Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
IGP - CONFIGURATION GUIDE V11.1.X
Juniper IGP - CONFIGURATION GUIDE V11.1.X Manuals
Manuals and User Guides for Juniper IGP - CONFIGURATION GUIDE V11.1.X. We have
1
Juniper IGP - CONFIGURATION GUIDE V11.1.X manual available for free PDF download: Configuration Manual
Juniper IGP - CONFIGURATION GUIDE V11.1.X Configuration Manual (454 pages)
Software for E Series Broadband Services Routers IP, IPv6, and IGP Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 4.25 MB
Table of Contents
Table of Contents
9
About the Documentation
21
Audience
21
Documentation Feedback
21
E Series and Junose Documentation and Release Notes
21
E Series and Junose Text and Syntax Conventions
21
Obtaining Documentation
21
Requesting Technical Support
21
Table 1: Notice Icons
22
Table 2: Text and Syntax Conventions
22
About the Documentation
23
Opening a Case with JTAC
24
Self-Help Online Tools and Resources
24
Part 1 Internet Protocol
25
Chapter 1 Configuring IP
25
Internet Protocol
25
Internet Protocol
26
Configuring IP
27
Overview
27
IP Packets
28
IP Functions
28
Moving Data between Layers
28
Routing Datagrams to Remote Hosts
28
Fragmenting and Reassembling Datagrams
28
IP Layering
29
Network Interface Layer
29
Internet Layer
29
Transport Layer
29
Application Layer
29
Figure 1: TCP/IP Conceptual Layers
29
Platform Considerations
30
References
30
IP Addressing
31
Physical and Logical Addresses
31
Internet Addresses
32
Figure 2: IP Address Classes
32
Subnetwork Mask Format Options
33
Subnet Addressing
33
Classless Addressing with CIDR
34
Figure 3: Basic Network Masking
34
Figure 4: Subnetting
34
Adding and Deleting Addresses
35
Adding a Primary Address
35
Figure 5: Routing with and Without CIDR
35
Deleting a Primary Address
36
Adding a Secondary (Multinet) Address
36
Deleting a Secondary Address
36
Ip Address Command
36
IP Features
31
Figure 6: Direct Next Hops
37
Figure 7: Indirect Next Hops
37
Indirect Next-Hop Support
37
Before You Configure IP
38
Creating a Profile
38
Assigning a Profile
41
Address Resolution Protocol
42
How ARP Works
42
Figure 8: Sample ARP Process 1 through 3
43
Figure 9: Sample ARP Process 4 and 5
43
MAC Address Validation
46
Broadcast Addressing
47
Broadcast Tasks
48
Fragmentation
48
IP Routing
49
Routing Information Tables
49
Figure 10: Routers in a Small Network
50
Setting the Administrative Distance for a Route
51
Table 3: Routing Table for Router NY
51
Table 4: Routing Table for Router la
51
Table 5: Default Administrative Distances for Route Sources
51
Setting the Metric for a Route
53
Routing Operations
53
Identifying a Router Within an Autonomous System
53
Establishing a Static Route
53
Configuring Static Routes with Indirect Next Hops
54
Figure 11: Static Routes with Indirect Next Hops
54
Verifying Next Hops for Static Routes
55
How BFD Next-Hop Verification Works
55
BFD Next Hop Verification Configuration Example
56
How RTR Next-Hop Verification Works
57
RTR Configuration Example
57
Configuring RTR Next-Hop Verification
58
Figure 12: Sample Configuration for Next-Hop Verification
58
Table 6: Next-Hop Verification Results for Sample Configuration
58
Setting up Default Routes
63
Setting up an Unnumbered Interface
63
Adding a Host Route to a Peer on a PPP Interface
63
Enabling Source Address Validation
64
Enabling Source Address Validation Traps
64
Defining TCP Maximum Segment Size
65
Setting MSS for TCP Connections
65
Configuring IP Path MTU Discovery
66
Enabling PMTU Discovery
66
Limiting PMTU
67
Specifying Black Hole Thresholds
68
Shutting down an IP Interface
68
Removing the IP Configuration
68
Clearing IP Routes
69
Clearing IP Interfaces
69
Setting a Baseline
70
Disabling Forwarding of Packets
70
Enabling Forwarding of Source-Routed Packets
70
Forcing an Interface to Appear up
71
Specifying a Debounce Time
71
Adding a Description
72
Enabling Link Status Traps
72
Configuring the Speed
73
Configuring Equal-Cost Multipath Load Sharing
73
Defining Maximum Paths
73
Round-Robin Mode
73
Fast Reroute Protection
74
Setting a TTL Value
75
Protecting against TCP RST or SYN Dos Attacks
75
Preventing TCP PAWS Timestamp Dos Attacks
76
Protecting against TCP out of Order Dos Attacks
77
Limiting Buffers Per Router
77
Limiting Buffers Per Virtual Router
78
Limiting Buffers Per Connection
79
Distributing Routing Table Updates to Line Modules
79
IP Tunnel Routing Table
80
Shared IP Interfaces
80
Configuring Shared IP Interfaces
81
Moving IP Interfaces
83
IP Shared Interface Statistics
83
Subscriber Interfaces
83
Internet Control Message Protocol
83
ICMP Tasks
84
Specifying a Source Address for ICMP Messages
85
Reachability Commands
86
Response Time Reporter
89
Configuration Tasks
89
Configuring the Probe Type
90
Configuring Optional Characteristics
91
Table 7: Probe Characteristics
91
Capturing Statistics
93
Collecting History
94
Setting the Receiving Interface
94
Setting Reaction Conditions
94
Scheduling the Probe
96
Shutting down the Probe
97
Monitoring RTR
98
Monitoring IP
103
System Event Logs
103
Establishing a Baseline
104
IP Show Commands
105
Configuring Ipv6
149
Ipv6 Overview
149
Ipv6 Packet Headers
150
Ipv4 and Ipv6 Header Differences
150
Standard Ipv6 Headers
151
Extension Headers
151
Figure 13: Ipv4 and Ipv6 Header Comparison
151
Configuring Ipv6
151
Ipv6 Addressing
152
Address Representation
152
Table 8: Compressed Ipv6 Formats
152
Address Types
153
Address Scope
154
Address Structure
154
ICMP Support
155
Ipv6 Tunnel Routing Table
155
Indirect Next Hop Support
155
Figure 14: Direct Next Hops
156
Figure 15: Indirect Next Hops
156
Platform Considerations
156
Before You Configure Ipv6
157
References
157
Configuring an Ipv6 License
158
Creating an Ipv6 Profile
158
Assigning a Profile
161
Enabling Source Address Validation
161
Establishing a Static Route
162
Specifying an Ipv6 Hop Count Limit
162
Managing Ipv6 Interfaces
163
Configuring Shared Ipv6 Interfaces
165
Adding a Description
167
Ipv6 TCP Configuration
167
Setting MSS for TCP Connections
167
Configuring Path MTU Discovery
168
Enabling PMTU Discovery
168
Limiting PMTU
169
Specifying Black Hole Thresholds
170
Protecting against TCP RST or SYN Dos Attacks
170
Preventing TCP PAWS Timestamp Dos Attacks
171
Protecting against TCP out of Order Dos Attacks
172
Limiting Buffers Per Router
172
Limiting Buffers Per Virtual Router
173
Limiting Buffers Per Connection
173
Configuring Equal-Cost Multipath Load Sharing
174
Hashed Mode
174
Defining Maximum Paths
174
Fast Reroute Protection
175
Removing an Ipv6 Configuration
175
Clearing Dynamic Ipv6 Neighbors
176
Clearing Ipv6 Routes
176
Creating Static Ipv6 Neighbors
176
Monitoring Ipv6
177
