Notes Juniper EX

Summary


JunOS – OS pour toute les gammes Juniper
=>T640/M120/M10/71/EX Series

EX series switches:
type-slot/pic/port
• type—:
o ge— interface Ethernet Gigabit
o xe— interface 10 Gigabit Ethernet
• slot number/member-id— de 0 à 9 – 0 pour un switch unique, et plus pour les virtual-chassis.
• PIC—0 pour la partie de gauche, et 1 pour les Uplinks.
• port—Le port, de 0 à 47, correspond au port physique sur le switch.

Juniper EX4200
Juniper EX4200

JunOS Architecture

  • Control plane (Routing/switching tables)
  • -> CPU/memoire indépendante du forwarding place
  • Forwarding Plane (Forwarding tables)
  • -> Asics..etc.

Managing JunOS
CLI => Consoole/telnet/SSH
GUI => J-Web

Junos Swript API
Netconf
NetScrenn Security manager
CLI fundamentals
Operational mode (exec):

user@host>
benoit@switch>

Configuration mode (conf t):

user@host>configure
[edit]
user@host#
benoit@switch#

Auto-complétion: [espace]

Pipes:

show interfaces terse | last
show interfaces terse | count
show interfaces terse | match <pattern>
show interfaces terse | except
show interfaces terse | find
show interfaces terse | last |match

CONFIGURATION Fundamentals
Meilleur sense hiérarchique par rapport à l’IOS.
Configuration découpée en sections
Multiples niveaux de hierarchies
Niveaux identifiées avec les {}

hostname / password:

system {
host-name s4;
root-authentication {
encrypted-password "ertyu65432zearztgyhu7654REftg"; ##SECRET-DATA
}
}

configuration avec 2 commandes set.

Top-level configuration Elements:

  • system – paramètres généraux (hostname, authentification, méthodes d’acces, logging..)
  • interfaces
  • protocols – L2/L3 protocols
  • policy-options – règles de routage
  • firewall – filtrage de paquet stateless
  • snmp
  • class-of-service
  • poe
  • virtual-chassis
  • vlans
  • ethernet-switching-options

Candidate configuration
IOS : running-config
JunOS : running-config + candidate config

Candidate vs. Active:

Candidate = copy de la configuration active + edits + edits ..etc.
Après un commit, elle passe en Active/running.
JunOS garde en mémoire les 50 dernière versions commitées.
On peut charger une des 50 versions en “candidate”

configure => plusieurs utilisateurs peuvent modifier en meme temps
configure exclusive => on est le seul à effectuer des modifs
configure private => chacun sa configuration privée, pour ne pas créer de conflits, sinon le CLI l’informe pendant le commit

Making changes:

root@s4>configure
[edit]
root@s4#edit interfaces ge-0/0/9

[edit interfaces ge-0/0/9]
root@s4#edit unit 0

[edit interfaces ge-0/0/9 uni 0]
root@s4#set family inet address 172.20.1.1/24

[edit interfaces ge-0/0/9 uni 0]
root@s4#show
family inet {
address 172.20.1.1/24;
}

[edit interfaces ge-0/0/9 uni 0]
root@s4#delete family inet address 172.20.1.1/24

[edit interfaces ge-0/0/9 uni 0]
root@s4#show
family inet;

[edit interfaces ge-0/0/9 uni 0]
root@s4# delete family inet

[edit interfaces ge-0/0/9 uni 0]
root@s4# show

[edit interfaces ge-0/0/9 uni 0]
root@s4# up

[edit interfaces ge-0/0/9]
root@s4# top

[edit]
root@s4# show interfaces
ge-0/0/9 {
unit 0;
}

Running operationnal-mode in config-mode

pour faire des ping, ou des show  interfaces en mode de configuration:

root@s4#run show interfaces
root@s4#run ping 10.210.1.2

Préparer les changements:
on peux configurer des interfaces qui ne sont encores pas présentes physiquement.
mais on les désactive.
Ex:

root@s4#edit protocoles dot1x

[edit protocoles dot1x]
root@s4#set authenticator interface ge-0/0/3.0

[edit protocoles dot1x]
root@s4#deactivate authenticator interface ge-0/0/3.0

[edit protocoles dot1x]
root@s4#show
authenticator {
interface {
inactive: ge-0/0/3.0;
ge-0/0/4.0;
}
}

[edit protocoles dot1x]
root@s4#commit
commit complete

[edit protocoles dot1x]
root@s4# run show dot1x interface brief
802.1x information
Interface     Role        State
ge-0/0/3.0    None
ge-0/0/4.0    Authenticator    Initialize

[edit protocoles dot1x]
root@s4#activate authenticator interface ge-0/0/3.0

[edit protocoles dot1x]
root@s4#commit
commit complete

[edit protocoles dot1x]
root@s4#run show dot1x interface brief

[edit protocoles dot1x]
root@s4# run show dot1x interface brief
802.1x information
Interface     Role        State
ge-0/0/3.0    Authenticator    Connecting
ge-0/0/4.0    Authenticator    Initialize

On peut aussi désactiver des sections entières.
root@s4#deactivate dot1x
root@s4#deactivate protocols
[…]

Bouger une configuration de ge-0/0/5 à ge-0/0/6:
root@s4#rename interfaces ge-0/0/5 to ge-0/0/6
root@s4#commit

Rename vs. replace
rename: renommer un unique element
replace: changer les références d’une interface a une autre

Ip addresses:
on peux attribuer plusieurs ip à une interfaces.

set unit 0 family inet address 172.20.11.1/24 primary
set unit 0 family inet address 172.20.12.1/24
set unit 0 family inet address 172.20.13.1/24

Accepter les changements (commit)
commit check
commit at “2012-12-23 00:01”
commit confirmed 1
commit and-quit

Annuler les changements (rollback)
rollback => charge la config active en candidate.

show | compare rollback “number”

show compare (diffrence entre candidate/active)

Interfaces configuration

M/T series:    fe-2/1/0
type-fpc/pic/port

Ex series:     ge-0/1/2
type-VCnumber/module/port

ge : Gigabit
xe : 10-gig

interfaces spéciales:
lo0 – loopback
me0 – Out-of-band Ethernet
vme – Virtual management Ethernet (virtual-chassis)
vlan – VLAN interface (L3)

Units:
IOS: subinterfaces
JunOS : Units

L2
ge-0/0/4 {
L2 // ether-options {
L2 //     no-auto-negocation;
L2 //     link-mode full-duplex;
L2 //     speed {
L2 //         100m
L2 //     }
L2 // }
L3 // unit 0 {
L3 //     family ethernet-switching;
L3 // }
}

VLAN
interfaces {
vlan {
unit 2 {
description Printers;
family inet {
address 192.168.2.2/24;
}
}
unit 3 {
description Phones;
family inet {
address 192.168.3.2/24;
}
}
unit 100 {
description Example;
family inet {
address 192.168.100.2/24;
}
}
}
}

L2 = ethernet-switching
– port-mode (access/trunk)
– VLANs
– Stateless packet filters
L3 = inet

Exemple:
set unit 0 family ethernet-switching
set unit 0 family inet

Activer les interfaces:

IOS: shutdown/no shutdown
JunOS:     deactivate : ignorée par JunOS

disable : shutdown
SWITCHING CONFIGURATION

EX Series switches : 10/100/1000 Ethernet ports.
Par défaut, ils sont en auto-négo.

run show interfaces ge-0/0/3 extensive | find Autoneg
Autonegociation information:
Negociation status: Complete
Link partner:
Link mode: Full-duplex, flow control: None, ..
ink partner speed: 100 Mbps, Reason: Link paartner failure
Local resolution;
Flow control: None, Remote fault; Link OK

root@s4#edit interface ge-0/0/4 ether-options
root@s4#set speed 100m
root@s4#set link-mode full-duplex
root@s4#commit

Désactiver l’auto-nego:
set interfaces ge-0/0/4 ether-options no-auto-negociation

Aggregated Ethernet

IEE 802.3ad supporté.

