inet ZERO - JNCIE-DC

Similar documents
JNCIE-ENT V1.2 (2017) Demo workbook

HCIE Routing and Switching workbook v1.0 (2017) Demo workbook

Evolved Campus Core: An EVPN Framework for Campus Networks. Vincent Celindro JNCIE #69 / CCIE #8630

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

Traffic Load Balancing in EVPN/VXLAN Networks. Tech Note

JNCIE-SP (Service Provider) Lab preparation workbook v2.0

Network Configuration Example

Cloud Data Center Architecture Guide

Solution Guide. Infrastructure as a Service: EVPN and VXLAN. Modified: Copyright 2016, Juniper Networks, Inc.

Network Configuration Example

inet ZERO JNCIE-ENT Lab preparation workbook v1.0

Specialist Level Certification JNCIS-ENT; 5 Days; Instructor-led

Network Configuration Example

Juniper Networks Certified Specialist Service Provider Routing and Switching Bootcamp, JIR, JSPX, JMF (JNCIS-SP BC)

Hierarchical Fabric Designs The Journey to Multisite. Lukas Krattiger Principal Engineer September 2017

Ethernet VPN (EVPN) in Data Center

JNCIS Enterprise Routing and Switching Certification Boot Camp (JIR, JEX)

Configuring VXLAN EVPN Multi-Site

Junos Fusion Data Center

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee

EXAM - JN Service Provider Routing and Switching, Specialist (JNCIS-SP) Buy Full Product.

Introduction to External Connectivity

Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration

GuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider

Configuring VXLAN EVPN Multi-Site

Network Configuration Example

Provisioning Overlay Networks

WAN. Core Routing Module. Data Cente r LAB. Internet. Today: MPLS, OSPF, BGP Future: OSPF, BGP. Today: L2VPN, L3VPN. Future: VXLAN

IP Fabric Reference Architecture

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY

MX ALS DATACENTER EDGE

Configuring Port Channels

Exam Questions Demo Cisco. Exam Questions CCIE SP CCIE Service Provider Written Exam

Virtual Chassis Fabric Best Practices Guide

Configuring VXLAN EVPN Multi-Site

Extreme Networks How to Build Scalable and Resilient Fabric Networks

Configuring Port Channels

CertShiken という認定試験問題集の権威的な提供者. CertShiken.

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.

VXLAN EVPN Multihoming with Cisco Nexus 9000 Series Switches

Real4Test. Real IT Certification Exam Study materials/braindumps

Border Provisioning Use Case in VXLAN BGP EVPN Fabrics - Multi-Site

Date Center Solutions. Stefano Alei Consulting SE EMEA Partners

CCIE Routing & Switching

JN0-346 juniper

Lab 4. Firewall Filters and Class of Service. Overview. Introduction to JUNOS Software & Routing Essentials

JNCIE-SEC v1.3 workbook (2018) Demo workbook

Hochverfügbarkeit in Campusnetzen

Multi Topology Routing Truman Boyes

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Deep Dive QFX5100 & Virtual Chassis Fabric Washid Lootfun Sr. System Engineer

Junos OS. 2nd edition FOR. Walter Goralski, Cathy Gadecki, and Michael Bushong. John Wiley & Sons, Inc. WILEY

Vendor: Juniper. Exam Code: JN Exam Name: Service Provider Routing and Switching Support, Professional. Version: Demo

Network Configuration Example

IOS-XR EVPN Distributed Anycast IRB Gateway, L2/L3VPN Service with MPLS Data Plane

Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric)

BGP IN THE DATA CENTER

Network Configuration Example

Accurate study guides, High passing rate! Testhorse provides update free of charge in one year!

Junos Reference Guide. JUNOsReference. 1 P a g e

EXTREME VALIDATED DESIGN. Network Virtualization in IP Fabric with BGP EVPN

Juniper.Selftestengine.jn0-694.v by.KIM-HL.52q

Cisco Certified Network Associate ( )

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT

Pluribus Data Center Interconnect Validated

CCNP ROUTING & SWITCHING PRACTICAL LAB WORKBOOK DARE TO CHALLENGE YOUR SKILLS COMPLETE THE TESTS & TAKE YOUR CAREER TO NEXT LEVEL

Question: 3 Which LSA type describes the router ID of ASBR routers located in remote areas?

Data Center Configuration. 1. Configuring VXLAN

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Network Virtualization in IP Fabric with BGP EVPN

Network Configuration Example

EXTREME VALIDATED DESIGN. Extreme IP Fabric Architecture

Building Blocks for Cloud Networks

CCIE R&S LAB CFG H2/A5 (Jacob s & Jameson s)

Link Bundling Commands

Creating and Managing Admin Domains

Juniper JN0-101 Exam Questions & Answers

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!

PREREQUISITES TARGET AUDIENCE. Length Days: 5

Intelligent WAN Multiple VRFs Deployment Guide

Network Configuration Example

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

CCIE ROUTING & SWITCHING V5.0

JUNIPER JN0-643 EXAM QUESTIONS & ANSWERS

Routing Applications State of the Art and Disruptions

CCNA Routing and Switching (NI )

Network Configuration Example

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

Configuring Virtual Private LAN Services

Juniper Exam JN0-691 Junos Troubleshooting Version: 6.0 [ Total Questions: 135 ]

Nexus 9000/3000 Graceful Insertion and Removal (GIR)

MPLS VPN C H A P T E R S U P P L E M E N T. BGP Advertising IPv4 Prefixes with a Label

LARGE SCALE IP ROUTING

VXLAN EVPN Fabric and automation using Ansible

CCIE Route & Switch Written (CCIERSW) 1.0

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT

Router Lab Reference

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

FlexVPN HA Dual Hub Configuration Example

Transcription:

1 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) inet ZERO - JNCIE-DC (DATA CENTER) Lab preparation workbook V1.0 (DEMO) For Juniper Networks - JNCIE-DC 2017 Lab exam 1

2 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Contents Introduction... 13 About The Authors... 13 Copyright and licensing information... 15 Disclaimer... 15 How To Use This Book... 16 Target audience... 16 Exam strategy... 17 JNCIE-DC Hall of Fame... 19 Workbook and configuration file updates... 19 Chapter 1: Layer 2 Underlay... 20 Virtual Chassis Fabric... 21 LAG... 24 MC-LAG... 25 Part 1: MC-LAG... 30 Task 1.1: ToR configuraton... 31 Task 1.2: MC-LAG peers: server-facing configuration... 31 Task 1.3: MC-LAG peers: core-facing configuration... 31 Task 1.4: vmx LAG configuration... 31 Task 1.5: vmx MC-LAG configuration... 32 Task 1.6: vmx MC-LAG gateway configuration... 32 Part 2: Multistage MC-LAG... 33 Task 1.7: DC1 LAG... 35 Task 1.8: DC1 Multistage MC-LAG... 35 Task 1.9: DC1 Gateway and OSPF configuration... 35 Task 1.10: DC1 security... 36 Task 1.11: DC2 LAG and MC-LAG configuration... 36 Task 1.12: DC2 Gateway, VRRP and OSPF configuration... 36 Task 1.13: MC-LAG verification... 37 Part 3: VCF... 38 2 Task 1.14: VCF configuration... 39

3 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 1.15: VCF features... 39 Task 1.16: Deconstructing the VCF... 39 Task 1.17: Autoprovisioning a VCF... 39 Task 1.19: VCF VLAN and interface configuration... 39 Chapter 2: CLOS IP Fabric... 40 Part 1: EBGP-based Clos IP Fabric... 43 Task 2.1: Core network BGP configuration 1... 45 Task 2.2: Core network BGP configuration 2... 45 Task 2.3: ISP uplink configuration... 45 Task 2.4: IP-Fabric BGP customer configuration... 45 Task 2.5: Server 100-110 internet feed.... 46 Task 2.6: Server 113-115 configuration... 46 Task 2.7: IP-Fabric customer policy configuration... 46 Task 2.8: IP-Fabric customer policy configuration... 46 Task 2.9: ISP policy configuration... 46 Part 2: IBGP-based Clos IP Fabric... 47 Task 2.10: IGP configuration... 49 Task 2.11: IGP configuration... 49 Task 2.12: IGP configuration... 49 Task 2.13: IPv4 IBGP configuration... 49 Task 2.14: IPv6 IBGP configuration... 49 Task 2.15: Server 101-110... 49 Task 2.16: EBGP configuration... 49 Task 2.17: Local AS advertisement... 50 Task 2.18: BGP RIB configuration... 50 Task 2.19: AS65000 customers... 50 Task 2.20: IP-Transit policy configuration... 50 Chapter 3: Controllerless Overlay... 51 VXLAN... 51 EVPN... 52 The controllerless overlay.... 55 Part 1: A basic EBGP-based overlay network... 58 3

4 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 3.1: Configure the EBGP underlay... 59 Task 3.2: EBGP underlay optimization... 59 Task 3.3: IBGP overlay configuration... 59 Task 3.4: Configure QFX switch-level EVPN... 59 Task 3.5: VXLAN segment configuration... 59 Task 3.6: Active-active multihoming... 59 Task 3.7: Configure vmx virtual-switch-level EVPN... 60 Task 3.8: Redundant layer 3 VXLAN gateway configuration... 60 Task 3.9: Inter-VXLAN routing... 60 Part 2: IBGP-based overlay network... 61 Task 3.10: IGP configuration... 62 Task 3.11: IGP optimization... 62 Task 3.12: IBGP configuration... 62 Task 3.13: Configure QFX switch-level EVPN... 62 Task 3.14: VXLAN segment configuration and active-active multihoming... 62 Task 3.15: VXLAN segment configuration for VNI 101... 62 Task 3.16: Additional VXLAN segment configuration... 63 Task 3.17: MX virtual-switch with selective VXAN import... 63 Task 3.18: Layer 3 VXLAN gateway configuration... 63 Task 3.19: Layer 3 VXLAN gateway configuration... 64 Task 3.20: Layer 3 VXLAN gateway configuration... 64 Part 3: IP fabric and controllerless overlay... 65 Task 3.21: EBGP for the IP-Fabric... 67 Task 3.22: Completing the IP-Fabric... 67 Task 3.23: Controllerless overlay... 67 Task 3.24: Expanding the controllerless overlay... 67 Task 3.25: IP-Fabric routing policies... 68 Chapter 4: Data Center Interconnect... 69 MPLS and Label distribution protocols... 69 MPLS L3VPN... 71 MPLS EVPN... 72 Data Center Interconnect types.... 73 4

5 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Part 1: MPLS and MPLS L3VPN... 77 Task 4.1: IGP configuration... 79 Task 4.2: LDP configuration... 79 Task 4.3: MPLS LSP options configuration... 79 Task 4.4: BGP configuration... 79 Task 4.5: MPLS L3VPN inet-blue... 79 Task 4.6: MPLS L3VPN inet-green... 80 Task 4.7: MPLS L3VPN inet-red... 80 Part 2: MPLS, MPLS L3VPN and EVPN.... 81 Task 4.8: RSVP configuration... 83 Task 4.9: RSVP LSP configuration... 83 Task 4.10: BGP configuration... 83 Task 4.11: EVPN inet-purple... 83 Task 4.12: EVPN inet-blue... 83 Task 4.13: EVPN inet-green... 83 Task 4.14: EVPN inet-red... 84 Part 3: MPLS L3VPN and VLAN-aware EVPN.... 85 Task 4.16: EVPN north configuration... 87 Task 4.17: EVPN south configuration... 87 Task 4.18: EVPN multihoming... 87 Task 4.19: VLAN-based EVPN configuration... 88 Part 4: controllerless overlay and EVPN DCI... 89 Task 4.20: DC1 Controllerless overlay part 1: routing and signaling... 90 Task 4.21: DC1 Controllerless overlay part 2: the overlay... 90 Task 4.22: DC2 Controllerless overlay part 1: the underlay... 90 Task 4.23: DC2 Controllerless overlay part 2: the overlay... 90 Task 4.24: EVPN stitching... 91 Chapter 5: Security... 92 Control plane protection... 93 Data plane protection... 94 Stateful firewalling and SRX configuration... 95 Simplified flow module. Screen options, ALG and NGFW are not displayed.... 95 5

6 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Part 1: Securing the datacenter... 97 Task 5.1: vsrx zone and interface configuration... 98 Task 5.2: vsrx policy configuration... 98 Task 5.3: vsrx NAT... 98 Task 5.4: vsrx Screens... 99 Task 5.5: vsrx RE protection... 99 Task 5.6: Limiting bandwidth using a stateless firewall filter... 99 Chapter 6: Class of Service... 100 Part 1: CoS inside the datacenter.... 104 Task 6.1: Forwarding classes... 105 Task 6.2: Scheduling... 105 Task 6.3: WRED... 105 Task 6.4: BA classifiers... 106 Task 6.5: Rewrite rules... 106 Task 6.6: Traffic classification on vqfx3 and vqfx4... 106 Task 6.6: Traffic classification on vqfx5... 106 Chapter 7: Management... 107 On box scripts... 107 Junos Space... 108 Zero Touch Provisioning... 109 NETCONF... 110 Task 7.1: Zero Touch Provisioning (ZTP)... 113 Task 7.2: Python using Netconf... 113 Task 7.3: Junos Space... 113 Task 7.4: On box scripting 1... 114 Task 7.5: On box scripting 2... 114 Task 7.6: On box scripting 3... 115 Superlab... 116 Superlab Topology... 118 Superlab Chapter 1: Device management... 119 Task 1.1: Zero Touch Provisioning (ZTP)... 119 Task 1.2: Junos Space... 119 6

7 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 1.3: On Box scripting... 119 Task 1.4: Netconf... 119 Superlab Chapter 2: Underlay... 120 Task 2.1: Multi Chassis Link Aggregation (MC-LAG)... 120 Task 2.2: Layer 2 underlay configuration... 120 Task 2.3: Layer 2 underlay features... 120 Task 2.4: BUM traffic handling... 121 Task 2.5: Layer 2 redundancy... 121 Task 2.6: Layer 3 Underlay MAIN DC... 121 Task 2.7: Layer 3 underlay routing... 121 Task 2.8: ebgp underlay... 122 Superlab Chapter 3: Controllerless Overlay... 123 Task 3.1: EVPN overlay configuration... 123 Task 3.2: EVPN/VLAN service configuration... 123 Task 3.3: EVPN/VXLAN service tuning... 123 Task 3.4: EVPN signaling... 124 Superlab Chapter 4: Data Center Interconnect... 125 Task 4.1: DCI configuration... 125 Task 4.2: DC1 redundancy... 128 Task 4.3: (Inter) Data Center connectivity... 128 Task 4.4: Data Center connectivity to external server... 128 Superlab Chapter 5: Security... 129 Task 5.1: User authentication and autorisation... 129 Task 5.2: SRX Configuration... 129 Task 5.3: RE protection... 129 Superlab Chapter 6: Class of Service... 130 Task 6.1: Forwarding classes... 130 Task 6.2: Schedulers and traffic profiles... 130 Task 6.3: Policing... 130 Appendix Chapter 1: Layer 2 Underlay... 131 Part 1: MC-LAG... 131 Task 1.1: ToR configuraton... 132 7

8 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 1.2: MC-LAG peers: server-facing configuration... 136 Task 1.3: MC-LAG peers: core-facing configuration... 145 Task 1.4: vmx LAG configuration... 147 Task 1.5: vmx MC-LAG configuration... 153 Task 1.6: vmx MC-LAG gateway configuration... 161 Part 2: Multistage MC-LAG... 165 Task 1.7: DC1 LAG... 167 Task 1.8: DC1 Multistage MC-LAG... 171 Task 1.9: DC1 Gateway and OSPF configuration... 179 Task 1.10: DC1 security... 185 Task 1.11: DC2 LAG and MC-LAG configuration... 188 Task 1.12: DC2 Gateway, VRRP and OSPF configuration... 200 Task 1.13: MC-LAG verification... 208 Part 3: VCF... 219 Task 1.14: VCF configuration... 220 Task 1.15: VCF features... 225 Task 1.16: Deconstructing the VCF... 227 Task 1.17: Autoprovisioning a VCF... 230 Task 1.18: VCF VLAN and interface configuration... 234 Appendix: VCF... 240 Appendix Chapter 2: Clos IP Fabric... 247 Part 1: EBGP-based Clos IP Fabric... 247 Task 2.1: Core network BGP configuration 1... 249 Task 2.2: Core network BGP configuration 2... 254 Task 2.3: ISP uplink configuration... 256 Task 2.4: IP-Fabric BGP customer configuration... 259 Task 2.5: Server 100-110 internet feed.... 263 Task 2.6: Server 113-115 configuration... 265 Task 2.7: IP-Fabric customer policy configuration... 273 Task 2.8: IP-Fabric customer policy configuration... 275 Task 2.9: ISP policy configuration... 282 Part 2: IBGP-based Clos IP Fabric... 288 8

9 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 2.10: IGP configuration... 290 Task 2.11: IGP configuration... 295 Task 2.12: IGP configuration... 299 Task 2.13: IPv4 IBGP configuration... 303 Task 2.14: IPv6 IBGP configuration... 307 Task 2.15: Server 101-110... 311 Task 2.16: EBGP configuration... 315 Task 2.17: Local AS advertisement... 328 Task 2.18: BGP RIB configuration... 335 Task 2.19: AS65000 customers... 339 Task 2.20: IP-Transit policy configuration... 342 Appendix Chapter 3: Controllerless Overlay... 347 Part 1: A basic EBGP-based overlay network... 347 Task 3.1: Configure the EBGP underlay... 348 Task 3.2: EBGP underlay optimization... 354 Task 3.3: IBGP overlay configuration... 358 Task 3.4: Configure QFX switch-level EVPN... 364 Task 3.5: VXLAN segment configuration... 368 Task 3.6: Active-active multihoming... 378 Task 3.7: Configure vmx virtual-switch-level EVPN... 390 Task 3.8: Redundant layer 3 VXLAN gateway configuration... 399 Task 3.9: Inter-VXLAN routing... 403 Part 2: IBGP-based overlay network... 406 Task 3.10: IGP configuration... 407 Task 3.11: IGP optimization... 410 Task 3.12: IBGP configuration... 415 Task 3.13: Configure QFX switch-level EVPN... 419 Task 3.14: VXLAN segment configuration and active-active multihoming... 423 Task 3.15: VXLAN segment configuration for VNI 101... 431 Task 3.16: Additional VXLAN segment configuration... 435 Task 3.17: MX virtual-switch with selective VXAN import... 445 Task 3.18: Layer 3 VXLAN gateway configuration... 452 9

10 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 3.19: Layer 3 VXLAN gateway configuration... 460 Task 3.20: Layer 3 VXLAN gateway configuration... 465 Part 3: IP fabric and controllerless overlay... 472 Task 3.21: EBGP for the IP-Fabric... 474 Task 3.22: Completing the IP-Fabric... 480 Task 3.23: Controllerless overlay... 484 Task 3.24: Expanding the controllerless overlay... 489 Task 3.25: IP-Fabric routing policies... 495 Appendix Chapter 4: Data Center Interconnect... 500 Part 1: MPLS and MPLS L3VPN... 500 Task 4.1: IGP configuration... 502 Task 4.2: LDP configuration... 506 Task 4.3: MPLS LSP options configuration... 514 Task 4.4: BGP configuration... 518 Task 4.5: MPLS L3VPN inet-blue... 522 Task 4.6: MPLS L3VPN inet-green... 530 Task 4.7: MPLS L3VPN inet-red... 535 Part 2: MPLS, MPLS L3VPN and EVPN.... 542 Task 4.8: RSVP configuration... 544 Task 4.9: RSVP LSP configuration... 547 Task 4.10: BGP configuration... 552 Task 4.11: EVPN inet-purple... 555 Task 4.12: EVPN inet-blue... 560 Task 4.13: EVPN inet-green... 566 Task 4.14: EVPN inet-red... 572 Part 3: MPLS L3VPN and VLAN-aware EVPN.... 579 Task 4.16: EVPN north configuration... 581 Task 4.17: EVPN south configuration... 589 Task 4.18: EVPN multihoming... 601 Task 4.19: VLAN-based EVPN configuration... 620 Part 4: controllerless overlay and EVPN DCI... 626 Task 4.20: DC1 Controllerless overlay part 1: routing and signaling... 627 10

11 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 4.21: DC1 Controllerless overlay part 2: the overlay... 631 Task 4.22: DC2 Controllerless overlay part 1: the underlay... 636 Task 4.23: DC2 Controllerless overlay part 2: the overlay... 642 Task 4.24: EVPN stitching... 653 Appendix Chapter 5: Security... 665 Part 1: Securing the datacenter... 665 Task 5.1: vsrx zone and interface configuration... 666 Task 5.2: vsrx policy configuration... 671 Task 5.3: vsrx NAT... 678 Task 5.4: vsrx Screens... 687 Task 5.5: vsrx RE protection... 691 Task 5.6: Limiting bandwidth using a stateless firewall filter... 695 Appendix Chapter 6: Class of Service... 698 Part 1: CoS inside the datacenter.... 698 Task 6.1: Forwarding classes... 699 Task 6.2: Scheduling... 701 Task 6.3: WRED... 709 Task 6.4: BA classifiers... 713 Task 6.5: Rewrite rules... 715 Task 6.6: Traffic classification on vqfx3 and vqfx4... 717 Task 6.6: Traffic classification on vqfx5... 720 QFX5100 Class of Service.... 722 Appendix Chapter 7: Management... 729 Task 7.1: Zero Touch Provisioning (ZTP)... 730 Task 7.2: Python using Netconf... 733 Task 7.3: Junos Space... 735 Task 7.4: On box scripting... 742 Task 7.5: On box scripting 2... 747 Task 7.6: On box scripting 3... 749 Appendix Superlab... 751 Appendix Superlab Chapter 1: Device management... 751 Task 1.1: Zero Touch Provisioning (ZTP)... 751 11

12 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 1.2 : Junos Space... 751 Task 1.3: On Box scripting... 751 Task 1.4: Netconf... 752 Appendix Superlab Chapter 2: Underlay... 753 Task 2.1: Multi Chassis Link Aggregation (MC-LAG)... 753 Task 2.2: Layer 2 underlay configuration... 755 Task 2.3: Layer 2 underlay features... 756 Task 2.4: BUM traffic handling... 757 Task 2.5: Layer 2 redundancy... 757 Task 2.6: Layer 3 Underlay MAIN DC... 757 Task 2.7: Layer 3 underlay routing... 758 Task 2.8: ebgp underlay... 759 Appendix Superlab Chapter 3: Controllerless Overlay... 762 Task 3.1: EVPN overlay configuration... 762 Task 3.2: EVPN/VLAN service configuration... 764 Task 3.3: EVPN/VXLAN service tuning... 767 Task 3.4: EVPN signaling... 768 Appendix Superlab Chapter 4: Data Center Interconnect... 769 Task 4.1: DCI configuration... 769 Task 4.2: DC1 redundancy... 775 Task 4.3: (Inter) Data Center connectivity... 775 Task 4.4: Data Center connectivity to external server... 776 Appendix Superlab Chapter 5: Security... 777 Task 5.1: User authentication and autorisation... 777 Task 5.2: SRX Configuration... 777 Task 5.3: RE protection... 778 Appendix Superlab Chapter 6: Class of Service... 779 Task 6.1: Forwarding Classes... 779 Task 6.2: Schedulers and traffic profiles... 780 Task 6.3: Policing... 781 12

