0% found this document useful (0 votes)
79 views712 pages

Routing Protocool Configuration Guide

routing protocool configuration guide

Uploaded by

MateusLima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views712 pages

Routing Protocool Configuration Guide

routing protocool configuration guide

Uploaded by

MateusLima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

JUNOSTM Internet Software

Routing Protocols
Configuration Guide

Release 8.1

Juniper Networks, Inc.


1194 North Mathilda Avenue
Sunnyvale, CA 94089
USA
408-745-2000
[Link]
Part Number: 530-017062-01, Revision 1
This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright © 1986–1997, Epilogue
Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public
domain.

This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto.

This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software
included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by The Regents of the University of California. Copyright © 1979, 1980, 1983, 1986, 1988,
1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved.

GateD software copyright © 1995, The Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by
Cornell University and its collaborators. Gated is based on Kirton’s EGP, UC Berkeley’s routing daemon (routed), and DCN’s HELLO routing protocol.
Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright © 1988, Regents of the
University of California. All rights reserved. Portions of the GateD software copyright © 1991, D. L. S. Associates.

Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. JUNOS and JUNOSe are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service
marks are the property of their respective owners.

Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or
otherwise revise this publication without notice.

Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed
to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347,
6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.

Copyright © 2006, Juniper Networks, Inc.


All rights reserved. Printed in USA.

JUNOS Internet Software Routing Protocols Configuration Guide, Release 8.1


Writing: Joshua Kim
Editing: Stella Hackell
Illustration: Faith Bradford, Nathaniel Woodward
Cover design: Edmonds Design

Revision History
15 September 2006—Revision 1

The information in this document is current as of the date listed in the revision history.

Year 2000 Notice

Juniper Networks hardware and software products are Year 2000 compliant. The JUNOS software has no known time-related limitations through the year
2038. However, the NTP application is known to have some difficulty in the year 2036.

Software License

The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the
extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you
indicate that you understand and agree to be bound by those terms and conditions.

Generally speaking, the software license restricts the manner in which you are permitted to use the software and may contain prohibitions against certain
uses. The software license may state conditions under which the license is automatically terminated. You should consult the license for further details.

For complete product documentation, please see the Juniper Networks Web site at [Link]/techpubs.

End User License Agreement

READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BY DOWNLOADING,
INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU (AS CUSTOMER OR
IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS
AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE
SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS.

1. The Parties. The parties to this Agreement are Juniper Networks, Inc. and its subsidiaries (collectively “Juniper”), and the person or organization that
originally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software (“Customer”) (collectively, the “Parties”).

2. The Software. In this Agreement, "Software" means the program modules and features of the Juniper or Juniper-supplied software, and updates and
releases of such software, for which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller. "Embedded
Software" means Software which Juniper has embedded in the Juniper equipment.

3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusive
and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions:

a. Customer shall use the Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from
Juniper or an authorized Juniper reseller.

b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customer
has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access Client software only, Customer shall use
such Software on a single computer containing a single physical random access memory space and containing any number of processors. Use of the
Steel-Belted Radius software on multiple computers requires multiple licenses, regardless of whether such computers are physically contained on a single
chassis.

ii !
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may specify limits to
Customer's use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent users, sessions, calls,
connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of separate licenses to use particular features,
functionalities, services, applications, operations, or capabilities, or provide throughput, performance, configuration, bandwidth, interface, processing,
temporal, or geographical limits. In addition, such limits may restrict the use of the Software to managing certain kinds of networks or require the Software
to be used only in conjunction with other specific Software. Customer's use of the Software shall be subject to all such limitations and purchase of all
applicable licenses.

d. For any trial copy of the Software, Customer's right to use the Software expires 30 days after download, installation or use of the Software. Customer may
operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not extend or create an additional trial period
by re-installing the Software after the 30-day trial period.

e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer's enterprise network.
Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the Steel-Belted Radius software to support any
commercial network access services.

The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicable
license(s) for the Software from Juniper or an authorized Juniper reseller.

4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall not:
(a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as necessary
for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove any
proprietary notices, labels, or marks on or in any copy of the Software or any product in which the Software is embedded; (e) distribute any copy of the
Software to any third party, including as may be embedded in Juniper equipment sold in the secondhand market; (f) use any 'locked' or key-restricted
feature, function, service, application, operation, or capability without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even
if such feature, function, service, application, operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to
any third party; (h) use the Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper
reseller; (i) use the Embedded Software on non-Juniper equipment; (j) use the Software (or make it available for use) on Juniper equipment that the
Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking of the Software to
any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly provided herein.

5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnish
such records to Juniper and certify its compliance with this Agreement.

6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such, Customer
shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includes
restricting access to the Software to Customer employees and contractors having a need to use the Software for Customer's internal business purposes.

7. Ownership. Juniper and Juniper's licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software,
associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in the
Software or associated documentation, or a sale of the Software, associated documentation, or copies of the Software.

8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty statement that
accompanies the Software (the “Warranty Statement”). Nothing in this Agreement shall give rise to any obligation to support the Software. Support services
may be purchased separately. Any such support shall be governed by a separate, written support services agreement. TO THE MAXIMUM EXTENT
PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA, OR COSTS OR PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER
OR JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF
ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY
LAW, JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE),
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR OR
INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper's or its suppliers' or licensors' liability to
Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid by Customer for the Software that gave
rise to the claim, or if the Software is embedded in another Juniper product, the price paid by Customer for such other product. Customer acknowledges and
agrees that Juniper has set its prices and entered into this Agreement in reliance upon the disclaimers of warranty and the limitations of liability set forth
herein, that the same reflect an allocation of risk between the Parties (including the risk that a contract remedy may fail of its essential purpose and cause
consequential loss), and that the same form an essential basis of the bargain between the Parties.