– Créer un aggrégat
– Associer les ports dans cet aggrégat
– Configurer l’aggrégat

root@s4#edit chassis aggregated-devices
root@s4#set ethernet device-count 1
root@s4#show
ethernet {
device-count 1;
}

root@s4#set interfaces ge-0/0/5 ether-options 802.3ad ae0
root@s4#set interfaces ge-0/0/6 ether-options 802.3ad ae0

root@s4#show
ge-0/0/5 {
ether-options {
802.3ad ae0;
}
}
ge-0/0/6 {
ether-options {
802.3ad ae0;
}
}

root@s4#edit interfaces ae0
root@s4#set unit 0 family ethernet-switching port-mode trunk
root@s4#set aggregated-ether-options lap active
root@s4#commit
root@s4#show
aggregated-ether-options {
lacp {
active;
}
}
unit 0 {
family ethernet-switching {
port-mode trunk;
}
}

Proxy ARP
Quand un hote demande une mac au switch, alors que l’IP n’est pas sur le meme VLAN, le switch peux faire proxy, et donner sa MAC.

root@s4#edit interfaces ge-0/0/7unit 0
root@s4#set proxy-arp
root@s4#show
proxy-arp;
family inet {
address 192.168.207.1/24
}

VLANs
root@s4#edit vlans
root@s4#set example
root@s4#set example vlan-id 100
root@s4#show
Name        Tag    Interfaces
example        100    None
phones        3    ae0.0*
printers    2    ae0.0*

Access-ports
root@s4#set example interfaces ge-0/0/7.0
root@s4#top edit interfaces
root@s4#set ge-0/0/7 unit 0 family ethernet-switching
root@s4#set ge-0/0/8 unit 0 family ethernet-switching vlan members 100
root@s4#set ge-0/0/9 unit 0 family ethernet-switching vlan members example
root@s4#up
root@s4#commit

root@s4#show vlan example
vlan-id 100;
interfaces {
ge-0/0/7.0;
ge-0/0/8.0;
ge-0/0/9.0;
}

Trunk-ports
root@s4#set vlans phones interfaces ge-0/0/7.0
root@s4#set vlans printers interfaces ge-0/0/7.0
root@s4#commit check
Access interface error…

root@s4#set ge-0/0/7 unit 0 family ethernet-switching port-mode trunk
root@s4#commit check
configuration check succeeds

root@s4#set ge-0/0/8 unit 0 family ethernet-switching port-mode trunk
root@s4#set ge-0/0/8 unit 0 family ethernet-switching vlan members [ 2 3 ]
root@s4#set ge-0/0/8 unit 0 family ethernet-switching port-mode trunk
root@s4#set ge-0/0/8 unit 0 family ethernet-switching vlan members [ phones printers ]

root@s4#commit
root@s4#set ge-0/0/9 unit 0 family ethernet-switching native-vlan-id default

root@s4#show
unit 0 {
family ethernet-switching {
port-mode trunk;
vlan {
members [ example phones printers ];
}
native-vlan-id default;
}
}

root@s4#commit

Routed VLAN interface

root@s4#edit vlans

!Assignation d’une interface de couche3 au VLAN “example”
root@s4#set example 13-interface vlan.100
root@s4#top edit interfaces vlan
root@s4#set unit 100 description example
root@s4#set unit 100 family inet address 192.168.100.2/24
root@s4#commit

MONITORING

show interfaces descriptions
show interfaces terse

interfaces

show interfaces ge-0/0/7
show interfaces ge-0/0/7 brief
show interfaces ge-0/0/7 detail
show interfaces ge-0/0/7 extensive

Switchport

show interfaces switchport
show interfaces trunk
show ethernet-switching interfaces

VLANS

show vlans
show vlans id brief
show vlans id detail
show vlans id extensive

MAC

show ethernet-switching table
show ethernet-switching mac-learning-log

SECURITY
Filtrage de paquets stateless, comme les ACL Cisco.

