0% found this document useful (0 votes)
59 views

L3VPN

This document provides instructions for troubleshooting connectivity issues across different network devices including Juniper and Cisco routers, Huawei and ZTE DSLAMs, an Aethra ATOS device, and an Atrie AT-510D device. It includes commands to check interfaces, routing protocols, logs, VLAN configurations, and connectivity between the network core and customer edge devices. The goal is to methodically isolate potential points of failure by running diagnostic checks on each network hop between the access and core layers.

Uploaded by

Kijek TR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

L3VPN

This document provides instructions for troubleshooting connectivity issues across different network devices including Juniper and Cisco routers, Huawei and ZTE DSLAMs, an Aethra ATOS device, and an Atrie AT-510D device. It includes commands to check interfaces, routing protocols, logs, VLAN configurations, and connectivity between the network core and customer edge devices. The goal is to methodically isolate potential points of failure by running diagnostic checks on each network hop between the access and core layers.

Uploaded by

Kijek TR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

VPN L3 Service:

Access PE
(Juniper PE)
1. Get subinterfaces with Node ID (monitor & data)
#show interfaces descriptions | match NID

● Get subinterfaces with order ID (monitor & data)


#show interfaces descriptions | match OID

2. Get VLAN & IP Next device from subinterface data


#show interfaces ge-x/x/x.1190

3. Get the VRF name & IP from subinterface data


#show interfaces terse routing-instance all | find ge-x/x/x.1190

4. Test connectivity with vrf (we) on subinterface data


#ping rapid routing-instance we 172.x.x.66

5. Get the VRF name & IP from subinterface monitor


#show interfaces terse routing-instance all | find ge-x/x/x.1191

6. Test connectivity with vrf (vpnmonitor) on subinterface monitor


#ping rapid routing-instance vpnmonitor 5.x.x.162

7. View the connected devices (Switch or MSAN Cabinet)


#show interfaces ge-x/x/x
8. If the device is MSAN cabinet then get the devices which connected to this
sub interface with their MAC and IP Addresses
#show arp interfaces ge-x/x/x.400

9. If the device is switch then get the mac of CE with subint data
#show arp interfaces ge-x/x/x.1190

(Cisco) R17C-C-EG
1. Get subinterfaces with NID (monitor & data)
#show interfaces descriptions | include NID

2. Get VLAN & VRF name & IP Next device from subinterface data & monitor
#show run interfaces gx/x/x.1190

3. Test connectivity with vrf (we) on subinterface data


#ping vrf we 172.x.x.66

4. Test connectivity with vrf (vpnmonitor) on subinterface monitor


#ping vrf vpnmonitor 5.x.x.162

5. View the connected devices (Switch or Cabinet)


#show run interface gx/x/x

6. If the device is switch then get the mac of MSAN with subint data
#show ip arp interface vrf we ge-x/x/x.1190

Access Switch
1. Connect to the switch with its name
#Fawala-S01C-C-EG

2. Get the connected device CE and its interface


#show mac address-table | include Mac-MSAN

3. Get name next device CE


#show run interface gx/x/5

4. Get IP next device Cabinet


#alias Mac-MSAN
Access MSAN
(Huawei MSAN) M02H-C-EG
1. Connect to the MSAN
#ssh -1 user@IP-MSAN

2. Get the downlink with the modem


#display vlan 1155

3. Check the port state of the downlink (shl 0/18/3)


#interface shl 0/18
#display port state 3

4. Check speed & SNR & attenuation of the downlink (shl 0/18/3)
#interface shl 0/18
#display line state 3
#return (exit from interface)

5. Check logs of the downlink (shl 0/18/3)


#display event history eventparamater 0/18/3 list

6. Check the last down & up time of the downlink (shl 0/18/3)
#display interface shdsl 0/18/3

7. Compare time
#display time

(ZTE MSAN) M01Z-DT-EG


1. Connect to the MSAN
#ssh -1 user@IP-MSAN

2. Get the downlink with the modem


#show vlan 1155

3. Check the port state, speed, SNR and attenuation of the downlink (shl
0/18/3)
#show shdsl port-status shdsl_0/18/3
4. Check logs of the downlink (shl 0/18/3)
#show logging alarmlog | include shdsl_0/18/3

5. Check the last down & up time of the downlink (shl 0/18/3)
#show interface shdsl_0/18/3

6. Compare time
#show clock

7. Get the config port of the downlink (shl 0/18/3)


#show running-config interface shdsl_0/18/3

(DSLAM Type ISAM) D15I-C-EG


1. Connect to the MSAN
#ssh -2 user@IP-ISAM

2. Get the downlink with the modem (615 is stacked)


#show vlan cross-connect stacked:1155:615

3. Check the port state of the downlink (shl 0/18/3)


#show interface port shdsl-line:0/18/3 detail

4. Check speed & SNR & attenuation of the downlink (shl 0/18/3)
Show shdsl segment-status 0/18/3

5. Compare Speed
#info configure shdsl span 0/18/3

Access The Router(Gateway)


● From PE Juniper(#telnet routing-instance vpnmonitor 5.x.x.162)
● From PE Cisco(#telnet vrf vpnmonitor 5.x.x.162)

(Cisco) R17C-C-EG
1. Check the router uptime
#show version | include uptime
2. Compare Time
#show clock

3. Check the interfaces status & IP


#show ip interface brief

4. Show the logs of the interface


#show logging | include GigabitEthernet0/1/7
#show logging | include ATM0/3/0

5. Check the up/down time of routing BGP


#show bgp summary

6. Show the LANs


#show ip arp vlan1
OR
#show run interface vlan

7. Check the routing bgp


#show run | section bgp

8. (IF Internet Check the NAT)


#show run | section nat

9. Check the ACL 10


#show run | section list 10

10. Check the LAN connectivity


#ping IP-LAN source VLAN-IP

11.Check the LAN connectivity


#ping IP-LAN source VLAN-IP

(Aethra - ATOS)
1. Connect to the modem ATOS from Cisco PE and see Version of ATOS (if
boot version is 1.10.0.0 is Layer1)
#telnet 5.x.x.162 /vrf vpnmonitor /source-interface gix/x/x.1191
2. Check if the port is serial
>ntp
>ntp>> fr-iwf-1
>ntp>fr-iwf-1>> show conf

3. Check the DLCI status


>ntp>fr-iwf-1>> up
>ntp>> fr-ifc-1
>ntp>fr-ifc-1>> show status -s

4. Check the vpi/vci for DLCI (get VCC then vpi/vci)


>ntp>frs-iwf-1 >> show conf
>ntp>atm>vcc-1 >> show conf

(Atrie) AT-510D
(This device hasn’t ping source)
1. Check the power
#show device information

2. Show the LANs & the speed


#show interface fastEthernet * status

3. Check speed & SNR & attenuation of the downlink


#show interface ds1/1 configuration

4. Show the VLANs, interfaces, mode efm


#show running-config

5. Show the routes


#show ip route

6. Check the LANs connectivity


#ping IP-LAN

7. (IF Internet Check the NAT)


#show ip nat translation
Device Username Password
Modem boolean admin cpe#ESP10
admin admin
admin admin1234
DSLAM(isam) isadmin ANS#150
Modem Aethra Write anything Blank (Enter)
Modem cisco cisco WE#2020@esp

You might also like