28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

aviva@RouterJ> show ldp traffic-statistics<br />

FEC Type Packets Bytes Shared<br />

192.168.16.1/32 Transit 15 1260 No<br />

Ingress 0 0 No<br />

192.168.19.1/32 Transit 0 0 No<br />

Ingress 0 0 No<br />

<strong>Discussion</strong><br />

To make sure that traffic is using the LSP, look at the traffic statistics on the LDP sessions<br />

with the show ldp traffic-statistics commands. The Packets column shows<br />

the number of packets that have been sent, and the Bytes column gives the total byte<br />

count of all the packets. In this recipe, RouterJ carried 15 packets (1,260 bytes) from<br />

RouterG (192.168.16.1), acting as the transit router for this traffic.<br />

14.4 Enabling LDP Authentication<br />

Problem<br />

You want to ensure that all LDP protocol traffic that your router accepts comes from<br />

devices known to you so that only trusted routers participate in determining the contents<br />

of the LDP database.<br />

Solution<br />

Configure MD5 authentication for each LDP session on the router. For authentication<br />

to work across all LDP peers, you need to configure MD5 authentication with<br />

the same password on all LDP sessions on all LDP routers. First, configure the session<br />

on the ingress router, RouterG:<br />

[edit protocols ldp]<br />

aviva@RouterG# set session 192.168.17.1 authentication-key $1991poPPi<br />

Then, configure the LDP session on the egress router:<br />

[edit protocols ldp]<br />

aviva@RouterF# set session 192.168.17.1 authentication-key $1991poPPi<br />

Finally, configure both LDP sessions on the transit router:<br />

[edit protocols ldp]<br />

aviva@RouterJ# set session 192.168.16.1 authentication-key $1991poPPi<br />

aviva@RouterJ# set session 192.168.19.1 authentication-key $1991poPPi<br />

<strong>Discussion</strong><br />

It’s a good security measure to authenticate the TCP connection used for LDP sessions<br />

to ensure against spoofing on the TCP connection. The JUNOS implementation<br />

LDP uses an MD5 signature for authentication.<br />

498 | Chapter 14: MPLS<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!