Juniper NFX250 User manual

Category
Software
Type
User manual
JDM User Guide for NFX250 Network Services
Platform
Modified: 2017-09-07
Copyright © 2017, Juniper Networks, Inc.
Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, California 94089
USA
408-745-2000
www.juniper.net
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates in
the United States and other countries. All other trademarks may be property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
JDM User Guide for NFX250 Network Services Platform
Copyright © 2017 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
END USER LICENSE AGREEMENT
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that
EULA.
Copyright © 2017, Juniper Networks, Inc.ii
Table of Contents
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Using the Examples in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Merging a Full Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Merging a Snippet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Part 1 Architecture Overview
Chapter 1 Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Understanding Disaggregated Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Disaggregated Junos OS VMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Understanding Virtio Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Understanding SR-IOV Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Comparing Virtio and SR-IOV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Understanding Physical and Virtual Components . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Part 2 Installation
Chapter 2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Managing Software Installation on NFX250 Network Services Platform . . . . . . . . 19
Upgrading an Image on the Disaggregated Junos OS Platform . . . . . . . . . . . . . . . 20
Reverting the System to the Factory-Default Configuration . . . . . . . . . . . . . . . . . 23
Rebooting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Part 3 Management
Chapter 3 Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Understanding the JDM CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Accessing the JDM Shell, JDM CLI, and JCP Prompts in a Disaggregated Junos
OS Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Accessing the JDM CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Accessing the JDM Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Accessing the JCP Prompt from the JDM CLI . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Accessing the Hypervisor from the JDM CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
iiiCopyright © 2017, Juniper Networks, Inc.
Accessing the ipsec-nm from the JDM CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Understanding User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Root Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Other User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Configuring JDM User Accounts and Authentication . . . . . . . . . . . . . . . . . . . . . . . . 31
Understanding JDM Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Out-of-Band Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
In-Band Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Configuring the Out-of-Band Management Interface for JDM . . . . . . . . . . . . . . . . 33
Configuring the Out-of-Band Management Interface with IPv4 Addressing
for JDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Configuring the Out-of-Band Management Interface with IPv6 Addressing
for JDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Configuring the In-Band Management Interface for JDM . . . . . . . . . . . . . . . . . . . . 35
Configuring the Out-of-Band Management Interface for Hypervisor . . . . . . . . . . 36
Configuring the Out-of-Band Management Interface with IPv4 Addressing
for Hypervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Configuring the Out-of-Band Management Interface with IPv6 Addressing
for Hypervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Configuring SSH Service and NETCONF-Over-SSH Connections for Remote
Access to the Disaggregated Junos OS Platform . . . . . . . . . . . . . . . . . . . . . . . 37
Configuring HTTP Access to the Disaggregated Junos OS Platform . . . . . . . . . . . 38
Configuring HTTPS Access to the Disaggregated Junos OS Platform . . . . . . . . . . 38
Configuring SNMP on JDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configuring SNMP Community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configuring SNMP System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configuring SNMP v3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Configuring SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Querying SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Managing Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Configuring Enhanced Orchestration in the Disaggregated Junos OS
Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Configuring IPSec in the Disaggregated Junos OS Platform . . . . . . . . . . . . . . . . . . 41
Viewing and Managing Centralized Log Files in a Disaggregated Junos OS
Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Enabling Centralized Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Viewing Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Managing Core Files for a Disaggregated Junos OS Platform . . . . . . . . . . . . . . . . 43
Viewing Core Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Synchronizing Time Using NTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Chapter 4 Management Configuration Statements and Operational Commands . . . 45
enhanced-orchestration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
https . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
ipsec-nm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
netconf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Copyright © 2017, Juniper Networks, Inc.iv
JDM User Guide for NFX250 Network Services Platform
ntp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
outbound-ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
phone-home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
rest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
traceoptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
upgrade-image-before-configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
show connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
show forwarding-options analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
show system inventory hardware cpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
show system inventory hardware memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
show system inventory hardware network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
show system inventory hardware storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
show system inventory software vnf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
show system services ipsec-nm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
show system visibility cpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
show system visibility host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
show system visibility jcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
show system visibility jdm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
show system visibility memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
show system visibility network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
show system visibility storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
show system visibility vnf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Part 4 Virtual Network Functions
Chapter 5 Virtual Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Understanding Virtual Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Managing the VNF Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Planning Resources for a VNF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Managing the VNF Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Preparing the Bootstrap Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Launching a VNF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Allocating Resources for a VNF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Specifying CPU for VNF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Allocating Memory for a VNF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Configuring VNF Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Configuring VNF Interfaces and VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Managing VNF States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Managing VNF MAC Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Managing MTU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Configuring Cross-connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Configuring Analyzer VNF and Port-mirroring . . . . . . . . . . . . . . . . . . . . . . . . . 117
Accessing a VNF from JDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Viewing List of VNFs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Displaying the VNF Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Deleting a VNF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
vCopyright © 2017, Juniper Networks, Inc.
Table of Contents
Chapter 6 Virtual Network Functions Configuration Statements and Operational
Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
cross-connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
host-os forwarding-options analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
hugepages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
init-descriptor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
ipsec-nm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
mac-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
no-autostart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
pci-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
virtual-cpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
virtual-network-functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
vjunos0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
vnf-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
show virtual-network-functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
show vlans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Part 5 Service Chaining
Chapter 7 Service Chaining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Understanding Service Chaining on Disaggregated Junos OS Platforms . . . . . . . 153
Configuring Service Chaining Using VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Configuring Service Chaining Using DHCP Services on VLANs . . . . . . . . . . . . . . . 155
Example: Configuring Service Chaining Using VLANs on NFX250 Network Services
Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Example: Configuring Service Chaining Using SR-IOV on NFX250 Network
Services Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Part 6 IPSec-NM
Chapter 8 Understanding IPSec-NM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Overview of IP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Configuring IP Security Network Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Configuring IPSec-NM Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Configuring AutoKey Internet Key Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Configuring IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Example: Configuring IKE, IPSec, and Security Zones . . . . . . . . . . . . . . . . . . . . . . 177
Chapter 9 IPSec-NM Configuration Statements and Operational Commands . . . . . 187
ipsec-nm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
ike . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Copyright © 2017, Juniper Networks, Inc.vi
JDM User Guide for NFX250 Network Services Platform
ipsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
show security ike sa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
show security ike active-peer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
show security ipsec sa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
show security ipsec statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
show security ipsec inactive-tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
show security ipsec tunnel-events-statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
viiCopyright © 2017, Juniper Networks, Inc.
Table of Contents
Copyright © 2017, Juniper Networks, Inc.viii
JDM User Guide for NFX250 Network Services Platform
List of Figures
Part 1 Architecture Overview
Chapter 1 Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Figure 1: Position of the Juniper Device Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Figure 2: Basic Disaggregated Junos OS Architecture . . . . . . . . . . . . . . . . . . . . . . . . 4
Figure 3: Virtual Machine Monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Figure 4: Containers–Overall Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Figure 5: VNF Bridging with Virtio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Figure 6: VNF Communication Using SR-IOV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Figure 7: Physical and Virtual Layers in the Disaggregated Junos OS . . . . . . . . . . . 13
Figure 8: Physical and Virtual Component Communication . . . . . . . . . . . . . . . . . . 14
Part 3 Management
Chapter 3 Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Figure 9: Out-of-band Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Figure 10: In-Band Management Interface Network . . . . . . . . . . . . . . . . . . . . . . . . 33
Figure 11: In-Band Management Interface Example . . . . . . . . . . . . . . . . . . . . . . . . 35
Part 4 Virtual Network Functions
Chapter 5 Virtual Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Figure 12: Network Connections Between JDM and the VMs . . . . . . . . . . . . . . . . 105
Part 5 Service Chaining
Chapter 7 Service Chaining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Figure 13: Virtual Network Functions on a Disaggregated Junos OS Platform . . . 153
Figure 14: Service Chaining Using VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Figure 15: Service Chaining Using SR-IOV—Device Infrastructure . . . . . . . . . . . . . 161
ixCopyright © 2017, Juniper Networks, Inc.
Copyright © 2017, Juniper Networks, Inc.x
JDM User Guide for NFX250 Network Services Platform
List of Tables
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Table 2: Text and Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Part 3 Management
Chapter 4 Management Configuration Statements and Operational Commands . . . 45
Table 3: show connections Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Table 4: show forwarding-options analyzer Output Fields . . . . . . . . . . . . . . . . . . 59
Table 5: show system inventory hardware cpu Output Fields . . . . . . . . . . . . . . . . 61
Table 6: show system inventory hardware memory Output Fields . . . . . . . . . . . . 64
Table 7: show system inventory hardware network Output Fields . . . . . . . . . . . . 66
Table 8: show system inventory hardware storage Output Fields . . . . . . . . . . . . . 68
Table 9: show system inventory software vnf Output Fields . . . . . . . . . . . . . . . . . . 71
Table 10: show system services ipsec-nm Output Fields . . . . . . . . . . . . . . . . . . . . 72
Table 11: show system visibility cpu Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 74
Table 12: show system visibility host Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 77
Table 13: show system visibility jcp Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 82
Table 14: show system visibility jdm Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 85
Table 15: show system visibility memory Output Fields . . . . . . . . . . . . . . . . . . . . . 89
Table 16: show system visibility network Output Fields . . . . . . . . . . . . . . . . . . . . . 91
Table 17: show system visibility storage Output Fields . . . . . . . . . . . . . . . . . . . . . . 94
Table 18: show system visibility vnf Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 97
Part 4 Virtual Network Functions
Chapter 5 Virtual Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Table 19: VNF Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Table 20: Physical CPU Allocation for NFX250-LS1 . . . . . . . . . . . . . . . . . . . . . . . 107
Table 21: Physical CPU Allocation for NFX250 . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Chapter 6 Virtual Network Functions Configuration Statements and Operational
Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Table 22: show virtual-network functions Output Fields . . . . . . . . . . . . . . . . . . . 145
Table 23: show virtual-network functions Output Fields . . . . . . . . . . . . . . . . . . . 149
Part 6 IPSec-NM
Chapter 8 Understanding IPSec-NM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Table 24: IKE, IPSec SAs, and Security Zones Configuration . . . . . . . . . . . . . . . . . 178
Chapter 9 IPSec-NM Configuration Statements and Operational Commands . . . . . 187
xiCopyright © 2017, Juniper Networks, Inc.
Table 25: show security ike sa Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Table 26: show security ike sa detail Output Fields . . . . . . . . . . . . . . . . . . . . . . . 199
Table 27: show security ike active-peer Output Fields . . . . . . . . . . . . . . . . . . . . . 203
Table 28: show security ipsec sa Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Table 29: show security ipsec sa detail Output Fields . . . . . . . . . . . . . . . . . . . . . 205
Table 30: show security ipsec statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Table 31: show security ipsec inactive-tunnels Output Fields . . . . . . . . . . . . . . . . 210
Copyright © 2017, Juniper Networks, Inc.xii
JDM User Guide for NFX250 Network Services Platform
About the Documentation
Documentation and Release Notes on page xiii
Supported Platforms on page xiii
Using the Examples in This Manual on page xiii
Documentation Conventions on page xv
Documentation Feedback on page xvii
Requesting Technical Support on page xvii
Documentation and Release Notes
To obtain the most current version of all Juniper Networks
®
technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
NFX Series
Using the Examples in This Manual
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
xiiiCopyright © 2017, Juniper Networks, Inc.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
Merging a Full Example
To merge a full example, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
Copyright © 2017, Juniper Networks, Inc.xiv
JDM User Guide for NFX250 Network Services Platform
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
[edit system scripts]
user@host# load merge relative /var/tmp/ex-script-snippet.conf
load complete
For more information about the load command, see CLI Explorer.
Documentation Conventions
Table 1 on page xv defines notice icons used in this guide.
Table 1: Notice Icons
DescriptionMeaningIcon
Indicates important features or instructions.Informational note
Indicates a situation that might result in loss of data or hardware damage.Caution
Alerts you to the risk of personal injury or death.Warning
Alerts you to the risk of personal injury from a laser.Laser warning
Indicates helpful information.Tip
Alerts you to a recommended use or implementation.Best practice
Table 2 on page xvi defines the text and syntax conventions used in this guide.
xvCopyright © 2017, Juniper Networks, Inc.
About the Documentation
Table 2: Text and Syntax Conventions
ExamplesDescriptionConvention
To enter configuration mode, type the
configure command:
user@host> configure
Represents text that you type.Bold text like this
user@host> show chassis alarms
No alarms currently active
Represents output that appears on the
terminal screen.
Fixed-width text like this
A policy term is a named structure
that defines match conditions and
actions.
Junos OS CLI User Guide
RFC 1997, BGP Communities Attribute
Introduces or emphasizes important
new terms.
Identifies guide names.
Identifies RFC and Internet draft titles.
Italic text like this
Configure the machine’s domain name:
[edit]
root@# set system domain-name
domain-name
Represents variables (options for which
you substitute a value) in commands or
configuration statements.
Italic text like this
To configure a stub area, include the
stub statement at the [edit protocols
ospf area area-id] hierarchy level.
The console port is labeled CONSOLE.
Represents names of configuration
statements, commands, files, and
directories; configuration hierarchy levels;
or labels on routing platform
components.
Text like this
stub <default-metric metric>;Encloses optional keywords or variables.< > (angle brackets)
broadcast | multicast
(string1 | string2 | string3)
Indicates a choice between the mutually
exclusive keywords or variables on either
side of the symbol. The set of choices is
often enclosed in parentheses for clarity.
| (pipe symbol)
rsvp { # Required for dynamic MPLS onlyIndicates a comment specified on the
same line as the configuration statement
to which it applies.
# (pound sign)
community name members [
community-ids ]
Encloses a variable for which you can
substitute one or more values.
[ ] (square brackets)
[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}
Identifies a level in the configuration
hierarchy.
Indention and braces ( { } )
Identifies a leaf statement at a
configuration hierarchy level.
; (semicolon)
GUI Conventions
Copyright © 2017, Juniper Networks, Inc.xvi
JDM User Guide for NFX250 Network Services Platform
Table 2: Text and Syntax Conventions (continued)
ExamplesDescriptionConvention
In the Logical Interfaces box, select
All Interfaces.
To cancel the configuration, click
Cancel.
Represents graphical user interface (GUI)
items you click or select.
Bold text like this
In the configuration editor hierarchy,
select Protocols>Ospf.
Separates levels in a hierarchy of menu
selections.
> (bold right angle bracket)
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can provide feedback by using either of the following
methods:
Online feedback rating system—On any page of the Juniper Networks TechLibrary site
at http://www.juniper.net/techpubs/index.html, simply click the stars to rate the content,
and use the pop-up form to provide us with information about your experience.
Alternately, you can use the online feedback form at
http://www.juniper.net/techpubs/feedback/.
E-mail—Send your comments to techpubs-comments@juniper.net. Include the document
or topic name, URL or page number, and software version (if applicable).
Requesting Technical Support
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.
Product warranties—For product warranty information, visit
http://www.juniper.net/support/warranty/.
JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
xviiCopyright © 2017, Juniper Networks, Inc.
About the Documentation
Find CSC offerings: http://www.juniper.net/customers/support/
Search for known bugs: https://prsearch.juniper.net/
Find product documentation: http://www.juniper.net/documentation/
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
Search technical bulletins for relevant hardware and software notifications:
http://kb.juniper.net/InfoCenter/
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://entitlementsearch.juniper.net/entitlementsearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
Use the Case Management tool in the CSC at http://www.juniper.net/cm/.
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, see
http://www.juniper.net/support/requesting-support.html.
Copyright © 2017, Juniper Networks, Inc.xviii
JDM User Guide for NFX250 Network Services Platform
PART 1
Architecture Overview
Architecture Overview on page 3
1Copyright © 2017, Juniper Networks, Inc.
Copyright © 2017, Juniper Networks, Inc.2
JDM User Guide for NFX250 Network Services Platform
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230

Juniper NFX250 User manual

Category
Software
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI