Home

Initial Configuration and Platform Troubleshooting

image

Contents

1. Only allow SNMP access from the SNMP server Only allow SNMP access over the fxp0 interface Use a community string of test Send all link up and down related traps to the SNMP server These requirements are met with the following SNMP configuration edit snmp lab r1 show interface fxp0 0 Task 5 Configure Network Management and NTP 23 community test clients 10 0 200 2 32 trap group interface categories link targets 10 0 200 2 By default SNMP requests will be accepted over any interface Specifying one or more inter face names under the interface keyword will cause SNMP requests on nonmatching interfaces to be ignored Similarly all clients are allowed to make requests by default specifying one or more client IP addresses after the clients keyword causes requests from nonmatching clients to be ignored This example includes a trap group named interface that has been configured to send link up and down traps to the SNMP server by including the link keyword under the categories hierarchy By default both SNMP versions 1 and 2 traps will be sent but either version can be forced through appropriate trap group configuration SNMP uses community strings for authentication Failure to include a community string will result in the denial of all SNMP requests while specifying the wrong community string will result in otherwise legitimate requests being denied so take care when configuring your SNMP community
2. SECRET DATA ssh rsa 1024 65537 14507521839282798432482521835023055326381401663452058669080886491465 544700784392 81114055822376198290722320666268020211763429857348456378696103199986915461962494 35479692894437417780898017483440313841107367122670080439972894195679320796753410 731222833899141869327583231170906047985814682544941905107416839803283 root SECRET DATA radius server 10 0 1 102 secret 9 fQnEhrevL SECRET DATA login class ops idle timeout 5 permissions network allow commands show interfaces deny commands traceroute telnet ssh user lab uid 2000 class superuser authentication encrypted password 1 nNISN o70GTEhEF5sOcgjS9pOLf0 SECRET DATA user ops uid 2002 class ops authentication encrypted password 1 SgJQQ VYXXLPf9 TMOnb2ohWx0J SECRET DATA user proctor uid 2001 class superuser services ssh telnet 36 Chapter 1 Initial Configuration and Platform Troubleshooting syslog user any emergency file messages any notice file auth authorization info archive size 5m files 5 processes routing failover other routing engine ntp authentication key 101 type md5 value 9 fQ39SyKM87 SECRET DATA server 10 0 200 2 key 101 trusted key 101 chassis redundancy routing engine 0 master alarm management ethernet link down yellow interfaces fxp0 unit 0 family inet address
3. Verify the Lab Account To verify the lab account we log out as root and reconnect as the lab user root r1 exit logout r1 ttyd0 login lab Password Last login Fri Mar 8 16 20 47 on ttyd0 JUNOS 5 2B3 1 built 2001 12 28 18 50 44 UTC lab r1 gt Though the previous capture indicates that your user account is functional notice the termi nology automatic login in the event of RADIUS failure in Table 1 1 shown earlier This should cause you to wonder what would happen if the RADIUS server should become unreachable To simulate a RADIUS failure the shared secret is changed to foo and the lab account is retested edit system radius server lab r1 set 10 0 1 102 secret foo 16 Chapter 1 Initial Configuration and Platform Troubleshooting edit system radius server lab r1 commit and quit commit complete Exiting configuration mode lab r1 gt quit r1 ttyd0 login lab Password Local password Last login Mon Apr 1 12 36 17 on ttyd0 JUNOS 5 2B3 1 built 2001 12 28 18 50 44 UTC lab r1 gt Note the second prompt that asks for a local password This indicates that automatic login is not functional The problem lies in the omission of the password keyword in the system s authentication order statement Adding password after radius will cause the router to automatically verify the user s password against the local password database when access to the RADIUS server fails To meet the configurat
4. Depending upon the specifics of your test bed you may want to configure symbolic name mappings on the terminal server to simplify the task of reverse telnetting This will enable you to use symbolic names in lieu of specifying the reverse telnet port and IP address on the command line In the preceding example these name to address mappings have already been configured on the terminal server ip host r1 2001 10 0 1 101 ip host r2 2002 10 0 1 101 ip host r3 2003 10 0 1 101 ip host r4 2004 10 0 1 101 ip host r5 2005 10 0 1 101 ip host r6 2006 10 0 1 101 ip host r7 2007 10 0 1 101 Task 1 Access Routers Using a Terminal Server 5 In this configuration you can see that port 2001 on the terminal server which maps to its first asynchronous port is associated with the symbolic name of r1 Now to establish a reverse telnet connection to the console port of router 1 the user need only enter r1 on the terminal server s command line If host mappings have not been configured on your terminal server you will need to specify the correct port identifier and IP address on the command line as shown here cert ts telnet 10 0 1 101 2001 Trying 10 201 1 253 2001 Open lt operator hits enter gt Amnesiac ttyd0 login In the foregoing example you can see that the reverse telnet session to r1 has succeeded in that the router is now presenting its login prompt PPS The Amnesiac prompt shown in the previous example is indicative of a r
5. Initial System Configuration 51 authentication key 200 type md5 value 9 KoAWX YgJHqfVwqfTZCAVWL SECRET DATA broadcast client trusted key 200 Because manual synchronization is not permitted in this example you must include the boot server statement to allow initial clock synchronization at boot You must also configure your router as a broadcast client to tell it to listen to NTP broadcasts If all goes according to plan you should have NTP associations like the following example on all your routers after they are rebooted it should be noted that the server type t is now set to broadcast b root r1 gt show ntp associations remote refid st t when poll reach delay offset jitter 10 0 1 102 LOCAL 1 11 b 64 377 0 000 39 204 1 045 Ensure that all routers display the correct value for local time You should assume that you are testing in Sunnyvale California edit system root r2 set time zone America Los_Angeles There is no CLI option for America Sunnyvale but Los Angeles and the San Francisco Bay Area are both on Pacific Time so this does the trick Without using DNS ensure that you can ping the proctor workstation using the name proctor You must configure a static host mapping to accomplish this task because DNS services are not available in this example edit system lab r2 set static host mapping proctor inet 10 0 200 1 Configure the router to ignore management interface link status and enable t
6. remember that non zero values in the offset and delay fields of the show ntp associations command indicate successful communication and when in use authentication between your router and the NTP server As a final tip when all else has failed you may want to try deacti vating and reactivating the NTP configuration stanza to ensure that recent changes are in fact being put into effect after you commit them the boot server option coupled with a reboot to get your router s clocks initially synchronized to the NTP server s Once you have obtained synchronization you can simply remove the boot server statement and move on with your life with no one being the wiser as to how initial synchronization was achieved A A possible shortcut to the problem of manual clock setting would be the use of P Set Your Local Time Zone Even though your router is now synchronized with the NTP server you will likely find that the local time is being displayed incorrectly because of the router s default use of the UTC time zone The following commands show the router s view of the local time before and after the correct local time zone is configured lab r1 gt show system uptime Current time 2002 04 02 01 35 42 UTC System booted 2002 04 01 18 33 27 UTC 07 02 15 ago Protocols started 2002 04 01 18 33 17 UTC 07 02 25 ago Last configured 2002 04 02 01 25 14 UTC 00 10 28 ago by lab 1 35AM up 7 02 2 users load averages 0 00 0 00 0 00 28
7. values and pay special attention to the community string case as the strings are case sensitive By default SNMP clients are authorized to view only Read and write access SNMP get and put can be granted by including the read write keyword under the community definition as shown next edit snmp lab r1 set community test authorization read write Verify SNMP The verification of correct SNMP configuration can be difficult without access to the SNMP management station There are a few things you can do to test your SNMP configuration how ever You can start by verifying that the router is now listening on UDP port 161 which is the port associated with SNMP requests lab r1 gt show system connections Active Internet connections including servers Proto Recv Q Send Q Local Address Foreign Address state tcp4 0 0 23 are LISTEN tcp4 0 0 22 Eor LISTEN tcp4 0 O 10 0 1 1 22 10 0 1 100 2346 ESTABLISHED tcp4 0 O 666 et LISTEN 24 Chapter 1 Initial Configuration and Platform Troubleshooting udp46 0 0 161 0 0 udp4 0 0 500 udp46 0 0 1025 udp4 0 0 1024 udp4 0 0 udp4 0 0 123 Proper trap group operation can be verified by monitoring traffic on the system s OoB interface using the following steps First open a second telnet session to the router for the purpose of mon itoring UDP traffic on the router s fxp0 interface This is done using the following command root rl gt monitor traffic interface f
8. 10 0 200 2 secret juniper The resulting system authentication configuration is now displayed edit system root r2 show radius server 10 0 200 2 secret 9 UbYoDi z39JG39ApREdbs SECRET DATA edit system root r2 show authentication order authentication order radius By omitting the password option from the system s authentication order statement you ensure that the local password database is not automatically consulted when the RADIUS server becomes unreachable which results in the operator being prompted for a local password in the event of RADIUS connectivity problems Configuration Groups As previously mentioned J UNOS software is extremely flexible and this flexibility can translate to the ability to satisfy a configuration requirement using what can appear to be orthogonal approaches Configuration groups provide excellent proof of this concept in that they allow common elements of a configuration to be specified at the edit groups configuration hierarchy Once configured these groups can then be applied to the appropriate level of the system s con figuration to affect the inheritance of group related configuration You can override this group inheritance through explicit configuration where needed For example consider the following configuration group called authentication which will result in the required RADIUS and authentication order behavior when applied as shown edit lab r1 show groups authen
9. Advanced button in the SSH Quick Connect dialog box followed by selecting the Create Identity File option in the resulting Advanced SSH Options dialog box which will open the SecureCRT Key Generation Wizard The wizard will guide you through the remaining key generation steps When the Wiz ard completes you will be prompted to enter the directory and key filenames for your newly generated secret and public keys When using SecureCRT version 3 1 2 the default location and filename for the secret key is C Program Files SecureCRT 3 0 identity The public key will be stored in the same directory with a pub file extension As described in the previous For a Unix like Operating System section the contents of this public key file should be loaded into 14 Chapter 1 Initial Configuration and Platform Troubleshooting the router using the procedures outlined in the Configuring the Root Account section earlier in this chapter You will be asked to accept a new host key when testing SSH connectivity to the router for the first time as shown in Figure 1 3 FIGURE 1 3 Accepting anew host key New Host Key xi F The remote host 10 0 1 1 has not been 2S registered Do you want to accept this key Cancel Accept Once After accepting the host key you will be prompted to enter the pass phrase associated with the session s private key When the correct pass phrase is entered you should be logged in as the root user
10. Chapter 1 Initial Configuration and Platform Troubleshooting Though this author often works well past 6 00 P M it would be rare to see me working at 1 35 A M The following commands correctly set the router s time zone based on the location of the test bed edit lab r1 set system time zone America Los_Angeles lab r1 commit and quit commit complete Exiting configuration mode lab r1 gt show system uptime Current time 2002 04 02 01 36 00 UTC System booted 2002 04 01 18 33 27 UTC 07 02 33 ago Protocols started 2002 04 01 18 33 17 UTC 07 02 43 ago Last configured 2002 04 02 01 35 57 UTC 00 00 03 ago by lab 5 36PM up 7 03 2 users load averages 0 08 0 02 0 01 The router s time of day now shows the correct value of 5 36 P M Task 6 Perform General Maintenance and Software Upgrade At this stage your basic system configuration should be completed and its operational status confirmed If you have not already looked for hardware anomalies or alarms now might be a good time to issue some chassis hardware related show commands to confirm that all is good to go with your gear You should also take note of the JUNOS software version on each router because an upgrade or a downgrade may be necessary to meet the requirements of your scenario The following commands illustrate the most common ways of accessing the state of your hard ware The syntax and output can vary depending on M series router type but the genera
11. Individual Stanzas or Stanza Components Using load override is pretty straightforward but there are many instances when the wholesale replacement of the entire router configuration is not desired It is also possible to paste in com plete stanzas or components from a particular stanza though this can be a bit tricky The fol lowing example shows the cut and paste of just the routing options stanza We start on r2 where we display the contents of its routing options stanza edit lab r2 show routing options static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise lt l The contents of the stanza which is highlighted are then selected and copied into your emu lation program s capture buffer To paste this snippet into r1 we use load merge terminal and must be careful to include the configuration hierarchy routing options before perform ing the paste operation so the router knows where to put the information that is pasted In this example we first delete the existing routing options stanza on r1 to demonstrate that the paste was successful edit root rl delete routing options edit root r1 show routing options edit root rl load merge terminal Type D to end input routing options static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise lt carriage return gt 40 Chapter 1 Initial Configuration and Platform Troubleshooting lt control d gt load complete edi
12. OC 3 SONET MM Based on this display you can confirm you are working on an M5 router with a single FPC only one FPC is supported on an M5 equipped with a four port Fast Ethernet PIC and a four port OC 3 SONET PIC It is worth noting that this router as with all MSs M10s M160s and M40e platforms is IP II equipped Because the IP II is needed for various enhanced functions such as firewalls and VPNs the absence of an IP II in any router making up your test bed is cer tainly worth noting Similarly you should take note of any service PICs available in your test bed For instance noting what routers have a tunnel PIC installed can be real handy if you later find yourself trying to decide on which pair of routers to use when a tunnel application is thrown your way Next let s check the software versions on all the machines lab r2 gt show version Hostname r2 Model m5 JUNOS base 4 4R1 5 30 Chapter 1 Initial Configuration and Platform Troubleshooting JUNOS Kernel Software Suite 4 4R1 5 JUNOS Routing Software Suite 4 4R1 5 JUNOS Packet Forwarding Engine Support 4 4R1 5 JUNOS Online Documentation Files 4 4R1 5 While r2 is probably free from rust it is running a rather old version of JUNOS software Candidates taking the JNCIP exam are expected to know how to perform command line based FTP transfers and should be prepared to perform JUNOS software upgrades or downgrades using jinstall jbundle and individua
13. and presented with a shell prompt Configuring the Lab Account The following commands establish the lab account and associate the user with the superuser login class edit system root rl set login user lab class superuser edit system root rl set login user lab authentication plain text password New password Retype new password Because the lab root and ops accounts are to be authenticated through RADIUS you must now configure the RADIUS server s properties The RADIUS related parameters needed for this task are configured with the following commands edit system lab r1 set radius server 10 0 200 2 secret jni If your test bench does not offer RADIUS support you can reduce the delay P associated with the failed RADIUS authentication requests by setting the retry and timeout parameters to 1 Configuring the Lab Account 15 To tell the system that RADIUS authentication is to be used first you must specify radius as the first entry in the system s authentication order list with the following command edit system root rl set authentication order radius The resulting lab account and RADIUS configuration are shown next root r1 show login user lab class superuser authentication encrypted password 1 nNISN o70GTEhEF5sOcgjS9pOLf0 SECRET DATA root r1 show radius server 10 0 200 2 secret 9 NQVsS4Pfz36A SECRET DATA edit system root r1 show authentication order authentication order radius
14. logged in Remote system type is UNIX Using binary mode to transfer files Task 6 Perform General Maintenance and Software Upgrade 31 Now that we are logged into the FTP server let s see what packages are available by obtain ing a file listing ftp gt Is 200 PORT command successful 150 Opening ASCII mode data connection for bin Is rw r r 1 ftpuser ftpusers 19538662 Apr 2 04 23 4 1R1 5 domestic 1s120 tgz rw r r 1 ftpuser ftpusers 19512433 Apr 2 04 23 4 1R1 5 domestic pcm110 tgz rw r r 1 ftpuser ftpusers 433758 Apr 2 04 23 jbase 4 0B3 domestic tgz rw r r 1 ftpuser ftpusers 7927224 Apr 2 04 23 jbundle 3 4R3 2 tgz rw r r 1 ftpuser ftpusers 6530202 Apr 2 04 23 jbundle 4 0R4 tgz rw r r 1 ftpuser ftpusers 7774361 Apr 2 04 23 jbundle 4 1R1 5 tgz rw r r 1 ftpuser ftpusers 8687924 Apr 2 04 23 jbundle 4 2R2 4 domestic tgz rw r r 1 ftpuser ftpusers 9187867 Apr 2 04 23 jbundle 4 3R1 4 domestic tgz rw r r 1 ftpuser ftpusers 9202130 Apr 2 04 23 jbundle 4 3R2 domestic tgz rw r r 1 ftpuser ftpusers 9208526 Apr 2 04 23 jbundle 4 3R3 domestic tgz rw r r 1 ftpuser ftpusers 9871826 Apr 2 04 23 jbundle 4 4B1 2 domestic tgz rw r r 1 ftpuser ftpusers 10094406 Apr 2 04 23 jbundle 4 4R1 5 domestic tgz rw r r 1 ftpuser ftpusers 6530202 Apr 2 04 23 jbundle 4_OR4 tgz rw r r 1 ftpuser ftpusers 24217723 Apr 2 04 23 jbundle 5 2R2 3 domestic signed tgz rw r r 1 ftpuser ftpusers 19685721 Apr 2 04 23
15. new password edit root rl set system services ssh protocol version v2 edit lab r2 set system services ssh root login deny Case Study Initial System Configuration 47 edit lab r2 show system services ssh root login deny protocol version v2 telnet edit root r2 show system root authentication encrypted password 1 RTyGDGYG ukqr37VGRgtohedS1ru0k SECRET DATA edit root r2 show system login class noc permissions view user lab class superuser authentication encrypted password 1 L6ZKKWYI GxEI 7YzXes2JXDcHJvz7 SECRET DATA user noc class noc authentication encrypted password 1 Z5SbleVg R8 iZMCAMAOTdEeS2svvd0 SECRET DATA By default all users except root can log in via console telnet or SSH The root user can log in by using either the console or SSH by default so to meet the criteria for this case study you must disable root s ability to log in using SSH The correct SSH version must also be set in this example because the default JUNOS software behavior will support SSH versions 1 and 2 Ensure that all users are first authenticated through RADIUS and that the local password database is not automatically consulted should the RADIUS server become unreachable The RADIUS secret is juniper edit system root r2 set authentication order radius 48 Chapter 1 Initial Configuration and Platform Troubleshooting edit system root r2 set radius server
16. that is configured during the examination You should use the terminal server whenever you are performing router maintenance Such as upgrading J UNOS software or when routing problems cause telnet access problems Console Connections The OoB Out of Band management topology is illustrated in Figure 1 1 Based on this figure you can see that the IP address of the terminal server is 10 0 1 101 and that its asynchronous interfaces are connected in ascending order to the console ports of each router that is associated with your test pod The testing center will provide you with both user EXEC and privileged EXEC mode pass words for the terminal server or their equivalents should a non IOS based terminal server be in use You ll sometimes need the privileged EXEC mode login to reset connections when you receive error messages about ports being busy or when you see messages about connections being refused The following is an example of a typical login session to the terminal server telnet 10 0 1 101 Trying 10 0 1 101 Connected to 10 0 1 101 Escape character is User Access Verification Password cert ts gt enable Password cert ts 4 Chapter 1 Initial Configuration and Platform Troubleshooting FIGURE 1 1 The Outof Band OoB management network RADIUS Proctor SNMP FTP etc Workstation 10 0 200 0 24 Candidate Workstation Firewall 10 0 1 0 24 Terminal Server Console Ports fxp0
17. 10 0 1 1 24 Your Initial System Configuration snmp interface fxp0 0 community test clients 10 0 200 2 32 trap group interface categories link targets 10 0 200 2 routing options static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise 37 The Case for Cut and Paste on the Exam Time is acritical factor in the J NCIP examination and any technique that can save time is well worth deploying during the lab Deciding when a configuration is common enough to warrant pasting into the remaining routers is a decision that has to be made by each individual and should be based on factors such as your familiarity with using load merge override terminal and the potential time savings that are expected Cut and paste is a double edged sword and as with any such tool you can cause serious problems by using it incorrectly in an effort to save time For example forgetting to change a lo0 address can result in duplicate router IDs RIDs in a subsequent OSPF scenario and this type of problem can be very difficult to diagnose in the heat of battle Generally speaking itis advisable to paste configurations or particular stanzas into a text editor such as Word Pad where you can easily edit the variables to suit the router that you plan to paste the configuration into 38 Chapter 1 Initial Configuration and Platform Troubleshooting Using Cut and Paste The following commands illustrate how a
18. 101 2002 Connection refused by remote host pod2 ts show line Tty Typ O AN ADM BWN FE CO E T U oo gt x lt 535355 N N Tx Rx 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 9600 pod2 ts clear line 2 confirm y OK pod2 ts r2 Trying r2 10 0 1 101 2002 Open lt user hits enter gt Amnesiac ttyd0 login Task 1 Access Routers Using a Terminal Server A Modem Roty AccO AccI Uses O O O OOO ON RFP RFP RFP RP RFP wWwwspt Ww oO N a ooo oO Noise 0 0 2031 1546 72050 19691 oooooococooo0o0 ooo eoo Overruns 0 0 0 0 0 0 0 0 0 0 0 0 3 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 7 Reverse telnet sessions connect the user to a tty asynchronous terminal line on the terminal server You will want to focus on tty sessions that have an asterisk next to them because this character indicates the line is in use To clear a line enter the clear line n command at the privileged EXEC mode prompt and confirm the clear by entering y when prompted 8 Chapter 1 Initial Configuration and Platform Troubleshooting A Caution About Clearing Sessions The failure described in Listing 1 1 was simulated by trying to open a second telnet session to port 2002 on the terminal server without first
19. 14682544941905107416839803283 root SECRET DATA lab r2 show system services ssh telnet Verify the Root Account To confirm operation of the root account you should test local authentication using the root password and test SSH authentication using an appropriately configured session on your ter minal emulator The SSH session settings used in the SecureCRT application are shown in Fig ure 1 2 it should be noted that RSA public key has been selected as the authentication method as opposed to password based authentication FIGURE 1 2 SSH session settings for the root account Protocol h Hostname fooi Advanced Port j2 I Use Firewall to connect Usemame frost Cipher Unsave Password Authentication I Show quick connect on start up IV Save session Cancel Generating SSH Key Pairs The method used to generate your own SSH public private key pair will vary based on SSH ver sion and the particular client software being used Task 3 Create User Accounts 13 For a Unix like operating system Generate a 1024 bit SSH version 1 RSA key pair using the ssh keygen program with the b flag set to 1024 and the t flag set to rsal By default the resulting public key will be written to HOME ssh identity pub The contents of this file would then be loaded into the router using the techniques described in the section Configuring the Root Account earlier in this chapter Typical ssh keygen output i
20. 4 ntp boot server 10 0 1 102 authentication key 200 type md5 value 9 KoAWX YgJHqfVwqfTZCAVWL SECRET DATA broadcast client trusted key 200 chassis alarm management ethernet link down ignore interfaces fxp0 unit 0 54 Chapter 1 Initial Configuration and Platform Troubleshooting family inet address 10 0 1 2 24 snmp interface fxp0 0 community public community private authorization read write trap group foo version v1 categories authentication targets 10 0 200 2 routing options static route 10 0 200 0 24 next hop 10 0 1 102 You should now ensure that the remaining routers in your test bed have a similar initial system configuration The use of cut and paste using load override terminal is recommended as a time saving technique You should attempt to validate as much of your initial configuration as possible using the techniques demonstrated in this chapter because silly mistakes such as fat fingering the IP address associated with the proctor subnet are hard to spot when simply view ing the router s configuration Spot the Issues Review Questions 55 Spot the Issues Review Questions 1 Will the following login class provide superuser privileges while preventing the user s ability to enter the configuration mode edit system login lab t1 show class test permissions all deny commands config 2 Will this syslog configuration
21. JNCIP J unipere Networks Certified Internet Professional Study Guide Chapter 1 by Harry Reynolds This book was originally developed by J uniper Networks Inc in conjunction with Sybex Inc It is being offered in electronic format because the original book ISBN 0 7821 4073 4 is now out of print Every effort has been made to remove the original publisher s name and references to the original bound book and its accompanying CD The original paper book may still be available in used book stores or by contacting J ohn Wiley amp Sons Publishers www wiley com Copyright 2003 6 by J uniper Networks Inc All rights reserved This publication may be used in assisting students to prepare for aJ uniper J NCIP exam but J uniper Networks Inc cannot warrant that use of this publication will ensure passing the relevant exam Initial Configuration and Platform Troubleshooting JNCIP LAB SKILLS COVERED IN THIS CHAPTER Use terminal server to access router console ports Configure OoB management network and host name Create user accounts and system authentication options Configure syslog parameters Configure network management and NTP Determine JUNOS software version and perform upgrades RON Re RS AS aR Configure chassis alarms and redundancy In this chapter you will be exposed to configuration tasks that are characteristic of those encountered when installing a brand new M series or T series router These initial
22. al Configuration and Platform Troubleshooting routers To rectify this situation you must add a static route on each router for the 10 0 200 24 proctor subnet using the firewall router 10 0 1 102 as the next hop This route should have the no readvertise tag to ensure the router does not inadvertently redistribute the static route in a later lab scenario The following commands create the necessary static route and show the resulting configuration change edit routing options static route root r1l set 10 0 200 24 next hop 10 0 1 102 no readvertise edit routing options root r1 show static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise To confirm that the OoB management network and static routing are operational try to ping the RADIUS FTP server on the proctor subnet like this root rl gt ping 10 0 200 2 PING 10 0 200 2 10 0 200 2 56 data bytes 64 bytes from 10 0 200 2 icmp_seq 0 ttl 255 time 1 228 ms 64 bytes from 10 0 200 2 icmp_seq 1 ttl 255 time 0 701 ms C 10 0 200 2 ping statistics 2 packets transmitted 2 packets received 0 packet loss round trip min avg max stddev 0 701 0 964 1 228 0 264 ms Based on the successful results shown in this output things are now looking good for your OoB management network Task 3 Create User Accounts When the OoB management network and its associated routing are confirmed to be operational you will likely want to configure various user accounts T
23. al Configuration and Platform Troubleshooting umount altconfig not currently mounted Copying config to altconfig this may take a few minutes The following filesystems were archived config Resulting alarms and redundancy configuration The configuration stanzas that resulted from the tasks in this example are shown next edit lab sanjose show system processes routing failover other routing engine edit lab sanjose show chassis redundancy routing engine 0 master edit lab sanjose show chassis alarm management ethernet link down yellow Your Initial System Configuration After performing the configuration tasks outlined in this chapter you have a configuration that resembles the complete router configuration example shown in Listing 1 4 If you have not already done so you will now need to replicate the common portions of this configuration in all of the routers that make up your test bed so that this baseline functionality is available throughout your entire network before proceeding to the next chapter The highlighted redun dancy options shown in this example are supported only on the M20 M40e M160 and T640 platforms Listing 1 4 r1 s Initial Configuration edit lab r1 show no more system host name r1 time zone America Los_Angeles authentication order radius password Your Initial System Configuration 35 root authentication encrypted password 1 j5nxWQ9r p6XQ9eKqpgsGe51DYySGI
24. alter the default size of the messages file edit system syslog lJab t1 show archive size 10m files 5 user any emergency file messages any notice authorization info archive size 128m files 10 file rl cli interactive commands any archive files 5 3 You must ensure that your router s cold start trap is sent to a non directly attached SNMP server What command is needed 4 Your router is not synchronizing with the NTP server after a reboot What could be wrong with this NTP configuration You may assume that the secret is correctly configured lab t1 show system ntp boot server 10 0 1 201 authentication key 10 type md5 value 9 2XoJDn6AIEy SECRET DATA server 10 0 1 201 key 10 version 3 SECRET DATA 56 Chapter 1 Initial Configuration and Platform Troubleshooting 5 How can you configure an M series router to source all SNMP trap messages from its lo0 inter face without affecting the source addresses of other traffic edit lab r4 show snmp community public clients 0 0 0 0 0 restrict 10 0 1 102 32 trap options source address 100 Spot the Issues Answers 57 Spot the Issues Answers 1 No The deny commands regular expression incorrectly matches on the exact sequence config which is not a valid command A user in this class would still be able to use the configure command The correct regular expression would be configure 2 Yes The global syslog archive parameters ha
25. and display the resulting configuration Listing 1 2 Commands for Configuring the Ops Account edit system login root rl set user ops class ops authentication plain text password New password Retype new password edit system login root rl set class ops permissions network edit system login class root rl set ops idle timeout 5 edit system login class root rl set ops allow commands show interfaces 18 Chapter 1 Initial Configuration and Platform Troubleshooting edit system login class root r1 set ops deny commands traceroute telnet ssh edit system login class root rl1 up edit system login root r1 show user ops uid 2002 class ops authentication encrypted password 1 SgJQQ VYXXLPf9 TMOnb2ohWx0J SECRET DATA edit system login root r1 show class ops idle timeout 5 permissions network allow commands show interfaces deny commands traceroute telnet ssh DTE permissions care should be taken to avoid the use of the predefined login classes operator read only superuser and unauthorized The parameters associated with these accounts cannot be modified Depending on the UNOS software version being used you may be allowed to configure customized settings for the predefined login classes but these changes will not actually have any effect on their default permissions lt a Because these user account requirements involve custom settings of login class This configuratio
26. authentication related traps to the SNMP server Configure all routers as broadcast NTP clients and authenticate all messages using MD5 key ID 200 and key value juniper Ensure that manual clock synchronization steps are not required For this example the NTP service is provided by 10 0 1 102 Ensure that all routers display the correct value for local time You should assume that you are testing in Sunnyvale California Without using DNS ensure that you can ping the proctor workstation using the name proctor Configure the router to ignore management interface link status and enable the auxiliary console port for vt100 terminals Configuration Examples Each of the case study requirements will now be echoed back along with the configuration com mands that would typically be used to correctly meet the operational criteria Due to the innate flexibility of JUNOS software multiple solutions to the case study requirements will normally exist for example the operator could opt to deploy configuration groups for common config uration elements such as the RADIUS server and authentication order The examples shown next attempt to show the most common and straightforward solutions to the configuration 44 Chapter 1 Initial Configuration and Platform Troubleshooting tasks An example of configuration group usage to support RADIUS will be provided to dem onstrate this flexibility and indirectly to demonstrate why a JNCIP candi
27. authorization info Assign each router a hostname of the form rn where n is a router number in the range of 1 through 7 inclusive Configure the fxp0 network according to Figure 1 1 and ensure that you and the proctor station will have telnet access to all seven routers using the OoB management network Modify the syslog parameters to log all interactive CLI commands to a file called rn c1i where n is equal to the router number Configure the CLI log to permit four archived copies that will be no larger than 128K and ensure that CLI related logging is also sent to Case Study Initial System Configuration 43 10 0 200 2 which is providing a remote syslog service All other syslog parameters should be left at their default setting Create user accounts and permissions based on Table 1 2 TABLE 1 2 Case Study User Accounts User Password Permissions Notes lab superuser Telnet SSH version 2 only with password and console root superuser Console only noc View only Telnet SSH version 2 only with password and console Ensure that all users are first authenticated through RADIUS and that the local password database is not automatically consulted should the RADIUS server become unreachable The RADIUS secret is juniper Allow SNMP access from all IP addresses but only allow SNMP request over the fxp0 interface Use a community value of public for read only access and private for read write access Send only version 1
28. choose to edit the ssh authorized_keys file manually to add the public RSA key by escaping to a shell and using vi or you could transfer the key file to the router using the load key fi le option with an appropriate URL such as ftp user password hostname fi le name However the CLI paste approach demonstrated here is generally considered to be the most straightforward edit system root authentication root rl set ssh rsa key data pasted from terminal And now to enable the SSH service on the router which by default will support both SSH version 1 and 2 edit system root rl set system services ssh Since the use of SSH public key authentication for the root account has no effect on local console based logins we also set the required root password edit system root r1l set root authentication plain text password New password Retype new password 12 Chapter 1 Initial Configuration and Platform Troubleshooting The following is the resulting configuration for the root account and the SSH service edit system root rl show root authentication encrypted password 1 n 1x3 RNtF9UDICsMSAL8gi gA31 SECRET DATA ssh rsa_ 1024 65537 14507521839282798432482521835023055326381401663452058669080886491465544700784392 81114055822376198290722320666268020211763429857348456378696103199986915461962494 35479692894437417780898017483440313841107367122670080439972894195679320796753410 7312228338991418693275832311709060479858
29. clearing the existing session The operator should have simply entered the session number 2 in this case to switch back to the previously established connection to resume the connection to router r2 Clearing sessions in the manner described can result in session numbers that are no longer directly related to router numbers which can be very confusing for example the session associated with r2 might end up being number 8 When reverse telnet problems are detected many candidates find it simpler to simply log out of an IOS based terminal server which causes the terminal server to clear all existing connections after the user confirms After reconnecting to the terminal server the telnet ses sions to all routers can be reestablished in the correct numeric sequence Task 2 Configure the OoB Management Network Once you have opened reverse telnet sessions to each of the routers assigned to your test bed you will want to configure and test the fxp0 based OoB management network and assign the correct hostname to each router Once again referring to Figure 1 1 you can see that each router s fxp0 interface connects to a shared Ethernet segment with a logical IP subnet of 10 0 1 0 24 Also the host value of each fxp0 address must match the router number so router 1 will have the address 10 0 1 1 assigned to its fxp0 interface The OoB management network must be reachable from the proctor s workstation which is attached to subnet 10 0 200 24 be
30. configuration and main tenance tasks include setting up the Out of Band OoB management network user accounts and permissions the Network Time Protocol NTP syslog parameters chassis alarms redun dancy and maintaining JUNOS software You will learn numerous JNCIP level configuration requirements along with the commands needed to correctly configure a Juniper Networks router for that task Wherever possible you will also be provided with techniques that can be used to verify the operation and functionality of the various elements that make up your system s configuration The chapter concludes with a case study that is designed to closely approximate a typical JNCIP initial system configuration scenario A router configuration that meets all case study requirements is provided at the end of the case study for comparison with your own configuration To kick things off you will need to access the console ports of your assigned routers using reverse telnet connections though a terminal server As you establish initial contact with each of your routers you should make note of the types of routers provided in your test bed and be on guard for any symptoms of hardware malfunction or aberrant operation r Faulty hardware is never intentionally given to aJ NCIP candidate but hardware P failures do occur In view of the time pressures associated with the J NCIP prac tical examination you would be wise to bring suspicions of faulty hardware to
31. date is graded on results and not on their particular configuration approach Assign each router a hostname of the form rn where n is a router number in the range of 1 through 7 inclusive edit root host set system host name r2 edit root host show system host name host name r2 Configure the fxp0 network according to Figure 1 1 and ensure that you and the proctor station will have telnet access to all seven routers using the OoB management network edit root r2 set system services telnet edit interfaces root r2 set fxpO unit 0 family inet address 10 0 1 2 24 edit routing options root r2 set static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise The resulting OoB related configuration is now as follows edit root r2 show system services telnet edit root r2 show interfaces fxp0 unit 0 family inet address 10 0 1 2 24 root r2 show routing options static route 10 0 200 0 24 Case Study Initial System Configuration 45 next hop 10 0 1 102 no readvertise Modify the syslog parameters to log all interactive CLI commands to a file called rn c1i where n is the router number Configure the CLI log to permit four archived copies that will be no larger than 128K and ensure that CLI related logging is also sent to 10 0 200 2 which is providing a remote syslog service All other syslog parameters must be left at their default setting edit system syslog root r2 set fil
32. e current time you can manually set your router s clock as shown next lab r1 gt set date 200204011545 Mon Apr 1 15 45 00 UTC 2002 Task 5 Configure Network Management and NTP 27 Now assuming that you have set the local router s clock accurately and quickly the two clocks should be within the limits needed for NTP synchronization However since the NTP protocol requires several successful packet exchanges before allowing synchronization you will have to wait approximately five minutes to determine your relative success in this matter Because NTP slowly steps a system s clock into synchronization it may take a seemingly inordinate amount of time to get the proper NTP synchronization on all of your routers You can tell when things are working correctly when you see a display containing an asterisk in the left margin as shown next lab r1 gt show ntp associations remote refid st t when poll reach delay offset jitter 10 0 200 2 LOCAL 0 1l1u 10 64 17 0 491 12 991 10 140 NTP operation is confusing to many exam candidates and the delays associated with normal NTP operation have been known to cause some candidates to assume that they have made a mis take when things do not work as expected right away When all else fails remember that NTP works slowly and that the system clocks have to be within 128 seconds of each other to get things synchronizing Also keep in mind that time zone settings will affect your local clock and
33. e r2 cli interactive commands any edit system syslog root r2 set file r2 cli archive files 4 edit system syslog lab r1 set host 10 0 200 2 interactive commands any The modified syslog parameters are now displayed edit system syslog lab r1 show user any emergency host 10 0 200 2 interactive commands any l file messages any notice authorization info file r2 cli interactive commands any archive files 4 l Create user accounts and permissions based on Table 1 3 46 Chapter 1 Initial Configuration and Platform Troubleshooting TABLE 1 3 Case Study User Accounts User pass permissions Notes lab superuser Telnet SSH version 2 only with password and console root superuser Console only noc View only Telnet SSH version 2 only with password and console The commands used to correctly configure and display user account and permission settings are shown in Listing 1 5 Listing 1 5 User Account Configuration edit system root r2 set root authentication plain text password New password Retype new password edit system login root r2 set user lab class superuser root r2 set user lab authentication plain text password New password Retype new password edit system login root r2 set class noc permissions view edit system login root r2 set user noc class noc edit system login root r2 set user noc authentication plain text password New password Retype
34. ed key 101 It should be noted that the boot server statement has been omitted from the previous con figuration because its presence will cause the router to automatically synchronize its clock upon bootup using the ntpdate command which would violate the NTP configuration requirements listed at the beginning of this example Verify NTP To verify NTP operation commit your changes and issue the show ntp associations com mand as shown next lab r1 gt show ntp associations remote refid st t when poll reach delay offset jitter 10 0 200 2 LOCAL 0 1lu 25 64 37 0 492 2542804 4000 00 26 Chapter 1 Initial Configuration and Platform Troubleshooting Many operators find the output of this command to be confusing The key to this display is the overall fate of the clock selection and synchronization process which is indicated by various char acters in the far left margin In this example the presence of a space in front of the 10 0 200 2 address indicates that the peer has been rejected due to failed sanity checks or a stratum level that is too high Synchronization with a particular NTP server is indicated with an asterisk in the left margin and this is what we need to see for 10 0 200 2 before we can move on However the non zero delay and offset fields in the previous display indicate that NTP mes sages are being received from the server and that the messages are being correctly authenti cated which is a good start So what i
35. er will prevent the use of multicast or broadcast client modes Task 5 Configure Network Management and NTP 25 In this example you will configure NTP on the local router to meet the following criteria The router must synchronize to the NTP server The router s clock cannot set automatically at boot NTP version 4 must be used with MDS authentication using key ID 101 and a key value of jni The following configuration commands get us started on these criteria edit system ntp lab r1 set server 10 0 200 2 key 101 edit system ntp lab r1 set trusted key 101 edit system ntp lab r1 set authentication key 101 type md5 value jni The first command tells the router to operate as an NTP client and to include authentication key 101 in the messages it sends to the NTP server identified as 10 0 200 2 The second com mand specifies that messages containing a key ID of 101 are to be trusted and the last command defines the key parameters by specifying the use of message digest 5 MDS and the key value of jni Since NTP version 4 is the default for unicast NTP in JUNOS software 5 2 no NTP ver sion related configuration is necessary but explicit version configuration is never a bad idea when you are unsure about the system s default version The resulting NTP configuration is shown next edit system ntp lab r1 show authentication key 101 type md5 value 9 Q5J23 tleWLxd SECRET DATA server 10 0 200 2 key 101 trust
36. he auxiliary console port for vt100 terminals edit chassis alarm lab r2 set management ethernet link down ignore edit system ports lab r2 set auxiliary type vt100 The Completed Case Study Configuration The configuration of r2 is shown in Listing 1 6 This configuration satisfies all case study requirements 52 Chapter 1 Initial Configuration and Platform Troubleshooting Listing 1 6 Case Study Configuration for r2 edit lab r2 show no more version 5 2R2 3 system host name r2 time zone America Los_Angeles authentication order radius ports auxiliary type vt100 root authentication encrypted password 1 RTyGDGYG ukqr37VGRgtohedS1ru0k SECRET DATA radius server 10 0 200 2 secret 9 UbYoDi z39JG39ApREdbs SECRET DATA login class noc permissions view user lab uid 2000 class superuser authentication encrypted password 1 L6ZKKWYI GxEI 7YzXes2JXDcHJvz7 SECRET DATA user noc uid 2001 class noc authentication encrypted password 1 Z5SbleVg R8 iZMCAMAOTdEeS2svvd0 SECRET DATA static host mapping proctor inet 10 0 200 1 Case Study Initial System Configuration 53 services ssh root login deny protocol version v2 telnet syslog user any emergency host 10 0 200 2 interactive commands any file messages any notice authorization info file r2 cli interactive commands any archive files
37. hese accounts should make use of both local and remote authentication and should also verify your ability to use al 1 ow and deny com mands to provide local control of user authorization levels In the example shown in Table 1 1 the following accounts and permissions will be config ured to demonstrate typical user account configuration and validation techniques Task 3 Create User Accounts 11 TABLE 1 1 User Account Parameters User Password Class Permission Notes root root superuser SSH with 1024 bit RSA public key authentication Local password and RADIUS authentication criteria are the same as for user lab lab lab superuser RADIUS local password with auto matic login in the event of RADIUS failure RADIUS secret is jni ops operator Can view standard show interfaces RADIUS local password 5 minute output and conduct ping testing only inactivity time out Configuring the Root Account As noted in Table 1 1 the root user s account must be configured for SSH public key and RADIUS local password authentication The following commands configure the root account with the required SSH version 1 RSA public key version 2 RSA keys are not supported at the time of this writing so a version 1 key must be loaded It is important to note that the operator must manually add the opening and closing quotes so that white spaces in the key string do not cause syntax errors if the key is pasted from a terminal buffer You could also
38. hind a firewall router Because each router also requires a unique name it makes sense to configure the router s hostname along with the OoB addressing and telnet service at this point The following com mands entered on r1 will set the correct IP address and hostname for this exercise and will enable the telnet service root gt configure Entering configuration mode edit root set system host name rl edit root set interfaces fxp0 unit 0 family inet address 10 0 1 1 24 edit root set system services telnet Task 2 Configure the OoB Management Network 9 The resulting configuration is now as follows edit root show interfaces fxpO unit 0 family inet address 10 0 1 1 24 edit root show system host name r1 services telnet syslog user any emergency file messages any notice authorization info With the correct configuration now in r1 you decide to commit the changes to place them into effect edit root commit and quit commit complete Exiting configuration mode root rl gt After the candidate configuration has been successfully committed the router s command prompt takes on the newly assigned hostname Although the configuration steps performed thus far will make telnet access available to the candidate the router currently does not have a route back to the proctor s subnet which will prevent proctor initiated telnet connection to your 10 Chapter 1 Initi
39. host Host name lookup service using domain name server interfaces Show interface information ops r1 gt show interfaces Physical interface fe 0 0 0 Enabled Physical link is Down Interface index 10 SNMP ifIndex 13 Link level type Ethernet MTU 1514 Speed 100mbps ops r1 gt show interfaces fxp0 detail error permission denied for interfaces detail ops r1 gt ping 10 0 1 102 PING 10 0 1 102 10 0 1 102 56 data bytes 64 bytes from 10 0 1 102 icmp_seq 0 ttl 255 time 0 560 ms C 10 0 1 102 ping statistics 1 packets transmitted 1 packets received 0 packet loss round trip min avg max stddev 0 560 0 560 0 560 0 000 ms ops rl gt tra unknown command ops rl1 gt tel unknown command ops rl gt 20 Chapter 1 Initial Configuration and Platform Troubleshooting Task 4 Configure Syslog Parameters Now that your user accounts are configured and you have confirmed that they work you can move on to adjusting the default syslog parameters The default syslog configuration on an M series router will be similar to this example edit lab r1 show system syslog user any emergency file messages any notice authorization info The default syslog settings will display emergency level messages for all facility classes to any user that is logged in and will log at the notice and info levels to the filemessages for all facility classes and for the authorization class respectively The default archive se
40. ion criteria you must enter the following command to add password to the router s authentication order list edit lab r1 set system authentication order password edit lab r1 show system authentication order authentication order radius password edit lab r1 commit and quit commit complete Exiting configuration mode With the changes committed we now retest the lab login lab r1 gt quit r1 ttyd0 Configure the Ops Account 17 login lab Password Last login Mon Apr 1 12 41 09 on ttyd0O JUNOS 5 2B3 1 built 2001 12 28 18 50 44 UTC lab r1 gt The user is now automatically logged in using the local password database when access to the RADIUS server is broken After testing you should reset the shared RADIUS secret to the correct value as specified in Table 1 1 shown earlier P The local password database is not consulted when the RADIUS server returns DTE an access reject message because of an unknown username or incorrect password being used You will need to remove or deactivate the system s RADIUS configuration or change the authentication order to allow local logins if you feel that the RADIUS server has been misconfigured with regard to a given account s username or password Configure the Ops Account You will now configure a user called ops that is only authorized to view the output of show interfaces and conduct ping testing The commands in Listing 1 2 configure the ops account
41. jinstal1 4 4R1 5 domestic tgz rw r r 1 ftpuser ftpusers 21543210 Apr 2 04 23 jinstal1 5 2R2 3 domestic tgz rw r r 1 ftpuser ftpusers 21530984 Apr 2 04 23 jinstal1 5 0B1 2 domestic tgz 226 Listing completed In this example there are many packages from which to choose but it has already been determined that a 5 x version of jinstal1 package is needed to satisfy the requirements of this example In this case the operator takes the easy way out by using the globbing character in conjunction with the mget FTP transfer option which results in a prompt for the transfer of each matching file ftp gt mget jinstal1 mget jinstal1 4 4R1 5 domestic tgz n mget jinstal1 5 2R2 3 domestic tgz y 200 PORT command successful 150 Opening BINARY mode data connection for jinstal1 5 2R2 3 domestic tgz 21543210 bytes 32 Chapter 1 Initial Configuration and Platform Troubleshooting 226 Transfer completed 21543210 bytes received in 22 07 seconds 953 15 Kbytes s ftp gt quit Now that the correct 5 x jJinstall package has been transferred to r2 the operator instructs the router to load the new software and to automatically reboot so that the new code is put into effect lab r2 gt request system software add jinstal1 5 2R2 3 domestic tgz reboot Installing package var home lab jinstal1 5 2R2 3 domestic tgz WARNING This package will load JUNOS 5 2R2 3 software WARNING It will save JUNOS configuration files log file
42. l concept and results are similar for all Juniper Networks routers First verify that there are no chassis alarms lab r1 gt show chassis alarms No alarms currently active The lack of alarms indicates the router is free from serious hardware and environmental defects Next check out the general hardware environment of each router lab r1 gt show chassis environment Class Item Status Measurement Task 6 Perform General Maintenance and Software Upgrade 29 Power Power Supply A OK Power Supply B Absent Temp FPC Slot 0 OK 33 degrees C 91 degrees F FEB OK 34 degrees C 93 degrees F PS Intake OK 29 degrees C 84 degrees F PS Exhaust OK 31 degrees C 87 degrees F Fans Left Fan 1 OK Spinning at normal speed Left Fan 2 OK Spinning at normal speed Left Fan 3 OK Spinning at normal speed Left Fan 4 OK Spinning at normal speed Misc Craft Interface OK The missing power supply B is generally not an issue in a test bed so all looks normal here For even more information on the router s hardware issue the following command lab r1 gt show chassis hardware Hardware inventory Item Version Part number Serial number Description Chassis 50779 M5 Midplane REV 03 710 002650 HF2739 Power Supply A Rev 04 740 002497 LK23083 AC Display REV 04 710 001995 AV8231 Host bb00000792cd4801 teknor FEB REV 09 710 002503 HF2037 Internet Processor II FPC 0 PIC 0 REV 04 750 002992 HD4121 4x F E 100 BASE TX PIC 1 REV 03 750 002971 HE5549 4x
43. l jbundle components such as a jroute package when called for In this sample scenario all routers must be running some form of 5 x release so it looks like r2 is in line for some new bits pretty quickly Upgrading or downgrading an M series router between 4 x and 5 x releases requires the use of a jinstall package due to the resulting change from a out to ELF binaries use of a jinstal1 package will affect both the system binaries and the JUNOS software components Within a 4 x or 5 x release the operator should use either a jbund1e or individual j package for upgrade or downgrade Attempting to upgrade or downgrade between 4 x and 5 x releases using a jbundle package will result in wasted time as the install script will abort without making any modifica tions to the system being upgraded or downgraded Since r2 is running a 4 x release we know that we need to locate a 5 x related jinstall on the FTP server The following capture illustrates typical FTP session commands and the actual file transfer The capture begins by showing the initial FTP login lab r2 gt ftp 10 0 200 2 Connected to 10 0 200 2 220 cert lab NcFTPd Server free personal license ready 220 Warning 220 This is a restricted computer system 220 220 ALL ACTIONS ARE LOGGED 220 Name 10 0 200 2 lab lab 331 User lab okay need password Password 230 You are user 1 of 3 simultaneous users allowed 230 230 Welcome to the FTP site 230 Restricted user
44. n edited version of the previous configuration can be pasted into r2 In this example the only fields that required modification between the various routers are the hostname and fxp0 addressing root host gt configure Entering configuration mode edit lab host load override terminal Type D to end input lt select paste in emulation program gt system host name r2 time zone America Los_Angeles authentication order radius password route 10 0 200 0 24 next hop 10 0 1 102 no readvertise lt carriage return gt lt control d gt load complete edit lab host commit and quit commit complete Exiting configuration mode lab r2 gt In the previous capture operator input that is not echoed back is displayed in italics with lt gt delimiters The first such occurrence is when the user selects Paste from their terminal emulation program after entering the load override terminal command At the end of the capture the operator enters a single carriage return to place a new line after the last curly brace and then terminates the paste operation with the Ctrl d key sequence per the instructions provided at the Your Initial System Configuration 39 beginning of the terminal paste operation Because no errors are reported the paste operation appears to have been successful You now commit the new configuration which results in the router s hostname becoming r2 as highlighted Pasting
45. n example illustrates one possible solution to the ops account restrictions as specified in this example In this case we begin with a login class that contains only the network permission which by default allows only access to the ping telnet traceroute and SSH com mands Because the ops user should have access only to the ping utility the deny commands option was used with a regular expression to explicitly deny access to the telnet traceroute and SSH commands Ina similar fashion the al ow commands option was included in the ops class to explicitly permit the use of the show interfaces command Further the nature of this al 1ow commands regular expression will not allow arguments such as detail or terse with the show interfaces command so the ops user will be able to issue only the standard show interfaces command In contrast specifying show interfaces as the regular expression for allowed com mands will provide access to the full range of options supported by the show interfaces command Configure the Ops Account 19 Verify the Ops Account To confirm the ops login and account permissions we log in as ops and verify that we have access to the standard show interfaces and ping commands Listing 1 3 shows you this sequence Based on the results shown in Listing 1 3 you can see that all the account restrictions for the ops user have been met Listing 1 3 Verify Ops Account Permissions ops r1 gt show Possible completions
46. outer OQ that is booting from a factory fresh J UNOS software load which by definition will not have a hostname configured When preparing the lab for NCIP testing itis standard practice for the proctor to flash every router using removable media PCM CIA cards at the end of each certification attempt This ensures that each new candidate will begin his or her test from a known starting point and will prevent possible difficulties caused by a previous candidate s tampering with the system s binaries or file structure Initial Console Login Because the router is booting from a factory fresh load the only existing login account will be the user root Initially this account has no associated password When logging in as root the user is presented with the shell prompt so the JUNOS software command line interface CLI must be started manually as shown here login root JUNOS 5 2R1 4 built 2002 03 10 01 12 05 UTC Terminal type vt100 root cli root gt 6 Chapter 1 Initial Configuration and Platform Troubleshooting Switching Among Reverse Telnet Sessions Although the reverse telnet sessions can be opened in any order it is highly recommended that you open the sessions to your routers in a sequential fashion This will make it easy to switch among sessions using session numbers that map directly to corresponding router numbers To regain the IOS command prompt the user must enter an escape sequence consisting of a sim
47. r1 login 1 LOGIN FAILURE ON ttyd0O Apr 1 14 36 30 rl login login on ttyd0 as lab When modifying the syslog configuration care should be taken to ensure that the remaining default settings are left according to the lab scenario s instructions For example the following syslog configuration sets the default archive parameters of all files at the edit system syslog level and below to five files of SMB each Such a setting will also affect the size and number of the archived messages files stored on your router Depending on the specifics of your configuration 22 Chapter 1 Initial Configuration and Platform Troubleshooting requirement changing the default size and number of archived messages files could result in lost points on the JNCIP exam edit system syslog lab r1 show archive size 5m files 5 user any emergency file messages any notice file auth authorization info Task 5 Configure Network Management and NTP Now that you have correctly set your syslog parameters we next examine typical SNMP and NTP configuration requirements SNMP can be used to pull statistics and operational status from your router while the NTP protocol can be used to ensure that all of the routers in your test bench have an accurate and consistent time of day setting Configure SNMP In the following example we will configure SNMP with the parameters listed next Refer to Figure 1 1 shown earlier for addressing specifics
48. s and SSH keys WARNING Cif configured but erase all other files and information WARNING stored on this machine This is the pre installation stage WARNING and all the software is loaded when you reboot the system Saving the config files NOTICE uncommitted changes have been saved in var db config juniper conf pre install After the two reboots associated with jinstal1 package installation r2 comes back up and the new code installation is confirmed lab r2 show version Hostname r2 Model m5 JUNOS Base OS boot 5 2R2 3 JUNOS Base OS Software Suite 5 2R2 3 JUNOS Kernel Software Suite 5 2R2 3 JUNOS Routing Software Suite 5 2R2 3 JUNOS Packet Forwarding Engine Support 5 2R2 3 JUNOS Crypto Software Suite 5 2R2 3 JUNOS Online Documentation 5 2R2 3 Task 7 Configure Chassis Alarms and Redundancy 33 Task 7 Configure Chassis Alarms and Redundancy Some M series routers support Routing Engine RE and system control board redundancy options You should be familiar with the configuration and operation of the various redun dancy features available on the M20 M160 M40e and T640 platforms and you should be familiar with the ways in which various problems can be mapped to system alarm states An example system alarm and redundancy scenario might consist of the following requirements Configure the router to generate a yellow alarm when the fxp0 interface goes down Set REO to be the primary and config
49. s preventing the local router from synchronizing with the NTP server The answer lies in the NTP specification and the fact that it will not allow the NTP protocol to make gross adjustments in a system s clock According to the NTP specification synchronization requires that the two system clocks be off by at least 128 milliseconds but no more than 128 seconds before synchronization can begin Use of the boot server option will set the system s clock at boot time regardless of how far off it may be from that of the specified server but this option requires a reboot to take effect and automatic clock setting at reboot is not permitted in this example So it would seem that the solution to this dilemma is the manual setting of your router s clock to bring it to within 128 seconds of the server s clock To obtain the NTP server s view of the time you could manually decode NTP messages using tcpdump or monitor traffic or you could take the easy route of telnetting into the NTP server to issue a date command The following commands demonstrate the latter approach lab r1 gt telnet 10 0 200 2 Trying 10 0 200 2 Connected to 10 0 200 2 Escape character is Red Hat Linux release 6 0 Hedwig Kernel 2 2 17 on an i686 login lab Password Last login Mon Apr 1 08 23 21 from yoda lab ntp date Mon Apr _ 1 15 45 29 PST 2002 lab ntp exit logout Connection closed by foreign host Now that you know the server s view of th
50. s shown here harry dr data harry ssh keygen b 1024 t rsal Generating public private rsal key pair Enter file in which to save the key home harry ssh identity Enter passphrase empty for no passphrase Enter same passphrase again Your identification has been saved in home harry ssh identity Your public key has been saved in home harry ssh identity pub The key fingerprint is d1 ac 20 9b f6 82 04 06 09 69 11 57 66 8d 17 be harry dr data net After loading the resulting public key into the router SSH connectivity can be tested harry dr data harry ssh 1 root 1 10 0 1 1 The authenticity of host 10 0 1 1 10 0 1 1 can t be established RSA1 key fingerprint is 10 e1 82 2f 6b c3 9c 5e 84 d5 6c 0b df 1c 3d ea Are you sure you want to continue connecting yes no yes Warning Permanently added 10 0 1 1 RSA1 to the list of known hosts Enter passphrase for RSA key home harry ssh identity Last login Wed May 15 17 38 58 2002 from 10 0 1 201 JUNOS 5 2R2 3 built 2002 03 23 02 44 36 UTC root r1 In this example the l switch was needed to indicate that the remote login name should be root instead of the user s local Unix login name which would be harry in this case The 1 was also needed to indicate that SSH version 1 should be used because the SSH configuration on this author s Linux machine causes it to first try SSH version 2 For the SecureCRT application Generate a key pair by clicking the
51. shment creating user accounts and permissions con figuring SNMP NTP chassis alarms system redundancy and syslog and general software main tenance procedures 42 Chapter 1 Initial Configuration and Platform Troubleshooting Case Study Initial System Configuration This section presents a list of initial system configuration tasks that resemble the examples dem onstrated throughout this chapter For each configuration task the relevant portions of a typ ical router configuration are shown and described The complete configuration from one of the routers is provided at the end to illustrate a known good solution for the configuration require ments provided in the case study Configuration Requirements To complete this case study you must configure all seven routers in your test bed to comply with the following criteria It should take approximately 45 minutes to complete your configuration and you should start with a factory fresh JUNOS software install A reasonable approximation of such an install will result if you load and commit the skeleton configuration found at the following location on routers running a 5 x JUNOS software version packages mnt jbase sbin install default juniper conf Whether you opt to flash your routers or load the skeleton configuration file your starting configuration should be similar to the following root rl1 show system syslog user any emergency file messages any notice
52. t root r1 show routing options static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise The procedure is similar when the goal is to paste a portion of a stanza such as an individual static route In this example a static route to 1 1 1 1 has been added to r2 and this route will be pasted into r1 edit lab r2 show routing options static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise After copying the 1 1 1 1 static route into the capture buffer it is pasted into r1 using the following commands Note that the operator has correctly specified the destination of the pasted data by manually entering routing options static before performing the paste edit root r1l load merge terminal Type D to end input routing options static route 1 1 1 1 32 discard lt carriage return gt lt control d gt load complete edit root r1 show routing options Summary 41 static route 10 0 200 0 24 next hop 10 0 1 102 no readvertise route 1 1 1 1 32 discard Summary This chapter provided configuration and operational mode examples for a variety of initial system configuration scenarios that are similar to the type of tasks that will confront a JNCIP candidate At this stage you should have a good idea of what types of configuration tasks will confront you as you begin your JNCIP examination and you should now be comfortable with terminal server use and OoB management network establi
53. t r2 set community public edit snmp root r2 set trap group foo categories authentication edit snmp root r2 set trap group foo targets 10 0 200 2 edit snmp root r2 set community private authorization read write 50 Chapter 1 Initial Configuration and Platform Troubleshooting The resulting configuration changes are now confirmed edit snmp root r2 show interface fxp0 0 community public community private authorization read write trap group foo version v1 categories authentication targets 10 0 200 2 By including interface fxp0 you disallow access from all other interfaces The lack of a client statement results in the default of access being allowed from all clients The default for SNMP traps is to send both version 1 and version 2 so version 1 traps must be specified Configure your routers as broadcast NTP clients and authenticate all messages using MDS key ID 200 key value juniper Ensure that manual clock synchronization steps are not required For this example you may assume that the NTP service is provided by 10 0 1 102 edit system ntp root r2 set authentication key 200 type md5 value juniper edit system ntp root r2 set trusted key 200 edit system ntp root r2 set broadcast client edit system ntp root r2 set boot server 10 0 1 102 Once again the changes to the configuration are confirmed edit system ntp root r2 show boot server 10 0 1 102 Case Study
54. the proctor s attention as soon as possible The proctor will confirm whether there is actually a problem and may provide workaround instructions as needed Before calling in the proctor it is generally a good idea to try rebooting the router because symptoms of bad hardware may be caused by software mal functions that are sometimes cleared by a reboot Task 1 Access Routers Using a Terminal Server As described in the introduction your JNCIP test bed consists of seven freshly flashed M series routers a terminal server and a 100Mbps Fast Ethernet LAN segment that will serve as your network s Out of Band OoB management network Because your routers have a factory fresh Task 1 Access Routers Using a Terminal Server 3 default configuration you will not be able to telnet to the routers until you have correctly con figured the OoB management network Therefore you should plan on accessing the console ports of the routers assigned to your station using an IOS based 2517 or similar terminal server to per form your initial configuration task Since the actual examination does not involve non Juniper Networks products you will be instructed on how to use the particular terminal server used at your testing center D Although you can use the router console ports for the duration of the examina TE tion most candidates find thatit saves time to open multiple telnet sessions one per router using the Out Of Band OoB management network
55. tication system authentication order radius radius server 10 0 1 201 secret 9 9FftBtOIyIMNdsEcds24DjCtu SECRET DATA Case Study Initial System Configuration 49 edit lab r1l set system apply groups authentication To confirm the correct application of a configuration group you should pipe configuration output through the inheritance filter as shown here edit lab r1 show system match radius edit lab r1 show system display inheritance match radius radius was inherited from group authentication authentication order radius radius server You should practice with the effects of configuration group usage before deciding to deploy the technique on a live examination Some candidates have been burned by failing to completely anticipate the effects of configuration group usage For example the inadvertent configuration and operation of an IGP on your fxp0 OoB management interface which is never a good idea can easily result when a configuration group is used to add protocol families to your interfaces in conjunction with a command such as set protocol isis interface all Allow SNMP access from all IP addresses but only allow SNMP request over the fxp0 interface Use a community value of public for read only access and private for read write access Send only version 1 authentication related traps to the SNMP server edit snmp root r2 set interface fxp0 edit snmp roo
56. ttings will allow up to ten 128KB files that are not world readable In this example your goal is to modify the default syslog parameters to achieve the following criteria Place authorization messages into a log file named auth Permit five copies of the auth file each no larger than SMB The commands used to meet these requirements are as follows edit system syslog lab r1 delete file messages authorization edit system syslog lab r1 set file auth authorization info edit system syslog lab r1 set file auth archive files 5 size 5m And here is the modified syslog stanza edit system syslog lab r1 show user any emergency Task 4 Configure Syslog Parameters 21 file messages any notice file auth authorization info archive size 5m files 5 Verify Syslog Operation Verifying the modified syslog parameters is relatively simple You can open a second telnet con nection to the router and monitor the log files while you log in and out or you can view the log files offline to confirm that authorization related information is now being written to both the auth and messages log files The second approach is illustrated next lab r1 gt quit r1 ttyd0 login anything Password Login incorrect login CClient aborted login r1 ttyd0 login lab Password Last login Mon Apr 1 14 33 26 on ttyd0 JUNOS 5 2B3 1 built 2001 12 28 18 50 44 UTC lab r1 gt show log auth Apr 1 14 36 25
57. ul taneous Ctrl Shift 6 followed by pressing the x key the escape sequence is not echoed back to the user but is shown in angle brackets in the following to illustrate use of the escape sequence root gt lt control shift 6 x gt pod2 ts r2 Trying r2 10 0 1 101 2002 Open Amnesiac ttyd0 login After entering the escape sequence the user is presented with an IOS prompt If the user sim ply presses Enter at this point the connection to r1 will be resumed In this example the user establishes a reverse telnet session to the next router router 2 using the symbolic name r2 To switch between these two sessions the user can now enter the escape sequence followed by the connection number which will be either a 1 or a 2 at this stage login lt control shift 6 x gt pod2 ts l Resuming connection 1 to 10 0 1 101 root gt Clearing Terminal Server Sessions Although it s rarely necessary sometimes you have to manually clear one or more reverse telnet sessions on the terminal server when connections cannot be correctly established to a given router s console port This will require that you regain a privileged EXEC mode IOS command prompt to display and clear the problem line Listing 1 1 is an example of this process It dem onstrates the clearing of Line 2 after a problem with access to r2 has been encountered Listing 1 1 Clearing Terminal Server Lines I0OS Based Terminal Server pod2 ts r2 Trying r2 10 0 1
58. ure RE failover in the event of routing daemon failure You may assume that the configuration files have already been mirrored on the two REs for this task Ensure that failure of router flash will not affect the operation of your initial configuration Configure alarms Alarms are configured at the edit chassis alarms configuration hier archy The following command is used to configure a yellow alarm upon detection of an fxp0 link down event edit chassis alarm lab r2 set management ethernet link down yellow Configure redundancy System redundancy is configured at the edit chassis redundancy configuration hierarchy The following commands are used to explicitly configure REO as the primary RE which is the default and to evoke a switchover to RE1 in the event of routing daemon rpd failure The following commands were issued on a M20 router because the MS platform does not support RE redundancy edit lab m20 set chassis redundancy routing engine 0 master edit lab m20 set system processes routing failover other routing engine Perform a system snapshot To ensure that a failure of the router s flash will not cause the loss of your initial system configuration you must perform a system snapshot to mirror the contents of the router s flash onto the router s hard drive lab r1 gt request system snapshot umount altroot not currently mounted Copying to altroot this may take a few minutes 34 Chapter 1 Initi
59. ve been set to retain five 10MB files and the oper ator s attempt at returning the messages file archive settings to the default setting of ten 128KB files has failed due to incorrect use of the Mega m suffix 3 You will need to use the backup router statement with the correct gateway address The backup router is used while the system is booting and in the event that the routing daemon cannot be started 4 The NTP configuration is missing the trusted key definition Without a list of trusted keys the router will not use or accept key id 10 in NTP messages 5 You must use the source address option at the edit snmp trap options hierarchy when configuring SNMP Use of default address selection at the edit system hierarchy affects all locally generated packets not just SNMP
60. xp0 matching udp Listening on fxp0 Second assign an arbitrary address to the router s lo0 interface in order to generate a link up trap Once the configuration is committed an SNMP trap should be generated on the router s fxp0 interface If the trap group is configured correctly you will see something that is similar to the following Note that the destination address for the trap matches the address of the SNMP server shown earlier in Figure 1 1 15 34 45 871146 Out 10 0 1 1 1024 gt 10 0 200 2 snmptrap C interface Trap 36 E 2636 1 1 1 2 5 10 0 1 1 linkUp 1467547 snmp 15 34 45 871250 Out 10 0 1 1 1024 gt 10 0 200 2 snmptrap C interface V2Trap 35 system sysUpTime 0 1467547 iso org dod internet snmp You can monitor SNMP command response operation through SNMP protocol tracing but the monitor traffic mechanism shown previously is the best way to verify that your router is sending SNMP traps as required P After verifying the trap be sure to remove any arbitrary addressing that you ga have assigned to the lo0 interface Neglecting to do so could cause problems in a subsequent lab scenario Configure NTP Once again refer to Figure 1 1 for the addressing specifics needed to complete this task In this example you will need to configure your router as a unicast NTP client because the NTP server is not directly attached to your OoB management network and the lack of multicast broadcast forwarding on the firewall rout

Download Pdf Manuals

image

Related Search

Related Contents

  Monarch R Service Manual  Je m`exerce  rata - Istituto Comprensivo Don Curzio Breschi  KULINARISK  König KN-URC10B remote control  KOHLER K-8817-CP Installation Guide  Istruzioni per l`uso Per il tecnico autorizzato AURON con tubi a  Victorinox Flash 32GB  取扱説明書 - ミネベア  

Copyright © All rights reserved.
Failed to retrieve file