System Event Logs
177
Establishing a Baseline
177
Ipv6 Show Commands
179
Configuring Neighbor Discovery
217
Overview
217
Before You Configure Neighbor Discovery
218
Platform Considerations
218
References
218
Configuring Neighbor Discovery
219
Using Ipv6 Profiles and RADIUS to Configure Neighbor Discovery Route Advertisements
220
Ipv6 Profile-Based Configuration
220
RADIUS-Based Configuration
221
Configuring Proxy Neighbor Advertisements
224
Configuring Duplicate Address Detection Attempts
225
Monitoring Neighbor Discovery
226
Part 2 Internet Protocol Routing
227
Chapter 5 Configuring OSPF
227
Chapter 6 Configuring IS-IS
227
Chapter 4 Configuring RIP
229
Overview
229
RIP Metric
229
RIP Messages
230
Platform Considerations
230
Features
231
Route Tags
231
Authentication
231
Subnet Masks
232
Next Hop
233
Multicasting
233
Route Summaries
233
Split Horizon
234
Equal-Cost Multipath
234
Applying Route Maps
234
References
231
Before You Run RIP
234
Configuration Tasks
234
Relationship between Address and Network Commands
237
Clearing Dynamic RIP Interfaces
247
Enabling RIP on Dynamic IP Interfaces
247
Configuring the BFD Protocol for RIP
248
Using RIP Routes for Multicast RPF Checks
248
Remote Neighbors
250
Monitoring RIP
253
Debug Commands
254
Show Commands
254
Configuring OSPF
265
Overview
266
OSPF Terms
266
Table 9: OSPF-Related Terms
266
Figure 16: OSPF Topology
269
Platform Considerations
269
Features
270
Intra-Area, Interarea, and External Routes
270
Routing Priority
271
Virtual Links
271
Authentication
271
Table 10: Routing Priority
271
Opaque Lsas
272
Route Leakage
272
Equal-Cost Multipath
272
Ospf Mib
272
Interacting with Other Routing Protocols
272
Implementing OSPF for Ipv6
273
Understanding the Ospfv3 Difference
273
Supported LSA Types
274
Unsupported OSPF Components
274
References
270
OSPF Configuration Tasks
275
Starting OSPF
275
Enabling Ospfv2
275
Enabling Ospfv3
276
Creating a Range of OSPF Interfaces
276
Creating a Single Ospfv2 Interface
278
Specifying an OSPF Router ID
279
Aggregating OSPF Networks
280
Configuring OSPF Interfaces
281
Address Commands
282
Ip Ospf and Ipv6 Ospf Commands
285
Comparison Example
289
Precedence of Commands
290
Configuring OSPF Areas
290
Optimizing the Cost to Reach a Range of OSPF Routers Within an Area
294
Figure 17: Optimizing OSPF Area Aggregate Costs
295
Configuring Authentication
296
Authentication Requirements
296
Configuring the BFD Protocol for OSPF
300
Configuring Additional Parameters
302
Table 11: Additional Configuration Tasks
302
Methods for Calculating OSPF Interface Cost
311
Table 12: Methods and Precedence for Calculating OSPF Interface Cost
311
Configuring OSPF for NBMA Networks
312
Default Metrics
312
Traffic Engineering
314
Configuring OSPF for Traffic Engineering
314
Using OSPF Routes for Multicast RPF Checks
315
OSPF and BGP/MPLS Vpns
316
Remote Neighbors
316
Remote Neighbors and Sham Links
320
Configuring OSPF Graceful Restart
320
Configuring OSPF Traps
323
Disabling and Reenabling Incremental SPF
323
Monitoring OSPF
324
Debug Commands
324
Show Commands
326
Neighbor Uptime Tracking
324
Configuring IS-IS
349
Overview
349
IS-IS Terms
350
Table 13: IS-IS Terms
350
Figure 18: Overview of IS-IS Topology
351
ISO Network Layer Addresses
352
Level 1 Routing
352
Level 2 Routing
352
Dynamic Hostname Resolution
352
Authentication
353
Simple Authentication
353
HMAC MD5 Authentication
354
MD5 Authentication Example
354
Specifying MD5 Start and Stop Timing
355
Figure 19: Packet Flow between Routers with and Without Authentication Set
355
Halting MD5 Authentication
356
Managing and Replacing MD5 Keys
356
Enabling and Disabling Authentication of Csnps and Psnps
356
Extensions for Traffic Engineering
357
Integrated IS-IS
358
Equal-Cost Multipath
358
Static PPP Interfaces
358
Route Tags
358
Route Tag Applications
358
Route Tag Structure
359
Setting Route Tags
359
Table 14: Configuration Tasks for Setting IS-IS Route Tags
359
Using Route Tags
360
Unsupported Features
360
Graceful Restart
361
Features
361
How Graceful Restart Works
362
Table 15: IS-IS Graceful Restart Timers
362
IS-IS for Ipv6
363
Platform Considerations
363
References
363
Features
364
Before You Run IS-IS
365
Configuration Tasks
365
Enabling IS-IS for IP Routing
365
Summary Example
367
Enabling and Configuring IS-IS for Ipv6 Routing
367
Summary Example
369
Configuring IS-IS Interface-Specific Parameters
370
Configuring Authentication
370
Configuring Link-State Metrics
371
Configuring a Reference Bandwidth to Set a Default Metric
371
Setting the CSNP Interval
372
Configuring Hello Packet Parameters
372
Padding IS-IS Hello Packets
374
Configuring LSP Parameters
374
Setting the Designated Router Priority
375
Configuring Passive Interfaces
376
Configuring Adjacency
377
Configuring Route Tags for IS-IS Interfaces
378
Configuring Point-To-Point-Over-LAN Circuits
379
Summary Example
380
Configuring Global IS-IS Parameters
381
Setting Authentication Passwords
381
Configuring Authentication of Csnps and Psnps
382
Configuring Redistribution
383
Redistributing Routes between Levels
386
Figure 20: Example of Level 1 and Level 2 Routing
386
Controlling Granularity of Routing Information
388
Configuring a Global Default Metric
388
Configuring Metric Type
389
Setting the Administrative Distance
390
Configuring Default Routes
391
Setting Router Type
392
Summarizing Routes
392
Avoiding Transient Black Holes
393
Waiting for BGP Convergence
394
Example Topology
394
Figure 21: Transit Router Topology
394
Suppression for IS-IS Graceful Restart
395
Configuration
395
Ignoring LSP Errors
396
Logging Adjacency State Changes
397
Configuring LSP Parameters
397
Specifying the SPF Interval
399
Defining the SPF Route Calculation Level
400
Setting CLNS Parameters
401
Setting the Maximum Parallel Routes
402
Configuring a Virtual Multiaccess Network
402
Configuring Table Maps
403
Configuring Graceful Restart
403
Summary Example
407
Configuring IS-IS for MPLS
407
Configuring the BFD Protocol for IS-IS
409
Using IS-IS Routes for Multicast RPF Checks
409
Disabling the IS-IS Protocol
410
Monitoring IS-IS
411
System Event Logs
411
Monitoring IS-IS Parameters
412
Displaying CLNS
424
Part 3 Index
439
Index
441
Advertisement
Advertisement
Related Products
Juniper IP - CONFIGURATION GUIDE V11.1.X
Juniper IPV6 - CONFIGURATION GUIDE V11.1.X
Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - IP-IPV6-IGP CONFIGURATION GUIDE 2010-10-31
Juniper NETWORK AND SECURITY MANAGER NSMXPRESS SERIES II - REV1
Juniper IP SERVICES - CONFIGURATION GUIDE V 11.1.X
Juniper IDP 8200
Juniper IDP 50
Juniper IDP 1100C
Juniper IDP 1100F
Juniper ISG 2000
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL