Вы находитесь на странице: 1из 768

Do

Junos Enterprise Routing

SECOND EDITION

Junos Enterprise Routing

SECOND EDITION Junos Enterprise Routing Beijing • Cambridge • Farnham • Köln • Sebastopol • Tokyo

Beijing Cambridge Farnham Köln Sebastopol Tokyo

Junos Enterprise Routing, Second Edition

Editor:

Development Editor:

Production Editor:

Copyeditor:

Proofreader:

Printing History:

Indexer:

Cover Designer:

Interior Designer:

Illustrators:

Table of Contents

About the Authors . . . . . . . . . . . .
About the Authors
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
xiii
Preface
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
xv
1. Junos in the Enterprise Network
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
2. Enterprise Design
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29

3. Juniper Switching and Routing Platforms . . . . . . . . .
3. Juniper Switching and Routing Platforms
.
.
.
.
.
.
.
.
.
.
.
.
53
4. Interfaces
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
79

5. Protocol Independent Properties and Routing Policy

.

.

.

.

.

.

.

121

 

6. Interior Gateway Protocols and Migration Strategies

.

.

.

.

.

.

.

167

7. Border Gateway Protocol and Enterprise Routing Policy

.

249

8.

Access Security

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

341

9. Junos Layer 2 Services . . . . . . . . . .
9.
Junos Layer 2 Services
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
395
10.
Class of Service
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
421

11. IP Multicast in the Enterprise

.

.

.

.

.

517

12. Junos Security Services . . . . . . . . . . .
12. Junos Security Services
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
595
A. Junos Layer 3 Services
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
645
B. Upgrading Junos
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
705
Index
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
715

About the Authors

About the Technical Reviewers, Second Edition

About the Lead Technical Reviewers, First Edition

Preface

What Is Enterprise Routing?

Juniper Networks Technical Certification Program (JNTCP)

How to Use This Book

What’s in This Book?

Topology of This Book

xxii

|

Preface

Do

xxii | Preface D o

Conventions Used in This Book

Constant width

Constant width bold

Constant width italic

Used in This Book Constant width Constant width bold Constant width italic Using Code Examples Preface

Using Code Examples

Safari® Books Online

Safari® Books Online How to Contact Us xxiv | Preface

How to Contact Us

Acknowledgments

From the First Edition

From Doug Marschke

From Harry Reynolds

For the Second Edition

From Doug Marschke and Harry Reynolds

From Peter Southwick

CHAPTER 1

Junos in the Enterprise Network

Introduction to Junos Enterprise Routing

Junos Overview 2 | Chapter 1: Junos in the Enterprise Network

Junos Overview

Junos Overview 2 | Chapter 1: Junos in the Enterprise Network

show system processes

show system processes Introduction to Junos Enterprise Routing | 3

Junos Releases Product FRS date EOE End of Life (EOL) Junos 10.4 12/08/2010 12/08/2013 06/08/2014

Junos Releases

Product

FRS date

EOE

End of Life (EOL)

Junos 10.4

12/08/2010

12/08/2013

06/08/2014

Junos 10.3

08/15/2010

05/15/2011

11/15/2011

Junos 10.2

05/15/2010

02/15/2011

08/15/2011

Junos 10.1

02/15/2010

11/15/2010

05/15/2011

Junos 10.0

11/15/2009

11/15/2012

05/15/2013

Junos 9.6

08/06/2009

05/06/2010

11/06/2010

Junos 9.5

04/14/2009

02/15/2010

08/15/2010

Junos 9.4

02/11/2009

11/11/2009

05/11/2010

Junos 9.3

11/14/2008

11/14/2011

05/14/2012

Junos 9.2

08/12/2008

05/12/2009

11/12/2009

Junos 9.1

04/28/2008

01/28/2009

07/28/2009

Junos 9.0

02/15/2008

11/15/2008

05/15/2009

Introduction to Junos Enterprise Routing | 5

Introduction to Junos Enterprise Routing | 5

CLI Review 6 | Chapter 1: Junos in the Enterprise Network

CLI Review 6 | Chapter 1: Junos in the Enterprise Network

CLI Review

General CLI features

General CLI features run show route run show route > username @ hostname doug Hops Hops

run show route run show route

> username@hostname doug Hops

Hops (ttyd0) login: doug Password:

--- Junos 10.4R1.9 built 2010-12-08 16:25:40 UTC doug@Hops>

root

Hops (ttyd0) login: root Password:

--- Junos 10.4R1.9 built 2010-12-08 09:22:36 UTC root@Hops% cli root@Hops>

request restart test

restart configure # doug@Hops> configure Entering configuration mode [edit] doug@Hops# configure

restart

configure #

doug@Hops> configure Entering configuration mode [edit] doug@Hops#

configure exclusive configure private configure exclusive

set

doug@Hops# set system services telnet

delete

set

doug@Hops# delete system services telnet

replace pattern

doug@Hops# replace pattern 10.1.1.1/32 with 10.1.1.1/24

insert

doug@Hops# insert policy permit_all before policy deny_all

save

doug@Hops# save test_configuration

edit

[edit] doug@Hops# edit system services [edit system services] doug@Hops#

exit

up

[edit system services] doug@Hops# exit [edit system] doug@Hops# up [edit] doug@Hops# exit doug@Hops>

rename

doug@Hops# rename interface ge-0/0/1 to interface ge-10/0/1

copy

doug@Hops# copy interface ge-0/0/1 to ge-0/0/2

commit

doug@Hops# commit

Routing Features

doug@Hops> show route

inet.0: 23 destinations, 23 routes (22 active, 0 holddown, 1 hidden) + = Active Route, - = Last Active, * = Both

1.12.1.0/24

*[Direct/0] 00:33:41

>

via ge-1/0/0.0

1.12.1.1/32

*[Local/0] 00:33:41

10.255.66.0/24

Local via ge-1/0/0.0 *[OSPF/10] 00:32:53, metric 1

>

to 1.12.1.2 via ge-1/0/0.0

192.168.102.0/23

*[Static/5] 5d 02:42:28

> to 192.168.71.254 via ge-1/0/0.0

*

doug@Hops> show route forwarding-table destination 10.255.66.1 Routing table: inet Internet:

Destination

10.255.66.0/24 user

Type RtRef Next hop

0 1.12.1.2

Type Index NhRef Netif

ucst

286

2 ge-1/0/.0

Routing modifiers

Switching Features

Ethernet-switching

Security Features

Security Features 14 | Chapter 1: Junos in the Enterprise Network