AJER-12.a Student Guide Volume 1
AJER-12.a Student Guide Volume 1
AJER-12.a Student Guide Volume 1
»¿´·¿à±¬®¿·²ò½±³ò¶±
Advanced Junos Enterprise Routing
12.a
Student Guide
Volume
»¿´·¿à±¬®¿·²ò½±³ò¶±
This document is produced by Juniper Networks, Inc.
This document or any part thereof may not be reproduced or transmitted in any form under penalty of law, without the prior written permission of Juniper Networks
Education Services.
Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an
agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software, may contain prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Contents
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Contents iii
»¿´·¿à±¬®¿·²ò½±³ò¶±
iv Contents www.juniper.net
Course Overview
This three-day course is designed to provide students with the tools required for implementing, monitoring, and
troubleshooting Layer 3 components in an enterprise network. Detailed coverage of OSPF, BGP, class of service (CoS), and
multicast is strongly emphasized.
Through demonstrations and hands-on labs, students will gain experience configuring and monitoring the Junos operating
system and monitoring device and protocol operations. This course is based on Junos OS Release 12.1X46-D20.5.
Objectives
After successfully completing this course, you should be able to:
Describe the various OSPF link-state advertisement (LSA) types.
Explain the flooding of LSAs in an OSPF network.
Describe the shortest-path-first (SPF) algorithm.
Describe OSPF area types and operations.
Configure various OSPF area types.
Summarize and restrict routes.
Identify scenarios that require routing policy or specific configuration options.
Use routing policy and specific configuration options to implement solutions for various scenarios.
Describe basic BGP operation and common BGP attributes.
Explain the route selection process for BGP.
Describe how to alter the route selection process.
Configure some advanced options for BGP peers.
Describe various BGP attributes in detail and explain the operation of those attributes.
Manipulate BGP attributes using routing policy.
Describe common routing policies used in the enterprise environment.
Explain how attribute modifications affect routing decisions.
Implement a routing policy for inbound and outbound traffic using BGP.
Identify environments that may require a modified CoS implementation.
Describe the various CoS components and their respective functions.
Explain the CoS processing along with CoS defaults on SRX Series Services Gateways.
Describe situations when some CoS features are used in the enterprise.
Implement some CoS features in an enterprise environment.
Describe IP multicast traffic flow.
Identify the components of IP multicast.
Explain how IP multicast addressing works.
Describe the need for reverse path forwarding (RPF) in multicast.
Explain the role of Internet Group Management Protocol (IGMP) and describe the available IGMP versions.
Configure and monitor IGMP.
Identify common multicast routing protocols.
Describe rendezvous point (RP) discovery options.
Configure and monitor Physical Interface Module (PIM) sparse modes.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Configure and monitor RP discovery mechanisms.
»¿´·¿à±¬®¿·²ò½±³ò¶±
vi Course Overview www.juniper.net
Course Agenda
Day 1
Chapter 1: Course Introduction
Chapter 2: OSPF
Lab 1: Configuring and Monitoring OSPF
Chapter 3: OSPF Areas
Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization
Chapter 4: OSPF Case Studies and Solutions
Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Options
Day 2
Chapter 5: BGP
Lab 4: Implementing BGP
Chapter 6: BGP Attributes and Policy
Lab 5: BGP Attributes
Chapter 7: Enterprise Routing Policies
Lab 6: Implementing Enterprise Routing Policies
Day 3
Chapter 8: Introduction to Multicast
Chapter 9: Multicast Routing Protocols and SSM
Lab 7: Implementing PIM-SM
Lab 8: Implementing SSM
Chapter 10: Class of Service
Lab 9: Implementing CoS Features in the Enterprise
Appendix A: BGP Route Reflection
Lab 10: BGP Route Reflection (Optional)
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Agenda vii
Document Conventions
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config.ini in the Filename field.
CLI Undefined Text where the variables value is Type set policy policy-name.
the users discretion or text where
ping 10.0.x.y
the variables value as shown in
GUI Undefined the lab guide might differ from the Select File > Save, and type
value the user must input filename in the Filename field.
according to the lab topology.
»¿´·¿à±¬®¿·²ò½±³ò¶±
viii Document Conventions www.juniper.net
Additional Information
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Additional Information ix
»¿´·¿à±¬®¿·²ò½±³ò¶±
x Additional Information www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Advanced Junos Enterprise Routing
We Will Discuss:
Objectives and course content information;
Additional Juniper Networks, Inc. courses; and
The Juniper Networks Certification Program.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 12 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
Introductions
The slide asks several questions for you to answer during class introductions.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 13
Advanced Junos Enterprise Routing
Course Contents
The slide lists the topics we discuss in this course.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 14 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
Prerequisites
The slide lists the prerequisites for this course.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 15
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 16 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 17
Advanced Junos Enterprise Routing
Additional Resources
The slide provides links to additional resources available to assist you in the installation, configuration, and operation of
Juniper Networks products.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 18 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
Satisfaction Feedback
Juniper Networks uses an electronic survey system to collect and analyze your comments and feedback. Depending on the
class you are taking, please complete the survey at the end of the class, or be sure to look for an e-mail about two weeks
from class completion that directs you to complete an online survey form. (Be sure to provide us with your current e-mail
address.)
Submitting your feedback entitles you to a certificate of class completion. We thank you in advance for taking the time to
help us improve our educational offerings.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 19
Advanced Junos Enterprise Routing
Courses
You can access the latest Education Services offerings covering a wide range of platforms at
http://www.juniper.net/training/technical_education/.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 110 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 111
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 112 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 113
Advanced Junos Enterprise Routing
Junos Genius
The Junos Genius application takes certification exam preparation to a new level. With Junos Genius you can practice for
your exam with flashcards, simulate a live exam in a timed challenge, and even build a virtual network with device
achievements earned by challenging Juniper instructors. Download the app now and Unlock your Genius today!
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 114 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
Find Us Online
The slide lists some online resources to learn and share information about Juniper Networks.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Course Introduction Chapter 115
Advanced Junos Enterprise Routing
Any Questions?
If you have any questions or concerns about the class you are attending, we suggest that you voice them now so that your
instructor can best address your needs during class.
This chapter contains no review questions.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 116 Course Introduction www.juniper.net
Advanced Junos Enterprise Routing
Chapter 2: OSPF
»¿´·¿à±¬®¿·²ò½±³ò¶±
Advanced Junos Enterprise Routing
We Will Discuss:
OSPF link-state advertisements (LSAs);
How LSAs are flooded throughout the network;
The shortest path first (SPF) algorithm;
OSPF link metrics;
OSPF authentication methods; and
The differences between OSPFv2 and OSPFv3.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 22 OSPF www.juniper.net
Advanced Junos Enterprise Routing
OSPFv2 Review
The slide lists the topics we will discuss. We discuss the highlighted topic first.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 23
Advanced Junos Enterprise Routing
Link-State Protocol
OSPF is an interior gateway protocol (IGP) based on the concept of a link-state database (LSDB). As such, each
OSPF-speaking router in the network attempts to form an adjacency with each neighboring OSPF router. When these
adjacencies are in place, each router generates and floods LSAs into the network in a reliable manner. The LSAs are placed
into the LSDB on each router where the SPF algorithm is calculated to find the best path to each end node in the network.
Hierarchical Design
OSPF gains scalability as a protocol through the use of a hierarchical design. Portions of the network are designated as
separate areas. These remote areas are then connected through a common area called the backbone.
Continued on the next page.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 24 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Designated Router Election
On a broadcast segment, OSPF routers elect a single node to represent the segment to the network. This node is called the
designated router (DR). It forms an OSPF adjacency with all routers on the segment and floods a network LSA into the
appropriate area. The criteria for electing the DR is the highest configured priority on the segment, which is set to 128 by
default. The second criteria for electing a DR is the highest router ID on the segment.
The election of a DR on a broadcast segment is a nondeterministic event. Thus, the router with the best criteria might not
always be the DR for the segment. An operational DR maintains its status on the segment until it stops operating.
The first OSPF router on a link determines itself as the DR if it does not detect a Hello from another router.
Currently, a lot of Ethernet segments are used as point-to-point, full-duplex links. This eliminates the need for a DR election.
Use the interface-type p2p command on both sides of the link to change the default interface type. Using this option
can save up to forty seconds of wait time to get the OSPF adjacency to a full state.
[edit protocols ospf]
user@router# show
area 0.0.0.0 {
interface ge-0/0/0.0 {
interface-type p2p;
}
}
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 25
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 26 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Packet Types
Every OSPF router uses a specific set of packets to perform its functions. The packet types include the following:
Hello: Sent by each router to form and maintain adjacencies with its neighbors.
Database description: Used by the router during the adjacency formation process. It contains the header
information for the contents of the LSDB on the router.
Link-state request: Used by the router to request an updated copy of a neighbors LSA.
Link-state update: Used by the router to advertise LSAs into the network.
Link-state acknowledgment: Used by the router to ensure the reliable flooding of LSAs throughout the network.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 27
Advanced Junos Enterprise Routing
.
Hierarchical Design
The slide graphically displays the hierarchical nature of OSPF. A backbone area (0.0.0.0) is the connecting point for all other
areas. By specification, each area must attach to the backbone in at least one location.
Areas 1, 2, and 3 each contain routers internal to that area as well as a single area border router (ABR). The ABR generates
summary LSAs that represent the routes within its area and floods those to the backbone. The ABR is also responsible for
generating summary LSAs that represent the backbone routes and injecting these LSAs into its attached area.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 28 OSPF www.juniper.net
Advanced Junos Enterprise Routing
OSPF Routers
OSPF routers can take on a number of different roles within an OSPF domain. The following list shows the common types of
OSPF routers along with a brief description:
Area border router (ABR): An OSPF router with links in two areas, the ABR is responsible for connecting OSPF
areas to the backbone. It transmits network information between the backbone and other areas.
Autonomous system boundary router (ASBR): An OSPF router that injects routing information from outside the
OSPF autonomous system (AS), an ASBR is typically located in the backbone. However, the OSPF specification
allows an ASBR to be in other areas as well.
Backbone router: Defined as any OSPF router with a link to Area 0 (the backbone), this router can be completely
internal to Area 0 or an ABR depending on whether it has links to other, nonbackbone areas.
Internal router: An internal router is an OSPF router with all its links within an area. If that router is located
within the backbone area (Area 0.0.0.0), it is also known as a backbone router.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 29
Advanced Junos Enterprise Routing
OSPF Interfaces
All logical interfaces associated with the area should be listed under the area. Remember the loopback interface, if it should
be advertised.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 210 OSPF www.juniper.net
Advanced Junos Enterprise Routing
What If...?
In the slide, interface lo0.0 has four addresses configured on it. Typically, you would put interface lo0.0 into OSPF using the
set area <area-id> interface <interface-name> command. However, doing this will create four LSAs: one
for each of the configured addresses on interface lo0.0. You might come across a situation such as this for which you do not
want to advertise all of the addresses into OSPF. A solution to this problem is offered on the next page.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 211
Advanced Junos Enterprise Routing
Then...
The slide shows a solution to our problem. By specifying the specific interface address to advertise, only one LSA is created
in the LSDB.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 212 OSPF www.juniper.net
Advanced Junos Enterprise Routing
OSPF Interfaces
All logical interfaces associated with the particular area should be listed under that area. Remember the loopback interface,
if it should be advertised.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 213
Advanced Junos Enterprise Routing
Link-State Advertisements
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 214 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 215
Advanced Junos Enterprise Routing
LSA Types
The following list provides the details of the LSA types:
Router LSA: Sent by each router to describe its individual links and their status.
Network LSA: Sent by the DR on the broadcast network.
Summary LSA: Sent by an ABR to describe routes or other information from one area into another.
AS external LSA: Sent by an ASBR to describe routes external to the OSPF domain.
