Download JIR_11.a-R_LGH PDF

TitleJIR_11.a-R_LGH
File Size1.2 MB
Total Pages92
Table of Contents
                            High-Level Lab Guide
	Contents
	Course Overview
	Course Agenda
	Document Conventions
	Additional Information
	Lab 1
		Protocol-Independent Routing
			Overview
			Part 1: Configuring and Monitoring Interfaces
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
			Part 2: Configuring and Monitoring Static and Aggregate Routes
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
				Step 2.7
				Step 2.8
				Step 2.9
				Step 2.10
				Step 2.11
			Part 3: Working with Routing Instances
				Step 3.1
				Step 3.2
				Step 3.3
				Step 3.4
				Step 3.5
				Step 3.6
				Step 3.7
				Step 3.8
				Step 3.9
				Step 3.10
				Step 3.11
				Step 3.12
				Step 3.13
				Step 3.14
				Step 3.15
	Lab 2
		Load Balancing and Filter-Based Forwarding
			Overview
			Part 1: Configuring and Monitoring Load Balancing
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
				Step 1.10
				Step 1.11
			Part 2: Configuring and Monitoring Filter-Based Forwarding
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
				Step 2.7
				Step 2.8
				Step 2.9
				Step 2.10
				Step 2.11
				Step 2.12
				Step 2.13
				Step 2.14
				Step 2.15
				Step 2.16
				Step 2.17
				Step 2.18
	Lab 3
		Open Shortest Path First
			Overview
			Part 1: Configuring and Monitoring OSPF
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
				Step 1.10
				Step 1.11
				Step 1.12
				Step 1.13
				Step 1.14
				Step 1.15
				Step 1.16
				Step 1.17
				Step 1.18
				Step 1.19
				Step 1.20
			Part 2: Performing Basic OSPF Troubleshooting
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
				Step 2.7
				Step 2.8
				Step 2.9
				Step 2.10
				Step 2.11
	Lab 4
		Border Gateway Protocol
			Overview
			Part 1: Configuring and Monitoring IBGP
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
			Part 2: Configuring and Monitoring EBGP
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
				Step 2.7
				Step 2.8
				Step 2.9
				Step 2.10
				Step 2.11
				Step 2.12
				Step 2.13
				Step 2.14
			Part 3: Implementing a next-hop self Policy
				Step 3.1
				Step 3.2
				Step 3.3
				Step 3.4
				Step 3.5
				Step 3.6
				Step 3.7
	Lab 5
		IP Tunneling
			Overview
			Part 1: Configuring and Monitoring a GRE Tunnel
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
			Part 2: Configuring the GRE Interface to Participate in OSPF
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
				Step 2.7
				Step 2.8
				Step 2.9
				Step 2.10
				Step 2.11
				Step 2.12
	Lab 6
		High Availability
			Overview
			Part 1: Configuring and Monitoring Graceful Restart
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
				Step 1.10
				Step 1.11
				Step 1.12
				Step 1.13
				Step 1.14
				Step 1.15
				Step 1.16
			Part 2: Configuring and Monitoring BFD
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
			Part 3: Configuring and Monitoring VRRP
				Step 3.1
				Step 3.2
				Step 3.3
				Step 3.4
				Step 3.5
				Step 3.6
				Step 3.7
				Step 3.8
				Step 3.9
				Step 3.10
				Step 3.11
				Step 3.12
				Step 3.13
				Step 3.14
				Step 3.15
				Step 3.16
	Lab 7
		IPv6 (Optional)
			Overview
			Part 1: Configuring and Monitoring Interfaces
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
				Step 1.10
				Step 1.11
				Step 1.12
			Part 2: Configuring and Monitoring Static Routing
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
			Part 3: Configuring and Monitoring OSPF
				Step 3.1
				Step 3.2
				Step 3.3
			Part 4: Tunneling IPv6 over IPv4 Using GRE Encapsulation
				Step 4.1
				Step 4.2
				Step 4.3
				Step 4.4
				Step 4.5
				Step 4.6
				Step 4.7
				Step 4.8
				Step 4.9
				Step 4.10
				Step 4.11
	Lab 8
		IS-IS (Optional)
			Overview
			Part 1: Configuring and Monitoring IS-IS
				Step 1.1
				Step 1.2
				Step 1.3
				Step 1.4
				Step 1.5
				Step 1.6
				Step 1.7
				Step 1.8
				Step 1.9
				Step 1.10
				Step 1.11
				Step 1.12
				Step 1.13
				Step 1.14
				Step 1.15
			Part 2: Performing Basic IS-IS Troubleshooting
				Step 2.1
				Step 2.2
				Step 2.3
				Step 2.4
				Step 2.5
				Step 2.6
				Step 2.7
				Step 2.8
	Appendix A: Lab Diagrams
                        