13 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Introduction About The Authors Said van de Klundert Said is a dedicated network engineer and passionate technical writer. He is JNCIE certified in the areas he is most passionate about, holding the JNCIE-DC#26 and JNCIE-SP#2573 certification. Said has over 10 years of experience in the IT and networking industry. He has been a builder of networks for ISPs, data centers and clouds. After fulfilling different technical roles for Ericsson and Vodafone, he is now tying together clouds, data centers and broadband at Interconnect. In addition to this, he is a content developer for inet ZERO. Through his blogs, he hopes to inspire and help others. In his spare time he is also active as a Juniper ambassador, which he considers both an honor as well as a lot of fun. In addition to all of this, he is also enjoying life as a father to Jan van de Klundert and a husband to Anne van de Klundert. 13

14 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Jörg Buesink Jörg lives in the Netherlands and brings more than 15 years of experience in the IT and networking industry. He worked for several large service providers in the role of technical consultant, designer and network architect. He has extensive experience in network implementation, design and architecture. Jörg is quadruple JNCIE certified (JNCIE-DC#007, JNCIE-ENT#21, JNCIE-SP#284 and JNCIE-SEC#30). He is also triple Cisco CCIE#15032 (Routing/ Switching, Service provider and Security), Cisco CCDE#20110002 and Huawei HCIE#2188 Routing and Switching certified. When not behind a computer he likes to discover the world and enjoys spending time with his son Sem. 14

15 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Copyright and licensing information All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means without the prior written permission of inet ZERO a registered company in the Netherlands. This product cannot be used by or transferred to any other person. You are not allowed to rent, lease, loan or (re)sell inet ZERO training products including this workbook and its configurations. You are not allowed to modify, copy, upload, email, share, distribute this workbook and supporting materials in any way. This product may only be used and printed for your own personal use and may not be used in any commercial way. Warning: Besides standard anti piracy techniques like document watermarks and password protection this workbook also contains a steganographyid making this workbook unique and always traceable to the original buyer. Juniper (c), Juniper Networks inc, JNCIE, JNCIE-DC, Junos, JNCIP, JNCIS, JNCIA, Juniper Networks Certified Internet Expert, are registered trademarks of Juniper Networks, Inc. Disclaimer This workbook is designed to assist candidates in the preparation for Juniper Networks JNCIE Data Center practical Lab Exam. Any similarities between material presented in this workbook and the actual JNCIE-DC lab exam authorised by Juniper Networks or actual settings in any production networks in real life are completely coincidental, unexpected and absolutely unintended by the authors. While a lot of efforts have been put in order to ensure that all material is as complete and accurate as possible, the enclosed material is presented on an as is basis. The authors and inetzero do not assume any liability or responsibility to any person or entity with respect to loss or damages incurred from the information or solution contained/presented in/by this workbook. 15

16 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) How To Use This Book The inetzero JNCIE-DC Lab exam preparation workbook is specifically designed for candidates to practice technologies in the public blueprint of Juniper Networks JNCIE-DC Lab Exam. It also helps candidates practice skills relating to task prioritisation, dependencies and correlations. The JNCIE-DC Lab exam preparation workbook is based on the JNCIE-DC Lab topology of inet ZERO which consists of 6 virtual MX-series routers running JUNOS version 16.1, 6 virtual QFX switches running JUNOS version 15.1, one virtual SRX firewall running JUNOS version 12.1, one Centos linux host and a server running JUNOS space. More information about the topology or rack rental options can be found on our website www.inetzero.com Target audience This workbook is developed for experienced network engineers who are preparing for the Juniper Networks JNCIE-DC lab exam. Although not required it is highly recommended that you have passed the JNCIP-DC written exam before you start using this workbook. inet ZERO s JNCIE-DC lab preparation workbook is developed in such a way that we expect you to have theoretical knowledge about the JNCIE-DC lab exam blueprint topics (JNCIP-DC certified or working towards this certification). In this workbook you will find several technology introductions. However do not expect a full explanation about OSPF, BGP, etc as there are plenty of other great books on the market for that purpose. In this workbook we test if you are able to configure Juniper Networks Data Center technologies based on certain requirements and understand how they interact to ensure you are fully prepared for the JNCIE- DC lab exam. 16

20 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Chapter 1: Layer 2 Underlay Virtual Chassis Fabric (VCF) and Multi-Chassis Link Aggregation Group (MC-LAG) offer two different approaches to constructing layer 2 underlay networks. The VCF is a Juniper proprietary solution that allows you to combine up to 20 devices that can be managed as a single device. A VCF is constructed along the lines of a 3-stage Clos topology and runs Juniper proprietary protocols. You'll mostly see topologies wherein the VCF is presented as a 3 stage Clos topology that is folded onto itself: The MC-LAG approach is different in that it does not require any proprietary protocols. In an MC-LAG setup, every device is runs its own control plane operations and is managed separately. MC-LAG peers are configure to appear as a single switch using 802.3ad: Both setups can be used to offer a high-available layer 2 underlay as well as a redundant layer 3 gateway. JNCIE-DC Lab workbook: Chapter 1: Layer 2 Underlay 20

21 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Virtual Chassis Fabric Junipers Virtual Chassis Fabric (VCF) technology can be used to construct a three stage Clos switching fabric. A VCF is made up of individual member switches that are placed into a spine and leaf architecture. The whole of the VCF is managed as a single device. We can identify two layers in the VCF architecture; the spine layer and the leaf layer. The spine layer can contain up to four spine nodes. Every spine node should have 1 or more connections to every leaf node. The spines nodes can function as a Routing-Engine (RE) or as a Line Card (LC). Up to 16 leaf nodes can be connected in the leaf layer. Every leaf device functions as a LC. Routing-engines The spine layer can contain up to two devices that function as a RE. One RE is active and the other is standby. The active RE is called the master RE and the standby RE is called the backup RE. The whole of the VCF is controlled by the master RE. This means that that the master RE runs the control protocols and manages all the of the VCF member switches. Juniper offers high-availability (HA) features to minimize the effects in case the master RE fails. These HA features include Graceful Routing Engine Switchover (GRES), Non Stop Routing (NSR) and Non Stop Bridging (NSB). GRES can be activated to preserve interface and kernel information on the backup RE. NSR will have the backup RE run the RPD whereas NSB will have the backup RE run the L2CPD. None these HA features are active by default, they all require configuration. Line-cards Devices that are operating in LC-mode run only subset of Junos. The regular leaf nodes as well as spine nodes that were not selected as master or backup RE function in LC-mode. JNCIE-DC Lab workbook: Chapter 1: Layer 2 Underlay 21

22 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) VCF management. Whenever you log in to a VCF using any of the members' console ports, you will be connected to the master RE. Every member switch inside a VCF runs virtual console software and will redirect all console traffic to the master RE. It is also possible to set up a vty session to another member switch from the master RE. This can be done through the use of the 'request session member x' command. The OoB interfaces on all the individual member switches of the VCF are automatically placed inside a management VLAN. The layer 3 interface tied to this management VLAN is called the 'vme' interface, or Virtual Management Ethernet interface. When you connect to this IP address, or any other IP address configured on the VCF, you will automatically be connected to the master RE. Virtual Chassis Control Protocol. All switches inside the VCF run the Virtual Chassis Control Protocol (VCCP). The VCCP is a Juniper proprietary protocol that is based on IS-IS. Switches running VCCP exchange LSA-based discovery messages that enables them to discover the VCF topology. When devices are done building the topology, they run an SPF algorithm for every PFE. The result is a loop-free path between every PFE inside the VCF. When the switches run SPF, they can take into account multiple paths and will automatically load share traffic across the links. VCF configuration options. There are three different provisioning options: - non-provisioned: configure VCP and let the rest happen automatically. - pre-provisioned: statically configure every member of the VCF by including the switch serial number, member-id and role in the VCF configuration. - auto-provisioned: pre-provision the RE switches only and have the other switches automatically join the VCF as LCs. Virtual Chassis Ports. The connections between the spine and leaf nodes are called Virtual Chassis Port (VCP) connections. VCPs carry both control plane as well as forwarding plane traffic within the VCF. JNCIE-DC Lab workbook: Chapter 1: Layer 2 Underlay By default, ports on QFX switches operate as 'normal' Ethernet ports. Any (non-channelized) QSFP+ or SFP+ port can be turned into a VCP. This can be done manually or automatically. 22

30 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Part 1: MC-LAG Figure 1 - Physical topology Note: starting topology is configured with IP-addressing only. JNCIE-DC Lab workbook: Chapter 1: Layer 2 Underlay 30

31 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 (DEMO) Task 1.1: ToR configuraton Configure VLAN 100 on interface xe-0/0/0 on both vqfx1 as well as vqfx2. Configure an IRB interface for the VLAN. Use the following IP addresses: vqfx1 192.168.100.1/30 vqfx2 192.168.100.2/30 Traffic between the switches should be tagged. Task 1.2: MC-LAG peers: server-facing configuration Configure vqfx1 and vqfx2 as MC-LAG peers. Use IRB 100 to source the ICCP session. Use 'inetzero' as the MD5 authentication key. Set the mode to active-active and determine the other configuration parameters yourself. Use the OoB network for additional checks between the MC-LAG peers, enabling the network to handle split-brain scenarios. During a split brain, vqfx2 should become the inactive MC-LAG peer. Enable the MC-LAG interface for VLANs 10, 11 and 12. Task 1.3: MC-LAG peers: core-facing configuration Configure an AE uplink towards the vmx routers. Use interfaces xe-0/0/2 and xe-0/0/3 on both vqfx devices. Enable the uplink for the server VLANs. Make sure that communications inside the server VLANs can tolerate the loss of an uplink. Task 1.4: vmx LAG configuration Configure VLAN 101 on both vmx1 as well as vmx2. Configure an IRB interface for the VLAN. Use the following IP addresses: vmx1 192.168.101.1/30 vmx2 192.168.101.2/30 Traffic between the routers should be tagged. The links between the vmx routers should be bundled into a LAG. JNCIE-DC Lab workbook: Chapter 1: Layer 2 Underlay 31

138 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 set switch-options service-id 1 Do not forget to configure the VLANs that are added to the trunk. On EX-switches without the ELS configuration, a commit error would appear when VLANs were assigned to interfaces without being configured. The ELS issues no such warning. When the VLAN configuration is skipped, the VLANs will not handle any traffic: set vlans vlan-10 vlan-id 10 set vlans vlan-11 vlan-id 11 set vlans vlan-12 vlan-id 12 vqfx2: The configuration on the vqfx2 is similar to the one required for vqfx1. The highlighted parts of the configuration emphasize what the differences are from the vqfx1 configuration: set chassis aggregated-devices ethernet device-count 2 set interfaces xe-0/0/1 ether-options 802.3ad ae0 set interfaces ae0 aggregated-ether-options lacp active set interfaces ae0 aggregated-ether-options lacp system-id 00:00:00:00:11:22 set interfaces ae0 aggregated-ether-options lacp admin-key 1 set interfaces ae0 aggregated-ether-options mc-ae mc-ae-id 1 set interfaces ae0 aggregated-ether-options mc-ae redundancy-group 1 set interfaces ae0 aggregated-ether-options mc-ae chassis-id 1 set interfaces ae0 aggregated-ether-options mc-ae mode active-active set interfaces ae0 aggregated-ether-options mc-ae status-control standby set interfaces ae0 unit 0 family ethernet-switching interface-mode trunk vlan members 10-12 set protocols iccp local-ip-addr 192.168.100.2 set protocols iccp authentication-key inetzero set protocols iccp peer 192.168.100.1 redundancy-group-id-list 1 set protocols iccp peer 192.168.100.1 backup-liveness-detection backup-peer-ip 10.10.20.8 set protocols iccp peer 192.168.100.1 liveness-detection minimum-interval 3000 set multi-chassis multi-chassis-protection 192.168.100.1 interface xe-0/0/0 set switch-options service-id 1 set vlans vlan-10 vlan-id 10 set vlans vlan-11 vlan-id 11 set vlans vlan-12 vlan-id 12 JNCIE-DC Lab workbook: Appendix Chapter 1: Layer 2 Underlay 138

139 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 Verification There are quite a few things that require verification for this task. In this example, we'll start our verification at the interface level and then move on to check the MC-AE together with ICCP. Checking the AE interface: jncie@vqfx1> show interfaces terse match ae xe-0/0/1.0 up up aenet --> ae0.0 ae0 up up ae0.0 up up eth-switch This output tells us that AE0 is using 1 physical link (xe-0/0/1) and that the AE0 interface itself is up. The first 'up' tells us the link is administratively enabled and the second 'up' shows us that the link is up. Additional verification of the AE interface can be done as follows: jncie@vqfx1> show interfaces ae0 extensive Physical interface: ae0 ) (MC-AE-1, active), Enabled, Physical link is Up Interface index: 662, SNMP ifindex: 537, Generation: 1245 Link-level type: Ethernet, MTU: 1514, Speed: 10Gbps, BPDU Error: None, MAC-REWRITE... Port Aggregate member links: 1 LACP info: Role System System Port Port priority identifier priority number key xe-0/0/1.0 Actor 127 00:00:00:00:11:22 127 1 1 xe-0/0/1.0 Partner 127 00:05:86:71:25:c0 127 1 5 LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx xe-0/0/1.0 980 941 0 0 Marker Statistics: Marker Rx Resp Tx Unknown Rx Illegal Rx xe-0/0/1.0 0 0 0 0 Protocol eth-switch, MTU: 1514, Generation: 793, Route table: 5 Flags: Trunk-Mode This command outputs additional information over the 'terse' option. In relation to the AE interface, the interesting information here is located at the bottom of the output. Here we see the local system identifier used in LACP packets by the Actor (local device), the LACP key in use and the amount of LACP PDUs send and received on the physical interface. To check what LACP role the devices on either side of the links assume (active or passive) we issue the following command: JNCIE-DC Lab workbook: Appendix Chapter 1: Layer 2 Underlay 139

140 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 jncie@vqfx1> show lacp interfaces Aggregated interface: ae0 LACP state: Role Exp Def Dist Col Syn Aggr Timeout Activity xe-0/0/1 Actor No No Yes Yes Yes Yes Fast Active xe-0/0/1 Partner No No Yes Yes Yes Yes Fast Active LACP protocol: Receive State Transmit State Mux State xe-0/0/1 Current Fast periodic Collecting distributing Here we see the Actor (local device) as well as the partner (remote device) is actively trying to form a LAG using this link. Another very nice command to consider during troubleshooting is the following: jncie@vqfx1> show lacp statistics interfaces Aggregated interface: ae0 LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx xe-0/0/1 6739 6480 0 0 On vqfx2, we check the following: - the link status of the AE interface - the status of the physical link used as member of the LAG - the LACP system ID and the LACP key ID jncie@vqfx2> show interfaces ae0 extensive Physical interface: ae0 ) (MC-AE-1, active), Enabled, Physical link is Up Interface index: 662, SNMP ifindex: 542, Generation: 1805 Link-level type: Ethernet, MTU: 1514, Speed: 10Gbps, BPDU Error: None, MAC-REWRITE... Aggregate member links: 1 Port LACP info: Role System System Port Port priority identifier priority number key xe-0/0/1.0 Actor 127 00:00:00:00:11:22 127 32769 1 xe-0/0/1.0 Partner 127 00:05:86:71:25:c0 127 2 5 LACP Statistics: LACP Rx LACP Tx Unknown Rx Illegal Rx xe-0/0/1.0 6394 6123 0 0 Marker Statistics: Marker Rx Resp Tx Unknown Rx Illegal Rx xe-0/0/1.0 0 0 0 0 Protocol eth-switch, MTU: 1514, Generation: 1114, Route table: 5 Flags: Trunk-Mode JNCIE-DC Lab workbook: Appendix Chapter 1: Layer 2 Underlay 140

141 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 After this, we check what VLANs are active on this link: jncie@vqfx1> show ethernet-switching interface ae0.0 Routing Instance Name : default-switch Logical Interface flags (DL - disable learning, AD - packet action drop, LH - MAC limit hit, DN - interface down, MMAS - Mac-move action shutdown, SCTL - shutdown by Storm-control ) Logical Vlan TAG MAC STP Logical Tagging interface members limit state interface flags ae0.0 8192 tagged vlan-10 10 1024 Forwarding tagged vlan-11 11 1024 Forwarding tagged vlan-12 12 1024 Forwarding tagged jncie@vqfx2> show ethernet-switching interface ae0.0 Routing Instance Name : default-switch Logical Interface flags (DL - disable learning, AD - packet action drop, LH - MAC limit hit, DN - interface down, MMAS - Mac-move action shutdown, SCTL - shutdown by Storm-control ) Logical Vlan TAG MAC STP Logical Tagging interface members limit state interface flags ae0.0 8192 tagged vlan-10 10 1024 Forwarding tagged vlan-11 11 1024 Forwarding tagged vlan-12 12 1024 Forwarding tagged After verifying the normal LAG operations, we move over to the MC-LAG verification. The primary verification commands at our disposal are: show iccp - used to check status information about the ICCP protocol show interface mc-ae - used to check status information about the MC-AE interface In addition to these commands, we can also use the 'show ether-switching table' command to verify whether or not MAC addresses are being learned on both of the MC-LAG peers. We start out verifying the ICCP protocol on vqfx1: jncie@vqfx1> show iccp Redundancy Group Information for peer 192.168.100.2 TCP Connection : Established Liveliness Detection : Up Backup liveness peer status: Up Redundancy Group ID Status 1 Up JNCIE-DC Lab workbook: Appendix Chapter 1: Layer 2 Underlay Client Application: l2ald_iccpd_client Redundancy Group IDs Joined: 1 141

142 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 Client Application: lacpd Redundancy Group IDs Joined: 1 The output basically tells us everything we need to know. vqfx1 has an ICCP session with 192.168.100.2 that is established. The 'Liveness detection' tells us that the BFD session was established. The 'Backup liveness' status informs us over the fact that vqfx1 can 'see' vqfx2 over an alternative path (in this case the OoB network). Note that we can also verify BFD through the use of the following command: jncie@vqfx1> show bfd session Detect Transmit Address State Interface Time Interval Multiplier 192.168.100.2 Up 9.000 3.000 3 Here, we see a BFD session formed with the 192.168.100.2 address, which is the configured ICCP peer. The BFD status is up and the detect time is 9 seconds. Next, we check the MC-AE interface status information: jncie@vqfx1> show interfaces mc-ae extensive Member Link : ae0 Current State Machine's State: mcae active state Local Status : active Local State : up Peer Status : active Peer State : up Logical Interface : ae0.0 Topology Type : bridge Local State : up Peer State : up Peer Ip/MCP/State : 192.168.100.2 xe-0/0/0.0 up MCAE Configuration Redundancy Group : 1 MCAE ID : 1 MCAE Mode : active_active Status Control : active Chassis ID : 0 LACP Configuration System ID : 00:00:00:00:11:22 Admin Key : 1 We check the command output for the 'mcae active state', indicating that the MC-AE is active and working. The 'Local Status' and the Peer Status' tell us whether or not the MC-LAG peers are able to function as a part of this MC-LAG. When everything is operational, the status is 'active'. JNCIE-DC Lab workbook: Appendix Chapter 1: Layer 2 Underlay 142

460 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 Task 3.19: Layer 3 VXLAN gateway configuration Configure the following layer 3 gateways on vmx3: VXLAN / VNI Gateway 105 10.200.105.254 106 10.200.106.254 Configure the following layer 3 gateways on vmx4: VXLAN / VNI Gateway 107 10.200.107.254 108 10.200.108.254 Only import VXLAN segments into the routing-instance when the vmx offers a gateway for the VXLAN segment. Make sure there is IP connectivity between the different subnets Solution We import the relevant VXLAN segment into the virtual-switch instance by configuring the VNI inside the routing instance under the [ routing-instances fabric protocols evpn vni-options vni xxx vrf-target target:65000:xxx ] stanza. To make sure that there is IP connectivity between the different subnets, we also need to advertise the subnet we configure on the IRB interface into OSPF. We can do this by including the IRB interface in the OSPF configuration. Since we do not want to discover any OSPF neighbor adjacencies in this subnet, we use the keyword 'passive'. vmx3: set interfaces irb unit 105 family inet address 10.200.105.254/24 set interfaces irb unit 106 family inet address 10.200.106.254/24 set protocols ospf area 0.0.0.0 interface irb.105 passive set protocols ospf area 0.0.0.0 interface irb.106 passive set routing-instances fabric protocols evpn vni-options vni 105 vrf-target target:65000:105 set routing-instances fabric protocols evpn vni-options vni 106 vrf-target target:65000:106 JNCIE-DC Lab workbook: Appendix Chapter 3: Controllerless Overlay set routing-instances fabric bridge-domains bd_105 vlan-id 105 set routing-instances fabric bridge-domains bd_105 routing-interface irb.105 460

461 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 set routing-instances fabric bridge-domains bd_105 vxlan vni 105 set routing-instances fabric bridge-domains bd_106 vlan-id 106 set routing-instances fabric bridge-domains bd_106 routing-interface irb.106 set routing-instances fabric bridge-domains bd_106 vxlan vni 106 vmx4: set interfaces irb unit 107 family inet address 10.200.107.254/24 set interfaces irb unit 108 family inet address 10.200.108.254/24 set protocols ospf area 0.0.0.0 interface irb.107 passive set protocols ospf area 0.0.0.0 interface irb.108 passive set routing-instances fabric protocols evpn vni-options vni 107 vrf-target target:65000:107 set routing-instances fabric protocols evpn vni-options vni 108 vrf-target target:65000:108 set routing-instances fabric bridge-domains bd_107 vlan-id 107 set routing-instances fabric bridge-domains bd_107 routing-interface irb.107 set routing-instances fabric bridge-domains bd_107 vxlan vni 107 set routing-instances fabric bridge-domains bd_108 vlan-id 108 set routing-instances fabric bridge-domains bd_108 routing-interface irb.108 set routing-instances fabric bridge-domains bd_108 vxlan vni 108 JNCIE-DC Lab workbook: Appendix Chapter 3: Controllerless Overlay 461

782 inet ZERO JNCIE-DC (DATA CENTER) WORKBOOK v1.0 DEMO END For more information: www.inetzero.com For personal non commercial use only do not distribute - SteganoID=ON JNCIE-DC Lab workbook: Appendix Superlab 782