9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the license
granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in Customer's
possession or control.

10. Taxes. All license fees for the Software are exclusive of taxes, withholdings, duties, or levies (collectively “Taxes”). Customer shall be responsible for
paying Taxes arising from the purchase of the license, or importation or use of the Software.

11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign
agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, or
without all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to Customer may contain encryption
or other capabilities restricting Customer's ability to export the Software without an export license.

12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use, duplication, or
disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS 227.7201 through 227.7202-4,
FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.

13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer with the interface
information needed to achieve interoperability between the Software and another independently created program, on payment of applicable fee, if any.
Customer shall observe strict obligations of confidentiality with respect to such information and shall use such information in compliance with any
applicable terms and conditions upon which Juniper makes such information available.

! iii
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products or technology
are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement, and such licensor or vendor
shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party software may be provided with the
Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent portions of the Software are distributed under and
subject to open source licenses obligating Juniper to make the source code for such portions publicly available (such as the GNU General Public License
(“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper will make such source code portions (including Juniper modifications, as appropriate)
available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N.
Mathilda Ave., Sunnyvale, CA 94089, ATTN: General Counsel. You may obtain a copy of the GPL at [Link] and a copy of the
LGPL at [Link]

15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. The
provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes arising under this Agreement, the
Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courts within Santa Clara County, California. This
Agreement constitutes the entire and sole agreement between Juniper and the Customer with respect to the Software, and supersedes all prior and
contemporaneous agreements relating to the Software, whether oral or written (including any inconsistent terms contained in a purchase order), except that
the terms of a separate written agreement executed by an authorized Juniper representative and Customer shall govern to the extent such terms are
inconsistent or conflict with terms contained herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless
expressly assented to in writing by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not
affect the validity of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de même que tous
les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that this Agreement and all related
documentation is and will be in the English language)).

iv !
Abbreviated Table of Contents
About This Guide xxv

Part 1 Overview
Chapter 1 Routing Protocols Concepts 3
Chapter 2 Complete Routing and Routing Protocol
Configuration Statements 17

Part 2 Protocol-Independent Routing Properties


Chapter 3 Protocol-Independent Routing Properties Overview 43
Chapter 4 Configuring Routing Tables and Routes 49
Chapter 5 Configuring Other Protocol-Independent
Routing Properties 97
Chapter 6 Logical Router Overview 117
Chapter 7 Summary of Protocol-Independent Routing Properties
Configuration Statements 123

Part 3 Routing Instances


Chapter 8 Routing Instances Overview 183
Chapter 9 Routing Instances Configuration Guidelines 185
Chapter 10 Summary of Routing Instances
Configuration Statements 233

Part 4 Interior Gateway Protocols


Chapter 11 IS-IS Overview 243
Chapter 12 IS-IS Configuration Guidelines 247
Chapter 13 Summary of IS-IS Configuration Statements 285
Chapter 14 ES-IS Overview 325
Chapter 15 ES-IS Configuration Guidelines 327
Chapter 16 Summary of ES-IS Configuration Statements 333
Chapter 17 OSPF Overview 339
Chapter 18 OSPF Configuration Guidelines 349

Abbreviated Table of Contents ! v


JUNOS 8.1 Routing Protocols Configuration Guide

Chapter 19 Summary of OSPF Configuration Statements 383


Chapter 20 RIP Overview 427
Chapter 21 RIP Configuration Guidelines 429
Chapter 22 Summary of RIP Configuration Statements 443
Chapter 23 RIPng Overview 463
Chapter 24 RIPng Configuration Guidelines 465
Chapter 25 Summary of RIPng Configuration Statements 473
Chapter 26 ICMP Router Discovery Overview 485
Chapter 27 ICMP Router Discovery Configuration Guidelines 487
Chapter 28 Summary of ICMP Router
Discovery Configuration Statements 493
Chapter 29 Neighbor Discovery Overview 503
Chapter 30 Neighbor Discovery Configuration Guidelines 505
Chapter 31 Summary of Neighbor Discovery Router Advertisement Configuration
Statements 513

Part 5 BGP
Chapter 32 BGP Overview 527
Chapter 33 BGP Configuration Guidelines 533
Chapter 34 Summary of BGP Configuration Statements 597

Part 6 Indexes
Index 655
Index of Statements and Commands 673

vi ! Abbreviated Table of Contents


Table of Contents
About This Guide xxv
Objectives .................................................................................................... xxv
Supported Routing Platforms ...................................................................... xxvi
Audience..................................................................................................... xxvi
Using the Indexes ...................................................................................... xxvii
Using the Examples in This Manual............................................................ xxvii
Merging a Full Example ....................................................................... xxvii
Merging a Snippet............................................................................... xxviii
Documentation Conventions....................................................................... xxix
Related Juniper Networks Documentation.................................................... xxx
Documentation Feedback ......................................................................... xxxiii
Requesting Support................................................................................... xxxiii

