Junos Troubleshooting in The NOC: Lab Guide
Junos Troubleshooting in The NOC: Lab Guide
Copyright 2014
Juniper Networks, Inc. All rights reserved.
Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS
are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. All other trademarks, services marks, registered marks, or
registered services marks are the property of their respective owners. Juniper
Networks assumes no responsibility for any inaccuracies in this document.
Juniper Networks reserves the right to change, modify, transfer, or otherwise
revise this publication without notice.
Lab Guide
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an
agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software, may contain prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.
Contents
Lab 1: The Troubleshooting Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Part 1: Troubleshooting Scenario 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Part 2: Troubleshooting Scenario 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Part 3: Troubleshooting Scenario 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
This three-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center
(NOC) environment. Key topics within this course include troubleshooting methodology, troubleshooting tools, hardware
monitoring and troubleshooting, interface monitoring and troubleshooting, troubleshooting the data plane and control
plane on devices running the Junos operating system, staging and acceptance methodology, troubleshooting routing
protocols, monitoring the network, and working with JTAC. This course is based on Junos operating system Release
12.2R2.5.
Objectives
After successfully completing this course, you should be able to:
• Reduce the time it takes to identify and isolate the root cause of an issue impacting your network.
• Gain familiarity with Junos products as they pertain to troubleshooting.
• Become familiar with online resources valuable to Junos troubleshooting.
• Gain familiarity with Junos tools used in troubleshooting.
• Identify and isolate hardware issues.
• Troubleshoot problems with the control plane.
• Troubleshoot problems with interfaces and other data plane components.
• Describe the staging and acceptance methodology.
• Troubleshoot routing protocols.
• Describe how to monitor your network with SNMP, RMON, JFlow, and port mirroring.
• Become familiar with JTAC procedures.
Intended Audience
The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include
network engineers, administrators, support personnel, and reseller support personnel.
Course Level
Junos Troubleshooting in the NOC is an introductory-level course.
Prerequisites
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI)
reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System
(IJOS) course and the Junos Routing Essentials (JRE) course, or have equivalent experience prior to attending this class.
Day 1
Chapter 1: Course Introduction
Chapter 2: Troubleshooting as a Process
The Troubleshooting Process Lab
Chapter 3: Junos Product Families
Identifying Hardware Components Lab
Chapter 4: Troubleshooting Toolkit
Monitoring Tools and Establishing a Baseline Lab
Day 2
Chapter 5: Hardware and Environmental Conditions
Monitoring Hardware and Environmental Conditions Lab
Chapter 6: Control Plane
Control Plane Monitoring and Troubleshooting Lab
Chapter 7: Data Plane: Interfaces
Monitoring and Troubleshooting Ethernet Interfaces Lab
Chapter 8: Data Plane: Other Components
Isolating and Troubleshooting PFE Issues Lab
Day 3
Chapter 9: Staging and Acceptance Testing
Chapter 10: Troubleshooting Routing Protocols
Troubleshooting Routing Protocols Lab
Chapter 11: High Availability
Chapter 12: Network Monitoring
Monitoring the Network Lab
Chapter 13: JTAC Procedures
Appendix A: Interface Troubleshooting
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config.ini in the Filename field.
CLI Undefined Text where the variable’s value Type set policy policy-name.
is the user’s discretion and text
ping 10.0.x.y
where the variable’s value as
GUI Undefined shown in the lab guide might Select File > Save, and type
differ from the value the user filename in the Filename field.
must input.
Overview
In this lab, you will focus on the process of troubleshooting.
By completing this lab, you will perform the following tasks:
• Define success for a given problem.
• Create a flowchart to help isolate the root cause of a problem.
• Identify possible ways to achieve success.
• Evaluate the potential impact associated with implementing a solution in a
production environment.
In this lab part, you use the troubleshooting process to create an efficient approach
to help you identify the root cause of a specific problem.
In this scenario, a random card is drawn from a standard 52 card deck. Your
objective is to form an approach that will isolate the selected card. Your instructor or
lab partner will provide you with the true or false outcome of your decision points.
Step 1.1
Define success:
Accurately identify the card drawn from a standard deck of cards.
Step 1.2
Isolate the issue:
Draw a simple flowchart of how you might identify the selected card. Remember
each decision point should have a true or false outcome and should eliminate
potential possibilities regardless of the outcome.
Remember, this is just one possible flowchart. The “face value is odd” decision and
the “face value is greater than” decision could have been modified or reordered
without greatly impacting the number of steps required to identify a solution.
In this lab part, you use the troubleshooting process to create an efficient approach
to help you identify the root cause of a specific problem.
In this scenario, you have nine balls that appear equal in size, shape, and color.
However, one of the balls is very slightly overweight—Not perceivable to the human
eye or feel. That is OK, a scale is provided for your use. Your objective is to identify
the ball that is heavier than the rest. Your instructor or lab partner will provide you
with the True/False outcome of your decision points.
Step 2.1
Define success:
Identify the heavy ball.
Step 2.2
Isolate the issue:
Draw a simple flowchart of how you might identify the heavy ball. Remember each
decision point should have a True or False outcome and should eliminate potential
possibilities regardless of the outcome.
You can take a couple of different approaches to this problem. One approach
guarantees the outcome in two steps, while the other might take three steps, but
also has the possibility of finding the problem in one. The second approach is
common to many network troubleshooting issues, where a quick test can provide
the necessary isolation, or some limited follow-up might be required.
When troubleshooting, it is not always easy to say if one approach is better than the
other. If the outcome is similar, in a similar number of steps, with similar disruption
to the network, then it is an acceptable approach.
In this lab part, you use the troubleshooting process to create an efficient approach
to help identify the root cause of a specific problem.
Step 3.1
Define success:
Step 3.2
Isolate the issue:
Identify the elements required to achieve success.
What impact could testing for the root cause have in a production environment? How
might you mitigate these risks?
Draw a simple flowchart of how you might narrow down the focus. Remember each
decision point should have a True or False outcome and should bring you closer to
understanding the root cause of a problem.
Can you think of a short-term solution that would return a production network to
operating status while waiting to implement a permanent long-term solution?
Step 3.4
Implement the solution:
Can you think of any potential impact risks associated with implementing the
identified solution in a production environment? How might you mitigate those
risks?
STOP Tell your instructor that you have completed this lab.
Overview
In this lab, you will log in to your router, identify the installed hardware, determine which
hardware components are field-replaceable units (FRUs), and research how to replace
faulty hardware components.
By completing this lab, you will perform the following tasks:
• Verify proper operation of network interfaces.
• Identify hardware.
• Determine what is and what is not an FRU.
• Research how to replace a faulty hardware component.
In this lab part, you log in to your router and verify that interfaces are operational
and that the base topology used in subsequent labs is in place.
Note
The instructor will tell you the nature of your
access and will provide you with the
necessary details to access your assigned
device.
Step 1.1
Ensure that you know to which device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to
determine your device’s management address.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/reset.config
load complete
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@mxA-1>
In this lab part, you verify the initial configuration of your assigned device.
Step 2.1
Issue the show interfaces terse | no-more command.
lab@mxA-1> show interfaces terse | no-more
Interface Admin Link Proto Local Remote
lc-0/0/0 up up
lc-0/0/0.32769 up up vpls
pfe-0/0/0 up up
pfe-0/0/0.16383 up up inet
inet6
pfh-0/0/0 up up
pfh-0/0/0.16383 up up inet
xe-0/0/0 up down
xe-0/0/1 up down
xe-0/0/2 up down
xe-0/0/3 up down
ge-1/0/0 up up
ge-1/0/0.141 up up inet 172.18.1.2/30
Step 2.2
Next, ping the virtual router attached to your device to ensure connectivity exists.
lab@mxA-1> ping local-VR-Address count 5
PING 192.168.11.2 (192.168.11.2): 56 data bytes
64 bytes from 192.168.11.2: icmp_seq=0 ttl=64 time=0.530 ms
64 bytes from 192.168.11.2: icmp_seq=1 ttl=64 time=0.823 ms
64 bytes from 192.168.11.2: icmp_seq=2 ttl=64 time=3.424 ms
64 bytes from 192.168.11.2: icmp_seq=3 ttl=64 time=0.484 ms
64 bytes from 192.168.11.2: icmp_seq=4 ttl=64 time=0.483 ms
Step 2.3
Next, ping the address associated with the remote team’s ge-1/0/2 interface.
lab@mxA-1> ping remote-team-ge-1/0/2-address count 5
PING 172.18.5.2 (172.18.5.2): 56 data bytes
64 bytes from 172.18.5.2: icmp_seq=0 ttl=64 time=1.048 ms
64 bytes from 172.18.5.2: icmp_seq=1 ttl=64 time=12.862 ms
64 bytes from 172.18.5.2: icmp_seq=2 ttl=64 time=0.438 ms
64 bytes from 172.18.5.2: icmp_seq=3 ttl=64 time=0.478 ms
64 bytes from 172.18.5.2: icmp_seq=4 ttl=64 time=0.495 ms
In this lab part, you identify hardware and key components in your router.
Step 3.1
Issue the show chassis hardware command.
lab@mxA-1> show chassis hardware | no-more
Hardware inventory:
Item Version Part number Serial number Description
Chassis D4889 MX80
Midplane REV 06 711-031594 YK8973 MX80
PEM 0 Rev 03 740-028288 UG00866 AC Power Entry Module
Routing Engine BUILTIN BUILTIN Routing Engine
TFEB 0 BUILTIN BUILTIN Forwarding Engine
Processor
QXM 0 REV 05 711-028408 YK6600 MPC QXM
FPC 0 BUILTIN BUILTIN MPC BUILTIN
MIC 0 BUILTIN BUILTIN 4x 10GE XFP
PIC 0 BUILTIN BUILTIN 4x 10GE XFP
FPC 1 BUILTIN BUILTIN MPC BUILTIN
MIC 0 REV 22 750-028392 YK7479 3D 20x 1GE(LAN) SFP
PIC 0 BUILTIN BUILTIN 10x 1GE(LAN) SFP
Xcvr 0 REV 02 740-013111 A116746 SFP-T
Xcvr 1 REV 02 740-013111 A114818 SFP-T
Xcvr 2 REV 02 740-013111 A116860 SFP-T
Xcvr 3 REV 02 740-013111 A116971 SFP-T
Xcvr 4 REV 02 740-013111 A116814 SFP-T
Xcvr 5 REV 02 740-013111 A116816 SFP-T
Xcvr 6 REV 02 740-013111 A116260 SFP-T
Xcvr 7 REV 02 740-013111 A115260 SFP-T
Xcvr 8 REV 02 740-013111 A116813 SFP-T
Xcvr 9 REV 02 740-013111 A116719 SFP-T
PIC 1 BUILTIN BUILTIN 10x 1GE(LAN) SFP
Xcvr 0 REV 02 740-013111 A115863 SFP-T
Xcvr 1 REV 02 740-013111 A116368 SFP-T
Xcvr 2 REV 02 740-013111 A071203 SFP-T
Xcvr 3 REV 02 740-013111 A116370 SFP-T
Xcvr 4 REV 02 740-013111 A121193 SFP-T
Xcvr 5 REV 02 740-013111 A121188 SFP-T
Xcvr 6 REV 02 740-013111 A116729 SFP-T
Xcvr 7 REV 02 740-013111 A116891 SFP-T
Xcvr 8 REV 02 740-013111 A114787 SFP-T
Xcvr 9 REV 02 740-013111 A116696 SFP-T
Fan Tray Fan Tray
In this lab part, you find and use online resources to learn how to identify and
replace FRUs in your router.
Note
As you work through this lab part, you are
encouraged to look beyond the questions
asked in the lab to familiarize yourself with
the available online resources. You are able
to use these resources in future labs and
later in your own network environment.
Step 4.1
Issue the show chassis hardware | no-more command.
lab@mxA-1> show chassis hardware | no-more
Hardware inventory:
Item Version Part number Serial number Description
Chassis E3342 MX80
Midplane REV 07 711-031594 YW2075 MX80
PEM 0 Rev 04 740-028288 UH02222 AC Power Entry Module
Routing Engine BUILTIN BUILTIN Routing Engine
TFEB 0 BUILTIN BUILTIN Forwarding Engine
Processor
QXM 0 REV 05 711-028408 YW3088 MPC QXM
FPC 0 BUILTIN BUILTIN MPC BUILTIN
MIC 0 BUILTIN BUILTIN 4x 10GE XFP
PIC 0 BUILTIN BUILTIN 4x 10GE XFP
FPC 1 BUILTIN BUILTIN MPC BUILTIN
MIC 0 REV 24 750-028392 YX0925 3D 20x 1GE(LAN) SFP
PIC 0 BUILTIN BUILTIN 10x 1GE(LAN) SFP
Xcvr 0 REV 02 740-013111 A495782 SFP-T
Xcvr 1 REV 02 740-013111 A494172 SFP-T
Xcvr 2 REV 02 740-013111 A452847 SFP-T
Xcvr 3 REV 02 740-013111 A495298 SFP-T
Xcvr 4 REV 02 740-013111 A438159 SFP-T
Xcvr 5 REV 02 740-013111 A494218 SFP-T
Xcvr 6 REV 02 740-013111 A464011 SFP-T
Xcvr 7 REV 02 740-013111 A495540 SFP-T
Xcvr 8 REV 02 740-013111 A434868 SFP-T
Xcvr 9 REV 02 740-013111 A433506 SFP-T
PIC 1 BUILTIN BUILTIN 10x 1GE(LAN) SFP
Xcvr 0 REV 02 740-013111 A496017 SFP-T
Xcvr 1 REV 02 740-013111 A464017 SFP-T
Xcvr 2 REV 02 740-013111 A494183 SFP-T
Xcvr 3 REV 02 740-013111 A494235 SFP-T
Xcvr 4 REV 02 740-013111 A494159 SFP-T
Xcvr 5 REV 02 740-013111 A382076 SFP-T
Xcvr 6 REV 02 740-013111 A434336 SFP-T
Xcvr 7 REV 02 740-013111 A494406 SFP-T
Xcvr 8 REV 02 740-013111 A494744 SFP-T
Xcvr 9 REV 02 740-013111 A494074 SFP-T
Fan Tray Fan Tray
Note
If time allows, research information for your
own network devices and familiarize
yourself with the hardware and available
FRUs.
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
This lab demonstrates the monitoring and troubleshooting tools of the Junos operating
system.
By completing this lab, you will perform the following tasks:
• Monitor the health of the router and troubleshoot issues.
• Configure and identify baseline components within the router.
• Use online resources to troubleshoot issues.
In this lab part, you use commands that will allow you to view alarms, environmental
conditions, and hardware Inventory on your router.
Step 1.1
Ensure that you know to which device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to
determine your device’s management address.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
Step 1.3
Log in to your device with the username lab and a password of lab123. Note that
both the name and password are case-sensitive.
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/lab3-start.config
load complete
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@mxA-1>
Step 1.5
Issue the show interfaces terse ge* | match inet | except down
command.
lab@mxA-1> show interfaces terse ge* | match inet | except down
ge-1/0/0.141 up up inet 172.18.1.2/30
ge-1/0/1.141 up up inet 172.18.2.2/30
ge-1/0/2.141 up up inet 172.18.5.1/30
ge-1/0/3.141 up up inet 192.168.11.1/24
Step 1.6
Issue the show chassis craft-interface command.
lab@mxA-1> show chassis craft-interface
PS Status:
PS 0 1
---------------
Red . .
Green * .
Step 1.7
Issue the show pfe statistics error command.
lab@mxA-1> show pfe statistics error
Slot 0
Step 1.8
Issue the show log messages | match error command and answer the
following questions.
Note
The messages might vary depending on
your device.
Note
Although in the previous output, messages
contain the word “error” in them, these
messages are not cause for concern. The
previous output is typically seen during the
boot process when communication
between the routing engine and the
router’s other components are initially
being established.
Step 1.9
Issue the show chassis hardware | no-more command.
lab@mxA-1> show chassis hardware | no-more
Hardware inventory:
Item Version Part number Serial number Description
Chassis D4889 MX80
Midplane REV 06 711-031594 YK8973 MX80
PEM 0 Rev 03 740-028288 UG00866 AC Power Entry Module
Routing Engine BUILTIN BUILTIN Routing Engine
TFEB 0 BUILTIN BUILTIN Forwarding Engine
Processor
QXM 0 REV 05 711-028408 YK6600 MPC QXM
FPC 0 BUILTIN BUILTIN MPC BUILTIN
MIC 0 BUILTIN BUILTIN 4x 10GE XFP
PIC 0 BUILTIN BUILTIN 4x 10GE XFP
FPC 1 BUILTIN BUILTIN MPC BUILTIN
MIC 0 REV 22 750-028392 YK7479 3D 20x 1GE(LAN) SFP
PIC 0 BUILTIN BUILTIN 10x 1GE(LAN) SFP
Xcvr 0 REV 02 740-013111 A116746 SFP-T
Xcvr 1 REV 02 740-013111 A114818 SFP-T
Xcvr 2 REV 02 740-013111 A116860 SFP-T
Xcvr 3 REV 02 740-013111 A116971 SFP-T
Xcvr 4 REV 02 740-013111 A116814 SFP-T
Xcvr 5 REV 02 740-013111 A116816 SFP-T
Xcvr 6 REV 02 740-013111 A116260 SFP-T
Xcvr 7 REV 02 740-013111 A115260 SFP-T
Xcvr 8 REV 02 740-013111 A116813 SFP-T
Xcvr 9 REV 02 740-013111 A116719 SFP-T
PIC 1 BUILTIN BUILTIN 10x 1GE(LAN) SFP
Xcvr 0 REV 02 740-013111 A115863 SFP-T
Xcvr 1 REV 02 740-013111 A116368 SFP-T
Xcvr 2 REV 02 740-013111 A071203 SFP-T
Step 1.10
Issue the show chassis fpc detail command.
lab@mxA-1> show chassis fpc detail
Slot 0 information:
State Online
Temperature 32 (C)
Total CPU DRAM 1024 MB
Total SRAM 403 MB
Total SDRAM 1316 MB
Step 1.11
Issue the show chassis tfeb command.
lab@mxA-1> show chassis tfeb
TFEB status:
Slot 0 information:
State Online
Intake temperature 32 degrees C / 89 degrees F
Exhaust temperature 50 degrees C / 122 degrees F
CPU utilization 4 percent
Interrupt utilization 0 percent
Heap utilization 19 percent
Buffer utilization 13 percent
Total CPU DRAM 1024 MB
Start time: 2013-01-31 01:13:22 UTC
Uptime: 8 days, 18 hours, 51 minutes, 16 seconds
In this lab part, you configure the components SNMP, NTP, and remote system
logging, which are necessary to establish a baseline.
Step 2.1
Issue the show configuration | no-more command and answer the
following questions:
lab@mxA-1> show configuration | no-more
## Last commit: 2013-02-08 18:32:42 UTC by lab
version 12.2R2.5;
system {
Step 2.2
Enter configuration mode and navigate to the [edit system ntp] hierarchy
level and configure an NTP server for your device. Refer to the lab diagram for the
specific address of the NTP server.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit system ntp
[edit system]
lab@mxA-1# set time-zone America/Los_Angeles
[edit system]
lab@mxA-1# commit
commit complete
[edit system]
lab@mxA-1#
Step 2.4
Issue the set date ntp command to synchronize your assigned device with the
NTP server.
[edit system]
lab@mxA-1# run set date ntp
8 Feb 11:47:59 ntpdate[30494]: step time server 10.210.15.24 offset 0.000697
sec
Step 2.5
Issue the run show ntp associations command.
Note
It might take a few minutes to completely
synchronize with the NTP server.
[edit system]
lab@mxA-1# run show ntp associations
remote refid st t when poll reach delay offset jitter
==============================================================================
*10.210.15.24 10.210.8.72 4 - 62 64 7 0.166 0.022 0.014
Step 2.6
Issue the run show system uptime command.
[edit system]
lab@mxA-1# run show system uptime
Current time: 2013-02-08 11:53:41 PST
System booted: 2013-01-30 16:23:51 PST (1w1d 19:29 ago)
Protocols started: 2013-02-07 12:14:14 PST (23:39:27 ago)
Last configured: 2013-02-08 11:47:31 PST (00:06:10 ago) by lab
11:53AM up 8 days, 19:30, 1 user, load averages: 0.00, 0.00, 0.00
Step 2.7
Navigate to the [edit system syslog] hierarchy level. Configure your device to
send any successful or failed login attempts to the 172.18.5.2 address. Then
commit your configuration and exit configuration mode.
[edit system]
lab@mxA-1# edit syslog
lab@mxA-1>
...
Step 2.9
Open a new Telnet session to your assigned device’s management address and
attempt to log in using an invalid name and password.
mxA-1 (ttyp0)
login: 123
Password:
Login incorrect
login:
Step 2.10
Return to the original console, Telnet, or SSH session.
From the original session, examine the output from the monitor traffic
interface ge-1/0/2.VLAN-ID command. You can press Ctrl+C key
combination to stop the output.
lab@mxA-1> monitor traffic interface ge-1/0/2.VLAN-ID
verbose output suppressed, use <detail> or <extensive> for full protocol decode
Address resolution is ON. Use <no-resolve> to avoid any reverse lookup delay.
Address resolution timeout is 4s.
Listening on ge-1/0/2.141, capture size 96 bytes
In this lab part, you use a Web browser to locate online resources for
troubleshooting purposes.
Step 3.1
Open a Web browser on your local PC.
From the open Web browser, navigate to http://www.juniper.net/
techpubs and click the link for the MX Series documentation.
Step 3.2
Click the Junos 12.3 link located in the Software Documentation column.
Step 3.3
The previous link brought you to the software documentation for M Series,
MX Series, and T Series routers. Take some time to examine the page and use it to
answer the following questions.
Step 3.4
Using a Web browser, navigate to http://www.juniper.net/customers/
support/ and click the Browse Knowledge Base link.
Step 3.5
Type the phrase how to troubleshoot BGP documentation in the
question box and click Ask.
Step 3.6
Examine the Results page examine the output and answer the following question.
Note
If time allows, search the KB database for
other topics of your interest.
Step 3.7
Using the Web browser, navigate to http://www.juniper.net/techpubs/
software/nog/ and answer the following question.
Step 3.8
Return to the open session with your assigned device.
From the open session, log out of your assigned device.
lab@mxA-1> exit
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
This lab demonstrates how to monitor hardware and environmental conditions. You will
use the command line interface (CLI) to test and view the status of your router’s storage
devices. You will view your router’s boot messages, log messages, and chassisd logs to
determine which hardware events have occurred over time. You will also use various
commands to determine the status of memory and storage, log messages, as well as the
chassis temperatures.
Note that your lab login grants you super-user permissions and that you might have to
become root during this lab. Please be careful, and have fun!
By completing this lab, you will perform the following tasks:
• View and test a router’s storage devices.
• Parse through log messages to view hardware events that have occurred.
• Configure nondefault alarm settings.
In this lab part, you use various commands to view the status of the RE and its
memory and storage devices.
Step 1.1
Ensure that you know to which device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to
determine your device’s management address.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
Step 1.3
Log in to your device with the username lab and the password lab123. Note that
both the name and password are case-sensitive.
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/lab4-start.config
load complete
[edit]
lab@mxA-1#
Step 1.5
Change the root password to lab123 by issuing the set system
root-authentication plain-text-password command.Then, commit
the changes and exit to operational mode before moving on to the next step.
[edit]
lab@mxA-1# set system root-authentication plain-text-password
New password:
Retype new password:
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
[edit]
lab@mxA-1>
Step 1.6
Issue the show chassis routing-engine command to view the details of
your router’s RE.
lab@mxA-1> show chassis routing-engine
Routing Engine status:
Temperature 35 degrees C / 95 degrees F
CPU temperature 46 degrees C / 114 degrees F
DRAM 2048 MB
Memory utilization 28 percent
CPU utilization:
User 0 percent
Background 0 percent
Kernel 0 percent
Step 1.7
Issue the show system storage command to determine the amount of storage
space available on your router.
lab@mxA-1> show system storage
Filesystem Size Used Avail Capacity Mounted on
/dev/da0s1a 885M 125M 688M 15% /
devfs 1.0K 1.0K 0B 100% /dev
/dev/md0 42M 42M 0B 100% /packages/mnt/jbase
/dev/md1 184M 184M 0B 100% /packages/mnt/
jkernel-ppc-12.2R2.5
/dev/md2 33M 33M 0B 100% /packages/mnt/
jpfe-MX80-12.2R2.5
/dev/md3 9.1M 9.1M 0B 100% /packages/mnt/
jdocs-12.2R2.5
/dev/md4 55M 55M 0B 100% /packages/mnt/
jroute-ppc-12.2R2.5
/dev/md5 12M 12M 0B 100% /packages/mnt/
jcrypto-ppc-12.2R2.5
/dev/md6 2.8G 10.0K 2.6G 0% /tmp
/dev/md7 2.8G 4.7M 2.6G 0% /mfs
/dev/da0s1e 98M 268K 90M 0% /config
procfs 4.0K 4.0K 0B 100% /proc
/dev/da1s1f 2.8G 1.0G 1.6G 39% /var
Step 1.8
Enter the shell as the root user by issuing the start shell user root
command. Enter the password of lab123 when prompted.
lab@mxA-1> start shell user root
Password:
root@mxA-1%
Step 1.9
Perform a read-only test to determine the integrity of the da0 internal NAND flash
drive. Use the dd if=/dev/da0 of=/dev/null bs=1m command to perform
the test.
Note
It might take between 5 or 10 minutes for
the test to complete. Be patient.
Step 1.10
Exit from the shell and return to the CLI.
root@mxA-1% exit
exit
In this lab part, you use the boot and system logs to view events that have occurred
on your router over time. You must complete this part of the lab by accessing your
router’s console port.
Step 2.1
Direct your router to reboot in 20 minutes using the request system reboot
in 20 command.
lab@mxA-1> request system reboot in 20
Reboot the system in 20? [yes,no] (no) yes
lab@mxA-1>
Step 2.2
Clear the schedule reboot using the clear system reboot command.
lab@mxA-1> clear system reboot
reboot requested by lab at Fri Feb 8 19:38:29 2013
lab@mxA-1>
Step 2.3
Direct your router to reboot immediately using the request system reboot
command. From the console, you should be able to watch the entire process. Wait
for the reboot to complete before continuing.
lab@mxA-1> request system reboot
Reboot the system ? [yes,no] (no) yes
Shutdown NOW!
[pid 17210]
lab@mxA-1> JWaiting (max 300 seconds) for system process `vnlru' to stop...done
Waiting (max 300 seconds) for system process `vnlru_mem' to stop...done
Waiting (max 300 seconds) for system process `bufdaemon' to stop...done
Waiting (max 300 seconds) for system process `syncer' to stop...
Syncing disks, vnodes remaining...1 pfe_send_failed(index 0, type 17), err=32
1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 done
login: lab
Password:
Step 2.5
Use the show system uptime command to determine the router’s current time
and date. The date, as known by your router, will be used to parse log messages in
future steps.
lab@mxA-1> show system uptime
Current time: 2013-02-08 00:37:58 UTC
System booted: 2013-01-31 00:23:51 UTC (1w1d 00:14 ago)
Step 2.6
View the messages log file using the show log messages to view detailed
information about the PFE during the reboot that just occurred. It might be helpful to
use the match modifier to ensure that only entries from today’s date are shown. For
example, if today’s date is Feb 8th, issue the command show log messages |
match "Feb 8" (you might need to use two spaces between month and day).
Make an attempt to find a log that shows when the reboot was initiated. If you
cannot immediately find the entry, hit Ctrl+c and go to the next step.
lab@mxA-1> show log messages | match "Feb 8"
Feb 8 00:01:06 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+54373
Feb 8 00:03:34 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+55229
Feb 8 00:06:02 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+55506
Feb 8 00:08:30 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+61679
Feb 8 00:10:58 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+62191
Feb 8 00:13:26 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+53976
Feb 8 00:15:54 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+53347
Feb 8 00:18:22 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+49385
Feb 8 00:20:50 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+60403
Feb 8 00:23:18 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+60057
Feb 8 00:25:46 mx80 rpd[1130]: bgp_listen_accept: Connection attempt from
unconfigured neighbor: 172.22.201.2+56149
Step 2.7
You might notice that matching on the date might not narrow the search down
enough because thousands of entries might happen on any one day. Use the
previous command but add a second pipe that matches on reboot. For example, if
today’s date is Dec 7th, issue the command show log messages | match
"Feb 8" | match reboot.
Step 2.8
Using the show log messages command, determine the exact time that FPC 1
came back online after the reboot. (Hint: Status of FPCs are tracked by
chassisd.)
lab@mxA-1> show log messages | match "Feb 8" | match chassisd | match fpc
Feb 8 19:19:56 mxA-1 chassisd[1137]: CHASSISD_IFDEV_DETACH_FPC:
ifdev_detach_fpc(0)
Feb 8 19:19:56 mxA-1 chassisd[1137]: CHASSISD_IFDEV_DETACH_FPC:
ifdev_detach_fpc(1)
Feb 8 19:19:57 mxA-1 chassisd[1137]: CHASSISD_IFDEV_DETACH_FPC:
ifdev_detach_fpc(0)
Feb 8 19:19:57 mxA-1 chassisd[1137]: CHASSISD_IFDEV_DETACH_FPC:
ifdev_detach_fpc(1)
Feb 8 19:22:59 mxA-1 chassisd[1121]: CHASSISD_IFDEV_DETACH_FPC:
ifdev_detach_fpc(0)
Feb 8 19:22:59 mxA-1 chassisd[1121]: CHASSISD_IFDEV_DETACH_FPC:
ifdev_detach_fpc(1)
Feb 8 19:23:52 mxA-1 chassisd[1121]: CHASSISD_FRU_EVENT: set_fpc_online:
restarted FPC 0
Feb 8 19:23:52 mxA-1 chassisd[1121]: CHASSISD_FRU_EVENT: set_fpc_online:
restarted FPC 1
In this lab part, you will use the CLI to monitor the status of the chassis and
environment of your router.
Step 3.1
Issue the show chassis temperature-thresholds command to determine
the default threshold settings.
lab@mxA-1> show chassis temperature-thresholds
Fan speed Yellow alarm Red alarm Fire Shutdown
(degrees C) (degrees C) (degrees C) (degrees C)
Item Normal High Normal Bad fan Normal Bad fan Normal
Chassis default 48 54 65 55 75 75 100
Routing Engine 65 70 85 75 95 80 100
Step 3.2
Issue the show chassis environment command to determine the current
temperature of the routing engine in degrees Celsius.
lab@mxA-1> show chassis environment
Class Item Status Measurement
Temp PEM 0 OK
PEM 1 Absent
RE 0 Intake OK 28 degrees C / 82 degrees F
RE 0 Front Exhaust OK 32 degrees C / 89 degrees F
RE 0 Rear Exhaust OK 30 degrees C / 86 degrees F
Routing Engine OK 35 degrees C / 95 degrees F
Routing Engine CPU OK 46 degrees C / 114 degrees F
TFEB 0 QX 0 TSen OK 32 degrees C / 89 degrees F
TFEB 0 QX 0 Chip OK 41 degrees C / 105 degrees F
TFEB 0 LU 0 TSen OK 32 degrees C / 89 degrees F
Step 3.3
Determine any alarms exist by issuing the show chassis alarms command.
lab@mxA-1> show chassis alarms
No alarms currently active
Step 3.4
Enter configuration mode and change the default chassis alarm settings such that if
any Ethernet ports are in the link-down state, the router will generate a red alarm.
Commit your configuration an exit to operational mode.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# set chassis alarm ethernet link-down red
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
Step 3.5
Once again, determine if any alarms exist by issuing the show chassis alarms
command.
lab@mxA-1> show chassis alarms
6 alarms currently active
Alarm time Class Description
2013-02-08 00:49:54 UTC Major ge-1/1/2: Link down
2013-02-08 00:49:54 UTC Major ge-1/1/1: Link down
2013-02-08 00:49:54 UTC Major xe-0/0/3: Link down
2013-02-08 00:49:54 UTC Major xe-0/0/2: Link down
2013-02-08 00:49:54 UTC Major xe-0/0/1: Link down
2013-02-08 00:49:54 UTC Major xe-0/0/0: Link down
Step 3.6
Log out of your assigned device.
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
This lab demonstrates how to work with user processes, system daemons, core dump
files, and the routing table. You will also configure and work with OSPF and BGP. You will
then configure basic Layer 2 bridging.
By completing this lab, you will perform the following tasks:
• View what users are logged into the router and forcibly remove unwanted or
hung users.
• View and restart system daemons.
• Generate and retrieve core dump files.
• Configure and monitor OSPF and BGP.
• Configure and monitor Layer 2 bridging.
In this lab part, you examine users logged in to your assigned device. You will also
examine and restart daemons that are currently running on the router.
Step 1.1
Ensure that you know to which device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to
determine your device’s management address.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
Step 1.3
Log in to your device with the username lab and the password lab123. Note that
both the name and password are case-sensitive.
login: lab
Password:
[edit]
lab@mxA-1#
[edit]
lab@mxA-1# load override jtnoc/lab5-start.config
load complete
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
[edit]
lab@mxA-1>
Step 1.5
Issue the show system users command and answer the following questions:
lab@mxA-1> show system users
8:08PM up 47 mins, 1 user, load averages: 0.00, 0.03, 0.01
USER TTY FROM LOGIN@ IDLE WHAT
lab p0 10.210.14.30 8:09PM - -cli (cli)
Step 1.6
Open a new Telnet session to your assigned device.
Step 1.7
On the new Telnet session, log in as user lab with the password supplied by your
instructor.
mxA-1 (ttyp0)
login: lab
Password:
Step 1.9
Issue the request system logout user lab terminal ? command.
lab@mxA-1> request system logout user lab terminal ?
Possible completions:
<terminal> Terminal user is logged in to
Step 1.10
Forcibly remove the second instance of user lab.
lab@mxA-1> request system logout user lab terminal p2
logout-user: done
lab@mxA-1>
Step 1.11
Issue the show system users command and answer the following question:
lab@mxA-1> show system users
8:14PM up 53 mins, 1 user, load averages: 0.38, 0.20, 0.08
USER TTY FROM LOGIN@ IDLE WHAT
lab p0 10.210.14.30 8:09PM - -cli (cli)
Mem: 362M Active, 58M Inact, 80M Wired, 144M Cache, 112M Buf, 1345M Free
Swap: 2915M Total, 2915M Free
PID USERNAME THR PRI NICE SIZE RES STATE TIME WCPU COMMAND
11 root 1 171 52 0K 16K RUN 182.9H 98.05% idle
1296 root 11 97 0 16732K 8404K ucond 86:48 0.00% clksyncd
13 root 1 -20 -139 0K 16K RUN 75:40 0.00% swi7: clock
1281 root 1 96 0 110M 14004K select 18:15 0.00% chassisd
1417 root 1 96 0 57384K 32128K select 15:29 0.00% mib2d
1300 root 1 96 0 11960K 7364K select 11:23 0.00% license-check
1386 root 1 96 0 19168K 11616K select 6:56 0.00% l2ald
1415 root 1 96 0 32072K 12520K select 6:49 0.00% pfed
1403 root 3 20 0 10144K 3028K sigwai 6:33 0.00% jddosd
1299 root 1 96 0 13768K 3324K select 6:06 0.00% shm-rtsdbd
1278 root 1 96 0 2528K 1240K select 4:57 0.00% bslockd
12 root 1 -40 -159 0K 16K WAIT 4:07 0.00% swi2: netisr 0
1418 root 1 96 0 41004K 35564K select 3:53 0.00% snmpd
1413 root 1 96 0 21628K 11812K select 3:53 0.00% smid
1390 root 1 96 0 34652K 12960K select 3:12 0.00% cosd
28 root 1 -68 -187 0K 16K WAIT 3:07 0.00% irq36: tsec1
1291 root 1 96 0 8972K 4996K select 1:52 0.00% ppmd
1282 root 1 96 0 11992K 6980K select 1:45 0.00% alarmd
9 root 1 171 52 0K 16K pgzero 1:27 0.00% pagezero
23 root 1 -52 -171 0K 16K WAIT 1:09 0.00% irq43: i2c0 i2c1
27 root 1 -68 -187 0K 16K WAIT 1:06 0.00% irq35: tsec1
1385 root 1 4 0 61724K 21776K kqread 1:04 0.00% rpd
15 root 1 -16 0 0K 16K - 1:04 0.00% yarrow
1414 root 1 96 0 6172K 2736K select 1:04 0.00% irsd
...
Step 1.14
Issue the restart routing command.
lab@mxA-1> restart routing
Routing protocols process started, pid 37465
lab@mxA-1>
Step 1.15
Issue the show route command.
lab@mxA-1> show route
In this lab part, you generate a core dump file, pull it from the router, and prepare it
to be inspected.
Step 2.1
Issue the show system core-dumps command and answer the following
question:
lab@mxA-1> show system core-dumps
/var/crash/*core*: No such file or directory
/var/tmp/*core*: No such file or directory
/var/crash/kernel.*: No such file or directory
/tftpboot/corefiles/*core*: No such file or directory
Step 2.2
Note
Generating a core dump file can possibly
cause adverse effects on your device and it
is not recommended as a troubleshooting
step unless directed by JTAC.
Note
The core-dump part of the previous
command is a hidden command and will
not autocomplete.
Step 2.3
Generate a core dump file using the rpd process.
lab@mxA-1> request system core-dump routing
Generating core dump for routing process using running method
Step 2.4
Issue the show system core-dumps command to list the core dump files.
lab@mxA-1> show system core-dumps
/var/crash/*core*: No such file or directory
-rw-rw---- 1 root field 37277696 Feb 7 20:20 /var/tmp/rpd.core.0
/var/crash/kernel.*: No such file or directory
/tftpboot/corefiles/*core*: No such file or directory
total 1
Step 2.5
Next, retrieve the core dump file using FTP. Using the local Windows FTP client, open
an FTP session to your assigned device’s management address.
Step 2.6
Note
Make sure that once the FTP session is
open, you set the transfer mode to binary
and enable hash marks.
Once the FTP session is open, log in using the lab user name and perform an FTP
get to transfer the core dump file to your local machine.
Connected to 10.210.15.1.
220 mxA-1 FTP server (Version 6.00LS) ready.
