Junos Intermediate Routing

Slides:



Advertisements
Similar presentations
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 9: Access Control Lists
Jaringan Komputer Dasar Network Layer dan IP (1) Aurelio Rahmadian.
Ch. 9 – Basic Router Troubleshooting CCNA 2 version 3.0.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
Chapter 5 OSI Network Layer
Routing and Routing Protocols Introduction to Static Routing.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Routing Table : closer look w.lilakiatsakun. Sample Routing Table Static Route Dynamic Routing Protocol (RIP) Directly Connected Network Administrative.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5 Sandra Coleman, CCNA, CCAI.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Ge-0/1/1 GE-0/0/23 GE-0/0/ / /29 lo0: /32lo0: / /29 GE-0/0/7 lo0: /32 lo0: /32 GE-0/0/
Juniper ESCR Tesco Day 2. Overview Day #1 Maintenance and monitoring Routing protocols Lab Day #2 Introduction to Juniper devices Junos CLI System and.
思科网络技术学院理事会. 1 OSI Network Layer Network Fundamentals – Chapter 5.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
11 NETWORK LAYER PROTOCOLS Chapter 5 IP IPX NetBEUI AppleTalk.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Routing and Packet Forwarding Routing Protocols and.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
© 2012 Juniper Networks, Inc. All rights reserved. | | Worldwide Education Services Chapter 2: Routing Fundamentals Junos Routing Essentials.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
© 2002, Cisco Systems, Inc. All rights reserved. 1 Routing Overview.
Routing and Routing Protocols
Routing Basics Chapter 8. powered by DJ 1. C HAPTER O BJECTIVES At the end of this Chapter you will be able to:  Understand routing basics. powered by.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
© 2002, Cisco Systems, Inc. All rights reserved..
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
CHAPTER 6: STATIC ROUTING Static Routing 2 nd semester
Wrapping up subnetting, mapping IPs to physical ports BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
BGP Route Server Proof of Concept Magnus Bergroth NORDUnet.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
Static Routing CCNA Routing and Switching Semester 2 Chapter 6
Static and Default Routing
Routing and Routing Protocols: Routing Static
Chapter 6 – Routing.
Network Fundamentals – Chapter 5
Introduction to the Junos Operating System
Chapter 2: Static Routing
Chapter 2: Static Routing
Net 412 (Practical Part) Networks and Communication Department LAB 2.
Routing and Routing Protocols: Routing Static
Guide to TCP/IP Fourth Edition
Chapter 2: Static Routing
Static Routing 1st semester
Static and Default Routing
Network Fundamentals – Chapter 5
Static Routing 2nd semester
Presentation transcript:

Junos Intermediate Routing Chapter 6: IP Tunneling

Chapter Objectives After successfully completing this chapter, you will be able to: Describe IP tunneling concepts and applications Explain the basic operations of GRE and IP-IP tunnels Configure and monitor GRE and IP-IP tunnels

Agenda: IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels

What Is an IP Tunnel? An IP communications channel between two networks over an IP network (typically the Internet) Can be secure or unsecure, depending on tunneling protocol Internet Customer X Site-A Customer X Site-B

Tunneling IP Packets When a packet enters an IP tunnel, it is encapsulated; once it exits the tunnel, it is decapsulated Tunnel Endpoint A Internet Tunnel Endpoint B Rtr X User A User B Encapsulated Packets Payload Packet Payload Packet Outer IP Header Tunnel Header IP Header Inner IP Header IP Header IP Payload IP Payload IP Payload

Uses of IP Tunnels (1 of 2) IP tunnels can carry traffic that is not otherwise routable over a public IP network such as the Internet This traffic could include IPX, AppleTalk, or IP traffic that uses RFC 1918 addressing Internet Company X Site-A Company X Site-B IPX IPX IP Tunnel AppleTalk AppleTalk RFC 1918 RFC 1918

Uses of IP Tunnels (2 of 2) IP tunnels can be used as backup links if failure occurs Use route preference or metrics to prefer internal connection over IP tunnel when the network is stable Internet Note: Traffic from Subnet A to Subnet B uses primary path between R1 and R2 when it is available; otherwise the IP tunnel is used. Tunnel functions as a point-to-point link between R1 and R2 R1 R2 Subnet A Subnet B

