Cisco To Juniper Thomas Mangin Exa Networks LINX 51.

Slides:



Advertisements
Similar presentations
An Operational Perspective on BGP Security Geoff Huston February 2005.
Advertisements

Router Configuration.
MPLS VPN.
Chapter 1: Introduction to Scaling Networks
Point Protection 111. Check List AAA to the Network Devices Controlling Packets Destined to the Network Devices Config Audits.
Access Control List (ACL)
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Routing Basics.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Chapter 9: Access Control Lists
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
Routing Security Capabilities draft-zhao-opsec-routing-capabilities-02.txt OPSEC WG, IETF #66.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Configuring and Verifying Basic BGP Operations.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 i2rs Usecases for BGP draft-keyupate-i2rs-bgp-usecases-01.txt Keyur Patel,
Basic Router Configuration Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Juniper ESCR Tesco Day 2. Overview Day #1 Maintenance and monitoring Routing protocols Lab Day #2 Introduction to Juniper devices Junos CLI System and.
CISCO NETWORKING ACADEMY Chabot College ELEC IP Routing Protocol Highlights.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Tutorial 11 Installing, Updating, and Configuring Software
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
Access Control List ACL’s 5/26/ What Is an ACL? An ACL is a sequential collection of permit or deny statements that apply to addresses or upper-layer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Chapter 4: Implementing Firewall Technologies
CCNA2 Chapter 2 Cisco IOS Software. Cisco’s operating system is called Cisco Internetwork Operating System (IOS) IOS provides the following network services:
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Understanding BGP Path Attributes.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
Router Startup and Setup Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Border Gateway Protocol BGP-4 BGP environment How BGP works BGP information BGP administration.
The Benefit and Need of Standard Contribution for IXPs Jan Stumpf System Engineer.
Cisco I Introduction to Networks Semester 1 Chapter 6 JEOPADY.
BGP. BGP Configuration Create Fabric ASN Enable BGP on a given Tenant & VRF Create BGP Neighbor and associated config eBGP Vs iBGP Route Maps BGP over.
Optimizing Routing 1. Using Multiple Routing Protocols
100% Exam Passing Guarantee & Money Back Assurance
Connecting an Enterprise Network to an ISP Network
IGP Troubleshooting 3.
Instructor Materials Chapter 7: Access Control Lists
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
BGP Route Server Proof of Concept
Lo0 /32 /32 /32 /32 /32 / /32 /32 /32 Ae0(Trunk) Ge-0/0/0
Managing IP Traffic with ACLs
BGP Best Current Practices
Introduction to the Junos Operating System
Chapter 4: Access Control Lists (ACLs)
Cisco Real Exam Dumps IT-Dumps
Cours BGP-MPLS-IPV6-QOS
Access Control Lists CCNA 2 v3 – Module 11
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Scaling Service Provider Networks
Presentation transcript:

Cisco To Juniper Thomas Mangin Exa Networks LINX 51

Scope This presentation is not about : –Juniper vs Cisco –A line per line conversion analysis It is about –Giving you an overview how hard/easy integrating Juniper in a Cisco network is.. –Providing you pointers should you want to look into it –Giving you a taste of the interesting feature of JunOS

Source of Information –Secure Juniper BGP template Complete tested template Well documented Very good to learn from an example A little bit outdated No IGP at all Focused on security not features –Remotely triggered black hole example

Source of Information –Cisco Configuration Converter Good to get a base configuration and for IGP Horrible (but correct) ACL and BGP route-map conversion Access not open (you may have to ask your reseller to get your configuration converted) –Documentation Cover clearly every section of the configuration Have lots of configuration snipsets Does not take you for a genius or a student of college Is good enough to allow you to write configs from it

Source of Information juniper.cluepon.net –Wiki –password recovery procedure –Lots of unofficial information –Lots more …. nsp-juniper mailing-list –Lots of good configuration and discussion on the archive –Helpful juniper staff monitoring the list and answering hard questions.

The Routers Separation of the routing engine and forwarding plane BSD system on the background –Use unix commands (if you want) ls, ps, top, tcpdump, compile your own Every protocol has a daemon –Lots of HD space for logging Usual risk associated with having an HD Optional flash drive

Configuration Are loooooong … –Easily 2,000 lines for a EBGP routers But are very logical structure –Divided in section –From more generic to more specific –With the concept or inheritance Friendly –Everything can be commented –Everything can be deactivated Easy to manipulate –Merge/Replace/Overide from file/copy & paste/etc. –Export part of it/Save it all

Configuration Atomic changes –No time constrain to change the configuration –Automatic rollback if changes are not confirmed Automatic backup –possibility to rollback to any previous configuration version –Compare the current configuration with any stored backup –Export to ftp on change Changes are syntax checked –Can be a pain as it will not let you test a invalid configuration

Turn off the red light Juniper expect a management through the dedicated management internet interface. chassis { alarm { management-ethernet { link-down ignore; }

Policies The JunOS route-map Used to –Originate routes –Filter route to learn / announce Are –a succession of term (if then blocks) Every keyword (term, from, then) if optional –terms can Accept a route Reject the route Let the next policy decide –Policies be build from other policies

Policies - example community drop-ebgp members [ 30740: :65002 ]; community drop-ix members [ 30740: :65004 ]; policy-statement export-bgp { term remove-ebgp { from { protocol bgp; community drop-ebgp; } then reject; } term remove-ix { from { protocol bgp; community drop-ix; } then reject; }

Policies with BGP [edit protocol bgp] group linx { type external; import [ no-ix no-bogons no-small-prefixes tag-linx damping local-preference- peer community-clear ]; export [ originate export-peering export-linx community-clear next-hop-self ]; neighbor { apply-groups bgp-limit-50; description "LINX / Route Collector"; authentication-key "$ "; peer-as 5459; }

Originate a route Filter can normally be chained allowing to reuse the power of other filters and thus making the configuration easier to maintain and more readable. However, originated routes need to be accepted in the filter where they are injected

Originate a route routing-options { aggregate { route /16 community 30740:65400; } policy-options { community originate members 30740:65400; policy-statement originate { term tag { from { protocol aggregate; community originate; } then { community delete originate; accept; } (static route can as well be used instead of aggregate)

Groups JunOS allows to define configuration template –Can be used to define your interfaces common attribute (core, transit, peering, customers, …) –Abuse it to define BGP prefix-limit –Use | display inheritance allow to see implicitly what is explicit otherwise

Groups groups { name { interfaces { { vlan-tagging; link-mode full-duplex; unit { family inet { no-redirects; } } } interfaces { apply-groups name; ge-0/3/0 { description core vlan unit 80 { apply-groups sub; vlan-id 18; family inet { /* Local comment */ address /28; } } } } }

Using BGP to setup firewall rules BGP and JunOS SCU can be use to build firewall rules from BGP tagged routes The same thing may be better done using Juniper flows implementation using the latest JunOS release. if interested see : nsp-2005/msg02043.html nsp-2005/msg02043.html

Complain No easy way to see flow information –Like show ip cache flow with cisco –Need to capture the packet and pass them to the control plane which can then get overloaded and become unresponsive –Same issue with netflow export, a DDOS may not take the forwarding plane off but may overload the netflow daemon, causing IGP/BGP update drop. –Juniper sell some hardware accelaration cards to offload those tasks from the CPU Learning curve and all which goes with it.

Conclusion What problem did the introduction of Juniper caused ? –Full BGP table leak to one peer due to mis- configuration … –5 minutes when the planned update to allow data flow collection obliged us to use out-of- band access to the router to rollback our changes All in one it went pretty well I would do it again …

Thank you for faking interest all the way through ( or not ) Questions ? ( If times allow )