User (10.210.15.1:(none)): lab
331 Password required for lab.
Password:
230 User lab logged in.
ftp> bin
200 Type set to I.
ftp> hash
Hash mark printing On ftp: (2048 bytes/hash mark) .
ftp> cd /var/tmp/
250 CWD command successful.
ftp> get rpd.core.0
200 PORT command successful.
150 Opening BINARY mode data connection for 'rpd.core.0' (24875008 bytes).
##############################################################################
##############################################################################
...
##############################################################################
In this lab part, you configure OSPF and BGP. You will also examine the contents of
the routing table.
Step 3.1
Issue the show route command.
lab@mxA-1> show route
Step 3.2
To test connectivity, ping the virtual router attached to the remote team’s device
within your pod.
lab@mxA-1> ping remote-teams-VR
PING 192.168.12.2 (192.168.12.2): 56 data bytes
^C
--- 192.168.12.2 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
Step 3.4
Enter configuration mode and navigate to the [edit protocols ospf]
hierarchy level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit protocols ospf
Note
The unit associated with interfaces
ge-1/0/2 and ge-1/0/3 is not unit 0. Take
extra care when configuring these
interfaces under OSPF.
STOP Before proceeding, ensure that the remote student team within your
pod is ready to continue on to the next step.
Step 3.7
Issue the run show ospf interface and run show ospf neighbor
commands.
Note
It might take a minute for the OSPF
adjacencies to reach the Full state.
Step 3.8
Issue the run show route command and answer the following questions:
[edit protocols ospf]
lab@mxA-1# run show route
Step 3.9
Next, ping the remote team’s virtual router.
[edit protocols ospf]
lab@mxA-1# run ping remote-teams-VR
PING 192.168.12.2 (192.168.12.2): 56 data bytes
64 bytes from 192.168.12.2: icmp_seq=0 ttl=64 time=0.568 ms
64 bytes from 192.168.12.2: icmp_seq=1 ttl=64 time=0.489 ms
^C
--- 192.168.12.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.489/0.528/0.568/0.039 ms
Step 3.10
Next, perform a traceroute to the remote team’s virtual router.
Step 3.11
Navigate to the [edit routing-options] hierarchy level.
[edit protocols ospf]
lab@mxA-1# top edit routing-options
[edit routing-options]
lab@mxA-1#
Step 3.12
Configure a local autonomous system of 65412.
[edit routing-options]
lab@mxA-1# set autonomous-system 65412
Step 3.13
Navigate to the [edit protocols bgp] hierarchy level.
[edit routing-options]
lab@mxA-1# top edit protocols bgp
Note
You must use the interface IP addresses
associated with ISP A and ISP B for the BGP
peering sessions. Please refer to the lab
diagram for further details.
Step 3.14
Configure the BGP group ISP_A by issuing the edit group ISP-A command.
[edit protocols bgp]
lab@mxA-1# edit group ISP-A
lab@mxA-1>
Step 3.21
To investigate why the BGP sessions cannot reach the Established state,
configure traceoptions under the BGP protocol. Navigate to the [edit
protocols bgp traceoptions] hierarchy level. Once under the BGP trace
options hierarchy level, configure the flag of open and the file to be
bgp-trace.log. Commit the configuration when complete.
[edit protocols bgp group ISP-B]
lab@mxA-1# up 1 edit traceoptions
Step 3.23
Remove the traceoptions configuration that you recently configured and commit
the configuration.
Note
Traceoptions can be processor intensive.
We recommend to only use traceoptions for
troubleshooting purposes and remove the
traceoptions when the troubleshooting is
finished.
lab@mxA-1>
www.juniper.net Control Plane Monitoring and Troubleshooting • Lab 5–23
Junos Troubleshooting in the NOC
Step 3.26
Issue the show bgp summary command.
Note
You might have to wait few minutes for the
BGP session to reach the Established
state.
Step 3.27
Issue the show route | no-more command.
lab@mxA-1> show route | no-more
In this lab part, you examine the ARP table, configure bridging, and examine the
bridge table.
Step 4.1
Issue the show arp command.
lab@mxA-1> show arp
MAC Address Address Name Interface
Flags
5c:5e:ab:00:6f:ff 10.210.14.2 10.210.14.2 fxp0.0
none
5c:5e:ab:00:16:ff 10.210.14.5 10.210.14.5 fxp0.0
none
5c:5e:ab:00:59:ff 10.210.14.6 10.210.14.6 fxp0.0
none
00:10:db:ff:21:50 10.210.14.30 10.210.14.30 fxp0.0
none
02:00:00:00:00:10 128.0.0.50 128.0.0.50 em0.0
none
84:18:88:8e:ca:95 172.18.1.1 172.18.1.1 ge-1/0/0.141
none
84:18:88:8e:ca:96 172.18.2.1 172.18.2.1 ge-1/0/1.141
none
5c:5e:ab:00:6f:62 172.18.5.2 172.18.5.2 ge-1/0/2.141
none
84:18:88:8e:ca:98 192.168.11.2 192.168.11.2 ge-1/0/3.141
none
Total entries: 9
Step 4.2
Use the clear arp interface ge-1/0/3.141 command to remove the ARP
entry associated with the ge-1/0/3.141 interface.
lab@mxA-1> clear arp interface ge-1/0/3.141
192.168.11.2 deleted
Step 4.3
Issue the show arp command.
lab@mxA-1>
Step 4.4
Enter configuration mode and navigate to the [edit interfaces ge-1/0/2]
hierarchy level and issue the delete command to remove any configuration at this
level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit interfaces ge-1/0/2
lab@mxA-1>
Step 4.11
Issue the show bridge domain detail command.
lab@mxA-1> show bridge domain detail
Step 4.12
Log out of your assigned device.
lab@mxA-1> exit
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
This lab demonstrates how to monitor and troubleshoot Ethernet interfaces. You will
examine and troubleshoot an Ethernet interface that is in the physical down state. You will
then set that interface in local loopback mode to test the health of the interface. Next, you
will configure Ethernet OAM and monitor the operation of it.
By completing this lab, you will perform the following tasks:
• Troubleshoot an Ethernet interface.
• Configure and run a local loopback test.
• Configure and monitor Ethernet OAM.
In this lab part, you will troubleshoot a link-down issue. You will first discover the
issue, devise a solution, and implement that solution.
Note
Depending on the class, the lab equipment
used might be remote from your physical
location. The instructor will inform you as to
the nature of your access and will provide
you the details needed to access your
assigned device.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the Management Network Diagram to
determine the management address of your student device.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
Step 1.3
Log in to your device with the username lab and the password lab123. Note that
both the name and password are case-sensitive.
mxA-1 (ttyu0)
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/lab6-start.config
load complete
[edit]
lab@mxA-1# commit
commit complete
[edit]
lab@mxA-1#
Step 1.6
Issue the run show log messages | match ge-1/0/9 command.
[edit]
lab@mxA-1# run show log messages | match ge-1/0/9
Jan 31 01:13:43 mxA-1 chassisd[1281]: CHASSISD_IFDEV_CREATE_NOTICE:
create_pics: created interface device for ge-1/0/9
Jan 31 01:13:47 mxA-1 tfeb0 mic_sfp_phy_create: - Create SFP PHY ge-1/0/9
successfully
Step 1.7
Issue the run show log chassisd | match ge-1/0/9 command.
[edit]
lab@mxA-1# run show log chassisd | match ge-1/0/9
Jan 10 22:57:05 CHASSISD_IFDEV_CREATE_NOTICE: create_pics: created interface
device for ge-1/0/9
Jan 10 22:57:05 ifdev_create entered ge-1/0/9
Jan 10 22:57:05 ge-1/0/9: large delay buffer cleared
Jan 31 01:07:25 ifd ge-1/0/9 marked as gone
Jan 31 01:13:43 Created pic for ge-1/0/9
Jan 31 01:13:43 CHASSISD_IFDEV_CREATE_NOTICE: create_pics: created interface
device for ge-1/0/9
Jan 31 01:13:43 ifdev_create entered ge-1/0/9
Jan 31 01:13:43 ge-1/0/9: large delay buffer cleared
Step 1.8
Issue the run clear interfaces statistics ge-1/0/9 command, wait
a minute, and then issue the run show interfaces ge-1/0/9 extensive
command.
Note
Clearing the interface statistics before
gathering statistical information is a
recommended troubleshooting step. This
step removes any stale information that is
not related to the present issue.
[edit]
lab@mxA-1# run clear interfaces statistics ge-1/0/9
[edit]
lab@mxA-1# run show interfaces ge-1/0/9 extensive
Physical interface: ge-1/0/9, Enabled, Physical link is Down
Interface index: 149, SNMP ifIndex: 521, Generation: 152
Link-level type: Ethernet, MTU: 1514, Speed: 1000mbps, BPDU Error: None,
MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled,
Flow control: Enabled, Auto-negotiation: Enabled, Remote fault: Online
Device flags : Present Running Down
Interface flags: Hardware-Down SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Hold-times : Up 0 ms, Down 0 ms
Current address: 80:71:1f:c3:03:69, Hardware address: 80:71:1f:c3:03:69
Last flapped : 2013-02-07 01:43:29 UTC (01:19:31 ago)
Statistics last cleared: 2013-02-07 03:02:36 UTC (00:00:24 ago)
Traffic statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Logical interface ge-1/0/9.0 (Index 331) (SNMP ifIndex 640) (Generation 225)
Flags: Device-Down SNMP-Traps 0x0 Encapsulation: ENET2
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 1500, Generation: 330, Route table: 0
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Dest-route-down Is-Preferred Is-Primary
Destination: 10.10.10.0/30, Local: 10.10.10.1, Broadcast: 10.10.10.3,
Generation: 266
Protocol multiservice, MTU: Unlimited, Generation: 331, Route table: 0
Flags: Is-Primary
Policer: Input: __default_arp_policer__
Step 1.9
Issue the run show interface ge-1/0/9 media command.
[edit]
lab@mxA-1# run show interfaces ge-1/0/9 media
Physical interface: ge-1/0/9, Enabled, Physical link is Down
Interface index: 149, SNMP ifIndex: 521
Link-level type: Ethernet, MTU: 1514, Speed: 1000mbps, BPDU Error: None,
MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled,
Flow control: Enabled, Auto-negotiation: Enabled, Remote fault: Online
Device flags : Present Running Down
Step 1.10
Navigate to the [edit interfaces ge-1/0/9] hierarchy level.
[edit]
lab@mxA-1# edit interfaces ge-1/0/9
Step 1.13
Change the link speed for the ge-1/0/9 interface to 10 Mbps and commit the
configuration.
[edit interfaces ge-1/0/9]
lab@mxA-1# set speed 10m
Step 1.15
To ensure that the ge-1/0/9 interface is now working correctly, exit to operational
mode and issue the ping 10.10.10.2 detail count 5 command to test
connectivity to your local R1 device.
[edit interfaces ge-1/0/9]
lab@mxA-1# exit configuration-mode
Exiting configuration mode
lab@mxA-1>
In this lab part, you will configure an interface in local loopback mode to test the
integrity of the ge-1/0/9 interface.
Step 2.1
Enter configuration mode and navigate to the [edit interfaces ge-1/0/9]
hierarchy level. Then, configure the loopback option.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit interfaces ge-1/0/9
lab@mxA-1>
Step 2.5
Issue the ping 10.10.10.2 rapid count 10 command to loop traffic inside
the ge-1/0/9 interface.
Note
The expected behavior is to see a
time-to-live exceeded message.
Step 2.6
Issue the show interface ge-1/0/9 extensive command.
lab@mxA-1> show interfaces ge-1/0/9 extensive
Physical interface: ge-1/0/9, Enabled, Physical link is Up
Interface index: 149, SNMP ifIndex: 521, Generation: 152
Link-level type: Ethernet, MTU: 1514, Speed: 10m, BPDU Error: None,
MAC-REWRITE Error: None, Loopback: Enabled, Source filtering: Disabled,
Flow control: Enabled, Auto-negotiation: Enabled, Remote fault: Online
Device flags : Present Running Loop-Detected
Interface flags: SNMP-Traps Internal: 0x0
Link flags : None
CoS queues : 8 supported, 8 maximum usable queues
Hold-times : Up 0 ms, Down 0 ms
Current address: 80:71:1f:c3:03:69, Hardware address: 80:71:1f:c3:03:69
Logical interface ge-1/0/9.0 (Index 331) (SNMP ifIndex 640) (Generation 225)
Flags: SNMP-Traps 0x0 Encapsulation: ENET2
Traffic statistics:
Input bytes : 53760
Output bytes : 53900
Input packets: 640
Output packets: 640
Local statistics:
Input bytes : 0
Output bytes : 980
Input packets: 0
Output packets: 10
Transit statistics:
Input bytes : 53760 0 bps
Output bytes : 52920 0 bps
Input packets: 640 0 pps
Output packets: 630 0 pps
Protocol inet, MTU: 1500, Generation: 330, Route table: 0
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Is-Preferred Is-Primary
Destination: 10.10.10.0/30, Local: 10.10.10.1, Broadcast: 10.10.10.3,
Generation: 272
Protocol multiservice, MTU: Unlimited, Generation: 331, Route table: 0
Flags: Is-Primary
Policer: Input: __default_arp_policer__
In this lab part, you will configure Ethernet OAM and monitor its operation.
