System descr : Juniper Networks, Inc. IBM 4274-E08 J08E , version 10.1R1.8
Build date: 2010-02-12 17:35:26 UTC
System Capabilities
Supported : Bridge Router
Enabled : Bridge Router
Management Information
Port Name : me0.0
Port ID : 34
Port ID Subtype : local(7)
Port Subtype : ifIndex(2)
{master}
ibm@J08E-re0> show lldp statistics
Interface Received Unknown TLVs With Errors Discarded TLVs Transmitted
Untransmitted
me0.0 0 0 0 0 14272 0
xe-3/0/0.0 4830 0 0 0 4831 0
xe-3/0/1.0 4830 0 0 0 4831 0
{master}
ibm@J08E-re0>
For additional information and step-by-step installation procedures, see the following
documentation as appropriate for your switch:
IBM Ethernet Switch J48E Complete Hardware Guide, GA32-0663
IBM Ethernet Switch J48E Quick Start, GA32-0664
IBM Ethernet Switch J08E Complete Hardware Guide, GA32-0665
IBM Ethernet Switch J08E Quick Start, GA32-0666
IBM Ethernet Switch J16E Complete Hardware Guide, GA32-0667
IBM Ethernet Switch J16E Quick Start, GA32-0668
For more information about the IBM j-type Ethernet routers the related hardware, see the
following documentation:
IBM j-type m-series Ethernet Router Dense Port Concentrators (DPC) Guide, GA32-0661
IBM j-type m-series Ethernet Routing Engine Installation Instructions, GA32-0682
IBM j-type m-series Ethernet Services PIC Guide, GA32-0662
IBM Ethernet Router J02M Hardware Guide, GA32-0655
IBM Ethernet Router J02M Quick Start, GA32-0656
IBM Ethernet Router J06M Hardware Guide, GA32-0657
IBM Ethernet Router J06M Quick Start, GA32-0658
IBM Ethernet Router J11M Hardware Guide, GA32-0659
IBM Ethernet Router J11M Quick Start, GA32-0660
JUNOS Software IBM j-type m-series Ethernet Routers Solutions Guide, GA32-0683
For more information about the Junos software, see the following documentation:
Juniper Web Device Manager for IBM j-type Ethernet Switches and Routers Interface
User Guide, GA32-0688
JUNOS Software Access Privilege Configuration Guide, GA32-0696
JUNOS Software Broadband Subscriber Management Solutions Guide, GA32-0709
JUNOS Software Class of Service Configuration Guide, GA32-0738
JUNOS Software CLI User Guide, GA32-0697
JUNOS Software Configuration and Diagnostic Automation Guide, GA32-0679
JUNOS Software Ethernet Routing Engine Media Upgrade Kit, GA32-0681
JUNOS Software Feature Guide, GA32-0739
JUNOS Software Hierarchy and RFC Reference, GA32-0712
JUNOS Software High Availability Configuration Guide, GA32-0670
JUNOS Software IBM j-type m-series Ethernet Routers Layer 2 Configuration Guide,
GA32-0708
JUNOS Software Installation and Upgrade Guide, GA32-0695
JUNOS Software Interfaces Command Reference, GA32-0672
Before reading this chapter, you must have a basic understanding of networking concepts. If
necessary, see Chapter 1, “Fundamentals of Ethernet networking” on page 1, and IBM j-type
Data Center Networking Introduction, SG24-7820, for a short introduction.
Because the features demonstrated here are same on both pairs of equipment, we selected
to show only one common configuration. For OSPF, static routes, VRRP, Multicast, and RIP,
we present the configuration from the J04E switch. For Border Gateway Protocol (BGP), we
present the configuration from the J02M router.
10.2 IP routing
This section provides the fundamentals of IP routing on IBM j-type Ethernet switches and
routers.
When you configure a protocol on an interface, you must also configure a protocol family on
that interface.
By default, the Junos software maintains three routing tables: one for unicast routes, one for
multicast routes, and one for Multiprotocol Label Switching (MPLS). You can configure
additional routing tables to support situations where you must separate a particular group of
routes or where you need greater flexibility in manipulating routing information. In general,
most operations can be performed without resorting to the complexity of additional routing
tables. However, creating additional routing tables has several specific uses. For example,
you can import interface routes into more than one routing table, apply different routing
policies when exporting the same route to different peers, and provide greater flexibility with
incongruent multicast topologies.
Each routing table is identified by a name, which consists of the protocol family followed by a
period and a small, non-negative integer. The protocol family can be inet (Internet), iso (ISO),
or mpls (MPLS). The following names are reserved for the default routing tables maintained
by the Junos software:
inet.0 Default IP version 4 (IPv4) unicast routing table.
inet6.0 Default IP version 6 (IPv6) unicast routing table.
instance-name.inet.0 Unicast routing table for a particular routing instance.
inet.1 Multicast forwarding cache.
inet.2 Unicast routes used for multicast reverse path forwarding (RPF)
lookup.
inet.3 MPLS routing table for path information.
mpls.0 MPLS routing table for label-switched path (LSP) next hops.
Routing tables: For clarity, this chapter contains general discussions about routing tables
as though there were only one table. However, when it is necessary to distinguish among
the routing tables, their names are explicitly used.
The routing protocol process generally determines the active route by selecting the route with
the lowest preference value. The preference value is an arbitrary value in the range
0–4,294,967,295 (232 – 1) that the software uses to rank routes received from different
protocols, interfaces, or remote systems.
The preference value is used to select routes to destinations in external autonomous systems
or routing domains. It has no effect on the selection of routes within an AS (autonomous
systems, that is, within an IGP). Routes within an AS are selected by the IGP and are based
on that metric or cost value of the protocol.
System routes 4
RSVP-signaled LSPs 7
LDP-signaled LSPs 9
Redirects 30
Kernel 40
SNMP 50
Router discovery 55
RIP 100
RIPng 100
Aggregate 130
BGP 170
10.3.1 RIP
RIP is an IGP that uses a distance-vector algorithm to determine the best route to a
destination, using the hop count as the metric. The RIP IGP uses the Bellman-Ford, or
distance-vector algorithm, to determine the best route to a destination. RIP uses the hop
count as the metric. With RIP, hosts and routers can exchange information for computing
The Junos software supports RIP versions 1 and 2. RIP version 1 packets contain the
minimal information necessary to route packets through a network. However, this version of
RIP does not support authentication or subnetting.
RIP standards
RIP is defined in the following documents:
RFC 1058, Routing Information Protocol
RFC 2082, RIP-2 MD-5 Authentication
RFC 2453, RIP Version 2
To access Internet Requests for Comments (RFCs) and drafts, go to the Internet Engineering
Task Force (IETF) website at:
http://www.ietf.org
RIP configuration
On IBM j-type Ethernet switches and routers, RIP is disabled by default. To have a router
exchange routes with other routers, you must configure RIP groups and neighbors. RIP
routes received from routers that are not configured as RIP neighbors are ignored. Likewise,
RIP routes are advertised only to routers that are configured as RIP neighbors, with an
appropriate RIP export policy applied.
To change the default metric to be added to incoming routes, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip group rip_group neighbor interface_name metric-in
metric
You can define one or more export policies. If no routes match the policies, the local routing
device does not export any routes to its neighbors. Export policies override any metric values
determined through calculations involving the values that are configured with the metric-in
and metric-out statements.
To create a simple export policy with the name export_policy, use the following commands:
{master}[edit]
ibm@J08E-re0# set policy-options policy-statement export_policy from protocol
[direct|static|ospf|bgp]
{master}[edit]
ibm@J08E-re0# set policy-options policy-statement export_policy then accept
The metric associated with a RIP route (unless modified by an export policy) is the normal
RIP metric. For example, a RIP route with a metric of 5 learned from a neighbor configured
with a metric-in value of 2 is advertised with a combined metric of 7 when advertised to RIP
neighbors in the same group. However, if this route was learned from a RIP neighbor in a
different group or from a different protocol, the route is advertised with the metric value
configured for that group with the metric-out statement. The default value for the metric-out
statement is 1.
The metric for a route can be modified with an export policy. That metric is seen when the
route is exported to the next hop.
To increase the metric for routes advertised outside a group, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip group rip_group metric-out metric
To configure the sending of update messages at a specific neighbor level, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols rip group rip_group neighbor interface_name send
(broadcast|multicast|none|version-1)
To configure the sending of update messages at the protocol level, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols rip send (broadcast|multicast|none|version-1)
The configuration at the neighbor level takes precedence over the one at protocol level.
To configure the receiving of update messages at a specific neighbor level, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols rip group rip_group neighbor interface_name receive
(none|version-1|version-2|both)
To configure the receiving of update messages at protocol level, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip receive (none|version-1|version-2|both)
The configuration at neighbor level takes precedence over the one at protocol level.
To modify the default RIP preference value, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip group rip_group preference preference
To change the hold-down timer for RIP, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip holddown timer
To change the route-timeout timer for RIP, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip route-timeout timer
To change the update-interval timer for RIP, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols rip update-interval timer
{master}
ibm@J08E-re0> show rip neighbor
{master}
ibm@J08E-re0> show route protocol rip
{master}[edit]
ibm@J08E-re0# set policy-options policy-statement conn_to_rip from protocol direct
{master}[edit]
ibm@J08E-re0# set policy-options policy-statement conn_to_rip then accept
{master}[edit]
ibm@J08E-re0# show protocols rip
group group-1 {
neighbor ge-1/0/1.0;
}
group group-2 {
neighbor ge-1/0/2.0 {
metric-in 2;
send multicast;
receive version-2;
authentication-type simple;
authentication-key "$9$MM4XNb4oGDkPsYGiq.F3Ecyl87NdsaZUdV"; ## SECRET-DATA
}
}
group group-3 {
preference 101;
metric-out 2;
export conn_to_rip;
neighbor ge-1/0/3.0 {
update-interval 10;
metric-in 3;
send multicast;
receive both;
authentication-type md5;
authentication-key "$9$xdAdwgGUHqfzoaHm5T9CrevWNbwYoDik2g"; ## SECRET-DATA
{master}[edit]
ibm@J08E-re0# show policy-options
policy-statement conn_to_rip {
from protocol direct;
then accept;
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show rip neighbor
Source Destination Send Receive In
Neighbor State Address Address Mode Mode Met
-------- ----- ------- ----------- ---- ------- ---
ge-1/0/1.0 Up 172.16.1.1 224.0.0.9 mcast both 1
ge-1/0/2.0 Up 172.16.2.1 224.0.0.9 mcast v2 only 2
ge-1/0/3.0 Up 172.16.3.1 224.0.0.9 mcast both 3
{master}[edit]
ibm@J08E-re0# run show route protocol rip
{master}[edit]
ibm@J08E-re0# run show route 192.168.10.0/24 extensive
{master}[edit]
ibm@J08E-re0# run show rip statistics
RIPv2 info: port 520; holddown 120s.
rts learned rts held down rqsts dropped resps dropped
12 0 0 0
{master}[edit]
ibm@J08E-re0#
10.3.2 OSPF
OSPF is an IGP that routes packets within a single AS. OSPF uses link-state information to
make routing decisions, making route calculations using the Shortest Path First (SPF)
algorithm (also known as the Dijkstra algorithm). Each router running OSPF floods link-state
advertisements throughout the AS that contain information about that router’s attached
interfaces and routing metrics. Each router takes the information in these link-state
advertisements and creates a complete routing table for the network.
The Junos software supports OSPF version 2, including virtual links, stub areas, and
authentication. The Junos software does not support type-of-service (ToS) routing. OSPF
was designed for the Transmission Control Protocol/IP (TCP/IP) environment. As a result, it
explicitly supports IP subnetting and the tagging of externally derived routing information.
OSPF also provides for the authentication of routing updates.
OSPF routes IP packets based solely on the destination IP address contained in the IP
packet header. OSPF quickly detects topological changes, such as when router interfaces
become unavailable. It also calculates new loop-free routes quickly and with a minimum of
routing overhead traffic.
Each router maintains a database that describes the topology of the AS. Each OSPF router
has an identical topological database so that all routers in the area have a consistent view of
the network. All routers maintain summarized topologies of other areas within an AS. Each
router distributes information about its local state by flooding link-state advertisements
throughout the AS. When the AS topology changes, OSPF ensures that the contents of the
topological databases of all routers converge quickly.
All OSPF protocol exchanges can be authenticated, meaning that only trusted routers can
participate in the routing of the AS. Various authentication schemes can be used. A single
authentication scheme is configured for each area, which enables some areas to use stricter
authentication than others.
Externally derived routing data (for example, routes learned from BGP) is passed
transparently throughout the AS. This externally derived data is kept separate from the OSPF
link-state data. Each external route can be tagged by the advertising router, enabling the
passing of additional information between routers on the boundaries of the AS.
When a router starts, it initializes OSPF and waits for indications from lower-level protocols
that the router interfaces are functional. The router then uses the OSPF Hello protocol to
acquire neighbors by sending Hello packets to its neighbors and receiving their Hello packets.
The router then attempts to form adjacencies with some of its newly acquired neighbors. (On
multi-access networks, only the designated router and backup designated router form
adjacencies with other routers.) Adjacencies determine the distribution of routing protocol
packets. Routing protocol packets are sent and received only on adjacencies, and topological
database updates are sent only along adjacencies. When adjacencies have been
established, pairs of adjacent routers synchronize their topological databases.
A router sends Link State Advertisement (LSA) packets to advertise its state periodically and
when the state of the router changes. These packets include information about the
adjacencies of the router, which allows detection of nonoperational routers.
By using a reliable algorithm, the router floods LSAs throughout the area, which ensures that
all routers in an area have the same topological database. Each router uses the information in
its topological database to calculate a shortest-path tree, with itself as the root. The router
then uses this tree to route network traffic.
AS boundary routers flood information about external autonomous systems throughout the
AS, except to stub areas. Area border routers are responsible for advertising the paths to all
AS boundary routers.
An area is a set of networks and hosts within an AS that have been administratively grouped
together. Configure an area as a collection of contiguous IP subnetted networks. Routers that
are wholly within an area are called internal routers. All interfaces on internal routers are
directly connected to networks within the area.
The topology of an area is hidden from the rest of the AS, significantly reducing routing traffic
in the AS. Also, routing within the area is determined only by the topology of the area,
providing the area with protection from bad routing data. All routers within an area have
identical topological databases.
Backbone areas
An OSPF backbone area consists of all networks in area ID 0.0.0.0, their attached routers,
and all area border routers. The backbone itself does not have any area border routers. The
backbone distributes routing information between areas. The backbone is another area.
Therefore, the terminology and rules of areas apply. A router that is directly connected to the
backbone is an internal router on the backbone, and the backbone’s topology is hidden from
the other areas in the AS.
The routers that make up the backbone must be physically contiguous. If they are not, you
must configure virtual links to create the appearance of backbone connectivity. You can
create virtual links between any two area border routers that have an interface to a common
nonbackbone area. OSPF treats two routers joined by a virtual link as though they were
connected to an unnumbered point-to-point network.
AS boundary routers
Routers that exchange routing information with routers in other autonomous systems are
called AS boundary routers. They advertise externally learned routes throughout the AS. Any
router in the AS, which can be an internal router, an area border router, or a backbone router,
can be an AS boundary router.
Every router within the AS knows the path to the AS boundary routers.
When an area border router is configured for a stub area, the router automatically advertises
a default route in place of the external routes that are not advertised within the stub area. This
way routers in the stub area can reach destinations outside the area.
Not-so-stubby areas
An OSPF stub area has no external routes in it. Therefore, you cannot redistribute it from
another protocol into a stub area. In a not-so-stubby area (NSSA), external routes can be
flooded within the area. These routes are then leaked into other areas. However, external
routes from other areas still do not enter the NSSA.
Transit areas
Transit areas are used to pass traffic from one adjacent area to the backbone (or to another
area if the backbone is more than two hops away from an area). The traffic does not originate
in, nor is it destined for, the transit area.
Type 1 external metrics are equivalent to the link-state metric, which is the cost of the route
used in the internal AS. Type 2 external metrics are greater than the cost of any path internal
to the AS.
The OSPF Hello protocol elects a designated router for the network based on the priorities
advertised by all the routing devices. In general, when an interface first becomes functional, it
checks whether the network currently has a designated router. If the network has a
designated router, the routing device accepts that designated router regardless of its own
router priority. Otherwise, if the routing device has the highest priority in the network, it
becomes the designated router. If router priorities tie, the routing device with the highest
router ID (typically the IP address of the routing device ) is selected as the designated router.
OSPF standards
OSPF and OSPFv3 are defined in the following documents:
RFC 1793, Extending OSPF to Support Demand Circuits
RFC 2328, OSPF Version 2
RFC 2370, The OSPF Opaque LSA Option
OSPF configuration
This section provides information about the configuration of the OSPF routing protocol on
IBM j-type Ethernet switches and routers.
To inject a default route with a specified metric value into the area, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id stub default-metric metric
The default route matches any destination that is not explicitly reachable from within the area.
To have the stub areas not advertise summary routes into the stub area, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id stub no-summaries
In this case, only the default route is advertised, and only if you include the default-metric
option. The default route injected into the NSSA is a Type 3 LSA.
Stub statement: You must include the stub statement when configuring all routing devices
that are in the stub area.
By default, a default route is not advertised. To advertise a default route with the specified
metric within the area, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id nssa default-lsa default-metric
metric
You can configure the default-metric option only on ABRs. The default route is a Type 3 LSA
injected into the NSSA. To send the default route as a Type 7 LSA, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id nssa default-lsa type-7
To prevent an ABR from advertising summary routes into an NSSA, include the no-summaries
statement:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id nssa no-summaries
To flood summary LSAs into the NSSA, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id nssa summaries
When summaries are configured (which is the default if the no-summaries statement is not
specified), a Type 7 LSA is sent. To define the type of metric, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id nssa default-lsa metric-type (1|2)
To aggregate external routes learned within the area when a route is advertised to other
areas, include one or more area-range statements as in the following example:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id nssa area-range area_range
To configure a broadcast interface to be part of an OSPF area, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id interface interface
IPsec authentication: You can configure IPsec authentication with MD5 or simple
authentication, but simple and MD5 authentication are mutually exclusive.
This section covers only the most common type of OSPF authentication, which is simple and
MD5 authentication. For IPsec authentication, see the appropriate documents listed in 10.7,
“More information” on page 330.
The cost of a route is described by a single dimensionless metric that is determined using the
following formula:
cost = reference-bandwidth / bandwidth
You can modify the reference-bandwidth value. The bandwidth value refers to the actual
bandwidth of the physical interface.
You can override the default behavior of using the reference bandwidth to calculate the metric
cost of a route by configuring a specific metric value for any OSPF interface.
The default value of the reference bandwidth is 100 Mbps (which you specify as
100,000,000). This bandwidth gives a metric of 1 for any interface with a physical bandwidth
that is 100 Mbps or greater. For reference-bandwidth, you can configure a value of
9600–1,000,000,000,000 bits.
When you specify a metric for a specific OSPF interface, that value is used to determine the
cost of routes advertised from that interface. To specify a metric for routes advertised from an
interface, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id interface interface metric metric
To change the preference values for internal routes, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf preference preference
To modify how often the routing device sends Hello packets out of an interface, use the
following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id interface interface hello-interval
interval
By default, the routing device waits 5 seconds for an acknowledgment before retransmitting
the link-state advertisement. To modify this interval, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols ospf area area_id interface interface
retransmit-interval interval
This interval must be the same for all routing devices on a shared network.
OSPF verification
To verify the status of the OSPF, use the following commands:
{master}
ibm@J08E-re0> show ospf neighbor
{master}
ibm@J08E-re0> show ospf interface
{master}
ibm@J08E-re0> show ospf statistics
{master}
ibm@J08E-re0> show routes protocol ospf
{master}[edit]
ibm@J08E-re0# set protocols ospf area 0 interface ge-1/0/1.0 hello-interval 1
{master}[edit]
ibm@J08E-re0# edit protocols ospf area 1
{master}[edit]
ibm@J08E-re0# show protocols ospf
reference-bandwidth 100g;
area 0.0.0.0 {
interface ge-1/0/1.0 {
metric 10;
hello-interval 1;
}
}
area 0.0.0.1 {
stub default-metric 10 no-summaries;
interface ge-1/0/2.0 {
authentication {
simple-password "$9$GRiqf3nCtORTQEc"; ## SECRET-DATA
}
}
}
area 0.0.0.2 {
nssa {
default-lsa {
default-metric 20;
metric-type 2;
type-7;
}
}
interface ge-1/0/3.0 {
authentication {
md5 1 key "$9$ss4JD.mTz6AiHT3/9B1LxNd2aJGiP5QUD"; ## SECRET-DATA
}
}
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show ospf neighbor
Address Interface State ID Pri Dead
172.16.1.3 ge-1/0/1.0 Full 172.16.0.1 128 3
172.16.2.3 ge-1/0/2.0 Full 172.16.0.2 128 33
{master}[edit]
ibm@J08E-re0# run show ospf neighbor extensive
Address Interface State ID Pri Dead
172.16.1.3 ge-1/0/1.0 Full 172.16.0.1 128 3
Area 0.0.0.0, opt 0x42, DR 172.16.1.3, BDR 172.16.1.1
Up 00:12:00, adjacent 00:12:00
Topology default (ID 0) -> Bidirectional
172.16.2.3 ge-1/0/2.0 Full 172.16.0.2 128 38
Area 0.0.0.1, opt 0x40, DR 172.16.2.3, BDR 172.16.2.1
Up 00:11:59, adjacent 00:11:59
Topology default (ID 0) -> Bidirectional
172.16.3.3 ge-1/0/3.0 Full 10.1.1.10 128 32
Area 0.0.0.2, opt 0x40, DR 172.16.3.1, BDR 172.16.3.3
Up 00:28:43, adjacent 00:28:43
Topology default (ID 0) -> Bidirectional
{master}[edit]
ibm@J08E-re0# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ge-1/0/1.0 BDR 0.0.0.0 172.16.0.1 10.1.1.1 1
ge-1/0/2.0 BDR 0.0.0.1 172.16.0.2 10.1.1.1 1
ge-1/0/3.0 DR 0.0.0.2 10.1.1.1 10.1.1.10 1
{master}[edit]
ibm@J08E-re0# run show ospf interface extensive
Interface State Area DR ID BDR ID Nbrs
ge-1/0/1.0 BDR 0.0.0.0 172.16.0.1 10.1.1.1 1
Type: LAN, Address: 172.16.1.1, Mask: 255.255.255.0, MTU: 1500, Cost: 10
DR addr: 172.16.1.3, BDR addr: 172.16.1.1, Priority: 128
Adj count: 1
Hello: 1, Dead: 4, ReXmit: 5, Not Stub
Auth type: None <---------------------------------------------------no auth
Protection type: None
Topology default (ID 0) -> Cost: 0
ge-1/0/2.0 BDR 0.0.0.1 172.16.0.2 10.1.1.1 1
Type: LAN, Address: 172.16.2.1, Mask: 255.255.255.0, MTU: 1500, Cost: 100
DR addr: 172.16.2.3, BDR addr: 172.16.2.1, Priority: 128
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Stub <---------------------- area type stub
Auth type: Password <-------------------------------------------simple auth
Protection type: None
Topology default (ID 0) -> Cost: 0
ge-1/0/3.0 DR 0.0.0.2 10.1.1.1 10.1.1.10 1
Type: LAN, Address: 172.16.3.1, Mask: 255.255.255.0, MTU: 1500, Cost: 100
DR addr: 172.16.3.1, BDR addr: 172.16.3.3, Priority: 128
Adj count: 1
Hello: 10, Dead: 40, ReXmit: 5, Stub NSSA <--------------------- area type NSSA
Auth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTC<-md5 auth
Protection type: None
Topology default (ID 0) -> Cost: 0
{master}[edit]
ibm@J08E-re0# run show ospf database
{master}[edit]
ibm@J08E-re0# run show route protocol ospf
{master}[edit]
ibm@J08E-re0# run show route 192.168.20.0/24 extensive
{master}[edit]
ibm@J08E-re0# run show route 172.16.0.1/32 extensive
{master}[edit]
ibm@J08E-re0#
Multiprotocol BGP (MBGP) extensions enable BGP to support IP version 6 (IPv6). MBGP
defines the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which are used to carry
IPv6 reachability information. Network layer reachability information (NLRI) update messages
carry IPv6 address prefixes of feasible routes.
BGP allows for policy-based routing. You can use routing policies to choose among multiple
paths to a destination and to control the redistribution of routing information.
BGP uses TCP as its transport protocol, using port 179 for establishing connections. Running
over a reliable transport protocol eliminates the need for BGP to implement update
fragmentation, retransmission, acknowledgment, and sequencing.
The Junos routing protocol software supports BGP version 4. This version of BGP adds
support for Classless Interdomain Routing (CIDR), which eliminates the concept of network
classes. You do not need to assume which bits of an address represent the network by
looking at the first octet. Instead, with CIDR, you can explicitly specify the number of bits in
the network address, providing a means to decrease the size of the routing tables. BGP
version 4 also supports the aggregation of routes, including the aggregation of AS paths.
Autonomous systems
An AS is a set of routers that are under a single technical administration. They normally use a
single IGP and a common set of metrics to propagate routing information within the set of
routers. To other autonomous systems, an AS has a single, coherent interior routing plan and
presents a consistent picture of which destinations are reachable through it.
A BGP system shares network reachability information with adjacent BGP systems, which are
referred to as neighbors or peers.
BGP systems are arranged into groups. In an IBGP group, all peers in the group, called
internal peers, are in the same AS. Internal peers can be anywhere in the local AS and do not
have to be directly connected to each other. Internal groups use routes from an IGP to resolve
forwarding addresses. They also propagate external routes among all other internal routers
running IBGP. They compute the next hop by taking the BGP next hop received with the route
and resolve it by using information from one of the IGPs.
In an EBGP group, the peers in the group, called external peers, are in different autonomous
systems and normally share a subnet. In an external group, the next hop is computed with
respect to the interface that is shared between the external peer and the local router.
BGP peers advertise routes to each other in update messages. BGP stores its routes in the
Junos software routing table. The routing table stores the following information about BGP
routes:
Routing information learned from update messages received from peers
Local routing information that the BGP system selects by applying local policies to routes
received in update messages
For each prefix in the routing table, the routing protocol process selects a single best path,
called the active path.
BGP standards
The Junos software supports BGP version 4 and several extensions to the protocol, which are
defined in the following documents:
RFC 1772, Application of the Border Gateway Protocol in the Internet
RFC 1965, Autonomous System Confederations for BGP
RFC 1966, BGP Route Reflection: An Alternative to Full-Mesh IBGP
RFC 1997, BGP Communities Attribute
RFC 2270, Using a Dedicated AS for Sites Homed to a Single Provider
RFC 2283, Multiprotocol Extensions for BGP-4
RFC 2385, Protection of BGP Sessions via the TCP MD5 Signature Option
RFC 2439, BGP Route Flap Damping
RFC 2545, Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing
RFC 2796, BGP Route Reflection
RFC 2858, Multiprotocol Extensions for BGP-4
RFC 2918, Route Refresh Capability for BGP-4
RFC 3065, Autonomous System Confederations for BGP
RFC 3107, Carrying Label Information in BGP-4
RFC 3392, Capabilities Advertisement with BGP-4
RFC 4271, A Border Gateway Protocol 4 (BGP-4)
RFC 4724, Graceful Restart Mechanism for BGP
RFC 4781, Graceful Restart Mechanism for BGP with MPLS
RFC 4893, BGP Support for Four-octet AS Number Space
Internet draft draft-ietf-ppvpn-rfc2547bis-00.txt, BGP/MPLS VPNs (expires January
2002)
Internet draft draft-kato-bgp-ipv6-link-local-00.txt, BGP4+ Peering Using IPv6
Link-local Address (expires April 2002)
Internet draft draft-ietf-ngtrans-bgp-tunnel-04.txt, Connecting IPv6 Islands across
IPv4 Clouds with BGP (only MP-BGP over IPv4 Approach) (expires July 2002)
Internet draft draft-ietf-idr-flow-spec-00.txt, Dissemination of Flow Specification
Rules
BGP options: Most BGP options can be specified at different configuration hierarchy
levels. The most specific hierarchy has precedence over the least specific ones.
You arrange BGP routing devices into groups of peers. Peer groups must have different group
types, AS numbers, or route reflector cluster identifiers. Each group must contain at least one
peer.
To define a BGP group that recognizes only the specified BGP systems as peers, statically
configure all the system’s peers by including one or more neighbor statements. The peers on
at least one side of each BGP connection must be configured statically. The peer neighbor’s
address can be either an IPv6 or IPv4 address.
To add neighbors to the newly created BGP groups, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor
To specify the peer-as number of a BGP neighbor, you can use the peer-as command at a
group level or at a neighbor level. To configure at the group level, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group peer-as peer-as
BGP options: Most BGP options can be specified at different configuration hierarchy
levels. The most specific hierarchy has precedence over the least specific ones. As a good
practice, group similar BGP neighbors in a BGP group and specify the options at a group
level.
In this case, the peer-as specified at neighbor level takes precedence over the peer-as
specified at group level.
Configuring the delay before BGP peers mark the routing device as down
The hold time is the maximum number of seconds that are allowed to elapse between
successive keepalive or update messages that BGP receives from a peer. When establishing
a BGP connection with the local routing device, a peer sends an open message, which
contains a hold-time value. BGP on the local routing device uses the smaller value (either the
local hold-time value or the peer’s hold-time value) received in the open message as the hold
time for the BGP connection between the two peers.
You can configure hold time at the BGP level, group level, and neighbor level by using the
following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp hold-time time
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group hold-time time
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor hold-time time
The default hold-time value is 90 seconds. The range is 20–65,535 seconds. The hold time
is three times the interval at which keepalive messages are sent.
As a good practice, group similar BGP neighbors in a BGP group and specify the options at a
group level.
As a good practice, group similar BGP neighbors in a BGP group and specify the options at a
group level.
You can configure MD5 authentication. The MD5 algorithm creates an encoded checksum
that is included in the transmitted packet. The receiving routing device uses an authentication
key (password) to verify the MD5 checksum of the packet.
To configure an MD5 authentication key, include the authentication-key statement. You can
configure MD5 authentication at the BGP level, group level, and neighbor level by using the
following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp authentication-key key
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group authentication-key key
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor
authentication-key key
The key (password) can be up to 126 characters long. Characters can include any ASCII
strings. If you include spaces, enclose all characters in quotation marks (“ ”).
As a good practice, group similar BGP neighbors in a BGP group, and specify the options at a
group level.
You can configure local address at the BGP level, group level, and neighbor level by using the
following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp local-address address
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group local-address address
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor local-address
address
BGP session: A BGP session can still be established when only one of the paired routers
has a local address configured.
As a good practice, group similar BGP neighbors in a BGP group, and specify the options at a
group level.
If an MED is received over an external BGP link, it is propagated over internal links to other
BGP systems within the AS.
BGP update messages include an MED metric if the route was learned from BGP and
already had a MED metric associated with it. Alternatively, you can directly configure the MED
metric.
An MED metric is advertised with a route according to the following general rules:
A more specific metric overrides a less specific metric. That is, a group-specific metric
overrides a global BGP metric, and a peer-specific metric overrides a global BGP or
group-specific metric.
A metric defined with routing policy overrides a metric defined with the metric-out
statement.
If any metric is defined, it overrides a metric received in a route.
If the received route does not have an associated MED metric, and if you do not explicitly
configure a metric value, no metric is advertised. When you do not explicitly configure a
metric value, the MED is equivalent to 0 when advertising an active route.
You can also use other ways to modify the MED metric of advertised BGP routes. For detailed
information, see appropriate document in 10.7, “More information” on page 330.
To configure a multihop session, include the multihop statement. You can configure multihop
at the BGP level, group level, and neighbor level by using the following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp multihop [TTL]
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group multihop [TTL]
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor multihop [TTL]
To configure the maximum time-to-live (TTL) value for the TTL in the IP header of BGP
packets, specify the TTL value. If you do not specify a TTL value, the default maximum TTL
value of the system is used.
The LOCAL_PREF path attribute is always advertised to internal BGP peers and to
neighboring confederations. It is never advertised to external BGP peers. The default
behavior is to not modify the LOCAL_PREF path attribute if it is present.
To configure a local preference metric, include the local-preference statement. You can
configure local-preference at the BGP level, group level, and neighbor level by using the
following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp local-preference preference_value
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group local-preference preference_value
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor local-preference
preference_value
As a good practice, group similar BGP neighbors in a BGP group, and specify the options at a
group level.
To modify the default BGP preference value, include the preference statement. You can
configure the BGP routes preference at the BGP level, group level, and neighbor level by
using the following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp preference preference_value
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group preference preference_value
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor preference
preference_value
As a good practice, group similar BGP neighbors in a BGP group, and specify the options at a
group level.
In route reflection, BGP systems are arranged in clusters. Each cluster consists of at least
one system that acts as a route reflector, along with any number of client peers.
BGP peers outside the cluster are called nonclient peers. The route reflector reflects
(re-distributes) routing information to each client peer (intracluster reflection) and to all
nonclient peers (intercluster reflection). Because the route reflector redistributes routes within
the cluster, the BGP systems within the cluster do not have to be fully meshed.
When the route reflector receives a route, it selects the best path. Then, if the route came
from a nonclient peer, the route reflector sends the route to all client peers within the cluster. If
the route came from a client peer, the route reflector sends it to all nonclient peers and to all
client peers except the originator. In this process, none of the client peers send routes to other
client peers.
To configure route reflection, you specify a cluster identifier only on the BGP systems that are
to be the route reflectors. These systems then determine, from the network reachability
information that they receive, which BGP systems are part of its cluster and are client peers,
and which BGP systems are outside the cluster and are nonclient peers.
To configure the route reflector, include the cluster identifier statement in the configuration.
You can configure the BGP routes preference at the BGP level, group level, and neighbor
level by using the following commands:
For the BGP level, affecting all BGP sessions, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols bgp cluster cluster_identifier
For the BGP group level, affecting all BGP sessions from this BGP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group cluster cluster_identifier
For the BGP neighbor level, affecting only this specific BGP neighbor, use the following
command:
{master}[edit]
ibm@J08E-re0# set protocols bgp group group neighbor neighbor cluster
cluster_identifier
As a good practice, group similar BGP neighbors in a BGP group, and specify the options at a
group level.
BGP route reflector: You must only configure the BGP route reflector (BGP-RR) with this
command. The BGP-RR clients have a normal configuration.
Explicitly assigning a BGP identifier is optional. If you do not assign one, the IP address of the
first interface encountered in the routing device is used.
{master}[edit]
ibm@J08E-re0> show bgp neighbor
{master}[edit]
ibm@J08E-re0> show route protocol bgp [terse | extensive]
Many other options are available for configuring and monitoring BGP on IBM j-type series
switches and routers. For more details, see the appropriate documents in 10.7, “More
information” on page 330.
Example 10-3 on page 313 shows the configuration of three BGP groups with the following
characteristics:
BGP group ibgp
– Internal BGP peering
– AS of 65000
– Loopback address for peering (10.0.0.1 is our loopback)
– IBGP neighbors 10.0.0.2 and 10.0.0.3
– A route reflector with a cluster-id of 1
BGP group ebgp1
– External BGP peering
– EBGP neighbor of 172.16.1.3
– External AS of 65001
BGP group ebgp4
– External BGP peering
– EBGP neighbor of 172.16.4.3
– External AS of 65004
To always keep the static route in the forwarding table, use the following command:
{master}[edit]
ibm@J08E-re0# set routing-options static route route/mask retain
To drop the packets to a specific static route and send Internet Control Message Protocol
(ICMP) unreachable messages back to the source, use the following command:
{master}[edit]
ibm@J08E-re0# set routing-options static route route/mask discard
To change the route preference for a static route, use the following command:
{master}[edit]
ibm@J08E-re0# set routing-options static route route/mask preference preference
To verify the status of the static routes, use the following command:
{master}
ibm@J08E-re0> show route protocol static [ terse | extensive ]
Example 10-4 shows how to create several static routes and then verify them. First a default
gateway is created by using 192.168.1.1 and then a route to 10.0.0.0/8 by using 192.168.1.2.
Next a route to 172.16.0.0/12 is created with a preference of 100 that instructs the router to
drop the packets and send ICMP unreachable messages back to the source.
{master}[edit]
ibm@J08E-re0# set routing-options static route 10.0.0.0/8 next-hop 192.168.1.2
{master}[edit]
ibm@J08E-re0# set routing-options static route 172.16.0.0/12 discard
{master}[edit]
ibm@J08E-re0# set routing-options static route 172.16.0.0/12 preference 100
{master}[edit]
ibm@J08E-re0# show routing-options
static {
route 0.0.0.0/0 next-hop 192.168.1.1;
route 10.0.0.0/8 next-hop 192.168.1.2;
route 172.16.0.0/12 {
discard;
preference 100;
}
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
{master}[edit]
ibm@J08E-re0# run show route protocol static terse
{master}[edit]
ibm@J08E-re0# run show route protocol static
{master}[edit]
ibm@J08E-re0# run show route protocol static extensive
{master}[edit]
ibm@J08E-re0#
10.5 Multicast
IPv4 has the following fundamental types of addresses:
Unicast address Used to send a packet to a single destination.
Broadcast address Used to send a datagram to an entire subnetwork.
Multicast address Used to send a datagram to a set of hosts that can be on different
subnetworks and that are configured as members of a multicast group.
A multicast datagram is delivered to destination group members with the same best-effort
reliability as a standard unicast IP datagram. Multicast datagrams are not guaranteed to
reach all members of a group or to arrive in the same order in which they were transmitted.
The only difference between a multicast IP packet and a unicast IP packet is the presence of
a group address in the IP header destination address field. Multicast addresses use the
Class D address format.
Individual hosts can join or leave a multicast group at any time. The physical location and the
number of members in a multicast group have no restrictions.
A host can be a member of more than one multicast group at any time and does not have to
belong to a group to send packets to members of a group.
Routers use a group membership protocol to learn about the presence of group members on
directly attached subnetworks. When a host joins a multicast group, it transmits a group
membership protocol message for the group or groups that it wants to receive. It also sets its
IP process and network interface card to receive frames addressed to the multicast group.
Because the MBone and the Internet have different topologies, multicast routers execute a
separate routing protocol to decide how to forward multicast packets.
For more information about multicast, see JUNOS Software Multicast Protocols Configuration
Guide.
Multicast addresses
Multicast host group addresses are defined to be the IP addresses whose high-order four bits
are 1110. This order has an address range of 224.0.0.0–239.255.255.255 or 224.0.0.0/4.
(These addresses also are referred to as Class D addresses.)
The Internet Assigned Numbers Authority (IANA) maintains a list of registered IP multicast
groups. The base address 224.0.0.0 is reserved and cannot be assigned to any group. The
block of multicast addresses 224.0.0.1–224.0.0.255 is reserved for local wire use. Groups in
this range are assigned for various uses, including routing protocols and local discovery
mechanisms.
Routers can handle both Layer 2 and Layer 3 addressing information because the frame and
its addresses must be processed to access the encapsulated packet inside. Routers can
easily run Layer 3 multicast protocols, such as Protocol Independent Multicast (PIM) or
Internet Group Management Protocol (IGMP), and determine where to forward multicast
content or when a host on an interface joins or leaves a group. However, bridges and LAN
switches, as Layer 2 devices, are not supposed to have access to the multicast information
inside the packets their frames carry.
How then do bridges and other Layer 2 devices determine when a device on an interface joins
or leaves a multicast tree? How do they determine whether a host on an attached LAN is
interested in receiving the content of a particular multicast group?
The answer is for the Layer 2 device to implement a series of procedures known as multicast
snooping. Multicast snooping is a general term and applies to the process of a Layer 2 device
“snooping” at the Layer 3 packet content to determine which actions are taken to process or
forward a frame. More specific forms of snooping are possible, such as IGMP snooping or
PIM snooping. In all cases, snooping involves a device configured to function at Layer 2
having access to normally “forbidden” Layer 3 (packet) information. However, snooping
makes multicasting more efficient in these devices.
IGMP snooping regulates multicast traffic in a switched network. With IGMP snooping
enabled, a LAN switch monitors the IGMP transmissions between a host (a network device)
and a multicast router, tracking the multicast groups and associated member ports. The
switch uses that information to make intelligent multicast-forwarding decisions and forward
traffic to the intended destination interfaces.
You can configure IGMP snooping on one or more VLANs to allow the switch to examine
IGMP packets and make forwarding decisions based on packet content. By default, IGMP
snooping is enabled on IBM j-type Ethernet switches.
To enable IGMP snooping for all VLANs in your network, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols igmp-snooping vlan all
To enable IGMP snooping for a specific VLAN in your network, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols igmp-snooping vlan specific_vlan_name
You can configure the switch to immediately remove a group membership from an interface
when it receives a leave message from that interface without waiting for any other IGMP
messages to be exchanged (IGMPv2 only). Use the following command:
{master}[edit]
ibm@J08E-re0# set protocols igmp-snooping vlan vlan immediate-leave
To statically configure IGMP group membership on a port, use the following command:
{master}[edit]
ibm@J08E-re0# set protocols igmp-snooping vlan vlan interface interface static
group multicast_group
{master}[edit]
ibm@J08E-re0> show igmp-snooping route
{master}[edit]
ibm@J08E-re0> show igmp-snooping statistics
{master}[edit]
ibm@J08E-re0> show igmp-snooping vlans
{master}[edit]
ibm@J08E-re0# set protocols igmp-snooping vlan Users immediate-leave
{master}[edit]
ibm@J08E-re0# set protocols igmp-snooping vlan Servers interface xe-3/0/0.0 static
group 230.5.5.5
{master}[edit]
ibm@J08E-re0# show protocols igmp-snooping
vlan all;
vlan Users {
immediate-leave;
}
vlan Servers {
interface xe-3/0/0.0 {
static {
group 230.5.5.5;
}
}
}
{master}[edit]
ibm@J08E-re0# commit
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
{master}[edit]
ibm@J08E-re0# run show igmp-snooping membership
VLAN: Servers
230.5.5.5 *
Interfaces: xe-3/0/0.0
{master}[edit]
ibm@J08E-re0# run show igmp-snooping route
VLAN Group Next-hop
default 224.0.0.0, *
Servers 224.0.0.0, *
Servers 230.5.5.5, * 1333
Users 224.0.0.0, *
Voice 224.0.0.0, *
RV 224.0.0.0, *
{master}[edit]
ibm@J08E-re0# run show igmp-snooping statistics
Bad length: 0 Bad checksum: 0 Invalid interface: 0
Not local: 0 Receive unknown: 0 Timed out: 0
{master}[edit]
ibm@J08E-re0# run show igmp-snooping vlans
VLAN Interfaces Groups MRouters Receivers RxVlans
RV 2 0 0 0 0
Servers 4 1 0 0 0
Users 4 0 0 0 0
Voice 1 0 0 0 0
default 1 0 0 0 0
{master}[edit]
ibm@J08E-re0#
VRRP for IPv6 provides a much faster switchover to an alternate default routing platform than
IPv6 Neighbor Discovery (ND) procedures. VRRP for IPv6 does not support the
authentication-type key.
VRRP dynamically elects master and backup routing platforms. You can also force
assignment of master and backup routing platforms using priorities 1–255, with 255 being the
highest priority. In VRRP operation, the default master routing platform sends advertisements
to back up routing platforms at regular intervals. The default interval is 1 second. If the backup
routing platforms do not receive an advertisement for a set period, the backup routing
platform with the highest priority takes over as the master and begins forwarding packets.
Priority 255: Priority 255 cannot be set for Routed VLAN Interfaces (RVIs).
Configuring VRRP
To create a VRRP group and assign a virtual IP to it, use the following command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group virtual-address virtual_ip_address
The virtual link local address must be on the same subnet as the physical interface address.
You can configure the priority order in which this equipment, functioning as a backup router,
becomes the master router if the master router becomes nonoperational. In this case, you
configure VRRP priority by using the following command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group priority priority
To specify the interval in seconds in which the master router sends advertisement packets to
the members of the VRRP group, use the following command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group advertise-interval interval
The interval is 1–255 seconds. To specify the interval in milliseconds in which the master
router sends advertisement packets to the members of the VRRP group, use the following
command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group fast-interval interval
To prohibit a higher-priority backup router from preempting a lower priority master router, use
the following command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group no-preempt
To authenticate VRRP advertisements with simple or MD5 authentication, use the following
command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group authentication-type [simple|md5] authentication-key key
By default the virtual VRRP address is used only for transit data. To accept data directed to
the virtual VRRP address, use the following command:
{master}[edit]
ibm@J08E-re0# set interfaces interface family inet address ip_address vrrp-group
vrrp_group accept-data
Example 10-6 shows the configuration of three VRRP groups with the following
characteristics:
VRRP group 1
– Virtual IP of 192.168.1.101
– Accept-data
– Priority 50
VRRP group 2
– Virtual IP of 192.168.1.102
– No master preemption
– Authentication simple text with key “auth-key-2”
– Advertise-interval of 2 seconds
VRRP group 3
– Virtual IP of 192.168.1.103
– Master preemption
– Authentication simple MD5 with key “auth-key-3”
– Fast-interval of 200 msec.
For additional information and step-by-step installation procedures, see the following
documentation for your switch:
IBM Ethernet Switch J48E Complete Hardware Guide, GA32-0663
IBM Ethernet Switch J48E Quick Start, GA32-0664
IBM Ethernet Switch J08E Complete Hardware Guide, GA32-0665
IBM Ethernet Switch J08E Quick Start, GA32-0666
IBM Ethernet Switch J16E Complete Hardware Guide, GA32-0667
IBM Ethernet Switch J16E Quick Start, GA32-0668
For more information about the IBM j-type Ethernet routers the related hardware, see the
following documentation:
IBM j-type m-series Ethernet Router Dense Port Concentrators (DPC) Guide, GA32-0661
IBM j-type m-series Ethernet Routing Engine Installation Instructions, GA32-0682
IBM j-type m-series Ethernet Services PIC Guide, GA32-0662
IBM Ethernet Router J02M Hardware Guide, GA32-0655
IBM Ethernet Router J02M Quick Start, GA32-0656
IBM Ethernet Router J06M Hardware Guide, GA32-0657
IBM Ethernet Router J06M Quick Start, GA32-0658
IBM Ethernet Router J11M Hardware Guide, GA32-0659
IBM Ethernet Router J11M Quick Start, GA32-0660
JUNOS Software IBM j-type m-series Ethernet Routers Solutions Guide, GA32-0683
For more information about the Junos software, see the following documentation:
Juniper Web Device Manager for IBM j-type Ethernet Switches and Routers Interface
User Guide, GA32-0688
JUNOS Software Access Privilege Configuration Guide, GA32-0696
JUNOS Software Broadband Subscriber Management Solutions Guide, GA32-0709
JUNOS Software Class of Service Configuration Guide, GA32-0738
JUNOS Software CLI User Guide, GA32-0697
JUNOS Software Configuration and Diagnostic Automation Guide, GA32-0679
JUNOS Software Ethernet Routing Engine Media Upgrade Kit, GA32-0681
JUNOS Software Feature Guide, GA32-0739
Class of service: The Junos implementation of quality of service is called class of service
(COS).
The problem with such a broad definition is that it is open. What constitutes service quality?
What are the parameters that affect service in a packet-based network? How do you define
particular traffic, or, specifically, how do you determine which traffic is given what service?
The first question can be answered by understanding that the following metrics are
considered to be standard measurements of service quality:
End-to-end packet delay
Delay jitter
Available capacity
Drop probability
For interfaces that carry IPv4, IPv6, and Multiprotocol Label Switching (MPLS) traffic, you can
configure Junos class-of-service features to provide multiple classes of service for different
applications. On the router, you can configure multiple forwarding classes for transmitting
packets and define which packets are placed into each output queue. You can also schedule
the transmission service level for each queue and manage congestion by using a Random
Early Detection (RED) algorithm.
The Junos class-of-service features provide a set of mechanisms that you can use to provide
differentiated services when best-effort traffic delivery is insufficient. In designing
class-of-service applications, give careful consideration to your service needs. Thoroughly
plan and design your class-of-service configuration to ensure consistency across all routers
in a class-of-service domain. You must also consider all the routers and other networking
equipment in the class-of-service domain to ensure interoperability among all equipment.