First term => match => action
Second term => match => action
Discard/drop

Ex IOS:

access-list 100 deny ip 192.168.0.0 0.0.0.255 any
access-list 100 permit ip any any

Ex JunOS (the same):

[edit firewall family inet]
root@s4#show
filter sample-filter {
term block-bad-subnet {
from {
source-address {
192.168.0.0/24;
}
}
then {
discard;
}
}
term accept-all {
then accept;
}
}
root@s4#edit filter sampl-filter term block-bad-subnet from source-address
root@s4#annotate 192.168.0.0/24 "requested by john doe"
root@s4#annotate 192.168.10.0/24 "requested by Ben"

JunOS utilise le masque standard (CIDR), pas de wildcard.

performance
Filtres de firewall compilés.
matching optimisé..
pas besoin normalement d’optimiser les filtres.

Avec la méthode de configuration active/candidate, le firewall est toujours en marche.
Pas comme sur cisco quand on doit supprimer et recréer certaines ACL (sauf pour celles avec numéro de sequence..:)).

Appliquer les filtres du firewall

root@s4#set interfaces vlan.2 family inet filter input sample-filter

Other security features
802.1x authentication
limite de MAC
DHCP inspection
Firewall/802.1X pour assigner de la CoS

Exercise:

root@s4#show firewall
root@s4#edit firewall family ethernet-switching filter my-vlan-filter
root@s4#edit term block-bad-mac
root@s4#set from source-mac-address 00ca.1234.1121
root@s4#set then discard
root@s4#up 1
root@s4#edit term allow-ping
root@s4#set from protocol icmp
root@s4#set from icmp-type echo-request
root@s4#set from icmp-type echo-reply
root@s4#set then accept
root@s4#up 1
root@s4#edit term block-icmp
root@s4#set from protocol icmp
root@s4#set then discard
root@s4#set term default-accept

[edit firewall family ethernet-switching filter my-vlan-filter]
root@s4#show

term block-bad-mac {
from {
source-mac-address {
00:ca:12:34:11:21;
}
}
then discard;
}
term allow-ping {
from {
protocol icmp;
icmp-type [ echo-request echo-reply ];
}
then accept;
}
[...]

root@s4#top
root@s4#set vlans accounting filter input my-vlan-filter

SPANNING-TREE
STP / RSTP /MSTP… bla bla.. ok.

Configuration STP:

root@s4#set protocols stp
root@s4#show protocols
stp;
root@s4#set protocols stp bridge-priority 20k
root@s4#set protocols stp interface ge-0/0/1 disable
root@s4#set protocols stp interface ge-0/0/2 cost 1000
root@s4#set protocols stp interface ge-0/0/9 edge    // portfast

Configuration RSTP:

root@s4#show protocols stp | display set

set protocols stp bridge-priority 20k
set protocols stp interface ge-0/0/1.0 disable
set protocols stp interface ge-0/0/2.0 cost 1000
set protocols stp interface ge-0/0/9.0 edge    // portfast

root@s4#delete protocol stp

root@s4#set protocols rstp bridge-priority 20k
root@s4#set protocols rstp interface ge-0/0/5.0 disable
root@s4#set protocols rstp interface ge-0/0/6.0 cost 1000
root@s4#set protocols rstp interface ge-0/0/9.0 edge
root@s4#
root@s4#set protocols rstp interface ge-0/0/6.0 mode point-to-point
root@s4#show protocols
rstp {
bridge-priority 20k;
interface ge-0/0/5.0 {
disable;
}
interface ge-0/0/6.0 {
cost 1000;
mode point-to-point;
}
[...]
}

