Junos® OS Tunnel and Encryption Services Interfaces User Guide for Routing Devices Copyright © 2021 Juniper Networks, Inc
Total Page:16
File Type:pdf, Size:1020Kb
Junos® OS Tunnel and Encryption Services Interfaces User Guide for Routing Devices Published 2021-09-17 ii Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Junos® OS Tunnel and Encryption Services Interfaces User Guide for Routing Devices Copyright © 2021 Juniper Networks, Inc. All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. iii Table of Contents About This Guide | x 1 Tunnel Services Tunnel Services Overview | 2 Tunnel Services Overview | 2 Tunnel Interfaces on MX Series Routers with Line Cards (MPC7E through MPC11E) | 6 Dynamic Tunnels Overview | 12 Configuring Tunnel Interfaces | 13 Tunnel Interface Configuration on MX Series Routers Overview | 14 Configuring Tunnel Interfaces on an MX Series Router with a 16x10GE 3D MPC | 16 Configuring Tunnel Interfaces on MX Series Routers with the MPC3E | 17 Example: Configuring Tunnel Interfaces on the MPC3E | 18 Requirements for Configuration of Tunnel Interfaces on the MPC3E | 18 Ethernet Tunnel Configuration Overview | 18 Configuring a 20-Gigabit Ethernet Tunnel | 19 Configuring a Tunnel With Unspecified Bandwidth | 20 Configuring Tunnel Interfaces on MX Series Routers with MPC4E | 20 Configuring Tunnel Interfaces on MX Series Routers with MPC7E-MRATE/MPC7E-10G | 21 Configuring Tunnel Interfaces on MX Series Routers with MX2K-MPC8E | 22 Configuring Tunnel Interfaces on MX Series Routers with MX2K-MPC9E | 24 Configuring Tunnel Interfaces on MX Series Routers with MPC10E-10C and MPC10E-15C | 25 Configuring Tunnel Interfaces on MX Series Routers with MX2K-MPC11E | 26 Example: Configuring Tunnel Interfaces on a Gigabit Ethernet 40-Port DPC | 27 Example: Configuring Tunnel Interfaces on a 10-Gigabit Ethernet 4-Port DPC | 28 Configuring Tunnel Interfaces on MX 204 Routers | 28 Configuring Tunnel Interfaces on T4000 Routers | 30 iv Configuring Flexible Tunnel Interfaces | 31 Flexible Tunnel Interfaces Overview | 31 Configuring Flexible Tunnel Interfaces | 36 Configuring FTI on PE1 | 36 Verification | 39 Example: Configuring Flexible Tunnel Interfaces on MX Series Routers | 41 Requirements | 41 Overview | 41 Configuration | 42 Verification | 47 Configuring IP-IP Decapsulation by Tunnel Termination on FTI | 48 Configuring GRE Tunnel Interfaces | 50 Understanding Generic Routing Encapsulation | 50 Configuring Generic Routing Encapsulation Tunneling | 53 Configuring a GRE Tunnel Port | 54 Configuring Tunnels to Use Generic Routing Encapsulation | 54 GRE Keepalive Time Overview | 55 Configuring GRE Keepalive Time | 57 Configuring Keepalive Time and Hold time for a GRE Tunnel Interface | 57 Display GRE Keepalive Time Configuration | 58 Display Keepalive Time Information on a GRE Tunnel Interface | 59 Enabling Fragmentation on GRE Tunnels | 61 Configuring IP Tunnel Interfaces | 62 Configuring IPv6-over-IPv4 Tunnels | 62 Example: Configuring an IPv6-over-IPv4 Tunnel | 63 Filtering Unicast Packets Through Multicast Tunnel Interfaces | 64 Configuring Unicast Tunnels | 64 Examples: Configuring Unicast Tunnels | 71 Restricting Tunnels to Multicast Traffic | 73 v Connecting Logical Systems Using Logical Tunnel Interfaces | 73 Configuring Logical Tunnel Interfaces | 74 Guidelines for Configuring Logical Tunnels on ACX Series Routers | 76 Example: Configuring Logical Tunnels | 79 Configuring an Interface in the VRF Domain to Receive Multicast Traffic | 81 Redundant Logical Tunnels Overview | 83 Configuring Redundant Logical Tunnels | 85 Example: Configuring Redundant Logical Tunnels | 87 Requirements | 87 Overview | 87 Configuration | 89 Verification | 97 Configuring Layer 2 Ethernet Services over GRE Tunnel Interfaces | 101 Layer 2 Services over GRE Tunnel Interfaces on MX Series with MPCs | 101 Format of GRE Frames and Processing of GRE Interfaces for Layer 2 Ethernet Packets | 102 Guidelines for Configuring Layer 2 Ethernet Traffic Over GRE Tunnels | 103 Sample Scenarios of Configuring Layer 2 Ethernet Traffic Over GRE Tunnels | 104 Configuring Layer 2 Services over GRE Logical Interfaces in Bridge Domains | 105 Example: Configuring Layer 2 Services Over GRE Logical Interfaces in Bridge Domains | 107 Requirements | 107 Overview | 107 Configuration | 108 Verification | 111 Example: Configuring Layer 2 Services Over GRE Logical Interfaces in Bridge Domains with IPv6 Transport | 114 Requirements | 114 Overview | 114 Configuration | 115 Verification | 121 Configuring PIM Tunnels | 122 vi Facilitating VRF Table Lookup Using Virtual Loopback Tunnel Interfaces | 123 Configuring Virtual Loopback Tunnels for VRF Table Lookup | 123 Configuring Tunnel Interfaces for Routing Table Lookup | 125 Example: Configuring a Virtual Loopback Tunnel for VRF Table Lookup | 126 Example: Virtual Routing and Forwarding (VRF) and Service Configuration | 128 BGP Layer 3 VPN over IP-IP Tunnels Overview | 130 2 Encryption Services Encryption Services Overview | 133 Configuring Encryption Interfaces | 133 Configuring Encryption Interfaces | 134 Configuring Filters for Traffic Transiting the ES PIC | 136 Configuring an ES Tunnel Interface for a Layer 3 VPN | 143 Configuring ES PIC Redundancy | 143 Configuring IPsec Tunnel Redundancy | 145 3 Configuration Statements address (Interfaces) | 148 allow-fragmentation | 149 apply-groups-except | 151 backup-destination | 153 backup-interface | 154 bandwidth (Tunnel Services) | 156 clear-dont-fragment-bit (Interfaces GRE Tunnels) | 158 copy-tos-to-outer-ip-header | 160 core-facing | 161 destination (Interfaces) | 163 destination (Routing Instance) | 165 vii destination (Tunnel Remote End) | 166 destination-networks | 168 destination-udp-port (FTI) | 170 do-not-fragment | 171 dynamic-tunnels | 173 es-options | 176 fabric loopback wan | 177 family | 179 family bridge | 181 family bridge (GRE Interfaces) | 183 filter | 185 hold-time (OAM) | 187 interfaces | 188 ipip | 190 ipsec-sa | 191 keepalive-time | 193 key | 195 multicast-only | 197 peer-unit | 198 peer-certificate-type | 200 reassemble-packets | 201 redundancy-group (Interfaces) | 203 redundancy-group (Chassis - MX Series) | 205 routing-instance | 207 routing-instances | 208 viii routing-options | 210 source | 212 source | 213 source-address | 215 ttl | 217 tunnel | 219 tunnel | 221 tunnel-termination (fti) | 223 tunnel-services (Chassis) | 224 udp (FTI) | 226 unit (Interfaces) | 228 unit (Interfaces) | 230 vni (Interfaces) | 232 vxlan-gpe (FTI) | 233 Configuration Statements: Generic Routing Encapsulation (GRE) Tunnel, 4 IPIP, and UDP Encapsulation and Decapsulation using Flexible Tunnel Interfaces (FTIs) address | 237 destination | 238 encapsulation | 240 gre | 242 ipip | 243 encapsulation-udp-fti | 245 key | 246 source | 248 tunnel | 250 ix tunnel-termination | 251 5 Operational Commands clear ike security-associations | 256 clear ipsec security-associations | 257 request ipsec switch | 260 request security certificate enroll (Signed) | 262 request security certificate enroll (Unsigned) | 264 request security key-pair | 266 request system certificate add | 268 show ike security-associations | 270 show interfaces (Encryption) | 277 show interfaces (GRE) | 287 show interfaces (IP-over-IP) | 301 show interfaces (Logical Tunnel) | 309 show interfaces (Multicast Tunnel) | 318 show interfaces (PIM) | 326 show interfaces (Virtual Loopback Tunnel) | 332 show interfaces fti | 341 show ipsec certificates | 356 show ipsec redundancy | 361 show ipsec security-associations | 364 show system certificate | 370 x About This Guide Use this guide to configure and monitor tunneling, which encapsulates packets inside a transport protocol, providing a private, secure path through an otherwise public network. 1CHAPTER Tunnel Services Tunnel Services Overview | 2 Configuring Tunnel Interfaces | 13 Configuring Flexible Tunnel Interfaces | 31 Configuring GRE Tunnel Interfaces | 50 Configuring IP Tunnel Interfaces | 62 Filtering Unicast Packets Through Multicast Tunnel Interfaces | 64 Connecting Logical Systems Using Logical Tunnel Interfaces | 73 Configuring Layer 2 Ethernet Services over GRE Tunnel Interfaces | 101 Configuring PIM Tunnels | 122 Facilitating VRF Table Lookup Using Virtual Loopback Tunnel Interfaces | 123 BGP Layer 3 VPN over IP-IP Tunnels Overview | 130 2 Tunnel Services Overview IN THIS SECTION Tunnel Services Overview | 2 Tunnel Interfaces on MX Series Routers with Line Cards (MPC7E through