Part 1 Overview

Chapter 1 Routing Protocols Concepts 3


Routing Databases ...........................................................................................3
Routing Protocol Databases .......................................................................4
JUNOS Routing Tables ............................................................................... 4
Forwarding Tables ..................................................................................... 5
How the Routing and Forwarding Tables Are Synchronized ...................... 5
Configuring Interfaces...................................................................................... 6
Route Preferences ............................................................................................ 6
Alternate and Tiebreaker Preferences........................................................ 7
How the Active Route Is Determined......................................................... 7
Multiple Active Routes ............................................................................... 9
Default Route Preference Values................................................................ 9
Equal-Cost Paths and Load Sharing ................................................................10
IPv6 ...............................................................................................................11
IPv6 Standards ........................................................................................11
IPv6 Packet Headers................................................................................12
Header Structure ...............................................................................12
Extension Headers ............................................................................13
IPv6 Addressing.......................................................................................13
Address Representation ....................................................................14
Address Types...................................................................................14
Address Scope...................................................................................14
Address Structure..............................................................................15

Table of Contents ! vii


JUNOS 8.1 Routing Protocols Configuration Guide

Chapter 2 Complete Routing and Routing Protocol


Configuration Statements 17
[edit logical-routers] Hierarchy Level..............................................................17
[edit protocols] Hierarchy Level .....................................................................18
[edit routing-instances] Hierarchy Level .........................................................31
[edit routing-options] Hierarchy Level ............................................................36

Part 2 Protocol-Independent Routing Properties

Chapter 3 Protocol-Independent Routing Properties Overview 43


Protocol-Independent Routing Properties Configuration Statements ..............44
Minimum Protocol-Independent Routing Properties Configuration ................47

Chapter 4 Configuring Routing Tables and Routes 49


Creating Routing Tables .................................................................................49
Example: Creating Routing Tables ...........................................................51
Configuring Static Routes ...............................................................................51
Specifying the Destination of the Static Route .........................................54
Specifying the Next Hop of the Static Route ............................................54
Specifying an Independent Preference for a Static Route ........................55
Example: Configuring Independent Preferences for an
IPv4 Static Route ........................................................................56
Example: Configuring Independent Preferences for an
IPv6 Static Route ........................................................................56
Specifying an LSP as the Next Hop for a Static Route ..............................57
Installing a Static Route into More than One Routing Table .....................58
Examples: Installing a Static Route into More than
One Routing Table......................................................................59
Configuring a Connectionless Network Services Static Route...................59
Example: Configuring a Static CLNS Route........................................60
Specifying Static Route Options ...............................................................60
Specifying the Route Metric ..............................................................63
Specifying the Route Preference .......................................................63
Specifying Community Information ..................................................64
Specifying the AS Path ......................................................................65
Specifying the OSPF Tag ...................................................................66
Specifying Whether a Route Is Installed in the
Forwarding Table .......................................................................66
Specifying Whether the Route Is Permanently Installed in the
Forwarding Table .......................................................................67
Specifying Whether Inactive Routes Are Removed from the
Routing or Forwarding Table ......................................................67
Specifying When the Route Can Be Readvertised..............................68
Specifying When the Route Can Be Resolved to a Prefix
That Is Not Directly Connected ...................................................69
Configuring Bidirectional Forwarding Detection................................69
Configuring a Default Route.....................................................................71
Propagating Static Routes into Routing Protocols ....................................71
Examples: Configuring Static Routes .......................................................72

viii ! Table of Contents


Table of Contents

Configuring Aggregate Routes ........................................................................74


Specifying the Destination of the Aggregate Route ..................................76
Specifying Aggregate Route Options ........................................................76
Specifying the Route Metric ..............................................................77
Specifying the Route Preference .......................................................77
Specifying a Next Hop for a Route ....................................................77
Specifying Community Information ..................................................78
Specifying the AS Path ......................................................................79
Specifying Which AS Numbers to Include in the
Aggregate Route .........................................................................80
Specifying the OSPF Tag ...................................................................80
Specifying Whether Inactive Routes Are Removed
from the Routing or Forwarding Table........................................80
Specifying Policy with Aggregate Routes .................................................81
Advertising Aggregate Routes ..................................................................82
Configuring Generated Routes........................................................................82
Specifying the Destination of a Generated Route .....................................84
Specifying Generated Route Options .......................................................84
Specifying the Route Metric ..............................................................85
Specifying the Route Preference .......................................................85
Specifying a Next Hop for a Route ....................................................86
Specifying Community Information ..................................................86
Specifying the AS Path ......................................................................87
Specifying the OSPF Tag ...................................................................88
Specifying Which AS Numbers to Include in the
Generated Route.........................................................................88
Specifying Whether Inactive Routes Are Removed from the
Routing or Forwarding Table ......................................................88
Specifying Policy with Generated Routes .................................................89
Configuring Martian Addresses ......................................................................90
Adding Martian Addresses .......................................................................90
Deleting Martian Addresses .....................................................................91
Configuring a Flow Route...............................................................................92
Configuring the Match Condition .............................................................92
Configuring the Action.............................................................................94
Validating Flow Routes ............................................................................95
Applying a Filter to a Forwarding Table .........................................................95

Chapter 5 Configuring Other Protocol-Independent


Routing Properties 97
Configuring the AS Number ...........................................................................98
Configuring the Router Identifier....................................................................98
Configuring AS Confederation Members ........................................................99
Configuring Route Recording for Flow Aggregation........................................99
Creating Routing Table Groups.....................................................................100
Examples: Creating Routing Table Groups .............................................101
Configuring How Interface Routes Are Imported into
Routing Tables.......................................................................................101
Configuring Multicast Scoping ......................................................................103
Example: Configuring Multicast Scoping................................................103
Enable Multicast on an Interface ..................................................................104
Configuring Additional Source-Specific Multicast Groups..............................104
Configuring Multicast Forwarding Cache Limits ...........................................105

Table of Contents ! ix
JUNOS 8.1 Routing Protocols Configuration Guide

Configuring Per-Packet Load Balancing ........................................................105


Examples: Configuring Per-Packet Load Balancing ................................107
Enabling Unicast Reverse-Path Forwarding Check .......................................108
Example: Configuring Unicast RPF .......................................................109
Configuring Graceful Restart ........................................................................110
Configuring a Route Distinguisher................................................................110
Configuring a Dynamic Tunnel.....................................................................111
Configuring Logging for the Routing Protocol Process ..................................112
Examples: Configuring Logging for the
Routing Protocol Process.................................................................112
Configuring Route Resolution.......................................................................113
Enabling Nonstop Routing............................................................................113
Tracing Global Routing Protocol Operations.................................................114
Examples: Tracing Global Routing Protocol Operations .........................115

Chapter 6 Logical Router Overview 117


Overview .....................................................................................................117
Logical Routers and Virtual Routers .......................................................119
Logical Router Configuration Statements .....................................................119
Minimum Logical Router Configuration........................................................119
Logical Router Configuration Guidelines.......................................................120
Configuring a Logical Router ........................................................................121
Logical Router Configuration Statement .......................................................121
logical-routers ........................................................................................121

Chapter 7 Summary of Protocol-Independent Routing Properties


Configuration Statements 123
active ...........................................................................................................123
aggregate .....................................................................................................124
as-path .........................................................................................................126
auto-export ..................................................................................................127
autonomous-system.....................................................................................128
bfd-liveness-detection ..................................................................................129
brief .............................................................................................................130
color.............................................................................................................130
community ..................................................................................................131
confederation...............................................................................................132
destination-networks....................................................................................133
disable .........................................................................................................133
discard .........................................................................................................134
dynamic-tunnels ..........................................................................................135
export ..........................................................................................................135
export-rib.....................................................................................................136
fate-sharing ..................................................................................................137
filter .............................................................................................................138
flow..............................................................................................................139
forwarding-cache ........................................................................................140
forwarding-table...........................................................................................140
full ...............................................................................................................140
generate.......................................................................................................141
graceful-restart.............................................................................................142
import..........................................................................................................142
import-policy ...............................................................................................143

x ! Table of Contents
Table of Contents

import-rib ....................................................................................................143
independent-domain....................................................................................144
input ............................................................................................................144
install ...........................................................................................................145
instance-export ............................................................................................145
instance-import............................................................................................146
interface.......................................................................................................147
interface (multicast enabling) ................................................................147
interface (multicast scoping) ..................................................................148
interface-routes ............................................................................................149
lsp-next-hop .................................................................................................150
martians ......................................................................................................151
maximum-paths...........................................................................................152
maximum-prefixes.......................................................................................153
metric ..........................................................................................................153
metric (Aggregate, Generated, or Static Route) ......................................154
metric (Qualified Next Hop on Static Route) ..........................................154
multicast ......................................................................................................155
no-install ......................................................................................................155
no-readvertise ..............................................................................................155
no-retain ......................................................................................................156
nonstop-routing ...........................................................................................156
options.........................................................................................................157
p2mp-lsp-next-hop.......................................................................................158
passive .........................................................................................................158
policy ...........................................................................................................159
preference....................................................................................................160
prefix ...........................................................................................................161
qualified-next-hop ........................................................................................161
readvertise ...................................................................................................162
resolution.....................................................................................................163
resolution-ribs ..............................................................................................163
resolve .........................................................................................................164
restart-duration ............................................................................................164
retain ...........................................................................................................165
rib ................................................................................................................166
rib (General) ..........................................................................................166
rib (Route Resolution) ............................................................................167
rib-group ......................................................................................................168
rib-groups ....................................................................................................169
route-distinguisher-id ...................................................................................170
route-record .................................................................................................170
router-id.......................................................................................................171
routing-options.............................................................................................171
scope ...........................................................................................................172
source-address .............................................................................................172
ssm-groups ..................................................................................................173
static ............................................................................................................174
tag................................................................................................................176
threshold .....................................................................................................177
traceoptions ............................................................................................. 178
tunnel-type...................................................................................................180
unicast-reverse-path .....................................................................................180

Table of Contents ! xi
JUNOS 8.1 Routing Protocols Configuration Guide

Part 3 Routing Instances

Chapter 8 Routing Instances Overview 183

Chapter 9 Routing Instances Configuration Guidelines 185


Routing Instances Minimum Configuration ..................................................191
BGP .......................................................................................................192
IS-IS .......................................................................................................192
Layer 2 VPN ..........................................................................................193
LDP .......................................................................................................193
MSDP ....................................................................................................194
OSPF .....................................................................................................194
OSPFv3 .................................................................................................195
PIM........................................................................................................195
RIP ........................................................................................................196
VPLS......................................................................................................196
Configuring Multiple Instances of BGP .........................................................197
Example: Configuring Multiple Instances of BGP ...................................197
Configuring Multiple Instances of IS-IS .........................................................198
Example: Configuring Multiple Routing Instances of IS-IS ......................199
Configuring Multiple Instances of LDP..........................................................203
Configuring Multiple Instances of MSDP.......................................................204
Configuring Multiple Instances of OSPF .......................................................204
Example: Configuring Multiple Routing Instances of OSPF ....................205
Configuring Multiple Instances of PIM ..........................................................208
Configuring Multiple Instances of RIP...........................................................209
Configuring an Instance ...............................................................................209
Configuring VPNs .........................................................................................211
Configuring an Instance Type ......................................................................211
Configuring a VRF Routing Instance ......................................................212
Configuring a Non-VPN VRF Routing Instance .......................................213
Configuring a VPLS Routing Instance.....................................................214
Configuring a Route Distinguisher................................................................215
Configuring Filter-Based Forwarding ............................................................215
Configuring Class-of-Service-Based Forwarding............................................217
Configuring Secondary VRF Import and Export Policy .................................218
Configuring Policy-Based Export for Routing Instance..................................219
Example: Configuring Policy-Based Export for an
Overlapping VPN.............................................................................219
Example: Configuring Policy-Based Export for a
Nonforwarding Instance..................................................................221
Configuring a VRF Table Label .....................................................................224
Configuring a VRF Target .............................................................................224
Configuring an OSPF Domain ID..................................................................225
Examples: Configuring an OSPF Domain ID ..........................................229
Configuring Route Limits for Routing Tables ................................................231
Configuring an Independent Domain ...........................................................231

xii ! Table of Contents


Table of Contents

Chapter 10 Summary of Routing Instances


Configuration Statements 233
description ..................................................................................................233
forwarding-options.......................................................................................233
instance-type ...............................................................................................234
interface.......................................................................................................235
no-vrf-advertise ............................................................................................235
protocols ......................................................................................................236
route-distinguisher .......................................................................................237
routing-instances..........................................................................................238
routing-options.............................................................................................238
vrf-export.....................................................................................................238
vrf-import ....................................................................................................239
vrf-table-label ...............................................................................................239
vrf-target ......................................................................................................240

Part 4 Interior Gateway Protocols

Chapter 11 IS-IS Overview 243


IS-IS Standards .............................................................................................243
IS-IS Terminology.........................................................................................244
ISO Network Addresses................................................................................244
IS-IS Packets.................................................................................................245
IS-IS Extensions to Support Traffic Engineering ...........................................246
Configuring IS-IS IGP Shortcuts ..............................................................246
IS-IS Extensions to Support Route Tagging ...................................................246

Chapter 12 IS-IS Configuration Guidelines 247


Minimum IS-IS Configuration .......................................................................250
Configuring IS-IS Authentication ..................................................................251
Configuring Interface-Specific Properties .....................................................253
Enabling Checksum .....................................................................................254
Configuring the CSNP Interval......................................................................254
Configuring Mesh Groups .............................................................................254
Modifying the Interface Metric .....................................................................255
Enabling Wide Metrics for Traffic Engineering .............................................255
Configuring Route Preferences.....................................................................256
Configuring a Prefix Export Limit.................................................................256
Configuring IS-IS Levels on an Interface .......................................................256
Disabling IS-IS on a Level.......................................................................257
Example: Disabling IS-IS on a Level ................................................258
Advertising Interface Addresses Without Running IS-IS .........................258
Configuring Authentication for Hello Packets.........................................259
Modifying the Hello Interval ..................................................................259
Modifying the Hold-Time Value .............................................................260
Modifying the IS-IS Metric......................................................................260
Modifying the Traffic Engineering Metric...............................................260
Configuring the Priority for Becoming the Designated Router................261
Configuring the Router to Advertise Without Running IS-IS ...................261
Modifying the LSP Interval ...........................................................................261

Table of Contents ! xiii


JUNOS 8.1 Routing Protocols Configuration Guide

Configuring Label Distribution Protocol Synchronization .............................262


Modifying the LSP Lifetime ..........................................................................262
Advertising Label-Switched Paths into IS-IS..................................................263
Configuring the Router to Appear Overloaded..............................................263
Configuring the SPF Delay ...........................................................................264
Configuring Graceful Restart ........................................................................264
IS-IS and Multipoint Configurations ..............................................................265
Configuring Point-to-Point Interfaces ...........................................................265
Configuring IS-IS Traffic Engineering Attributes ...........................................265
Configuring IS-IS to Use IGP Shortcuts ...................................................266
Disabling IS-IS Support for Traffic Engineering ......................................266
Install IPv4 Routes into the Multicast Routing Table ..............................267
Configuring the BFD Protocol.......................................................................267
Configuring Loose Authentication Check......................................................268
Disabling Adjacency Holddown Timers ........................................................269
Configuring Hello Packet Padding ................................................................269
Configuring Support for Connectionless Network Services ...........................270
Example: Configuring CLNS for IS-IS .....................................................271
Disabling IS-IS ..............................................................................................272
Disabling IPv4 Routing.................................................................................273
Disabling IPv6 Routing.................................................................................273
Configuring IS-IS Routing Policy ...................................................................274
Examples: Configuring IS-IS Routing Policy ...........................................274
Configuring IS-IS Multicast Topologies..........................................................276
Example: Configuring IS-IS Multicast Topologies ...................................278
Configuring IS-IS IPv6 Unicast Topologies ....................................................278
Installing a Default Route to the Nearest Level 1/Level 2 Router...................280
Tracing IS-IS Protocol Traffic ........................................................................280
Examples: Tracing IS-IS Protocol Traffic ................................................282

Chapter 13 Summary of IS-IS Configuration Statements 285


authentication-key .......................................................................................285
authentication-type ......................................................................................286
bfd-liveness-detection ..................................................................................287
checksum.....................................................................................................288
clns-routing ..................................................................................................288
csnp-interval ................................................................................................289
disable .........................................................................................................290
disable (IS-IS).........................................................................................290
disable (LDP Synchronization) ...............................................................291
export ..........................................................................................................291
external-preference......................................................................................292
graceful-restart.............................................................................................293
hello-authentication-key ...............................................................................294
hello-authentication-type..............................................................................295
hello-interval ................................................................................................296
hello-padding ...............................................................................................296
hold-time .....................................................................................................297
hold-time (IS-IS) .....................................................................................297
hold-time (LDP Synchronization) ...........................................................298
ignore-attached-bit .......................................................................................298
interface.......................................................................................................299
ipv4-multicast ..............................................................................................300
ipv4-multicast-metric ...................................................................................300

xiv ! Table of Contents


Table of Contents

ipv4-multicast-rpf-routes ..............................................................................301
ipv6-multicast-metric ...................................................................................301
ipv6-unicast .................................................................................................302
ipv6-unicast-metric ......................................................................................302
isis ...............................................................................................................303
label-switched-path ......................................................................................303
ldp-synchronization .....................................................................................304
level .............................................................................................................304
level (Global IS-IS) ..................................................................................305
level (IS-IS Interfaces) ............................................................................306
loose-authentication-check...........................................................................306
lsp-interval ...................................................................................................307
lsp-lifetime ...................................................................................................307
mesh-group..................................................................................................308
metric ..........................................................................................................308
no-adjacency-holddown ...............................................................................309
no-authentication-check ...............................................................................309
no-csnp-authentication.................................................................................310
no-hello-authentication ................................................................................310
no-ipv4-multicast .........................................................................................311
no-ipv4-routing ............................................................................................311
no-ipv6-multicast .........................................................................................312
no-ipv6-routing ............................................................................................312
no-ipv6-unicast ............................................................................................313
no-psnp-authentication ................................................................................313
no-unicast-topology......................................................................................314
overload.......................................................................................................314
passive .........................................................................................................315
point-to-point ...............................................................................................315
preference....................................................................................................316
prefix-export-limit ........................................................................................316
priority.........................................................................................................317
reference-bandwidth ....................................................................................317
rib-group ......................................................................................................318
shortcuts ......................................................................................................318
spf-delay ......................................................................................................319
te-metric ......................................................................................................319
topologies ....................................................................................................320
traceoptions .................................................................................................321
traffic-engineering........................................................................................323
wide-metrics-only ........................................................................................324

Chapter 14 ES-IS Overview 325


Overview .....................................................................................................325

Chapter 15 ES-IS Configuration Guidelines 327


Minimum ES-IS Configuration ......................................................................328
Configuring ES-IS on an Interface.................................................................329
Configuring the Hello Interval ......................................................................329
Configuring the End System Configuration Timer ........................................329
Configuring Graceful Restart for ES-IS ..........................................................330
Configuring the Preference ..........................................................................330
Tracing ES-IS Protocol Traffic .......................................................................330

Table of Contents ! xv
JUNOS 8.1 Routing Protocols Configuration Guide

Chapter 16 Summary of ES-IS Configuration Statements 333


disable .........................................................................................................333
esct ..............................................................................................................333
esis ..............................................................................................................334
graceful-restart .............................................................................................334
hello-interval ................................................................................................335
interface.......................................................................................................335
preference....................................................................................................335
traceoptions .................................................................................................336

Chapter 17 OSPF Overview 339


OSPF Protocol Overview ..............................................................................339
OSPF Version 3 .....................................................................................340
OSPF Standards ...........................................................................................341
OSPF Area Terminology...............................................................................342
Areas .....................................................................................................342
Area Border Routers ..............................................................................342
Backbone Areas.....................................................................................343
AS Boundary Routers.............................................................................343
Stub Areas .............................................................................................343
Not-So-Stubby Areas ..............................................................................343
Transit Areas .........................................................................................343
OSPF Routing Algorithm ..............................................................................344
OSPF Packets...............................................................................................345
OSPF Packet Header..............................................................................345
Hello Packets .........................................................................................346
Database Description Packets................................................................346
Link-State Request Packets ....................................................................346
Link-State Update Packets .....................................................................347
Link-State Acknowledgment Packets .....................................................347
Link-State Advertisement Packet Types .................................................347
External Metrics ...........................................................................................348
Designated Router .......................................................................................348
OSPF Extensions to Support Traffic Engineering ..........................................348
Configuring OSPF IGP Shortcuts ............................................................348

Chapter 18 OSPF Configuration Guidelines 349


Minimum OSPF Configuration .....................................................................354
Configuring the Backbone Area and Other Areas .........................................354
Configuring the Backbone Area .............................................................355
Configuring a Nonbackbone Area ..........................................................355
Configuring a Stub Area.........................................................................355
Configuring a Not-So-Stubby Area..........................................................356
Configuring an OSPF Virtual Link ..........................................................357
Example: Configuring an OSPF Virtual Link ....................................358
Disabling NSSA Support on an ASBR ABR ....................................................358
Configuring OSPF on Router Interfaces ........................................................358
Configuring an Interface on a Broadcast or
Point-to-Point Network....................................................................359
Configuring an Interface on a Point-to-Multipoint Network ....................359
Configuring an Interface on a Nonbroadcast,
Multiaccess Network .......................................................................360
Configuring an OSPF Demand Circuit Interface .....................................361

xvi ! Table of Contents


Table of Contents

Configuring Authentication for OSPF ...........................................................361


Example: Configuring a Transition of MD5 Keys ...................................363
Example: Configuring MD5 Authentication............................................364
Configuring Authentication for OSPFv3........................................................364
Configuring a Prefix Export Limit.................................................................365
Configuring the Priority for Becoming the Designated Router ......................365
Configuring Route Summarization ...............................................................366
Modifying the Interface Metric .....................................................................366
Configuring Route Preferences.....................................................................367
Configuring OSPF Timers.............................................................................368
Modifying the Hello Interval ..................................................................368
Controlling the LSA Retransmission Interval ..........................................369
Modifying the Router Dead Interval.......................................................369
Specifying the Transit Delay ..................................................................369
Configuring the BFD Protocol.......................................................................370
Configuring Label Distribution Protocol Synchronization
with the IGP...........................................................................................371
Configuring Graceful Restart ........................................................................371
Configuring the SPF Delay ...........................................................................372
Advertising Interface Addresses Without Running OSPF ..............................373
Advertising Label-Switched Paths into OSPF ................................................373
Configuring the Router to Appear Overloaded..............................................374
Enabling OSPF Traffic Engineering Support .................................................375
Example: Enabling OSPF Traffic Engineering Support ...........................376
Modifying the Traffic Engineering Metric .....................................................376
Configuring OSPF Routing Policy .................................................................377
Configuring OSPF Routing Table Groups ......................................................378
Configuring a Sham Link..............................................................................378
Configuring a Peer Interface.........................................................................379
Tracing OSPF Protocol Traffic ......................................................................379
Examples: Tracing OSPF Protocol Traffic...............................................381

Chapter 19 Summary of OSPF Configuration Statements 383


area..............................................................................................................383
area-range....................................................................................................384
authentication ..............................................................................................385
authentication-type ......................................................................................386
bfd-liveness-detection ..................................................................................387
dead-interval ................................................................................................388
default-lsa ....................................................................................................389
default-metric...............................................................................................390
demand-circuit.............................................................................................391
disable .........................................................................................................391
disable (LDP Synchronization) ...............................................................391
disable (OSPF) .......................................................................................392
domain-id ....................................................................................................392
domain-vpn-tag............................................................................................393
export ..........................................................................................................393
external-preference......................................................................................394
graceful-restart.............................................................................................395
hello-interval ................................................................................................396
hold-time .....................................................................................................397
ignore-lsp-metrics ........................................................................................397
import..........................................................................................................398

Table of Contents ! xvii


JUNOS 8.1 Routing Protocols Configuration Guide

interface.......................................................................................................399
interface-type...............................................................................................400
ipsec-sa ........................................................................................................401
label-switched-path ......................................................................................402
ldp-synchronization .....................................................................................402
lsp-metric-into-summary ..............................................................................403
md5 .............................................................................................................403
metric ..........................................................................................................404
metric-type ..................................................................................................405
neighbor ......................................................................................................406
no-nssa-abr ..................................................................................................406
no-summaries ..............................................................................................406
nssa .............................................................................................................407
ospf..............................................................................................................407
ospf3............................................................................................................408
overload.......................................................................................................408
passive .........................................................................................................409
peer-interface...............................................................................................410
poll-interval..................................................................................................410
preference....................................................................................................411
prefix-export-limit ........................................................................................411
priority.........................................................................................................412
reference-bandwidth ....................................................................................412
retransmit-interval .......................................................................................413
rib-group ......................................................................................................414
route-type-community .................................................................................414
sham-link .....................................................................................................415
sham-link-remote.........................................................................................415
shortcuts ......................................................................................................416
simple-password ..........................................................................................416
spf-delay ......................................................................................................417
stub..............................................................................................................418
summaries ...................................................................................................419
te-metric ......................................................................................................419
traceoptions .................................................................................................420
traffic-engineering........................................................................................423
transit-delay .................................................................................................424
transmit-interval ..........................................................................................425
type-7 ..........................................................................................................425
virtual-link....................................................................................................426

Chapter 20 RIP Overview 427


RIP Protocol Overview .................................................................................427
RIP Standards ..............................................................................................428
RIP Packets ..................................................................................................428

Chapter 21 RIP Configuration Guidelines 429


Minimum RIP Configuration ........................................................................431
Defining RIP Global Properties .....................................................................431
Defining RIP Neighbor Properties ................................................................432
Configuring Authentication ..........................................................................432
Modifying the Incoming Metric ....................................................................433
Configuring RIP Timers ................................................................................433

xviii ! Table of Contents


Table of Contents

Configuring the Number of Route Entries in an


Update Message ....................................................................................434
Accepting Packets Whose Reserved Fields Are Nonzero ..............................434
Configuring Update Messages ......................................................................435
Configuring Routing Table Groups................................................................435
Applying Import Policy ................................................................................435
Configuring Group-Specific Properties..........................................................436
Applying Export Policy ..........................................................................436
Controlling Route Preference.................................................................437
Modifying the Outgoing Metric ..............................................................437
Configuring Graceful Restart ........................................................................437
Configuring the BFD Protocol.......................................................................438
Disabling Strict Address Check.....................................................................439
Tracing RIP Protocol Traffic .........................................................................439
Example: Tracing RIP Protocol Traffic ...................................................440
Example: Configuring RIP ............................................................................440