Configuration MSTP:

root@s4#delete protocols Rstp
root@s4#set protocols mstp bridge-priority 20k
root@s4#set protocols mstp interface ge-0/0/1 disable
root@s4#set protocols mstp interface ge-0/0/2 cost 1000
root@s4#set protocols mstp interface ge-0/0/9 edge
root@s4#set protocols mstp interface ge-0/0/9 mode point-to-point
root@s4#
root@s4#set protocols mstp configuration-name example
root@s4#set protocols mstp msti 1 vlan [ 1 3 5 ]
root@s4#set protocols mstp msti 2 vlan [ 2 4 6 ]
root@s4#

Vérifications:

show spanning-tree bridge
show spanning-tree interface
show ethernet-switching interfaces

INTRODUCTION TO ROUTING
Overview:
IOS        JunOS
—             —–
show ip route        show route
show ip bgp sum        show bgp sum
show ip bgp nei        show bgp nei
show ip ospf        show ospf

Tables de routage

root@s4>show route

inet.0: 18 destinations, 25 routes (18 actives, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both

0.0.0.0/0    *[OSPF/150] 5d 19:40:04, metric 1, tag 0
> to 10.10.245.234 via vlan.20
10.14.240.0/22    *[Aggregate/130] 1w1d ...
[...]

Route preferences:

Source Default Preference
Direct 0
Local 0
Static 5
OSPF Internal 10
RIP 100
Aggregate 130
OSPF AS External 150
BGP 170

Troubleshooting:

root@s4>show route hidden
root@s4>show route hidden extensive
root@s4>show route x.x.x.x/x
root@s4>show route
root@s4>show route x.x.x.x/x exact
root@s4>show route x.x.x.x/x exact extensive

Static routes :

root@s4>set static route x.x.x.x/x next-hop x.x.x.x
root@s4>set static route default next-hop x.x.x.x
root@s4>set qualified-next-hop x.x.x.x interface vlan.3
root@s4>set qualified-next-hop x.x.x.x preference 30

OSPF
Configuration:

root@s4# set area 2 interface vlan.5
root@s4# set arrea 2 interface ge-0/0/4.0
root@s4# set arrea 2 interface ge-0/0/4.0 passive
root@s4# set arrea 2 interface vlan.5 metric 200
[edit protocols ospf]
root@s4#show
area 0.0.0.2 {
interface vlan.5 {
mteric 200;
}
interface ge-0/0/4.0 {
passive;
}
}
root@s4#
root@s4#

Area types:

[edit protocols ospf]
root@s4#set area 2 stub
root@s4#set area 3 nssa
root@s4#set area 3 interface vlan.6
root@s4#set area 2 stub default
root@s4#set area 3 nssa default-lsa default-metric 1
root@s4#show
area 0.0.0.2 {
stub default-metric 1;
interface vlan.5 {
mteric 200;
}
interface ge-0/0/4.0 {
passive;
}
}
area 0.0.0.3 {
nssa {
default-lsa default-metric 1;
}
interface vlan.6;
}

Injecter des routes dans OSPF:
il faut utiliser une “export policy”
pas plus de détail dans ce cours.

Authentification:

[edit protocols ospf area 0.0.0.2]
root@s4#set interface vlan.5 authentication md5 1 key test

Vérification:

show ospf database
show ospf interface

show ospf interface vlan.2 extensive
show ospf neighbor
show route protocol ospf

Benoit

Network engineer at CNS Communications. CCIE #47705, focused on R&S, Data Center, SD-WAN & Automation.

More Posts - Website

Follow Me:
TwitterLinkedIn

3 Comments

  1. Twitted by BenoitGONCALVES 11 septembre 2010

    […] This post was Twitted by BenoitGONCALVES […]

  2. franck 26 mars 2013

    je peux avoir la configuration basic de juniper srx 100 par ligne de commannde

  3. franck 26 mars 2013

    la creation de vlan sur un juniper EX-4200P en ligne de commande

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *