Junos Troubleshooting in the NOC
12.b
Lab Diagrams
Worldwide Education Services
1133 Innovation Way
Sunnyvale, CA 94089
USA
408-745-2000
www.juniper.net
Course Number: EDU-JUN-JTNOC
This document is produced by Juniper Networks. Inc.
This document or any part thereof may not be reproduced or transmitted in any form under penalty of law, without the prior written permission of Juniper Networks
Education Services.
Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Junos Troubleshooting in the NOC Lab Diagrams, Revision 12.b
Copyright 2014 Juniper Networks, Inc. All rights reserved.
Printed in USA.
Revision History:
Revision 10.a-December 2010
Revision 11.a-June 2011
Revision 12.a-March 2013
Revision 12.b--January 2014
The information in this document is current as of the date listed above.
The information in this document has been carefully verified and is believed to be accurate for software Release 12.2R2.5. Juniper Networks assumes no
responsibilities for any inaccuracies that may appear in this document. In no event will Juniper Networks be liable for direct. indirect. special. exemplary,
incidental, or consequential damages resulting from any defect or omission in this document, even if advised of the possibility of such damages.
Juniper Networks reserves the right to change, modify, transfer. or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has
no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an
agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper
Networks software, may contain prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should
consult the software license for further details.
Server
mxD-2
______
______,_ vr-device
______, _ Server
______
______,_ Term Server
mxA-2
mxB-1
mxB-2
mxC-1
mxC-2
',1
,i
________ jl
ir
______,_ I,
--
Note: Your instructor will provide address and access information.
Gateway
mxD-1
______,_
mxA-1
'Co'.--' lj
I
Student
Workstations
Management Addressing
Management
Network
Management Network Diagram
.o
Client Unable to Connect to the HnP Server
The Troubleshooting Process Lab
'
-.
...
m
. ....
 Was working. No known changes.
m
iiii
Two Directly Connected Devices Are Unable to Communicate
The Troubleshooting Process Lab
Lab: Identifying Hardware Components
mxA-1
loO: 192.168.31.1
ge-1/0/2.141 (.1)
vr1-1
EL__
ge-1/0/3.1411 (.1) 9
1 2.168.11.Q/30
(.1)
(.2).
R1
Virtual Routers
172.18.5.0/30
loO: 192.168.32.1
mxA-2
vr2-2
(. ge-1;0;3.141
192.168.12.0;30 ll
(.2)
(.2) ge-1/0/2.141
ci
._.,
0
(Y)
(.2)
R1
r-"'-----...(.1)
ldentifving ardware Components Lab:
Pod A Network Diagra
:
mxB-1
loO: 192.168.33.1
ge-1/0/2.142 (.1)
vr1-1
ge-1/0/3.1411 (.1)
192.168.13.0/30
(.2)
(.1)
$j
q 6
0
('1')
'-- 0)
(.2).
R1
[!utual Routers
172.18.5.0/30
mxB-2
(.1)
vr2-2
(.1) ge-1;0;3.141
(.2)
loO: 192.168.34.1
192.168.14.o;30
(.2) ge-1/0/2.142
ci
....-!
0
('1')
'(.2)
R1
____,..
...,....
Identifying Hardware Components Lab:
Pod B Network Diagram
I
mxC-1
loO: 192.168.35.1
ge-1/0/2.143 (.1)
.:]
vr1-1
r-
Virtual Routers
172.18.5.0/30
A
---_, ,,(-0
ge-1/0/3.1411 (.1) 9
1 2.168.15.Q/30
(.2)
(.1)
&i
0 '-
-1 ...,
0
-1
q 6
'-- m
0
CV)
(.2) .
R1
lnIBrnet
6
ci
...,
0
CV)
(.2)
_R1
loO: 192.168.36.1
(.1)
-----mxC-2
la
vr2-2
(.1) ge-1;0;3.141
192.16s.rn.o;30
(.2)
(.2) ge-1/0/2.143
<?);
/
C< ISPB
.. --.......,_.
)
Identifying Hardware Components Lab:
Pod C Network Diagram
J
mxD-1
loO: 192.168.37.1
ge-1/0/2.144 (.1)
vr1-1
Virtual Routers
17 2.18.5.0/30
__)'(.
,:J
ge-1/0/3.1411 (.1\
92.168.17.0/30
(.2)
(.1)
(.2)
R1 .
