Table of Contents

About This Guide
J Series and SRX Series Documentation and Release Notes
Objectives
Audience
Supported Routing Platforms
Document Conventions
Documentation Feedback
Requesting Technical Support
Routing Protocols
Routing Overview
Routing Overview
Networks and Subnetworks
Autonomous Systems
Interior and Exterior Gateway Protocols
Routing Tables
Forwarding Tables
Dynamic and Static Routing
Route Advertisements
Route Aggregation
Static Routing
Static Routing Configuration Overview
Basic Static Routes
Understanding Basic Static Routing
Example: Configuring a Basic Set of Static Routes
Static Route Selection
Understanding Static Route Preferences and Qualified Next Hops
Example: Controlling Static Route Selection
Static Route Control in Routing and Forwarding Tables
Understanding Static Route Control in Routing and Forwarding Tables
Route Retention
Readvertisement Prevention
Forced Rejection of Passive Route Traffic
Example: Controlling Static Routes in Routing and Forwarding Tables
Default Static Route Behavior
Understanding Static Routing Default Properties
Example: Defining Default Behavior for All Static Routes
Verifying the Static Route Configuration
RIP
RIP Overview
Distance-Vector Routing Protocols
Maximizing Hop Count
RIP Packets
Split Horizon and Poison Reverse Efficiency Techniques
Limitations of Unidirectional Connectivity
RIPng Overview
RIPng Protocol Overview
RIPng Standards
RIPng Packets
RIP Configuration Overview
Basic RIP Routing
Understanding Basic RIP Routing
Example: Configuring a Basic RIP Network
RIP Traffic Control Through Metrics
Understanding RIP Traffic Control with Metrics
Example: Controlling Traffic with an Incoming Metric
Example: Controlling Traffic with an Outgoing Metric
RIP Authentication
Understanding RIP Authentication
Enabling Authentication with Plain-Text Passwords (CLI Procedure)
Enabling Authentication with MD5 Authentication (CLI Procedure)
Verifying a RIP Configuration
Verifying the Exchange of RIP Messages
Verifying the RIP-Enabled Interfaces
Verifying Reachability of All Hosts in the RIP Network
OSPF
OSPF Overview
OSPF Configuration Overview
OSPF Designated Routers
Understanding OSPF Designated Routers
Example: Configuring an OSPF Router Identifier
Example: Controlling OSPF Designated Router Election
OSPF Areas, Area Border Routers, and Backbone Areas
Understanding OSPF Areas, Area Border Routers, and Backbones
Example: Configuring a Single-Area OSPF Network
Example: Configuring a Multiarea OSPF Network
OSPF Stub Areas and Not-So-Stubby Areas
Understanding OSPF Stub Areas and Not-So-Stubby Areas
Example: Configuring OSPF Stub and Not-So-Stubby Areas
OSPF Authentication
Understanding OSPF Authentication
Example: Enabling Authentication for OSPF Exchanges
OSPF Traffic Control
Understanding OSPF Traffic Control
Example: Controlling the Cost of Individual OSPF Network Segments
Example: Controlling OSPF Route Selection in the Forwarding Table
Verifying an OSPF Configuration
Verifying OSPF-Enabled Interfaces
Verifying OSPF Neighbors
Verifying the Number of OSPF Routes
Verifying Reachability of All Hosts in an OSPF Network
IS-IS
IS-IS Overview
IS-IS Areas
System Identifier Mapping
ISO Network Addresses
IS-IS Path Selection
Protocol Data Units
IS-IS Hello PDU
Link-State PDU
Complete Sequence Number PDU
Partial Sequence Number PDU
IS-IS Configuration Overview
Example: Configuring IS-IS
IS-IS Designated Routers
Understanding IS-IS Designated Routers
Configuring IS-IS Designated Routers (CLI Procedure)
BGP
BGP Overview
BGP Messages for Session Establishment
BGP Messages for Session Maintenance
IBGP and EBGP
Route Selection
Local Preference
AS Path
Origin
Multiple Exit Discriminator
Default MED Usage
Additional MED Options for Path Selection
Scaling BGP for Large Networks
BGP Configuration Overview
BGP Peering Sessions
Understanding BGP Peering Sessions
Example: Configuring BGP Point-to-Point Peer Sessions
Example: Configuring Internal BGP Peering Sessions
BGP Route Reflectors
Understanding BGP Route Reflectors
Example: Configuring a Route Reflector
BGP Confederations
Understanding BGP Confederations
Example: Configuring BGP Confederations
Verifying a BGP Configuration
Verifying BGP Neighbors
Verifying BGP Groups
Verifying BGP Summary Information
Verifying Reachability of All Peers in a BGP Network
Multicast
Multicast Overview
Multicast Architecture
Upstream and Downstream Interfaces
Subnetwork Leaves and Branches
Multicast IP Address Ranges
Notation for Multicast Forwarding States
Dense and Sparse Routing Modes
Strategies for Preventing Routing Loops
Reverse-Path Forwarding for Loop Prevention
Shortest-Path Tree for Loop Prevention
Administrative Scoping for Loop Prevention
Multicast Protocol Building Blocks
Multicast Configuration Overview
SAP and SDP Multicast Session Announcements
Understanding SAP and SDP Multicast Session Announcements
Example: Configuring SAP and SDP to Listen for Session Announcements (CLI)
Multicast IGMP
Understanding IGMP and Multicast
Example: Configuring IGMP for Multicast (CLI)
Multicast PIM and Static RPs
Understanding PIM and Static RPs
Example: Configuring PIM Sparse Mode and RP Static IP Addresses (CLI)
PIM Register Messages
Understanding PIM Register Messages
Example: Rejecting Incoming PIM Register Messages on an RP Router (CLI)
Example: Stopping Outgoing PIM Register Messages on a Designated Router (CLI)
PIM RPF Routing Tables
Understanding PIM RPF Routing Tables
Example: Configuring a PIM RPF Routing Table (CLI)
Verifying a Multicast Configuration
Verifying SAP and SDP Addresses and Ports
Verifying the IGMP Version
Verifying the PIM Mode and Interface Configuration
Verifying the PIM RP Configuration
Verifying the RPF Routing Table Configuration
Routing Policies and Stateless Firewall Filters
Routing Policies
Routing Policies Overview
Routing Policies Configuration Overview
Routing Policies
Understanding Routing Policies
Example: Creating a Routing Policy
Routing Policy Terms
Understanding Routing Policy Terms
Example: Creating a Routing Policy Term
Routing Policy Match Conditions and Actions
Understanding Routing Policy Match Conditions and Actions
Match Conditions
Actions
Route-Based Match Conditions
Understanding Route-Based Match Conditions
Example: Rejecting Known Invalid Routes
Example: Grouping Source and Destination Prefixes into a Forwarding Class
Protocol-Based Match Conditions
Understanding Protocol-Based Match Conditions
Example: Injecting OSPF Routes into the BGP Routing Table
Autonomous System Path-Based Actions
Understanding Autonomous System Path-Based Actions
Example: Configuring a Routing Policy to Prepend the AS Path
Routing Policy Damping Parameters
Understanding Damping Parameters
Example: Configuring Damping Parameters
Stateless Firewall Filters
Stateless Firewall Filter Overview
Stateless Firewall Filter Configuration Overview
Stateless Firewall Filter Terms
Understanding Stateless Firewall Filter Terms
Stateless Firewall Filter Match Conditions
Stateless Firewall Filter Actions and Action Modifiers
Trusted Source Stateless Firewall Filters
Understanding Trusted Source Stateless Firewall Filters
Example: Configuring a Stateless Firewall Filter to Accept Traffic from Trusted Sources
Flood Prevention Stateless Firewall Filters
Understanding Flood Prevention Stateless Firewall Filters
Example: Configuring a Stateless Firewall Filter to Protect Against TCP and ICMP Floods
Fragment Handling Stateless Firewall Filters
Understanding Fragment Handling Stateless Firewall Filters
Example: Configuring a Stateless Firewall Filter to Handle Fragments
Example: Configuring a Filter to Match on IPv6 Flags
Index
Index