Junos OS: MPLS Feature Guide For Security Devices
Junos OS: MPLS Feature Guide For Security Devices
Modified: 2017-11-15
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS MPLS Feature Guide for Security Devices
Copyright © 2017 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that
EULA.
Part 1 Overview
Chapter 1 Introduction to MPLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
MPLS Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Label Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Label-Switched Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Label-Switching Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Label Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Penultimate Hop Popping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
LSP Establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Static LSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Dynamic LSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
MPLS Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Example: Deleting Security Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Example: Enabling MPLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Link Coloring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Example: Configuring RSVP-Signaled LSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Understanding Point-to-Multipoint LSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Point-to-Multipoint LSP Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Example: Configuring a Collection of Paths to Create an RSVP-Signaled
Point-to-Multipoint LSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• SRX345
• SRX340
• SRX320
• SRX300
• SRX550M
• SRX1500
• SRX4200
• SRX4100
• vSRX
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see CLI Explorer.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xiv defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page of the Juniper Networks TechLibrary site
at http://www.juniper.net/techpubs/index.html, simply click the stars to rate the content,
and use the pop-up form to provide us with information about your experience.
Alternately, you can use the online feedback form at
http://www.juniper.net/techpubs/feedback/.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://entitlementsearch.juniper.net/entitlementsearch/
Overview
• Introduction to MPLS on page 3
Introduction to MPLS
MPLS Overview
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
The MPLS framework supports traffic engineering and the creation of virtual private
networks (VPNs). Traffic is engineered (controlled) primarily by the use of signaling
protocols to establish label-switched paths (LSPs). VPN support includes Layer 2 and
Layer 3 VPNs and Layer 2 circuits.
When you enable your device to allow MPLS traffic, the device performs packet-based
processing and functions as a standard Junos router.
Label Switching
In a traditional IP network, packets are transmitted with an IP header that includes a
source and destination address. When a router receives such a packet, it examines its
forwarding tables for the next-hop address associated with the packet's destination
address and forwards the packet to the next-hop location.
In an MPLS network, each packet is encapsulated with an MPLS header. When a router
receives the packet, it copies the header as an index into a separate MPLS forwarding
table. The MPLS forwarding table consists of pairs of inbound interfaces and path
information. Each pair includes forwarding information that the router uses to forward
the traffic and modify, when necessary, the MPLS header.
Because the MPLS forwarding table has far fewer entries than the more general forwarding
table, the lookup consumes less processing time and processing power. The resultant
savings in time and processing are a significant benefit for traffic that uses the network
to transit between outside destinations only.
Label-Switched Paths
Label-switched paths (LSPs) are unidirectional routes through a network or autonomous
system (AS). In normal IP routing, the packet has no predetermined path. Instead, each
router forwards a packet to the next-hop address stored in its forwarding table, based
only on the packet's destination address. Each subsequent router then forwards the
packet using its own forwarding table.
In contrast, MPLS routers within an AS determine paths through a network through the
exchange of MPLS traffic engineering information. Using these paths, the routers direct
traffic through the network along an established route. Rather than selecting the next
hop along the path as in IP routing, each router is responsible for forwarding the packet
to a predetermined next-hop address.
R1 C2 AS 65020
R2
R3 R4
C1
g015525
AS 65010
In the topology shown in Figure 1 on page 5, traffic is forwarded from Host C1 to the
transit network with standard IP forwarding. When the traffic enters the transit network,
it is switched across a preestablished LSP through the network. In this example, an LSP
might switch the traffic from Router R4 to Router R2 to Router R1. When the traffic exits
the network, it is forwarded to its destination by IP routing protocols.
Label-Switching Routers
Routers that are part of the LSP are label-switching routers (LSRs). Each LSR must be
configured with MPLS so that it can interpret MPLS headers and perform the MPLS
operations required to pass traffic through the network. An LSP can include four types
of LSRs:
• Inbound router—The only entry point for traffic into MPLS. Native IPv4 packets are
encapsulated into the MPLS protocol by the inbound router. Each LSP can have only
one inbound router. Inbound routers are also known as ingress routers.
• Transit router—Any router in the middle of an LSP. An individual LSP can contain
between 0 and 253 transit routers. Transit routers forward MPLS traffic along the LSP,
using only the MPLS header to determine how the packet is routed.
• Outbound router—The endpoint for the LSP. The outbound router receives MPLS
packets from the penultimate router and performs an IP route lookup. The router then
forwards the packet to the next hop of the route. Each LSP can have only one outbound
router. Outbound routers are also known as egress routers.
Labels
To forward traffic through an MPLS network, MPLS routers encapsulate packets and
assign and manage headers known as labels. A label is a 20–bit unsigned integer in the
range 0 through 1,048,575. The routers use the labels to index the MPLS forwarding
tables that determine how packets are routed through the network.
When a network's inbound router receives traffic, it inserts an MPLS label between the
IP packet and the appropriate Layer 2 header for the physical link. The label contains an
index value that identifies a next-hop address for the particular LSP. When the next-hop
transit router receives the packet, it uses the index in the MPLS label to determine the
next-hop address for the packet and forwards the packet to the next router in the LSP.
As each packet travels through the transit network, every router along the way performs
a lookup on the MPLS label and forwards the packet accordingly. When the outbound
router receives a packet, it examines the header to determine that it is the final router in
the LSP. The outbound router then removes the MPLS header, performs a regular IP route
lookup, and forwards the packet with its IP header to the next-hop address.
Label Operations
Each LSR along an LSP is responsible for examining the MPLS label, determining the LSP
next hop, and performing the required label operations. LSRs can perform five label
operations:
• Push—Adds a new label to the top of the packet. For IPv4 packets arriving at the
inbound router, the new label is the first label in the label stack. For MPLS packets with
an existing label, this operation adds a label to the stack and sets the stacking bit to
0, indicating that more MPLS labels follow the first.
When it receives the packet, the inbound router performs an IP route lookup on the
packet. Because the route lookup yields an LSP next hop, the inbound router performs
a label push on the packet, and then forwards the packet to the LSP next hop.
• Swap—Replaces the label at the top of the label stack with a new label.
When a transit router receives the packet, it performs an MPLS forwarding table lookup.
The lookup yields the LSP next hop and the path index of the link between the transit
router and the next router in the LSP.
• Pop—Removes the label from the top of the label stack. For IPv4 packets arriving at
the penultimate router, the entire MPLS label is removed from the label stack. For
MPLS packets with an existing label, this operation removes the top label from the
label stack and modifies the stacking bit as necessary—sets it to 1, for example, if only
a single label remains in the stack.
If multiple LSPs terminate at the same outbound router, the router performs MPLS
label operations for all outbound traffic on the LSPs. To share the operations among
multiple routers, most LSPs use penultimate hop popping (PHP).
• Multiple push—Adds multiple labels to the top of the label stack. This action is
equivalent to performing multiple push operations.
The multiple push operation is used with label stacking, which is beyond the scope of
this topic.
• Swap and push—Replaces the top label with a new label and then pushes a new label
to the top of the stack.
The swap and push operation is used with label stacking, which is beyond the scope
of this topic.
With PHP, the penultimate router is responsible for popping the MPLS label and forwarding
the traffic to the outbound router. The outbound router then performs an IP route lookup
and forwards the traffic. For example, if four LSPs terminate at the same outbound router
and each has a different penultimate router, label operations are shared across four
routers.
LSP Establishment
An MPLS LSP is established by one of two methods: static LSPs and dynamic LSPs.
Static LSPs
Like a static route, a static LSP requires each router along the path to be configured
explicitly. You must manually configure the path and its associated label values. Static
LSPs require less processing by the LSRs because no signaling protocol is used. However,
because paths are statically configured, they cannot adapt to network conditions.
Topology changes and network outages can create black holes in the LSP that exist until
you manually reconfigure the LSP.
Dynamic LSPs
Dynamic LSPs use signaling protocols to establish themselves and propagate LSP
information to other LSRs in the network. You configure the inbound router with LSP
information that is transmitted throughout the network when you enable the signaling
protocols across the LSRs. Because the LSRs must exchange and process signaling
packets and instructions, dynamic LSPs consume more resources than static LSPs.
However, dynamic LSPs can avoid the network black holes of static LSPs by detecting
topology changes and outages and propagating them throughout the network.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
When you first install Junos OS on your device, MPLS is disabled by default. You must
explicitly configure your device to allow MPLS traffic to pass through. Complete the
following steps for all devices in your MPLS network that are running Junos OS.
To enable MPLS:
1. Delete all configured security services from the device. If you do not complete this
step, you will get a commit failure. See “Example: Deleting Security Services” on
page 8.
2. Enable MPLS on the device. See “Example: Enabling MPLS” on page 10.
5. Configure MPLS features such as traffic engineering, VPNs, and VPLS. See:
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
This example shows how to delete configured services in the security level of the
configuration hierarchy.
• Requirements on page 9
• Overview on page 9
• Configuration on page 9
• Verification on page 9
Requirements
Before you begin, save your current configuration to a temporary file. Do this prior to
removing all configurations from the security level of the configuration hierarchy and
deleting the inherited configurations.
Overview
In this example, you save your current configuration in the var/tmp/ directory with an
appropriate filename and .cfg extension—for example, curfeb08.cfg. Then you remove
all configurations from the security level of the configuration hierarchy, and delete all
global groups and inherited configurations.
Configuration
Step-by-Step To delete the configured services in the security level of the configuration hierarchy:
Procedure
1. Save your current configuration.
[edit]
user@host# save /var/tmp/curfeb08.cfg
[edit]
user@host# delete security
3. Remove all inherited configurations in the security level of the configuration hierarchy.
[edit]
user@host# delete groups global security
Verification
To verify the configuration is working properly, enter the show groups global security
command.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
This example shows how to enable MPLS for packet-based processing. It also shows
how to enable the MPLS family and MPLS process on all of the transit interfaces in the
network.
Before changing from flow mode to packet mode, you must remove all
security policies remaining under flow mode. To prevent management
connection loss, you must bind the management interface to zones and
enable host-inbound traffic to prevent the device from losing connectivity.
For information about configuring zones, see Security Basics Guide for Security
Devices.
Requirements
Before you begin, delete all configured security services. See “Example: Deleting Security
Services” on page 8.
Overview
The instructions in this topic describe how to enable MPLS on the device. You must enable
MPLS on the device before including a device running Junos OS in an MPLS network.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
To enable MPLS:
2. Enable the MPLS family on each transit interface that you want to include in the
MPLS network.
[edit interfaces]
user@host# set interfaces ge-1/0/0 unit 0 family mpls
3. Enable the MPLS process on all of the transit interfaces in the MPLS network.
Results From configuration mode, confirm your configuration by entering the show security
forwarding-options command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
warning: Reboot may required when try reset flow inet mode
warning: Reboot may required when try reset mpls flow mode please check
security flow status for detail.
You need to reboot your device for the configuration to take effect.
CAUTION: If you disable MPLS and switch back to using the security services
(flow-based processing), the mode will not change immediately and the
system will display warning messages instructing you to restart your device.
You must reboot your device for the configuration to take effect. This will
also result in management sessions being reset and transit traffic getting
interrupted.
[edit]
user@host# show security forwarding-options
family {
mpls {
mode packet-based;
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Supported Platforms SRX100, SRX110, SRX210, SRX220, SRX240, SRX4100, SRX4200, SRX650
• Compute a path at the source by taking into account all the constraints, such as
bandwidth and administrative requirements.
• Distribute the information about network topology and link attributes throughout the
network once the path is computed.
When transit traffic is routed through an IP network, MPLS is often used to engineer its
passage. Although the exact path through the transit network is of little importance to
either the sender or the receiver of the traffic, network administrators often want to route
traffic more efficiently between certain source and destination address pairs. By adding
a short label with specific routing instructions to each packet, MPLS switches packets
from router to router through the network rather than forwarding packets based on
next-hop lookups. The resulting routes are called label-switched paths (LSPs). LSPs
control the passage of traffic through the network and speed traffic forwarding.
You can create LSPs manually, or through the use of signaling protocols. Signaling
protocols are used within an MPLS environment to establish LSPs for traffic across a
transit network. Junos OS supports two signaling protocols—LDP and the Resource
Reservation Protocol (RSVP).
• IGP extensions for distributing information about the network topology and link
attributes
• Constrained Shortest Path First (CSPF) for path computation and path selection
• RSVP extensions to establish the forwarding state along the path and to reserve
resources along the path
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
LDP is a signaling protocol that runs on a device configured for MPLS support. The
successful configuration of both MPLS and LDP initiates the exchange of TCP packets
across the LDP interfaces. The packets establish TCP-based LDP sessions for the
exchange of MPLS information within the network. Enabling both MPLS and LDP on the
appropriate interfaces is sufficient to establish LSPs.
When you configure LDP on a label-switching router (LSR), the router begins sending
LDP discovery messages out all LDP-enabled interfaces. When an adjacent LSR receives
LDP discovery messages, it establishes an underlying TCP session. An LDP session is
then created on top of the TCP session. The TCP three-way handshake ensures that the
LDP session has bidirectional connectivity. After they establish the LDP session, the LDP
neighbors maintain, and terminate, the session by exchanging messages. LDP
advertisement messages allow LSRs to exchange label information to determine the
next hops within a particular LSP. Any topology changes, such as a router failure, generate
LDP notifications that can terminate the LDP session or generate additional LDP
advertisements to propagate an LSP change.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
This example shows how to create and configure LDP instances within an MPLS network.
• Requirements on page 17
• Overview on page 17
• Configuration on page 18
• Verification on page 19
Requirements
Before you begin:
• Configure network interfaces. See Interfaces Feature Guide for Security Devices.
• Configure an IGP across your network. (The LDP configuration is added to the existing
IGP configuration and included in the MPLS configuration.)
• Configure a network to use LDP for LSP establishment by enabling MPLS on all transit
interfaces in the MPLS network.
NOTE: Because LDP runs on top of an IGP such as IS-IS or OSPF, you must
configure LDP and the IGP on the same set of interfaces.
Overview
To configure LDP-signaled LSPs, you must enable the MPLS family on all transit interfaces
in the MPLS network and include all the transit interfaces under the [protocols mpls] and
[protocols ldp] hierarchy levels.
In this example, you enable the MPLS family and create an LDP instance on all the transit
interfaces. Additionally, you enable the MPLS process on all the transit interfaces in the
MPLS network. In this example, you configure a sample network as shown in
Figure 2 on page 18.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level
and then enter commit from configuration mode.
[edit]
user@R1# set interfaces ge-0/0/0 unit 0 family mpls
[edit]
user@R1# set protocols mpls interface ge-0/0/0 unit 0
[edit]
user@R1# set protocols ldp interface ge-0/0/0 unit 0
Results Confirm your configuration by entering the show command from configuration mode. If
the output does not display the intended configuration, repeat the configuration
instructions in this example to correct it.
For brevity, this show output includes only the configuration that is relevant to this
example. Any other configuration on the system has been replaced with ellipses (...).
user@R1# show
...
interfaces {
ge-0/0/0 {
unit 0 {
family inet {
address 10.100.37.20/24;
}
family mpls;
}
}
}
...
protocols {
mpls {
interface all;
}
ldp {
interface ge-0/0/0.0;
}
}
If you are done configuring the device, enter the commit command from the configuration
mode to activate the configuration.
Verification
Confirm that the configuration is working properly.
Purpose Verify that each device shows the appropriate LDP neighbors.
Action From the CLI, enter the show ldp neighbor command.
The output shows the IP addresses of the neighboring interfaces along with the interface
through which the neighbor adjacency is established. Verify the following information:
• Each neighboring LDP interface address is listed with the appropriate corresponding
LDP interface.
• Under Label space ID, the appropriate loopback address for each neighbor appears.
Purpose Verify that a TCP-based LDP session has been established between all LDP neighbors.
Also, verify that the modified keepalive value is active.
Action From the CLI, enter the show ldp session detail command.
The output shows the detailed information, including session IDs, keepalive interval, and
next-hop addresses, for each established LDP session. Verify the following information:
• The state for each session is Operational, and the connection for each session is Open.
A state of Nonexistent or a connection of Closed indicates a problem with one of the
following:
• LDP configuration
Purpose Verify that each Juniper Networks device’s inet.3 routing table has an LSP for the loopback
address on each of the other routers.
Action From the CLI, enter the show route table inet.3 command.
The output shows the LDP routes that exist in the inet.3 routing table. Verify that an
LDP-signaled LSP is associated with the loopback addresses of the other routers in the
MPLS network.
Purpose Verify that the LDP path between R1 and R3 is complete over the LDP-signaled LSP.
Action From the CLI on R1, enter the traceroute mpls ldp 200.0.0.3 command.
The output shows the path between R1 and R3 using an LDP signalled LSP.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
RSVP is a signaling protocol that handles bandwidth allocation and true traffic engineering
across an MPLS network. Like LDP, RSVP uses discovery messages and advertisements
to exchange LSP path information between all hosts. However, RSVP also includes a set
of features that control the flow of traffic through an MPLS network. Whereas LDP is
restricted to using the configured IGP's shortest path as the transit path through the
network, RSVP uses a combination of the Constrained Shortest Path First (CSPF)
algorithm and Explicit Route Objects (EROs) to determine how traffic is routed through
the network.
Basic RSVP sessions are established in exactly the same way that LDP sessions are
established. By configuring both MPLS and RSVP on the appropriate transit interfaces,
you enable the exchange of RSVP packets and the establishment of LSPs. However,
RSVP also lets you configure link authentication, explicit LSP paths, and link coloring.
RSVP Fundamentals
RSVP uses unidirectional and simplex flows through the network to perform its function.
The inbound router initiates an RSVP path message and sends it downstream to the
outbound router. The path message contains information about the resources needed
for the connection. Each router along the path begins to maintain information about a
reservation.
When the path message reaches the outbound router, resource reservation begins. The
outbound router sends a reservation message upstream to the inbound router. Each
router along the path receives the reservation message and sends it upstream, following
the path of the original path message. When the inbound router receives the reservation
message, the unidirectional network path is established.
The established path remains open as long as the RSVP session is active. The session is
maintained by the transmission of additional path and reservation messages that report
the session state every 30 seconds. If a router does not receive the maintenance messages
for 3 minutes, it terminates the RSVP session and reroutes the LSP through another
active router.
EROs consist of two types of instructions: loose hops and strict hops. When a loose hop
is configured, it identifies one or more transit LSRs through which the LSP must be routed.
The network IGP determines the exact route from the inbound router to the first loose
hop, or from one loose hop to the next. The loose hop specifies only that a particular LSR
be included in the LSP.
When a strict hop is configured, it identifies an exact path through which the LSP must
be routed. Strict-hop EROs specify the exact order of the routers through which the RSVP
messages are sent.
You can configure loose-hop and strict-hop EROs simultaneously. In this case, the IGP
determines the route between loose hops, and the strict-hop configuration specifies the
exact path for particular LSP path segments.
R1 R3 R6 C2 AS 65020
R5
R2 R4 R7
C1
g015526
AS 65010
In the topology shown in Figure 3 on page 23, traffic is routed from Host C1 to Host C2.
The LSP can pass through Routers R4 or Router R7. To force the LSP to use R4, you can
set up either a loose-hop or strict-hop ERO that specifies R4 as a hop in the LSP. To force
a specific path through Router R4, R3, and R6, configure a strict-hop ERO through the
three LSRs.
These constraints are maintained in the traffic engineering database (TED). The database
provides CSPF with up-to-date topology information, the current reservable bandwidth
of links, and the link colors.
• Computes LSPs one at a time, beginning with the highest priority LSP—the one with
the lowest setup priority value. Among LSPs of equal priority, CSPF starts with those
that have the highest bandwidth requirement.
• Prunes the traffic engineering database of links that are not full duplex and do not have
sufficient reservable bandwidth.
• If the LSP configuration includes the include statement, prunes all links that do not
share any included colors.
• If the LSP configuration includes the exclude statement, prunes all links that contain
excluded colors. If a link does not have a color, it is accepted.
• Finds the shortest path toward the LSP's outbound router, taking into account any
EROs. For example, if the path must pass through Router A, two separate SPF
algorithms are computed: one from the inbound router to Router A and one from Router
A to the outbound router.
• If several paths have equal cost, chooses the one with a last-hop address the same
as the LSP's destination.
• If several equal-cost paths remain, selects the path with the least number of hops.
Link Coloring
RSVP allows you to configure administrative groups for CSPF path selection. An
administrative group is typically named with a color, assigned a numeric value, and
applied to the RSVP interface for the appropriate link. Lower numbers indicate higher
priority.
After configuring the administrative group, you can either exclude, include, or ignore links
of that color in the TED:
• If you exclude a particular color, all segments with an administrative group of that color
are excluded from CSPF path selection.
• If you include a particular color, only those segments with the appropriate color are
selected.
• If you neither exclude nor include the color, the metrics associated with the
administrative groups and applied on the particular segments determine the path cost
for that segment.
The LSP with the lowest total path cost is selected into the TED.
Supported Platforms SRX100, SRX110, SRX210, SRX220, SRX240, SRX4100, SRX4200, SRX650
This example shows how to create an LSP between routers in an IP network using RSVP
as the signaling protocol.
• Requirements on page 25
• Overview and Topology on page 25
• Configuration on page 26
• Verification on page 28
Requirements
Before you begin, delete security services from the device. See “Example: Deleting Security
Services” on page 8.
R1 R3 R6 C2 AS 65020
R5
R2 R4 R7
C1
g015526
AS 65010
To establish an LSP between routers, you must individually enable the MPLS family and
configure RSVP on each of the transit interfaces in the MPLS network. This example
shows how to enable MPLS and configure RSVP on the ge-0/0/0 transit interface.
Additionally, you must enable the MPLS process on all of the MPLS interfaces in the
network.
This example shows how to define an LSP from R1 to R7 on the ingress router (R1) using
R7’s loopback address (10.0.9.7). The configuration reserves 10 Mbps of bandwidth.
Additionally, the configuration disables the CSPF algorithm, ensuring that Hosts C1 and
C2 use the RSVP-signaled LSP that correspond to the network IGP's shortest path.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure RSVP:
1. Enable the MPLS family on all transit interfaces in the MPLS network.
[edit]
[edit]
user @host# set protocols rsvp interface ge-0/0/0
3. Enable the MPLS process on the transit interface in the MPLS network.
[edit]
user@host# set protocols mpls interface ge-0/0/0
Results Confirm your configuration by entering the show command from configuration mode. If
the output does not display the intended configuration, repeat the configuration
instructions in this example to correct it.
For brevity, this show command output includes only the configuration that is relevant
to this example. Any other configuration on the system has been replaced with ellipses
(...).
user@host# show
...
interfaces {
ge-0/0/0 {
family mpls;
}
}
}
...
protocols {
rsvp {
interface ge-0/0/0.0;
}
mpls {
label-switched-path r1-r7 {
to 10.0.9.7;
bandwidth 10m;
}
interface all;
}
}
...
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform these tasks:
Purpose Verify that each device shows the appropriate RSVP neighbors—for example, that
Router R1 in Figure 4 on page 26 lists both Router R3 and Router R2 as RSVP neighbors.
Action From the CLI, enter the show rsvp neighbor command.
The output shows the IP addresses of the neighboring routers. Verify that each neighboring
RSVP router loopback address is listed.
Purpose Verify that an RSVP session has been established between all RSVP neighbors. Also,
verify that the bandwidth reservation value is active.
Action From the CLI, enter the show rsvp session detail command.
10.0.9.7
From: 10.0.6.1, LSPstate: Up, ActiveRoute: 0
LSPname: r1–r7, LSPpath: Primary
Bidirectional, Upstream label in: –, Upstream label out: -
Suggested label received: -, Suggested label sent: –
Recovery label received: -, Recovery label sent: 100000
Resv style: 1 FF, Label in: -, Label out: 100000
Time left: -, Since: Thu Jan 26 17:57:45 2002
Tspec: rate 10Mbps size 10Mbps peak Infbps m 20 M 1500
Port number: sender 3 receiver 17 protocol 0
PATH rcvfrom: localclient
PATH sentto: 10.0.4.13 (ge-0/0/1.0) 1467 pkts
RESV rcvfrom: 10.0.4.13 (ge-0/0/1.0) 1467 pkts
Record route: <self> 10.0.4.13 10.0.2.1 10.0.8.10
The output shows the detailed information, including session IDs, bandwidth reservation,
and next-hop addresses, for each established RSVP session. Verify the following
information:
• Each RSVP neighbor address has an entry for each neighbor, listed by loopback address.
Purpose Verify that the routing table of the entry (ingress) router has a configured LSP to the
loopback address of the other router. For example, verify that the inet.3 routing table of
the R1 entry router in Figure 4 on page 26 has a configured LSP to the loopback address
of Router R7.
Action From the CLI, enter the show route table inet.3 command.
The output shows the RSVP routes that exist in the inet.3 routing table. Verify that an
RSVP-signaled LSP is associated with the loopback address of the exit (egress) router, R7,
in the MPLS network.
Supported Platforms ACX Series, M Series, MX Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX4100,
SRX4200, T Series
This process is illustrated in Figure 5 on page 30. Device PE1 is configured with a
point-to-multipoint LSP to Routers PE2, PE3, and PE4. When Device PE1 sends a packet
on the point-to-multipoint LSP to Routers P1 and P2, Device P1 replicates the packet and
forwards it to Routers PE2 and PE3. Device P2 sends the packet to Device PE4.
• You can add and remove branch LSPs from a main point-to-multipoint LSP without
disrupting traffic. The unaffected parts of the point-to-multipoint LSP continue to
function normally.
• You can configure a node to be both a transit and an outbound (egress) router for
different branch LSPs of the same point-to-multipoint LSP.
• You can enable link protection on a point-to-multipoint LSP. Link protection can provide
a bypass LSP for each of the branch LSPs that make up the point-to-multipoint LSP.
If any primary paths fail, traffic can be quickly switched to the bypass.
Supported Platforms ACX Series, MX Series, PTX Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX4100,
SRX4200, SRX650, T Series
1. Configure the primary LSP from the ingress router and the branch LSPs that carry
traffic to the egress routers.
2. Specify a pathname on the primary LSP and this same path name on each branch
LSP.
Supported Platforms ACX Series, M Series, MX Series, PTX Series, SRX Series, T Series
• Requirements on page 31
• Overview on page 31
• Configuration on page 32
• Verification on page 48
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
In this example, multiple routing devices serve as the transit, branch, and leaf nodes of
a single point-to-multipoint LSP. On the provider edge (PE), Device PE1 is the ingress
node. The branches go from PE1 to PE2, PE1 to PE3, and PE1 to PE4. Static unicast routes
on the ingress node (PE1) point to the egress nodes.
This example also demonstrates static routes with a next hop that is a point-to-multipoint
LSP, using the p2mp-lsp-next-hop statement. This is useful when implementing
filter-based forwarding.
Topology Diagram
P2 PE2 CE2
P4 PE4 CE4
g041174
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Device CE1 set interfaces ge-1/3/2 unit 0 family inet address 10.0.244.9/30
set interfaces ge-1/3/2 unit 0 description CE1-to-PE1
set routing-options static route 10.0.104.8/30 next-hop 10.0.244.10
set routing-options static route 10.0.134.8/30 next-hop 10.0.244.10
set routing-options static route 10.0.224.8/30 next-hop 10.0.244.10
Device CE2 set interfaces ge-1/3/3 unit 0 family inet address 10.0.224.9/30
set interfaces ge-1/3/3 unit 0 description CE2-to-PE2
set routing-options static route 10.0.244.8/30 next-hop 10.0.224.10
Device CE3 set interfaces ge-2/0/1 unit 0 family inet address 10.0.134.9/30
set interfaces ge-2/0/1 unit 0 description CE3-to-PE3
set routing-options static route 10.0.244.8/30 next-hop 10.0.134.10
Device CE4 set interfaces ge-3/1/3 unit 0 family inet address 10.0.104.10/30
set interfaces ge-3/1/3 unit 0 description CE4-to-PE4
set routing-options static route 10.0.244.8/30 next-hop 10.0.104.9
[edit interfaces]
user@PE1# set ge-2/0/2 unit 0 description PE1-to-CE1
user@PE1# set ge-2/0/2 unit 0 family inet address 10.0.244.10/30
user@PE1# set fe-2/0/10 unit 1 description PE1-to-P2
user@PE1# set fe-2/0/10 unit 1 family inet address 2.2.2.1/24
user@PE1# set fe-2/0/10 unit 1 family mpls
user@PE1# set fe-2/0/9 unit 8 description PE1-to-P3
user@PE1# set fe-2/0/9 unit 8 family inet address 6.6.6.1/24
user@PE1# set fe-2/0/9 unit 8 family mpls
user@PE1# set fe-2/0/8 unit 9 description PE1-to-P4
user@PE1# set fe-2/0/8 unit 9 family inet address 3.3.3.1/24
user@PE1# set fe-2/0/8 unit 9 family mpls
user@PE1# set lo0 unit 1 family inet address 100.10.10.10/32
[edit protocols]
user@PE1# set rsvp interface fe-2/0/10.1
user@PE1# set rsvp interface fe-2/0/9.8
user@PE1# set rsvp interface fe-2/0/8.9
user@PE1# set rsvp interface lo0.1
user@PE1# set mpls interface fe-2/0/10.1
user@PE1# set mpls interface fe-2/0/9.8
user@PE1# set mpls interface fe-2/0/8.9
user@PE1# set mpls interface lo0.1
user@PE1# set ospf area 0.0.0.0 interface ge-2/0/2.0
user@PE1# set ospf area 0.0.0.0 interface fe-2/0/10.1
user@PE1# set ospf area 0.0.0.0 interface fe-2/0/9.8
user@PE1# set ospf area 0.0.0.0 interface fe-2/0/8.9
user@PE1# set ospf area 0.0.0.0 interface lo0.1
[edit protocols]
user@PE1# set mpls label-switched-path PE1-PE2 to 100.50.50.50
user@PE1# set mpls label-switched-path PE1-PE2 p2mp p2mp1
user@PE1# set mpls label-switched-path PE1-PE3 to 100.70.70.70
user@PE1# set mpls label-switched-path PE1-PE3 p2mp p2mp1
user@PE1# set mpls label-switched-path PE1-PE4 to 100.40.40.40
user@PE1# set mpls label-switched-path PE1-PE4 p2mp p2mp1
Link protection helps to ensure that traffic sent over a specific interface to a
neighboring router can continue to reach the router if that interface fails.
[edit protocols]
user@PE1# set mpls label-switched-path PE1-PE2 link-protection
[edit protocols]
user@PE1# set mpls traffic-engineering bgp-igp
This causes the ingress routes to be installed in the inet.0 routing table. By default,
MPLS performs traffic engineering for BGP only. You need to enable MPLS traffic
engineering on the ingress LSR only.
[edit protocols]
user@PE1# set ospf traffic-engineering
This causes the shortest-path first (SPF) algorithm to take into account the LSPs
configured under MPLS.
[edit routing-options]
user@PE1# set router-id 100.10.10.10
8. Configure static IP unicast routes with the point-to-multipoint LSP name as the
next hop for each route.
[edit routing-options]
user@PE1# set static route 5.5.5.0/24p2mp-lsp-next-hop p2mp1
user@PE1# set static route 7.7.7.0/24 p2mp-lsp-next-hop p2mp1
user@PE1# set static route 4.4.4.0/24 p2mp-lsp-next-hop p2mp1
[edit]
user@PE1# commit
Configuring the Transit and Egress LSRs (Devices P2, P3, P4, PE2, PE3, and PE4)
[edit]
user@P2# set interfaces fe-2/0/10 unit 2 description P2-to-PE1
user@P2# set interfaces fe-2/0/10 unit 2 family inet address 2.2.2.2/24
user@P2# set interfaces fe-2/0/10 unit 2 family mpls
user@P2# set interfaces fe-2/0/9 unit 10 description P2-to-PE2
user@P2# set interfaces fe-2/0/9 unit 10 family inet address 5.5.5.1/24
user@P2# set interfaces fe-2/0/9 unit 10 family mpls
user@P2# set interfaces lo0 unit 2 family inet address 100.20.20.20/32
[edit]
user@P2# set protocols rsvp interface fe-2/0/10.2
user@P2# set protocols rsvp interface fe-2/0/9.10
user@P2# set protocols rsvp interface lo0.2
user@P2# set protocols mpls interface fe-2/0/10.2
user@P2# set protocols mpls interface fe-2/0/9.10
user@P2# set protocols mpls interface lo0.2
user@P2# set protocols ospf area 0.0.0.0 interface fe-2/0/10.2
user@P2# set protocols ospf area 0.0.0.0 interface fe-2/0/9.10
user@P2# set protocols ospf area 0.0.0.0 interface lo0.2
[edit]
user@P2# set protocols ospf traffic-engineering
This causes the shortest-path first (SPF) algorithm to take into account the LSPs
configured under MPLS.
[edit]
user@P2# set routing-options router-id 100.20.20.20
[edit]
user@host# commit
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
description PE1-to-P2;
family inet {
address 6.6.6.1/24;
}
family mpls;
}
}
fe-2/0/8 {
unit 9 {
description PE1-to-P3;
family inet {
address 3.3.3.1/24;
}
family mpls;
}
}
lo0 {
unit 1 {
family inet {
address 100.10.10.10/32;
}
}
}
interface ge-2/0/2.0;
interface fe-2/0/10.1;
interface fe-2/0/9.8;
interface fe-2/0/8.9;
interface lo0.1;
}
}
interface fe-2/0/9.10;
interface lo0.2;
}
ospf {
traffic-engineering;
area 0.0.0.0 {
interface fe-2/0/10.2;
interface fe-2/0/9.10;
interface lo0.2;
}
}
interface fe-2/0/10.6;
interface fe-2/0/9.11;
interface lo0.6;
}
}
address 10.0.134.10/30;
}
}
}
fe-2/0/10 {
unit 7 {
description PE3-to-P3;
family inet {
address 7.7.7.2/24;
}
family mpls;
}
}
lo0 {
unit 7 {
family inet {
address 100.70.70.70/32;
}
}
}
}
address 4.4.4.2/24;
}
family mpls;
}
}
lo0 {
unit 4 {
family inet {
address 100.40.40.40/32;
}
}
}
}
[edit interfaces]
user@CE1# set ge-1/3/2 unit 0 family inet address 10.0.244.9/30
user@CE1# set ge-1/3/2 unit 0 description CE1-to-PE1
2. Configure static routes from Device CE1 to the three other customer networks, with
Device PE1 as the next hop.
[edit routing-options]
user@CE1# set static route 10.0.104.8/30 next-hop 10.0.244.10
user@CE1# set static route 10.0.134.8/30 next-hop 10.0.244.10
user@CE1# set static route 10.0.224.8/30 next-hop 10.0.244.10
[edit]
user@CE1# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
[edit interfaces]
user@CE2# set ge-1/3/3 unit 0 family inet address 10.0.224.9/30
user@CE2# set ge-1/3/3 unit 0 description CE2-to-PE2
2. Configure a static route from Device CE2 to CE1, with Device PE2 as the next hop.
[edit routing-options]
user@CE2# set static route 10.0.244.8/30 next-hop 10.0.224.10
[edit]
user@CE2# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
ge-1/3/3 {
unit 0 {
family inet {
address 10.0.224.9/30;
description CE2-to-PE2;
}
}
}
[edit interfaces]
user@CE3# set ge-2/0/1 unit 0 family inet address 10.0.134.9/30
user@CE3# set ge-2/0/1 unit 0 description CE3-to-PE3
2. Configure a static route from Device CE3 to CE1, with Device PE3 as the next hop.
[edit routing-options]
user@CE3# set static route 10.0.244.8/30 next-hop 10.0.134.10
[edit]
user@CE3# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
[edit interfaces]
user@CE4# set ge-3/1/3 unit 0 family inet address 10.0.104.10/30
user@CE4# set ge-3/1/3 unit 0 description CE4-to-PE4
2. Configure a static route from Device CE4 to CE1, with Device PE4 as the next hop.
[edit routing-options]
user@CE4# set static route 10.0.244.8/30 next-hop 10.0.104.9
[edit]
user@CE4# commit
Results From configuration mode, confirm your configuration by entering the show interfaces and
show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
Verification
Confirm that the configuration is working properly.
Verifying Connectivity
Purpose Make sure that the devices can ping each other.
Action Run the ping command from CE1 to the interface on CE2 connecting to PE2.
Run the ping command from CE1 to the interface on CE3 connecting to PE3.
Run the ping command from CE1 to the interface on CE4 connecting to PE4.
Purpose Make sure that the ingress, transit, and egress LSRs are in the Up state.
Action Run the show mpls lsp p2mp command on all of the LSRs. Only the ingress LSR is shown
here.
Purpose Make sure that the routes are set up as expected by running the show route
forwarding-table command. Only the routes to the remote customer networks are shown
here.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
Virtual private networks (VPNs) are private networks that use a public network to connect
two or more remote sites. Instead of dedicated connections between networks, VPNs
use virtual connections routed (tunneled) through public networks that are typically
service provider networks. VPNs are a cost-effective alternative to expensive dedicated
lines. The type of VPN is determined by the connections it uses and whether the customer
network or the provider network performs the virtual tunneling.
You can configure a router running Junos OS to participate in several types of VPNs. This
topic discusses MPLS VPNs.
10.11.3.1/24
vlan 600 trunk
fe-0/0/3
PE1
172.28.1.2
fe-0/0/5
172.28.2.133/30
Internet
172.28.2.133/30
fe-0/0/5
PE2
172.28.1.1
fe-0/0/3
vlan 600 trunk
10.11.3.1/24
CE2
There are three primary types of MPLS VPNs: Layer 2 VPNs, Layer 2 circuits, and Layer 3
VPNs. All types of MPLS VPNs share certain components:
• The provider edge (PE) routers in the provider's network connect to the customer edge
(CE) routers located at customer sites. PE routers support VPN and MPLS label
functionality. Within a single VPN, pairs of PE routers are connected through a virtual
tunnel, typically a label-switched path (LSP).
• Provider routers within the core of the provider's network are not connected to any
routers at a customer site but are part of the tunnel between pairs of PE routers. Provider
routers support LSP functionality as part of the tunnel support, but do not support
VPN functionality.
• CE routers are the routers or switches located at the customer site that connect to the
provider's network. CE routers are typically IP routers, but they can also be Asynchronous
Transfer Mode (ATM), Frame Relay, or Ethernet switches.
All VPN functions are performed by the PE routers. Neither CE routers nor provider routers
are required to perform any VPN functions.
3. The inbound PE router receives traffic, and it performs a route lookup. The lookup
yields an LSP next hop, and the traffic is forwarded along the LSP.
4. The traffic reaches the outbound PE router, and the PE router pops the MPLS label
and forwards the traffic with standard IP routing.
VRF Instances
A routing instance is a collection of routing tables, interfaces, and routing protocol
parameters. The interfaces belong to the routing tables, and the routing protocol
parameters control the information in the routing tables. In the case of MPLS VPNs, each
VPN has a VPN routing and forwarding (VRF) instance.
A VRF instance consists of one or more routing tables, a derived forwarding table, the
interfaces that use the forwarding table, and the policies and routing protocols that
determine what goes into the forwarding table. Because each instance is configured for
a particular VPN, each VPN has separate tables, rules, and policies that control its
operation.
A separate VRF table is created for each VPN that has a connection to a CE router. The
VRF table is populated with routes received from directly connected CE sites associated
with the VRF instance, and with routes received from other PE routers in the same VPN.
Route Distinguishers
Because a typical transit network is configured to handle more than one VPN, the provider
routers are likely to have multiple VRF instances configured. As a result, depending on
the origin of the traffic and any filtering rules applied to the traffic, the BGP routing tables
can contain multiple routes for a particular destination address. Because BGP requires
that exactly one BGP route per destination be imported into the forwarding table, BGP
must have a way to distinguish between potentially identical network layer reachability
information (NLRI) messages received from different VPNs.
A route distinguisher is a locally unique number that identifies all route information for a
particular VPN. Unique numeric identifiers allow BGP to distinguish between routes that
are otherwise identical.
Each routing instance that you configure on a PE router must have a unique route
distinguisher. There are two possible formats:
The route target defines which route is part of a VPN. A unique route target helps
distinguish between different VPN services on the same router. Each VPN also has a
policy that defines how routes are imported into the VRF table on the router. A Layer 2
VPN is configured with import and export policies. A Layer 3 VPN uses a unique route
target to distinguish between VPN routes.
The PE router then exports the route in IBGP sessions to the other provider routers. Route
export is governed by any routing policy that has been applied to the particular VRF table.
To propagate the routes through the provider network, the PE router must also convert
the route to VPN format, which includes the route distinguisher.
When the outbound PE router receives the route, it strips off the route distinguisher and
advertises the route to the connected CE router, typically through standard BGP IPv4
route advertisements.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
NOTE: This section is valid for Layer 2 VPNs and Layer 3 VPNs, but not Layer
2 circuits.
1. Configure BGP.
[edit]
user@host# edit protocols bgp group group-name
Replace family-type with l2vpn for a Layer 2 VPN or inet–vpn for a Layer 3 VPN.
[edit]
user@host# commit
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
[edit]
user@host# edit protocols ospf traffic-engineering shortcuts
NOTE: You must configure the IGP at the [edit protocols] level, not within
the routing instance at the [edit routing-instances] level.
2. Enable RSVP on interfaces that participate in the LSP. For PE routers, enable interfaces
on the source and destination points. For provider routers, enable interfaces that
connect the LSP between the PE routers.
[edit]
user@host# edit protocols rsvp interface interface-name
[edit]
user@host# commit
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
[edit]
user@host# set routing-options autonomous-system as-number
[edit]
user@host# commit
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
[edit]
user@host# edit routing-instances routing-instance-name
2. Create a routing instance description. (This text appears in the output of the show
route instance detail command.)
3. Specify the instance type, either l2vpn for Layer 2 VPNs or vrf for Layer 3 VPNs.
[edit]
user@host# commit
In an MPLS Layer 2 VPN, traffic is forwarded to the provider edge (PE) router in Layer 2
format, carried by MPLS through an label-switched path (LSP) over the service provider
network, and then converted back to Layer 2 format at the receiving customer edge (CE)
router.
Routing occurs on the customer routers, typically on the CE router. The CE router
connected to a service provider on a Layer 2 VPN must select the appropriate circuit on
which to send traffic. The PE router receiving the traffic sends it across the network to
the PE router on the outbound side. The PE routers need no information about the
customer's routes or routing topology, and need only to determine the virtual tunnel
through which to send the traffic.
Implementing a Layer 2 VPN on the router is similar to implementing a VPN using a Layer
2 technology such as Asynchronous Transfer Mode (ATM) or Frame Relay.
To configure MPLS Layer 2 VPN functionality on a router running Junos OS, you must
enable support on the provider edge (PE) router and configure the PE router to distribute
routing information to other routers in the VPN, as explained in the following steps.
However, because the tunnel information is maintained at both PE routers, neither the
provider core routers nor the customer edge (CE) routers need to maintain any VPN
information in their configuration databases.
1. Determine all of the routers that you want to participate in the VPN, and then complete
the initial configuration of their interfaces. See Interfaces Feature Guide for Security
Devices.
2. For all of the routers in the VPN configuration, update the interface configurations to
enable participation in the Layer 2 VPN. As part of the interface configuration, you
must configure the MPLS address family for each interface that uses LDP or RSVP.
See “Configuring Interfaces for Layer 2 VPNs (CLI Procedure)” on page 64.
3. For all of the routers in the VPN configuration, configure the appropriate protocols.
a. MPLS—For PE routers and provider routers, use MPLS to advertise the Layer 2 VPN
interfaces that communicate with other PE routers and provider routers.
b. BGP and internal BGP (IBGP)—For PE routers, configure a BGP session to enable
the routers to exchange information about routes originating and terminating in
the VPN. (The PE routers use this information to determine which labels to use for
traffic destined to the remote sites. The IBGP session for the VPN runs through the
loopback address.) In addition, CE routers require a BGP connection to the PE
routers. See “Configuring a BGP Session for MPLS VPNs (CLI Procedure)” on
page 56.
In addition, configure an IGP such as OSPF or static routes for PE routers to enable
exchanges of routing information between the PE routers and provider routers.
Each PE router's loopback address must appear as a separate route. Do not
configure any summarization of the PE router's loopback addresses at the area
boundary. Configure the provider network to run OSPF or IS-IS as an IGP, as well
as IBGP sessions through either a full mesh or route reflector.
See “Configuring an IGP and the LDP Signaling Protocol (CLI Procedure)” on page 70
and “Configuring an IGP and the RSVP Signaling Protocol (CLI Procedure)” on
page 57.
4. For all of the routers in the VPN configuration, configure routing options. The only
required routing option for VPNs is the AS number. You must specify it on each router
involved in the VPN. See “Configuring Routing Options for MPLS VPNs (CLI Procedure)”
on page 58.
5. For each PE router in the VPN configuration, configure a routing instance for each
VPN. The routing instance should have the same name on each PE router. Each routing
instance must have a unique route distinguisher associated with it. (VPN routing
instances need a route distinguisher to help BGP distinguish between potentially
identical network layer reachable information [NLRI] messages received from different
VPNs.) See “Configuring a Routing Instance for MPLS VPNs (CLI Procedure)” on
page 58.
6. For each PE router in the VPN configuration, configure a VPN routing policy if you are
not using a route target. Within the policy, describe which packets are sent and received
across the VPN and specify how routes are imported into and exported from the
router's VRF table. Each advertisement must have an associated route target that
uniquely identifies the VPN for which the advertisement is valid. If the routing instance
uses a policy for accepting and rejecting packets instead of a route target, you must
specify the import and export routing policies and the community on each PE router.
See “Configuring a Routing Policy for MPLS Layer 2 VPNs (CLI Procedure)” on page 63.
These instructions show how to configure a Layer 2 VPN routing policy on the PE routers
in the VPN.
After configuring an import routing policy for a Layer 2 VPN, configure an export routing
policy for the Layer 2 VPN. Configure this export policy on the PE routers in the VPN. The
export routing policy defines how routes are exported from the PE router routing table.
An export policy is applied to routes sent to other PE routers in the VPN. The export policy
must also evaluate all routes received over the routing protocol session with the CE
router. The export policy must also contain a second term for rejecting all other routes.
[edit]
user@host# edit policy-options policy-statement import-policy-name
[edit]
user@host# edit policy-options policy-statement export-policy-name
7. Define the export policy’s community using one of the following commands.
[edit]
user@host# commit
Configuring the router interfaces that participate in the VPN is similar to configuring them
for other uses, with a few requirements for the VPN. Perform the following tasks for each
interface involved in the VPN, except Layer 3 loopback interfaces, which do not require
other configuration.
• For all interfaces except loopback interfaces and Layer 2 VPN interfaces facing a
CE router:
[edit]
user@host# edit interfaces interface-name unit logical_interface family inet address
ipv4_address
[edit]
user@host# edit interfaces lo0 unit logical_interface family inet address ipv4_address
primary
[edit]
user@host# set interfaces interface-name vlan-tagging encapsulation vlan-ccc unit
logical_interface encapsulation vlan-ccc vlan-id id-number
2. Configure the MPLS address family on the PE router or provider router interfaces that
communicate with other PE routers or provider routers (and not loopback addresses).
3. Configure encapsulation for the interfaces on the PE routers that communicate with
the CE routers in Layer 2 VPNs and Layer 2 circuits. If multiple logical units are
configured, the encapsulation type is needed at the interface level only. It is always
required at the unit level.
[edit]
user@host# commit
Purpose Verify the connectivity of MPLS Layer 2 VPNs using the ping mpls command. This
command helps to verify that a VPN has been enabled by testing the integrity of the VPN
connection between the PE routers. It does not test the connection between a PE router
and CE router.
Action • To ping an interface configured for the Layer 2 VPN on the PE router, use the following
command:
• To ping a combination of the Layer 2 VPN routing instance name, the local site identifier,
and the remote site identifier to test the integrity of the Layer 2 VPN connection
(specified by identifiers) between the two PE routers, use the following command:
Each Layer 2 circuit is represented by the logical interface connecting the local provider
edge (PE) router to the local CE router. All Layer 2 circuits using a particular remote PE
router neighbor is identified by its IP address and is usually the endpoint destination for
the label-switched path (LSP) tunnel transporting the Layer 2 circuit.
Each virtual circuit ID uniquely identifies the Layer 2 circuit among all the Layer 2 circuits
to a specific neighbor. The key to identifying a particular Layer 2 circuit on a PE router is
the neighbor address and the virtual circuit ID. Based on the virtual circuit ID and the
neighbor relationship, an LDP label is bound to an LDP circuit. LDP uses the binding for
sending traffic on that Layer 2 circuit to the remote CE router.
1. Determine all of the routers that you want to participate in the circuit, and then
complete the initial configuration of their interfaces. See the Interfaces Feature Guide
for Security Devices.
2. For all of the routers in the circuit configuration, update the interface configurations
to enable participation in the Layer 2 circuit.
a. On the interface communicating with the other provider edge (PE) router, specify
MPLS and IPv4, and include the IP address. For the loopback interface, specify inet,
and include the IP address. For IPv4, designate the loopback interface as primary
so it can receive control packets. (Because it is always operational, the loopback
interface is best able to perform the control function.)
b. On the PE router interface facing the customer edge (CE) router, specify a circuit
cross-connect (CCC) encapsulation type. The type of encapsulation depends on
the interface type. For example, an Ethernet interface uses ethernet-ccc. (The
encapsulation type determines how the packet is constructed for that interface.)
c. On the CE router interface that faces the PE router, specify inet (for IPv4), and
include the IP address. In addition, specify a routing protocol such as Open Shortest
Path First (OSPF), which specifies the area and IP address of the router interface.
See “Configuring Interfaces for Layer 2 VPNs (CLI Procedure)” on page 64.
3. For all of the routers in the circuit configuration, configure the appropriate protocols.
a. MPLS—For PE routers and provider routers, use MPLS to advertise the Layer 2
circuit interfaces that communicate with other PE routers and provider routers.
See “Configuring an IGP and the LDP Signaling Protocol (CLI Procedure)” on page 70
and “Configuring an IGP and the RSVP Signaling Protocol (CLI Procedure)” on
page 57.
4. For all of the routers in the circuit configuration, configure routing options. The only
required routing option for circuits is the autonomous system (AS) number. You must
specify it on each router involved in the circuit. See “Configuring Routing Options for
MPLS VPNs (CLI Procedure)” on page 58.
5. For PE routers, configure Layer 2 circuits on the appropriate interfaces. See “Configuring
an MPLS Layer 2 Circuit (CLI Procedure)” on page 69.
[edit]
user@host# edit protocols l2circuit neighbor interface-name interface interface-name
For neighbor, specify the local loopback address, and for interface, specify the interface
name of the remote PE router.
[edit]
user@host# commit
Purpose To verify the connectivity of MPLS Layer 2 circuits, use the ping mpls command. This
command helps to verify that the circuit has been enabled by testing the integrity of the
Layer 2 circuit between the source and destination routers.
Action • To ping an interface configured for the Layer 2 circuit on the PE router, enter the
following command:
• To ping a combination of the IPv4 prefix and the virtual circuit ID on the destination PE
router, enter the following command:
The following instructions show how to configure LDP and OSPF on PE routers and
provider routers. Within the task, you specify which interfaces to enable for LDP. Perform
this step on each PE router interface and provider router interface that communicates
with other PE routers and provider routers. For OSPF, you configure at least one area on
at least one of the router's interfaces. (An AS can be divided into multiple areas.) These
instructions use the backbone area 0.0.0.0 and show how to enable traffic engineering
for Layer 2 VPN circuits.
[edit]
user@host# edit protocols ldp
NOTE: You must configure the IGP at the [protocols] level of the
configuration hierarchy, not within the routing instance at the
[routing-instances] level of the configuration hierarchy.
[edit]
user@host# edit protocols ospf area 0.0.0.0 interface interface-name
[edit]
user@host# commit
An MPLS Layer 3 VPN operates at the Layer 3 level of the OSI model, the Network layer.
The VPN is composed of a set of sites that are connected over a service provider's existing
public Internet backbone. The sites share common routing information and the
connectivity of the sites is controlled by a collection of policies.
In an MPLS Layer 3 VPN, routing occurs on the service provider's routers. The provider
routers route and forward VPN traffic at the entry and exit points of the transit network.
The service provider network must learn the IP addresses of devices sending traffic across
the VPN and the routes must be advertised and filtered throughout the provider network.
As a result, Layer 3 VPNs require information about customer routes and a more extensive
VPN routing and forwarding (VRF) policy configuration than a Layer 2 VPN. This
information is used to share and filter routes that originate or terminate in the VPN.
The MPLS Layer 3 VPN requires more processing power on the provider edge (PE) routers
than a Layer 2 VPN, because the Layer 3 VPN has larger routing tables for managing
network traffic on the customer sites. Route advertisements originate at the customer
edge (PE) routers and are shared with the inbound PE routers through standard IP routing
protocols, typically BGP. Based on the source address, the PE router filters route
advertisements and imports them into the appropriate VRF table.
The provider router uses OSPF and LDP to communicate with the PE routers. For OSPF,
the provider router interfaces that communicate with the PE routers are specified, as
well as the loopback interface. For the PE routers, the loopback interface is in passive
mode, meaning it does not send OSPF packets to perform the control function.
Supported Platforms EX4600, QFX Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX650
To configure MPLS Layer 3 VPN functionality on a router running Junos OS, you must
enable support on the provider edge (PE) router and configure the PE router to distribute
routing information to other routers in the VPN, as explained in the following steps.
However, because the tunnel information is maintained at both PE routers, neither the
provider core routers nor the customer edge (CE) routers need to maintain any VPN
information in their configuration databases.
1. Determine all of the routers that you want to participate in the VPN, and then complete
the initial configuration of their interfaces. See the Junos OS Interfaces Configuration
Guide for Security Devices.
2. For all of the routers in the VPN configuration, update the interface configurations to
enable participation in the Layer 3 VPN. As part of the interface configuration, you
must configure the MPLS address family for each interface that uses LDP or RSVP.
See “Configuring Interfaces for Layer 2 VPNs (CLI Procedure)” on page 64.
3. For all of the routers in the VPN configuration, configure the appropriate protocols.
a. MPLS—If you are using RSVP, use MPLS to advertise the Layer 3 VPN interfaces
on the PE routers and provider routers that communicate with other PE routers
and provider routers.
b. BGP, EBGP, and internal BGP (IBGP)—For PE routers, configure a BGP session to
enable the routers to exchange information about routes originating and terminating
in the VPN. (The PE routers use this information to determine which labels to use
for traffic destined to the remote sites. The IBGP session for the VPN runs through
the loopback address.) In addition, CE routers require a BGP connection to the PE
routers. See “Configuring a BGP Session for MPLS VPNs (CLI Procedure)” on
page 56.
See “Configuring an IGP and the LDP Signaling Protocol (CLI Procedure)” on page 70
and “Configuring an IGP and the RSVP Signaling Protocol (CLI Procedure)” on
page 57.
4. For all of the routers in the VPN configuration, configure routing options. The only
required routing option for VPNs is the autonomous system (AS) number. You must
specify it on each router involved in the VPN. See “Configuring Routing Options for
MPLS VPNs (CLI Procedure)” on page 58.
5. For each PE router in the VPN configuration, configure a routing instance for each
VPN. The routing instance should have the same name on each PE router. Each routing
instance must have a unique route distinguisher associated with it. (VPN routing
instances need a route distinguisher to help BGP distinguish between potentially
identical network layer reachable information [NLRI] messages received from different
VPNs.) See “Configuring a Routing Instance for MPLS VPNs (CLI Procedure)” on
page 58.
6. For CE routers, configure a routing policy. In addition, if you are not using a route target,
configure a VPN routing policy for each PE router in the VPN configuration. Within the
policy, describe which packets are sent and received across the VPN and specify how
routes are imported into and exported from the router's VRF table. Each advertisement
must have an associated route target that uniquely identifies the VPN for which the
advertisement is valid. See “Configuring a Routing Policy for MPLS Layer 3 VPNs (CLI
Procedure)” on page 75.
[edit]
user@host# edit policy-options policy-statement policy-name
[edit]
user@host# commit
Purpose Verify the connectivity of MPLS Layer 3 VPNs using the ping mpls command. This
command helps to verify that a VPN has been enabled by testing the integrity of the VPN
connection between the source and destination routers. The destination prefix
corresponds to a prefix in the Layer 3 VPN. However, ping tests only whether the prefix
is present in a PE VRF table.
Action To a combination of a IPv4 destination prefix and a Layer 3 VPN name on the destination
PE router, use the following command:
Introduction to CLNS
CLNS Overview
You can configure devices running Junos OS as provider edge (PE) routers within a CLNS
network. CLNS networks can be connected over an IP MPLS network core using Border
Gateway Protocol (BGP) and MPLS Layer 3 virtual private networks (VPNs). See
RFC 2547, BGP/MPLS VPNs.
CLNS uses network service access points (NSAPs), similar to IP addresses found in IPv4,
to identify end systems (hosts) and intermediate systems (routers). ES-IS enables the
hosts and routers to discover each other. IS-IS is the interior gateway protocol (IGP) that
carries ISO CLNS routes through a network.
For more information about CLNS, see the ISO 8473 standards.
To configure CLNS:
1. Configure the network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
3. Configure a VPN routing instance. You typically configure ES-IS, IS-IS, and CLNS static
routes using a VPN routing instance. See “Example: Configuring a VPN Routing Instance
for CLNS” on page 97.
4. Configure one or more of the following protocols for CLNS (depending on your
network).
• ES-IS—If a device is a PE router within a CLNS island that contains any end systems,
you must configure ES-IS on the device. If a CLNS island does not contain any end
systems, you do not need to configure ES-IS on a device. See “Example: Configuring
ES-IS for CLNS” on page 83.
• IS-IS—You can configure IS-IS to exchange CLNS routes within a CLNS island. See
“Example: Configuring IS-IS for CLNS” on page 87.
NOTE: If you have a pure CLNS island—an island that does not contain
any IP devices—you must disable IPv4 and IPv6 routing. Also, to export
BGP routes into IS-IS, you must configure and apply an export policy.
• Static routes—If some devices in your network do not support IS-IS, you must
configure CLNS static routes. You can use static routing with or without IS-IS. You
might also consider using static routes if your network is simple. See “Example:
Configuring Static Routes for CLNS” on page 91.
ES-IS provides the basic interaction between Connectionless Network Service (CLNS)
hosts (end systems) and routers (intermediate systems). ES-IS allows hosts to advertise
NSAP addresses to other routers and hosts attached to the network. Those routers can
then advertise the address to the rest of the network by using Intermediate
System-to-Intermediate System (IS-IS). Routers use ES-IS to advertise their network
entity title (NET) to hosts and routers that are attached to that network.
ES-IS routes are exported to Layer 1 IS-IS by default. You can also export ES-IS routes
into Layer 2 IS-IS by configuring a routing policy. ES-IS generates and receives end system
hello (ESH) hello messages when the protocol is configured on an interface. ES-IS is a
resolution protocol that allows a network to be fully ISO integrated at both the network
layer and the data layer.
The resolution of Layer 3 ISO NSAPs to Layer 2 subnetwork point of attachments (SNPAs)
by ES-IS is equivalent to ARP within an IPv4 network. If a device is a provider edge (PE)
router within a CLNS island that contains any end systems, you must configure ES-IS on
the device.
For more information about ES-IS, see the ISO 9542 standard.
This example shows how to create a routing instance and enable ES-IS for CLNS on all
interfaces.
• Requirements on page 84
• Overview on page 84
• Configuration on page 84
• Verification on page 85
Requirements
Before you begin, configure the network interfaces. See Interfaces Feature Guide for
Security Devices.
Overview
The configuration instructions in this topic describe how to create a routing-instance
called aaaa, set the end system configuration timer for the interfaces to 180, and set a
preference value to 30 for ES-IS.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit routing-instances aaaa
Results From configuration mode, confirm your configuration by entering the show
routing-instances command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show routing-instances
aaaa {
protocols {
esis {
preference 30;
interface all {
end-system-configuration-timer 180;
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the policy options are enabled for the routing instance.
Supported Platforms EX4600, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550M, SRX650
IS-IS extensions provide the basic interior gateway protocol (IGP) support for collecting
intradomain routing information for Connectionless Network Service (CLNS) destinations
within a CLNS network. Routers that learn host addresses through End
System-to-Intermediate System (ES-IS) can advertise the addresses to other routers
(intermediate systems) by using IS-IS.
For more information about IS-IS, see the ISO 10589 standard.
This example shows how to create a routing instance and enable IS-IS protocol on all
interfaces.
• Requirements on page 87
• Overview on page 88
• Configuration on page 88
• Verification on page 89
Requirements
Before you begin, configure the network interfaces. See Interfaces Feature Guide for
Security Devices.
Overview
The configuration instructions in this topic describe how to create a routing-instance
called aaaa, enable IS-IS on all interfaces, and define BGP export policy name (dist-bgp),
family (ISO), and protocol (BP), and apply the export policy to IS-IS.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit routing-instances aaaa
4. (Optional) Disable IPv4 and IPv6 routing to configure a pure CLNS network .
[edit policy-options]
user@host# set policy-statement dist-bgp from family iso protocol bgp
[edit policy-options]
user@host# set policy-statement dist-bgp then accept
Results From configuration mode, confirm your configuration by entering the show
routing-instances command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show routing-instances
aaaa {
protocols {
isis {
export dist-bgp;
no-ipv4-routing;
no-ipv6-routing;
clns-routing;
interface all;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the policy options are enabled for the routing instance.
Supported Platforms MX Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550M, SRX650
The Connectionless Network Service (CLNS) is an ISO Layer 3 protocol that uses network
service access point (NSAP) reachability information instead of IPv4 or IPv6 prefixes.
You can configure static routes to exchange CLNS routes within a CLNS island. A CLNS
island is typically an IS-IS level 1 area that is part of a single IGP routing domain. An island
can contain more than one area. CLNS islands can be connected by VPNs.
Supported Platforms MX Series, SRX1500, SRX300, SRX320, SRX340, SRX345, SRX550M, vSRX
• Requirements on page 91
• Overview on page 91
• Configuration on page 92
• Verification on page 93
Requirements
Before you begin, configure the network interfaces. See Interfaces Feature Guide for
Security Devices.
Overview
In this example, you configure static routes for CLNS. In the absence of an interior gateway
protocol (IGP) on a certain link, a routing device might need to be configured with static
routes for CLNS prefixes to be reachable by way of that link. This might be useful, for
example, at an autonomous system (AS) boundary.
When you configure static routes for CLNS, consider the following tasks:
• Specify the iso.0 routing table option to configure a primary instance CLNS static route.
• Specify the instance-name.iso.0 routing table option to configure a CLNS static route
for a particular routing instance.
• Specify the route nsap-prefix statement to configure the destination for the CLNS static
route.
• Specify the next-hop (interface-name | iso-net) statement to configure the next hop,
specified as an ISO network entity title (NET) or interface name.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
[edit]
user@host# commit
Results Confirm your configuration by issuing the show routing-options command. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
Verification
Purpose Make sure that the expected routes appear in the routing table.
47.0005.80ff.f800.0000.0108.0001.1921.6800.4212/152
*[Static/5] 00:00:25
> via t1-0/2/2.0
47.0005.80ff.f800.0000.eee0/84
*[Static/20] 00:04:01, metric 10, metric2 10
> to #75 0.12.0.34.0.56 via fe-0/0/1.0
47.0005.80ff.f800.0000.ffff.ffff/104
*[Static/5] 00:04:01, metric2 0
> via t1-0/2/2.0
Supported Platforms MX Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550M, SRX650
BGP extensions allow BGP to carry Connectionless Network Service (CLNS) virtual private
network (VPN) network layer reachability information (NLRI) between provider edge
(PE) routers. Each CLNS route is encapsulated into a CLNS VPN NLRI and propagated
between remote sites in a VPN.
CLNS is a Layer 3 protocol similar to IP version 4 (IPv4). CLNS uses network service
access points (NSAPs) to address end systems. This allows for a seamless autonomous
system (AS) based on International Organization for Standardization (ISO) NSAPs.
A single routing domain consisting of ISO NSAP devices are considered to be CLNS
islands. CLNS islands are connected together by VPNs.
You can configure BGP to exchange ISO CLNS routes between PE routers connecting
various CLNS islands in a VPN using multiprotocol BGP extensions. These extensions
are the ISO VPN NLRIs.
Each CLNS network island is treated as a separate VPN routing and forwarding instance
(VRF) instance on the PE router.
You can configure CLNS on the global level, group level, and neighbor level.
This example shows how to create a BGP group for CLNS VPNs, define the BGP peer
neighbor address for the group, and define the family.
• Requirements on page 96
• Overview on page 96
• Configuration on page 96
• Verification on page 97
Requirements
Before you begin, configure the network interfaces. See the Interfaces Feature Guide for
Security Devices.
Overview
In this example, you create the BGP group called pedge-pedge, define the BGP peer
neighbor address for the group as 10.255.245.215, and define the BGP family.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.
1. Configure the BGP group and define the BGP peer neighbor address.
[edit]
user@host# commit
Verification
Action From operational mode, run the show bgp neighbor 10.255.245.213 command. Look for
iso-vpn-unicast in the output.
This example shows how to create a CLNS routing instance and set the instance type
for Layer 3 VPNs.
• Requirements on page 98
• Overview on page 98
• Configuration on page 98
• Verification on page 99
Requirements
Before you begin, configure the network interfaces. See Interfaces Feature Guide for
Security Devices.
Overview
The following example shows how to create a CLNS routing instance called aaaa and
set the instance type to VRF for Layer 3 VPNs. Within the example, you specify that the
lo0.1 interface, e1–2/0/0.0 interface, and t1–3/0/0.0 interface all belong to the routing
instance. The route distinguisher is set as 10.255.245.1:1 and the policy for the Layer 3
VRF table is set as target:11111:1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit routing-instances aaaa
Results From configuration mode, confirm your configuration by entering the show
routing-instances command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit ]
user@host# show routing-instances
instance-type vrf;
interface ge-0/0/2.0;
interface ge-0/0/3.0;
interface lo0.1;
route-distinguisher 10.255.245.1:1;
vrf-target target:11111:1;
If you are done configuring the device, enter commit from configuration mode.
Verification
Purpose Verify that the device is configured correctly for CLNS VPNs.
Action From configuration mode in the CLI, enter the show command.
[edit]
user@host# show
interfaces {
e1–2/0/0.0 {
unit 0 {
family inet {
address 192.168.37.51/31;
}
family iso;
family mpls;
}
}
t1–3/0/0.0 {
unit 0 {
family inet {
address 192.168.37.24/32;
}
family iso;
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 127.0.0.1/32;
address 10.255.245.215/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.1921.6800.4215.00;
}
}
unit 1 {
family iso {
address 47.0005.80ff.f800.0000.0108.aaa2.1921.6800.4215.00;
}
}
}
}
routing-options {
autonomous-system 230;
}
protocols {
bgp {
group pedge-pedge {
type internal;
local-address 10.255.245.215;
neighbor 10.255.245.212 {
family iso-vpn {
unicast;
}
}
}
}
}
policy-options {
policy-statement dist-bgp {
from {
protocol bgp;
family iso;
}
then accept;
}
}
routing-instances {
aaaa {
instance-type vrf;
interface lo0.1;
interface e1–2/0/0.0;
interface t1–3/0/0.0;
route-distinguisher 10.255.245.1:1;
vrf-target target:11111:1;
routing-options {
rib aaaa.iso.0 {
static {
iso-route 47.0005.80ff.f800.0000.bbbb.1022/104
next-hop 47.0005.80ff.f800.0000.aaaa.1000.1921.6800.4196.00;
}
}
}
protocols {
esis {
interface all;
}
isis {
export dist-bgp;
no-ipv4–routing;
no-ip64–routing;
clns–routing;
interface all;
}
}
}
}
Configuring VPLS
• Introduction to VPLS on page 105
• Configuring Interfaces on page 113
• Configuring Routing Instances on page 123
• Configuring Routing and Signaling Protocols on page 131
• Configuring Encapsulation on page 171
Introduction to VPLS
VPLS Overview
VPLS, in its implementation and configuration, has much in common with an MPLS Layer
2 VPN. In a VPLS topology, a packet originating within a customer’s network is sent first
to a customer edge (CE) device (for example, a router or Ethernet switch). It is then sent
to a provider edge (PE) router within the service provider’s network. The packet traverses
the service provider’s network over an MPLS label-switched path (LSP). It arrives at the
egress PE router, which then forwards the traffic to the CE device at the destination
customer site.
The difference is that for VPLS, packets can traverse the service provider’s network in
point-to-multipoint fashion, meaning that a packet originating from a CE device can be
broadcast to all the PE routers participating in a VPLS routing instance. In contrast, a
Layer 2 VPN forwards packets in point-to-point fashion only. The paths carrying VPLS
traffic between each PE router participating in a routing instance are signaled using BGP.
NOTE: The RSVP automatic mesh feature with multiple RSVP neighbors on
a single LAN is not supported on SRX Series devices because RSVP runs on
WAN links in a service provider network. Most of these WAN interfaces are
point-to-point and are rarely seen in LAN networks.
10.11.3.1/24
vlan 600 trunk
fe-0/0/3
PE1
172.28.1.2
fe-0/0/5
172.28.2.133/30
Internet
172.28.2.133/30
fe-0/0/5
PE2
172.28.1.1
fe-0/0/3
vlan 600 trunk
10.11.3.1/24
CE2
In this sample, the PE routers use the same autonomous system (AS). Within the AS,
routing information is communicated through an interior gateway protocol (IGP). Outside
the AS, routing information is shared with other ASs through BGP. The PE routers must
use the same signaling protocols to communicate.
VPLS on PE Routers
Within a VPLS configuration, a device running Junos OS can act as a PE router. Junos OS
passes the VPLS traffic through the following ports and PIMs on the Juniper Networks
device to CE routers in the VPLS network:
NOTE: Ports on uPIMs and ePIMs must be in routing mode before you can
configure the corresponding interfaces for VPLS.
Because a VPLS carries Ethernet traffic across a service provider network, it must mimic
an Ethernet network in some ways. When a PE router configured with a VPLS routing
instance receives a packet from a CE device, it first determines whether it has the
destination of the VPLS packet in the appropriate routing table. If it does, it forwards the
packet to the appropriate PE router or CE device. If it does not, it broadcasts the packet
to all other PE routers and CE devices that are members of that VPLS routing instance.
In both cases, the CE device receiving the packet must be different from the one sending
the packet.
When a PE router receives a packet from another PE router, it first determines whether
it has the destination of the VPLS packet in the appropriate routing table. If it does, the
PE router either forwards the packet or drops it depending on whether the destination is
a local or remote CE device:
• If the destination is a local CE device, the PE router forwards the packet to it.
If the PE router cannot determine the destination of the VPLS packet, it floods the packet
to all attached CE devices. Figure 9 on page 108 illustrates this process.
Service Provider
g032400
g017174
CE3 (Origin)
An MPLS label-switched interface (LSI) label is used as the inner label for VPLS. This
label maps to a VPLS routing instance on the ingress PE router. On the egress PE router,
the LSI label is stripped and then mapped to a logical LSI interface. The Layer 2 Ethernet
frame is then forwarded using the LSI interface to the correct VPLS routing instance.
One restriction on flooding behavior in VPLS is that traffic received from remote PE routers
is never forwarded to other PE routers. This restriction helps prevent loops in the core
network. However, if a CE Ethernet switch has two or more connections to the same PE
router, you must enable the Spanning Tree Protocol (STP) on the CE switch to prevent
loops.
• When you configure VPLS routing instances and establish two or more connections
between a CE Ethernet switch and a PE router, you must enable the Spanning Tree
Protocol (STP) on the switch to prevent loops.
• Junos OS allows standard bridge protocol data unit (BPDU) frames to pass through
emulated Layer 2 connections, such as those configured with Layer 2 VPNs, Layer 2
circuits, and VPLS instances. However, CE Ethernet switches that generate proprietary
BPDU frames might not be able to run STP across Juniper Networks routing platforms
configured for these emulated Layer 2 connections.
• SRX Series devices support only the following encapsulation types on VPLS interfaces
that face CE devices: extended VLAN VPLS, Ethernet VPLS, and VLAN VPLS. Ethernet
VPLS over ATM LLC encapsulation is not supported.
• Virtual ports are generated dynamically on a Tunnel Services PIC on some Juniper
Networks routing platforms. SRX Series devices do not support Tunnel Services modules
or virtual ports.
• The VPLS implementation on SRX Series devices does not support dual-tagged frames.
Therefore, VLAN rewrite operations are not supported on dual-tagged frames. VLAN
rewrite operations such as pop-pop, pop-swap, push-push, swap-push, and swap-swap,
which are supported on M Series and T Series routing platforms, are not supported on
SRX Series devices.
To configure VPLS functionality, you must enable VPLS support on the provider edge
(PE) routers. You must also configure PE routers to distribute routing information to the
other PE routers in the VPLS and configure the circuits between the PE routers and the
customer edge (CE) devices, as explained in the steps that follow.
To configure VPLS:
1. Determine which uPIM and ePIM ports correspond to the interfaces that will carry the
VPLS traffic and enable routing mode on those ports.
2. Configure the interfaces that will carry the VPLS traffic between the PE router and CE
devices. On the PE router interfaces that are facing the CE devices, specify a VPLS
encapsulation type. The type of encapsulation depends on the interface type.
See“Example: Configuring Routing Interfaces on the VPLS PE Router” on page 115 and
“Example: Configuring the Interface to the VPLS CE Device” on page 116.
3. Create a VPLS routing instance on each PE router that is participating in the VPLS.
For each VPLS routing instance, specify which interfaces will carry the VPLS traffic
between the PE and CE devices. On the CE device interface that faces the PE router,
you must specify inet (for IPv4), and include the IP address. Additionally, each routing
instance must have a unique route distinguisher associated with it. (VPN routing
instances need a route distinguisher to help BGP identify overlapping network layer
reachability information (NLRI) messages from different VPNs.) See “Example:
Configuring the VPLS Routing Instance” on page 126.
4. Configure routing options on the PE router. See “Example: Configuring Routing Options
on the VPLS PE Router” on page 169.
5. Configure MPLS LSPs between the PE routers. See “Example: Configuring MPLS on
the VPLS PE Router” on page 133.
6. Configure RSVP on the PE routers. Enable RSVP for all connections that participate
in the MPLS LSP. See “Example: Configuring RSVP on the VPLS PE Router” on page 132.
7. Configure an IBGP session between PE routers so that the routers can exchange
information about routes originating and terminating in the VPLS. See “Example:
Configuring BGP on the VPLS PE Router” on page 168.
Configuring Interfaces
For each VPLS routing instance on a PE router, you specify which interfaces are to be
used to carry VPLS traffic between the PE and CE devices.
Interface Name
Specify both the physical and logical portions of the interface name, in the following
format:
physical.logical
For example, in ge-1/2/1.2, ge-1/0/1 is the physical portion of the interface name and 2 is
the logical portion. If you do not specify the logical portion of the interface name, 0 is set
by default. A logical interface can be associated with only one routing instance.
Encapsulation Type
The physical link-layer encapsulation type for a VPLS interface can be one of the following:
For flexible Ethernet services encapsulation, VLAN IDs from 1 through 511 are no longer
reserved for normal VLANs.
VLAN Rewrite
You can rewrite VLAN tags on VPLS interfaces. Rewriting VLAN tags allows you to use
an additional (outer) VLAN tag to differentiate between CE devices that share a VLAN
ID.
You can configure rewrite operations to stack (push), remove (pop), or rewrite (swap)
tags on single-tagged frames. If a port is not configured for VLAN tagging, rewrite
operations are not supported on any logical interface on that port.
• pop—Remove a VLAN tag from the top of the VLAN tag stack. The outer VLAN tag of
the frame is removed.
• push—Add a new VLAN tag to the top of the VLAN stack. An outer VLAN tag is pushed
in front of the existing VLAN tag.
• swap—Replace the VLAN tag at the top of the VLAN tag stack with a user-specified
VLAN tag value.
You perform VLAN rewrite operations by applying input and output VLAN maps at the
ingress and egress, respectively, of the interface. For incoming frames, use the
input-vlan-map; for outgoing frames, use the output-vlan-map.
The VPLS implementation on SRX Series devices does not support dual-tagged frames.
Therefore, VLAN rewrite operations are not supported on dual-tagged frames. VLAN
rewrite operations such as pop-pop, pop-swap, push-push, swap-push, and swap-swap,
which are supported on M Series and T Series routing platforms, are not supported on
SRX Series devices.
Related • Example: Configuring Routing Interfaces on the VPLS PE Router on page 115
Documentation
• Example: Configuring the Interface to the VPLS CE Device on page 116
This example shows how to configure routing interfaces on the VPLS PE router.
Requirements
Before you begin, see Understanding Selective Stateless Packet-Based Services .
Overview
In this example, you configure the PE1 router loopback interface and the interface to the
PE2 router ge-2/0/1.
Configuration
[edit]
user@host# set interfaces lo0 unit 0 family inet address 10.255.7.168/32 primary
[edit]
user@host# set interfaces ge-3/0/2 unit 0 family inet address 100.1.1.1/30
[edit]
user@host# set interfaces ge-3/0/2 unit 0 family mpls
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show interfaces command.
This example shows how to configure the router interface that is connected to the CE
device to include VPLS encapsulation.
Requirements
Before you begin, see Understanding Selective Stateless Packet-Based Services .
Overview
In this example, you configure the router interface ge-1/2/1 that is connected to the CE
device to include VPLS encapsulation.
Configuration
[edit]
user@host# set interfaces ge-1/2/1 encapsulation ethernet-vpls
[edit]
user@host# set interfaces ge-1/2/1 unit 0 family vpls
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show interfaces ge-1/2/1
command.
This feature permits users to configure both firewall filters and policers for virtual private
LAN service (VPLS). Firewall filters enable you to filter packets based on their components
and perform an action on packets that match the filter. Policers enable you to limit the
amount of traffic that passes into or out of an interface.
This feature can be enabled by configuring VPLS filters, policers, and accounting through
various CLI commands. VPLS filters and policers act on a Layer 2 frame that includes the
media access control (MAC) header (after any VLAN rewrite or other rules are applied),
but that does not include the cyclical redundancy check (CRC) field.
NOTE: You can apply VPLS filters and policers on the PE routers only to
customer-facing (PE-CE) interfaces.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure RSVP-TE on the PE routers. See “Example: Configuring RSVP on the VPLS
PE Router” on page 132.
Overview
This example describes how to configure filtering and accounting for VPLS.
Configuration
CLI Quick To quickly configure VPLS filters, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
set firewall family vpls filter blue term term1 from interface ge-3/0/0.512
set firewall family vpls filter blue term term1 from interface fe-5/0/0.512
set firewall family vpls filter blue term term1 then count count1
set firewall family vpls filter blue accounting-profile fw_profile
set accounting-options file fw_acc size 500k
set accounting-options file fw_acc transfer-interval 5
set accounting-options filter-profile fw_profile file fw_acc
set accounting-options filter-profile fw_profile interval 1
set accounting-options filter-profile fw_profile counters count1
set interfaces ge-0/0/1 unit 512 family vpls filter input blue
[edit ]
user@host# set firewall family vpls filter blue term term1 from interface ge-3/0/0.512
2. Configure a filter with an FE interface as the match condition and count as the
action.
[edit ]
user@host# set firewall family vpls filter blue term term1 from interface fe-5/0/0.512
[edit ]
user@host# set firewall family vpls filter blue term term1 then count count1
[edit ]
user@host# set firewall family vpls filter blue accounting-profile fw_profile
[edit ]
user@host# set accounting-options file fw_acc size 500k
[edit ]
user@host# set accounting-options file fw_acc transfer-interval 5
[edit ]
user@host# set accounting-options filter-profile fw_profile file fw_acc
[edit ]
user@host# set accounting-options filter-profile fw_profile interval 1
[edit ]
user@host# set accounting-options filter-profile fw_profile counters count1
[edit ]
user@host# set interfaces ge-0/0/1 unit 512 family vpls filter input blue
11. If you are done configuring the device, commit the configuration.
[edit ]
user@host# commit
Verification
To verify the configuration is working properly, enter the show firewall and show accounting
records commands.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure RSVP-TE on the PE routers. See “Example: Configuring RSVP on the VPLS
PE Router” on page 132.
Overview
This example describes how to configure policing and apply it on the interface for VPLS.
is enabled, all flow-based security features are deactivated and the device
performs packet-based processing. Flow-based services such as security
policies, zones, NAT, ALGs, chassis clustering, screens, firewall authentication,
and IPsec VPNs are unavailable on the device.
Configuration
CLI Quick To quickly configure VPLS policers, copy the following commands, paste them into a
Configuration text file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
[edit ]
user@host# set firewall policer police2 if-exceeding bandwidth-percent 10
[edit ]
user@host# set firewall policer police2 if-exceeding burst-size-limit 1500
[edit ]
user@host# set firewall policer police2 then discard
[edit ]
user@host# set interfaces ge-0/0/1 unit 512 family vpls policer input police2
[edit ]
user@host# commit
Verification
To verify the configuration is working properly, enter the show firewall command.
To configure VPLS functionality, you must enable VPLS support on the PE router. You
must also configure PE routers to distribute routing information to the other PE routers
in the VPLS and configure the circuits between the PE routers and the CE devices.
You create a VPLS routing instance on each PE router that is participating in the VPLS.
The routing instance has the same name on each PE router. To configure the VPLS routing
instance, you specify the following:
• Route target—Defines which route is part of a VPLS. A unique route target helps
distinguish between different VPLS services on the same router.
• Site range—Specifies total number of sites in the VPLS. The site range must be greater
than the site identifier.
• Interface to the CE router—Specifies the physical interface to the CE router that carries
VPLS traffic. The interface must be configured for a VPLS encapsulation type.
NOTE: In addition to the VPLS routing instance, you must configure MPLS
label-switched paths (LSPs) between the PE routers, internal BGP (IBGP)
sessions between the PE routers, and an interior gateway protocol (IGP) on
the PE routers.
BGP Signaling
BGP is used to signal the paths between each of the PE routers participating in the VPLS
routing instance. These paths carry VPLS traffic across the service provider's network
between the VPLS sites.
NOTE: LDP signaling is not supported for the VPLS routing instance.
• VPLS site name and site identifier—When you configure BGP signaling for the VPLS
routing instance, you must specify each VPLS site that has a connection to the router.
For each VPLS site, you must configure a site name and site identifier (a numerical
identifier between 1 to 65,534 that uniquely identifies the VPLS site).
• Site range—When you enable BGP signaling for the VPLS routing instance, you need
to configure a site range. The site range specifies the total number of sites in the VPLS.
NOTE: The site range value must be greater than the largest site identifier.
• Site preference—You can specify the preference value advertised for a particular VPLS
site. The site preference value is encoded in the BGP local preference attribute. When
a PE router receives multiple advertisements with the same VPLS edge (VE) device
identifier, the advertisement with the highest local preference value is preferred.
• Table size—You can modify the size of the VPLS MAC address table. The default table
size is 512 MAC addresses; the minimum is 16 addresses, and the maximum is 65,536
addresses.
If the MAC table limit is reached, new MAC addresses can no longer be added to the
table. Eventually the oldest MAC addresses are removed from the MAC address table
automatically. This frees space in the table, allowing new entries to be added. However,
as long as the table is full, new MAC addresses are dropped.
The interfaces affected include all of the interfaces within the VPLS routing instance,
including the local interfaces and the LSI interfaces.
• Timeout interval—You can modify the timeout interval for the VPLS table. The default
timeout interval is 300 seconds; the minimum is 10 seconds, and the maximum is
1,000,000 seconds. We recommend you configure longer values for small, stable VPLS
networks and shorter values for large, dynamic VPLS networks. If the VPLS table does
not receive any updates during the timeout interval, the router waits one additional
interval before automatically clearing the MAC address entries from the VPLS table.
Because this limit applies to each VPLS routing instance, the MAC addresses of a single
interface can consume all the available space in the table, preventing the routing
instance from acquiring addresses from other interfaces. You can limit the number of
MAC addresses learned from all interfaces configured for a VPLS routing instance, as
well as limit the number of MAC addresses learned from a specific interface.
The MAC limit configured for an individual interface overrides the limit configured for
all interfaces for the VPLS routing instance. Also, the table limit can override the limits
configured for the interfaces.
Trace Options
The following trace flags display operations associated with VPLS:
• error—Error conditions
• route—Trace-routing information
This example shows how to create a VPLS routing instance on each PE router that is
participating in the VPLS.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
Overview
This example describes how to create a VPLS routing instance; configure VPLS site
identifier, site range, no tunnel services option, route distinguisher, and route target for
the VPLS routing instance; and specify the VPLS interface to the CE router.
NOTE: You must specify no tunnel services in the VPLS routing instance
configuration, because SRX Series devices do not support tunnel serial PICs.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit routing-instances green
3. Configure the VPLS site identifier and range for the VPLS routing instance.
Results From configuration mode, confirm your configuration by entering the show
routing-instances green command. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show routing-instances green
instance-type vpls;
interface ge-1/2/1.0;
route-distinguisher 10.255.7.1:1;
vrf-target target:11111:1;
protocols {
vpls {
site-range 10;
no-tunnel-services;
site R3 {
site-identifier 2;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that attributes such as VPLS site identifier, site range, no tunnel services option,
route distinguisher, and route target for the VPLS routing instance are configured.
Action From operational mode, enter the show routing-instances green protocols vpls command.
This example shows how to configure automatic site identifiers for VPLS sites.
Requirements
Before you begin, see information on selective stateless packet-based services in
Interfaces Feature Guide for Security Devices.
Overview
When you enable automatic site identifiers, the Junos OS automatically assigns site
identifiers to VPLS sites. In this example, you configure a routing instance called vpls
instance and enable automatic site identifiers for VPLS.
NOTE: Site identifiers for VPLS sites can be different for different routing
instances.
Configuration
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host#set routing-instances vpls-instance
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show vpls connections command.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
Overview
The PE routers exchange routing information using an IGP such as OSPF. In this example,
you configure OSPF area 0.0.0.0 on the VPLS PE router and traffic engineering for OSPF.
Configuration
[edit]
user@host# set protocols ospf area 0.0.0.0 interface t1-1/0/1.0
user@host# set protocols ospf area 0.0.0.0 interface lo0.0
[edit]
user@host# set protocols ospf traffic-engineering
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show protocols command.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See“Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
Overview
This example describes how to enable RSVP for all connections that participate in the
LSP on the PE1 router.
Configuration
[edit ]
user@host# set protocols rsvp interface t1-1/0/1.0
[edit ]
user@host# set protocols rsvp interface lo0.0
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show protocols command.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See“Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure RSVP-TE on the PE routers. See “Example: Configuring RSVP on the VPLS
PE Router” on page 132.
Overview
This example shows you how to configure MPLS on the PE1 router to advertise the Layer
2 VPN interface that communicates with the PE2 router.
Configuration
[edit ]
user@host# set protocols mpls interface t1-1/0/1.0
[edit ]
user@host# set protocols mpls interface lo0.0
[edit ]
user@host# set protocols mpls label-switched-path chelsea-sagar to 10.255.7.164
[edit ]
user@host# commit
Verification
To verify the configuration is working properly, enter the show mpls command.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
Overview
This example describes how to enable LDP for all connections that participate in the LSP
on the PE1 router.
Configuration
[edit ]
user@host# set protocols ldp interface ge-3/0/2
[edit ]
user@host# set protocols ldp interface lo0
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show protocols command.
This example demonstrates a network scenario consisting of a central office and one
branch office that will use VPLS, MPLS, GRE, and IPsec to create secure Ethernet
connectivity over a Layer 3 network. This configuration can be expanded to add many
other branch sites.
Requirements
Before you begin:
• Ensure that a layer 3 network is in place for all branch offices and that there is an ingress
(head-end) device at the central office configured to terminate the VPNs from each
branch office.
• Obtain IDP licenses for each SRX Series device. IDP is used to reassemble GRE packets
that might become fragmented.
Overview
Junos OS can selectively choose whether traffic is processed by the flow engine or packet
engine using the selective stateless packet-based feature. This feature allows you to
combine flow and packet-based services in a single device. In this example, we describe
a deployment scenario that uses this feature to deploy large-scale VPLS over GRE. This
enables SRX devices to securely transport Ethernet traffic over Layer 3 networks when
used in conjunction with IPsec.
In this scenario you configure a central office ingress (head-end) using an SRX650 device
and one branch office using an SRX240 device. This setup is accomplished by carrying
MPLS pseudowires over GRE, which in turn, is encapsulated in IPsec in order to guarantee
data integrity and confidentiality. By default, SRX Series devices use secure flow
forwarding. Because VPLS services are provided in packet-mode only, the configuration
requires the GRE tunnel to be terminated in a packet-mode routing instance (the default
routing instance).
NOTE: You can also use an MX Series device as the ingress (head-end) device,
which is mentioned later in this topic.
To better understand this configuration, we will discuss two scenarios. The first scenario
uses pseudowires to allow the creation of point-to-point circuits between two endpoints
carried over the MPLS network. If we leave the signaling protocols aside (that is, there
are a few ways to provision the pseudowires), these connections are just point-to-point
connections. Using this approach provides an end-to-end wire between sites. This is
beneficial from a traffic processing point of view because the gateways do not need to
do MAC address learning, they simply forward anything they receive to the pseudowire.
Because of this, it may be difficult to deploy this setup when trying to provide connectivity
to multiple branch offices.
The second scenario could use VPLS to provide a Layer 2 network abstraction. With
VPLS, endpoints are expected to negotiate LSPs and pseudowires with every other
endpoint (that is, they are fully meshed). When a node receives an Ethernet frame from
one of its LAN interfaces the source MAC address is learned, if it’s not already known,
and flooded using every pseudowire connecting to all other branch nodes. However, if
the destination has been previously learned, then the frame is sent to the appropriate
destination. When an Ethernet frame is received through one of the pseudowires (that
is, from the MPLS network), source MAC address learning is performed. The next time a
frame is sent to that MAC it does not need to be flooded and the frame is flooded to
every single LAN interface in the node, but not over the pseudowires. In other words, the
network acts as a distributed Layer 2 switch providing any-to-any Ethernet connectivity
between the devices connected to the different nodes in the network.
In this example, we use a hybrid approach to these two scenarios. We use a circuit cross
connect (CCC) at each branch office stitched to a VPLS instance at central office
(ingress). This solution makes sense if most of the traffic flows from the branch offices
to central office, and the branch-to-branch office traffic is always forwarded through
the hub. The use of CCCs at branch offices combined with VPLS stitching at the central
office provides a scalable way to deploy large hub-and-spoke topologies where Ethernet
must be transported over an IP network (with or without encryption). At the expense of
configuration complexity, it is possible to use SRX Series devices to terminate such
connections, providing a scalable and cost-effective way to deploy small-to-large
networks where Ethernet traffic is carried transparently using lower cost IP connections.
Figure 10 on page 138 shows this topology.
Central Office
(Head-End)
L2
switch
SRX650
Internet
Circuit Cross Connect (CCC)
Circuit Cross Connects
stitched from each remote
site to a VPLS instance
at the Head-End.
SRX240 SRX240
g031178
In this deployment, VPLS services are provided only in packet mode and must be
configured in the default routing instance. Unfortunately, IPsec is only provided in flow
mode. Hence, a flow-mode routing-instance is used that provides both GRE reassembly
and IPsec termination. While the GRE termination is done in the default routing instance,
a flow-mode routing instance is connected between the default routing instance and
the Internet (or whatever Layer 3 network is used as a transport), and it terminates the
IPsec tunnel towards the ingress device. Because it is likely that a single public IP address
is available, the Internet-facing Interface is connected to the default routing instance
and is used to terminate IKE; however, the tunnel interface (st0) is bound to the
flow-mode routing instance. See Figure 11 on page 139.
Internet
or L3 transport network
10.2.1.2/32
SRX Series
device
st0.0
IPSec
flow-vr
GRE- It0/0/0.0
GRE It-0/0/0.0
10.1.1.2/32 gr-0/0/0.0
ge-0/0/0
default-vr Underlying
IKE interface
ge-0/0/1
g031179
Branch Office
LAN/Switch
When configuring the central office SRX650, the first thing you do is terminate the IPsec
tunnels, GRE, and CCC connections. Because a SRX Series device is used as the ingress
(head-end), the configuration to terminate the CCC circuits is identical to the one used
at each branch office, with the exception that instead of one tunnel, multiple tunnels
(and pseudowires) are terminated.
The pseudowires are stitched to a VPLS routing instance using logical tunnel (lt)
interfaces. It is possible to use an lt interface unit to terminate a CCC connection and
connect this unit to a different unit that is part of a VPLS routing instance. The overall
result is as if the pseudowires were terminated directly in the VPLS routing instance.
Figure 12 on page 140 illustrates this configuration.
Internet
or L3 transport network
IPsec encapsulates
GRE traffic
172.19.101.26/24
SRX 650
device ge-0/0/0.0
Underlying IKE
st0.0 IPSec gr-0/0/0.0 interface
flow-vr
GRE It-0/0/0.2000
GRE It-0/0/0.1
10.1.1.1/32
default-vr
lt-0/0/0.1000
Stitching multiple
CCC
CCCs (one for each
branch office) to the
lt-0/0/0.0 VPLS routince instance
VPLS
VPLS
routing instance
ge-0/0/1.0
VPLS
g031180
Central Office
LAN/Switch
You can also use an MX Series device as the central office ingress (head-end) to terminate
all branch office connections. The differences in the configuration are due to the way
IPsec is configured and the fact that on MX Series devices IDP is not required to
reassemble the GRE packets; MX Series devices natively support GRE reassembly. With
this configuration, you still use lt interfaces to stitch the CCCs between the remote branch
offices and the VPLS routing instance as shown in Figure 13 on page 141.
Internet
or L3 transport network
IPsec encapsulates
GRE traffic
172.19.101.26/24
MX Series
device ge-2/0/4.0
sp-0/0/0.1 Underlying IKE
(inside) gr-0/0/0.0 interface
default-vr
lt-0/0/0.1000
Stitching multiple
CCC
CCCs (one for each
branch office) to the
lt-0/0/0.0 VPLS routince instance
VPLS
VPLS
routing instance
ge-2/1/0.0
VPLS
g031181
Central Office
LAN/Switch
Configuration
In this example, we use SRX Series devices and the branch and ingress (head-end) sites
will typically be connected to the Internet by Frame-Relay/T1-E1/xDSL/T3/E3 or even
Ethernet. A provider MPLS network is not required.
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
set security idp idp-policy gre-reassembly rulebase-ips rule match-all match application
junos-gre
set security idp idp-policy gre-reassembly rulebase-ips rule match-all then action
ignore-connection
set security idp active-policy gre-reassembly
set firewall family inet filter inet-packet-mode term control-traffic from protocol tcp
set firewall family inet filter inet-packet-mode term control-traffic from port 22
set firewall family inet filter inet-packet-mode term control-traffic from port 80
set firewall family inet filter inet-packet-mode term control-traffic from port 8080
set firewall family inet filter inet-packet-mode term control-traffic then accept
set firewall family inet filter inet-packet-mode term packet-mode then packet-mode
set firewall family inet filter inet-packet-mode term packet-mode then accept
set firewall family mpls filter mpls-packet-mode term packet-mode then packet-mode
set firewall family mpls filter mpls-packet-mode term packet-mode then accept
set firewall family ccc filter ccc-packet-mode term all then packet-mode
set firewall family ccc filter ccc-packet-mode term all then accept
set routing-instances flow-vr instance-type virtual-router
set routing-instances flow-vr interface lt-0/0/0.0
set routing-instances flow-vr interface st0.0
set routing-instances flow-vr routing-options static route 10.1.1.1/32 next-hop st0.0
set routing-instances flow-vr routing-options static route 10.1.1.2/32 next-hop lt-0/0/0.0
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit interfaces]
user@host# set gr-0/0/0 description "GRE tunnel to SRX650”
user@host# set gr-0/0/0 unit 0 clear-dont-fragment-bit
user@host# set gr-0/0/0 unit 0 tunnel source 10.1.1.2
user@host# set gr-0/0/0 unit 0 tunnel destination 10.1.1.1
user@host# set gr-0/0/0 unit 0 tunnel allow-fragmentation
user@host# set gr-0/0/0 unit 0 family inet mtu 2000
user@host# set gr-0/0/0 unit 0 family inet filter input inet-packet-mode
user@host# set gr-0/0/0 unit 0 family mpls mtu 1900
user@host# set gr-0/0/0 unit 0 family mpls filter input mpls-packet-mode
[edit interfaces]
user@host# set lt-0/0/0 unit 0 encapsulation frame-relay
user@host# set lt-0/0/0 unit 0 dlci 16
user@host# set lt-0/0/0 unit 0 peer-unit 1
user@host# set lt-0/0/0 unit 0 family inet
user@host# set lt-0/0/0 unit 0 description "Flow-vr Instance"
3. Connect the logical tunnel interface to the flow mode virtual router.
[edit interfaces]
user@host# set lt-0/0/0 unit 1 encapsulation frame-relay
user@host# set lt-0/0/0 unit 1 dlci 16
[edit interfaces]
user@host# set ge-0/0/1 encapsulation ethernet-ccc
user@host# set ge-0/0/1 unit 0 description "CCC Interface to customer LAN"
user@host# set ge-0/0/1 unit 0 family ccc filter input ccc-packet-mode
[edit interfaces]
user@host# set ge-0/0/0 unit 0 family inet address 172.19.101.45/24
[edit interfaces]
user@host# set lo0 unit 0 family inet address 10.2.1.2/32
[edit interfaces]
user@host# set st0 unit 0 family inet
8. Set a static route address, which will be the default gateway to the Internet.
[edit routing-options]
user@host# set static route 0.0.0.0/0 next-hop 172.19.101.1
[edit routing-options]
user@host# set static route 10.1.1.1/32 next-hop lt-0/0/0.1
10. Set a static route for the loopback interface of the SRX650 ingress (head-end)
device.
[edit routing-options]
user@host# set static route 10.2.1.1/32 next-hop gr-0/0/0.0
11. Configure MPLS and the CCC using LDP as the label protocol.
[edit]
user@host# set routing-options router-id 10.2.1.2
user@host# set protocols mpls interface gr-0/0/0.0
user@host# set protocols ldp interface gr-0/0/0.0
user@host# set protocols ldp interface lo0.0
user@host# set protocols l2circuit neighbor 10.2.1.1 interface ge-0/0/1.0
virtual-circuit-id 1
NOTE: The underlying IKE interface is not in the same routing instance
as the tunnel interface.
[edit security]
user@host# set ike policy SRX650 mode main
user@host# set ike policy SRX650 proposal-set standard
user@host# set ike policy SRX650 pre-shared-key ascii-text "$ABC123"
user@host# set ike gateway SRX650 ike-policy SRX650
user@host# set ike gateway SRX650 address 172.19.101.26
user@host# set ike gateway SRX650 external-interface ge-0/0/0.0
user@host# set ipsec policy SRX650 proposal-set standard
user@host# set ipsec vpn SRX650 bind-interface st0.0
user@host# set ipsec vpn SRX650 ike gateway SRX650
user@host# set ipsec vpn SRX650 ike ipsec-policy SRX650
user@host# set ipsec vpn SRX650 establish-tunnels immediately
[edit security]
user@host# set zones security-zone untrust host-inbound-traffic system-services
all
user@host# set zones security-zone untrust host-inbound-traffic protocols all
user@host# set zones security-zone untrust interfaces gr-0/0/0.0
user@host# set zones security-zone untrust interfaces lo0.0
user@host# set zones security-zone untrust interfaces lt-0/0/0.1
user@host# set zones security-zone untrust interfaces ge-0/0/0.0
user@host# set zones security-zone vpn host-inbound-traffic system-services all
user@host# set zones security-zone vpn host-inbound-traffic protocols all
user@host# set zones security-zone vpn interfaces st0.0
user@host# set zones security-zone trust-flow host-inbound-traffic system-services
all
user@host# set zones security-zone trust-flow host-inbound-traffic protocols all
user@host# set zones security-zone trust-flow interfaces lt-0/0/0.0
[edit security]
user@host# set policies from-zone trust-flow to-zone vpn policy gre match
source-address any
user@host# set policies from-zone trust-flow to-zone vpn policy gre match
destination-address any
user@host# set policies from-zone trust-flow to-zone vpn policy gre match
application junos-gre
user@host# set policies from-zone trust-flow to-zone vpn policy gre then permit
application-services idp
[edit firewall]
user@host# set family inet filter inet-packet-mode term control-traffic from protocol
tcp
user@host# set family inet filter inet-packet-mode term control-traffic from port
22
user@host# set family inet filter inet-packet-mode term control-traffic from port
80
user@host# set family inet filter inet-packet-mode term control-traffic from port
8080
user@host# set family inet filter inet-packet-mode term control-traffic then accept
user@host# set family inet filter inet-packet-mode term packet-mode then
packet-mode
user@host# set family inet filter inet-packet-mode term packet-mode then accept
user@host# set family mpls filter mpls-packet-mode term packet-mode then
packet-mode
user@host# set family mpls filter mpls-packet-mode term packet-mode then accept
user@host# set family ccc filter ccc-packet-mode term all then packet-mode
user@host# set family ccc filter ccc-packet-mode term all then accept
[edit routing-instances]]
user@host# set flow-vr instance-type virtual-router
user@host# set flow-vr interface lt-0/0/0.0
user@host# set flow-vr interface st0.0
user@host# set flow-vr routing-options static route 10.1.1.1/32 next-hop st0.0
user@host# set flow-vr routing-options static route 10.1.1.2/32 next-hop lt-0/0/0.0
Results From configuration mode, confirm your configuration by entering the show command. If
the output does not display the intended configuration, repeat the configuration
instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
set security policies from-zone trust-flow to-zone vpn policy gre match source-address
any
set security policies from-zone trust-flow to-zone vpn policy gre match destination-address
any
set security policies from-zone trust-flow to-zone vpn policy gre match application
junos-gre
set security policies from-zone trust-flow to-zone vpn policy gre then permit
application-services idp
set security policies from-zone vpn to-zone trust-flow policy gre match source-address
any
set security policies from-zone vpn to-zone trust-flow policy gre match destination-address
any
set security policies from-zone vpn to-zone trust-flow policy gre match application
junos-gre
set security policies from-zone vpn to-zone trust-flow policy gre then permit
application-services idp
set security idp idp-policy gre-reassembly rulebase-ips rule match-gre match application
junos-gre
set security idp idp-policy gre-reassembly rulebase-ips rule match-gre then action
ignore-connection
set security idp active-policy gre-reassembly
set firewall family inet filter inet-packet-mode term control-traffic from protocol tcp
set firewall family inet filter inet-packet-mode term control-traffic from port 22
set firewall family inet filter inet-packet-mode term control-traffic from port 80
set firewall family inet filter inet-packet-mode term control-traffic from port 8080
set firewall family inet filter inet-packet-mode term control-traffic then accept
set firewall family inet filter inet-packet-mode term packet-mode then packet-mode
set firewall family inet filter inet-packet-mode term packet-mode then accept
set firewall family mpls filter mpls-packet-mode term packet-mode then packet-mode
set firewall family mpls filter mpls-packet-mode term packet-mode then accept
set firewall family ccc filter ccc-packet-mode term all then packet-mode
set firewall family ccc filter ccc-packet-mode term all then accept
set routing-instances flow-vr instance-type virtual-router
set routing-instances flow-vr interface lt-0/0/0.2000
set routing-instances flow-vr interface st0.0
set routing-instances flow-vr routing-options static route 10.1.1.1/32 next-hop
lt-0/0/0.2000
set routing-instances flow-vr routing-options static route 10.1.1.2/32 next-hop st0.0
set routing-instances vpls-hub instance-type vpls
set routing-instances vpls-hub interface lt-0/0/0.0
set routing-instances vpls-hub interface ge-0/0/1.0
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit interfaces]
user@host# set ge-0/0/0 unit 0 family inet address 172.19.101.26/24
2. Create the GRE tunnel from the SRX650 to the SRX240 device.
[edit interfaces]
user@host# set gr-0/0/0 unit 0 clear-dont-fragment-bit
user@host# set gr-0/0/0 unit 0 tunnel source 10.1.1.1
user@host# set gr-0/0/0 unit 0 tunnel destination 10.1.1.2
user@host# set gr-0/0/0 unit 0 tunnel allow-fragmentation
user@host# set gr-0/0/0 unit 0 family inet mtu 1500
user@host# set gr-0/0/0 unit 0 family inet filter input inet-packet-mode
user@host# set gr-0/0/0 unit 0 family mpls filter input mpls-packet-mode
3. Configure a logical tunnel interface to stitch the CCC connection to the VPLS
instance.
[edit interfaces]
user@host# set lt-0/0/0 unit 0 description "VPLS hub port - Interconnect for CCC
to SRX240"
user@host# set lt-0/0/0 unit 0 encapsulation ethernet-vpls
user@host# set lt-0/0/0 unit 0 peer-unit 1000
[edit interfaces]
user@host# set lt-0/0/0 unit 1000 description "Stitch to VPLS for CCC to SRX240"
user@host# set lt-0/0/0 unit 1000 encapsulation ethernet-ccc
user@host# set lt-0/0/0 unit 1000 peer-unit 0
user@host# set lt-0/0/0 unit 1000 family ccc filter input ccc-packet-mode
[edit interfaces]
user@host# set lt-0/0/0 unit 2000 encapsulation frame-relay
user@host# set lt-0/0/0 unit 2000 dlci 1
user@host# set lt-0/0/0 unit 2000 peer-unit 2001
user@host# set lt-0/0/0 unit 2000 family inet
[edit interfaces]
user@host# set lt-0/0/0 unit 2001 encapsulation frame-relay
user@host# set lt-0/0/0 unit 2001 dlci 1
user@host# set lt-0/0/0 unit 2001 peer-unit 2000
user@host# set lt-0/0/0 unit 2001 family inet filter input inet-packet-mode
user@host# set lt-0/0/0 unit 2001 family inet address 10.1.1.1/32
[edit interfaces]
8. Set the loopback interface to terminate the CCC connections to each SRX device.
[edit interfaces]
user@host# set lo0 unit 0 family inet address 10.2.1.1/32
[edit interfaces]
user@host# set st0 unit 0 family inet
10. Set a static route for the remote GRE tunnel endpoint.
[edit routing-options]
user@host# set static route 10.1.1.2/32 next-hop lt-0/0/0.2001
11. Set a static route for the loopback interface of the SRX device.
[edit]
user@host# set routing-options static route 10.2.1.2/32 next-hop gr-0/0/0.0
12. Configure MPLS and CCC using LDP as the label protocol.
[edit protocols]
user@host# set mpls interface gr-0/0/0.0
user@host# set ldp interface gr-0/0/0.0
user@host# set ldp interface lo0.0
user@host# set l2circuit neighbor 10.2.1.2 interface lt-0/0/0.1000 virtual-circuit-id
1
NOTE: The underlying IKE interface is not in the same routing instance
as the tunnel interface.
[edit security]
user@host# set ike policy SRX mode main
user@host# set ike policy SRX proposal-set standard
user@host# set ike policy SRX pre-shared-key ascii-text "$ABC123"
user@host# set ike gateway SRX240-1 ike-policy SRX
user@host# set ike gateway SRX240-1 address 172.19.101.45
user@host# set ike gateway SRX240-1 external-interface ge-0/0/0.0
user@host# set ipsec policy SRX proposal-set standard
user@host# set ipsec vpn SRX240-1 bind-interface st0.0
user@host# set ipsec vpn SRX240-1 ike gateway SRX240-1
user@host# set ipsec vpn SRX240-1 ike ipsec-policy SRX
user@host# set ipsec vpn SRX240-1 establish-tunnels immediately
[edit security]
user@host# set zones security-zone untrust host-inbound-traffic system-services
all
user@host# set zones security-zone untrust host-inbound-traffic protocols all
user@host# set zones security-zone untrust interfaces lo0.0
user@host# set zones security-zone untrust interfaces lt-0/0/0.2001
user@host# set zones security-zone untrust interfaces gr-0/0/0.0
user@host# set zones security-zone untrust interfaces ge-0/0/0.0
user@host# set zones security-zone vpn host-inbound-traffic system-services all
user@host# set zones security-zone vpn host-inbound-traffic protocols all
user@host# set zones security-zone vpn interfaces st0.0
user@host# set zones security-zone trust-flow host-inbound-traffic system-services
all
user@host# set zones security-zone trust-flow host-inbound-traffic protocols all
user@host# set zones security-zone trust-flow interfaces lt-0/0/0.2000
[edit security]
user@host# set policies from-zone trust-flow to-zone vpn policy GRE match
source-address any
user@host# set policies from-zone trust-flow to-zone vpn policy GRE match
destination-address any
user@host# set policies from-zone trust-flow to-zone vpn policy GRE match
application junos-gre
user@host# set policies from-zone trust-flow to-zone vpn policy GRE then permit
application-services idp
user@host# set policies from-zone vpn to-zone trust-flow policy GRE match
source-address any
user@host# set policies from-zone vpn to-zone trust-flow policy GRE match
destination-address any
user@host# set policies from-zone vpn to-zone trust-flow policy GRE match
application junos-gre
user@host# set policies from-zone vpn to-zone trust-flow policy GRE then permit
application-services idp
user@host# set idp idp-policy gre-reassembly rulebase-ips rule match-gre match
application junos-gre
user@host# set idp idp-policy gre-reassembly rulebase-ips rule match-gre then
action ignore-connection
user@host# set idp active-policy gre-reassembly
[edit firewall]
user@host# set family inet filter inet-packet-mode term control-traffic from protocol
tcp
user@host# set family inet filter inet-packet-mode term control-traffic from port
22
user@host# set family inet filter inet-packet-mode term control-traffic from port
80
user@host# set family inet filter inet-packet-mode term control-traffic from port
8080
user@host# set family inet filter inet-packet-mode term control-traffic then accept
user@host# set family inet filter inet-packet-mode term packet-mode then
packet-mode
user@host# set family inet filter inet-packet-mode term packet-mode then accept
user@host# set family mpls filter mpls-packet-mode term packet-mode then
packet-mode
user@host# set family mpls filter mpls-packet-mode term packet-mode then accept
user@host# set family ccc filter ccc-packet-mode term all then packet-mode
user@host#set family ccc filter ccc-packet-mode term all then accept
[edit routing-instances]
user@host# set flow-vr instance-type virtual-router
user@host# set flow-vr interface lt-0/0/0.2000
user@host# set flow-vr interface st0.0
user@host# set flow-vr routing-options static route 10.1.1.1/32 next-hop
lt-0/0/0.2000
user@host# set flow-vr routing-options static route 10.1.1.2/32 next-hop st0.0
[edit routing-instances]
user@host# set vpls-hub instance-type vpls
user@host# set vpls-hub interface lt-0/0/0.0
user@host# set vpls-hub interface ge-0/0/1.0
Results From configuration mode, confirm your configuration by entering the show command. If
the output does not display the intended configuration, repeat the configuration
instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Interfaces
Purpose Verify that the interfaces are configured properly on each device in the VPLS network.
Action From configuration mode, enter show interfaces and verify that the IP addressing is correct
for each interface, including logical tunnel (lt), loopback (lo), GRE (gr), IPsec tunnel st0,
and GE interfaces.
Action From operational mode, enter the show security ipsec security associations and the show
security ipsec statistics command.
Verifying GRE
Action From operational mode, enter the show security flow session protocol gre command. You
can also do a ping between loopback addresses.
Purpose Verify that LDP sessions are being created between devices.
Action From operational mode, enter the show interfaces gr-0/0/0 detail command.
This example shows how to configure VPLS with BGP signaling between two devices.
Requirements
Before you begin, see Understanding Selective Stateless Packet-Based Services .
Overview
This example shows a minimum configuration for PE devices and CE devices to create
a VPLS network with BGP signaling. The topology consists of two PE devices and two
CE devices. In this example, you configure a VPLS routing instance vpls-instance between
two PE devices, PE1 and PE2. You also configure the CE1 and CE2 devices that use
Ethernet-based interfaces to connect VLAN 600 to their local PE devices. On the CE1
device, configure the Fast Ethernet interface that connects to the PE1 device. The VLAN
identifier and IP address must match those of the CE2 device.
10.11.3.1/24
vlan 600 trunk
fe-0/0/3
PE1
172.28.1.2
fe-0/0/5
172.28.2.133/30
Internet
172.28.2.133/30
fe-0/0/5
PE2
172.28.1.1
fe-0/0/3
vlan 600 trunk
10.11.3.1/24
g015571
CE2
Configuration
• Configuring the CE1 Device on page 155
• Configuring the PE1 Device on page 156
• Configuring the PE2 Device on page 160
• Configuring the CE2 Device on page 165
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
Results From configuration mode, confirm your configuration by entering the show interfaces
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
fe-0/0/3 {
vlan-tagging;
unit 0 {
vlan-id 600;
family inet {
address 10.11.3.1/24;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
To configure PE1:
[edit ]
user@host# set system host-name PE1
[edit interfaces]
user@host# set fe-0/0/3 description "CE1 on PE1"
user@host# set fe-0/0/3 vlan-tagging
user@host# set fe-0/0/3 encapsulation vlan-vpls
user@host# set fe-0/0/3 unit 0 encapsulation vlan-vpls
user@host# set fe-0/0/3 unit 0 vlan-id 600
user@host# set fe-0/0/3 unit 0 family vpls
[edit interfaces]
user@host# set fe-0/0/5 vlan-tagging
user@host# set fe-0/0/5 unit 37 vlan-id 37
user@host# set fe-0/0/5 unit 37 family inet address 172.28.2.133/30
user@host# set fe-0/0/5 unit 37 family mpls
[edit routing-options]
user@host# set router-id 172.28.1.2
user@host# set autonomous-system 65512
[edit protocols]
user@host# set rsvp interface fe-0/0/5.37
[edit protocols]
user@host# set mpls label-switched-path pe1-to-pe2 to 172.28.1.1
user@host# set mpls interface fe-0/0/5.37
user@host# set mpls interface lo0.0
[edit protocols]
user@host# set bgp group vpls-peering type internal
user@host# set bgp group vpls-peering local-address 172.28.1.2
user@host# set bgp group vpls-peering family l2vpn signaling
user@host# set bgp group vpls-peering neighbor 172.28.1.1
[edit protocols]
user@host# set ospf area 0.0.0.0 interface lo0.0 passive
user@host# set ospf area 0.0.0.0 interface fe-0/0/5.37
[edit ]
user@host# set routing-instances vpls-instance
Results From configuration mode, confirm your configuration by entering the show command. If
the output does not display the intended configuration, repeat the configuration
instructions in this example to correct it.
[edit]
user@host# show system
host-name PE1;
[edit]
user@host# show interfaces
fe-0/0/5 {
vlan-tagging;
unit 37 {
vlan-id 37;
family inet {
address 172.28.2.133/30;
}
family mpls;
}
}
fe-0/0/3 {
description "CE1 on PE1";
vlan-tagging;
encapsulation vlan-vpls;
unit 0 {
encapsulation vlan-vpls;
vlan-id 600;
family vpls;
}
}
lo0 {
unit 0 {
family inet {
address 172.28.1.2/32;
}
}
}
[edit]
user@host# show routing-options
router-id 172.28.1.2;
autonomous-system 65512;
[edit]
[edit]
user@host# show routing-instances
vpls-instance {
description "Routing instance from VPLS routing";
instance-type vpls;
interface fe-0/0/3.0;
route-distinguisher 172.28.1.2:1;
vrf-target target:65512:1;
protocols {
vpls {
site-range 10;
no-tunnel-services;
site site10 {
automatic-site-id;
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
To configure PE2:
[edit ]
user@host# set system host-name PE2
[edit interfaces]
user@host# set fe-0/0/3 description "CE2 on PE2"
user@host# set fe-0/0/3 vlan-tagging
user@host# set fe-0/0/3 encapsulation vlan-vpls
user@host# set fe-0/0/3 unit 0 encapsulation vlan-vpls
user@host# set fe-0/0/3 unit 0 vlan-id 600
[edit interfaces]
user@host# set fe-0/0/5 vlan-tagging
user@host# set fe-0/0/5 unit 37 vlan-id 37
user@host# set fe-0/0/5 unit 37 family inet address 172.28.2.133/30
user@host# set fe-0/0/5 unit 37 family mpls
user@host# set lo0 unit 0 family inet address 172.28.1.1/32
[edit routing-options]
user@host# set router-id 172.28.1.1
user@host# set autonomous-system 65512
[edit protocols]
user@host# set rsvp interface fe-0/0/5.37
[edit protocols]
user@host# set mpls label-switched-path pe2-to-pe1 to 172.28.1.2
user@host# set mpls interface fe-0/0/5.37
user@host# set mpls interface lo0.0
[edit protocols]
user@host# set bgp group vpls-peering type internal
user@host# set bgp group vpls-peering local-address 172.28.1.1
user@host# set bgp group vpls-peering family l2vpn signaling
user@host# set bgp group vpls-peering neighbor 172.28.1.2
[edit protocols]
[edit ]
user@host# set routing-instances vpls-instance
Results From configuration mode, confirm your configuration by entering the show command. If
the output does not display the intended configuration, repeat the configuration
instructions in this example to correct it.
[edit]
user@host# show system
host-name PE2;
[edit]
user@host# show interfaces
fe-0/0/5 {
vlan-tagging;
unit 37 {
vlan-id 37;
family inet {
address 172.28.2.133/30;
}
family mpls;
}
}
fe-0/0/3 {
description "CE2 on PE2";
vlan-tagging;
encapsulation vlan-vpls;
unit 0 {
encapsulation vlan-vpls;
vlan-id 600;
family vpls;
}
}
lo0 {
unit 0 {
family inet {
address 172.28.1.1/32;
}
}
}
[edit]
user@host# show routing-options
router-id 172.28.1.1;
autonomous-system 65512;
[edit]
user@host# show protocols
rsvp {
interface fe-0/0/5.37;
}
mpls {
label-switched-path pe2-to-pe1 {
to 172.28.1.2;
}
interface fe-0/0/5.37;
interface lo0.0;
}
bgp {
group vpls-peering {
type internal;
local-address 172.28.1.1;
family l2vpn {
signaling;
}
neighbor 172.28.1.1;
}
}
ospf {
area 0.0.0.0 {
interface lo0.0 {
passive;
}
interface fe-0/0/5.37;
}
}
[edit]
user@host# show routing-instances
vpls-instance {
description "Routing instance from VPLS routing";
instance-type vpls;
interface fe-0/0/3.0;
route-distinguisher 172.28.1.1:1;
vrf-target target:65512:1;
protocols {
vpls {
site-range 10;
no-tunnel-services;
site site11 {
automatic-site-id;
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
Results From configuration mode, confirm your configuration by entering the show interfaces
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
fe-0/0/3 {
vlan-tagging;
unit 0 {
vlan-id 600;
family inet {
address 10.11.3.2/24;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
NOTE: If VLAN trunking is not needed between the CE devices, remove the
configuration on VLAN tagging on the interfaces connecting the CE and PE
devices. Also, use ethernet-VPLS-encapsulation instead of vlan-vpls on the
CE facing interfaces of the PE devices.
Verification
Confirm that the configuration is working properly.
Verifying Interfaces
Action From operational mode, enter the show interfaces terse command.
Purpose Verify that the automatic site identifier has been generated.
Action From operational mode, enter the show vpls connections command.
[edit]
user@host# show vpls connections
Layer-2 VPN connections:
Legend for connection status (St)
EI -- encapsulation invalid NC -- interface encapsulation not CCC/TCC/VPLS
EM -- encapsulation mismatch WE -- interface and instance encaps not same
VC-Dn -- Virtual circuit down NP -- interface hardware not present
CM -- control-word mismatch -> -- only outbound connection is up
CN -- circuit not provisioned <- -- only inbound connection is up
OR -- out of range Up -- operational
OL -- no outgoing label Dn -- down
LD -- local site signaled down CF -- call admission control failure
RD -- remote site signaled down SC -- local and remote site ID collision
LN -- local site not designated LM -- local site ID not minimum designated
RN -- remote site not designated RM -- remote site ID not minimum designated
XX -- unknown connection status IL -- no incoming label
MM -- MTU mismatch MI -- Mesh-Group ID not available
BK -- Backup connection ST -- Standby connection
PF -- Profile parse failure PB -- Profile busy
RS -- remote site standby SN -- Static Neighbor
VM -- VLAN ID mismatch
Legend for interface status
Up -- operational
Dn -- down
Instance: customer2
Local site: airwalk (2)
connection-site Type St Time last up # Up trans
4 rmt Up Mar 1 03:26:21 2012 1
Remote PE: 200.100.100.2, Negotiated control-word: No
Incoming label: 262148, Outgoing label: 262146
Local interface: lsi.1048838, Status: Up, Encapsulation: VPLS
Description: Intf - vpls customer2 local site 2 remote site 4
Instance: customer4
Local site: airwalk (6)
connection-site Type St Time last up # Up trans
8 rmt Up Feb 21 03:27:33 2012 1
Remote PE: 200.200.200.2, Negotiated control-word: No
Incoming label: 262160, Outgoing label: 262174
Local interface: lsi.1048836, Status: Up, Encapsulation: VPLS
Description: Intf - vpls customer4 local site 6 remote site 8
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure routing options on the PE router. See “Example: Configuring Routing Options
on the VPLS PE Router” on page 169.
Overview
In this example, you configure an internal BGP session between PE routers so that the
routers can exchange information about routes originating and terminating in the VPLS.
The PE routers use this information to determine which labels to use for traffic destined
for remote sites.
NOTE: On all SRX Series devices, BGP-based virtual private LAN service
(VPLS) works on child ports and physical interfaces, but not over aggregated
Ethernet (ae) interfaces.
Configuration
[edit ]
user@host# set protocols bgp group ibgp type internal local-address 10.255.7.168
neighbor 10.255.7.164
[edit ]
user@host# set protocols bgp family L2 VPN signaling
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show protocols command.
This example shows how to configure the routing options on the VPLS PE router.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See“Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
Overview
This example describes how to specify the router ID and the AS number for each router
involved in the VPLS . In this example, the routers PE1 and PE2 use the same AS number
(100).
Configuration
[edit]
user@host# set routing-options router-id 10.255.7.168
[edit]
user@host# set routing-options autonomous-system 100
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show routing-options command.
Configuring Encapsulation
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
Gigabit Ethernet IQ, Gigabit Ethernet PIMs with small form-factor pluggable optics (SFPs),
SRX Series devices with Gigabit Ethernet, Tri-Rate Ethernet copper, and 10-Gigabit
Ethernet interfaces with VLAN tagging enabled can use flexible Ethernet services, VLAN
virtual private LAN service (VPLS) encapsulation.
Aggregated Ethernet interfaces configured for VPLS can use Ethernet VPLS or VLAN
VPLS.
Ethernet interfaces in VLAN mode can have multiple logical interfaces. In CCC and VPLS
modes, VLAN IDs from 1 through 511 are reserved for normal VLANs, and VLAN IDs 512
through 4094 are reserved for CCC or VPLS VLANs. For 4-port Fast Ethernet interfaces,
you can use VLAN IDs 512 through 1024 for CCC or VPLS VLANs.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
You can configure a logical interface with VLAN VPLS encapsulation by using the following
methods:
• Configure the physical interface with the same encapsulation and set VLAN ID of 512
or higher.
• Configure the physical interface with flexible Ethernet services encapsulation. If you
configure flexible Ethernet services encapsulation, the VLAN ID restriction is removed.
Ethernet interfaces in VLAN mode can have multiple logical interfaces. In VPLS mode,
VLAN IDs from 1 through 511 are reserved for normal VLANs, and VLAN IDs 512 through
4094 are reserved for VPLS VLAN. For 4-port Fast Ethernet interfaces, you can use VLAN
IDs 512 through 1024 for VPLS VLAN.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
This example shows how to configure VPLS VLAN encapsulation and enable it on the
physical and the logical interfaces.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure routing options on the PE router. See “Example: Configuring Routing Options
on the VPLS PE Router” on page 169.
• Configure an IBGP session between PE routers so that the routers can exchange
information about routes originating and terminating in the VPLS. See “Example:
Configuring BGP on the VPLS PE Router” on page 168.
Overview
This example describes how to enable VLAN tagging on VPLS interface ge-3/0/6,
configure the encapsulation type on the physical and logical interfaces, and configure
the VPLS family on the logical interface.
NOTE: Perform the following CLI quick configuration and procedures on all
of the PE interfaces (CE facing).
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode
Results From configuration mode, confirm your configuration by entering the show interfaces
ge-3/0/6 command. If the output does not display the intended configuration, repeat
the configuration instructions in this example to correct it.
[edit]
user@host# show interfaces ge-3/0/6
vlan-tagging;
encapsulation vlan-vpls;
unit 0 {
encapsulation vlan-vpls;
vlan-id 512;
family vpls;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the VPLS VLAN encapsulation is enabled at the interfaces.
Purpose Verify that the VPLS VLAN encapsulation is enabled at the logical interface.
Action From operational mode, enter the show interfaces ge-3/0/6 unit 0 command.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
This example shows how to configure the VPLS VLAN encapsulation on either a Gigabit
Ethernet IQ or Gigabit Ethernet physical interface.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure routing options on the PE router. See “Example: Configuring Routing Options
on the VPLS PE Router” on page 169.
• Configure an IBGP session between PE routers so that the routers can exchange
information about routes originating and terminating in the VPLS. See “Example:
Configuring BGP on the VPLS PE Router” on page 168
Overview
This example describes how to configure Ethernet VPLS encapsulation on a Gigabit
Ethernet IQ or Gigabit Ethernet physical interface and enable the VPLS family on the
interface.
Configuration
[edit ]
user@host# set interfaces ge-3/0/6 encapsulation ethernet-vpls
[edit ]
user@host# set interfaces ge-3/0/6 unit 0 family vpls
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show interfaces command.
Supported Platforms SRX1500, SRX300, SRX320, SRX340, SRX345, SRX4100, SRX4200, SRX550M, vSRX
This example shows how to configure extended VLAN VPLS encapsulation and enable
it on the physical and the logical interfaces.
Requirements
Before you begin:
• Configure the interfaces that will carry the VPLS traffic between the PE router and the
CE devices. See “Example: Configuring Routing Interfaces on the VPLS PE Router” on
page 115 and “Example: Configuring the Interface to the VPLS CE Device” on page 116.
• Create a VPLS routing instance on each PE router that is participating in the VPLS. See
“Example: Configuring the VPLS Routing Instance” on page 126.
• Configure routing options on the PE router. See “Example: Configuring Routing Options
on the VPLS PE Router” on page 169.
• Configure an IBGP session between PE routers so that the routers can exchange
information about routes originating and terminating in the VPLS. See “Example:
Configuring BGP on the VPLS PE Router” on page 168.
Overview
This example describes how to enable VLAN tagging on the VPLS interface ge-3/0/6,
configure the extended-vlan-vpls type on the physical and logical interfaces, and configure
the VPLS family on the logical interface.
NOTE: Perform the following CLI quick configurations and procedures on all
PE interfaces (CE facing).
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Enable VLAN tagging on the VPLS interface as it will receive tagged packets from
CE.
Results From configuration mode, confirm your configuration by entering the show interfaces
ge-3/0/6 command. If the output does not display the intended configuration, repeat
the configuration instructions in this example to correct it.
[edit]
user@host# show interfaces ge-3/0/6
vlan-tagging;
encapsulation extended-vlan-vpls;
unit 0 {
encapsulation vlan-vpls;
vlan-id 100;
family vpls;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the extended VLAN VPLS encapsulation is enabled at the interfaces.
Purpose Verify that the extended VLAN VPLS encapsulation is enabled at the logical interface.
Action From operational mode, enter the show interfaces ge-3/0/6 unit 0 command.
Configuration Statements
Description For chassis cluster configurations, specify the match condition for use in routing to a
redundant Ethernet (reth) interface.
Syntax family {
inet6 {
mode (drop | flow-based | packet-based);
}
iso {
mode packet-based;
}
mpls {
mode packet-based;
}
}
Options The remaining statements are explained separately. See CLI Explorer.
Release Information Statement introduced in Junos OS Release 10.4. Support for family inet6 added in Junos
OS Release 12.1X45-D10.
NOTE: The flow server may be IPv4 or IPv6 when you configure the collector
IP address using the set forwarding-options sampling family inet flow server
command, but only IPv4 sampling is achieved.
The flow server may be IPv4 or IPv6 when you configure the collector IP
address using the set forwarding-options sampling family inet6 flow server
command, but only IPv6 sampling is achieved.
forwarding-options (Security)
Syntax forwarding-options {
family {
inet6 {
mode (drop | flow-based | packet-based);
}
iso {
mode packet-based;
}
mpls {
mode packet-based;
}
}
}
Description Determine how the inet6, iso, and mpls protocol families manage security forwarding
options.
NOTE:
• Packet-based processing is not supported on the following SRX Series
devices: SRX5400, SRX5600, and SRX5800.
• On SRX Series devices, the default mode for processing traffic is flow mode.
To configure an SRX Series device as a border router, you must change the
mode from flow-based processing to packet-based processing. Use the
set security forwarding-options family mpls mode packet-based statement
to configure the SRX device to packet mode. You must reboot the device
for the configuration to take effect.
Options The remaining statements are explained separately. See CLI Explorer.
fragment
Syntax fragment;
Description Configure the device to detect and drop any ICMP frame with the More Fragments flag
set or with an offset indicated in the offset field.
Syntax hash-key {
family inet {
layer-3;
layer-4;
session-id;
}
family mpls {
label-1;
label 2;
label-3;
no-labels;
payload {
ip {
layer-3-only;
port-data {
destination-lsb;
destination-msb;
source-lsb;
source-msb;
}
}
}
}
family multiservice {
destination-mac;
source-mac;
}
}
Description Select which packet header data to use for per-flow load balancing.
• session-id—Incorporate session ID data into the hash key (SRX3000 and SRX5000
lines only). The session ID data has higher precedence than the Layer 3 or 4 information.
• ip—Include the IP address of the IPv4 or IPv6 payload into the hash key.
Syntax iso {
mode packet-based;
}
Description Enable the forwarding of IS-IS traffic. By default, the device drops IS-IS traffic.
Related
Documentation
Supported Platforms ACX Series, M Series, MX Series, PTX Series, QFX Series, SRX210, T1600, T640
no-decrement-ttl;
node-link-protection;
optimize-timer seconds;
p2mp lsp-name;
policing {
filter filter-name;
no-auto-policing;
}
preference preference;
primary path-name {
adaptive;
admin-group {
exclude [ group-names ];
include-all [ group-names ];
include-any [ group-names ];
}
bandwidth bps {
ct0 bps;
ct1 bps;
ct2 bps;
ct3 bps;
}
class-of-service cos-value;
hop-limit number;
no-cspf;
no-decrement-ttl;
optimize-timer seconds;
preference preference;
priority setup-priority reservation-priority;
(record | no-record);
select (manual | unconditional);
standby;
}
priority setup-priority reservation-priority;
(random | least-fill | most-fill);
(record | no-record);
retry-limit number;
retry-timer seconds;
revert-timer seconds;
secondary path-name {
adaptive;
admin-group {
exclude[ group-names ];
include-all [ group-names ];
include-any [ group-names ];
}
bandwidth bps {
ct0 bps;
ct1 bps;
ct2 bps;
ct3 bps;
}
class-of-service cos-value;
hop-limit number;
no-cspf;
no-decrement-ttl;
optimize-timer seconds;
preference preference;
priority setup-priority reservation-priority;
(record | no-record);
select (manual | unconditional);
standby;
}
soft-preemption;
standby;
to address;
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
Description Configure an LSP to use in dynamic MPLS. When configuring an LSP, you must specify
the address of the egress router in the to statement. All remaining statements are optional.
Options lsp-name—Name that identifies the LSP. The name can be up to 64 characters and can
contain letters, digits, periods, and hyphens. To include other characters, enclose
the name in quotation marks. The name must be unique within the ingress router.
self-ping-duration seconds—Specify the duration (in seconds) for which to run the self-ping
mechanism unless the ping succeeds sooner.
LSP self-ping for an LSP starts at the ingress label edge router (LER), once a Resv
message for that LSP has been received. The configured self-ping time indicates
the duration for which the self-ping mechanism runs once the LSP instance is signaled
to be UP.
The self-ping mechanism runs until the self-ping probe is received back (at which
point the traffic is immediately switched to it) , or until the configured self-ping
duration for the LSP is over (at which point traffic is switched over).
When LSP self-ping is enabled, the LSP behavior reverts back to timer-based similar
to the optimize-switchover-delay, where a specific amount of time is provided for all
the downstream nodes to install the forwarding path. When LSP self-ping is not
enabled, the default behavior is to wait for an infinite amount of time for the self-ping
to succeed before switching the traffic.
Range: 1 through 65535 seconds
Related • Configuring the Ingress and Egress Router Addresses for LSPs
Documentation
• Configuring Primary and Secondary LSPs
Syntax mpls {
mode packet-based;
}
Description Enable the forwarding of MPLS traffic. By default, the device drops MPLS traffic.
CAUTION: Because MPLS operates in packet mode, security services are not
available.
multicast-scope
policer (Firewall)
Description Configure policer rate limits and actions. To activate a policer, you must include the
policer action modifier in the then statement in a firewall filter term or on an interface.
Options • policer-name—Name of the policer to evaluate when packets are received on the
interface
simple-filter (Firewall)
Description Define a simple filter. Simple filters are recommended for metropolitan Ethernet
applications.
Options • from—Match packet fields to values. If the from option is not included, all packets are
considered to match and the actions and action modifiers in the then statement are
taken.
• term-name—Name that identifies the term. The name can contain letters, numbers,
and hyphens (-), and can be up to 255 characters long. To include space in the name,
enclose it in quotation marks (“ ”).
• then—Actions to take on matching packets. If the then option is not included and a
packet matches all the conditions in the from statement, the packet is accepted.
Release Information Statement introduced in Junos OS Release 10.4. Support for family inet6 added in Junos
OS Release 12.1X45-D10.
Options • flow-active-timeout—Interval after which active flow is exported. The range is from 10
through 600. The default value is 60.
• option-refresh-rate—Rate at which the device sends options. The range is from 1 through
480,000. The default value is 4800.
Syntax traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
packet-filter filter-name {
conn-tag session-conn
destination-port port-identifier;
destination-prefix address;
interface interface-name;
protocol protocol-identifier;
source-port port-identifier;
source-prefix address;
}
rate-limit messages-per-second;
trace-level (brief | detail | error);
}
Release Information Statement introduced in Junos OS Release 8.5. Statement updated in Junos OS Release
12.1X46-D10 with the trace-level option and additional flags. The was updated in Junos
OS Release 15.1X49-D70 with the addition of the conn-tag filter parameter.
filename—Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log.
By default, the name of the file is the name of the process being traced.
files number—Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-file.1, and so
on, until the maximum number of trace files is reached. The oldest archived file
is overwritten.
If you specify a maximum number of files, you also must specify a maximum
file size with the size option and a filename.
Range: 2 through 1000 files
Default: 10 files
match regular-expression—Refine the output to include lines that contain the regular
expression.
If you specify a maximum file size, you also must specify a maximum number
of trace files with the files option and a filename.
flag—Trace operation to perform. To specify more than one trace operation, include
multiple flag statements.
trace-level—Set the level for trace logging. This option is available only when the flag is
set.
brief—Trace key flow information, such as message types sent between SPU and
central point, policy match, and packet drop reasons.
error—Trace error information, such as system failure, unknown message type, and
packet drop.
Supported Platforms ACX Series, EX Series, M Series, MX Series, PTX Series, QFX Series, SRX Series, T Series
Description Select whether MPLS performs traffic engineering on BGP destinations only or on both
BGP and IGP destinations. Affects only LSPs originating from this routing device, not
transit or egress LSPs.
Default bgp
Options bgp—On BGP destinations only. Ingress routes are installed in the inet.3 routing table.
bgp-igp—On both BGP and IGP destinations. Ingress routes are installed in the inet.0
routing table. If IGP shortcuts are enabled, the shortcut routes are automatically
installed in the inet.0 routing table.
bgp-igp-both-ribs—On both BGP and IGP destinations. Ingress routes are installed in the
inet.0 and inet.3 routing tables. This option is used to support VPNs.
mpls-forwarding—On both BGP and IGP destinations. Use ingress routes for forwarding
only, not for routing.
Syntax version9 {
template template-name;
}
Hierarchy Level [edit forwarding-options sampling family inet output flow-server ip-address]
[edit forwarding-options sampling family inet6 output flow-server ip-address]
Release Information Statement introduced in Junos OS Release 10.4. Support for family inet6 added in Junos
OS Release 12.1X45-D10.
• template—Template configuration.
Operational Commands
Description Display the state of the specified Border Gateway Protocol (BGP) neighbor. If a peer is
forced to Idle state because of license check failure, the output displays the state and
the reason—LicenseCheckFailed.
Options • instance instance—(Optional) Display peer information for a particular routing instance.
• neighbor-address—(Optional) Display information for only the BGP peer at the specified
IP address.
Output Fields Table 3 on page 212 lists the output fields for the show bgp neighbor command. Output
fields are listed in the approximate order in which they appear.
Peer Address of the BGP neighbor. The address is followed by the neighbor's port number.
Local Address of the local device. The address is followed by the peer's port number.
• Aggregate Label—BGP has aggregated a set of incoming labels (labels received from the peer) into
a single forwarding label.
• CleanUp—The peer session is being shut down.
• Delete—This peer has been deleted.
• Idled—This peer has been permanently idled.
• Initializing—The peer session is initializing.
• SendRtn—Messages are being sent to the peer.
• Sync—This peer is synchronized with the rest of the peer group.
• TryConnect—Another attempt is being made to connect to the peer.
• Unconfigured—This peer is not configured.
• WriteFailed—An attempt to write to this peer failed.
• Last State—Previous state of the BGP session.
• Cease—An error occurred, such as a version mismatch, that caused the session to close.
• Finite State Machine Error—In setting up the session, BGP received a message that it did not understand.
• Hold Time Expired—The session's hold time expired.
• Message Header Error—The header of a BGP message was malformed.
• Open Message Error—A BGP open message contained an error.
• None—No errors occurred in the BGP session.
• Update Message Error—A BGP update message contained an error.
Holdtime Hold time configured with the hold-time statement. The hold time is three times the interval at which
keepalive messages are sent.
Number of flaps Number of times the BGP session has gone down and then come back up.
Trace file Name of the file to receive the output of the tracing operation.
Sample Output
Sample Output
Options Interface-name —(Optional) Display flow statistics about the specified interface. Following
is a list of typical interface names. Replace pim with the PIM slot and port with the port
number. For a complete list, see the Interface Naming Conventions.
• ce1-pim/0/port—Channelized E1 interface.
• ct1-pim/0/port—Channelized T1 interface.
• e1-pim/0/port—E1 interface.
• e3-pim/0/port—E3 interface.
• se-pim/0/port—Serial interface.
List of Sample Output show interfaces flow-statistics (Gigabit Ethernet) on page 219
Output Fields Table 4 on page 217 lists the output fields for the show interfaces flow-statistics command.
Output fields are listed in the approximate order in which they appear.
Traffic statistics Number of packets and bytes transmitted and received on the physical interface.
Local statistics Number of packets and bytes transmitted and received on the physical interface.
Transit statistics Number of packets and bytes transiting the physical interface.
Flow error statistics Packet drop statistics for the flow module.
Table 5: Flow Error Statistics (Packet Drop Statistics for the Flow Module)
Screen:
Address spoofing The packet was dropped when the screen module detected address spoofing.
Syn-attack protection The packet was dropped because of SYN attack protection or SYN cookie protection.
VPN:
Authentication failed The packet was dropped because the IPsec Encapsulating Security Payload (ESP) or
Authentication Header (AH) authentication failed.
No SA for incoming SPI The packet was dropped because the incoming IPsec packet's security parameter index
(SPI) does not match any known SPI.
Security association not active The packet was dropped because an IPsec packet was received for an inactive SA.
NAT:
Incoming NAT errors The source NAT rule search failed, an invalid source NAT binding was found, or the NAT
allocation failed.
Multiple incoming NAT Sometimes packets are looped through the system more than once; if source NAT is specified
more than once, the packet will be dropped.
Auth:
Multiple user authentications Sometimes packets are looped through the system more than once. Each time a packet
passes through the system, that packet must be permitted by a policy. If the packet matches
more than one policy that specifies user authentication, then it will be dropped.
Table 5: Flow Error Statistics (Packet Drop Statistics for the Flow Module) (continued)
User authentication errors Packet was dropped because policy requires authentication; however:
Flow:
No one interested in self packets This counter is incremented for one of the following reasons:
• The outbound interface is a self interface, but the packet is not marked as a to-self packet
and the destination address is in a source NAT pool.
• No service is interested in the to-self packet
• When a zone has ident-reset service enabled, the TCP RST to IDENT request for port 113
is sent back and this counter is incremented.
No minor session The packet was dropped because no minor sessions are available and a minor session was
requested. Minor sessions are allocated for storing additional TCP state information.
No more sessions The packet was dropped because there were no more free sessions available.
No route present The packet was dropped because a valid route was not available to forward the packet.
For new sessions, the counter is incremented for one of the following reasons:
For existing sessions, the prior route was changed or deleted, or a more specific route was
added. The session is rerouted, and this reroute could fail because:
• A new route could not be found; either the previous route was removed, or the route was
changed to discard or reject.
• Multiple packets may concurrently force rerouting to occur, and only one packet can
successfully complete the rerouting process. Other packets will be dropped.
• The route table was locked for updates by the Routing Engine. Packets that match a new
session are retried, whereas packets that match an existing session are not.
No tunnel found The packet was dropped because a valid tunnel could not be found
No session for a gate This counter is incremented when a packet is destined for an ALG, and the ALG decides to
drop this packet.
No zone or NULL zone binding The packet was dropped because its incoming interface was not bound to any zone.
Policy denied The error counter is incremented for one of the following reasons:
• Source and/or destination NAT has occurred and policy says to drop the packet.
• Policy specifies user authentication, which failed.
• Policy was configured to deny this packet.
Table 5: Flow Error Statistics (Packet Drop Statistics for the Flow Module) (continued)
TCP sequence number out of A TCP packet with a sequence number failed the TCP sequence number check that was
window received.
No NAT gate -
Sample Output
Description Displays the interface input and output statistics for physical and logical interface.
Sample Output
Release Information Command introduced in Junos OS Release 10.2; session distribution mode option added
in Junos OS Release 12.1X44-D10; enhanced route scaling mode option added in Junos
OS Release 12.1X45-D10. GTP-U distribution option added in Junos OS Release
15.1X49-D40.
Starting in Junos OS Release 15.1X49-D10 and Junos OS Release 17.3R1,
SRX5K-MPC3-100G10G (IOC3) and SRX5K-MPC3-40G10G (IOC3) are introduced for
SRX5400, SRX5600, and SRX5800 devices that perform hash-based data path packet
forwarding to interconnect with all existing IOC and SPC cards using the XL chip
(packet-processing chip).
The IOC3 XL chip uses a hash-based method to distribute ingress traffic to a pool of
SPUs by default. Selection of hash keys depends on application protocols.
Output Fields Table 6 on page 222 lists the output fields for the show security flow status command.
Output fields are listed in the approximate order in which they appear.
• RR-based
• Hash-based
GTP-U distribution
• Enabled
• Hardware
• Software
Sample Output
show security flow status (for hash-based datapath forwarding using SRX5K-MPC3-40G10G (IOC3) and
SRX5K-MPC3-100G10G (IOC3)
root> show security flow status
node0:
--------------------------------------------------------------------------
Flow forwarding mode:
Inet forwarding mode: flow based
Inet6 forwarding mode: drop
MPLS forwarding mode: drop
ISO forwarding mode: drop
Flow trace status
Flow tracing status: off
Flow session distribution
Distribution mode: Hash-based
GTP-U distribution: Enabled
Flow ipsec performance acceleration: off
Flow packet ordering
Ordering mode: Hardware
node1:
--------------------------------------------------------------------------
Flow forwarding mode:
Inet forwarding mode: flow based
Inet6 forwarding mode: drop
MPLS forwarding mode: drop
ISO forwarding mode: drop
Flow trace status
Flow tracing status: off
Flow session distribution
Distribution mode: Hash-based
GTP-U distribution: Enabled
Flow ipsec performance acceleration: off
Flow packet ordering
Ordering mode: Hardware
Release Information Command introduced in Junos OS Release 8.5. Support for the fpc, pic, and kmd-instance
options added in Junos OS Release 9.3. Support for the family option added in Junos OS
Release 11.1. Support for the vpn-name option added in Junos OS Release 11.4R3. Support
for the traffic-selector option and traffic selector field added in Junos OS Release
12.1X46-D10. Support for Auto Discovery VPN (ADVPN) added in Junos OS Release
12.3X48-D10. Support for IPsec datapath verification added in Junos OS Release
15.1X49-D70. Support for thread anchorship added in Junos OS Release 17.4R1.
brief | detail—(Optional) Display the specified level of output. The default is brief.
family—(Optional) Display SAs by family. This option is used to filter the output.
sa-type—(Optional for ADVPN) Display information for the specified type of SA. shortcut
is the only option for this release.
List of Sample Output show security ipsec security-associations (IPv4) on page 230
show security ipsec security-associations (IPv6) on page 230
show security ipsec security-associations index 131073 on page 230
show security ipsec security-associations brief on page 231
show security ipsec security-associations detail on page 231
show security ipsec security-associations family inet6 on page 232
show security ipsec security-associations fpc 6 pic 1 kmd-instance all (SRX Series
Devices) on page 232
show security ipsec security-associations detail (ADVPN Suggester, Static
Tunnel) on page 232
show security ipsec security-associations detail (ADVPN Partner, Static
Tunnel) on page 233
show security ipsec security-associations sa-type shortcut (ADVPN) on page 234
show security ipsec security-associations sa-type shortcut detail (ADVPN) on page 234
show security ipsec security-associations family inet detail on page 235
show security ipsec security-associations detail (SRX4600) on page 236
Output Fields Table 7 on page 226 lists the output fields for the show security ipsec security-associations
command. Output fields are listed in the approximate order in which they appear.
ID Index number of the SA. You can use this number All levels
to get additional information about the SA.
Life: sec/kb The lifetime of the SA, after which it expires, brief
expressed either in seconds or kilobytes.
State State has two options, Installed and Not Installed. detail
Local identity Identity of the local peer so that its partner detail
destination gateway can communicate with it. The
value is specified as an IP address, fully qualified
domain name, e-mail address, or distinguished
name (DN).
Tunnel events Tunnel event and the number of times the event detail
has occurred. See Tunnel Events for descriptions
of tunnel events and the action you can take.
Soft lifetime The soft lifetime informs the IPsec key detail
management system that the SA is about to expire.
Hard lifetime The hard lifetime specifies the lifetime of the SA. detail
Lifesize Remaining The lifesize remaining specifies the usage limits in detail
kilobytes. If there is no lifesize specified, it shows
unlimited.
Anti-replay service State of the service that prevents packets from detail
being replayed. It can be Enabled or Disabled.
Replay window size Size of the antireplay service window, which is 64 detail
bits.
Sample Output
bits)
Anti-replay service: counter-based enabled
show security ipsec security-associations fpc 6 pic 1 kmd-instance all (SRX Series Devices)
user@host> show security ipsec security-associations fpc 6 pic 1 kmd-instance all
Total active tunnels: 1
Version: IKEv2
DF-bit: clear
Bind-interface: st0.1
Tue Nov 03 2015 01:23:37 -0800: IPSec SA delete payload received from peer,
corresponding IPSec SAs cleared (1 times)
Tue Nov 03 2015 01:21:31 -0800: IPSec SA negotiation successfully completed (1
times)
Tue Nov 03 2015 01:21:31 -0800: Tunnel is ready. Waiting for trigger event or
peer to trigger negotiation (1 times)
Tue Nov 03 2015 01:18:26 -0800: Key pair not found for configured local
certificate. Negotiation failed (1 times)
Tue Nov 03 2015 01:18:13 -0800: CA certificate for configured local certificate
not found. Negotiation not initiated/successful (1 times)
Direction: inbound, SPI: 5b6e157c, AUX-SPI: 0
Hard lifetime: Expires in 941 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 556 seconds
Mode: Tunnel(0 0), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha-256-128, Encryption: aes-256-cbc (256
bits)
Anti-replay service: counter-based enabled, Replay window size: 64
Direction: outbound, SPI: 43de5d65, AUX-SPI: 0
Hard lifetime: Expires in 941 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 556 seconds
Mode: Tunnel(0 0), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha-256-128, Encryption: aes-256-cbc (256
bits)
Anti-replay service: counter-based enabled, Replay window size: 64
Release Information Command introduced in Junos OS Release 8.5. fpc and pic options added in Junos OS
Release 9.3. kmd-instance option added in Junos OS Release 10.4.
• fpc slot-number —Specific to SRX Series devices. Display statistics about existing IPsec
SAs in this Flexible PIC Concentrator (FPC) slot. This option is used to filter the output.
• index SA-index-number —(Optional) Display statistics for the SA with this index number.
• pic slot-number —Specific to SRX Series devices. Display statistics about existing IPsec
SAs in this PIC slot. This option is used to filter the output.
Output Fields Table 8 on page 238 lists the output fields for the show security ipsec statistics command.
Output fields are listed in the approximate order in which they appear.
ESP Statistics • Encrypted bytes—Total number of bytes encrypted by the local system across the
IPsec tunnel.
• Decrypted bytes—Total number of bytes decrypted by the local system across the
IPsec tunnel.
• Encrypted packets—Total number of packets encrypted by the local system across
the IPsec tunnel.
• Decrypted packets—Total number of packets decrypted by the local system across
the IPsec tunnel.
AH Statistics • Input bytes—Total number of bytes received by the local system across the IPsec
tunnel.
• Output bytes—Total number of bytes transmitted by the local system across the IPsec
tunnel.
• Input packets—Total number of packets received by the local system across the IPsec
tunnel.
• Output packets—Total number of packets transmitted by the local system across the
IPsec tunnel.
Sample Output
Sample Output
Sample Output