16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 15: Traffic Forwarding and Monitoring <strong>Configuration</strong><br />

3. The BSA then sends the DHCP discover message to the BSR, which converts it to a<br />

unicast packet and sends it to the DHCP server.<br />

4. The DHCP server looks up the client’s MAC address and option 82 information in its<br />

database. A valid client is assigned an IP address, which is returned to the client using<br />

a DHCP offer message. Both the BSR and BSA send this message upstream to the<br />

client.<br />

5. The client examines the DHCP offer, and if it is acceptable, issues a DHCP request<br />

message that is sent to the DHCP server through the BSA and BSR.<br />

6. The DHCP server confirms that the IP address is still available. If it is, the DHCP server<br />

updates its local tables and sends a DHCP ACK message to the client.<br />

7. The BSR receives the DHCP ACK message and passes the message to the BSA.<br />

8. The BSA creates an anti-spoofing filter by binding the IP address in the ACK message<br />

to the MAC address of the client. After this point, any DHCP messages from this IP<br />

address that are not bound to the client’s MAC address are dropped.<br />

9. The BSA sends the ACK message to the client so that the process of assigning a IP<br />

address can be completed.<br />

You configure DHCP snooping by including within a DHCP group the appropriate interfaces<br />

of the BSA:<br />

[edit routing-instances routing-instance-name bridge-domains bridge-domain-name<br />

forwarding-options dhcp-relay group group-name]<br />

interface interface-name;<br />

In a VPLS environment, DHCP requests are forwarded over pseudowires. You can configure<br />

DHCP snooping over VPLS at the [edit routing-instances routing-instance-name] hierarchy<br />

level.<br />

Configuring Port Mirroring<br />

DHCP snooping works on a per learning bridge basis in bridge domains. Each learning<br />

domain must have an upstream interface configured. This interface acts as the flood<br />

port for DHCP requests coming from the client side. DHCP requests are be forwarded<br />

across learning domains in a bridge domain. You can configure DHCP snooping on bridge<br />

domains at the [edit routing-instances routing-instance-name bridge-domains<br />

bridge-domain-name] hierarchy level. For an example of DHCP snooping on the MX Series<br />

router, see the Junos OS MX Series Ethernet Services Routers Solutions <strong>Guide</strong>.<br />

Port mirroring is the ability of a router to send a copy of an IPv4 or IPv6 packet to an<br />

external host address or a packet analyzer for analysis. Port mirroring is different from<br />

traffic sampling. In traffic sampling, a sampling key based on the packet header is sent<br />

to the Routing Engine. There, the key can be placed in a file, or cflowd packets based on<br />

the key can be sent to a cflowd server. In port mirroring, the entire packet is copied and<br />

sent out through a next-hop interface.<br />

One application for port mirroring sends a duplicate packet to a virtual tunnel. A next-hop<br />

group can then be configured to forward copies of this duplicate packet to several<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

375

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!