Group membership LSA: Used to support Multicast Open Shortest Path First (MOSPF).
NSSA LSA: Sent by an ASBR in a not-so-stubby area (NSSA) to describe routes external to the OSPF domain.
External attributes LSA: Used to tunnel attributes used by other routing protocols through OSPF.
Opaque LSAs: Used to transmit information not currently supported by other LSA types. Examples include
graceful restart and traffic engineering information.
Continued on the next page.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 216 OSPF www.juniper.net
Advanced Junos Enterprise Routing
LSA Functions
Each of the LSA types listed previously has a specific function within the OSPF domain. They each describe a portion of the
topology used by the SPF algorithm to supply routing information to a routing table. We discuss each LSA in more detail on
future slides.
Each LSA has a maximum age of 3600 seconds (1 hour) associated with it. This maximum provides a mechanism for
removing stale information from the database. To ensure that its LSAs are up to date, each OSPF router periodically
refreshes them prior to reaching the maximum age limit. The Junos operating system performs this refresh every 3000
seconds (50 minutes).
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 217
Advanced Junos Enterprise Routing
LSA Header
The following list details the information contained in the LSA header:
Link-state age (2 bytes): Measured in seconds, the LS age is the time from when the LSA was first originated.
Each router increments this field prior to reflooding the LSA.
Options (1 byte): Indicates support for OSPF options. Within the context of an individual LSA, the E bit (position
7) is set in all external LSAs and the P bit (position 5) is set in all NSSA external LSAs.
Link-state type (1 byte): Encodes the specific LSA type.
Link-state ID (4 bytes): Describes various portions of the OSPF domain. Each LSA type uses this field in a
different manner.
Advertising router (4 bytes): The router ID of the router that first originated the LSA.
Link-state sequence number (4 bytes): Verifies that each router has the most recent version of an LSA. This field
is incremented each time a new version is generated. Values range from 0x80000000 to 0x7FFFFFFF.
Link-state checksum (2 bytes): The checksum of the entire LSA contents, minus the LS age field. This field is
used to ensure data integrity in the LSDB.
Length (2 bytes): The entire length of the individual LSA, including the header.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 218 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Router LSA
Each OSPF-speaking router generates a Type 1 LSA to describe the status and cost (metric) of all interfaces on the router.
This LSA is flooded to each router in the OSPF area. It is defined as having an area scope; therefore, it is not flooded across
an area boundary. In addition to the standard LSA header, the router LSA also contains the following fields:
V, E, and B bits (1 byte): Following five bits set to a value of 0, the V, E, and B bits represent the characteristics
of the originating router. The V bit is set when a virtual link is established. An ASBR sets the E bit. An ABR sets
the B bit.
Number of links (2 bytes): This value gives the total number of links represented by the following set of fields.
Link ID (4 bytes): This field represents to what the far side of the link is connected. It is used in conjunction with
the link type field.
Link data (4 bytes): This field represents to what the near side of the link is connected. It is used in conjunction
with the link type field.
Link type (1 byte): This field describes the type of link.
Number of Multi Topology IDs (MT-IDs) (1 byte)
Metric (2 bytes): This field provides the cost to transmit data out of the interface.
MT-ID (1 byte): Renamed TOS field to represent the multi topology ID.
MT-ID metric (2 bytes): Renamed TOS metric field to represent the Multi Topology (MT) metric.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Additional data (4 bytes):
bytes): This field is unused.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 220 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 221
Advanced Junos Enterprise Routing
Router LSA Example (contd.)
This router LSA was originated by the same router from which the capture was taken. Notice the asterisk (*)
next to the link-state ID value of 192.168.16.1. Also note that the last line of the capture states that this LSA
is Ours.
The router LSA was installed 23 minutes and 21 seconds ago. If not refreshed, the LSA will expire in 36 minutes
and 39 seconds when its 3600 second maximum age is exceeded, and the LSA was last flooded 23 minutes
and 19 seconds ago. These details are shown in the Installed, expires, and sent fields, and they are
present for every LSA in the show ospf database extensive output.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 222 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 223
Advanced Junos Enterprise Routing
Network LSA
Each OSPF router elected to be the DR on a broadcast link generates a Type 2 LSA. This LSA lists each router connected to
the broadcast link, including the DR itself. In addition to the standard LSA header, the network LSA also contains the
following fields:
Network mask (4 bytes): This field denotes the IP subnet mask for the interface connected to the broadcast
network.
Attached router (4 bytes): This field is repeated for each router connected to the broadcast network. The value
of each instance is the router ID of the attached routers. You can deduce the total number of routers listed by
the length of the LSA.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 224 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 225
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 226 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Summary LSA
Each ABR that transmits information from one OSPF area into another generates a Type 3 LSA to describe that information.
This LSA is flooded to each router in the OSPF area. This LSA has an area scope; therefore, it is not reflooded across the area
boundary by another ABR. Instead, the receiving ABR generates a new Type 3 LSA describing the link and floods it into the
adjacent area.
In addition to the standard LSA header, the summary LSA also contains the following fields:
Network mask (4 bytes): This field represents the subnet mask associated with the network advertised. It is
used in conjunction with the link-state ID field, which encapsulates the network address in a Type 3 LSA.
Metric (3 bytes): This field provides the cost of the route to the network destination. When the summary LSA is
representing an aggregated route (using the area-range command), this field is set to the largest current
metric of the contributing routes.
MT-ID (1 byte): This field represents the MT-ID value used in a Multi Topology configuration.
MT-ID metric (3 bytes): This field represents the MT-ID metric used in a Multi Topology configuration.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 227
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 229
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 230 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 231
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 232 OSPF www.juniper.net
Advanced Junos Enterprise Routing
AS External LSA
Each ASBR generates a Type 5 LSA to advertise any networks external to the OSPF domain. This LSA is flooded to each
nonstub router in the entire OSPF domain. In addition to the standard LSA header, the AS external LSA also contains the
following fields:
Network mask (4 bytes): This field represents the subnet mask associated with the network advertised. It is
used in conjunction with the link-state ID field, which encapsulates the network address in a Type 5 LSA.
E bit (1 byte): The E bit determines the type of external metric represented by the metric field. It is followed by 7
bits, all set to 0 to make up the entire byte. A value of 0, the default value, indicates that this is a Type 2 external
metric. Thus, any local router should use the encoded metric as the total cost for the route when performing an
SPF calculation. A value of 1 indicates that this is a Type 1 external metric. Therefore, the encoded metric of the
route should be added to the cost to reach the advertising ASBR. This additive value then represents the total
cost for the route.
Metric (3 bytes): This field represents the cost of the network as set by the ASBR.
Forwarding address (4 bytes): This field provides the address toward which packets should be sent to reach the
network. A value of 0.0.0.0 represents the ASBR itself.
External route tag (4 bytes): This 32-bit value field can be assigned to the external route. OSPF does not use this
value, but it might be interpreted by other protocols.
MT-ID and MT-ID metric fields (4 bytes): These fields represent the MT-ID and MT-ID metric values used in a
Multi Topology configuration.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 233
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 234 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 235
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 236 OSPF www.juniper.net
Advanced Junos Enterprise Routing
NSSA External LSA Translation
When an ASBR is also an ABR with an NSSA area attached to it, a Type 7 LSA is exported into the NSSA area by default. If the
ABR is attached to multiple NSSAs, a separate Type 7 LSA is exported into each NSSA by default. Use the no-nssa-abr
command to disable the export.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 237
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 238 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 239
Advanced Junos Enterprise Routing
Future Extensibility
RFC 2370 defines the OSPF opaque LSA. It was designed to extend the protocol to support future enhancements without
generating new LSA types. As of this writing, production networks use both the Type 9 and Type 10 opaque LSAs. The Type 9
LSA supports graceful restart. The Type 10 LSA supports MPLS traffic engineering. The Type 11 opaque LSA is not used at
this time.
Flooding Scope
The main difference between the opaque LSAs is in the flooding scope of each type: The Type 9 LSA has a link-local scope,
the Type 10 LSA has an area scope, and the Type 11 LSA has domain scope.
Protocol Operations
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 241
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 242 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 244 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Dijkstra Algorithm
After a router receives a new LSA and places it into the LSDB, the router runs the SPF algorithm. This computation uses the
database as a data source and results in a loop-free network topology using the best metric from the local router to all nodes
in the network.
During the course of this calculation, the algorithm uses three databasesthe LSDB, the candidate database, and the tree
database. As we have explored, the LSDB is the total compilation of routing knowledge in the network. Conceptually, it
consists of multiple tuples in the form of: router ID, neighbor ID, cost. These tuples describe each link in the network.
The first step is as follows:
1. Evaluate each tuple in the candidate database and delete any tuples whose neighbor ID is currently in the tree
database and whose cost to the root is greater than the entry currently in the tree database. Repeat this step
until no more tuples can be deleted.
As the algorithm operates, the local router moves its own local tuple into the tree database and all tuples for its links into the
candidate database. It then performs the following steps until the candidate database is empty:
2. For each new entry in the candidate database, determine the cost from the root to each neighbor ID. Move the
tuple with the lowest cost from the candidate database into the tree database. If multiple tuples exist with an
equal cost, choose one randomly.
3. If a new neighbor ID appears in the tree database, move all tuples in the LSDB with a router ID equal to the new
tree entrys neighbor ID into the candidate database.
Continued on the next page.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 246 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 247
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 248 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 249
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 250 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 251
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 252 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 253
Advanced Junos Enterprise Routing
Cost of an Interface
Prior to advertising a network into the OSPF domain, each router must determine the cost associated with that network.
Often referred to as the metric, the cost is simply what the router views as the overhead associated with transmitting a
packet on that interface. Because each OSPF-speaking router advertises these cost values in its router LSAs, each router
can determine the total cost (or metric) to reach any destination in the network.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 254 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Reference Bandwidth
To alter the calculation values, use the reference-bandwidth command within the [edit protocols ospf]
configuration hierarchy. The value entered has a value in bits per second. You can use the standard Junos shortcut notations
of k (kilobits per second), m (megabits), and g (gigabits). The entered value becomes the new numerator value in the
bandwidth calculation. As noted on the slide, you still can assign a metric statically to an individual interface.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 255
Advanced Junos Enterprise Routing
SPF Calculations
After receiving a new LSA from another router in the area, the local router performs an SPF calculation using all the values
contained in the router and network LSAs. As mentioned on a previous slide, the cost is calculated from the root node to
every other node in the network using the metric cost of the outgoing interfaces.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 256 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Overload Settings
You can turn on the overload setting, turn it off as a permanent value, or have a timer associated with it. If the timer is
omitted, the metric values are changed when you commit the configuration. The values will remain until you remove the
overload setting from the configuration and commit it again. However, if you assign a timer value, the metrics are not
changed automatically. The timer associated with the overload setting only initializes when the routing protocol process
initializes. This timer can run from 601800 seconds. When the timer expires, the metrics return to normal in the router
LSAs, but the configuration still contains the overload option.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 257
Advanced Junos Enterprise Routing
Case Study
Enterprise networks are typically built with multiple paths from ingress and egress points for redundancy. During
maintenance operations on a router, it can be beneficial to prevent the router from receiving and forwarding transit traffic.
The overload feature provides this function.
In the graphic on the slide, R2 is scheduled for maintenance. An alternate path exists through R3. Once R2 is put in overload
mode the other routers will be notified and transit traffic will traverse R3. Any traffic destined for networks that terminate on
R2 will still be forwarded to R2.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 258 OSPF www.juniper.net
Advanced Junos Enterprise Routing
OSPF Router ID
Each OSPF-speaking router in a network must select a 32-bit value to use as the router ID (RID) of the router. This RID
uniquely identifies the router within the OSPF domain. It is transmitted within the LSAs used to populate the LSDB and is
used to calculate the shortest-path tree using the method described on a previous slide.
It is very important in a link-state network that no two routers share the same RID value. If two routers share the same RID
value, the LSDB might not be consistent on all routers. This inconsistency happens because the RID is one method to verify
whether an LSA is already present in the database. Therefore, new critical information from one of the routers is never
present in all the routers. In addition, because the Dijkstra calculation uses the RID, it is possible that an individual router
might not generate a loop-free shortest path topology. This scenario could have a disastrous affect on IP routing.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 260 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 261
Advanced Junos Enterprise Routing
OSPF Authentication
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 262 OSPF www.juniper.net
Advanced Junos Enterprise Routing
Authentication
The three different forms of authentication that the Junos OS supports are none, simple, and MD5. As of Junos Release 8.3,
IP Security (IPsec) was added.
Authentication Default
The default operation of the OSPF process is the none mode. Thus, no authentication key is configured on any interface.
Plain-Text Passwords
With simple authentication type configured, each OSPF packet includes a plain-text password. This password can be
captured easily through a packet analysis system. Therefore, although this password protects against an inadvertent
configuration, it does not provide any security.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 263
Advanced Junos Enterprise Routing
Encrypted Checksum
To provide better security in an OSPF network, we recommend that you use an authentication type of MD5. MD5 includes an
encrypted checksum in all OSPF packets instead of a simple-text password. Each OSPF-speaking router uses the same MD5
algorithm to calculate the checksum value, so interoperability and a correct result can be virtually guaranteed.
Authentication Keys
The actual password to verify and authenticate packets is contained within the authentication command. You can configure
each individual interface with an authentication value.
Key ID Values
You configure each individual interface with a key value. All interfaces in the area might share the same key value, or each
interface might contain a separate value.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 264 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 265
Advanced Junos Enterprise Routing
Authentication Mismatch
OSPF routers must agree on the authentication method to be neighbors. Use the traceoptions functionality if you
suspect there might be an authentication mismatch.
The log shows that the local router is ignoring an OSPF packet from 172.20.77.1 because of an authentication mismatch.
No authentication method is configured on the local router, so the type is none. The remote router has MD5 authentication
configured.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 267
Advanced Junos Enterprise Routing
OSPFv3
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 268 OSPF www.juniper.net
Advanced Junos Enterprise Routing
OSPFv3
OSPFv3 is defined in RFC 5340, with some additional features, such as grateful restart and authentication, defined in
separate documents (RFC 5781OSPFv3 Graceful Restart and RFC 4552 Authentication/Confidentiality for OSPFv3).
OSPFv3 maintains the fundamental mechanisms of OSPF, including LSA flooding scopes, areas, DR election, stub areas,
NSSAs, and so on. Though OSPFv3 is often associated with IPv6 addressing, it is also completely compatible with IP version
4 (IPv4) addressing schemes. However, some changes are necessary to account for the differences in IPv4 versus IP version
6 (IPv6) addressing. We address these differences on the following slides.
In terms of the Junos OS configuration, all that is required is to substitute ospf3 for ospf in the configuration.
[edit]
user@router# show protocols ospf?
Possible completions:
> ospf OSPF configuration
> ospf3 OSPFv3 configuration
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 269
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 270 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 271
Advanced Junos Enterprise Routing
Differences Between OSPFv2 and OSPFv3: Part 2 (contd.)
This list is a continuation of the further differences between OSPFv2 and OSPFv3:
The options field was expanded from 8 bits to 24 bits: The option field is included in OSPF hello packets,
database description packets, and certain LSAs (router LSAs, network LSAs, inter-area-router LSAs, and link
LSAs). Previously defined option bits are present, as well as added support for the V6-bit and R bits. The V6-bit
is used to indicate whether the route or link should be excluded from IPv6 routing calculations. The R bit is used
like the IS-IS overload bit and indicates whether the originator is an active router. If the R bit is clear (that is, 0)
in the OSPF options field, the advertising router can participate in OSPF without being used for transit traffic.
This would be a useful setting for hosts that are multihomed but never used to forward traffic between
interfaces.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 272 OSPF www.juniper.net
Advanced Junos Enterprise Routing
S2 S1 Flooding scope
0 0 Link-local scope.
0 1 Area scope.
1 0 AS scope.
1 1 Reserved.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 274 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 275
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 276 OSPF www.juniper.net
Advanced Junos Enterprise Routing
We Discussed:
OSPF LSAs;
How LSAs are flooded throughout the network;
The SPF algorithm;
OSPF link metrics;
OSPF authentication methods; and
The differences between OSPFv2 and OSPFv3.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 277
Advanced Junos Enterprise Routing
Review Questions
1.
2.
3.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 278 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Chapter 279
Advanced Junos Enterprise Routing
Answers to Review Questions
1.
LSA Type 9 supports graceful restart.
2.
The metric or cost of a routers links can be automatically altered with the reference-bandwidth command.
3.
The different forms of OSPF authentication include none, simple, and MD5.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 280 OSPF www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Advanced Junos Enterprise Routing
We Will Discuss:
OSPF area types and operations;
How to configure various OSPF area types; and
How to summarize and restrict routes.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 32 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 33
Advanced Junos Enterprise Routing
OSPF Scalability
With a link-state protocol, flooding link-state update packets and running the shortest-path-first (SPF) algorithm consumes
router resources. As the size of the network grows and more routers are added to the autonomous system (AS), this use of
resources becomes a bigger and bigger issue. This issue stems from the RFC requirement that all OSPF routers share an
identical link-state database (LSDB). Eventually, the routers spend so much time flooding and running the SPF algorithm that
they cannot route data packets. Clearly, this scenario is not optimal.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 34 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
OSPF Areas
Using OSPF, you can segment an AS into smaller groups known as areas. Using areas achieves the OSPF hierarchy that can
facilitate growth and scalability. You can constrain LSA flooding by using multiple areas, which can effectively reduce the size
of the LSDB on an individual OSPF router. Each OSPF router maintains a separate and identical LSDB for each area to which
it is connected.
To ensure correct routing knowledge and connectivity, OSPF maintains a special area known as the backbone area. The
backbone area is designated as Area 0.0.0.0 (or simply Area 0). All other OSPF areas must connect themselves to the
backbone area. By default, all data traffic between OSPF areas transits the backbone. You can alter this default behavior
and eliminate the requirement of all interarea traffic transiting Area 0.0.0.0 by configuring a multiarea adjacency on the
same logical interface. The multiarea adjacency feature is documented in RFC 5185 and is discussed in the next chapter.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 35
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 36 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
OSPF Area Types (contd.)
Stub areas are areas through which, or into which, AS external advertisements are not flooded (LSA Type 4 and Type 5). You
might want to create stub areas when much of the topological database consists of AS external advertisements. Doing so
reduces the size of the topological databases and, therefore, the amount of memory required on the internal routers in the
stub area.
When you configure an area border router (ABR) for stub area operation, a default route is normally advertised in the place of
the external routes that are blocked from stub areas. The default route provides routers in the stub area with reachability to
external destinations. In the Junos operating system, ABRs require explicit configuration for default route generation.
Note that you cannot create a virtual link through a stub area, and a stub area cannot contain an AS boundary router.
A totally stubby area is a stub area that receives only the default route from the backbone. ABRs do not flood LSA Type 3,
Type 4, or Type 5 into totally stubby areas.
An OSPF stub area has no external routes in it, so you cannot redistribute routes from another protocol into a stub area. A
not-so-stubby area (NSSA) allows external routes to be flooded within the area. These routes are then leaked into other
areas. However, external routes from other areas still do not enter the NSSA. (ABR does not flood LSA Type 4 and Type 5 into
an attached NSSA.)
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 37
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 38 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 310 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 311
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 312 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 313
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 314 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 315
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 316 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
NSSA Operation
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 317
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 319
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 320 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 321
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 322 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
NSSA Configuration
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 323
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 324 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
Route Summarization
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 326 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
Route Summarization
To reduce the size of the LSDB in Area 0.0.0.0 (and other remote OSPF areas), you can configure the ABR not to perform its
default one-for-one mapping function. This is accomplished using an address range statement on the ABR with the
area-range command. All Type 1 and Type 2 LSAs that fall within that address range will no longer be advertised
individually into the backbone. Instead, a single Type 3 summary LSA is advertised. The metric associated with this summary
route will be equal to the highest metric associated with the individual contributing routes.
Because only the ABR performs this mapping function, you configure the area-range command on ABR routers only.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 327
Advanced Junos Enterprise Routing
Route Summarization
To reduce the size of the LSDB in Area 0.0.0.0 (and other remote OSPF areas), you can configure the ABR not to perform its
default one-for-one mapping function. You can configure an address range on the ABR by using the area-range
command within the NSSA configuration hierarchy. All Type 7 LSAs that fall within that address range are not advertised
individually into the backbone. Instead, a single Type 5 external LSA is advertised.
Because only the ABR performs this mapping function, only the ABR is configured with the area-range command.
Note that the area-range command referenced here is specific to the NSSA configuration hierarchy and only affects Type
7 LSA routes. The area-range command discussed in the previous slide was within the area hierarchy itself and affected
Type 1 and Type 2 LSA routes. The configuration can have these two commands in place at the same time, and they will
summarize different aspects of the local area routing domain.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 328 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
Suppressing Routes
The default action of the area-range command causes the generation of a single Type 3 summary LSA into the backbone
for all prefixes that fall within the defined range. You can configure the ABR with the restrict keyword to block one or
more prefixes from advertisement into the OSPF backbone. Such a configuration prevents routing information from each
Type 1 and Type 2 LSA that falls within the address range from being advertised to the backbone, which in turn can block
connectivity to those prefixes for routers in other areas.
Use the restrict function when you want to prevent interarea routing, or when you want a default route to be used
instead of the more preferred summary information that would otherwise be generated.
Because only the ABR is responsible for this mapping function, you configure only ABR routers with the area-range
restrict command.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 329
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 330 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
i
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 331
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 332 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 333
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 334 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 335
Advanced Junos Enterprise Routing
We Discussed:
OSPF area types and operations;
How to configure various OSPF area types; and
How to summarize and restrict routes.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 336 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
Review Questions
1.
2.
3.
4.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 337
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 338 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
Answers to Review Questions
1.
The ABR does not forward Type 4 and Type 5 LSAs into a stub area or NSSA. Type 3 LSAs are also not forwarded in an OSPF NSSA
with no summaries.
2.
You must configure all routers that are in the stub area or NSSA.
3.
The ABR of the stub area can optionally inject a 0.0.0.0/0 default route into the stub area or NSSA.
4.
The backbone area is directly affected by the area-range command. However, any area that is able to receive summary LSAs also
benefits from this command.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Areas Chapter 339
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 340 OSPF Areas www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Advanced Junos Enterprise Routing
We Will Discuss:
Three interior gateway protocol (IGP) transition strategies;
Transitioning between IGPs with minimal or no network disruption while maintaining network stability;
Configuring OSPF multiarea adjacencies;
OSPF external reachability; and
Configuring OSPF virtual links.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 42 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Common Elements
The IGP transition strategies contain a few common elements. Every IGP transition strategy requires that you know which IGP
provides the active routing information for the network at every point. You control this information in the Junos OS using
»¿´·¿à±¬®¿·²ò½±³ò¶±
route preferences. Additionally, most transition strategies require
two IGPs so that you can ensure that all routers
require you to export appropriate routing information between the
routers have access to full routing information.
Primary Tiebreaker
The Junos OS uses route preference as the primary criterion for selecting the active route. Preference values cause routes
from certain information sources to be ranked more preferably than the same route received from another information
source. The table on the slide shows the default preference values for a selected set of routing information sources.
Continued on the next page.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 45
Advanced Junos Enterprise Routing
Lower Is Better
Routing preference values are a 32-bit number that is 0 or higher. The router prefers lower preference values over higher
preference values. This command output demonstrates that a direct route with a preference of 0 is preferred over an OSPF
internal route with a preference of 10:
user@router> show route 10.251.254.130/31 exact
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 46 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 48 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Overlay Transition
In the overlay transition, you configure all routers in the network to run the new IGP while they are still running the old IGP.
Once you verify the proper operation of the new IGP, you configure all routers in the network to stop running the old IGP. This
transition strategy is appropriate when all routers have the necessary resources (in particular, CPU and memory) to run both
protocols simultaneously. Additionally, you must accomplish any network redesign necessary to accommodate the new IGP
as part of the transition.
Route Redistribution
If all routers cannot run both protocols simultaneously or if you must make some topology changes as part of the IGP
change, you can gradually migrate the network one portion at a time. For example, if you are migrating to OSPF, you might
migrate one future OSPF area at a time. As you progress from one portion of the network to another, you must configure
routers on the border of the two IGPs to conduct mutual route redistribution, exporting routes between the two IGPs.
Integrated
If you must significantly redesign your existing topology to make it a well-designed network with the new IGP, the integrated
strategy might be the best approach. In this strategy, you create a new network core running the new IGP, connect it to the
old network core, and export routes between the new and old IGPs. You then gradually migrate connections from the old core
to the new core.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 49
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 410 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Sample Topology
This slide shows the topology this chapter uses as an overlay example. We start off with a RIP network and then transition it
to an OSPF network.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 411
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 412 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 413
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 414 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 415
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 416 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 417
Advanced Junos Enterprise Routing
Multiarea Adjacencies
By default, a single interface can belong to only one OSPF area. However, in some situations, you might want to configure an
interface to belong to more than one area. Doing so allows the corresponding link to be considered an intra-area link in
multiple areas and to be preferred over other higher-cost intra-area paths.
Beginning with Junos Release 9.2, you can configure a logical interface to belong to more than one OSPF area. As defined in
RFC 5185, OSPF Multi-Area Adjacency, the area border routers establish multiple adjacencies belonging to different areas
over the same logical interface. Each multiarea adjacency is announced as a point-to-point unnumbered link in the
configured area by the routers connected to the link.
For a given logical interface, it is considered as primary for one single area. To configure that same logical interface in
additional areas, you must use the secondary option. In the slide, you can see that interface ge-1/0/0.0 has been
configured in two areas, Area 0 and Area 1. Because the Area 1 interface has the secondary option set, the Area 0
occurrence is considered the primary.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 418 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 419
Advanced Junos Enterprise Routing
Link Failure
In normal operation, if a link failure occurred between R1 and R3, traffic from R1 to R3 would flow from R4 to R2 and then to
R3. This creates three hops to reach a router that was previously one hop away.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 420 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 421
Advanced Junos Enterprise Routing
Adjacency Verification
Verify adjacencies with the show ospf neighbor command.
Normal Trace
For the case study, R3 is one hop away from R1.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 422 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 423
Advanced Junos Enterprise Routing
Point-to-Point Interface
The output shows that the ge-1/1/0.0 interface now appears in two distinct OSPF areas, Area 0 and Area 100. However,
note the secondary link in Area 100 shows up as a point-to-point interface.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 424 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Adjacency Is Formed
Two adjacencies are now formed over ge-1/1/0.0 for Area 0 and Area 100.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 425
Advanced Junos Enterprise Routing
External Reachability
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 426 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 427
Advanced Junos Enterprise Routing
Route Redistribution
For route distribution to occur, an export policy must be written and applied. Because external routes in OSPF have an
interarea flooding scope, the policies are applied globally. This feature allows external routes to be sent into all areas that
allow it. When an external route is brought into OSPF, it appears as an external Type 5 LSA of Type 2. If an external LSA Type
1 must be configured, you can modify it with a policy.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 428 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Mutual Redistribution
Special care must be taken when redistribution is configured in a network. When multiple redistribution points are present,
sub-optimal routing and loops could occur. Generally, if the source route has a lower preference than the protocol into which
it is being redistributed, no issues occur. However, when the source route has a higher preference, issues can occur. Several
methods exist to resolve these issues, but the easiest method usually involves modifying route preference values.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 429
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 430 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 432 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
ABR Translation
Because the route was originated from the not-so-stubby area (NSSA), the ABR must convert the Type 7 LSA to a Type 5 for
interarea advertisement.
Forwarding Address
When the ABR translates the Type 7 into a Type 5, it places the address of the autonomous system boundary router (ASBR)
into the forwarding address. This behavior provides for optimal routing because only one ABR translates the Type 7 LSAs to
Type 5 LSAs in the presence of multiple ABRs.
ASBR Summary
The ABR also creates a Type 4 LSA to represent the ASBR to other areas.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 433
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 434 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
The Result
The result of the preference change is now a default that points properly to the ABRs in the NSSA.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 435
Advanced Junos Enterprise Routing
SPF Review
After a router receives a new LSA and places it into the link-state database (LSDB), the router runs an algorithm known as
the Dijkstra algorithm (also called the shortest-path-first [SPF] algorithm). This computation uses the database as a data
source and results in a loop-free network topology using the best metric from the local router to all nodes in the network.
During the course of this calculation, the algorithm uses three databasesthe LSDB, the candidate database, and the tree
database. As we have explored, the LSDB is the total compilation of routing knowledge in the network. Conceptually, it
consists of multiple tuples in the form of (router ID, neighbor ID, cost), which describe each link in the network.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 436 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Import Policy
An import policy can be applied between the tree database and the routing table. This allows filtering of routes from the
LSDB to the routing table but it only applies to external routes, as in the case for OSPF export policy. Note that the database
stays consistent and the import policy does not block any normal LSA flooding.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 437
Advanced Junos Enterprise Routing
Flooding Protection
Some OSPF implementations encounter problems when large numbers of external routes are injected into the LSDB. The
Junos OS does not behave in this manner, however, and a large number of routes are handled without a problem. Although
this protocol stability is a nice feature, a configuration mistake could make a portion of your network unusable as only
routers capable of handling such large numbers would be operating effectively.
To help you when a configuration mistake occurs, the Junos OS allows a limit to be placed on the number of external routes
exported into OSPF. The prefix-export-limit command informs the router how many routes to accept using a routing
policy configuration. The command accepts a 32-bit value, which provides a range of routes from 1 to 4,294,967,295. Once
the route limit is reached, the router transitions into an overload state where the local links are set to a metric of 65,535 in
the router LSA. Additionally, all Type 5 LSAs from the router are purged from the database and the network in general. The
local router remains in this state until the number of external routes returns to a level below the configured limit. This
situation requires the administrator to manually change the existing configuration; either the number of advertised routes
must be reduced or the routing policy must be changed.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 438 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Modify Policy
To see prefix limits in action, a policy is modified to send all RIP routes into OSPF.
RIP Redistribution
This policy causes all RIP routes to be sent into OSPF.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 439
Advanced Junos Enterprise Routing
Prefix Limit
To stop the large amount of LSAs that could enter the router, a prefix-limit of six is configured.
The Result
The result is that no RIP routes are distributed. This prefix-limit setting ensures that a configuration error does not affect your
network.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 440 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Virtual Links
The slide highlights the topic we discuss next.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 441
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 442 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Case Study
In this case study, Alpha Corp. has acquired Bravo Corp. Both networks are running multiarea OSPF and the integration team
must get both networks communicating with each other.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 443
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 444 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 445
Advanced Junos Enterprise Routing
Connectivity Issues
As soon as the physical connection is created, limited connectivity is achieved. For example, the B4 router can now reach the
A1 router in Alpha Corps Area 0. However, Alpha Corps Area 0 routers cannot reach Bravo Corps Area 0 routers. The cause
of this limited connectivity is the lack of a contiguous Area 0 backbone.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 446 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Virtual Link
One solution to the connectivity problem is to create a virtual tunnel between the two backbone areas of the corporations.
This feature, known as a virtual link, provides a logical connection between areas. Essentially, OSPF packets are tunneled
through a transit area to establish an OSPF adjacency and logically connect the two areas together. This establishes full
connectivity between the two corporations.
Remember that a virtual link is a control plane feature only. SPF will still calculate the shortest physical path between two
points, which might not be the same path as the virtual tunnel. This calculation could create some confusion when
troubleshooting, which is one of the primary reasons virtual tunnels are not considered long term solutions.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 447
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 448 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 449
Advanced Junos Enterprise Routing
Contiguous Area 0
Once the neighbor is established over the virtual link, connectivity is restored, all LSAs are processed, and routes to each
company are installed into the routing table. As shown in the slide, router B1 can now successfully ping router A1.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 450 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
We Discussed:
Three IGP transition strategies;
Transitioning between IGPs with minimal or no network disruption while maintaining network stability;
Configuring OSPF multiarea adjacencies;
OSPF external reachability; and
Configuring OSPF virtual links.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 451
Advanced Junos Enterprise Routing
Review Questions
1.
2.
3.
4.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 452 OSPF Case Studies and Solutions www.juniper.net
Advanced Junos Enterprise Routing
Configuring and Monitoring Routing Policy and Advanced OSPF Options Lab
The slide provides the objectives for this lab.
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net OSPF Case Studies and Solutions Chapter 453
Advanced Junos Enterprise Routing
Answers to Review Questions
1.
You risk double-exporting routes, which can lead to routing loops.
2.
Although technically you do not need a backbone area, functionally you need one because of the loop prevention mechanisms in OSPF.
3.
Virtual links would be deployed if two companies were merging their networks together and physical link connectivity was not an
option. This could be because of cost or time constraints.
4.
If the source route has a lower preference, there usually are no issues. If a source route has a higher preference, suboptimal routing or
loops can occur.
»¿´·¿à±¬®¿·²ò½±³ò¶±
Chapter 454 OSPF Case Studies and Solutions www.juniper.net
Acronym List
ABR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . area border router
AF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . assured forwarding
AS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . autonomous system
ASBR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . autonomous system boundary router
ASM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . any-source multicast
BE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . best effort
BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Border Gateway Protocol
BGP4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Border Gateway Protocol version 4
CBF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .class-of-service-based forwarding
CBF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . connection-based forwarding
CIR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . committed information rate
CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .command-line interface
CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .class of service
C-RP-adv. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .candidate RP advertisement
CS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . class selector
DR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .designated router
DSCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DiffServ code point
DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Distance Vector Multicast Routing Protocol
EGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . exterior gateway protocol
GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .graphical user interface
HDLC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .High-Level Data Link Control
IANA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Internet Assigned Numbers Authority
IBGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . internal BGP
IGMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet Group Management Protocol
IGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . interior gateway protocol
IPsec. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .IP Security
IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .IP version 4
ISP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet service provider
JNCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Juniper Networks Certification Program
LSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . link-state advertisement
LSDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . link-state database
MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .media access control
MDRR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . modified deficit round-robin
MOSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Multicast Open Shortest Path First
NC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . network control
NLRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . network layer reachability information
NSSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . not-so-stubby area
OSPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Open Shortest Path First
PID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .process ID
PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protocol Independent Multicast
PPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Point-to-Point Protocol
QoS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . quality of service
RID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . router ID
RP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . rendezvous point
rpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . routing protocol daemon
RPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . reverse path forwarding
RPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . reverse-path multicasting
RR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .route reflector
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Simple Network Management Protocol
SPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .shortest-path-first
SPT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . shortest path tree
SSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .source-specific multicast
ToS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . type of service
TTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . time-to-live
»¿´·¿à±¬®¿·²ò½±³ò¶±
www.juniper.net Acronym List ACR1
»¿´·¿à±¬®¿·²ò½±³ò¶±
ACR2 Acronym List www.juniper.net