Step 3.1
Enter configuration mode and navigate to the [edit protocols oam
ethernet link-fault-management] hierarchy level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit protocols oam ethernet link-fault-management
lab@mxA-1>
Step 3.4
Issue the show oam ethernet link-fault-management command and
answer the following questions:
lab@mxA-1> show oam ethernet link-fault-management
Interface: ge-1/0/9
Status: Running, Discovery state: Send Any
Peer address: 80:71:1f:c3:03:69
Flags:Remote-Stable Remote-State-Valid Local-Stable 0x50
Remote loopback status: Enabled on local port, Enabled on peer port
Remote entity information:
Remote MUX action: forwarding, Remote parser action: loopback
Discovery mode: active, Unidirectional mode: unsupported
Remote loopback mode: supported, Link events: supported
Variable requests: unsupported
Step 3.5
Log out of your assigned device.
lab@mxA-1> exit
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
This lab demonstrates how to examine and work with the forwarding table, configure and
examine load balancing, and troubleshoot firewall filter issues.
By completing this lab, you will perform the following tasks:
• Examine and remove entries from the forwarding table.
• Configure and verify load balancing.
• Troubleshoot firewall filter issues.
In this lab part, you will examine the forwarding table and its relation to the routing
table. You will also clear entries in the forwarding table.
Note
Depending on the class, the lab equipment
used might be remote from your physical
location. The instructor will inform you as to
the nature of your access and will provide
you the details needed to access your
assigned device.
Step 1.1
Ensure that you know to which student device you have been assigned. Check with
your instructor if you are not certain. Consult the Management Network Diagram to
determine the management address of your student device.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
Step 1.3
Log in to your device with the username lab and the password lab123. Note that
both the name and password are case-sensitive.
mxA-1 (ttyu0)
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/lab7-start.config
load complete
[edit]
lab@mxA-1# commit
commit complete
[edit]
lab@mxA-1#
[edit routing-options]
lab@mxA-1# set static route 192.168.50.1 next-hop local-VR-IP
[edit routing-options]
lab@mxA-1# commit
commit complete
[edit routing-options]
lab@mxA-1#
Step 1.6
Examine the routing table and the forwarding table for the 192.168.50.1 route by
issuing the run show route 192.168.50.1 and the run show route
forwarding-table destination 192.168.50.1 commands.
[edit routing-options]
lab@mxA-1# run show route 192.168.50.1
[edit routing-options]
lab@mxA-1# run show route forwarding-table destination 192.168.50.1
Routing table: default.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
192.168.50.1/32 user 0 192.168.11.2 ucst 572 3 ge-1/0/3.141
[edit routing-options]
lab@mxA-1# run clear route forwarding-table 192.168.50.1 local-VR-IP
delete 192.168.50.1: gateway 192.168.11.2
Step 1.8
Issue the run show route 192.168.50.1 and the run show route
forwarding-table destination 192.168.50.1 commands.
[edit routing-options]
lab@mxA-1# run show route 192.168.50.1
[edit routing-options]
lab@mxA-1# run show route forwarding-table destination 192.168.50.1
Routing table: default.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
default user 0 84:18:88:8e:ca:95 ucst 585 14 ge-1/0/0.141
default perm 0 rjct 36 2
Step 1.9
To remove the 192.168.50.1 route from the routing table deactivate the static
route from the configuration, commit the configuration, and activate the static
route. Activate the configuration and exit to operational mode by issuing the commit
and-quit command.
[edit routing-options]
lab@mxA-1# deactivate static route 192.168.50.1/32
[edit routing-options]
lab@mxA-1# commit
commit complete
[edit routing-options]
lab@mxA-1# activate static route 192.168.50.1/32
[edit routing-options]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@mxA-1>
Step 1.10
Issue the show route 192.168.50.1 and the show route
forwarding-table destination 192.168.50.1 commands.
lab@mxA-1> show route 192.168.50.1
In this lab part, you will configure and examine the effects of load balancing. First
you will load a configuration on the router that contains a preconfigured BGP group
that will be receiving routes from a single AS. Please take a few minutes to examine
the lab diagram.
Step 2.1
Enter configuration mode and issue the load override
jtnoc/lab7-p2-start.config command, then active the configuration by
issuing the commit command.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# load override jtnoc/lab7-p2-start.config
load complete
[edit]
lab@mxA-1# commit
commit complete
[edit]
lab@mxA-1#
Step 2.2
Issue the run show bgp summary command.
www.juniper.net Isolating and Troubleshooting PFE Issues • Lab 7–7
Junos Troubleshooting in the NOC
[edit]
lab@mxA-1# run show bgp summary
Groups: 1 Peers: 2 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 24 23 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
172.18.6.1 65000 5 7 0 0 37 11/
12/12/0 0/0/0/0
172.18.7.1 65000 4 6 0 0 33 12/
12/12/0 0/0/0/0
Step 2.3
Issue the run show route 172.31.20.0/24 command.
[edit]
lab@mxA-1# run show route 172.31.20.0/24
Step 2.4
Issue the run show route forwarding-table destination
172.31.20.0/24 command.
[edit]
lab@mxA-1# run show route forwarding-table destination 172.31.20.0/24
Routing table: default.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
172.31.20.0/24 user 0 ulst 1048574 12
172.18.8.1 ucst 548 4 ge-1/0/1.141
[edit policy-options]
lab@mxA-1# set policy-statement LOAD-BALANCE then load-balance per-packet
Step 2.6
Navigate to the [edit routing-options] hierarchy level and apply the newly
created policy to the forwarding table as an export policy. Activate the configuration
and exit to operational mode by issuing the commit and-quit command.
[edit policy-options]
lab@mxA-1# top edit routing-options
[edit routing-options]
lab@mxA-1# set forwarding-table export LOAD-BALANCE
[edit routing-options]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@mxA-1>
Step 2.7
Issue the show route forwarding-table destination
172.31.20.0/24 command.
lab@mxA-1> show route forwarding-table destination 172.31.20.0/24
Routing table: default.inet
Internet:
Destination Type RtRef Next hop Type Index NhRef Netif
172.31.20.0/24 user 0 ulst 1048574 12
172.18.6.1 ucst 561 4 ge-1/0/0.141
172.18.7.1 ucst 562 5 ge-1/0/1.141
In this lab part, you will load a configuration that has a preconfigured firewall filter.
You will examine the router to determine where the firewall is applied. Then you will
examine the protocols on the router to ensure that they are still functioning properly.
Step 3.1
Enter configuration mode and issue the load override
jtnoc/lab7-p3-start.config command. Activate the configuration by
issuing the commit command.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# load override jtnoc/lab7-p3-start.config
load complete
[edit]
lab@mxA-1# commit
commit complete
[edit]
lab@mxA-1#
Step 3.2
Issue the show firewall command.
[edit]
lab@mxA-1# show firewall
family inet {
filter PROTECT-RE {
term ssh {
from {
protocol tcp;
port ssh;
}
then accept;
Step 3.3
Issue the run show interface filters command.
[edit]
lab@mxA-1# run show interfaces filters
Interface Admin Link Proto Input Filter Output Filter
lc-0/0/0 up up
lc-0/0/0.32769 up up vpls
xe-0/0/0 up down
xe-0/0/1 up down
xe-0/0/2 up down
xe-0/0/3 up down
ge-1/0/0 up up
ge-1/0/0.141 up up inet
multiservice
ge-1/0/0.32767 up up multiservice
ge-1/0/1 up up
ge-1/0/1.141 up up inet
multiservice
ge-1/0/1.32767 up up multiservice
ge-1/0/2 up up
ge-1/0/2.141 up up inet
multiservice
www.juniper.net Isolating and Troubleshooting PFE Issues • Lab 7–13
Junos Troubleshooting in the NOC
ge-1/0/2.32767 up up multiservice
ge-1/0/3 up down
ge-1/0/3.141 up down inet
multiservice
ge-1/0/3.32767 up down multiservice
ge-1/0/4 up up
ge-1/0/5 up up
ge-1/0/6 up up
ge-1/0/7 up up
ge-1/0/8 up up
ge-1/0/9 up down
ge-1/1/0 up down
ge-1/1/1 up down
ge-1/1/2 up up
ge-1/1/3 up up
ge-1/1/4 up up
ge-1/1/5 up up
ge-1/1/6 up up
ge-1/1/7 up up
ge-1/1/8 up up
ge-1/1/9 up down
cbp0 up up
demux0 up up
dsc up up
em0 up up
em0.0 up up inet
inet6
tnp
em1 up down
fxp0 up up
fxp0.0 up up inet
gre up up
ipip up up
irb up up
lo0 up up
lo0.0 up up inet PROTECT-RE
lo0.16384 up up inet
lo0.16385 up up inet
lsi up up
me0 up up
mtun up up
pimd up up
pime up up
pip0 up up
pp0 up up
tap up up
lab@mxA-1>
Step 3.4
Issue the run show bgp summary and the run show ospf neighbor
commands to check the dynamic routing protocols running on your router.
[edit]
lab@mxA-1# run show bgp summary
Groups: 1 Peers: 2 Down peers: 0
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0 24 23 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
172.18.6.1 65000 154 163 0 0 1:10:06 11/
12/12/0 0/0/0/0
172.18.7.1 65000 153 161 0 0 1:10:02 12/
12/12/0 0/0/0/0
[edit]
lab@mxA-1# run show ospf neighbor
[edit]
lab@mxA-1#
Step 3.5
To make sure that OSPF is configured for the ge-1/0/2 interface, issue the
run show ospf interface command.
[edit]
lab@mxA-1# run show ospf interface
Interface State Area DR ID BDR ID Nbrs
ge-1/0/2.141 DR 0.0.0.0 192.168.31.1 0.0.0.0 0
ge-1/0/3.141 Down 0.0.0.0 0.0.0.0 0.0.0.0 0
lo0.0 DR 0.0.0.0 192.168.31.1 0.0.0.0 0
Step 3.6
To examine the traffic being received on the ge-1/0/2 interface, issue the
run monitor traffic interface ge-1/0/2.VLAN-ID command.
[edit]
lab@mxA-1# run monitor traffic interface ge-1/0/2.VLAN-ID
verbose output suppressed, use <detail> or <extensive> for full protocol decode
Address resolution is ON. Use <no-resolve> to avoid any reverse lookup delay.
Address resolution timeout is 4s.
Listening on ge-1/0/2.141, capture size 96 bytes
lab@mxA-1>
Step 3.7
Examine the firewall filter again by issuing the show firewall command.
[edit]
lab@mxA-1# show firewall
family inet {
filter PROTECT-RE {
term ssh {
from {
protocol tcp;
port ssh;
}
then accept;
}
term telnet {
from {
protocol tcp;
port telnet;
}
Step 3.8
To determine if the OSPF hello messages are being processed by the ospf term,
navigate to the [edit firewall family inet filter PROTECT-RE
term ospf] hierarchy level and configure the counter ospf-hellos under that
term. Activate the configuration by issuing the commit command.
[edit]
lab@mxA-1# edit firewall family inet filter PROTECT-RE term ospf
Filter: PROTECT-RE
Counters:
Name Bytes Packets
ospf-hellos 0 0
Step 3.11
To examine the traffic being processed by the term discard-all, configure
firewall logging for everything that is processed by this term. Activate the
configuration by issuing the commit command.
[edit firewall family inet filter PROTECT-RE term ospf]
lab@mxA-1# up 1
Note
Because OSPF hello messages are sent
every few seconds, you might need to issue
the run show firewall log
command a few times to see the hello
messages.
Step 3.14
Examine the match criteria more closely by issuing the show term ospf from
command.
[edit firewall family inet filter PROTECT-RE]
lab@mxA-1# show term ospf from
source-address {
224.0.0.5/32;
}
protocol ospf;
STOP Before proceeding, ensure that the remote student team within your
pod is ready to continue on to the next step.
Step 3.16
Issue the run show ospf neighbor command to determine if the OSPF
adjacency reaches the Full state.
[edit firewall family inet filter PROTECT-RE]
lab@mxA-1# run show ospf neighbor
Address Interface State ID Pri Dead
172.18.5.2 ge-1/0/2.141 ExStart 192.168.32.1 128 37
Filter: PROTECT-RE
Counters:
Name Bytes Packets
ospf-hellos 17104 224
Step 3.18
Issue the run show firewall log command to examine the firewall log to
determine if the traffic is being discarded by the discard-all term.
[edit firewall family inet filter PROTECT-RE]
lab@mxA-1# run show firewall log
Log :
Time Filter Action Interface Protocol Src Addr
Dest Addr
11:11:46 pfe D ge-1/0/2.141 OSPF 172.18.5.2
172.18.5.1
11:11:42 pfe D ge-1/0/2.141 OSPF 172.18.5.2
172.18.5.1
...
11:11:05 pfe D ge-1/0/2.141 OSPF 172.18.5.2
172.18.5.1
---(more)---[abort]
Step 3.19
Configure the ospf term to match traffic destined to the 172.18.5.0/30 subnet.
Activate the configuration and exit to operational mode by issuing the commit
and-quit command.
[edit firewall family inet filter PROTECT-RE]
lab@mxA-1# set term ospf from destination-address 172.18.5.0/30
lab@mxA-1>
STOP Before proceeding, ensure that the remote student team within your
pod is ready to continue on to the next step.
Step 3.20
Issue the show ospf neighbor command to determine if the OSPF adjacency
reaches the Full state.
lab@mxA-1> show ospf neighbor
Address Interface State ID Pri Dead
172.18.5.1 ge-1/0/2.143 Full 192.168.35.1 128 38
Step 3.21
Log out of your assigned device.
lab@mxA-1> exit
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
In this lab, you discover and troubleshoot OSPF adjacency and BGP session problems.
Then, after you fix the problems associated with the OSPF adjacencies and BGP sessions,
a routing loop is introduced into the network. You must troubleshoot and fix the routing
loop that becomes present in the network.
By completing this lab you will perform the following tasks:
• Troubleshoot OSPF adjacency problems.
• Troubleshoot BGP session problems.
• Troubleshoot routing loop problems.
In this lab part, you load and activate a predefined configuration saved on your
assigned device. This predefined configuration will introduce a number of issues in
your network. You will then troubleshoot the issues to restore network functionality.
Step 1.1
Ensure that you know to which device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to
determine your device’s management address.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/lab8-start.config
load complete
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@mxA-1>
In this lab part, you troubleshoot OSPF adjacency issues. First you must discover
what OSPF adjacency issues exist, then you must fix any problems that prevent
OSPF adjacencies from reaching the Full state.
Step 2.1
Note
To simulate a multi-router topology, every
physical MX Series device in the lab has
been divided into many logical systems. To
view the information for a logical system
you must use the logical-system
option followed by the logical system’s
name. For example, if you want to view the
OSPF adjacencies for logical system R2,
you enter the command show ospf
neighbor logical-system R2.
lab@mxA-1>
Step 2.2
Attempt to ping R3 from R2 by issuing the ping 10.1.1.2 logical-system
R2 rapid command.
lab@mxA-1> ping 10.1.1.2 logical-system R2 rapid
PING 10.1.1.2 (10.1.1.2): 56 data bytes
!!!!!
--- 10.1.1.2 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.439/0.688/1.660/0.486 ms
Step 2.4
Troubleshoot the OSPF adjacency problem on R2 further by issuing the monitor
traffic interface lt-1/0/0.1 detail command
lab@mxA-1> monitor traffic interface lt-1/0/0.1 detail
Address resolution is ON. Use <no-resolve> to avoid any reverse lookup delay.
Address resolution timeout is 4s.
Listening on lt-1/0/0.1, capture size 1514 bytes
[edit]
lab@mxA-1# edit logical-systems R3 interfaces lt-1/0/0.2
Step 2.8
Examine the OSPF adjacency states on R3 by issuing the run show ospf
neighbor logical-system R3 command.
[edit logical-systems R3 interfaces lt-1/0/0 unit 2]
lab@mxA-1# run show ospf neighbor logical-system R3
Address Interface State ID Pri Dead
10.1.1.1 lt-1/0/0.2 Full 10.1.100.2 128 19
Step 2.9
Test the Layer 3 connectivity by pinging R5 and R6 from R3 by issuing the run
ping 10.1.1.10 logical-system R3 rapid and run ping 10.1.1.6
logical-system R3 rapid commands.
[edit logical-systems R3 interfaces lt-1/0/0 unit 2]
lab@mxA-1# run ping 10.1.1.10 logical-system R3 rapid
PING 10.1.1.10 (10.1.1.10): 56 data bytes
!!!!!
--- 10.1.1.10 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.441/0.489/0.655/0.083 ms
Step 2.10
Navigate to the [edit logical-systems R3 protocols ospf] hierarchy
level. Configure the OSPF traceoptions to flag OSPF hello packets and OSPF errors in
detail. Then, configure the Junos OS to store the traceoptions in the file
ospf-trace.log. Then, commit the configuration.
[edit logical-systems R3 interfaces lt-1/0/0 unit 2]
lab@mxA-1# up 3 edit protocols ospf
Note
Viewing traceoptions log files is a little bit
different since you are using logical
systems. Notice that the previous
command has you place a R3/ in front of
the traceoptions log file name that you
created a few steps ago. The R3/
designation denotes that the traceoptions
file is stored within the R3 logical system.
Step 2.12
Change the OSPF password that is in use between R3 and R5 by issuing the set
area 0 interface lt-1/0/0.3 authentication simple-password
jtnoc command for R3. The issue the top set logical-systems R5
protocols ospf area 0 interface lt-1/0/0.4 authentication
simple-password jtnoc command for R5.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# set area 0 interface lt-1/0/0.3 authentication simple-password jtnoc
Step 2.16
Examine the current hello and dead interval settings for R3 by issuing the
run show ospf interface lt-1/0/0.3 detail logical-system R3
| match hello command.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# run show ospf interface lt-1/0/0.3 detail logical-system R3 | match
hello
Hello: 5, Dead: 50, ReXmit: 5, Not Stub
Step 2.17
Make sure your current configuration hierarchy position is
[edit logical-systems R3 protocols ospf], then change the hello
interval to 10 seconds and dead interval to 40 seconds on R3’s lt-1/0/0.3 interface.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# set area 0 interface lt-1/0/0.3 hello-interval 10 dead-interval 40
Note
Alternatively, you can simply delete the
hello and dead interval settings for the R3
to R5 OSPF adjacency. The default hello
and dead interval for OSPF are 10 and 40
seconds, respectively.
Step 2.18
Change the router ID for R6 by issuing the top rename logical-systems R6
interfaces lo0.6 family inet address 10.1.100.3/32 to
address 10.1.100.6 command. Then, commit the configuration.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# top rename logical-systems R6 interfaces lo0.6 family inet address
10.1.100.3/32 to address 10.1.100.6
Step 2.20
Issue the run clear log R3/ospf-trace.log to clear old log information.
Then, examine the traceoptions file by issuing the run show log
R3/ospf-trace.log | find "hello 10.1.1.6" command.
Step 2.21
Examine the OSPF configuration messages that R3 and R6 are exchanging by
issuing the run monitor traffic interface lt-1/0/0.5 detail
command.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# run monitor traffic interface lt-1/0/0.5 detail
Address resolution is ON. Use <no-resolve> to avoid any reverse lookup delay.
Address resolution timeout is 4s.
Listening on lt-1/0/0.5, capture size 1514 bytes
Step 2.22
Ensure your current configuration hierarchy position is [edit
logical-systems R3 protocols ospf], then place R3’s
lt-1/0/0.5 interface in the default broadcast mode by issuing the delete area 0
interface lt-1/0/0.5 interface-type command. Then, commit the
configuration.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# delete area 0 interface lt-1/0/0.5 interface-type
Step 2.24
Now that the OSPF adjacency problems for R2 and R3 have been resolved. Examine
the OSPF adjacency between R5 and R6 by issuing the run show ospf
neighbor logical-system R5 command.
[edit logical-systems R3 protocols ospf]
lab@mxA-1# run show ospf neighbor logical-system R5
Address Interface State ID Pri Dead
10.1.1.9 lt-1/0/0.4 Full 10.1.100.3 128 36
10.1.1.14 lt-1/0/0.7 Full 10.1.100.6 128 31
lab@mxA-1>
In this lab part, you troubleshoot and resolve problems with BGP sessions.
Step 3.1
In your routing domain, R2, R3, and R4 should have full mesh IBGP sessions
between each other. Then, R2 should have an EBGP session with ISP-1, and R3
should have an EBGP session with ISP-2.
Examine the state of the BGP sessions on R2 by issuing the show bgp summary
logical-system R2 command.
lab@mxA-1> show bgp summary logical-system R2
Groups: 2 Peers: 3 Down peers: 2
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0
0 0 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
10.1.100.3 11111 889 888 0 7 1:13:36 0/
0/0/0 0/0/0/0
10.1.100.4 11111 871 866 0 6 8:00
Active
172.16.17.1 54321 0 3702 0 0 3d 4:24:57
Active
Step 3.2
To begin troubleshooting the R2 to R4 IBGP session enter configuration mode. Next,
navigate to the [edit logical-systems R4 protocols bgp] hierarchy
level. Then, configure the BGP traceoptions to flag the open message and place the
information from the traceoptions in the bgp-trace.log file. Commit the
configuration when complete.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit logical-systems R4 protocols bgp
Step 3.5
Configure the IBGP group on R4 to use the 10.1.100.4 address as the source
address to send BGP messages from. Then, commit the configuration.
[edit logical-systems R4 protocols bgp]
lab@mxA-1# set group IBGP local-address 10.1.100.4
Step 3.7
Examine the R4 to R2 BGP session on R4 by issuing the run show bgp
summary logical-system R4 command.
[edit logical-systems R4 protocols bgp group IBGP]
lab@mxA-1# run show bgp summary logical-system R4
Groups: 1 Peers: 2 Down peers: 2
Table Tot Paths Act Paths Suppressed History Damp State Pending
inet.0
0 0 0 0 0 0
Peer AS InPkt OutPkt OutQ Flaps Last Up/Dwn
State|#Active/Received/Accepted/Damped...
10.1.100.2 11111 0 0 0 0 2:03 Idle
10.1.100.3 11111 0 0 0 0 2:03 Idle
Step 3.8
Examine R4’s BGP traceoptions file by issuing the run show log
R4/bgp-trace.log | last 2 command.
[edit logical-systems R4 protocols bgp group IBGP]
lab@mxA-1# run show log R4/bgp-trace.log | last 2
Jan 15 04:22:13.831815 bgp_peer_init: BGP peer 10.1.100.2 (Internal AS 11111)
local address 10.1.100.4 not found. Leaving peer idled
Jan 15 04:22:13.833662 bgp_peer_init: BGP peer 10.1.100.3 (Internal AS 11111)
local address 10.1.100.4 not found. Leaving peer idled
Step 3.9
Examine the loopback interface on R4 by issuing the run show interfaces
terse lo0.4 command.
[edit logical-systems R4 protocols bgp group IBGP]
lab@mxA-1# run show interfaces terse lo0.4
error: interface lo0.4 not found
Step 3.10
Navigate to the [edit logical-systems R4 interfaces] hierarchy level.
Next, configure the loopback interface with the set lo0.4 family inet
address 10.1.100.4 command. Then, commit the configuration.
[edit logical-systems R4 protocols bgp group IBGP]
lab@mxA-1# up 2 edit interfaces
Step 3.12
Ensure that you are at the [edit logical-systems R4 interfaces]
hierarchy level. Next, remove R4’s BGP traceoptions by issuing the up 1 delete
protocols bgp traceoptions command. Then, commit the configuration.
[edit logical-systems R4 interfaces]
lab@mxA-1# up 1 delete protocols bgp traceoptions
Step 3.14
Navigate to the [edit logical-systems R2 protocols bgp group
isp-1] hierarchy level. Next, configure traceoptions and flag the BGP open
messages in detail. Store the information in the bgp-isp1-trace.log file.
Finally, commit the configuration.
[edit logical-systems R4 interfaces]
lab@mxA-1# up 2
[edit logical-systems]
lab@mxA-1# edit R2 protocols bgp group isp-1
Step 3.16
Ensure that you are at the [edit logical-systems R2 protocols bgp
group isp-1] hierarchy level. Next, remove the recently configured traceoptions.
Then, change the peer-as value to 12345 for the isp-1 BGP group. Next,
commit the configuration.
[edit logical-systems R2 protocols bgp group isp-1]
lab@mxA-1# delete traceoptions
Step 3.18
Examine the R3 to ISP-2 BGP session by issuing the run show bgp neighbor
10.0.1.1 logical-system R3 command.
[edit logical-systems R2 protocols bgp group isp-1]
lab@mxA-1# run show bgp neighbor 10.0.1.1 logical-system R3
Peer: 10.0.1.1 AS 54321 Local: 10.0.1.2 AS 11111
Type: External State: Active Flags: <ImportEval>
Last State: Idle Last Event: Start
Last Error: Cease
Export: [ agg-rts ]
Options: <Preference PeerAS Refresh>
Holdtime: 90 Preference: 170
Number of flaps: 4
Last flap event: RecvNotify
Error: 'Cease' Sent: 2 Recv: 2
Step 3.21
Ensure that you are at the [edit logical-systems R3 protocols bgp
group isp-2] hierarchy level. Then, remove the recently configured traceoptions
and commit the configuration.
[edit logical-systems R3 protocols bgp group isp-2]
lab@mxA-1# delete traceoptions
Step 3.23
Ensure you are at the [edit logical-systems R3 protocols bgp group
isp-2] hierarchy level. Then, issue the set authentication-key
jtnoc12345 command. Next, issue the commit and-quit command.
[edit logical-systems R3 protocols bgp group isp-2]
lab@mxA-1# set authentication-key jtnoc12345
lab@mxA-1>
Step 3.24
Wait a few minutes for the R3 to ISP-2 BGP session to attempt to establish again,
then issue the show bgp neighbor 10.0.1.1 logical-system R3
command.
lab@mxA-1> show bgp neighbor 10.0.1.1 logical-system R3
Peer: 10.0.1.1+55243 AS 54321 Local: 10.0.1.2+179 AS 11111
Type: External State: Established Flags: <Sync>
Last State: OpenConfirm Last Event: RecvKeepAlive
Last Error: None
Export: [ agg-rts ]
Options: <Preference AuthKey PeerAS Refresh>
Authentication key is configured
Holdtime: 90 Preference: 170
Number of flaps: 0
Peer ID: 10.0.1.1 Local ID: 10.1.100.3 Active Holdtime: 90
Keepalive Interval: 30 Group index: 0 Peer index: 0
BFD: disabled, down
Local Interface: ge-1/0/1.121
NLRI for restart configured on peer: inet-unicast
NLRI advertised by peer: inet-unicast
NLRI for this session: inet-unicast
Peer supports Refresh capability (2)
Stale routes from peer are kept for: 300
Peer does not support Restarter functionality
In this lab part, you discover and troubleshoot a routing loop between the Host
device and the Server device.
Step 4.1
Preform a traceroute test from the Host device to the Server device by issuing the
traceroute 10.10.10.100 logical-system Host command.
lab@mxA-1> traceroute 10.10.10.100 logical-system Host
traceroute to 10.10.10.100 (10.10.10.100), 30 hops max, 40 byte packets
1 10.12.12.1 (10.12.12.1) 0.563 ms 0.362 ms 0.332 ms
2 10.1.1.13 (10.1.1.13) 0.386 ms 2.834 ms 3.134 ms
3 172.16.1.13 (172.16.1.13) 3.207 ms 0.964 ms 0.384 ms
4 172.16.1.5 (172.16.1.5) 0.379 ms 0.385 ms 0.377 ms
5 10.1.1.2 (10.1.1.2) 0.382 ms 0.491 ms 0.389 ms
6 10.1.1.10 (10.1.1.10) 0.417 ms 0.407 ms 0.400 ms
7 172.16.1.13 (172.16.1.13) 0.403 ms 0.410 ms 0.404 ms
8 172.16.1.5 (172.16.1.5) 0.403 ms 0.411 ms 0.393 ms
9 10.1.1.2 (10.1.1.2) 0.403 ms 0.407 ms 0.412 ms
10 10.1.1.10 (10.1.1.10) 0.425 ms 0.475 ms 0.422 ms
11 172.16.1.13 (172.16.1.13) 0.417 ms 0.436 ms 0.420 ms
12 172.16.1.5 (172.16.1.5) 0.414 ms 0.415 ms 0.411 ms
13 10.1.1.2 (10.1.1.2) 0.427 ms 0.440 ms 0.426 ms
14 10.1.1.10 (10.1.1.10) 0.472 ms 0.459 ms 0.439 ms
15 172.16.1.13 (172.16.1.13) 0.445 ms 0.453 ms 0.449 ms
Step 4.2
Examine the routing tables of R2 and R5 by issuing the show route
10.10.10.100 logical-system R2 and show route 10.10.10.100
logical-system R5 commands.
lab@mxA-1> show route 10.10.10.100 logical-system R2
Step 4.3
Examine the routing table of R3 by issuing the show route 10.10.10.100
logical-system R3 command.
lab@mxA-1> show route 10.10.10.100 logical-system R3
Step 4.4
In an effort to determine which router R3 is learning the OSPF version of the prefix
from, examine the OSPF LSDB on R3 for the LSA that represents the 10.10.0.0/16
prefix. You can examine the LSA by issuing the show ospf database lsa-id
10.10.0.0 logical-system R3 command.
lab@mxA-1> show ospf database lsa-id 10.10.0.0 logical-system R3
OSPF AS SCOPE link state database
Type ID Adv Rtr Seq Age Opt Cksum Len
Extern 10.10.0.0 10.1.100.5 0x80000006 2361 0x22 0xda47 36
Step 4.5
Examine R5 for the 10.10.0.0/16 prefix by issuing the show route
10.10.10.100 logical-system R5 command.
lab@mxA-1> show route 10.10.10.100 logical-system R5
Step 4.6
Examine R4 for the 10.10.0.0/16 prefix by issuing the show route
10.10.10.100 logical-system R4 command.
lab@mxA-1> show route 10.10.10.100 logical-system R4
Step 4.7
Examine the OSPF LSDB on R2 for the LSA that represents the 10.10.0.0/16 prefix
by issuing the show ospf database lsa-id 10.10.0.0
logical-system R2 command.
lab@mxA-1> show ospf database lsa-id 10.10.0.0 logical-system R2
OSPF AS SCOPE link state database
Type ID Adv Rtr Seq Age Opt Cksum Len
Extern 10.10.0.0 10.1.100.5 0x80000006 2296 0x22 0xda47 36
Step 4.8
Enter configuration mode and navigate to the [edit logical-systems R2
protocols] hierarchy level. Configure BGP to have a protocol preference value of
99.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit logical-systems R2 protocols
lab@mxA-1>
Step 4.10
Preform a traceroute test from the Host device to the Server device by issuing the
traceroute 10.10.10.100 logical-system Host command.
lab@mxA-1> traceroute 10.10.10.100 logical-system Host
traceroute to 10.10.10.100 (10.10.10.100), 30 hops max, 40 byte packets
1 10.12.12.1 (10.12.12.1) 0.501 ms 0.387 ms 0.338 ms
2 10.1.1.5 (10.1.1.5) 0.364 ms 0.380 ms 0.368 ms
3 10.10.10.100 (10.10.10.100) 0.573 ms 0.572 ms 0.555 ms
Step 4.11
Preform a traceroute test from R4 to the Server device by issuing the traceroute
10.10.10.100 logical-system R4 command.
lab@mxA-1> traceroute 10.10.10.100 logical-system R4
traceroute to 10.10.10.100 (10.10.10.100), 30 hops max, 40 byte packets
1 172.16.1.5 (172.16.1.5) 0.495 ms 0.377 ms 0.333 ms
2 10.10.10.100 (10.10.10.100) 0.597 ms 0.566 ms 0.544 ms
Step 4.12
Preform a traceroute test from R1 to the Server device by issuing the traceroute
10.10.10.100 logical-system R1 command.
lab@mxA-1> traceroute 10.10.10.100 logical-system R1
traceroute to 10.10.10.100 (10.10.10.100), 30 hops max, 40 byte packets
1 172.16.1.1 (172.16.1.1) 0.556 ms 0.458 ms 0.331 ms
2 10.10.10.100 (10.10.10.100) 0.585 ms 0.551 ms 0.536 ms
Step 4.13
Preform a traceroute test from R5 to the Server device by issuing the traceroute
10.10.10.100 logical-system R5 command.
lab@mxA-1> traceroute 10.10.10.100 logical-system R5
traceroute to 10.10.10.100 (10.10.10.100), 30 hops max, 40 byte packets
1 172.16.1.13 (172.16.1.13) 0.469 ms 0.477 ms 0.359 ms
2 172.16.1.5 (172.16.1.5) 0.383 ms 0.379 ms 0.371 ms
3 10.10.10.100 (10.10.10.100) 0.590 ms 0.568 ms 0.557 ms
Step 4.14
Log out of your assigned device using the exit command.
srxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.
Overview
In this lab, you configure and monitor SNMP, RMON, inline JFlow, and inline port mirroring.
Throughout the lab you will have opportunities to troubleshoot various aspects of the lab.
By completing this lab you will perform the following tasks:
• Configure and Monitor SNMP.
• Configure and Monitor RMON.
• Configure and Monitor inline JFlow.
• Configure and Monitor inline port mirroring.
In this lab part, you load and activate a predefined configuration saved on your
assigned device. This predefined configuration contains minimal configuration for
the main routing system and configuration for various logical systems.
Step 1.1
Ensure that you know to which device you have been assigned. Check with your
instructor if you are not certain. Consult the management network diagram to
determine your device’s management address.
Step 1.2
Access the CLI for your device using either the console, Telnet, or SSH as directed by
your instructor. Refer to the management network diagram for the IP address
associated with your station. The following example uses Telnet to access an
MX Series device using the SecureCRT program:
login: lab
Password:
[edit]
lab@mxA-1# load override jtnoc/lab9-start.config
load complete
[edit]
lab@mxA-1# commit and-quit
commit complete
Exiting configuration mode
lab@mxA-1>
Step 2.1
Examine the MIB database for MIB names associated with the system MIB name
by performing a MIB walk. Perform the MIB walk by issuing the show snmp mib
walk system command.
Step 2.2
Examine the last 10 MIB names under the jnxBoxAnatomy MIB name by issuing
the show snmp mib walk jnxBoxAnatomy | last 10 command.
lab@mxA-1> show snmp mib walk jnxBoxAnatomy | last 10
jnxFruPsdAssignment.8.2.3.0 = 0
jnxFruPsdAssignment.8.2.4.0 = 0
jnxFruPsdAssignment.9.1.0.0 = 0
jnxFruPsdAssignment.20.1.1.0 = 0
jnxFruPsdAssignment.20.1.2.0 = 0
jnxFruPsdAssignment.20.2.1.0 = 0
jnxFruPsdAssignment.20.2.2.0 = 0
jnxBoxKernelMemoryUsedPercent.0 = 1
jnxBoxSystemDomainType.0 = 1
jnxBoxPersonality.0 = jnxProductNameMX80
Step 2.3
Examine the XML output of the jnxBoxPersonality.0 MIB name by issuing the
show snmp mib get jnxBoxPersonality.0 | display xml command.
lab@mxA-1> show snmp mib get jnxBoxPersonality.0 | display xml
<rpc-reply xmlns:junos="http://xml.juniper.net/junos/12.2R2/junos">
<snmp-object-information xmlns="http://xml.juniper.net/junos/12.2R2/
junos-snmp">
<snmp-object>
<name>jnxBoxPersonality.0</name>
<object-value-type>OID</object-value-type>
<object-value>jnxProductNameMX80</object-value>
<oid>1.3.6.1.4.1.2636.3.1.18.0</oid>
</snmp-object>
</snmp-object-information>
<cli>
<banner></banner>
</cli>
</rpc-reply>
Step 2.4
Enter configuration mode and navigate to the [edit snmp] hierarchy level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit snmp
[edit snmp]
lab@mxA-1#
[edit snmp]
lab@mxA-1# set community public clients 0/0 restrict
Step 2.7
Configure the trap group v2-traps to send SNMPv2c traps to the SNMP server
(10.11.11.100).
[edit snmp]
lab@mxA-1# set trap-group v2-traps targets 10.11.11.100
Step 2.8
Configure the Junos OS to send traps to the SNMP server for chassis, startup,
and link events. Activate the configuration and exit to operational mode by issuing
the commit and-quit command.
[edit snmp]
lab@mxA-1# set trap-group v2-traps categories chassis
[edit snmp]
lab@mxA-1# set trap-group v2-traps categories startup
[edit snmp]
lab@mxA-1# set trap-group v2-traps categories link
[edit snmp]
lab@mxA-1# commit and-quit
commit complete
lab@mxA-1>
Step 2.9
Open a second Telnet, or SSH, session to your assigned device. You can use this new
session to monitor the interface of the SNMP server logical system.
Refer to the management network diagram for the IP address associated with your
station. The following example uses Telnet to access an MX Series device using the
SecureCRT program:
Step 2.10
Log in to your device with the username lab using a password of lab123. Note
that both the name and password are case-sensitive.
mxA-1 (ttyu0)
login: lab
Password:
Step 2.16
Return to the second terminal session established with your assigned MX Series
device.
From the second terminal session, examine the output for the SNMP interface index
of interface ge-1/0/8.0 that you acquired in the previous step.
02:05:32.966074 In IP (tos 0x0, ttl 64, id 18533, offset 0, flags [none],
proto: UDP (17), length: 140) 10.11.11.1.63930 > 10.11.11.100.snmptrap:
|30|6e|02|01SNMPv1 |04|08C=v2-traps |a4|5fTrap(95) |06|0cE:2636.1.1.1.2.57
|40|0410.210.15.1|02|01 linkDown|02|01 |43|04156658857|30|3d
|30|11|06|0binterfaces.ifTable.ifEntry.ifIndex.640=|02|02640
|30|13|06|0einterfaces.ifTable.ifEntry.ifAdminStatus.1073741824=|02|013
|30|13|06|0einterfaces.ifTable.ifEntry.ifOperStatus.1073741824=|02|017
02:05:32.966111 Out IP (tos 0x0, ttl 255, id 18539, offset 0, flags [DF], proto:
ICMP (1), length: 56) 10.11.11.100 > 10.11.11.1: ICMP 10.11.11.100 udp port
snmptrap unreachable, length 36
IP (tos 0x0, ttl 64, id 18533, offset 0, flags [none], proto: UDP (17),
length: 140) [|ip]
Step 3.1
Return to the original terminal session established with your assigned MX Series
device.
From the original terminal session, enter configuration mode and navigate to the
[edit snmp rmon] configuration hierarchy level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit snmp rmon
Step 3.3
Set an RMON alarm, which has an index value of 1, to use the variable
ifHCOut1SecRate.X, where X is the SNMP interface index value that you found
in step 3.2.
[edit snmp rmon]
lab@mxA-1# set alarm 1 variable ifHCOut1SecRate.X
Step 3.4
Set the sample-type for alarm 1 to the absolute-value option. Then,
configure alarm 1 to sample the traffic rate once every 5 seconds.
[edit snmp rmon]
lab@mxA-1# set alarm 1 sample-type absolute-value
Step 3.9
Return to the second terminal session established with your assigned MX Series
device.
From the second terminal session, terminate the interface monitoring output by
issuing the Ctrl + c key combination. Then, ping the SNMP server from the Host
device by issuing the ping 10.11.11.100 size 1400 rapid count
1000000 logical-system Host command.
IP (tos 0x0, ttl 64, id 31451, offset 0, flags [none], proto: UDP (17), length:
140) [|ip]
02:25:49.505889 In IP (tos 0x0, ttl 64, id 31454, offset 0, flags [none],
proto: UDP (17), length: 164) 10.11.11.1.63930 > 10.11.11.100.snmptrap:
|30|81|85|02|01SNMPv2c |04|08C=v2-traps
|a7|76V2Trap(118)|02|04|02|01|02|01|30|68
|30|10|06|08system.sysUpTime.0=|43|04165420511
|30|17|06|0aS:1.1.4.1.0=|06|09S:1.1.5.3
|30|11|06|0binterfaces.ifTable.ifEntry.ifIndex.642=|02|02642
|30|13|06|0einterfaces.ifTable.ifEntry.ifAdminStatus.1073741824=|02|013
|30|13|06|0einterfaces.ifTable.ifEntry.ifOperStatus.1073741824=|02|017
02:25:49.505909 Out IP (tos 0x0, ttl 255, id 31460, offset 0, flags [DF], proto:
ICMP (1), length: 56) 10.11.11.100 > 10.11.11.1: ICMP 10.11.11.100 udp port
snmptrap unreachable, length 36
IP (tos 0x0, ttl 64, id 31454, offset 0, flags [none], proto: UDP (17),
length: 164) [|ip]
^C
8 packets received by filter
0 packets dropped by kernel
lab@mxA-1> ping 10.11.11.100 size 1400 rapid count 1000000 logical-system Host
PING 10.11.11.100 (10.11.11.100): 1400 data bytes
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Step 3.10
Return to the original terminal session established with your assigned MX Series
device.
From the original terminal session, issue the run show snmp rmon alarms
command.
[edit snmp rmon]
lab@mxA-1# run show snmp rmon alarms
1 monitor
ifHCOut1SecRate.642 10921728 rising threshold
Step 3.11
Examine the RMON events by issuing the run show snmp rmon events
command.
[edit snmp rmon]
lab@mxA-1# run show snmp rmon events
Event
Index Type Last Event
1 log and trap 2013-01-29 20:03:55 UTC
Step 3.12
Examine the logs for the RMON event by issuing the run show log messages
| match SNMPD_RMON_EVENTLOG command.
[edit snmp rmon]
lab@mxA-1# run show log messages | match SNMPD_RMON_EVENTLOG
Jan 29 19:52:06 mxA-1 snmpd[1447]: SNMPD_RMON_EVENTLOG: Event 1 triggered by
Alarm 1, rising threshold (9000000) crossed, (variable: ifHCOut1SecRate.642,
value: 11117112)
Jan 29 19:52:16 mxA-1 snmpd[1447]: SNMPD_RMON_EVENTLOG: Event 2 triggered by
Alarm 1, falling threshold (2000000) crossed, (variable:
ifHCOut1SecRate.642, value: 0)
Jan 29 20:03:56 mxA-1 snmpd[1447]: SNMPD_RMON_EVENTLOG: Event 1 triggered by
Alarm 1, rising threshold (9000000) crossed, (variable: ifHCOut1SecRate.642,
value: 10921728)
Step 3.13
Examine the current number of SNMP traps sent by issuing the run show snmp
statistics | find output command.
[edit snmp rmon]
lab@mxA-1# run show snmp statistics | find output
Output:
Packets: 322176, Too bigs: 0, No such names: 0,
Bad values: 0, General errors: 0,
Get requests: 0, Get nexts: 0, Set requests: 0,
Get responses: 322154, Traps: 22
Step 3.14
Examine the SNMP traps configuration.
[edit snmp rmon]
lab@mxA-1# up 1 show trap-group v2-traps
categories {
chassis;
link;
startup;
}
targets {
10.11.11.100;
}
Step 3.15
Configure the RMON alarm category for the v2-traps trap group. Activate the
configuration and exit to operational mode by issuing the commit and-quit
command.
[edit snmp rmon]
lab@mxA-1# up 1 set trap-group v2-traps categories rmon-alarm
lab@mxA-1>
Step 3.16
Return to the second terminal session established with your assigned MX Series
device.
From the second terminal session, terminate the previous ping operation by issuing
the Ctrl + c key combination. Then, ping the SNMP server from the Host device by
issuing the ping 10.11.11.100 size 1400 rapid count 1000000
logical-system Host command.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!^C
--- 10.11.11.100 ping statistics ---
357077 packets transmitted, 357077 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.799/0.911/39.663/0.690 ms
lab@mxA-1> ping 10.11.11.100 size 1400 rapid count 1000000 logical-system Host
PING 10.11.11.100 (10.11.11.100): 1400 data bytes
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Step 3.17
Return to the original terminal session established with your assigned MX Series
device.
From the original terminal session, issue the show snmp statistics | find
output command.
Step 3.18
Return to the second terminal session established with your assigned MX Series
device.
From the second terminal session, terminate the output by issuing the Ctrl + c key
combination.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!^C
--- 10.11.11.100 ping statistics ---
357077 packets transmitted, 357077 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.799/0.911/39.663/0.690 ms
lab@mxA-1>
Return to the original terminal session established with your assigned MX Series
device.
From the original terminal session, issue the show snmp rmon alarms
command.
lab@mxA-1> show snmp rmon alarms
Alarm
Index Variable description Value State
1 monitor
ifHCOut1SecRate.642 0 falling threshold
Step 4.1
Enter configuration mode and navigate to the [edit services
flow-monitoring version-ipfix] hierarchy level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit services flow-monitoring version-ipfix
[edit chassis]
lab@mxA-1# set tfeb slot 0 sampling-instance my-inline-jflow-i
[edit chassis]
lab@mxA-1#
Step 4.6
Navigate to the [edit firewall family inet filter
inline-jflow-filter] hierarchy level. Configure a firewall filter term that
samples traffic that is going to the SNMP server (10.11.11.100).
[edit chassis]
lab@mxA-1# top edit firewall family inet filter inline-jflow-filter
lab@mxA-1>
Step 4.8
Return to the second terminal session established with your assigned MX Series
device.
From the second terminal session, open an FTP session with the SNMP server from
the Host device by issuing the ftp 10.11.11.100 logical-system Host
command. Login using the username lab and password lab123.
In this lab part, you configure and monitor inline port mirroring.
Note
Remember that to simulate the SNMP
server, JFlow Collector/Analyzer, and Host
devices, your physical MX Series device in
the lab has been divided into three logical
systems, plus the main routing system. To
perform an operation for a logical system
you must use the logical-system
option followed by the logical system’s
name. For example, if you want to ping the
SNMP server from the Host logical system,
you can issue the ping 10.11.11.100
logical-system Host command.
Step 5.1
Enter configuration mode and navigate to the [edit forwarding-options
port-mirroring instance] hierarchy level.
lab@mxA-1> configure
Entering configuration mode
[edit]
lab@mxA-1# edit forwarding-options port-mirroring instance
[edit chassis]
lab@mxA-1# set fpc 1 port-mirror-instance parent-1
[edit chassis]
lab@mxA-1#
Step 5.5
Navigate to the [edit firewall family inet filter
inline-port-mirror] hierarchy level. Configure a firewall filter term that port
mirrors traffic that is going to the SNMP server (10.11.11.100) to the child-1 port
mirroring instance.
[edit chassis]
lab@mxA-1# top edit firewall family inet filter inline-port-mirror
Step 5.8
Log in to your device with the username lab using a password of lab123. Note
that both the name and password are case-sensitive.
mxA-1 (ttyu0)
login: lab
Password:
Step 5.11
Return to the first terminal session established with your assigned MX Series device.
From the first terminal session, examine the state of the child-1 port mirroring
instance by issuing the run show forwarding-options port-mirroring
child-1 command.
[edit interfaces ge-1/0/7 unit 0]
lab@mxA-1# run show forwarding-options port-mirroring child-1
Instance Name: child-1
Instance Id: 3
Input parameters:
Rate : 1
Run-length : 0
Maximum-packet-length : 0
Output parameters:
Family State Destination Next-hop
inet down ge-1/0/9.0 10.10.10.100
Step 5.13
To find the MAC address of the interface associated with the JFlow Collector/
Analyzer (JFlow-Collector_Analyzer logical system) issue the run show
interfaces ge-1/1/9 | match hardware command.
[edit interfaces ge-1/0/7 unit 0]
lab@mxA-1# run show interfaces ge-1/1/9 | match hardware
Current address: 80:71:1f:c3:03:81, Hardware address: 80:71:1f:c3:03:81
Step 5.14
Navigate to the [edit interfaces ge-1/0/7 unit 0] hierarchy level.
Configure a static ARP entry for the JFlow Collector/Analyzer (10.10.10.100) using
the MAC address that you acquired in Step 5.13. Then, activate the configuration by
issuing the commit command.
[edit interfaces ge-1/0/7 unit 0]
lab@mxA-1# up 2 edit ge-1/0/9.0
Step 5.16
Return to the second terminal session established with your assigned MX Series
device.
From the second terminal session, examine the output in the terminal window. If you
canceled the interface monitoring output, issue the monitor traffic
interface ge-1/1/9 command again. Type the Ctrl + c key combination when
you are finished examining the output. Then, issue the exit command to close the
terminal session.
lab@mxA-1> monitor traffic interface ge-1/1/9
verbose output suppressed, use <detail> or <extensive> for full protocol decode
Address resolution is ON. Use <no-resolve> to avoid any reverse lookup delay.
Address resolution timeout is 4s.
Listening on ge-1/1/9, capture size 96 bytes
lab@mxA-1> exit
Step 5.17
Return to the third terminal session established with your assigned MX Series
device.
From the third terminal session, end the ping operation by typing the Ctrl + c key
combination. Then, issue the exit command to close the terminal session.
64 bytes from 10.11.11.100: icmp_seq=3723 ttl=63 time=0.672 ms
64 bytes from 10.11.11.100: icmp_seq=3724 ttl=63 time=0.686 ms
64 bytes from 10.11.11.100: icmp_seq=3725 ttl=63 time=3.643 ms
64 bytes from 10.11.11.100: icmp_seq=3726 ttl=63 time=0.682 ms
64 bytes from 10.11.11.100: icmp_seq=3727 ttl=63 time=5.014 ms
64 bytes from 10.11.11.100: icmp_seq=3728 ttl=63 time=2.118 ms
64 bytes from 10.11.11.100: icmp_seq=3729 ttl=63 time=3.589 ms
64 bytes from 10.11.11.100: icmp_seq=3730 ttl=63 time=0.748 ms
64 bytes from 10.11.11.100: icmp_seq=3731 ttl=63 time=4.118 ms
^C
--- 10.11.11.100 ping statistics ---
3732 packets transmitted, 3732 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.583/1.122/25.294/1.902 ms
lab@mxA-1> exit
Step 5.18
Return to the original terminal session established with your assigned MX Series
device.
From the original terminal session, navigate to the [edit] hierarchy level and issue
the load override jtnoc/reset.config command to load the reset
configuration file. Activate the configuration change and return to operational mode
by using the commit and-quit command.
[edit interfaces ge-1/0/9 unit 0]
lab@mxA-1# top
[edit]
lab@mxA-1# load override jtnoc/reset.config
load complete
lab@mxA-1>
Step 5.19
Log out of your assigned MX Series device.
lab@mxA-1> exit
mxA-1 (ttyu0)
login:
STOP Tell your instructor that you have completed this lab.