Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Next »


Part 1: Analyzing the Topology





Part 2: Loading The Configuration

./lab8-setup.sh
service analytics

show configuration services analytics

service analytics
lab@vmx-2> show configuration services analytics 
streaming-server ns-ifd {
    remote-address 192.168.1.100;
    remote-port 2000;
}
streaming-server ns-ifl {
    remote-address 192.168.1.100;
    remote-port 2001;
}
streaming-server ns-lsp {
    remote-address 192.168.1.100;
    remote-port 2002;
}
export-profile ns {
    local-address 192.168.1.2;
    reporting-rate 2;
    format gpb;
    transport udp;
}
sensor ifd {
    server-name ns-ifd;
    export-name ns;
    resource /junos/system/linecard/interface/;
}
sensor ifl {
    server-name ns-ifl;
    export-name ns;
    resource /junos/system/linecard/interface/logical/usage/;
}
sensor lsp {
    server-name ns-lsp;
    export-name ns;
    resource /junos/services/label-switched-path/usage/;
}


lab@vmx-2> show configuration services analytics | display set 
set services analytics streaming-server ns-ifd remote-address 192.168.1.100
set services analytics streaming-server ns-ifd remote-port 2000
set services analytics streaming-server ns-ifl remote-address 192.168.1.100
set services analytics streaming-server ns-ifl remote-port 2001
set services analytics streaming-server ns-lsp remote-address 192.168.1.100
set services analytics streaming-server ns-lsp remote-port 2002
set services analytics export-profile ns local-address 192.168.1.2
set services analytics export-profile ns reporting-rate 2
set services analytics export-profile ns format gpb
set services analytics export-profile ns transport udp
set services analytics sensor ifd server-name ns-ifd
set services analytics sensor ifd export-name ns
set services analytics sensor ifd resource /junos/system/linecard/interface/
set services analytics sensor ifl server-name ns-ifl
set services analytics sensor ifl export-name ns
set services analytics sensor ifl resource /junos/system/linecard/interface/logical/usage/
set services analytics sensor lsp server-name ns-lsp
set services analytics sensor lsp export-name ns
set services analytics sensor lsp resource /junos/services/label-switched-path/usage/
MPLS

show configuration protocols mpls

mpls config
lab@vmx-2> show configuration protocols mpls 
lsp-external-controller pccd;
traffic-engineering {
    bgp-igp-both-ribs;
    database {
        import {
            policy TE;
        }
    }
}
admin-groups {
    gold 1;
    silver 2;
    bronze 3;
}
sensor-based-stats;
label-switched-path vmx2-to-vmx1-LSP {
    to 172.20.20.1;
    bandwidth 100m;
}
label-range {
    static-label-range 1000 2000;
}
interface ge-0/0/1.0 {
    admin-group [ gold bronze ];
}
interface ge-0/0/2.0 {
    admin-group [ silver bronze ];
}


lab@vmx-2> show configuration protocols mpls | display set 
set protocols mpls lsp-external-controller pccd
set protocols mpls traffic-engineering bgp-igp-both-ribs
set protocols mpls traffic-engineering database import policy TE
set protocols mpls admin-groups gold 1
set protocols mpls admin-groups silver 2
set protocols mpls admin-groups bronze 3
set protocols mpls sensor-based-stats
set protocols mpls label-switched-path vmx2-to-vmx1-LSP to 172.20.20.1
set protocols mpls label-switched-path vmx2-to-vmx1-LSP bandwidth 100m
set protocols mpls label-range static-label-range 1000 2000
set protocols mpls interface ge-0/0/1.0 admin-group gold
set protocols mpls interface ge-0/0/1.0 admin-group bronze
set protocols mpls interface ge-0/0/2.0 admin-group silver
set protocols mpls interface ge-0/0/2.0 admin-group bronze

SNMP and netconf

lab@vmx-2> show configuration snmp | display set
set snmp community public authorization read-only


lab@vmx-2> show configuration system services | display set
set system services ssh
set system services netconf ssh


vmx-1config: service analytics, MPLS and SNMP

vmx-1
lab@vmx-1> show configuration services analytics | display set 
set services analytics streaming-server ns-ifd remote-address 192.168.1.100
set services analytics streaming-server ns-ifd remote-port 2000
set services analytics streaming-server ns-ifl remote-address 192.168.1.100
set services analytics streaming-server ns-ifl remote-port 2001
set services analytics streaming-server ns-lsp remote-address 192.168.1.100
set services analytics streaming-server ns-lsp remote-port 2002
set services analytics export-profile ns local-address 192.168.1.1
set services analytics export-profile ns reporting-rate 2
set services analytics export-profile ns format gpb
set services analytics export-profile ns transport udp
set services analytics sensor ifd server-name ns-ifd
set services analytics sensor ifd export-name ns
set services analytics sensor ifd resource /junos/system/linecard/interface/
set services analytics sensor ifl server-name ns-ifl
set services analytics sensor ifl export-name ns
set services analytics sensor ifl resource /junos/system/linecard/interface/logical/usage/
set services analytics sensor lsp server-name ns-lsp
set services analytics sensor lsp export-name ns
set services analytics sensor lsp resource /junos/services/label-switched-path/usage/

set protocols mpls sensor-based-stats


ping routing-instance traffic-source 172.20.20.1 count 1000000 size 1400 rapid

sudo netstat -an | grep udp

sudo netstat -an | grep udp | grep 200

netstat
[lab@northstar-app ~]$ sudo netstat -an | grep udp | grep 200
udp        0      0 0.0.0.0:2000            0.0.0.0:*                          
udp        0      0 0.0.0.0:2001            0.0.0.0:*                          
udp        0      0 0.0.0.0:2002            0.0.0.0:*   


2000   interface telemetry 

2001  interface telemetry 

2002  LSP Telemetry

interface telemetry

sudo tcpdump -i eth1 port 2000

tcpdump
[lab@northstar-app ~]$ sudo tcpdump -i eth1 port 2000    
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
04:01:28.181152 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.sieve-filter: UDP, bad length 3306 > 1472
04:01:28.181287 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.sieve-filter: UDP, bad length 1695 > 1472
04:01:28.343728 IP 172.20.20.5.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2070 > 1472
04:01:29.364785 IP 172.20.20.4.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2386 > 1472
04:01:29.365062 IP 172.20.20.4.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2386 > 1472
04:01:29.365828 IP 172.20.20.4.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2386 > 1472
04:01:29.543752 IP 172.20.20.3.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2702 > 1472
04:01:29.544156 IP 172.20.20.3.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2702 > 1472
04:01:29.544798 IP 172.20.20.3.cadlock2 > northstar-app.sieve-filter: UDP, bad length 2702 > 1472

sudo tcpdump -i eth1 port 2001

2001
[lab@northstar-app ~]$ sudo tcpdump -i eth1 port 2001
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
04:07:59.824164 IP fe-0-0-1.j-1.iwx.edu.juniper.net.cadlock2 > northstar-app.wizard: UDP, length 912
04:08:00.310573 IP 172.20.20.6.cadlock2 > northstar-app.wizard: UDP, length 716
04:08:00.311115 IP 172.20.20.6.cadlock2 > northstar-app.wizard: UDP, length 716
04:08:00.530226 IP 172.20.20.5.cadlock2 > northstar-app.wizard: UDP, length 707
04:08:01.094698 IP 172.20.20.3.cadlock2 > northstar-app.wizard: UDP, length 721
04:08:01.095047 IP 172.20.20.3.cadlock2 > northstar-app.wizard: UDP, length 721
04:08:01.095702 IP 172.20.20.3.cadlock2 > northstar-app.wizard: UDP, length 721
04:08:01.193796 IP 172.20.20.4.cadlock2 > northstar-app.wizard: UDP, length 708
04:08:01.194319 IP 172.20.20.4.cadlock2 > northstar-app.wizard: UDP, length 708
04:08:01.194836 IP 172.20.20.4.cadlock2 > northstar-app.wizard: UDP, length 708
interface telemetry

sudo tcpdump -i eth1 port 2002

interface telemetry
[lab@northstar-app ~]$ sudo tcpdump -i eth1 port 2002
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
04:04:12.170022 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:13.593285 IP fe-0-0-1.j-1.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:14.199637 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:15.598161 IP fe-0-0-1.j-1.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:16.234810 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:17.645451 IP fe-0-0-1.j-1.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:18.264615 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:19.649080 IP fe-0-0-1.j-1.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
04:04:20.299648 IP fe-0-0-1.j-2.iwx.edu.juniper.net.cadlock2 > northstar-app.globe: UDP, length 183
Part 3Configuring Device Collection
Device CollectionAdministration > Task Scheduler > 

SNMP Traffic Collection


link Latency Collection


Part 4












  • No labels