Chapter 22 Summary of RIP Configuration Statements 443


any-sender ...................................................................................................443
authentication-key .......................................................................................444
authentication-type ......................................................................................445
bfd-liveness-detection ..................................................................................446
check-zero....................................................................................................447
export ..........................................................................................................448
graceful-restart .............................................................................................448
group ...........................................................................................................449
holddown.....................................................................................................450
import..........................................................................................................450
message-size ................................................................................................451
metric-in ......................................................................................................452
metric-out ....................................................................................................452
neighbor ......................................................................................................453
no-check-zero...............................................................................................453
preference....................................................................................................454
receive .........................................................................................................455
rib-group ......................................................................................................456
rip ................................................................................................................456
route-timeout ...............................................................................................457
send.............................................................................................................458
traceoptions .................................................................................................459
update-interval .............................................................................................461

Chapter 23 RIPng Overview 463


RIPng Protocol Overview .............................................................................463
RIPng Standards ..........................................................................................464
RIPng Packets ..............................................................................................464

Chapter 24 RIPng Configuration Guidelines 465


Minimum RIPng Configuration.....................................................................466
Defining RIPng Global Properties .................................................................467
Defining RIPng Neighbor Properties.............................................................467
Modifying the Incoming Metric ....................................................................467
Configuring RIPng Timers ............................................................................468

Table of Contents ! xix


JUNOS 8.1 Routing Protocols Configuration Guide

Configuring Update Messages ......................................................................469


Applying Import Policy ................................................................................469
Configuring Group-Specific Properties..........................................................469
Applying Export Policy ..........................................................................470
Controlling Route Preference.................................................................470
Modifying the Outgoing Metric ..............................................................470
Configuring Graceful Restart ........................................................................471
Tracing RIPng Protocol Traffic......................................................................471
Example: Configuring RIPng ........................................................................472

Chapter 25 Summary of RIPng Configuration Statements 473


export ..........................................................................................................473
graceful-restart .............................................................................................474
group ...........................................................................................................475
holddown.....................................................................................................475
import..........................................................................................................476
metric-in ......................................................................................................476
metric-out ....................................................................................................477
neighbor ......................................................................................................477
preference....................................................................................................478
receive .........................................................................................................478
ripng ............................................................................................................479
route-timeout ...............................................................................................479
send.............................................................................................................480
traceoptions .................................................................................................481
update-interval .............................................................................................483

Chapter 26 ICMP Router Discovery Overview 485


ICMP Router Discovery Standards................................................................485
Operation of a Router Discovery Server .......................................................486
Router Advertisement Messages ..................................................................486

Chapter 27 ICMP Router Discovery Configuration Guidelines 487


Minimum Router Discovery Server Configuration ........................................488
Configuring the Addresses to Include in Router Advertisements ..................488
Configuring the Frequency of Router Advertisements ..................................489
Modifying the Router Advertisement Lifetime..............................................489
Tracing ICMP Protocol Traffic.......................................................................490
Example: Tracing ICMP Protocol Traffic ................................................491

Chapter 28 Summary of ICMP Router


Discovery Configuration Statements 493
address ........................................................................................................493
advertise ......................................................................................................494
broadcast .....................................................................................................494
disable .........................................................................................................495
ignore ..........................................................................................................495
ineligible ......................................................................................................495
interface.......................................................................................................495
lifetime ........................................................................................................496
max-advertisement-interval .........................................................................496
min-advertisement-interval ..........................................................................497

xx ! Table of Contents
Table of Contents

multicast ......................................................................................................497
priority.........................................................................................................498
router-discovery ...........................................................................................498
traceoptions .................................................................................................499

Chapter 29 Neighbor Discovery Overview 503


Neighbor Discovery Standards .....................................................................503
Router Discovery .........................................................................................504
Address Resolution ................................................................................504
Redirect.................................................................................................504

Chapter 30 Neighbor Discovery Configuration Guidelines 505


Minimum Neighbor Discovery Configuration ...............................................506
Configuring Router Advertisement on an Interface ......................................506
Configuring the Hop Limit............................................................................507
Modifying the Default Router Lifetime .........................................................507
Enabling Stateful Autoconfiguration .............................................................507
Configuring the Frequency of Router Advertisements ..................................508
Modifying the Reachable Time Limit............................................................508
Modifying the Frequency of Neighbor Solicitation Messages ........................509
Configuring Prefix Information ....................................................................509
Setting the Prefix for Onlink Determination ..........................................509
Setting the Prefix for Stateless Address Autoconfiguration.....................510
Configuring the Preferred Lifetime ........................................................510
Configuring the Valid Lifetime ...............................................................510
Tracing Router Advertisement Traffic ..........................................................511

Chapter 31 Summary of Neighbor Discovery Router Advertisement Configuration


Statements 513
autonomous .................................................................................................513
current-hop-limit ..........................................................................................514
default-lifetime.............................................................................................514
interface.......................................................................................................515
managed-configuration ................................................................................516
max-advertisement-interval .........................................................................516
min-advertisement-interval ..........................................................................517
no-autonomous ............................................................................................517
no-managed-configuration ...........................................................................517
no-on-link.....................................................................................................517
no-other-stateful-configuration .....................................................................517
on-link..........................................................................................................518
other-stateful-configuration ..........................................................................518
preferred-lifetime .........................................................................................519
prefix ...........................................................................................................519
reachable-time .............................................................................................520
retransmit-timer...........................................................................................520
router-advertisement ...................................................................................521
traceoptions .................................................................................................522
valid-lifetime ................................................................................................524

Table of Contents ! xxi


JUNOS 8.1 Routing Protocols Configuration Guide

Part 5 BGP

Chapter 32 BGP Overview 527


BGP Standards .............................................................................................528
Autonomous Systems ..................................................................................529
AS Paths and Attributes................................................................................529
External and Internal BGP............................................................................529
BGP Routes ..................................................................................................530