Agenda: IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels

Overview of GRE and IP-IP GRE is an IP tunneling protocol that can encapsulate a wide variety of Network Layer protocol packet types IP-IP is an IP tunneling protocol that can encapsulate one IP packet inside another IP packet IPX Internet IPX Outer IP Header AppleTalk GRE Header IP Tunnel AppleTalk Inner IP Header RFC 1918 IP Payload RFC 1918 Internet RFC 1918 IP Tunnel RFC 1918 Outer IP Header Inner IP Header IP Payload

Intentionally Blank

GRE and IP-IP Tunnel Requirements (1 of 2) A tunnel interface is required on each tunnel endpoint GRE and IP-IP tunnels use the gr-x/y/z and ip-x/y/z naming standards, respectively Tunnel Endpoint A Internet Tunnel Endpoint B Rtr X gr-0/0/0.0 ip-0/0/0.0 gr-0/0/0.0 ip-0/0/0.0 User A User B A single tunnel can be defined on each logical interface.

GRE and IP-IP Tunnel Requirements (2 of 2) An end-to-end communications path is required Routing Requirements Tunnel endpoints must have a valid route to the remote endpoint. All intermediary devices must have a route to the tunnel endpoints. Tunnel endpoints must have a route that directs traffic into tunnel. Internet Tunnel Endpoint A Tunnel Endpoint B User A User B

GRE and IP-IP Tunnel Considerations (1 of 3) By default, GRE and IP-IP tunnels are stateless Some GRE implementations provide a keepalive mechanism; BFD also accomplishes the same functionality Internet Tunnel Endpoint A Rtr X Tunnel Endpoint B User A User B Tunnel remains up on side A even though tunnel is down on side B gr-0/0/0.0 = up gr-0/0/0.0 = down

Intentionally Blank

GRE and IP-IP Tunnel Considerations (2 of 3) Tunnels add additional overhead to packets, which can adversely affect some types of communications Packets larger than the MTU are fragmented or dropped depending if the DF bit is clear or set MSS = 1500 Internet MTU = 1476 MTU = 1476 Tunnel Endpoint A Tunnel Endpoint B User A User B By default, packets larger than 1476 will either be fragmented or dropped.

Intentionally Blank

GRE and IP-IP Tunnel Considerations (3 of 3) The route for the remote tunnel endpoint cannot use the tunnel interface as next hop; if so, the tunnel will bounce We recommend a very specific route with a low route preference, such as a static route Destination Prefix Next Hop Protocol/ Preference 192.168.2.1 172.18.1.1 Static/5 Destination Prefix Next Hop Protocol/ Preference 192.168.1.1 172.18.2.1 Static/5 Internet (.2) 172.18.1.0/30 (.1) (.1) 172.18.2.0/30 (.2) Tunnel Endpoint A Rtr X Tunnel Endpoint B User A User B lo0: 192.168.1.1 lo0: 192.168.2.1

Agenda: IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels

Case Study: Objectives and Topology Use the sample topology and implement a GRE tunnel between R1 and R2 that carries traffic destined to the remote 172.20.11x.0/24 subnet Internet (.10) 172.20.110.0/24 (.1) (.1) 172.20.111.0/24 (.10) (.2) 172.18.1.0/30 (.1) (.1) 172.18.2.0/30 (.2) R1 Rtr X R2 lo0: 192.168.1.1 lo0: 192.168.2.1 gr-0/0/0.0 gr-0/0/0.0 Note: The preceding steps used to implement and monitor a GRE tunnel are also applicable to IP-IP tunnels.

Case Study: Defining the Tunnel Interface [edit] user@R1# show interfaces gr-0/0/0 unit 0 { tunnel { source 192.168.1.1; destination 192.168.2.1; } family inet; [edit] user@R2# show interfaces gr-0/0/0 unit 0 { tunnel { source 192.168.2.1; destination 192.168.1.1; } family inet; We recommend using the loopback addresses as the tunnel source and destination addresses Family inet is required to process IPv4 packets through the tunnel Internet (.10) 172.20.110.0/24 (.1) (.1) 172.20.111.0/24 (.10) (.2) 172.18.1.0/30 (.1) (.1) 172.18.2.0/30 (.2) R1 Rtr X R2 lo0: 192.168.1.1 lo0: 192.168.2.1 gr-0/0/0.0 gr-0/0/0.0

Intentionally Blank

Case Study: Defining the Required Routes [edit] user@R1# show routing-options static route 192.168.2.1/32 next-hop 172.18.1.1; route 172.20.111.0/24 next-hop gr-0/0/0.0; [edit] user@R2# show routing-options static route 192.168.1.1/32 next-hop 172.18.2.1; route 172.20.110.0/24 next-hop gr-0/0/0.0; Internet (.10) 172.20.110.0/24 (.1) (.1) 172.20.111.0/24 (.10) (.2) 172.18.1.0/30 (.1) (.1) 172.18.2.0/30 (.2) R1 Rtr X R2 lo0: 192.168.1.1 lo0: 192.168.2.1 gr-0/0/0.0 gr-0/0/0.0 Note: Remember that all intermediary routers must have a route to the loopback addresses.

Case Study: Verifying Operations (1 of 3) Use the show interfaces interface-name terse command to verify the tunnel interface is up user@R1> show interfaces gr-0/0/0 terse Interface Admin Link Proto Local Remote gr-0/0/0 up up gr-0/0/0.0 up up inet user@R2> show interfaces gr-0/0/0 terse Interface Admin Link Proto Local Remote gr-0/0/0 up up gr-0/0/0.0 up up inet Internet (.10) 172.20.110.0/24 (.1) (.1) 172.20.111.0/24 (.10) (.2) 172.18.1.0/30 (.1) (.1) 172.18.2.0/30 (.2) R1 Rtr X R2 lo0: 192.168.1.1 lo0: 192.168.2.1 gr-0/0/0.0 gr-0/0/0.0 Note: Remember GRE and IP-IP tunnels are stateless so you should always ensure that both sides are up.

Case Study: Verifying Operations (2 of 3) Use the show route command to ensure that the required routes are installed on both tunnel endpoints user@R1> show route 192.168.2.1 inet.0: 11 destinations, 11 routes (9 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 192.168.2.1/32 *[Static/5] 01:19:00 > to 172.18.1.1 via ge-0/0/3.0 user@R1> show route 172.20.111.0/24 172.20.111.0/24 *[Static/5] 01:17:44 > via gr-0/0/0.0

Case Study: Verifying Operations (3 of 3) Send traffic through the tunnel and confirm that interface statistics are increasing on the tunnel interface user@R1> ping 172.20.111.10 rapid count 25 source 172.20.110.1 PING 172.20.111.10 (172.20.111.10): 56 data bytes !!!!!!!!!!!!!!!!!!!!!!!!! --- 172.20.111.10 ping statistics --- 25 packets transmitted, 25 packets received, 0% packet loss round-trip min/avg/max/stddev = 1.492/3.185/8.064/2.521 ms user@R1> show interfaces gr-0/0/0.0 detail | find "traffic statistics" Traffic statistics: Input packets: 25 Output packets: 25 … Internet (.10) 172.20.110.0/24 (.1) (.1) 172.20.111.0/24 (.10) (.2) 172.18.1.0/30 (.1) (.1) 172.18.2.0/30 (.2) R1 Rtr X R2 lo0: 192.168.1.1 lo0: 192.168.2.1 gr-0/0/0.0 gr-0/0/0.0

Summary In this chapter, we: Described IP tunneling concepts and applications Explained the basic operations of GRE and IP-IP tunnels Configured and monitored GRE and IP-IP tunnels

Review Questions What are some common reasons to use IP tunnels? Name some differences between GRE and IP-IP. List the key requirements for GRE and IP-IP tunnels. Why should the route for the remote tunnel endpoint be specific and use a low route preference?

Lab 5: IP Tunneling Configure and monitor a GRE tunnel.