Because IBM routers implement COS in hardware rather than in software, you can
experiment with and deploy class-of-service features without adversely affecting packet
forwarding and routing performance
This chapter explains the steps to configure the following class-of-service features on the IBM
j-type series and provides examples of each. You must be familiar with the following basic of
QoS topics:
Packet classification
Forwarding classes
Policing
Rewrite rules
Packet loss priority
Schedulers
Drop profiles
To support COS, you must configure each router in the network. Generally, each router
examines the packets that enter it to determine their class-of-service settings. These settings
then dictate which packets are first transmitted to the next downstream router. In addition, the
routers at the edges of the network might be required to alter the class-of-service settings of
the packets that enter the network from customer or peer networks.
The following scaling and performance parameters apply to IBM j-type m-series Ethernet
routers:
Eight classifiers
Eight rewrite tables
Eight queues per port
32 weighted RED (WRED) profiles
100 ms queue buffering
Line-rate class-of-service features
The IBM j-type m-series Ethernet router can classify incoming packets at the ingress dense
port concentrator. Fixed classification places all packets in the same forwarding class, or the
usual multifield (MF) or behavior aggregate (BA) classifications can be used to treat packets
differently. A BA classification with firewall filters can be used for classification based on IP
precedence, Differentiated Services Code Point (DSCP), IEEE, or other bits in the frame or
packet header.
However, the IBM j-type m-series Ethernet router can also employ multiple BA classifiers on
the same logical interface. The logical interfaces do not have to employ the same type of BA
classifier. For example, a single logical interface can use classifiers based on IP precedence
and IEEE 802.1p. If the class-of-service bits of interest are on the inner VLAN tag of a
dual-tagged VLAN interface, the classifier can examine either the inner or outer bits. (By
default, the classification is done based on the outer VLAN tag.)
Egress port scheduling supports up to eight queues per port using a form of round-robin
queue servicing. The supported priority levels are strict-high, high, medium-high,
medium-low, and low. The IBM j-type m-series Ethernet router architecture supports both
early discard and tail drop on the queues.
For more information about this topic, see Class of Service Configuration Guide, GA32-0738.
As packets are classified in Junos software, they are assigned to a forwarding class that
specifies both the transmit queue and the packet loss priority. The per-hop behavior of a
packet is determined by its specific queue and loss priority. Later, this book explains how
traffic classes are specified and associated with queues. It also explains how different loss
priorities affect the drop probability of a packet.
For a specified interface, you can configure both an MF classifier and a BA classifier without
conflicts. In such cases, BA classification is performed first, followed by MF classification. If
the two classification results conflict, the MF classification result overrides the BA
classification result.
The types of BA classifiers are based on which part of the incoming packet the classifier
examines:
DSCP for IP DiffServ
DSCP for IPv6 DiffServ
IP precedence bits
MPLS EXP bits
IEEE 802.1p class-of-service bits
IEEE 802.1ad drop eligible indicator (DEI) bit
Other default classifiers (such as classifiers for IEEE 802.1p bits and DSCP) require you to
explicitly associate a default classification table with a logical interface. Table 11-1 shows the
list of default classifiers.
DSCP dscp-default
The default classifiers are listed by typing the command shown in Example 11-1.
{master}
ibm@J11M-re0>
Classifier configuration
You can override the default IP precedence classifier by defining a classifier and applying it to
a logical interface. For each protocol family, classifiers are configured under
[class-of-service] as shown in Example 11-2 on page 340.
A classifier takes a specified bit pattern and attempts to match it to the packet arriving on the
interface. If the information in the packet’s header matches the specified pattern, the packet is
sent to the appropriate queue, defined by the forwarding class associated with the classifier.
Classifier example
Example 11-4 defines an IP Precedence Classifier named TEST-CLASSIFIER and
associates code points 001, 010, and 011 to forward class Assured Forwarding with low loss
priority. Then it verifies the configuration and applies the classifier to the ge-0/0/0 interface.
{master}[edit class-of-service]
ibm@J11M-re0# commit
commit complete
{master}[edit class-of-service]
ibm@J11M-re0# run show class-of-service classifier name TEST-CLASSIFIER
Classifier: TEST-CLASSIFIER, Code point type: inet-precedence, Index: 28143
Code point Forwarding class Loss priority
001 assured-forwarding low
010 assured-forwarding low
011 assured-forwarding low
{master}[edit class-of-service]
ibm@J11M-re0# commit
{master}[edit]
ibm@J11M-re0# run show class-of-service interface ge-0/0/0
Physical interface: ge-0/0/0, Index: 132
Queues supported: 8, Queues in use: 4
Scheduler map: <default>, Index: 2
When you configure classes and define classifiers, you can refer to the markers by alias
names. You can configure user-defined classifiers in terms of alias names. If the value of an
alias changes, it alters the behavior of any classifier that references it.
Default aliases
Example 11-5 shows the default mappings between DSCP bit values and standard aliases.
You can see the default mappings for other bit codes (IP Precedence, IEEE 802.1p, MPLS
EXP, and so on) issuing the same command.
Configuration
To configure class-of-service code point aliases, include the code-point aliases statement at
the [edit class-of-service] hierarchy level as shown in Example 11-6.
Example
Example 11-7 shows generating an alias named ea for DSCP code point 001010.
{master}[edit]
ibm@J11M-re0# commit
{master}[edit]
ibm@J11M-re0# run show class-of-service code-point-aliases dscp
Code point type: dscp
Alias Bit pattern
af11 001010
af12 001100
af13 001110
af21 010010
af22 010100
af23 010110
af31 011010
af32 011100
af33 011110
af41 100010
af42 100100
af43 100110
be 000000
cs1 001000
cs2 010000
cs3 011000
An MF classifier typically matches one or more of the six packet header fields:
Destination address
Source address
IP protocol
Source port
Destination port
DSCP
MF classifiers are used when a simple BA classifier is insufficient to classify a packet.
Configuration
The configuration of an MF classifier requires the definition of a firewall filter, which is under
the [firewall family inet] hierarchy as shown in Example 11-8. The 802.1p bits cannot be
used as matching conditions. By the time the packet is processed by the ingress/egress
filters, the Ethernet frame has been stripped.
Example
Example 11-10 classifies traffic with a source address 10.0.0.0/24 and assigns it to
forwarding class Assured Forwarding with medium-low loss priority. Then it applies the filter to
the ge-0/0/0 interface.
{master}[edit]
ibm@J11M-re0# set firewall family inet filter CoS-TEST term SOURCE then
forwarding-class assured-forwarding
{master}[edit]
ibm@J11M-re0# set firewall family inet filter CoS-TEST term SOURCE then
loss-priority medium-low
{master}[edit]
ibm@J11M-re0# set interfaces ge-0/0/0 unit 0 family inet filter input CoS-TEST
{master}[edit]
ibm@J11M-re0# show firewall family inet filter CoS-TEST
term SOURCE {
from {
source-address {
10.0.0.0/24;
}
}
then {
loss-priority medium-low;
forwarding-class assured-forwarding;
}
}
{master}[edit]
ibm@J11M-re0# show interfaces ge-0/0/0
unit 0 {
family inet {
Queue 0 Best effort The software does not apply any special class-of-service handling to
packets with 000000 in the DiffServ field, which is a feature
compatible with an earlier version. These packets are usually dropped
under congested network conditions.
Queue 1 Expedited The software delivers assured bandwidth, low loss, low delay, and low
forwarding delay variation (jitter) end-to-end for packets in this service class.
Queue 2 Assured The software offers a high level of assurance that the packets are
forwarding delivered while the packet flow from the customer stays within a
certain service profile that you define.
The software accepts excess traffic, but applies a RED drop profile to
determine if the excess packets are dropped and not forwarded.
Depending on router type, up to four drop probabilities (low,
medium-low, medium-high, and high) are defined for this service
class.
Queue 3 Network control The software delivers packets in this service class with a low priority.
(These packets are not delay sensitive.) Typically, these packets
represent routing protocol hello or keepalive messages.
Configuration
You assign each forwarding class to an internal queue number by including the
forwarding-classes statement at the [edit class-of-service] hierarchy level as shown in
Example 11-11.
11.7 Policing
Policing refers to the ability of a router to measure data rates and, based on this
measurement, to either drop or reclassify the traffic. After MF classification is performed, you
can instruct a router to measure the rate of the traffic matching the classifier. Then you can
either drop or change the forwarding class, or drop the priority of the packet if the measured
rate exceeds a configurable threshold.
In simple terms, policers allow the establishment of a data rate, which, if exceeded, results in
traffic being either reclassified or dropped. To measure traffic rates, you must determine a
measurement interval (or burst limits). Traffic always egresses an interface at line rate. To
send traffic at a “lower speed,” bursts must be followed by idle periods, resulting in an average
transmit rate lower than the line rate.
IBM j-type m-series and e-series support: IBM j-type m-series supports two-color marking
and two-rate two-color marking. IBM j-type e-series supports only two-color marking.
IBM j-type m-series Ethernet routers and e-series Ethernet switches: Policers can
also be applied to a logical interface on IBM j-type m-series Ethernet routers. In this case,
all ingress or egress traffic (depending on the policer direction) is policed. Discard is the
only supported policer action on IBM j-type e-series Ethernet switches.
For interface-based policers, the maximum bandwidth can either be specified as an absolute
value or as a percentage of the ingress or egress interface line rate. Filter-based policers can
only specify the bandwidth in bps, because the transmit data rate it is unknown until the
egress interface is determined.
Policers can be applied to a logical interface (only on IBM j-type m-series Ethernet routers) as
shown in Example 11-14.
Policers can also be applied to a logical interface on IBM j-type m-series Ethernet routers as
an action in a firewall filter as shown in Example 11-15.
By using the next term action on a filter doing policing, you can stack one or more policers.
You can do this whenever it is desired to limit aggregated traffic from multiple sources,
interfaces from exceeding a particular bandwidth, or both.
{master}[edit]
ibm@J11M-re0# set firewall policer TEST-POLICER then discard
{master}[edit]
ibm@J11M-re0# show firewall policer TEST-POLICER
if-exceeding {
bandwidth-limit 2m;
burst-size-limit 375k;
}
then discard;
{master}[edit]
ibm@J11M-re0# show interfaces ge-0/0/0
unit 0 {
family inet {
policer {
output TEST-POLICER;
}
}
}
{master}[edit]
ibm@J11M-re0# commit
{master}[edit]
ibm@J11M-re0# run show policer TEST-POLICER-ge-0/0/0.0-inet-o
Policers:
Name Packets
TEST-POLICER-ge-0/0/0.0-inet-o 0
You configure rewrite rules to alter class-of-service values in outgoing packets on the
outbound interfaces of an edge router to meet the policies of a targeted peer. This way the
In addition, you often must rewrite a given marker (IP precedence, DSCP, IEEE 802.1p, or
MPLS EXP settings) at the inbound interfaces of an edge router to accommodate BA
classification by core devices.
DSCP dscp-default
To see the contents of these tables, use the command shown in Example 11-17.
{master}[edit]
ibm@J11M-re0# commit
{master}[edit]
ibm@J11M-re0# show class-of-service interfaces ge-0/0/0
unit 0 {
{master}[edit]
ibm@J11M-re0# run show class-of-service interface ge-0/0/0
Physical interface: ge-0/0/0, Index: 132
Queues supported: 8, Queues in use: 4
Scheduler map: <default>, Index: 2
Internally, PLP bits cannot be viewed directly in the device. Externally, PLP bits are carried by
using specific bits in the IP precedence, MPLS EXP, or DSCP fields. Default DSCP and IP
precedence rewrite and classification tables do not support external communication of PLP
for the BE and EF classes.
You can use the loss priority setting to identify packets that have experienced congestion.
Typically you mark packets exceeding some service level with a high loss priority. You set loss
priority by configuring a classifier or a policer. The loss priority is used later in the workflow to
select one of the drop profiles used by RED, as shown in 11.11, “RED profiles” on page 356.
11.10 Schedulers
After traffic is classified, queuing and scheduling can be used to provide different levels of
service for the classified traffic. In Junos software, forwarding classes are associated with
queues.
You use schedulers to define the properties of output queues. These properties include the
amount of interface bandwidth assigned to the queue, the size of the memory buffer allocated
for storing packets, the priority of the queue, and the RED drop profiles associated with the
queue. You associate the schedulers with forwarding classes with scheduler maps. You can
then associate each scheduler map with an interface, configuring the hardware queues,
packet schedulers, and RED processes that operate according to this mapping.
The default drop profile causes the buffer to fill and then discard all packets until it has space.
2. Define a scheduler map that associates each scheduler with a forwarding class as shown
in Example 11-22.
3. Apply the scheduler map to the interface as shown in Example 11-23. Generally, you can
associate schedulers with physical interfaces only. (For some interfaces, you can also
associate schedulers with the logical interface.)
{master}[edit]
ibm@J11M-re0# set class-of-service schedulers TEST-SCHEDULER priority low
{master}[edit]
ibm@J11M-re0# show class-of-service schedulers
TEST-SCHEDULER {
transmit-rate percent 20 exact;
priority low;
}
{master}[edit]
ibm@J11M-re0# set class-of-service scheduler-maps TEST-SCHEDULER-MAP
forwarding-class best-effort scheduler TEST-SCHEDULER
{master}[edit]
ibm@J11M-re0# set class-of-service interfaces ge-0/0/0 scheduler-map
TEST-SCHEDULER-MAP
{master}[edit]
ibm@J11M-re0# show class-of-service interfaces
ge-0/0/0 {
scheduler-map TEST-SCHEDULER-MAP;
}
{master}[edit]
ibm@J11M-re0# commit
{master}[edit]
ibm@J11M-re0# run show class-of-service interface ge-0/0/0
Physical interface: ge-0/0/0, Index: 132
Queues supported: 8, Queues in use: 4
Scheduler map: TEST-SCHEDULER-MAP, Index: 17100
{master}[edit]
ibm@J11M-re0# run show class-of-service scheduler-map TEST-SCHEDULER-MAP
Scheduler map: TEST-SCHEDULER-MAP, Index: 17100
The RED algorithm solves this problem by randomly dropping packets as queues become full.
The drop probability can be configured as a function of queue size at any given time.
Therefore, the more congestion there is, the more aggressive the drop profile is. Randomly
dropping traffic before an interface becomes congested signals end hosts to slow down,
preventing an overloaded queue.
You configure RED by using a drop profile, which is a mechanism that defines parameters
that allow packets to be dropped from the network. Drop profiles define the meanings of the
loss priorities.
Configuring drop profiles entails setting two important values: the queue fullness and the drop
probability. The queue fullness represents a percentage of the memory that is used to store
packets in relation to the total amount that is allocated for that specific queue. Similarly, the
drop probability is a percentage value that correlates to the likelihood that an individual packet
is dropped from the network.
11.11.1 Configuration
You can configure loss profiles in the following ways:
Staircase type profile
You can specify a set of fill levels with the associated drop probabilities. The drop
probability is assumed to be constant between fill levels.
Interpolated profile
You can create piecewise linear functions to specify the drop probability.
After you configure the drop profiles, you must apply them to a scheduler, as shown in
Example 11-26. For more information about schedulers, see 11.10, “Schedulers” on
page 352.
11.11.2 Example
Example 11-27 shows how to generate the staircase profile specified in Figure 11-2 on
page 358.
{master}[edit]
ibm@J11M-re0# set class-of-service drop-profiles STAIR-TEST fill-level 80
drop-probability 20
{master}[edit]
ibm@J11M-re0# set class-of-service drop-profiles STAIR-TEST fill-level 90
drop-probability 25
{master}[edit]
ibm@J11M-re0# run show class-of-service drop-profile STAIR-TEST
Drop profile: STAIR-TEST, Type: discrete, Index: 52959
Fill level Drop probability
70 10
80 20
90 25
Example 11-28 shows how to generate the interpolated profile specified in Figure 11-3 on
page 360.
{master}[edit]
ibm@J11M-re0# show class-of-service drop-profiles
INTERPOLATE-TEST {
interpolate {
fill-level [ 60 70 80 90 ];
drop-probability [ 0 5 15 35 ];
}
}}
{master}[edit]
ibm@J11M-re0# commit
{master}[edit]
ibm@J11M-re0# run show class-of-service drop-profile
Drop profile: <default-drop-profile>, Type: discrete, Index: 1
Fill level Drop probability
100 100
Drop profile: INTERPOLATE-TEST, Type: interpolated, Index: 7093
Fill level Drop probability
0 0
The queue fullness defines the delay-buffer bandwidth, which provides packet buffer space to
absorb burst traffic up to the specified duration of delay. After the specified delay buffer
becomes full, packets with 100% drop probability are dropped from the tail of the buffer.
By default, if you do not configure any drop profile, when the fill level is 0%, the drop
probability is 0%. When the fill level is 100%, the drop probability is 100%.
11.12.1 Configuration
You configure tail-drop profiles under the [class-of-service] hierarchy as shown in
Example 11-29. Then you apply the profile to a scheduler as shown in Example 11-26 on
page 357 and explain in 11.10, “Schedulers” on page 352.
{master:0}[edit]
ibm@J48E-VC# show class-of-service drop-profiles TAIL
fill-level 25;
Purpose: The purpose of this section is to clarify the concepts introduced in this chapter.
Carefully plan any class-of-service implementation according with the requirements of
each design.
.1
10.100.100.0/24
ge-1/0/46
.2
{master}[edit]
ibm@J11M-re0# set firewall policer OTHER-POLICER if-exceeding bandwidth-limit 1m
ibm@J11M-re0# set firewall policer OTHER-POLICER if-exceeding burst-size-limit 15k
ibm@J11M-re0# set firewall policer OTHER-POLICER then loss-priority high
{master}[edit]
ibm@J11M-re0# show firewall policer OTHER-POLICER
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 15k;
}
then loss-priority high;
{master}[edit]
ibm@J11M-re0# commit
To verify the configuration, check the counters on the output interface of J11M as shown in
the following outputs:
1. Clear the counters on the interface:
{master}[edit]
ibm@J11M-re0# run clear interfaces statistics xe-1/1/0
2. Verify the queue counters:
ibm@J11M-re0# run show interfaces xe-1/1/0 detail | find "Queue counters"
Queue counters: Queued packets Transmitted packets Dropped packets
0 best-effort 0 0 0
1 expedited-fo 0 0 0
2 assured-forw 0 0 0
3 network-cont 0 0 0
Filter: MF-CLASSIFICATION
Policers:
Name Packets
OTHER-POLICER-OTHER 1380
Rewrite marking
HTTP was already assigned to the EF forwarding class with low loss priority on J11M. We
must apply the default DSCP rewrite table to the egress interface as shown in
Example 11-32.
{master}[edit]
ibm@J11M-re0# commit
You can also generate traffic to the end host and check the interface counters at the egress
port on J48E-VC:
1. Verify counters on J48E-VC egress port before generating traffic:
ibm@J48E-VC> show interfaces ge-1/0/46 detail | find "Queue counters"
Queue counters: Queued packets Transmitted packets Dropped packets
0 best-effort 0 4 0
1 assured-forw 0 0 0
5 expedited-fo 0 0 0
7 network-cont 0 1 0
Active alarms : None
Active defects : None
2. Use Telnet from J02M to the end station on port 80:
ibm@J02M> telnet 10.100.100.2 port 80
Trying 10.100.100.2...
3. Again, verify counters on J48E-VC egress port:
ibm@J48E-VC> show interfaces ge-1/0/46 detail | find "Queue counters"
Queue counters: Queued packets Transmitted packets Dropped packets
0 best-effort 0 850 0
1 assured-forw 0 0 0
5 expedited-fo 0 0 0
7 network-cont 0 1038 0
The EF queue counters remained in 0 because the correct BA classifier must be applied
at the ingress interface on J48E-VC. (By default, the ieee-802.1p classifier is applied to the
ports on the J48E.)
Scheduler
Example 11-33 shows how to configure the scheduler and scheduler map.
Verify the configuration of the scheduler map and that it is correctly applied to the interface:
1. Verify the configuration of the scheduler map:
ibm@J11M-re0# run show class-of-service scheduler-map SCHED-MAP
Scheduler map: SCHED-MAP, Index: 25389
Out-of-band management
A dedicated management Ethernet port allows out-of-band management. Out-of-band
management allows a direct connection to the Routing Engine and provides a complete
separation of transit and management traffic. Transit traffic cannot traverse through this
interface. Therefore, it ensures that congestion or failure in the transit network do not affect
the management network of the switches and routers.
Inband management
Inband management allows connections to the switches and routers by using the same
interfaces where both management and transit traffic flow. This approach is simple to
implement and requires no dedicated management resources. However, it has several
disadvantages:
Management and transit traffic co-exit and mix together in the same network. The
management of the switches and routers might become inaccessible or intermittently
accessible when any attack occurs in the network.
It might be prone to replay attacks or wiretapping because of the mixture of transit and
management in a network.
Security measures are required to provide inband management. This chapter is written with
the understanding that inband management is allowed for router and switch communication. It
includes examples on securing and restricting the inband access.
Access method
For management access, you can communicate with a router or switch from a remote console
in several ways. The most common methods that are used today are Telnet and Secure Shell
(SSH) applications.
Telnet
Telnet, by default, does not encrypt any data sent over the connection between the
administrator and router including the password. Anyone who has access to the network in
which the router or switch reside can easily intercept the plain text packet that is passing by.
They can also obtain the login ID and password information by using any common utilities
such as tcpdump or Wireshark.
Example 12-1 shows how to enable the Telnet application in the Junos software.
SSH
SSH provides secure encrypted communications over a network, which ensures the
confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the
remote computer and allows the remote computer to authenticate the user. Therefore, SSH is
suitable for inband management.
Several optional parameters control access, for example, to the number of concurrent SSH
sessions and the maximum number of SSH sessions that can be established in one minute
as shown in Example 12-3. These parameters are useful for protecting the router and switch
against SYN flood DoS attacks on SSH port (TCP port 22).
To restrict SSH access, you can disable root account from SSH access while only allowing
other non-root accounts. By default, the router and switch accept connections for both
version 1 and version 2 of SSH. In general, version 2 is considered more secure than
version 1 because of its security and feature improvement over version 1. Use version 2
whenever possible.
Example 12-4 shows the restriction on root account login and the version 2 setting.
To create a user account and password in Junos software, you can use the commands as
show in Example 12-5.
Creating a user account is insufficient. In addition, you must assign the user to a class. By
default, three classes are defined by the Junos software as shown in Example 12-6.
In Example 12-6, the administrator account is assigned a super-user class, which allows you
to perform the configuration as a root account in configuration mode.
The user account created in Example 12-6 is considered a local user database. It is only
stored in this router and can be used for local authentication.
Central authentication
The management of multiple switches and routers by many different personnel in a huge
network can create a significant user account management problem. Creating each user
account in every router and switch in the network can cause operational complexity with an
inconsistent user account database and problematic user password management. To address
this problem, you can use a central authentication service to simplify account management.
A centralized authentication system helps to reduce operational task by having only on one
server for account creation and deletion. It also allows you to enable or disable an account to
all switches and routers with a single change that does not require committing a configuration
change to any router.
When selecting an authentication protocol, RADIUS is always selected for its multivendor
IETF standard. RADIUS is more widely accepted than TACACS+ or other proprietary
systems.
The implementation of both RADIUS and TACACS+ in Junos software is essentially the same
as shown in Example 12-7 and Example 12-8.
Example 12-9 Password of local user used when the RADIUS server is unreachable
J48E-VC (ttyp5)
login: ibm
Password:
Local password: <--- local user’s password is used
Two RADIUS servers are referred for authentication. If the first RADIUS server does not
respond within the specified time, in this case 5 seconds, the router can try the next server.
The router and RADIUS share a same secret key that ensures they are talking to the trusted
peer.
Firewall filters provide rules that define whether to permit or deny packets that are transiting
on an interface on a router or switch from a source address to a destination address. You
configure firewall filters to determine whether to permit or deny traffic before it enters or exits
a port, VLAN, or Layer 3 (routed) interface to which the firewall filter is applied. An ingress
firewall filter is applied to packets that are entering a network. An egress firewall filter is
applied to packets that are exiting a network.
You can also configure firewall filters to subject packets to the following types of processing:
Filtering
Class-of-service (COS) marking (grouping similar types of traffic together and treating
each type of traffic as a class with its own level of service priority)
Traffic policing (controlling the maximum rate of traffic sent or received on an interface)
The firewall filters are stateless filters that do not store the state of a packet flow. If firewall
filters are applied in the input and output directions of an interface, ensure that the rules are
defined correctly for both ingress and egress traffic before committing the firewall filters.
Loopback interfaces: Firewall filters that are configured on loopback interfaces are
applied to packets transiting network interfaces only. They are not applied to packets that
transit the management interface (me0) in IBM Ethernet switches or (fxp0) in IBM Ethernet
routers.
IBM Ethernet routers support more types of firewall filters. The following protocols families are
supported:
IPV4 (inet)
IPV6 (inet6)
MPLS (mpls)
VPLS (vpls)
Circuit cross-connects (ccc)
This chapter only provides information about the Layer 3 firewall filter, which is the same for
both IBM Ethernet Switches and Routers. For more details about advanced firewall filter
implementation, see JUNOS Software Policy Framework Configuration Guide, GA32-0704.
If the packet matches the first term, the switch executes the action that is defined by that term
to either permit or deny the packet. No other terms are evaluated. If the switch does not find a
match between the packet and first term, it compares the packet to the next term in the
firewall filter by using the same match process.
If no match occurs between the packet and the second term, the switch continues to compare
the packet to each successive term defined in the firewall filter until a match is found. If a
packet does not match any terms in a firewall filter, the default action is to discard the packet.
First, a filter protect-re is created with the first term named allow-ssh to allow SSH traffic
from trusted IP addresses (10.10.10.0/24) as shown in Example 12-10.
Then you create a term to allow DNS response traffic from a DNS server (208.67.222.222) as
shown in Example 12-11.
ibm@J48E-VC# show
term allow-dns {
from {
source-address {
208.67.222.222/32;
53.0.0.0/32;
}
protocol udp;
}
then accept;
}
For NTP and SNMP traffic, two terms are created as shown in Example 12-12.
Example 12-13 shows that the OSPF packet from any peer is allowed. You can specify
certain peers to be allowed in this term. However, you must maintain the IP address of the
peer whenever adding a new peer or deleting a peer. Alternately, you can secure OSPF
peering by setting OSPF authentication in the OSPF configuration.
Switches and routers are always a default gateway of hosts or servers. Thus, allowing ICMP
and traceroute protocols makes network troubleshooting much easier. Yet certain protection
must be in place against an attack such as an ICMP flood. Example 12-14 shows the ICMP
with certain types allowed. ICMP traffic is also limited with a bandwidth policer in which ICMP
traffic is discarded when the bandwidth exceeds 1m and 15k of burst limit. Unlike any
Windows client that uses ICMP for traceroute, Junos software implements traceroute using a
user-defined protocol (UDP) similar to other UNIX platform.
ICMP
ibm@J48E-VC#
set term allow-icmp from protocol icmp
set term allow-icmp from icmp-type echo-request
set term allow-icmp from icmp-type echo-reply
set term allow-icmp from icmp-type unreachable
set term allow-icmp from icmp-type time-exceeded
set term allow-icmp then policer icmp-policer
set term allow-icmp then accept
Traceroute
ibm@J48E-VC#
set term allow-traceroute from protocol udp
set term allow-traceroute from destination-port 33434-33523
set term allow-traceroute then accept
Policer
{master:0}[edit]
ibm@J48E-VC# edit firewall policer icmp-policer <--- Move in the Junos
configuration hierarchy
Optionally, you can use a term to count all denied traffic and to log to a syslog file as shown in
Example 12-15.
After the protect-re firewall filter is defined (as described in Example 12-10 on page 374 to
Example 12-15 on page 377), you must apply the firewall filter to the loopback interface as an
input filter as shown in Example 12-16.
First, a firewall filter called protect-server is created. You define the first term to allow access
to the email server from Host 1 and Host 2 as shown in Example 12-17.
Then, create second term to allow access to the syslog server from only Host 3 as shown in
Example 12-18.
A final deny term is added at the end of the filter. Although this action is the default behavior
for a filter, it is explicitly configured here to count the denied traffic. Example 12-20 shows the
denied-traffic term for counting a denied packet and the output to view the number of bytes
and packets of the denied-packet counter.
Filter: protect-server
Counters:
Name Bytes Packets
denied-packet 0 0
You can turn on port security features to obtain the most robust port security level. Basic port
security features are enabled in the default configuration of the switch. You can configure
additional features with minimal configuration steps.
Port security in Junos software: As of Junos version 10.1R1.8, port security features are
only supported on IBM Ethernet Switch J48E. IBM Ethernet Switch J08E and J16E and
IBM Ethernet Routers (J02M, J06M, and J11M) are not supported yet.
When a MAC address limit is exceed, the switch can perform one of the following actions:
Drop Drop the packet and generate an alarm, an SNMP trap, or a system log entry.
This action is the default action.
Log Do not drop the packet, but generate an alarm, an SNMP trap, or a system log
entry.
None No action.
Shutdown Disable the interface and generate an alarm. If you configured the switch with
the port-error-disable statement, the disabled interface recovers
automatically upon expiration of the specified disable timeout. If you have not
configured the switch for auto recovery from port error disabled conditions, you
can start the disabled interfaces by running the clear ethernet-switching
port-error command.
{master:0}[edit ethernet-switching-options]
ibm@J48E-VC# edit secure-access-port <--- move in Junos configuration hierarchy
After configuring the MAC limiting feature on the switch, you can use view the contents of the
MAC table by using the show ethernet-switching table command. The MAC table shows
the learned MAC address entries. Each MAC address entry includes the VLAN, type, age,
and interface information as shown in Example 12-23.
When a MAC limiting violation occurs, you can use the show log messages | match limit
command to view the MAC limiting violations. Example 12-24 shows two types of messages
that are being logged. The first message indicates dropping the packet that is triggered by a
drop action. The second message indicates shutting down the interface that is triggered by a
shutdown action.
The current blocking state of an interface can be viewed by using the show
ethernet-switching interfaces <interface name> detail command. Example 12-25
shows that the ge-0/0/0 interface has exceeded the MAC limit and the port is disabled.
You can start the disabled port by entering the clear ethernet-switching port-error
command or configure an automatic recovery feature from the error condition after a specified
time period. Example 12-26 shows the manual way to re-enable the port and the automatic
way to recover the port from an error state after 10 seconds.
{master:0}[edit ethernet-switching-options]
root@J48E-VC# set port-error-disable disable-timeout 10
In some cases, you might need to clear the MAC table entries. You can clear all the entries or
only the entries that are associated with an interface as shown in Example 12-27.
{master:0}
root@J48E-VC> clear ethernet-switching table interface ge-0/0/0
Unlike MAC limiting that applies on a per-port setting, MAC move limiting applies on a
per-VLAN basis. A MAC move involves at least two ports. Therefore, the need to control the
aggregate number of MAC moves with the context of a specific VLAN.
Example 12-28 illustrates the setting of MAC move limiting on employee VLAN. The VLAN
shuts down when the number of MAC moves exceeds three times in a second.
{master:0}[edit ethernet-switching-options]
ibm@J48E-VC# edit secure-access-port <--- move in Junos configuration hierarchy
DHCP snooping
Figure 12-2 shows a typical operation of DHCP in which the following actions occur:
The DHCP client generates a DHCPDISCOVER message and broadcasts the message
that is flooded throughout a Layer 2 domain.
The DHCP server residing in the same Layer 2 domain responds with a unicast
DHCPOFFER message to the client with a proposed set of configuration parameters.
When the DHCP client receives the first response, it broadcasts a DHCPREQUEST
message back to the DHCP server indicating the parameters that it wants to use.
The DHCP server sends a unicast DHCPACK message to the DHCP client to confirm the
assignment of the related parameters and provides a lease duration.
Because the DHCP request message is broadcasted to the network, the DHCP request
message can potentially be seen by all devices on the subnet. It is vulnerable when a rogue
DHCP server intentionally responds to the client and provides bogus network parameters to
disrupt normal network operations and start a DoS attack.
With the DHCP snooping feature, it filters and blocks ingress DHCP server messages on
untrusted ports. It builds and maintains an IP address or MAC address binding database
through monitoring of DHCP exchanges. Therefore, it protects the switch and other resources
in the network from malicious attacks.
ARP inspection
The ARP inspection feature prevents ARP spoofing attacks by comparing ARP requests and
replies against entries stored in the DHCP snooping database. ARP packets that do not
match values in the snooping database are filtered.
IP Source Guard
The IP Source Guard feature prevents the effects of IP address spoofing attacks by validating
the source IP address in packets received on an untrusted access interface against the
DHCP snooping database. When the source IP address and source MAC address are found
to be valid, the packet is accepted. If a mismatch occurs in either the source IP or source
MAC address, the packet is discarded.
This feature is useful in a case where a rogue host connects to the network and attempts to
spoof the IP address of a DHCP server to act maliciously as a DHCP server to start a DoS or
other attack.
Example
This example demonstrates how to configure DHCP snooping, ARP inspection, and IP
Source Guard. It has the following goals:
Do not accept DHCP responses on interfaces ge-0/0/1, ge-0/0/2, and ge-0/0/3.
Configure the ge-0/0/0 interface to accept trusted DHCP packets.
Enable DHCP snooping on employee VLAN to allow a valid DHCP response on a trusted
port.
Configure Dynamic ARP Inspection on employee VLAN to prevent ARP spoofing.
Configure IP Source Guard on employee VLAN to prevent IP spoofing.
Configuring DHCP snooping, ARP inspection, and IP Source Guard are straightforward.
These configurations have the following two levels:
VLAN level setting for enabling DHCP snooping, ARP inspection, and IP Source Guard
Port level setting for trusted and untrusted DHCP or ARP configuration
Example 12-29 shows the setting on employee VLAN for DHCP snooping, ARP inspection,
and IP Source Guard.
Example 12-29 Configuring DHCP snooping, ARP inspection, and IP Source Guard
{master:0}[edit]
ibm@J48E-VC# edit ethernet-switching-options <--- Move in the Junos configuration
hierarchy
{master:0}[edit ethernet-switching-options]
ibm@J48E-VC# edit secure-access-port <--- Move in the Junos configuration
hierarchy
DHCP snooping is enabled for employee VLAN by using the examine-dhcp command. After
DHCP snooping is enabled, you can turn on ARP inspection and IP Source Guard. Both ARP
DHCP snooping with the examine-dhcp keyword: After DHCP snooping is enabled with
the examine-dhcp keyword, all trunk ports are considered DHCP trusted and all access
ports are considered untrusted.
In Example 12-30, you specifically configure the ge-0/0/0 interface to be a trusted DHCP port
to allow a DHCP server packet from this port. Example 12-30 also shows the commands to
configure the other access ports to be untrusted DHCP ports that prohibit DHCP server
packets. Although the untrusted access port configuration is not needed in this case, it is only
shown here to alter the defaults on a per-port basis.
With the DHCP snooping configured and the DHCP server connected to the switch, you now
connect Host 1 and Host 2 to the switch. Host 1 and Host 2 are assigned an IP address
respectively. The switch should have built a DHCP snooping database for these hosts.
Example 12-31 shows the IP to MAC address information of Host 1 and Host 2 in the DHCP
snooping database. Host 1 is assigned 10.1.1.205, and Host 2 is assigned 10.1.1.208.
The output of the ARP inspection results clearly indicates that ARP responses on the
ge-0/0/1 and ge-0/0/2 interfaces are valid and match the content of the DHCP snooping
database. The number of packets received on the port is the same as the number that passed
ARP inspection.
To test ARP inspection with ARP spoofing, change the MAC address of Host 1 to the same
MAC address of Host 2 and then use PING to test the DHCP server. Again, check the ARP
inspection statistics. You can see that the ARP inspection has prevented ARP cache
poisoning by blocking the flooding of the bogus ARP message in the VLAN as shown in
Example 12-33. As expected, you can see that the ARP inspection has failed the sending
packets.
You can view IP Source Guard information by using the show ip-source-guard command as
shown in Example 12-34.
Because the DHCP snooping database is referred by IP Source Guard, you might notice that
the IP Source Guard Information is similar to DHCP snooping.
In this case, you can test the IP Source Guard feature by changing the IP address of Host 1 to
the same IP address of Host 2, which is 10.1.1.208. Then, you perform a few PING tests to
the DHCP server from Host 1 and Host 2. The result is that Host 2 can issue a PING to the
DHCP server, and Host 1 fails to PING. This result indicates that IP Source Guard has
prevented IP spoofing of Host 1 and ensured that Host 2 is operating as normal.
The 802.1X feature in Junos software: As of Junos version 10.1R1.8, the 802.1X feature
is only supported on IBM Ethernet Switch J48E. IBM Ethernet Switch J08E and J16E and
IBM Ethernet Routers J02M, J06M, and J11M are not supported yet.
The following EAP methods are supported on IBM Ethernet Switch J48Es:
EAP-MD5
EAP-TLS (Transport Layer Security)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-PEAP (Protected EAP)
Supplicant modes
The supplicant is authenticated in single mode, single-secure mode, or multiple mode:
single Authenticates only the first supplicant. All other supplicants who
connect later to the port are allowed full access without any further
authentication. They effectively “piggyback” on the authentication of
the first supplicant.
single-secure Allows only one supplicant to connect to the port. No other supplicant
is allowed to connect until the first supplicant logs out.
multiple Allows multiple supplicants to connect to the port. Each supplicant is
authenticated individually.
802.1X features
The 802.1X has the following features on IBM Ethernet Switches:
Guest VLANs provide limited access to a LAN, typically just to the Internet, for supplicants
that fail 802.1X authentication.
Dynamic VLANs enable a supplicant, after authentication, to be a member of a VLAN
dynamically.
Private VLANs enable configuration of 802.1X authentication on interfaces that are
members of private VLANs (PVLANs).
The key assumptions are that the RADIUS server is configured properly to support 802.1X
authentication, and the supplicant software is installed correctly in a trusted host. As the
integrated components in this example, the key setting on the RADIUS server and trusted
host are shown.
When you first log in to Juniper Networks Steel-Belted RADIUS main page, the configuration
components are on the left panel as shown in Figure 12-8.
When the Windows XP host is connected to the switch that has port authentication
enabled, the devices initiate the port authentication process. After a short time, a balloon
message on the task bar prompts you for an authentication action (Figure 12-17).
5. Click the balloon message.
{master:0}[edit access]
ibm@J48E-VC#
set radius-server 10.1.1.8 secret "$9$wT2oGk.569pDi9p0BSys24aDiqmfzn/"
set radius-server 10.1.1.8 retry 5
set radius-server 10.1.1.8 source-address 10.1.1.11
{master:0}[edit access]
ibm@J48E-VC# show
radius-server {
10.1.1.8 {
secret "$9$wT2oGk.569pDi9p0BSys24aDiqmfzn/"; ## SECRET-DATA
retry 5;
source-address 10.1.1.11;
}
}
2. Specify the IP address of the RADIUS server along with a shared secret key used
between the local NAS and RADIUS servers. Set the retry setting to 5 times before the
RADIUS server is considered unresponsive and ensure that all RADIUS messages
originate from 10.1.1.11.
3. Configure an authentication profile named auth, which is used by authenticator as shown
in Example 12-36.
{master:0}[edit access]
ibm@J48E-VC# show
profile auth {
authentication-order radius;
radius {
authentication-server 10.1.1.8;
}
}
In this example, you link the authenticator to the already defined auth profile. 802.1X is
enabled on the ge-0/0/1 interface with single-secure mode. This mode keeps only one active
client at any time and forces the client to re-authenticate every 180 seconds.
The ge-0/0/2 interface is set to support MAC-based RADIUS and is restricted to only
MAC-based RADIUS by using the restrict keyword. The ge-0/0/3 interface is set to provide
limited access in guest-access VLAN for supplicants that fail 802.1X authentication.
During communication with the RADIUS server, notice the status of the 802.1X authentication
as shown in Example 12-38.
With a valid user name and password, you are granted access. The 802.1X port indicates an
Authenticated state as shown in Example 12-39.
In addition, you are dynamically assigned a VLAN ID 100 (employee VLAN) as shown in
Example 12-40.
You can see that the port is authenticated and the user is the MAC address of the printer. The
ge-0/0/2 interface is also configured to dynamically assign VLAN to the printer. To check the
assigned VLAN, you can use the show dot1x interface detail command as shown in
Example 12-42.
With no response from the guest host on the credential, after a while, the switch puts the
802.1X port into the guest-access VLAN as shown in Example 12-44.
The output shows that the GuestVlan authentication method is used and the guest-access
VLAN is assigned.
To view the traces in the dot1x-log file, you issue the command shown in Example 12-46.
If you suspect a malfunction and want to start over, you can issue a restart dot1x-protocol
operational mode command to restart the 802.1X daemon. Use care with this command
because you can globally reset all sessions as indicated by the options shown in
Example 12-47.
Alternatively, you can use the clear dotx1 interface command to clear the targeted
session. This command resets the hold timers. It is useful for expediting re-authentication
attempts after a change is made when you want to quickly see whether it worked.
The Junos software network management features work with an operations support system
to manage the devices within the network. Junos software can assist you in performing these
management tasks, as described in Table 13-1.
Configuration Configure router attributes using the command-line interface (CLI), the JUNOScript API, and the
management NETCONF API. To configure the router using the CLI, see the JUNOS System Basics
Configuration Guide, GA32-0671. For more information about configuring the router using the
APIs, see the JUNOScript API Guide, GA32-0674, and NETCONF API Guide, GA32-0678.
Management Information Base (MIB) for Configuration Management. For more information about
the Management Information Base (MIB) for Configuration Management, see JUNOS Software
Network Management Configuration Guide, GA32-0698.
The SNMP manager collects information about network connectivity, activity, and events by
polling managed devices.
Communication between the agent and the manager occurs in one of the following forms:
Get, GetBulk, and GetNext requests
The manager requests information from the agent. The agent returns the information in a
Get response message.
Set requests
The manager changes the value of an MIB object controlled by the agent. The agent
indicates the status in a Set response message.
Traps notification
The agent sends traps to notify the manager of significant events that occur on the
network device.
In addition, the Junos SNMP agent software accepts IPv4 and IPv6 addresses for transport
over IPv4 and IPv6. For IPv6, Junos software supports the following IPv6 over SNMP:
SNMP data over IPv6 networks
IPv6-specific MIB data
SNMP agents for IPv6
MIBs are either standard or enterprise-specific. Standard MIBs are created by the Internet
Engineering Task Force (IETF) and documented in various RFCs. Depending on the vendor,
many standard MIBs are delivered with the NMS software. You can also download the
standard MIBs from the following IETF website, and compile them into your NMS, if
necessary:
http://www.ietf.org
For a list of standard supported MIBs and Juniper Networks enterprise-specific supported
MIBs, see 13.5, “MIB support in Junos software” on page 451.
SNMP traps are defined in either standard or enterprise-specific MIBs. Standard traps are
created by the IETF and documented in various RFCs. The standard traps are compiled into
the network management software. You can also download the standard traps from the IETF
website at the following address:
http://www.ietf.org
For more information about standard traps supported by Junos software, see JUNOS
Software Network Management Configuration Guide, GA32-0698.
For more information about enterprise-specific traps supported by Junos software, see
JUNOS Software Network Management Configuration Guide, GA32-0698. For information
about system logging severity levels for SNMP traps, see “System logging severity levels for
SNMP traps” on page 414.
With traps, the receiver does not send any acknowledgment when it receives a trap, and the
sender cannot determine if the trap was received. To increase reliability, SNMP informs are
supported in SNMPv3. An SNMP manager that receives an inform acknowledges the
message with a response. For information about SNMP informs, see 13.4.18, “Configuring
SNMP informs” on page 447.
Junos software forms a destination queue when a trap to a particular destination is returned
because the host is not reachable. It adds the subsequent traps to the same destination to the
queue. Junos software checks for availability of routes every 30 seconds and sends the traps
from the destination queue in a round-robin fashion.
If the trap delivery fails, the trap is added back to the queue. Then the delivery attempt
counter and the next delivery attempt timer for the queue are reset. Subsequent attempts
occur at progressive intervals of 1 minute, 2 minutes, 4 minutes, and 8 minutes. The
maximum delay between the attempts is 8 minutes, and the maximum number of attempts is
10. After 10 unsuccessful attempts, the destination queue and all the traps in the queue are
deleted.
Junos software also has a throttle mechanism. This mechanism controls the number of traps
(throttle threshold; default value of 500 traps) that are sent during a particular time period
(throttle interval; default of 5 seconds). It also ensures consistency in trap traffic,
especially when large number of traps are generated because of interface status changes.
The throttle interval period begins when the first trap arrives at the throttle. All traps within the
trap threshold are processed, and the traps beyond the threshold limit are queued. The
maximum size of the throttle queue is 50k. When a trap is added to the throttle queue, or if the
throttle queue has exceeded the maximum size, the trap is added back on top of the
destination queue. Then all subsequent attempts from the destination queue are stopped for
a 30 second period, after which the destination queue restarts sending the traps.
Trap queuing in Junos software: You cannot configure Junos software for trap queuing.
Nor can you view any information about trap queues except what is available in the syslog.
To define a system contact name that contains spaces, enter the following command:
[edit snmp]
root# set contact "Juniper Berry, (650) 555-1234"
13.3.3 Configuring the system location for a device running Junos software
You can specify the location of each system that is managed by the SNMP. This string is
placed into the MIB II sysLocation object. To configure a system location, include the
location statement at the [edit snmp] hierarchy level:
[edit snmp]
set location location
To filter duplicate SNMP requests, include the filter-duplicates statement at the [edit
snmp] hierarchy level:
[edit snmp]
root# set filter-duplicates
To configure the commit-delay timer for the SNMP Set reply and start of the commit, include
the commit-delay statement at the [edit snmp nonvolatile] hierarchy level:
[edit snmp nonvolatile]
root# set commit-delay seconds
where seconds is the length of the time between when the SNMP request is received and the
commit is requested for the candidate configuration.
For more information about the configure exclusive command and locking the
configuration, see the JUNOS Software CLI User Guide, GA32-0697.
If the community name contains spaces, enclose it in quotation marks (" ").
The default authorization level for a community is read-only. To allow Set requests within a
community, you must define that community as authorization read-write. For Set requests,
you must also include the specific MIB objects that are accessible with read-write privileges
using the view statement. To configure the authorization level in a Junos software
configuration, include the authorization statement at the [edit snmp community name]
hierarchy level:
[edit snmp community name]
root# set authorization [read only | read write]
The clients statement lists the IP addresses of the clients (community members) that are
allowed to use this community. If no clients statement is present, all clients are allowed. For
address, you must specify an IPv4 or IPv6 address, not a host name:
[edit snmp community name]
root# set clients address
Community names: Community names must be unique. You cannot configure the same
community name at the [edit snmp community] and [edit snmp v3 snmp-community
community-index] hierarchy levels.
SNMP and routing instances: SNMP cannot be associated with any routing instances
other than the master routing instance.
You must also configure a trap group for the trap options to take effect. For information about
trap groups, see 13.3.10, “Configuring SNMP trap groups” on page 418.
To specify a valid interface address as the source address for SNMP traps on one of the
router interfaces, include the source-address statement at the [edit snmp trap-options]
hierarchy level:
[edit snmp trap-options]
root# set source-address address
where address is a valid IPv4 address configured on one of the router interfaces.
To specify the source address of the SNMP traps so that they are sent to the lowest loopback
address configured on the lo0 interface, include the source-address statement at the [edit
snmp trap-options] hierarchy level:
[edit snmp trap-options]
root# set source-address lo0;
For each trap group that you define, you must include the target statement to define at least
one system as the recipient of the SNMP traps in the trap group. Specify the IPv4 or IPv6
address of each recipient, not its host name.
Specify the types of traps that the trap group can receive in the categories statement. A trap
group can receive but is not limited to the following categories:
authentication Authentication failures.
chassis Chassis or environment notifications.
configuration Configuration notifications.
link Link-related notifications (up-down transitions, DS-3 and DS-1 line
status change, IPv6 interface state change, and Passive Monitoring
PIC overload).
For a full list of categories, see JUNOS Software Network Management Configuration Guide,
GA32-0698.
With the version statement, you can specify the SNMP version of the traps that are sent to
targets of the trap group. If you specify v1 only, SNMPv1 traps are sent. If you specify v2 only,
SNMPv2 traps are sent. If you specify all, both an SNMPv1 and an SNMPv2 trap are sent for
every trap condition.
[edit snmp]
root# set trap-group "urgent-dispatcher"
[edit snmp]
[edit]
root# show snmp
trap-options;
trap-group urgent-dispatcher {
version v2;
categories {
link;
startup;
}
targets {
1.2.3.4;
fe80::1:2:3:4;
}
}
[edit]
root#
The view statement defines an MIB view and identifies a group of MIB objects. Each MIB
object of a view has a common OID prefix. Each OID represents a subtree of the MIB object
hierarchy. The subtree can be represented by either a sequence of dotted integers (such as
1.3.6.1.2.1.2) or by its subtree name (such as interfaces). A configuration statement uses a
view to specify a group of MIB objects on which to define access. You can also use the
wildcard character asterisk (*) to include OIDs that match a particular pattern in the SNMP
view. To enable a view, you must associate the view with a community.
To associate MIB views with a community, include the view statement at the [edit snmp
community community-name] hierarchy level:
[edit snmp community community-name]
root# set view view-name
By default, Junos software does not trace any SNMP activity. If you include the traceoptions
statement at the [edit snmp] hierarchy level, the default tracing behavior is that important
activities are logged in files in the /var/log directory. Each log is named after the SNMP
agent that generates it. Currently, the following log files are created in the /var/log directory
when the traceoptions statement is used:
chassisd
craftd
ilmid
mib2d
rmopd
serviced
snmpd
When a trace file named filename reaches its maximum size, it is renamed filename.0, then
filename.1, and so on, until the maximum number of trace files is reached. Then the oldest
trace file is overwritten. For more information about how log files are created, see the JUNOS
System Log Messages Reference, GA32-0675.
You can configure the limits on the number and size of trace files by including the following
statements at the [edit snmp traceoptions] hierarchy level:
[edit snmp traceoptions]
root# set file files number size size
For example, set the maximum file size to 2 MB, and the maximum number of files to 20 MB.
When the file that receives the output of the tracing operation filename reaches 2 MB, the
filename file is renamed filename.0, and a new file called filename is created. When the
new filename file reaches 2 MB, filename.0 is renamed filename.1, filename is renamed
filename.0, and a new file called filename is created. This process repeats until there are 20
trace files. Then the oldest file filename.19 is overwritten by the newest filename file.
The number of files can be in the range 2–1000 files. The file size of each file can be
10 KB –1 GB.
To explicitly set the default behavior, include the file no-world-readable statement at the
[edit snmp traceoptions] hierarchy level:
[edit snmp traceoptions]
root# set file no-world-readable;
To view the end of the log for an agent, enter the show log agentd | last operational mode
command:
[edit]
root# run show log agentd | last
The USM uses the concept of a user for which security parameters, levels of security,
authentication, privacy protocols, and keys are configured for both the agent and the
manager. Messages that are sent by using the USM are better protected than messages that
are sent with community strings, where passwords are sent in the clear. With the USM,
messages that are exchanged between the manager and the agent can have data integrity
checking and data origin authentication. The USM protects against message delays and
message replays by using time indicators and request IDs. Encryption is also available.
Trap entries in SNMPv3 are created by configuring the notify, notify filter, target
address, and target parameters. The notify statement specifies the type of notification and
contains a single tag. The tag defines a set of target addresses to receive a trap. The notify
filter defines access to a collection of trap OIDs. The target address defines the address of a
management application and other attributes to use in sending notifications. Target
parameters define the message processing and security parameters to be used in sending
notifications to a particular management target.
[edit snmp]
root# set view view-name oid object-identifier [include | exclude]
[edit snmp]
root# set view vi oid interfaces include
[edit snmp]
root# edit v3
[edit snmp]
root# set notify-filter prof1 oid interfaces include
Configuration at the [edit snmpview-name] hierarchy level: You must configure at least
one view, notify, read, or write at the [edit snmpview-name] hierarchy level.
where:
local engine-id-suffix is the engine ID suffix that is explicitly configured.
use-default-ip-address is the engine ID suffix that is generated from the default IP
address.
use-mac-address is the SNMP engine identifier that is generated from the Media
Access Control (MAC) address of the management interface on
the router.
The local engine ID is defined as the administratively unique identifier of an SNMPv3 engine
and is used for identification, not for addressing. An engine ID has two portions: prefix and
suffix. The prefix is formatted according to the specifications defined in RFC 3411, An
Architecture for Describing SNMP Management Frameworks. RFC details are available at the
following website:
http://www.ietf.org
To create users, include the user statement at the [edit snmp v3 usm local-engine]
hierarchy level:
[edit snmp v3 usm local-engine]
root# set user username
To configure user authentication and encryption, include the following statements at the [edit
snmp v3 usm local-engine user username] hierarchy level:
[edit snmp v3 usm local-engine user username]
root# set authentication-md5 authentication-password authentication-password
Alternatively, you can use any of the following commands after root#:
set authentication-sha authentication-password authentication-password
set authentication-none
set privacy-aes128 privacy-password privacy-password
set privacy-des privacy-password privacy-password
set privacy-3des privacy-password privacy-password
set privacy-none
where authentication-password is the password used to generate the key used for
authentication.
SNMPv3 has special requirements when you create plain-text passwords on a router or
switch:
The password must be at least eight characters long.
The password can include alphabetic, numeric, and special characters, but it cannot
include control characters.
where authentication-password is the password used to generate the key that is used for
authentication.
SNMPv3 has special requirements when you create plain-text passwords on a router or
switch:
The password must be at least eight characters long.
The password can include alphabetic, numeric, and special characters, but it cannot
include control characters.
Configuring no authentication
To configure no authentication for an SNMPv3 user, include the authentication-none
statement at the [edit snmp v3 usm local-engine user username] hierarchy level:
[edit snmp v3 usm local-engine user username]
root# set authentication-none
Prerequisite for encryption: Before you configure encryption, you must configure MD5 or
SHA authentication. Before you configure the privacy-3des and privacy-aes128
statements, you must install the jcrypto package.
where privacy-password is the password that is used to generate the key used for encryption.
SNMPv3 has special requirements when you create plain-text passwords on a router or
switch:
The password must be at least eight characters long.
The password can include alphabetic, numeric, and special characters, but it cannot
include control characters.
where privacy-password is the password that is used to generate the key used for encryption.
SNMPv3 has special requirements when you create plain-text passwords on a router or
switch:
The password must be at least eight characters long.
The password can include alphabetic, numeric, and special characters, but it cannot
include control characters.
where privacy-password is the password that is used to generate the key used for encryption.
SNMPv3 has special requirements when you create plain-text passwords on a router or
switch:
The password must be at least eight characters long.
The password can include alphabetic, numeric, and special characters, but it cannot
include control characters.
Configuring no encryption
To configure no encryption for an SNMPv3 user, include the privacy-none statement at the
[edit snmp v3 usm local-engine user username] hierarchy level:
[edit snmp v3 usm local-engine user username]
root# set privacy-none
You define user access to management information at the [edit snmp v3 vacm] hierarchy
level. All access control within VACM operates on groups, which are collections of users as
defined by USM, or community strings as defined in the SNMPv1 and SNMPv2c security
models. The term security name refers to these generic users. The group to which a specific
security name belongs is configured at the [edit snmp v3 vacm security-to-group]
hierarchy level. That security name can be associated with a group defined at the [edit snmp
v3 vacm security-to-group] hierarchy level. A group identifies a collection of SNMP users
that share the same access policy.
You then define the access privileges that are associated with a group at the [edit snmp v3
vacm access] hierarchy level. Access privileges are defined by using views. For each group,
you can apply different views depending on the SNMP operation. Examples include read
(get, getNext, or getBulk), write (set), notifications, the security level used (authentication,
privacy, or none), and the security model (v1, v2c, or usm) used within an SNMP request.
You configure members of a group with the security-name statement. For v3 packets using
USM, the security name is the same as the user name. For SNMPv1 or SNMPv2c packets,
the security name is determined based on the community string. Security names are specific
to a security model. You might also be configuring VACM access policies for SNMPv1 or
SNMPv2c packets. In this case, assign security names to groups for each security model
SNMPv1 or SNMPv2c at the [edit snmp v3 vacm security-to-group] hierarchy level. You
must also associate a security name with an SNMP community at the [edit snmp v3
snmp-community community-index] hierarchy level.
To configure the access privileges for an SNMP group, include statements at the [edit snmp
v3 vacm] hierarchy level:
[edit snmp v3 vacm]
root# set access group group-name default-context-prefix security-model [any | usm
| v1 | v2c] security-level [authentication | none | privacy] notify-view view-name
read-view view-name write-view view-name
[edit snmp v3 vacm]
root# set security-to-group security-model [usm | v1 | v2c] security-name
security-name group group-name
where group-name is a collection of SNMP users that belong to a common SNMP list that
defines an access policy. Users that belong to a particular SNMP group inherit all access
privileges granted to that group.
where:
any is any security model.
usm is the SNMPv3 security model.
v1 is the SNMPV1 security model.
v2c is the SNMPv2c security model.
where:
none provides no authentication and no encryption.
authentication provides authentication but no encryption.
privacy provides authentication and encryption.
Access privileges and security levels: Access privileges are granted to all packets with
a security level equal to or greater than the level that is configured. If you are configuring
the SNMPv1 or SNMPv2c security model, use none as your security level. If you are
configuring the SNMPv3 security model, USM, use the authentication, none, or privacy
security level.
To associate MIB views with an SNMP user group, include the following statements at the
[edit snmp v3 vacm access group group-name default-context-prefix security-model
[any | usm | v1 | v2c] security-level [authentication | none | privacy]] hierarchy
level:
[edit snmp v3 vacm access group group-name default-context-prefix security model
[any | usm | v1 | v2c] security-level [authentication | none | privacy]]
root# set notify-view view-name read-view view-name write-view view-name
Requirement: You must associate at least one view (notify, read, or write) at the [edit
snmp v3 vacm access group group-name default-context-prefix security-model (any
| usm | v1 | v2c) security-level (authentication | none | privacy)] hierarchy level.
You must configure the MIB view at the [edit snmp view view-name] hierarchy level. For
information about how to configure MIB views, see 13.3.11, “Configuring MIB views” on
page 420.
where view-name specifies the notify access, which is a list of notifications that can be sent to
each user in an SNMP group. A view name cannot exceed 32 characters.
where view-name specifies read access for an SNMP user group. A view name cannot exceed
32 characters.
where view-name specifies write access for an SNMP user group. A view name cannot
exceed 32 characters.
where:
usm is the SNMPv3 security model.
v1 is the SNMPv1 security model.
v2c is the SNMPv2 security model.
where security-name is the user name that is configured at the [edit snmp v3 usm
local-engine user username] hierarchy level. For SNMPv1 and SNMPv2c, the security
name is the community string configured at the [edit snmp v3 snmp-community
community-index] hierarchy level. For information about configuring user names, see 13.4.4,
“Creating SNMPv3 users” on page 428. For information about configuring a community
string, see 13.4.21, “Configuring the SNMPv3 community” on page 450.
If you already have a group that is configured with all of the view and access permissions that
you want to give a user, you can add the user to that group. If you want to give a user view
and access permissions that no other groups have, create a group and add the user to it. You
can also create a group and add a user to it if you do not already have any groups configured.
To configure the access privileges that are granted to a group, include the group statement at
the [edit snmp v3 vacm security-to-group security-model [usm | v1 | v2c]
security-name security-name] hierarchy level:
[edit snmp v3 vacm security-to-group security-model [usm | v1 | v2c] security-name
security-name]
root# set group group-name
where group-name identifies a collection of SNMP security names that share the same access
policy.
For more information about groups, see 13.4.8, “Defining access privileges for an SNMP
group” on page 434.
The target address defines the address of the management application and the parameters to
use in sending notifications. Target parameters define the message processing and security
parameters that are used in sending notifications to a particular management target. With
SNMPv3, you can also define SNMPv1 and SNMPv2c traps.
Access privileges: When you configure SNMP traps, ensure that your configured access
privileges allow the traps to be sent. Access privileges are configured at the [edit snmp v3
vacm access] and [edit snmp v3 vacm security-to-group] hierarchy levels.
To configure SNMP traps, include the following statements at the [edit snmp v3] hierarchy
level:
[edit snmp v3]
root# set notify name tag tag-name type [trap | inform]
To configure the trap notifications, include the notify statement at the [edit snmp v3]
hierarchy level:
[edit snmp v3]
root# set notify name tag tag-name type trap
Notify entry name: Each notify entry name must be unique. Junos software supports two
types of notification: trap and inform.
For information about how to configure the tag list, see “Configuring the tag list” on page 443.
Example 13-7 shows how to specify three sets of destinations to send traps.
Each OID represents a subtree of the MIB object hierarchy. The subtree can be represented
either by a sequence of dotted integers, such as 1.3.6.1.2.1.2, or by its subtree name, such
as interfaces. You can also use the wildcard character asterisk (*) in the OID to specify OIDs
that match a particular pattern.
To configure the trap notifications filter, include the notify-filter statement at the [edit
snmp v3] hierarchy level:
[edit snmp v3]
root# set notify-filter profile-name
where:
oid is the object identifier. All MIB objects represented by this statement
have the specified OID as a prefix. It can be specified either by a
sequence of dotted integers or by a subtree name.
include includes the subtree of MIB objects represented by the specified OID.
exclude excludes the subtree of MIB objects represented by the specified OID.
Address mask: You must configure the address mask when you configure the SNMP
community.
To specify where you want the traps to be sent and define which SNMPv1 and SNMP2vc
packets are allowed, include the target-address statement at the [edit snmp v3] hierarchy
level:
[edit snmp v3]
root# set target-address target-address-name
To configure the target address properties, include the following statements at the [edit snmp
v3 target-address target-address-name] hierarchy level:
[edit snmp v3 target-address target-address-name]
root# set address address address-mask address-mask port port-number
routing-instance instance tag-list tag-list target-parameters
target-parameters-name
For information about how to configure the community string, see 13.4.21, “Configuring the
SNMPv3 community” on page 450.
To configure a routing instance within a logical system, specify the logical system name
followed by the routing instance name. Use a forward slash (/) to separate the two names, for
example, test-lr/test-ri. To configure the default routing instance on a logical system,
specify the logical system name followed by default, for example, test-lr/default.
Allowing for the sending of traps in access privileges: When you configure SNMP
traps, make sure that your configured access privileges allow the traps to be sent.
Configure access privileges at the [edit snmp v3 vacm access] hierarchy level.
where target-parameters-name is the name associated with the message processing and
security parameters that are used in sending notifications to a particular management target.
To define a set of target parameters, include the target-parameters statement at the [edit
snmp v3] hierarchy level:
[edit snmp v3]
root# set target-parameters target-parameters-name
To configure target parameter properties, include the following statements at the [edit snmp
v3 target-parameters target-parameter-name] hierarchy level:
[edit snmp v3 target-parameters target-parameter-name]
root# notify-filter profile-name parameters message-processing-model [v1 | v2c |
V3] security-level [authentication | none | privacy] security-model [usm | v1 |
v2c] security-name security-name
where profile-name is the name of a configured notify filter. For information about
configuring notify filters, see 13.4.14, “Configuring the trap notification filter” on page 441.
where:
v1 is the SNMPv1 message processing model.
v2c is the SNMPv2c message processing model.
v3 is the SNMPV3 message processing model.
where:
usm is the SNMPv3 security model.
v1 is the SNMPv1 security model.
v2c is the SNMPv2c security model.
where:
authentication provides authentication but no encryption.
none means no security. It provides no authentication and no encryption.
privacy provides authentication and encryption.
If the USM security model is used, security-name identifies the user that is used when the
notification is generated. If the v1 or v2c security models are used, security-name identifies
the SNMP community that is used when the notification is generated.
Access privileges for the group: The access privileges for the group associated with a
security name must allow this notification to be sent.
If you are using the v1 or v2 security models, the security name at the [edit snmp v3 vacm
security-to-group] hierarchy level must match the security name at the [edit snmp v3
snmp-community community-index] hierarchy level.
If the sender never receives a response, the inform can be sent again. Thus, informs are
more likely to reach their intended destination than traps are. Informs use the same
communications channel as traps (same socket and port) but have different protocol data unit
(PDU) types.
Informs are more reliable than traps, but they use more network and router resources. Unlike
a trap, an inform is held in memory until a response is received or the timeout is reached.
Also, traps are sent only once. An inform might be retried several times. Use informs when it
is important for the SNMP manager to receive all notifications. However, if you are more
concerned about network traffic or router memory, use traps.
For information about configuring SNMP traps, see 13.4.12, “Configuring SNMPv3 traps on a
device running Junos software” on page 440.
To configure a remote engine and remote user to receive and respond to SNMP informs,
include the following statements at the [edit snmp v3] hierarchy level:
[edit snmp v3]
root# set usm remote-engine engine-id user username [authentication-md5
authentication-key key][authentication-none][authentication-sha authentication-key
key][privacy-3des privacy-key key][privacy-aes128 privacy-key key][privacy-des
privacy-key key][privacy-none]
where:
notify name is the name assigned to the notification. Each notify entry name must
be unique.
tag tag-name defines the target addresses that are sent this notification. The
notification is sent to all target addresses that have this tag in their tag
list. The tag-name is not included in the notification. For information
about how to configure the tag list, see “Configuring the tag list” on
page 443.
type inform is the type of notification.
target-address target-address-name
identifies the target address. The target address defines the address
of the management application and parameters that are used to
respond to informs.
inform-timeout seconds
is the number of seconds to wait for an acknowledgment. If no
acknowledgment is received within the timeout period, the inform is
retransmitted. The default timeout is 15 seconds.
inform-retry-count number
is the maximum number of times an inform is transmitted if no
acknowledgment is received. The default is 3. If no acknowledgment is
received after the inform is transmitted the maximum number of times,
the inform message is discarded.
message-processing-model
defines which version of SNMP to use when SNMP notifications are
generated. Informs require a v3 message processing model.
security-model defines the security model to use when SNMP notifications are
generated. Informs require a usm security model.
To configure the SNMP community, include the snmp-community statement at the [edit snmp
v3] hierarchy level:
[edit snmp v3]
root# set snmp-community community-index
To configure the SNMP community properties, include the following statements at the [edit
snmp v3 snmp-community community-index] hierarchy level:
[edit snmp v3 snmp-community community-index]
root# set community-name community-name
root# set security-name security-name
root# set tag tag-name
To configure the SNMP community name, include the community-name statement at the [edit
snmp v3 snmp-community community-index] hierarchy level:
[edit snmp v3 snmp-community community-index]
root# set community-name community-name
You cannot view the community name after you configure it and commit your changes. In
the CLI, the community name is concealed.
The security-to-group configuration at the [edit snmp v3 vacm] hierarchy level identifies the
group.
Matching security name: This security name must match the security name configured at
the [edit snmp v3 target-parameters target-parameters-name parameters] hierarchy
level when you configure traps.
where tag-name identifies the address of managers that are allowed to use a community
string.
RFC 1155, Structure and Identification of Management Information for TCP/IP-based Internets 1 1 0
RFC 1195 Use of OSI IS-IS for Routing in TCP/IP and Dual Environments 1 0 0
Only the isisSystem, isisMANAreaAddr, isisAreaAddr, isisSysProtSupp, isisSummAddr, isisCirc,
isisCircLevel, isisPacketCount, isisISAdj, isisISAdjAreaAddr, isisAdjIPAddr,
isisISAdjProtSupp, isisRa, and isisIPRA objects are supported.
RFC 1213, Management Information Base for Network Management of TCP/IP-Based Internets: 1 1 0
MIB-II
Junos software supports the following areas:
MIB II and its SNMP version 2 derivatives, including:
-- Statistics counters
-- IP, except for ipRouteTable, which has been replaced by ipCidrRouteTable RFC 2096, IP
Forwarding Table MIB
-- SNMP management
-- Interface management
SNMPv1 Get, GetNext requests, and version 2 GetBulk request
Junos software-specific secured access list
Master configuration keywords
Reconfigurations upon SIGHUP
RFC 1215, A Convention for Defining Traps for use with the SNMP 1 1 0
Only MIB II SNMP version 1 traps and version 2 notifications are supported
RFC 1657, Definitions of Managed Objects for the Fourth Version of the Border Gateway Protocol 1 1 0
(BGP-4) using SMIv2
RFC 2011, SNMPv2 Management Information Base for the Internet Protocol Using SMIv2 1 1 1
RFC 2012, SNMPv2 Management Information Base for the Transmission Control Protocol Using 1 1 1
SMIv2
RFC 2013, SNMPv2 Management Information Base for the User Datagram Protocol Using SMIv2 1 1 1
RFC 2024, Definitions of Managed Objects for Data Link Switching Using SMIv2 Except for the 1 0 0
dlswInterface and dlswSdlc object groups; the dlswDirLocateMacTable, dlswDirNBTable, and
dlswDirLocateNBTable tables; the dlswCircuitDiscReasonLocal and
dlswCircuitDiscReasonRemote tabular objects; and the dlswDirMacCacheNextIndex and
dlswDirNBCacheNextIndex scalar objects; read-only access.
RFC 2115, Management Information Base for Frame Relay DTEs Using SMIv2 frDlcmiTable only; 1 0 0
frCircuitTable and frErrTable are not supported.
RFC 2465, Management Information Base for IP Version 6: Textual Conventions and General 1 0 0
Group
Except for IPv6 interface statistics
RFC 2571, An Architecture for Describing SNMP Management Frameworks Read-only access 1 1 1
Replacement of RFC 2571: RFC 2571 has been replaced by RFC 3411. However, Junos software
supports both RFC 2571 and RFC 3411.
RFC 2572, Message Processing and Dispatching for the Simple Network Management Protocol 1 1 1
(SNMP) read-only access.
Replacement of RFC 2572: RFC 2572 has been replaced by RFC 3412. However, Junos software
supports both RFC 2572 and RFC 3412.
RFC 2576, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard 1 1 1
Network Management Framework
Replacement of RFC 2576: RFC 2576 has been replaced by RFC 3584.
However, Junos software supports both RFC 2576 and RFC 3584.
RFC 2665, Definitions of Managed Objects for the Ethernet-like Interface Types 1 1 1
RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol Except row 1 1 1
creation, the Set operation, and the vrrpStatsPacketLengthErrors object.
RFC 2864, The Inverted Stack Table Extension to the Interfaces Group MIB 1 0 0
RFC 2925, Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations 1 1 1
Only the objects pingCtlTable, pingResultsTable, pingProbeHistoryTable,
pingMaxConcurrentRequests, traceRouteCtlTable, traceRouteResultsTable,
traceRouteProbeHistoryTable, and traceRouteHopsTable.
RFC 3019, IP Version 6 Management Information Base for The Multicast Listener Discovery 1 0 0
Protocol
RFC 3410 Introduction and Applicability Statements for Internet-Standard Management Framework 1 1 0
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) 1 1 0
Management Frameworks
Replacement of RFC 2571: RFC 3411 replaces RFC 2571. However, Junos software supports
both RFC 3411 and RFC 2571.
RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol 1 1 0
(SNMP)
Replacement of RFC 2572: RFC 3412 replaces RFC 2572. However, Junos software supports
both RFC 3412 and RFC 2572.
RFC 3414, User-based Security Model (USM) for version 3 of the Simple Network Management 1 1 0
Protocol (SNMPv3)
RFC 3415, View-based Access Control Model (VACM) for the Simple Network Management 1 1 0
Protocol (SNMP)
RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol 1 1 0
(SNMP)
Replacement of RFC 1905: RFC 3416 replaces RFC 1905, which was supported in earlier
versions of Junos software.
RFC 3417, Transport Mappings for the Simple Network Management Protocol (SNMP) 1 1 1
RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol 1 1 0
(SNMP)
Replacement of RFC 1907: RFC 3418 replaces RFC 1907, which was supported in earlier
versions of Junos software.
RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard 1 1 0
Network Management Framework
RFC 3592, Definitions of Managed Objects for the Synchronous Optical Network/Synchronous 1 0 0
Digital Hierarchy (SONET/SDH) Interface Type
RFC 3637, Definitions of Managed Objects for the Ethernet WAN Interface Sublayer 1 0 0
Except etherWisDeviceTable, etherWisSectionCurrentTable, and
etherWisFarEndPathCurrentTable.
RFC 3811, Definitions of Textual Conventions (TCs) for Multiprotocol Label Switching (MPLS) 1 0 0
Management
RFC 3812, Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Management Information 1 0 0
Base (MIB)
Read only access
MPLS tunnels as interfaces are not supported.
The following objects in the TunnelResource table are not supported:
mplsTunnelResourceMeanRate, mplsTunnelResourceMaxBurstSize,
mplsTunnelResourceMeanBurstSize, mplsTunnelResourceExBurstSize,
mplsTunnelResourceWeight.
mplsTunnelPerfTable and mplsTunnelCRLDPResTable are not supported.
mplsTunnelCHopTable supported on ingress routers only.
Branch conflict: The branch used by the proprietary LDP MIB, ldpmib.mib, conflicts with RFC
3812. The ldpmib.mib branch has been deprecated and replaced by jnx-mpls-ldp.mib.
RFC 3813, Multiprotocol Label Switching (MPLS) Label Switching Router (LSR) Management 1 0 0
Information Base (MIB)
Read only access. mplsInterfacePerfTable, mplsInSegmentPerfTable, mplsOutSegmentPerfTable,
mplsInSegmentMapTable, mplsXCUp, and mplsXCDown are not supported.
RFC 3815, Definitions of Managed Objects for the Multiprotocol Label Switching (MPLS), Label 1 0 0
Distribution Protocol (LDP)
Only mplsLdpLsrID and mplsLdpSesPeerAddrTable.
RFC 3826, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based 1 1 0
Security Model
RFC 4318, Definitions of Managed Objects for Bridges with Rapid Spanning Tree Protocol 1 1 0
Supports 802.1w and 802.1t extensions for RSTP.
RFC 4801, Definitions of Textual Conventions for Generalized Multiprotocol Label Switching 1 0 0
(GMPLS) Management Information Base (MIB)
Read-only access.
RFC 4802, Generalized Multiprotocol Label Switching (GMPLS) Traffic Engineering (TE) 1 0 0
Management Information (MIB)
Read-only access. gmplsTunnelReversePerfTable, gmplsTeScalars, gmplsTunnelTable,
gmplsTunnelARHopTable, gmplsTunnelCHopTable, and gmplsTunnelErrorTable are not supported.
RFC 4803, Generalized Multiprotocol Label Switching (GMPLS) Label Switching Router (LSR) 1 0 0
Management Information Base (MIB)
Read-only access. gmplsLabelTable and gmplsOutsegmentTable are not supported.
GMPLS TE tables: The tables in GMPLS TE (RFC 4802) and LSR (RFC 4803) MIBs are
extensions of the corresponding tables from the MPLS TE (RFC 3812) and LSR (RFC 3813) MIBs
and use the same index as the MPLS MIB tables.
Internet Assigned Numbers Authority, IANAiftype Textual Convention MIB, referenced by RFC 1 1 1
2233, available at:
http://www.iana.org/assignments/ianaiftype-mib
You can download the Junos MIB package from the Enterprise-Specific MIBs and Traps
section of the Junos Software Technical Publications index page at the following address:
http://www.juniper.net/techpubs/software/junos
The Junos MIB package is available in ZIP and TAR packages. You can download the
appropriate format based on your requirements.
The Junos MIB package contains two folders: StandardMibs and JuniperMibs. The
StandardMibs folder contains the standard MIBs and RFCs that are supported on devices
running Junos software. The JuniperMibs folder contains the Juniper Networks
enterprise-specific MIBs.
To load MIB files that are required for managing and monitoring devices running Junos
software, follow these steps:
1. Go to the Junos Software Technical Publications index page for the release that you are
using:
http://www.juniper.net/techpubs/software/junos
2. Click the Enterprise-Specific MIBs and Traps link on the Junos Software Technical
Publications index page.
3. Click the TAR or ZIP link under the TAR/ZIP column of the Enterprise MIBs row to
download the Junos MIB package.
4. Extract the TAR or ZIP file by using an appropriate utility.
5. Load the standard MIB files (from the StandardMibs folder) in the following order:
Standard MIBs: Some of the MIB compilers that are commonly used have the
standard MIBs preloaded on them. If the standard MIBs are already loaded on the MIB
compiler that you are using, skip this step and the next one, and proceed to step 7.
a. mib-SNMPv2-SMI.txt
b. mib-SNMPv2-TC.txt
c. mib-IANAifType-MIB.txt
d. mib-IANA-RTPROTO-MIB.txt
e. mib-rfc1907.txt
f. mib-rfc2011a.txt
g. mib-rfc2012a.txt
h. mib-rfc2013a.txt
i. mib-rfc2863a.txt
6. Load the remaining standard MIB files.
Attention: You must follow the order specified in this procedure. Also ensure that all
standard MIBs are loaded before you load the enterprise-specific MIBs. Dependencies
might exist that require a particular MIB to be present on the compiler before loading
another MIB. Such dependencies are listed in the IMPORT section of the MIB file.
Undefined object when loading an MIB file: While loading an MIB file, the compiler
might return an error message indicating that an object is undefined. In this case, open the
MIB file using a text editor and ensure that all the MIB files that are listed in the IMPORT
section are loaded on the compiler. If any of the MIB files listed in the IMPORT section is
not loaded on the compiler, load that MIB file, and then try to load the MIB file that failed to
load.
The sampling information is used to create a network traffic visibility picture. The Junos
software fully supports the sFlow version 5 standard described at the sFlow.org website at:
http://www.sflow.org
Raw packet headers: sFlow technology on j-type e-series Ethernet switches samples only
raw packet headers. A raw Ethernet packet is the complete Layer 2 network frame.
An sFlow monitoring system consists of an sFlow agent embedded in the switch and a
centralized collector. The two main activities of the sFlow agent are random sampling and
statistics gathering. It combines interface counters and flow samples and sends them across
the network to the sFlow collector.
Junos software support of sFlow version 5: Junos software on IBM j-type e-series
Ethernet switches supports sFlow version 5.
The sFlow collector uses the IP address of the sFlow agent to determine the source of the
sFlow data. The IP address assigned to the agent is based on the following interfaces
configured on the switch (in the order shown):
1. Virtual management Ethernet (VME) interface
2. Management Ethernet interface
If any of these interfaces has not been configured, the IP address of any Layer 3 interface or
the routed VLAN interface (RVI) is used as the IP address for the agent. At least one interface
must be configured for an IP address to be assigned to the agent.
sFlow data can be used to provide network traffic visibility information. The IP address to be
assigned to source data can be configured. If it has not been configured, the IP address of the
configured Gigabit Ethernet interface, 10 Gigabit Ethernet interface, or the RVI is used as the
source IP address. Infrequent sampling flows are not reported in the sFlow information, but
over time, the majority of flows are reported. Based on a defined sampling rate, 1 out of N
packets is captured and sent to the collector. This type of sampling does not provide a 100%
accurate result in the analysis, but it does provide a result with quantifiable accuracy. A polling
interval defines how often the sFlow data for a specific interface is sent to the collector, but an
sFlow agent is free to schedule polling.
IBM j-type e-series Ethernet switches use adaptive sampling to ensure both sampling
accuracy and efficiency. Adaptive sampling is a process of monitoring the overall incoming
traffic rate on the network device. The process includes providing intelligent feedback to
interfaces to dynamically adapt their sampling rate to the traffic conditions. Interfaces on
which incoming traffic exceeds the system threshold are penalized so that all violations can
be regulated without affecting the traffic on other interfaces.
Every 5 seconds, the agent checks interfaces to get the number of samples, and interfaces
are grouped based on the slot to which they belong. The top five interfaces that produce the
highest samples are selected. By using the binary backoff algorithm, the sampling load on
these top five interfaces is reduced to half and adjusted on interfaces that have a lower
sample rate. Therefore, when the processor limit is reached, the sampling rate is adapted
such that it does not load the processor any further. If the switch is rebooted, the adaptive
sample rate is reset to the user configured sample rate. Also, if you modify the sample rate,
the adaptive sample rate changes.
Graceful restart: Because sFlow technology on IBM j-type e-series Ethernet switches
does not support graceful restart, when a graceful restart occurs, the adaptive sample rate
is set to the user configured sample rate.
An sFlow monitoring system consists of an sFlow agent embedded in the switch and a
centralized collector. The sFlow agent runs on the switch. It combines interface counters and
flow samples and sends them across the network to the sFlow collector. Figure 13-2 shows
the basic elements of the sFlow system.
Set the IP address of the collector and the port it will be listening on:
[edit protocols sflow]
root# set collector address udp-port udp-port
Set the interfaces that you want to collect the sFlow data:
[edit protocols sflow]
root# set interfaces interface
The polling interval is the interval between each port statistic polling update message, which
can range from 0 to 3600 seconds:
[edit protocols sflow]
root# set polling-interval interval
Polling interval: The polling interval can be specified as a global parameter also. Specify
0 if you do not want to poll the interface.
The sample rate means that one out of N packets in the traffic stream will be sampled, which
can be different for various interfaces. The range of sample rate is from 100 to 1 million.
[edit protocols sflow]
root#set sample-rate rate
The output shows that sFlow technology is enabled and specifies the values for the sample
rate, sample limit, and polling interval.
The collected data can then be analyzed and displayed (Figure 13-4) in an application such
as Scrutinizer NetFlow and sFlow Analyzer version 7.6.2. This software application is
available at not cost and provides detailed network utilization information for the hosts and
applications using the most bandwidth. You can find this software application at the following
web page:
http://www.plixer.com/
Each system log message identifies the Junos software process that generated the message
and briefly describes the operation or error that occurred. This reference provides more
detailed information about each system log message. When applicable, it describes the
possible causes of the message and action you can take to correct error conditions.
Alternative facility For change-log: local6 [edit system syslog] host “Changing the
for message For conflict-log: local5 hostname { alternative facility
forwarded to a For dfc: local1 facility-override facility; name for remote
remote machine For firewall: local3 } messages” on
For interactive-commands: local7 page 471
For pfe: local4
Format of Standard Junos format, based on [edit system syslog] file “Logging messages
messages logged the UNIX format filename { in structured-data
to a file structured-data; format” on page 469
}
Maximum size of IBM j-type m-series 1 MB [edit system syslog] archive { “Configuring the size
log file size size; and number of log
} files” on page 474
file filename {
archive {
size size;
}
}
Timestamp Month, date, hour, minute, second, [edit system syslog] “Including the year or
format for example: Aug 21 12:36:30 time-format format; millisecond in time
stamps” on page 477
Users who can root user and users with the Junos [edit system syslog] “Configuring the size
read log files maintenance permission archive { and number of log
world-readable; files” on page 474
}
file filename {
archive {
world-readable;
}
}
To log the message on an IBM j-type m-series or e-series platform, include the kernel info
statement at the appropriate hierarchy level:
[edit system syslog]
root# set [console | file filename | host destination | user username] kernel
info}
You direct messages to one or more destinations by including the appropriate statement at
the [edit system syslog] hierarchy level:
To a named file in a local file system, by including the file statement. See “Directing
messages to a log file” on page 468.
To the terminal session of one or more specific users, or all users, when they are logged in
to the routing platform, by including the user statement. See “Directing messages to a
user terminal” on page 470.
To the routing platform console, by including the console statement. See “Directing
messages to the console” on page 470.
To a remote machine that is running the syslogd utility or to the other Routing Engine on
the routing platform, by including the host statement. See “Directing messages to a
remote machine or the other Routing Engine” on page 470.
By default, messages are logged in a standard format, which is based on a UNIX system log
format. For detailed information, see “Interpreting system log messages” on page 481. You
can alter the content and format of logged messages in the following ways:
In Junos version 8.3 and later, you can log messages to a file in a structured-data format
instead of the standard Junos format. A structured-data format provides more information
without adding significant length and makes it easier for automated applications to extract
information from the message. For more information, see “Logging messages in
structured-data format” on page 469.
A message facility and severity level are together referred to as its priority. By default, the
standard Junos format for messages does not include priority information.
(Structured-data format includes a priority code by default.) To include priority information
in standard-format messages directed to a file or a remote destination, include the
explicit-priority statement. For more information, see “Including priority information in
system log messages” on page 475.
By default, the standard Junos format for messages specifies the month, date, hour,
minute, and second when the message was logged. You can modify the time stamp on
standard-format messages to include the year, the millisecond, or both. (The
structured-data format specifies the year and millisecond by default.) For more
information, see “Including the year or millisecond in time stamps” on page 477.
For a statement summary of the statements mentioned in this chapter, see the JUNOS
Software System Basics and Services Command Reference, GA32-0671.
For detailed information about configuring system logging, see the following sections:
“Specifying the facility and severity of messages to include in the log” on page 467
“Directing messages to a log file” on page 468
“Directing messages to a user terminal” on page 470
“Directing messages to the console” on page 470
“Directing messages to a remote machine or the other Routing Engine” on page 470
“Configuring the size and number of log files” on page 474
“Including priority information in system log messages” on page 475
“Including the year or millisecond in time stamps” on page 477
“Using regular expressions to refine the set of logged messages” on page 478
“Disabling the logging of a facility” on page 479
When you configure logging for a facility and destination, you specify a severity level for each
facility. Messages from the facility that are rated at that level or higher are logged to the
following destination:
[edit system syslog]
root# set [console | file filename | host destination | user username] facility
severity
For more information about the destinations, see the following sections:
“Directing messages to a log file” on page 468
“Directing messages to a user terminal” on page 470
“Directing messages to the console” on page 470
“Directing messages to a remote machine or the other Routing Engine” on page 470.
To log messages that belong to more than one facility for a particular destination, specify
each facility and associated severity as a separate statement within the set of statements for
the destination. Table 13-6 lists the facilities that you can specify in configuration statements
at the [edit system syslog] hierarchy level.
Table 13-7 lists the severity levels that you can specify in configuration statements at the
[edit system syslog] hierarchy level. The levels from emergency through info are in order
from highest severity, with the greatest effect on functioning, to the lowest severity.
Unlike the other severity levels, the none level disables logging of a facility instead of
indicating how seriously a triggering event affects routing functions. For more information, see
“Disabling the logging of a facility” on page 479.
emergency System panic or other condition that causes the routing platform to stop functioning
critical Critical conditions, such as errors with the hard disk drive
error Error conditions that generally have less serious consequences than errors in the
emergency, alert, and critical levels
notice Conditions that are not errors but might warrant special handling
For the list of facilities and severity levels, see “Specifying the facility and severity of
messages to include in the log” on page 467.
To prevent log files from growing too large, the Junos system logging utility by default writes
messages to a sequence of files of a defined size. By including the archive statement, you
can configure the number of files, their maximum size, and who can read them, for either all
log files or a certain log file. For more information, see “Configuring the size and number of
log files” on page 474.
For information about the following statements, see the following sections:
For explicit-priority, see “Including priority information in system log messages” on
page 475.
For match, see “Using regular expressions to refine the set of logged messages” on
page 478.
For structured-data, see “Logging messages in structured-data format” on page 469.
This draft establishes a standard message format regardless of the source or transport
protocol for logged messages.
The optional brief statement suppresses the English-language text that is displayed by
default at the end of a message to describe the error or event. For information about the fields
in a structured-data format message, see “Displaying a log file from a single-chassis system”
on page 480.
The structured format is used for all messages that are logged to the files that are generated
by a Junos process or software library.
Specify one or more Junos user names, separating multiple values with spaces, or use the *
to indicate all users who are logged in to the local Routing Engine.
For the list of facilities and severity levels, see “Specifying the facility and severity of
messages to include in the log” on page 467. For information about the match statement, see
“Using regular expressions to refine the set of logged messages” on page 478.
For the list of facilities and severity levels, see “Specifying the facility and severity of
messages to include in the log” on page 467.
To direct system log messages to a remote machine, include the host hostname statement to
specify the IP version 4 address, IP version 6 address, or fully qualified host name of the
remote machine. The remote machine must be running the standard syslogd utility. Do not
direct messages to another Juniper Networks routing platform. In each system log message
directed to the remote machine, the host name of the local Routing Engine is displayed after
the time stamp to indicate that it is the source for the message.
To direct system log messages to the other Routing Engine on a routing platform with two
Routing Engines installed and operational, include the host other-routing-engine
statement. The statement is not automatically reciprocal. Therefore, you must include it in the
configuration of each Routing Engine if you want them to direct messages to each other. In
each message directed to the other Routing Engine, the string re0 or re1 is displayed after the
time stamp to indicate the source for the message.
For the list of facilities and severity levels to configure under the host statement, see
“Specifying the facility and severity of messages to include in the log” on page 467.
To record facility and severity level information in each message, include the
explicit-priority statement. For more information, see “Including priority information in
system log messages” on page 475.
When directing messages to remote machines, you can include the source-address
statement to specify the IP address of the routing platform that is reported in the messages as
their source. In each host statement, you can also include the facility-override statement
to assign an alternative facility and the log-prefix statement to add a string to each
message. For more information, see the following sections:
“Specifying an alternative source address for system log messages” on page 471
“Changing the alternative facility name for remote messages” on page 471
“Assigning an alternative facility” on page 473
“Adding a text string to system log messages” on page 473
“Adding a string” on page 474
where source-address is a valid IPv4 or IPv6 address configured on one of the routing
platform interfaces. The address is reported in the messages that are directed to all remote
machines specified in host hostname statements at the [edit system syslog] hierarchy
level. It is not reported in the messages that are directed to the other Routing Engine.
Table 13-8 lists the default alternative facility name that is used for each Junos-specific facility
name. For facilities that are not listed, the default alternative name is the same as the local
facility name.
change-log local6
conflict-log local5
dfc local1
firewall local3
interactive-commands local7
pfe local4
The syslogd utility on a remote machine handles all messages for a facility in the same way,
regardless of the source of the message, the Juniper Networks routing platform, or the
The default alternative facility for the local authorization facility is also authorization. The
syslogd utility on monitor might be configured to write messages that belong to the
authorization facility to the /var/log/auth-attempts file. In this case, the file contains both
messages that are generated when users log in to local-router and the messages
generated when users log in to monitor. Although the name of the source machine is
displayed in each system log message, the mixing of messages from multiple machines can
make it more difficult to analyze the contents of the auth-attempts file.
To make it easier to separate the messages from each source, you can assign an alternative
facility to all messages that are generated on local-router when they are directed to
monitor. You can then configure the syslogd utility on monitor to write messages with the
alternative facility to a different file from the messages that are generated on monitor itself.
To change the facility used for all messages directed to a remote machine, include the
facility-override statement at the [edit system syslog host hostname] hierarchy level:
[edit system syslog host hostname]
root# facility severity facility-override facility
In general, specify an alternative facility that is not already in use on the remote machine,
such as one of the localX facilities. On the remote machine, you must also configure the
syslogd utility to handle the messages in the desired manner.
Table 13-9 lists the facilities that you can specify in the facility-override statement.
You can configure routing platforms in California and New York to send messages to a single
remote machine called central-logger.mycompany.com. The messages from California are
assigned to alternative facility local0. The messages from New York are assigned to
alternative facility local2. The following examples illustrate to configure the routing platforms:
Configure California routing platforms to aggregate messages in the local0 facility:
[edit system syslog]
root@cal# set host central-logger.mycompany.com change-log info
On central-logger, you can then configure the system logging utility to write messages from
the local0 facility to the california-config file and the messages from the local2 facility to
the new-york-config file.
Alphanumeric and special characters: The string can contain any alphanumeric or
special character except the equal sign (=) and the colon (:). It also cannot include the
space character. Do not enclose the string in quotation marks (" ") in an attempt to include
spaces in it.
Adding a string
Add the J06M string to all messages to indicate that the router is an IBM j-type m-series
Ethernet router, and direct the messages to the hardware-logger.mycompany.com remote
machine:
[edit system syslog]
root# set host hardware-logger.mycompany.com any info
When these configuration statements are included on an IBM j-type m-series Ethernet router
called Per_Router, a message similar to the following example is displayed in the system log
on hardware-logger.mycompany.com:
May17 09:33:23 Per_router J06M: mgd[477]: UI_CMDLINE_READ_LINE: user 'root',
command 'run show version'
When an active log file, called logfile, reaches the maximum size, the logging utility closes
the file, compresses it, and names the compressed archive file logfile.0.gz. The logging
utility then opens and writes to a new active file called logfile. When the new logfile reaches
the configured maximum size, logfile.0.gz is renamed logfile.1.gz, and the new logfile
is closed, compressed, and renamed logfile.0.gz.
By default, the logging utility creates up to 10 archive files in this manner. When the maximum
number of archive files is reached, each time the active file reaches the maximum size, the
contents of the oldest archive file are lost and overwritten by the next oldest file. The logging
utility, by default, also limits the users who can read log files to the root user and users who
have the Junos maintenance permission.
You can include the archive statement to change the maximum size of each file, the number
of archive files that are created, and who can read log files. To configure values that apply to
all log files, include the archive statement at the [edit system syslog] hierarchy level:
[edit system syslog]
root# set archive files number size size [world-readable | no-world-readable]
To configure values that apply to a particular log file, include the archive statement at the
[edit system syslog file filename] hierarchy level:
[edit system syslog file filename]
root# archive files number size size [world-readable | no-world-readable]
where:
files number specifies the number of files to create before the oldest file is
overwritten. The value can be from 1 through 1000.
To include priority information in messages directed to a remote machine or the other Routing
Engine, include the explicit-priority statement at the [edit system syslog host
[hostname | other-routing-engine]] hierarchy level:
[edit system syslog host [hostname | other-routing-engine]]
root# set facility severity
The priority recorded in a message always indicates the original, local facility name. If the
facility-override statement is included for messages directed to a remote destination, the
Junos system logging utility still uses the alternative facility for the messages themselves
when directing them to the remote destination. For more information about alternative
facilities, see “Changing the alternative facility name for remote messages” on page 471.
When the explicit-priority statement is included, the Junos logging utility adds a prefix to
codes for the facility name and severity level to the message tag name, if the message has
one:
facility-severity[-TAG]
The tag is a unique identifier assigned to some Junos system log messages. For more
information, see “Displaying a log file from a single-chassis system” on page 480, and
“Displaying and interpreting system log messages” on page 480.
Junos facility name: If the second column in Table 13-10 does not include the Junos
facility name for a code, the facility cannot be included in a statement at the [edit system
syslog] hierarchy level. The Junos software might use the facilities in Table 13-10, and
others that are not listed, when reporting on internal operations
Table 13-11 Numeric codes for severity levels reported in priority information
Numeric Severity level Description
code
0 emergency System panic or other condition that causes the routing platform to
stop functioning
2 critical Critical conditions, such as errors with the hard disk drive
3 error Error conditions that generally have less serious consequences than
errors in the emergency, alert, and critical levels
5 notice Conditions that are not errors but might warrant special handling
In Example 13-10, the CHASSISD_PARSE_COMPLETE message belongs to the daemon facility and
is assigned a severity level 6 (info).
When the explicit-priority statement is not included, the priority is not displayed in the
message (Example 13-11).
For more information about message formatting, see “Displaying and interpreting system log
messages” on page 480.
To include the year, the millisecond, or both in the time stamp, include the time-format
statement at the [edit system syslog] hierarchy level:
edit system syslog]
root# set time-format [year | millisecond | year millisecond]
The following example illustrates the format for a time stamp that includes both the
millisecond (401) and the year (1992):
May 17 09:36:30.401 1992
To specify the text string that must, or must not, be displayed in a message for the message to
be logged to a destination, include the match statement, and specify the regular expression
which the text string must match:
match "regular-expression"
In specifying the regular expression, use the notation that is defined in POSIX Standard
1003.2 for extended (modern) UNIX regular expressions. Explaining regular expression
syntax is beyond the scope of this document, but POSIX standards are available from the
Institute of Electrical and Electronics Engineers (IEEE) at the following website:
http://www.ieee.org
Table 13-12 on page 479 specifies which character or characters are matched by some of the
regular expression operators that you can use in the match statement. In the descriptions, the
term term refers to a single alphanumeric character or a set of characters enclosed in square
brackets, parentheses, or braces.
| (pipe) One of the terms that is displayed on either side of the pipe operator.
! (exclamation mark) Any string except the one specified by the expression, when the
exclamation point is displayed at the start of the expression. Use of the
exclamation point is Junos software-specific.
^ (caret) Start of a line when the caret is displayed outside square brackets.
One instance of any character that does not follow it within square brackets
is when the caret is the first character inside square brackets.
[] (paired square One instance of one of the enclosed alphanumeric characters. To indicate
brackets) a range of characters, use a hyphen (-) to separate the beginning and
ending characters of the range. For example, [a-z0-9] matches any letter or
number.
() (paired parentheses) One instance of the evaluated value of the enclosed term. Parentheses are
used to indicate the order of evaluation in the regular expression.
Filter messages that belong to the interactive-commands facility, directing those expressions
that include the string configure to the terminal of the root user:
[edit system syslog]
root# set user root interactive-commands any
Messages, such as the following example, are displayed on the root user’s terminal when a
user issues a configure command to enter configuration mode:
timestamp router-name mgd[PID]: UI_CMDLINE_READ_LINE: User 'user', command
'configure private'
For more information about the commands mentioned in this section, see the JUNOS System
Basics and Services Command Reference, GA32-0671-02.
By default, the commands show the file stored on the local Routing Engine. To view the file
stored on a particular Routing Engine, prefix file- or pathname with the string re0 or re1 and
a colon. The following examples display the /var/log/messages file that is stored on the
Routing Engine in slot 1:
user@host> show log re1:messages
user@host> file show re1:/var/log/messages
For information about the fields in a log message, see 13.7.2, “Displaying and interpreting
system log messages” on page 480.
The structured format makes it easier for automated applications to extract information from
the message. In particular, the standardized format for reporting the value of variables, which
are elements in the English-language message that vary depending on the circumstances
that triggered the message, makes it easy for an application to extract those values. In the
standard format, the variables are interspersed in the message text and not identified as
variables.
The structured-data format for a message includes the following fields (which are displayed
here on two lines for legibility reasons):
Table 13-13 describes the fields. If the system logging utility cannot determine the value in a
particular field, a hyphen is displayed instead.
<priority code> A number that indicates the facility and severity of the <165> for a message from the
message. It is calculated by multiplying the facility number PFE facility (facility=20) with
by 8 and then adding the numeric value of the severity. For severity notice (severity=5).
a mapping of the numeric codes to facility and severity, see
Table 13-14 on page 482.
version Version of the Internet Engineering Task Force (IETF) 1 for the initial version
system logging protocol specification.
timestamp The time when the message was generated, in one of two 2007-02-15T09:17:15.719Z is
representations: 9:17 AM UTC on 15 February
YYYY-MM-DDTHH:MM:SS.MSZ is the year, month, 2007.
day, hour, minute, second and millisecond in Universal 2007-02-15T01:17:15.719
Coordinated Time (UTC) -08:00 is the same time stamp
YYYY-MM-DDTHH:MM:SS.MS+/-HH:MM is the year, expressed as Pacific Standard
month, day, hour, minute, second and millisecond in Time in the United States.
local time; the hour and minute that follows the + sign
or - sign is the offset of the local time zone from UTC
hostname Name of the host that originally generated the message. router1
process Name of the Junos process that generated the message. mgd
processID UNIX process ID (PID) of the Junos process that generated 3046
the message.
TAG Junos system log message tag, which uniquely identifies UI_DBASE_LOGOUT_EVENT
the message. For a list of the tags described in this section,
see JUNOS Software System Log Messages Reference,
GA32-0675.
[email protected] An identifier for the type of hardware platform that [email protected] for
generated the message. The junos@2636 prefix indicates the M120 router
that the platform runs the Junos software. It is followed by a
dot-separated numeric identifier for the platform type. For a
list of the identifiers, see JUNOS Software System Log
Messages Reference, GA32-0675.
message-text The English-language description of the event or error, User 'regress' exiting
omitted if the brief statement is included at the [edit configuration mode
system syslog file filename structured-data] hierarchy
level. For the text of each message, see JUNOS Software
System Log Messages Reference, GA32-0675.
By default, the structured-data version of a message includes English text at the end, as in
the following example (which is displayed on multiple lines for legibility reasons):
<165>1 2007-02-15T09:17:15.719Z router1 mgd 3046 UI_DBASE_LOGOUT_EVENT
[[email protected] username="regress"] User 'regress' exiting configuration
mode
When the brief statement is included at the [edit system syslog file filename
structured-data ] hierarchy level, the English text is omitted, as in the following example:
<165>1 2007-02-15T09:17:15.719Z router1 mgd 3046 UI_DBASE_LOGOUT_EVENT
[[email protected] username="regress"]
Table 13-14 maps the codes that are displayed in the priority-code field to facility and severity
level.
Additional facility and severity codes: Not all of the facilities and severities listed in
Table 13-14 can be included in statements at the [edit system syslog] hierarchy level.
Some are used by internal processes. For a list of the facilities and severity levels that can
be included in the configuration, see “Specifying the facility and severity of messages to
include in the log” on page 467.
kernel (0) 1 1 2 3 4 5 6 7
user (1) 8 9 10 11 12 13 14 15
mail (2) 16 17 18 19 20 21 22 23
daemon (3) 24 25 26 27 28 29 30 31
authorization (4) 32 33 34 35 36 37 38 39
syslog (5) 40 41 42 43 44 45 46 47
printer (6) 48 49 50 51 52 53 54 55
news (7) 56 57 58 59 60 61 62 63
uucp (8) 64 65 66 67 68 69 70 71
clock (9) 72 73 74 75 76 77 78 79
authorization-private 80 81 82 83 84 85 86 87
(10)
ftp (11) 88 89 90 91 92 93 94 95
security (13) 104 105 106 107 108 109 110 111
console (14) 112 113 114 115 116 117 118 119
local0 (16) 128 129 130 131 132 133 134 135
dfc (17) 136 137 138 139 140 141 142 143
local2 (18) 144 145 146 147 148 149 150 151
firewall (19) 152 153 154 155 156 157 158 159
pfe (20) 160 161 162 163 164 165 166 167
conflict-log (21) 168 169 170 171 172 173 174 175
change-log (22) 176 177 178 179 180 181 182 183
message-source Identifier of the process or component that generated the message and the
routing platform on which the message was logged. This field includes two or
more subfields, depending on how system logging is configured. For more
information, see “Format of the message-source field” on page 485.
facility Code that specifies the facility to which the system log message belongs. For a
mapping of codes to facility names, see Table 13-10 on page 476.
severity Numeric code that represents the severity level that is assigned to the system log
message. For a mapping of codes to severity names, see Table 13-11 on
page 477.
TAG Text string that uniquely identifies the message, in all uppercase letters and using
the underscore (_) to separate words. The tag name begins with a prefix that
indicates the generating software process or library. The entries in this reference
are in alphabetical order by this prefix. Not all processes on a routing platform use
tags. Therefore, this field is not always displayed. For a list of prefixes for the tags
described in this reference, see JUNOS Software System Log Messages
Reference, GA32-0675.
message-text Text of the message. For the text for each message, see JUNOS Software
System Log Messages Reference, GA32-0675.
System logging services: System logging for services on PICs is not configured at the
[edit system syslog] hierarchy level as discussed in this chapter. For configuration
information, see the JUNOS Software Services Interfaces Configuration Guide,
GA32-0707-02.
The (FPC Slot fpc-slot, PIC Slot pic-slot) field is displayed only when the standard system
logging utility that runs on the Routing Engine writes the messages to the system log.
When the PIC writes the message directly, the field is not displayed.
fpc-slot Slot number of the Flexible PIC Concentrator (FPC) that houses the PIC that
generated the message.
pic-slot Number of the PIC slot on the FPC in which the PIC that generated the message
resides.
SERVICE Code representing the service that generated the message. The codes include the
following examples:
FWNAT. Network Address Translation (NAT) service.
IDS. Intrusion detection service.
optional-string A text string that is displayed if the configuration for the PIC includes the log-prefix
statement at the [edit interfaces interface-name services-options syslog]
hierarchy level. For more information, see the JUNOS Software Services Interfaces
Configuration Guide, GA32-0707-02.
TAG Text string that uniquely identifies the message, in all uppercase letters and using
the underscore (_) to separate words. The tag name begins with a prefix that
indicates the generating PIC. The entries in this reference are in alphabetical order
by this prefix.
message-text Text of the message. For the text of each message, see JUNOS Software System
Log Messages Reference, GA32-0675.
where:
hostname is the host name of the local Routing Engine.
process[process-ID] is the name and PID of the process that generated the message.
If the reX field is also displayed, the process is running on the other
Routing Engine. If a process does not report its PID, the [process-ID]
part is not displayed.
reX indicates that the other Routing Engine generated the message
(X is 0 or 1).
View the contents of the /var/log/processes file, which was previously configured to include
messages from the daemon facility, as shown in the following example. When issuing the file
show command, you must specify the full path name of the file.
user@host> file show /var/log/processes Feb 22 08:58:24 router1 snmpd[359]:
SNMPD_TRAP_WARM_START: trap_generate_warm: SNMP trap: warm start
Feb 22 20:35:07 router1 snmpd[359]: SNMPD_THROTTLE_QUEUE_DRAINED:
trap_throttle_timer_handler: cleared all throttled traps
Feb 23 07:34:56 router1 snmpd[359]: SNMPD_TRAP_WARM_START: trap_generate_warm:
SNMP trap: warm start
Feb 23 07:38:19 router1 snmpd[359]: SNMPD_TRAP_COLD_START: trap_generate_cold:
SNMP trap: cold start
Display the contents of the /var/log/processes file when the explicit-priority statement
is included at the [edit system syslog file processes] hierarchy level as shown in the
following example:
user@host> file show /var/log/processes Feb 22 08:58:24 router1 snmpd[359]:
%DAEMON-3-SNMPD_TRAP_WARM_START: trap_generate_warm: SNMP trap: warm start
Feb 22 20:35:07 router1 snmpd[359]: %DAEMON-6-SNMPD_THROTTLE_QUEUE_DRAINED:
trap_throttle_timer_handler: cleared all throttled traps
Feb 23 07:34:56 router1 snmpd[359]: %DAEMON-3-SNMPD_TRAP_WARM_START:
trap_generate_warm: SNMP trap: warm start
Feb 23 07:38:19 router1 snmpd[359]: %DAEMON-2-SNMPD_TRAP_COLD_START:
trap_generate_cold: SNMP trap: cold start
For information about displaying and interpreting messages, see the following sections:
Viewing and interpreting system log message descriptions
Viewing system log message descriptions
To view the complete descriptions for tags whose name includes a regular expression,
substitute the expression for the variable regex. The match is not case-sensitive.
user@host> help syslog regex
To view the complete description of a particular message, substitute its name for the variable
TAG (in all uppercase letters):
user@host> help syslog TAG
Table 13-17 describes the fields in a system log message description in this reference or in
the CLI.
System Log Message Text of the message written to the system log. In the log, a specific
Message value is substituted for each variable that is displayed in italics in this
reference or in angle brackets (<>) in the CLI.
Help Short description of the message, which is also displayed in the right
column of the CLI output for the help syslog command when the
output lists multiple messages.
Severity Severity Message severity level as described in Table 13-11 on page 477.
Cause Cause Optional: Possible cause for message generation. More than one
cause is possible.
You can view the list of descriptions for all currently available system log messages for tags
that begin with the letters ACCT as shown in Example 13-14. There is no space between
ACCT and the question mark, and some descriptions are shortened for legibility.
Example 13-14 Displaying the syslog messages with the ACCT tag
root> help syslog ACCT?
Possible completions:
<syslog-tag> System log tag or regular expression
ACCT_ACCOUNTING_FERROR Error occurred during file processing
ACCT_ACCOUNTING_FOPEN_ERROR Open operation failed on file
ACCT_ACCOUNTING_SMALL_FILE_SIZE Maximum file size is smaller than record size
ACCT_BAD_RECORD_FORMAT Record format does not match accounting profile
ACCT_CU_RTSLIB_ERROR Error occurred obtaining current class usage statistics
ACCT_FORK_ERR Could not create child process
ACCT_FORK_LIMIT_EXCEEDED Could not create child process because of limit
ACCT_GETHOSTNAME_ERROR gethostname function failed
ACCT_MALLOC_FAILURE Memory allocation failed
Reboot requests are recorded in the system log files, which you can view by using the show
log command. Also, the names of any running processes that are scheduled to be shut down
are changed. You can view the process names with the show system processes command.
Restarting a router with two Routing Engines: To restart a router that has two Routing
Engines, restart the backup Routing Engine (if you have upgraded it) first, and then restart
the master Routing Engine.
Example 14-2 shows how to halt the device by using a CLI command.
For example, you can clean up, copy, and delete files in the following ways:
Cleaning up files
You can use the CLI request system storage cleanup command to rotate log files and
delete unnecessary files on the services router as shown in Example 14-3. If your system
is running low on storage space, the file cleanup procedure quickly identifies files that can
be deleted.
The file cleanup procedure entails running the following tasks:
– Rotate log files. All information in the current log files is archived, old archives are
deleted, and fresh log files are created.
– Delete log files in the /var/log directory. Any files that are not currently being written to
are deleted.
– Delete all crash files in the /var/crash directory. Any core files that the device has
written during an error are deleted.
– Delete all software images (TGZ files) in the /var/sw/pkg directory. Any software
images that are copied to this directory during software upgrades are deleted.
Copying files
You can use the file copy command to copy files from one place to another on the local
router or between the local router and a remote system as shown in Example 14-4.
To set the current active configuration as the rescue configuration, use the following
command:
ibm@J08E-re0> request system configuration rescue save
LCD panel: The following procedure is only supported on IBM j-type e-series Ethernet
switches.
The LCD panel shows the Commit Rescue in Progress message. When the reversion is
complete, it shows the idle menu.
To activate the rescue configuration that you have loaded, use the commit command:
ibm@J11M-re0# commit
Important: You might want to convert an IBM Ethernet Switch J48E from a member of a
multimember Virtual Chassis configuration to a stand-alone switch. In this case, first
disconnect the cables connected to the Virtual Chassis ports (VCPs). By using the Menu
button, you delete all modified configuration parameters, including Virtual Chassis
parameters such as member ID, mastership priority, and setting VCP uplinks.
The screen shows a FACTORY DEFAULT IN PROGRESS message and returns to the idle menu.
ibm@J11M-re0> traceroute ?
Possible completions:
<host> Hostname or address of remote host
as-number-lookup Look up AS numbers for each hop
bypass-routing Bypass routing table, use specified interface
ethernet Trace route to an ethernet host by unicast mac address
gateway Address of router gateway to route through
inet Force traceroute to IPv4 destination
inet6 Force traceroute to IPv6 destination
interface Name of interface to use for outgoing traffic
logical-router Name of logical router
monitor Monitor network connection to remote host
mpls Trace MPLS paths
no-resolve Don't attempt to print addresses symbolically
routing-instance Name of routing instance for traceroute attempt
source Source address to use in outgoing traceroute packets
tos IP type-of-service field (IPv4) (0..255)
ttl IP maximum time-to-live value (or IPv6 maximum hop-limit
value)
wait Number of seconds to wait for response (seconds)
Disable port mirroring when you are not using it and select specific interfaces as input to the
port mirror analyzer in preference to using the all keyword option. You can also limit the
amount of mirrored traffic by using statistical sampling, setting a ratio to select a statistical
sample, or using a firewall filter. Mirroring only the necessary packets reduces any potential
affect on performance.
With local port mirroring, traffic from multiple ports is replicated to the analyzer output
interface. If the output interface for an analyzer reaches capacity, packets are dropped.
Consider whether the traffic that is being mirrored exceeds the capacity of the analyzer output
interface.
Port mirroring copies packets to either a local interface for local monitoring or to a VLAN for
remote monitoring. You can use port mirroring to copy these packets:
Packets entering or exiting a port
You can mirror the packets in any combination (up to 256 ports). For example, you can
send copies of the packets entering some ports and the packets exiting other ports to the
same local analyzer port or analyzer VLAN.
Packets entering a VLAN on IBM Ethernet Switch J48E
You can mirror the packets entering a VLAN on this switch to either a local analyzer port or
to an analyzer VLAN. You can configure multiple VLANs (up to 256 VLANs), including a
VLAN range and private VLANs (PVLANs), as ingress input to an analyzer.
Packets exiting a VLAN on IBM Ethernet Switch J08E or J16E
You can mirror the packets exiting a VLAN to either a local analyzer port or to an analyzer
VLAN. You can configure multiple VLANs (up to 256 VLANs), including a VLAN range and
PVLANs, as egress input to an analyzer.
Terminology
Port mirroring involves the following terminology:
Analyzer A port-mirroring configuration on an EX Series switch.
Analyzer output interface or monitor port
Interface to which mirrored traffic is sent and to which a protocol
analyzer application is connected.
Analyzer VLAN or monitor VLAN
A VLAN to which mirrored traffic is sent. The mirrored traffic can be
used by a protocol analyzer application. The monitor VLAN is spread
across the switches in your network.
Firewall-based Analyzer
An analyzer session that has only an “output” stanza. A firewall-based
Analyzer must be used along with a firewall to achieve the functionality
of an analyzer.
Input interface or mirrored port
An interface on the switch that is being mirrored, on traffic either
entering or exiting the interface.
Monitoring station A computer running a protocol analyzer application.
Native analyzer session
An analyzer session that has both “input” and “output” stanzas.
Policy-based mirroring
The mirroring of packets that match the match items in the defined
firewall filter term. The action item analyzer analyzer-name is used in
the firewall filter to send the packets to the port mirror analyzer.
Protocol analyzer application
An application that is used to examine packets that are transmitted
across a network segment. Also commonly called network analyzer,
packet sniffer, or probe.
Remote port mirroring
Functions the same as local port mirroring, except that the mirrored
traffic is not copied to a local analyzer port. Instead, it is flooded into
an analyzer VLAN that you create specifically for receiving mirrored
traffic.
Statistical sampling The configuration of the system to mirror a sampling of the packets, by
setting a ratio of 1:x, where x is a value in the range 1–2047. For
example, when the ratio is set to 1, all packets are copied to the
analyzer. When the ratio is set to 200, 1 of every 200 packets is
copied.
For more information about IBM j-type e-series port mirroring, see “Configuring Port Mirroring
to Analyze Traffic (CLI Procedure)” at the following address:
http://www.juniper.net/techpubs/en_US/junos10.1/topics/task/configuration/port-mir
roring-cli.html
In a Layer 2 environment, IBM j-type m-series Ethernet routers support port mirroring of
VPLS (family bridge or family VPLS) traffic. IBM j-type m-series Ethernet routers also support
port mirroring for Layer 2 VPNs.
For more information about Layer 2 mirroring and configuration guidance, see the JUNOS
Software IBM j-type m-series Ethernet Routers Layer 2 Configuration Guide, GA32-0708.
One application for port mirroring sends a duplicate packet to a virtual tunnel. A next-hop
group can then be configured to forward copies of this duplicate packet to several interfaces.
All IBM j-type m-series Ethernet routers support IPv4 and IPv6 mirroring and VPLS traffic
mirroring.
For more information about Layer 3 mirroring and configuration guidance, see the JUNOS
Software Policy Framework Configuration Guide, GA32-0704.
ibm@J08E-re0> ssh ?
Possible completions:
<host> Hostname or address of remote host
bypass-routing Bypass routing table, use specified interface
inet Force ssh to IPv4 destination
inet6 Force ssh to IPv6 destination
interface Name of interface for outgoing traffic
routing-instance Name of routing instance for ssh session
source Source address for ssh session
v1 Force ssh to try protocol version 1 only
v2 Force ssh to try protocol version 2 only
ibm@J08E-re0> ftp ?
Possible completions:
<host> Hostname or address of remote host
bypass-routing Bypass routing table, use specified interface
inet Force FTP to IPv4 destination
inet6 Force FTP to IPv6 destination
interface Name of interface for outgoing traffic
routing-instance Name of routing instance for FTP session
source Source address for FTP session
Table 14-1 shows the output fields of the show interfaces terse command.
Table 14-1 The output fields for the show interfaces terse command
Field name Description
Proto Protocol family configured on the logical interface. A logical interface on a router that
supports Ethernet object access method (OAM) always shows the multiservice
protocol.
The show interfaces extensive command shows all possible information about the
interfaces that are installed in the device. You can specify a particular interface as shown in
Example 14-10.
The real-time statistics are updated every second. The Current delta and Delta columns show
the amount that the statistics counters have changed since the monitor interface command
was entered or since you cleared the delta counters.
Table 14-2 lists the keys that you use to control the display.
n Shows information about the next interface. The device scrolls through the physical and
logical interfaces in the same order in which they are displayed by the show interfaces
terse command
f Freezes the display, halting the update of the statistics and delta counters.
t Thaws the display, resuming the update of the statistics and delta counters.
c Clears (returns to 0) the delta counters in the Current delta column. The statistics
counters are not cleared.
i Displays information about a different interface. You are prompted for the name of a
specific interface.
Attention: Using the monitor traffic command can degrade system performance. Use
filtering options, such as count and matching, to minimize the affect on packet throughput
on the system.
To limit the packet header information that is displayed by the monitor traffic command,
include the matching expression option.
For more information about monitor traffic command, see “monitor traffic” at the following web
address:
http://www.juniper.net/techpubs/en_US/junos10.1/information-products/topic-collect
ions/swcmdref-basics-services/topic-19319.html
Example 14-13 shows how to use the monitor traffic command to match TCP traffic.
When the device adds a record to the file specified by filename, the record is shown on the
panel. For example, if you configured a system log file named system-log (by including the
syslog statement at the [edit system] hierarchy level), you can enter the monitor start
system-log command to show the records that are added to the system log.
To see a list of files that are being monitored, enter the monitor list command. To stop the
display of records for a specified file, enter the monitor stop filename command. For more
information about configuring syslog, see Chapter 13, “System management” on page 409.
where:
package-name is the name of the package, for example jinstall-ex-4200.
m.n is the software release, with m representing the major release number
and n representing the minor release number, for example 9.5.
Z indicates the type of software release, where R indicates released
software and B indicates beta-level software.
x.y represents the version of the major software release (x) and an
internal tracking number (y), for example 1.6.
domestic-signed for most Junos packages, is used for the United States and Canada.
export-signed is used for worldwide distribution.
Use the command shown in Example 14-15 to run the snapshot feature.
System snapshots on IBM j-type e-series Ethernet switches have the following limitations:
You can only use snapshots to move files to external memory if the switch was started
from internal memory or to move files to internal memory if the switch was started from
external memory. You cannot create a snapshot in the memory source that started the
switch even if the snapshot is being created on a different partition in the same memory
source.
Snapshots are useful for moving files onto USB flash drives. You cannot use the copy
command or any other file-moving technique to move files from an internal memory
source to USB memory on the switch.
You cannot use snapshots to move files to any destination outside of the switch other than
an installed external USB flash drive or to move files between switches that are members
of the same virtual chassis.
The snapshot commands, similar to other virtual chassis commands, are always run on a
local switch. In cases where different member switches of the same Virtual Chassis
request the snapshot, the snapshot command is pushed to the Virtual Chassis member.
This action creates the snapshot, executed, and the output is then returned to the switch
that initiated the process.
For example, the command to create an external snapshot on Virtual Chassis member 3 is
entered from Virtual Chassis member 1. In this case, the snapshot of internal memory on
Virtual Chassis member 3 is taken on external memory on Virtual Chassis member 3. The
output of the process is seen from Virtual Chassis member 1. No files move between the
switches.
On routers without a CompactFlash card, where the hard disk drive is the primary boot
device, you cannot back up your software installation.
Important: On systems with dual Routing Engines, perform this operation on both Routing
Engines.
Install the new Junos software release on the backup Routing Engine while keeping the
currently running software version on the master Routing Engine. After verifying that the new
software version is running correctly on the backup Routing Engine, switch device control to
the backup Routing Engine. Finally, install the new software on the new backup Routing
Engine.
Ending the installation: To end the installation, do not restart your device. Instead,
finish the installation and then issue the following command:
request system software delete package-name-m.nZx-distribution.tgz
3. Verify that the default backup Routing Engine is now the master Routing Engine:
user@switch> show chassis routing-engine
{master}
ibm@J11M-re0> configure
{master}[edit]
ibm@J11M-re0# deactivate chassis redundancy graceful-switchover
{master}[edit]
ibm@J11M-re0# commit synchronize
re0:
configuration check succeeds
re1:
[edit groups re1 interfaces fxp0 unit 0 family inet]
'address 10.1.1.42/24'
warning: [edit system backup-router] not present. The default route for fxp0
is not installed.
[edit groups re1 interfaces fxp0 unit 0 family inet]
'address 10.1.1.40/24'
warning: [edit system backup-router] not present. The default route for fxp0
is not installed.
commit complete
ere0:
xcommit complete
[edit]
ibm@J11M-re0# exit
Exiting configuration mode
Example 14-18 shows steps from “Installing the software on the default master Routing
Engine” on page 516 that were performed on the default master Routing Engine. For brevity,
the no-validate option was used.
Resolving mastership...
Complete. The other Routing Engine becomes the master.
Shutdown NOW!
For more information about upgrading Junos software on the IBM j-type m-series Ethernet
router, see Installation and Upgrade Guide, GA32-0695.
For more information about upgrading Junos software on the IBM j-type e-series Ethernet
switch, see Complete Software Guide for JUNOS Software for EX Series Ethernet Switches,
Release 10.1.
Important: Junos software deletes the contents of the /var directory during software
upgrades. Therefore, you must back up the required files and logs externally.
You can view the directory structure of the device and the individual files by issuing the file
command in operational mode as shown in Example 14-19 on page 522. Use the list option
to see the directory structure of the router.
The default directory for the file list command is the home directory of the user logged in
to the router. In fact, the home directory of the user is the default directory for most of Junos
software commands that require a file name.
/var/home/ibm/:
.ssh/
To view the contents of other file directories, specify the directory location, as shown in
Example 14-20.
/config:
.snap/
juniper.conf.1.gz
juniper.conf.2.gz
juniper.conf.3.gz
juniper.conf.gz
license/
license.old/
rescue.conf.gz
usage.db
Example 14-21 shows how to use the context-sensitive help system of the router to locate a
directory.
To view the contents of a file, issue the file show command (Example 14-22).
To have a candidate configuration take effect, you commit the changes. The candidate file is
checked for the correct syntax, activated, and marked as the current, operational software
configuration file. If multiple users are editing the configuration, when you commit the
candidate configuration, all changes made by all the users take effect.
In addition to saving the current configuration, the CLI saves the current operational version
and the previous 49 versions of committed configurations. The most recently committed
configuration is version 0. This version is the current operational version, which is the default
configuration that the system returns to if you roll back to a previous configuration. The oldest
saved configuration is version 49.
The currently operational Junos software that is configuration is stored in the juniper.conf
file, and the last three committed configurations are stored in the juniper.conf.1,
juniper.conf.2, and juniper.conf.3 files. These four files are in the /config directory, which
is on the flash drive of the router. The remaining 46 previous versions of committed
To activate the configuration to which you rolled back, use the commit command:
ibm@J11M-re0# commit
where:
filename is the full path to a configuration file. The file must be in the correct
format, which is a hierarchy of statements.
n is the index into the list of previously committed configurations. The
most recently saved configuration is 0, and the oldest saved
configuration is number 49. If you do not specify arguments, the
candidate configuration is compared against the active configuration
file (/config/juniper.conf).
Example 14-24 shows the comparison between the active configuration and rollback 3
configuration.
To save software configuration changes to an ASCII file, use the save configuration mode
command:
ibm@J11M-re0# save day1config
Wrote 77 lines of configuration to 'day1config'
The contents of the current level of the statement hierarchy (and below) are saved, along with
the statement hierarchy that contains it. By using this method, a section of the configuration
can be saved, while fully specifying the statement hierarchy. By default, the configuration is
saved to a file in your home directory.
When you issue the save command from anywhere in the hierarchy (except the top level), a
replace tag is automatically included at the beginning of the file. You can use the replace tag
to control how a configuration is loaded from a file.
To load an existing configuration file that is on the router, use the load configuration mode
command. Example 14-25 shows the different options that are available with this command.
To load a configuration from the terminal, specify the terminal option. Press Ctrl+D to end the
input.
To replace an entire configuration, specify the override option at any level of the hierarchy.
The override option discards the current candidate configuration and loads the configuration
in filename or the one that you type at the terminal. When you use the override option and
commit the configuration, all system processes reparse the configuration.
To replace portions of a configuration, specify the replace option. For this operation to work,
you must include replace: tags in the file or configuration that you type at the terminal. The
software searches for the replace: tags, deletes the existing statements of the same name, if
any, and replaces them with the incoming configuration. If no existing statement of the same
name exists, the replace operation adds to the configuration the statements marked with the
replace: tag.
To replace only the configuration that has changed, specify the update option at any level of
the hierarchy. The update option compares the current configuration and the current
candidate configuration. It then loads only the changes between these configurations in
filename or the one that you type at the terminal. When you use the update option and
commit the configuration, the Junos software attempts to notify the smallest set of system
processes that are affected by the configuration change.
To combine the current configuration and the configuration in filename or the one that you
type at the terminal, specify the merge option. The merge option is useful when you are adding
a new section to an existing configuration. If the existing configuration and the incoming
configuration contain conflicting statements, the statements in the incoming configuration
override the statements in the existing configuration.
To change part of the configuration with a patch file and mark only those parts as changed,
specify the patch option.
For more information about this topic, see JUNOS Software CLI User Guide, GA32-0697-02.
When the Routing Engine detects an alarm condition, it lights the red or yellow alarm LED on
the craft interface as appropriate. To view a more detailed description of the alarm cause, use
the show chassis alarms command (Example 14-26).
The show chassis alarms command has two classes of alarm messages:
Chassis alarms indicate a problem with a chassis component such as the cooling system
or power supplies.
Interface alarms indicate a problem with a specific network interface.
Cabling
For cabling, consider the following practices:
Disable ports or disconnect cables before routers or switches are properly configured for
adding to the network. Connecting devices in their default configuration to a network can
cause undesirable results. Properly configure the device, and then enable or connect the
cables.
Do not mix 50 micron and 62.5 micron fiber optic cabling. Mixing fiber optic cables with
different core diameters in the same segment results in a loss of signal quality.
Label each end of the cable with the source and destination.
Use caution if securing cables with zip ties. Zip ties can exert excessive pressure on the
cable, which especially applies to fiber optic cabling.
Do not use cables longer than necessary. Excessive cable lengths make proper cable
management difficult.
Group cables in small bundles (4-6) if possible. Apply wraps along the bundle to keep the
bundles together. Usually 18–24 in. intervals between wraps are sufficient.
Use cabling trays and cable guides provided by racks or equipment where possible.
Keep cable connectors covered and ports plugged when they are not installed to prevent
dust contamination that might affect signal quality.
Do not exceed the bend radius for fiber cabling, which can result in a loss of signal quality.
The bend radius is determined by the cable manufacturer. However, generally the bend
radius is 10 times the diameter of the cables. A cable with a diameter of 3 mm might be
near 30 mm.
Be careful that rack doors or other moveable devices do not apply excessive force or bind
cables.
Route cables in a manner that supports the weight of the cables without causing cable
strain. Allow sufficient slack in the cabling to avoid strain. Use extra care in areas of high
temperatures that cause cables to be flexible.
Port configuration
For port configuration, consider the following practices:
When configuring 10/100 Mb links, configure ports on the device and switch port to the
same settings. If you are using autonegotiation, you must set the device network interface
card (NIC) and the switch port to autonegotiation. If static speed and duplex settings are
used, configure both the device NIC and the switch port for the desire speed and duplex
setting.
When you do not follow this practice, a condition known as duplex mismatch often results
(Table A-1).
Table A-1 Duplex mismatch
Switch duplex Device duplex
When a duplex mismatch condition occurs, traffic continues to be passed, but poor
performance is noticed. The interface of the link operating in half duplex mode indicates
collisions and excessive collisions. The interface of the link operating in full duplex mode
indicates Cyclic Redundancy Check (CRC) errors.
Use features that help prevent rogue devices from impacting the spanning tree within a
network. Such features as Bridge Protocol Data Units (BPDU) guard and root guard are
excellent tools to help protect the network from this type of threat.
The publications listed in this section are considered particularly suitable for a more detailed
discussion of the topics covered in this book.
IBM Redbooks
The following IBM Redbooks publications provide additional information about the topic in this
document. Note that some publications referenced in this list might be available in softcopy
only.
IBM j-type Data Center Networking Introduction, SG24-7820
IBM j-type Ethernet Appliance Implementation, SG24-7883
You can search for, view, or download Redbooks, Redpapers, Web Docs, draft, and additional
materials, as well as order hardcopy Redbooks publications, at the following website:
ibm.com/redbooks
Other publications
These publications are also relevant as further information sources:
IBM j-type Ethernet switches and related hardware documentation
– IBM Ethernet Switch J48E Complete Hardware Guide, GA32-0663
– IBM Ethernet Switch J48E Quick Start, GA32-0664
– IBM Ethernet Switch J08E Complete Hardware Guide, GA32-0665
– IBM Ethernet Switch J08E Quick Start, GA32-0666
– IBM Ethernet Switch J16E Complete Hardware Guide, GA32-0667
– IBM Ethernet Switch J16E Quick Start, GA32-0668
IBM j-type Ethernet routers and related hardware documentation
– IBM j-type m-series Ethernet Router Dense Port Concentrators (DPC) Guide,
GA32-0661
– IBM j-type m-series Ethernet Routing Engine Installation Instructions, GA32-0682
– IBM j-type m-series Ethernet Services PIC Guide, GA32-0662
– IBM Ethernet Router J02M Hardware Guide, GA32-0655
– IBM Ethernet Router J02M Quick Start, GA32-0656
– IBM Ethernet Router J06M Hardware Guide, GA32-0657
– IBM Ethernet Router J06M Quick Start, GA32-0658
– IBM Ethernet Router J11M Hardware Guide, GA32-0659
– IBM Ethernet Router J11M Quick Start, GA32-0660
– JUNOS Software IBM j-type m-series Ethernet Routers Solutions Guide, GA32-0683
Index 543
F hot-insertable 85
facility 467 hot-removable 85
fan condition 148 HTTP 113, 144
fan tray 84, 87 access 146
fast reroute 57 on all interfaces 146
Fast Reroute (FRR) HTTP over Secure Sockets Layer (HTTPS) 113,
MPLS 59 144–145
fault management 410 access 147
FCS (Frame Check Sequence) 16 certificate 147
FIB (Forwarding Information Base) 61 on all interfaces 147
fiber optic cabling 8 HTTPS (HTTP over Secure Sockets Layer) 113,
field-replaceable unit (FRU) 68, 70 144–145
filter duplicate SNMP requests 416 access 147
filtering duplicate 416 certificate 147
find command 158 on all interfaces 147
firewall filter 371, 411 hub 12
policies 411 hyperterminal 140
firewall-based analyzer 501
flapping 176 I
flash usage 148 IANA (Internet Assigned Numbers Authority) 321
flexible PIC concentrator 213 IBGP (internal BGP) 277, 302
flow control 208, 214 IBM Ethernet j-type routers 75
forging 381 IBM Ethernet Router J02M 51
form factor 43, 48–49 IBM Ethernet Router J06M 51
forwarding classes 335, 345 IBM Ethernet Router J11M 51
Forwarding Information Base (FIB) 61 IBM Ethernet Switch J08E 40, 44, 119
forwarding state 260 IBM Ethernet Switch J16E 40, 44, 49, 119
forwarding tables 276 IBM Ethernet Switch J48E 40–41, 119
frame 16 IBM j-type e-series Ethernet switches 39
Frame Check Sequence (FCS) 16 IBM j-type m-series Ethernet router 51
frame forwarding 20 ICMP (Internet Control Message Protocol) 374
FreeBSD UNIX operating system 109 traffic 376
FRR (Fast Reroute) idle 134–135, 137
MPLS 59 IEC (International Electrotechnical Commission) 69, 73
FRU (field-replaceable unit) 68, 70 IEEE (Institute of Electrical and Electronics Engineers)
FTP 503 390
full duplex 14, 209 IEEE 802.1 341
full mesh topology 118 code point 350
full-duplex 214 IEEE 802.1ad (DEI) code point 350
IEEE 802.1x
G authentication 401
GBIC (Gigabit Interface Converter) 11 IETF (Internet Engineering Task Force) 279, 291, 304,
Gigabit Ethernet (GbE) 41 371, 413
Gigabit Interface Converter (GBIC) 11 IETF standard 371
graceful restart 59 IGMP (Internet Group Management Protocol) 22, 322
Graceful Routing Engine Switchover (GRES) 42–44 snooping 322
graphical chassis 148 IGMPv1 322
GRES (Graceful Routing Engine Switchover) 42–44 IGMPv2 322
grounding cable 74 IGMPv3 322
guest host 406 IGP (Interior Gateway Protocol) 277–278, 287
inband management 124, 128–129, 368
inconsistency state 261
H inet (Internet) 276
half duplex 14, 209 informs 440
halt 493 ingress 372
hashing algorithm 26, 225 ingress firewall filter 372
health status 148 initial configuration 139
help reference 160 initial setup 139
help topic 159 initialization process 110
high-density 42 Institute of Electrical and Electronics Engineers (IEEE)
Index 545
point Discovery) 29, 41, 261, 263 discovery 306
capabilities 262 MBGP (multiprotocol BGP) 301
device class values 262 MBone (multicast backbone) 320
load configuration 167 MD5 (message-digest algorithm 5) 429
load rescue configuration 135 authentication 280
loading a configuration from a file 526 MDI (Medium Dependent Interface) 8
local area network (LAN) 3 MDIX (Medium Dependent Interface Crossover) 8
core 46 MED (Media Endpoint Discovery) 308
local endpoint address 307 Media Endpoint Discovery (MED) 308
local engine ID 428 Medium Dependent Interface (MDI) 8
local preference 309 Medium Dependent Interface Crossover (MDIX) 8
value 309 MEF 60
location independence 42 member ID 174–175, 188, 195
logical routers 57 numbering 174
loop protection 28, 260 member interfaces 226
loopback filter 374 memory utilization 148
loss priority 335 message-digest algorithm 5 (MD5) 429
LSA packet 288 authentication 280
LSP (label-switched path) 276 messages
lug specifications 74 to a console 470
to a remote machine 470
to a user terminal 470
M metric 281
MAC 177, 448 value 294
address 15, 17, 44, 48, 50, 239 value added 280
flooding 382 MF (multifield)
limiting 381–382, 390 classification 346, 361
move limiting 381, 384 classifiers 337, 343
spoofing 382 MGMT 100, 124
table 148 MIB (Management Information Base) 413, 420, 451
MAC/PHY configuration status 262 mid-plane 72
Maintain tab 151 minimum BGP configuration 305
maintenance 134, 136–137 minor alarm 138
MAINTENANCE MENU 125 mirrored port 501
major alarm 138 modular architecture 56
Manage Access page 129 monitor interface 508
management Monitor tab 150
address 262 monitor traffic 509
console 141 monitor VLAN 501
Ethernet interface 459 monitoring station 501
Ethernet port 201 monitoring system commands 511
IP address 129 MPLS 55, 59–60, 276
port 100 experimental code point 350
process 110 Fast Reroute (FRR) 59
services 374 network virtualization 57
virtualization 57 routing table 113
Management Information Base (MIB) 413, 420, 451 VPN 60
managing files 494 MPLS (Multiprotocol Label Switching)
master role 172–173 experimental 341
master switch 186, 188 MRP 60
mastership election 187 MST (Master) 138
algorithm 172 MSTI (multiple spanning tree instance) 252
process 176 MSTP (Multiple Spanning Tree Protocol) 26–27, 60, 247,
mastership priority 176, 187–188, 191, 204 252
setting 176 MTU (maximum transmission unit) 215, 262
value 176 discovery 306
match 158 multicast 16, 19–20, 60
Maximum Frame Size 262 address 320
maximum number of aggregated interfaces 226 data 245
maximum PoE wattage 218 forwarding cache 276
maximum transmission unit (MTU) 215, 262
Index 547
interface 217, 220 queues/port 44, 48, 50
policy 261
ports 69
power consumption 218 R
policers 335 racks 91
policing 346, 361 RADIUS (remote authentication dial-in user service) 371,
policy-based mirroring 501 394
port 208 accounting 393
densities 43, 59 client 395
description 262 server 402
firewall filter 372 Random Early Detection (RED) 334, 345, 352, 356
identifier 262 Rapid Spanning Tree Protocol (RSTP) 26–27, 60, 247,
mirroring 499, 503 249
priority 225 RED (Random Early Detection) 334, 345, 352, 356
security 381 Redbooks Web site 537
status 148 Contact us xvi
port VLAN 262 remote authentication dial-in user service (RADIUS) 371,
configuration 239 394
port-based network access control and authentication client 393, 395
390 server 402
POSIX standards 478 remote port mirroring 501
POST (power-on self-test) 119 repeater 12
power consumption 220 rescue configuration 495
power distribution module 52 restart 151, 492
power management mode 14, 217 system 135
Power over Ethernet (PoE) 14, 29, 41, 101, 208, 217 returning to a previously committed configuration 524
configuration 217 returning to the most recently committed configuration
controller 220 524
disabling 217 revert to factory default configuration 135
enabling 217 reverting 495
interface 217, 220 rewrite marking 361
policy 261 rewrite rules 335, 349
ports 69 RFCs 413, 452
power consumption 218 RIB (Routing Information Base) 61
power priority 218 RIP (Routing Information Protocol) 36, 60, 112, 275–276,
power specifications 68 278
Power via MDI 262 standards 279
power-on self-test (POST) 119 timers 282
PPL (per port limit) 14 update messages 281
preamble 16 RIPng 276
pre-emption 176 RJ45 connector 6
prefix length 141 RMON events 419
preprovisioned configuration 188 rollback 161
preprovisioning method 184 command 166
previous configurations 524 files 167
priority scheduling 353 root ports 260
privacy-enhanced mail (PEM) 145 root protection 28, 261
protocol analyzer application 501 rotating hard disk 139
protocol data unit (PDU) 447 route preferences 277, 294
protocol family 226 route table 36
protocol independent 373 routed VLAN interface (RVI) 245
Protocol Independent Multicast (PIM) 60, 112 router firewall filter 372
protocol-timeouts 423 Routing Engine 42–44, 46–47, 52, 86, 109, 122, 134,
public-private key 145 139, 371
PuTTy 140 active 173
integrated 43
kernel 110
Q module 49
QoS (quality of service) 56–57, 59–60, 333 Routing Information Base (RIB) 61
queues/port 44, 48, 50 Routing Information Protocol (RIP) 36, 60, 112, 275–276,
quality of service (QoS) 56–57, 59–60, 333 278
Index 549
Start Frame Delimiter (SFD) 16 Terminal Access Controller Access Control System Plus
stateful firewall 60 (TACACS+) 371
static routes 142, 275, 317 terminal emulator 123
statistical sampling 501 text string 473
status 134–135, 137 throttle interval 414
status LEDs 133, 137 throttle threshold 414
STP (Shielded Twisted-Pair) 5 throughput 48–49, 60
STP (Spanning Tree Protocol) 26, 247–248 TIA-598C standard 9
string, adding 474 time zone 124
structured-data 469 timer 423
structured-data format 469 TLV (Type Length Value) 29, 261
stub areas 290 top of rack 41
subagent 423, 459 top of rack deployment 180
subnet mask 35 Topology Change Notification (TCN) 27
summary screen 130 total cost of ownership (TCO) 182
supplicant 390 trace files 512
modes 392 trace operations 422
switch control board 52 traceroute 152, 498
Switch Fabric 47 transceiver 11
Switch Fabric and Routing Engine (SRE) 47–48, 122, transit areas 290
124, 134 transmission rate 353
switched segment 13 trap notification filter 441, 445
SYN flood DoS attack 369 trap target address 442
synchronization 112 trap target parameters 445
syntax traps 440
checker 155 Triple DES 431
checking 155 Troubleshoot tab 152
SYS (System) 138 troubleshooting tools 152
system trunk 242
commands 511 interface 242
date and time 124 port 242, 381
halt 135 trusted DHCP server 381
information 148 trusted host 396
logging severity levels 414 tunnel 321
name 148, 262, 417 tunnel-medium type 397, 399
snapshot 513 Tunnel-Private-Group-ID 397, 399
warm and cold starts 419 tunnel-type 397, 399
system log 512 twisted pair 101
messages 410, 464 twisted-pair cabling 5
system log message 488 twisted-pair crossover 7
interpretation 480, 486 two-color marking 347
two-rate tricolor marking 347
Type Length Value (TLV) 29, 261
T type of service 287
TACACS (Terminal Access Controller Access Control
System) 371
TACACS+ (Terminal Access Controller Access Control U
System Plus) 371 UDP (User Datagram Protocol) 279
tag 451 port 443
list 443 unicast 16, 19
tagged frames 24 address 320
tail drop profile 360 data 245
target parameters 444, 446 frame 21–22
TCN (Topology Change Notification) 27 routing table 112, 276
TCO (total cost of ownership) 182 unique ID 225
Telco racks 91 UNIX-based operating system kernel 152
Telnet 123, 129, 132, 153, 368, 503 Unshielded Twisted-Pair (UTP) 5
temperature 148 untagged factory default VLAN 237
sensors 84 upgrading Junos software 514
Terminal Access Controller Access Control System (TA- uplink module 171
CACS) 371 USB flash drive 139
Index 551
552 Implementation of IBM j-type Ethernet Switches and Routers
Implementation of IBM j-type
Ethernet Switches and Routers
Implementation of IBM j-type Ethernet
Switches and Routers
(1.0” spine)
0.875”<->1.498”
460 <-> 788 pages
Implementation of IBM j-type Ethernet Switches and Routers
Implementation of IBM j-type Ethernet Switches and Routers
Implementation of IBM j-type
Ethernet Switches and Routers
Implementation of IBM j-type
Ethernet Switches and Routers
Back cover ®
Implementation of
IBM j-type Ethernet
Switches and Routers ®
Introduction to IBM j-type data center solutions running Junos software (from Juniper
Networks) provide operational agility and efficiency, dramatically INTERNATIONAL
Ethernet
simplifying the network and delivering savings. With this solution, a TECHNICAL
fundamentals and
network design has fewer devices, interconnections, and network tiers. SUPPORT
IBM j-type Ethernet Beyond the cost advantages, the design offers the following key benefits: ORGANIZATION
switches and routers
Reduces latency
Simplifies device management
Introduction to Junos Delivers significant power, cooling, and space savings
software and the Eliminates multiple system failure points
command-line Performs pervasive security BUILDING TECHNICAL
interface INFORMATION BASED ON
The high-performance data center is built around IBM j-type e-series PRACTICAL EXPERIENCE
Ethernet switches, m-series routers, and s-series firewalls. This new family
Guidance for of powerful products helps to shape the next generation of dynamic IBM Redbooks are developed
planning, installation, infrastructure. IBM j-type e-series Ethernet switches meet escalating by the IBM International
and configuration demands while controlling costs. IBM j-type m-series Ethernet routers are Technical Support
high-performance routers with powerful switching and security capabilities. Organization. Experts from
This IBM Redbooks publication targets IT professionals who sell, design,
IBM, Customers and Partners
from around the world create
or administer IBM j-type networking solutions. It provides information timely technical information
about IBM j-type Ethernet switches and routers and includes the following based on realistic scenarios.
topics: Specific recommendations
Introduction to Ethernet fundamentals and IBM j-type Ethernet are provided to help you
switches and routers implement IT solutions more
Initial hardware planning and configuration
effectively in your
environment.
Other configuration topics including Virtual Chassis configuration,
Layer 1, Layer 2, and Layer 3 configurations, and security features
Network management features of Junos software and maintenance of
the IBM j-type series hardware
For more information:
ibm.com/redbooks