Document Text Contents
Page 1

Junos Intermediate Routing
11.a

High-Level Lab Guide
1194 North Mathilda Avenue
Sunnyvale, CA 94089
USA
408-745-2000
www.juniper.net

Worldwide Education ServicesWorldwide Education Services
Course Number: EDU-JUN-JIR

Page 2

This document is produced by Juniper Networks, Inc.

This document or any part thereof may not be reproduced or transmitted in any form under penalty of law, without the prior written permission of Juniper Networks
Education Services.

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered

trademarks, or registered service marks are the property of their respective owners.

Junos Intermediate Routing High-Level Lab Guide, Revision 11.a

Copyright © 2011, Juniper Networks, Inc.

All rights reserved. Printed in USA.

Revision History:

Revision 10.a—May 2010

Revision 10.b—December 2010

Revision 11.a—June 2011

The information in this document is current as of the date listed above.

The information in this document has been carefully verified and is believed to be accurate for software Release 11.1R1.10. Juniper Networks assumes no
responsibilities for any inaccuracies that may appear in this document. In no event will Juniper Networks be liable for direct, indirect, special, exemplary, incidental
or consequential damages resulting from any defect or omission in this document, even if advised of the possibility of such damages.
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

YEAR 2000 NOTICE

Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.

SOFTWARE LICENSE

The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an
agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software, may contain prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.

Page 46

Junos Intermediate Routing
Question: Use the summary details of the
generated output to determine whether your device
currently has hidden routes. If so, how many?


STOP Do not proceed until the remote team finishes Part 2.

Part 3: Implementing a next-hop self Policy

In this lab part, you define and apply a next-hop self policy to alter the next-hop
value associated with routes received from your EBGP peer. You monitor the effects
of this policy.

Step 3.1

Open a separate Telnet session to the virtual router.

Note

The following lab steps require you to log in
to the virtual router attached to your team’s
device. The virtual routers are logical
devices created on a J Series Services
Router. Refer to the management network
diagram for the IP address of the virtual
router.
Lab 4–8 • Border Gateway Protocol www.juniper.net

Page 47

Junos Intermediate Routing
Step 3.2

Log in to the virtual router attached to your team’s device using the login information
shown in the following table:

Step 3.3

From your assigned virtual router, issue the show route table
vr11v.inet.0 protocol bgp command, where v is the value assigned to
your virtual router.

Question: How many BGP routes display using the
referenced command?

Question: Does your virtual router currently have
hidden routes?

Step 3.4

View the hidden routes by issuing the show route table vr11v.inet.0
hidden extensive command, where v is the value assigned to your virtual
router.

Question: What are the protocol next-hop values
associated with these hidden routes?

Virtual Router Login Details

Student Device Username Password

srxA-1 a1 lab123

srxA-2 a2 lab123

srxB-1 b1 lab123

srxB-2 b2 lab123

srxC-1 c1 lab123

srxC-2 c2 lab123

srxD-1 d1 lab123

srxD-2 d2 lab123
www.juniper.net Border Gateway Protocol • Lab 4–9

Page 91

Junos Intermediate Routing
www.juniper.net Lab Diagrams • A–7

Page 92

Junos Intermediate Routing
A–8 • Lab Diagrams www.juniper.net

Similer Documents