ISPA
r'"'-'\
Internet
fili
;i
;i
loO: 192.168.38.1
mxD-2
vr2-2
(.1 ge-1;0;3.141
192.168.18.o;30 l
(.2)
(.2) ge-1/0/2.144
('(')
--...._ 6
(J)
0
(.2)
R1
(.1)
...-.-J,..----'-i,
Identifying Hardware Components Lab:
Pod D Network Diagram
Lab: Using Monitoring Tools and
Establishing a Baseline
mxA-1
ge-1/0/2.141 (.1)
,!]
J'"
vr1-1
II
Virtual Routers
172.18.5.0/30
loO: 192.168.31.1
ge-1/0/3.1411 (.l)
192.168.11.0/30
(.2)
(.1)
(.2)
R1 .
111Lt::rnet
loO: 192.168.32.1
mxA-2
,(.1)
0
CV)
(.2)
R1
vr2-2
( 1 ge-1;0;3.141
192.168.12.o;30 - l
(.2)
(.2) ge-1/0/2.141
I>
ISP
/-
Using Monitoring Tools and Establishing a
Baseline Lab: Pod A Network Diagram
mxB-1
loO: 192.168.33.1
fili
ge-1/0/2.142 (.1)
vr1-1
:ti
ge-1/0/3.1411 (.1)
192.168.13.0/30
(.1)
q
0 C)
.........
..-j 'M
0
'M
......... CJ)
0
(Y)
(.2)
I _]
Virtual Routers
172.18.5.0/30
Internet
0
(Y)
C)
ci
'M
(.2)
R1
vr2-2
( 1 ge-1;0;3.141
192.168.14.o;30 . l
(.2)
loO: 192.168.34.1
mxB-2
(.1)
------
...
(.2) ge-1/0/2.142
\,_
ISP B "-."')
Using Monitoring Tools and Establishing a
Baseline Lab: Pod B Network Diagram
mxC-1
loO: 192.168.35.1
fili
I
SPA
ge-1/0/2.143 (.1)
'Y/
'-!
vr1-1
ge-1/0/3.1411 (.1) 9
1 2.168.15.0/30
(.2)
(.1)
.--!
'""1 
q0 6
'-.. CJ)
0
(Y)
(.2) I
R1
( -VtIR;s-,
172.18.5.0/30
Internet
'o.O
loO: 192.168.36.1
mxC-2
(.1)
.--!
 
Q) 0
6 q
CJ)
1(.2)
R1
,.-.-----.1.i
vr2-2
1
192.168.16.o;30(. l ge-1;0;3.141
(. 2)
(.2) ge-1/0/2.143
ISP
l.
Using Monitoring Tools and Establishing a
Baseline Lab: Pod C Network Diagram
mxD-1
loO: 192.168.37 .1
I
.::z
ge-1/0/2.144 (.1)
vr1-1
Internet
Virtual Routers
172.18.5.0/30
.- (.'9
ISPA
ge-1/0/3.1411 (.1)
192.168.17.0/30
(.2)
(.1)
llii
0 ........
s-j .--{
0
s-j
0
(Y)
........ CS>
(.2)
R1 .
/-
loO: 192.168.38.1
mxD-2
vr2-2
.1
192.168.1s.o;30( l ge-1;0;3.141
(.2)
(.2) ge-1/0/2.144
(.2)
R1
(.1)
r----
Using Monitoring Tools and Establishing a
Baseline Lab: Pod D Network Diagram
Lab: Monitoring Hardware and
Environmental Conditions
0)
..,;j
.-j
mxA-1
loO: 192.168.31.1
ge-1/0/2.141 (.1)
vr1-1
II
ge-1/0/3.1411 (.1)
192.168.11.0/30
(.2)
(.1)
......_
..,
q
0 ()
(.2)
R1
rVirtual Routers
172.18.5.0/30
Internet
;j
;j
;j
0
(V)
(.2)
R1
loO: 192.168.32.1
...------...(.1)
mxA-2
vr2-2
(.1 ge-1;0;3.141
192.168.12.0;30 )
(.2)
(.2) ge-1/0/2.141
\.:\; 
 /
c ISPB
.
)'
Monitoring Hardware and Environmental
Conditions Lab: Pod A Network Diagram
172.18.5.0/30
(.2) ge-1/0/2.142
__/
C)
ci
0
(Y)
(.2)
R1
loO: 192.168.33.1
vr1-1
EL_
ge-1/0/3.1411 (.1)
192.168.13.0/30
(.1)
""'!
0
""'!
--...._
...,
Virtual Routers:=]
vr2-2
.1 I ge-1;0;3.141
192.168.14.o;30( l
(.2)
loO: 192.168.34.1
mxB-2
..--------.(.1)
ci
...,
ge-1/0/2.142 (.1)
We
mxB-1
ISPB 
...,
I
)
q
0 C)
--...._ 0)
0
(Y)
(.2)
R1
ISPA
-....,)-:
Internet
Monitoring Hardware and Environmental
Conditions Lab: Pod B Network Diagram
Cil
mxC-1
loO: 192.168.35.1
vr1-1
ge-1/0/2.143 (.1)
:ti
,)
r-
Internet
Virtual Routers
172.18.5.0/30
.:J___)'({)
..
SPA
'\,
1
ge-1/0/3.1411 (.1) 9
1 2.168.15.Q/30
(.2)
(.1)
() -.......
 o
 
0
.-j llii
0
M
(.2)
R1
..-I
()
0
M
loO: 192.168.36.1
mxC-2
vr2-2
.1
192.168.16.o;30( l ge-1;0;3.141
(.2)
(.2) ge-1/0/2.143
(.2)
, 1
--J..:.(.1)
r----1..--
ISPB
Monitoring Hardware and Environmental
Conditions Lab: Pod C Network Diagram
loO: 192.168.37.1
mxD-1
ge-1/0/2.144 (.1)
vr1-1
ge-1/0/3.1411 (.1) l9
2.168.17.0/30
(.2)
(.1)
(.2)
Rl]
q
0
'0.0
..-t
>CJ) 
0)
(.2)
L_Rl
vr2-2
(.1) ge-1;0;3.141
192.168.18.o;30
(.2)
loO: 192.168.38.1
mxD-2
--C(.1)
r"""--l...--
(.2) ge-1/0/2.144
\:-
r=
ISP. ./
, Virtual Routers:=]
172.18.5.0/30
Internet
Monitoring Hardware and Environmental
Conditions Lab: Pod D Network Diagram
I
lab: Control Plane Monitoring and
Troubleshooting
mxA-1
loO: 192.168.31.1
ge-1/0/2.141 (.1)
vr1-1
-i
ge-1/0/3.1411 (.1)
192.168.11.0/30
(.2)
(.1)
 
ci '
.-I fili
ci
q 6
 0)
(.2).
R1
Virtual Router;]
172.18.5.0/30
Internet
;:i
;:i
;:i
0
CV)
'(.2)
R1
vr2-2
1
1
41
192.168.12.o13l ) ge- ;0;3.1
(.2)
loO: 192.168.32.1
mxA-2
C(.".1)
r-"---J.---
ork Diagram
(.2) ge-1/0/2.141
Control Plane Monitoring and
Troubleshooting lab: Pod A Ne
,').E:jJu,
mxB-1
loO: 192.168.33.1
ge-1/0/2.142 (.1)
vr1-1
III
ge-1/0/3.1411 (.1) 9
1 2.168.13.0/30
(.2)
(.1)
'""! 
Q
'""! 
q 6
0
(Y)
----- 0)
(.2)
R1
Virtual Routers
172.18.5.0/30
Internet
loO: 192.168.34.1
mxB-2
(.2)
R1
......----....(.1)
III
vr2-2
1 ge-1/0/3.141
rn2.168.14.o/3l l
(.2)
(.2) ge-1/0/2.142
<-
0:)
Control Plane Monitoring and
Troubleshooting Lab: Pod B Network Diagram
..l:tlir
I.
mxC-1
loO: 192.168.35.1
d,
'0.0
ge-1/0/2.143 (.1)
,:J
vr1-1
Internet
Virtual Routers
172.18.5.0/30
 .J'<.-1J
ge-1/0/3.1411 (.l)
192.168.15.0/30
(.2)
(.1)
'<"'i
;J 
q 6
------ CJ)
0
("I)
(.2)
R1
(SPA-)
mxC-2
0
("I)
(.2)
_R1
loO: 192.168.36.1
(.1)
vr2-2
(.1) ge-1;0;3.141
192.168.16.o;30
(.2)
(.2) ge-1/0/2.143
...-.---.........
ISP)
Control Plane Monitoring and
Troublesrtlooting Lab: Pod C Network Diagram
loO: 192.168.37.1
mxD-1
ge-1/0/2.144 (.1 )
vri-1
-i
ge-1/0/3.1411 (.1\9 6
2.1 8.17.0/30
(.2)
(.1)
;:l
...-j s-i
0
...-j 
q
0 6
........
0
CV)
........ (Jl
(.2)'
Virtual Routers
172.18.5.0/30
Internet
mxD-2
0
CV)
(.2)
R1
loO: 192.168.38.1
(.1)
i.
vr2-2
(.1 ge-1;0;3.141
192.168.18.o;30 l I
(.2)
(.2) ge-1/0/2.144
------
ISP
Control Plane Monitoring and
Troubleshooting Lab: Pod D Network Diagram
Lab: Monitoring and Troubleshooting
Ethernet Interfaces
.t.wr,
mxA-1
loO: 192.168.31.1
ge-1/0/2.141 (.1)
vr1-1
-i
ge-1/0/3.1411 (.1)
192.168.11.0/30
(.2)
(.1)
llii
q
0 C)
.....___
""1 "<""!
0
""1
 (J)
(.2)
R1
r-Virtual Roters-- -----1
172.18.5.0/30
Internet
mxA-2
loO: 192.168.32.1
(.1)
i.,
vr2-2
(.1) ge-1;0;3.141
192.168.12.0;30
(.2 )
(.2) ge-1/0/2.141
C)
0
('I)
(.2)
R1
___....
__....
Monitoring and Troubleshooting Ethernet
Interfaces La Pod A Network Diagram
!i!J!.:r,u,
mxB-1
loO: 192.168.33.1
ge-1/0/2.142 (.1)
vr1-1
(.2)
ge-1/0/3.1411 (.1)1 .
92 168.13.0/30
(.1)
$l0 
'""! llii
$l
 C)
 0)
(.2)
R1
Virtual Routers
172.18.5.0/30
Internet
mxB-2
loO: 192.168.34.1
( .1)
vr2-2
(.2)
( 1 ge-1;0;3.141
192.16s.14.o;30 - l
(.2) ge-1/0/2.142
0
0
...,
...,
C)
(Y)
(.2)
R1
----...
........
Monitoring and Troubleshooting Ethernet
Interfaces Lab: Pod B Network Diagram
loO: 192.168.35.1
mxC-1
ge-1/0/2.143 (.1)
vr1-1
ge-1/0/3.1411 (.1)
192.168.15.0/30
(.2)
(.1)
'"! ...,
0
'"! 
0
0 o
'-
 0)
'-
(.2)
R1
Virtual Routers
172.18.5.0/30
Internet
'
0
('()
'(.2)
R1
i.
vr2-2
192.168.16.o;30 (.1l ge-1;0;3.141
(.2)
loO: 192.168.36.1
mxC-2
(.1)
----a---""'
iSP/B\
(.2) ge-1/0/2.143
\..:.:, 
">,
</')-
Monitoring and Troubleshooting Ethernet
Interfaces Lab: Pod C Network Diagram
mxD-1
loO: 192.168.37.1
ge-1/0/2.144 (.1)
vr1-1
ge-1/0/3.1411 (.l)
192.168.17.0/30
(.2)
(.1)
(.2)
R1
ISPA
r.
Virtual Routers
17 2.18.5.0/30
Internet
('()
c3'
0
..--I
loO: 192.168.38.1
mxD-2
(.1)
vr2-2
(.1 I ge-1;0;3.141
192.168.18.o;30 l
(.2)
(.2) ge-1/0/2.144
R1
'(.2)
...------......
onitoring and Troubleshooting Ethernet
Interfaces lab: Pod D Network Diagram
[l!Ji'..l:tU;
Isolating a
lab:
ubles ooting PFE Issues
ge-1/0/2.141 (.1)
vr1-1
ge-1/0/3.1411 (.1) 9
1 2.168.11.Q/30
(.2)
loO: 192.168.31.1
mxA-1
VirtI-R;r
172.18.5.0/30
Internet
mxA-2
vr2-2
(.1) ge-1;0;3.141
(.2)
loO: 192.168.32.1
192.16s.12.o;30
(.2) ge-1/0/2.141
Isolating and Troubleshooting PFE Issues
Lab: Pod A Network Diagram
.E.i:1:u,
ge-1/0/2.142 (.1)
vri-1
III
ge-1/0/3.1411 ( .1)
192.168.13.0/30
( .2)
loO: 192.168.33.1
mxB-1
Virtual Route]
172.18.5.0/30
Internet
loO: 192.168.34.1
mxB-2
111
vr2-2
1 ge-1;0;3.141
192.168.14.o;30 (- l
(.2)
(.2) ge-1/0/2.142
Isolating and Troubleshooting PFE Issues
Lab: Pod B Network Diagram
ge-1/0/2.143 (.1)
vr1-1
a_
ge-1/0/3.1411 (.1) 9
1 2.168.15.0/30
loO: 192.168.35.1
mxC-1
Virtual Routers .  1
172.18.5.0/30
Internet
loO: 192.168.36.1
mxC-2
vr2-2
1 ge-1;0;3.141
192.168.16.o/3l l
(.2)
(.2) ge-1/0/2.143
Isolating and Troubleshooting PFE Issues
Lab: Pod C Network Diagram
ge-1/0/2.144 (.1)
vr1-1
-
ge-1/0/3.1411 (.1)
192.168.17.0/30
(.2)
loO: 192.168.37.1
mxD-1
r---Virtual Routers
17 2.18.5.0/30
Internet
- -i
loO: 192.168.38.1
mxD-2
vr2-2
ge-1;0;3.141
(
192.168.18.0;30 .ll
(.2)
(.2) ge-1/0/2.144
Isolating and Troubleshooting PFE Issues
Lab: Pod D Network Diagram
Lab: Troubleshooting Routing Protocols
,-i
I'-
0l
,-i
,...j
cx3'
0
(Y)
Ri
I
I '"1 
I 0
I ()
I
I
1(.2)
lt-1/0/0.13
172.16.1.12/30
(.14)
RIP
(.1)
lt-1/0/0.-
172.16.1.0/30
lt-1/0/0.10
--------------------
-----
:Lco
I
II
"
lt-1/0/0.7
(.13)
10.1.1.12/30
OSPF
10.1.1.0/30
,}
lt-1/0/0.2
(.2)
Internet
::;:-
0
(Y)
,L()
()
0 .....;_
I
I
I
Troubleshooting Routing Protocols Lab:
MxA-1 Network Diagram__,...-,
(.13)
lt-1/0/0.13
....
172.16.1.12/30
RIP
\ .
. R4
------
;:::;- 0
\[,..;;._ _g._,,_, lt-1/0/0.14
L()
'""
\ 1-
'""
N
r'""
,-1
0
('()
..... ..... ._.
lt-1/0/0..
lt-1/0/0.10
172.16.1.0/30
(.1)
------------------- ......
co Im
0
6
;:::;
.,,.
r
,_
ea
11
OSPF
__.,.-di
2 Network Diagram
Internet
10.1.100.5
10.1.100.6
R6
10.1.100.4
10.1.100.3
10.1.100.2
R5
R4
Troubleshooting Routing Protocols Lab:
I
I
,-i
t--
,-i
,-i
(0
;::i-1 g
0
-
.:
(0
,-i
R1
.;),
lt-1/0/0.13
172.16.1.12/30
(.14)
lt-1/0/0.10
(.2)
 ,c:c:,,
OSPF
10.1.1.0/30
Internet
'Y
lt-1/0/0.2
(.2)
lt-1/0/0.7
10.1.1.12/30
(.13)
----
,-i
ci
,-i
,-i
('I)
'
I
I
I
.: <E, I
;::i-
Cl
ci
.:
ci 
LD1
Cl ;::i-
10.1.100.6
R6
"
Host
10.12.12.100
10.1.100.5
10.1.100.4
R5
R4
Troubleshooting Routing Protocols Lab:
xB-1 Network Diagram-..-
-rl
(!)
\1
''
'
I
I
c3'
'-
c:i
-rl
l!)
'";i
b'
-......
' c:i
'
'
I
I
::::-
-rl
<ri
-rl
<'i
r--
a3'
Cf)
cri'
R4
R1
RIP
lt-1/0/0.14
lt-1/0/0.13
,1"\\
(.14)
172.16.1.12/30
(.2)
lt-1/0/0.10
lt-1/0/0.
(.1)
172.16.1.0/30
----------------------- .... ...
'I
1 ,R5
(.13)
lt-1/0/0.7
10.1.1.12/30
OSPF
r lt-1/0/0.1
10.1.1.0/30
(.1)
..__
Internet
c3'
"
(!)
c3'
c:i
l!)
-rl
c:i
;;;c-
Cf)
"'
I
I
I
I
'
'
l
I
I
I
I
'
R3 , J
R6
R5
R4
R3
R2
Troubleshooting Routing Protocols Lab:
MxB-2 Network Diagra
10.1.100.6
10.1.100.5
10.1.100.4
10.1.100.3
10.1.100.2
""1
(D
rt
(',I
trt
(Y)
 .j_
::::;. 0
11
\[_
l!)
rt
c3'
,.__,
I:
R1
lt-1/0/0.13
172.16.1.12/30
(.14)
RIP
atr
:, 
_(.13)
10.1.1.12/30
OSPF
I  lt-1/0/0.7
I I a a ,
I  \.:'Y
II
",:
"1
:''
:,f,,1
,,:,,,,
,,1,
\.:
lt-;iolf,
lt-1/0/0.10
...... 2
.,B
(.2)
172.16.1.0/30
(. 1)
I
0'
---------------------
Server
10.10.10.100
ii-
.  
I
Internet
,
c3'
""1
rt
0
(Y)
'
I
I
I
I
I
R6
R5
R4
R3
R2
R1
Troubleshooting Routing Protocols Lab:
MxC-1 Network Diagram
411.I
!..
f. tQJ
10.1.100.6
Host
10.12.12.100
10.1.100.5
10.1.100.4
10.1.100.3
10.1.100.2
10.1.100.1
''
I
I
'M
C'i
,-....
,..i
oo'
('/')
------'
R1
ci I
:L
(.2)
...
....... ... .....
lt-1/0/0.13
172.16.1.12/30
(.14)
RIP
lt-1/0/0.
(.1)
172.16.1.0/30
lt-1/0/0.10
---------------------
10.10.10.100
Server
"
'
iiO-----,
OSPF
lt-1/Q/0.2
10.1.1.0/30
(.2)
Internet
I'
R1
ci
(0
'M
ci
,..i
,..i
I
I
I
I
I
I
--
Loopback
R6
R5
10.1.100.6
10.1.100.5
10.1.100.4
10.1.100.3
10.1.100.2
10.1.100.1
Addresses/Router
IDs
R2
R
3 '1,1 I
I
R3
L!) in
I
ci
6
I R4
.:_
.-;
-...:.
ISP-2
Troubleshooting Routing Protocols Lab:
MxC-2 Network Diagram
,-i
C'i
,-i
0
Cf)
co""! l 
-.
...
---------- -...... ........
lt-1/0/0.13
172.16.1.12/30
(.14)
RIP
.... lt-1/0/0. .--lt-1/0/0.10
,2)
(.1)
172.16.1.0/30
,.._?
OSPF
10.1.1.0/30
Si
0
Cf)
'
I
I
I
I
..!.. 
-I
I
'!11
0'
o-
10.1.100.6
R6
5'
Host
10.12.12.100
10.1.100.5
10.1.100.4
R5
CY
rlS;:
-:t:!: "i
lt-1/0/0.2
(.2)
---------.
--
Troubleshooting Routing Protocols lab:
xD-1 Network Diagram --r-""" ,
&.....,
,-i
I'-
C\i
,-i
(')
............ ...
-- -- -- -
,:,,,,
:,
--------------111_
t_ - 0;0_
_
11
_ . 13
i,,
R
172.16.1.12/30
(.14) : , 
'\
/"
RIP
1t_-1;_o; o_.1
-----1:
 _ _ _________
10.1.1.12/30
(.13)
"
/'
io
OSPF
Area o
,-i
,....j
(')
<:/; ;:::;.
bo
''!
&
- ..- - - - - ... ._
-'o
'
I
I
I
R5
R6
: 
1,J
--(>')
'"'I ;::;'
0
 '"'I
'?o._
C)
.\
'\
q,
IC)
A'l,
C)
">- \ ">-'
net r,"":\
v
"IQ:
--::::--
lt-1/0/0.10
lt-1/0/0.
I' lt-1/0/0.1
lt -1/0/0.2
I(.2)
10.1.1.0/30
(.1)
(.2)
'
(.1)
...
172.16.1.0/30
.}
---
----------------......
R1
.,,.,.--
10.10.10.100
. "
.,,...-- -P-
 
Server
Ii
Troubleshooting Routing Protocols Lab:
MxD-2 Network Diagram
10.1.100.6
10.1.100.5
10.1.100.4
10.1.100.3
10.1.100.2
Lab: Monitoringthe Network
(.1)
10.12.12.0/24
ge-1/0/7 (.1)
mxA-1
'-.:./ llo
>y/(6
/9),Co
'o
.111111111: D
Jflow
Collector/Analyzer
10.10.10.100
10.10.10.0/24
ry (b
llo
ty')'
fl
..
.In
bmJ
SNMP
Server
10.11.11.100
dl
-?..
10.12.12.0/24
(.1) ge-1;0;7
mxA-2
d)\.9
0'-<">
.'\>o
tv
 o
.'\>
19
10.10.10.0124 (.1)
 l:Jge-1/1/9 ge-1/0/9
.... n
Jflow
Collector/Analyzer
10.10.10.100
SNMP
Monitoring the Network Lab:
Pod A Network Diagram
'-..:./Qo
;:;_; 
JD
'
0
--o ,'
Jflow
Collector/Analyzer
10.10.10.100
SNMP
Server
10.11.11.100
(.1) 10.10.10.0/24
ge-1/0/9 ge-1/1/9 .: '
Host
10.12.12.100
10.12.12.0/24
ge-1/0/7 I (.1)
mxB-1
ge-1/1/71
"t
,y/0
Cb
'YI-
9)
l'y'
l'y
Qo
l'y'
 :b&l
-n
Host
10.12.12.100
,JD
d
ge-1/1/7
(.1) ge-11011
mxB-2
d)'\.9
O\.>
10.12.12.0/24
10.10.10.0124 (.1)
 bmJge-1/1/9 ge-1/0/9
.. n
Jflow
Collector/Analyzer
10.10.10.100
\v
-?--cP -ya
'-?:-?:
o
SNMP
Server
10.11.11.100  
Monitoring the Network Lab:
Pod B Network Diagram
[;]
a ] ..,
t.;J.
ge-1/1/7 I
"'t
Jflow
Collector/Analyzer
10.10.10.100
(.1) 10.10.10.0/24 .. 
10.12.12.100
Host
10.12.12.0/24
ge-1/0/71 (.1)
mxC-1
9)
'Y(.q,
,y/.c6
'-.:./Qo
ff
'Y'Y" c6
'Y" Qot}
(o
-r=J
 !b1J
SNMP
Server
10.11.11.100
kmJge-1/1/9
rv
(.1) I ge-1/0/7
mxC-2
10.12.12.0/24
(.1)
ge-1/0/9
'<"'o,::->
d)\.9
'(_cP -vo
(9y'
"-?-.?
o
-
. f;l 10.10.10.0/24
Jflow
Collector/Analyzer
10.10.10.100
SNMP
Monitoring the Network lab:
Pod C Network Diagram
1YE:r1u,
JD 
h
ge-1/1/71
Jflow
Collector/Analyzer
10.10.10.100
Host
10.12.12.100
r:1.
(.1) 10.10.10.0/24
ge-1/0/9 ge-1/1/9 ..bmJ
10.12.12.0/24
ge-1/0/7 I (.1)
mxD-1
ty/qJ
,:./ 4o
ty
9)
/,<o
ry 4o
qJ
ty
ry
c't 
<o
 Ff Server
 bmJ 10.11.11.100
SNMP
Host
10.12.12.100
' f. "'
ge-1/1/7
JD
10.12.12.0/24
(.1) I ge-1;0;7
mxD-2
O\.,::->
-ai,!./
:.,..
\>"
'(_ .'\>
{<):.,..
.'<'<
o
cs> o
ii:.1:1
-  10.10.10.0/24 (.1)
 . .
l&ige-1/1/9 ge-1/0/9
Jflow
Collector/Analyzer
10.10.10.100
SNMP
Server
10.11.11.100
Monitoring the Network Lab:
Pod D Network Diagram