juniper-logo

Juniper cRPD Containerized Roting Protocol Daemonac

Juniper-cRPD-Containerized-Routing-Protocol-Daemonac-samfurin-hoton

Bayanin samfur

Ƙayyadaddun bayanai

  • Sunan samfurJunos Containerized Routing Protocol Daemon (cRPD)
  • Tsarin Aiki: Linux
  • Linux Mai watsa shiriUbuntu 18.04.1 LTS (lambar suna: bionic)
  • Shafin Dockerku: 20.10.7

Umarnin Amfani da samfur

Mataki 1: Fara

Haɗu da Junos cRPD
Junos Containerized Routing Protocol Daemon (cRPD) kunshin software ne wanda Juniper Networks ya haɓaka. Yana ba da damar sarrafa kwantena don na'urorin cibiyar sadarwa.

Yi Shiri
Kafin shigar da Junos cRPD, kuna buƙatar tabbatar da cewa an shigar da Docker kuma an daidaita shi akan mai masaukin ku na Linux.

Shigar da Sanya Docker akan Mai watsa shiri na Linux
Bi waɗannan matakan don shigarwa da daidaita Docker akan mai masaukin ku na Linux

  1. Bude tashar tasha akan mai masaukin ku na Linux.
  2. Sabunta jerin fakitin da kuke da su kuma zazzage kayan aikin da suka dace ta gudanar da umarni mai zuwa
    sudo apt install apt-transport-https ca-certificates curl software-properties-common
  3. Ƙara ma'ajiyar Docker zuwa Advanced Packaging Tool (APT) tushen ta aiwatar da umarni mai zuwa.
    sudo apt update
  4. Sabunta fihirisar fakitin dacewa kuma shigar da sabon sigar Docker Engine ta amfani da umarni mai zuwa
    sudo apt install docker-ce
  5. Don tabbatar da nasarar shigarwa, gudanar da umarni
    docker version

Zazzagewa kuma Sanya Junos cRPD Software
Da zarar an shigar da Docker kuma yana gudana, zaku iya ci gaba don saukewa da shigar da Junos cRPD software ta bin waɗannan matakan

  1. Ziyarci shafin saukar da software na Juniper Networks.
  2. Zazzage fakitin software na Junos cRPD.
  3. Sanya fakitin software da aka zazzage bisa ga umarnin shigarwa da aka bayar.

Tambayoyin da ake yawan yi (FAQ)

  • Tambaya: Zan iya amfani da Junos cRPD ba tare da maɓallin lasisi ba?
    A: Ee, zaku iya fara amfani da Junos cRPD ba tare da maɓallin lasisi ba ta fara gwaji kyauta. Da fatan za a koma zuwa sashin "Fara gwajin ku kyauta a yau" don ƙarin bayani.

Saurin Farawa
Junos Containerized Roting Protocol Daemon (cRPD)

Mataki 1: Fara

A cikin wannan jagorar, muna bibiyar ku ta yadda ake girka da kuma daidaita tsarin ƙa'idar hanyar sarrafa kwantena ta Junos® (cRPD) akan mai masaukin Linux da samun dama gare shi ta amfani da Junos CLI. Na gaba, za mu nuna muku yadda ake haɗawa da daidaita misalan Junos cRPD guda biyu da kafa haɗin OSPF.

Haɗu da Junos cRPD

  • Junos cRPD ɗan asalin gajimare ne, injin sarrafa kwantena wanda ke goyan bayan turawa cikin sauƙi a cikin kayan aikin girgije. Junos cRPD yana ƙaddamar da RPD daga Junos OS kuma yana tattara RPD a matsayin akwati na Docker wanda ke gudana akan kowane tsarin tushen Linux, gami da sabar da masu amfani da akwatin farin akwatin. Docker shine tushen tushen software dandali wanda ke sauƙaƙa ƙirƙira da sarrafa babban akwati.
  • Junos cRPD yana goyan bayan ladabi da yawa kamar OSPF, IS-IS, BGP, MP-BGP, da sauransu. Junos cRPD yana raba ayyukan gudanarwa iri ɗaya kamar Junos OS da Junos OS Samfura don sadar da daidaitaccen tsari da ƙwarewar gudanarwa a cikin magudanar ruwa, sabar, ko kowace na'ura ta Linux.

Yi Shiri

Kafin ka fara turawa

  • Sanin kanku da yarjejeniyar lasisi na Junos cRPD. Duba lasisin software na Flex don cRPD da Sarrafa lasisin cRPD.
  • Kafa asusun Docker hub. Kuna buƙatar lissafi don zazzage Injin Docker. Duba asusun Docker ID don cikakkun bayanai.

Shigar da Sanya Docker akan Mai watsa shiri na Linux

  1. Tabbatar cewa mai masaukin ku ya cika waɗannan buƙatun tsarin.
    • Linux OS goyon bayan - Ubuntu 18.04
    • Linux Kernel - 4.15
    • Injin Docker– 18.09.1 ​​ko daga baya versions
    • CPUs- 2 CPU core
    • Ƙwaƙwalwar ajiya - 4 GB
    • Wurin diski - 10 GB
    • Nau'in mai watsa shiri - x86_64 Multicore CPU
    • Hanyar hanyar sadarwa - Ethernet
      tushen-user@linux-host: ~# uname -a
      Linux ix-crpd-03 4.15.0-147-generic #151-Ubuntu SMP Juma'a Jun 18 19:21:19 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
      tushen-user@linux-host:lsb_release -a
      Babu samfuran LSB da ke akwai.
      ID mai rabawa: Ubuntu
      Bayani: Ubuntu 18.04.1 LTS
      Sakiku: 18.04
      Sunan lamba: bionic
  2.  Zazzage software na Docker.
    •  Sabunta jerin fakitin da kuke da su kuma zazzage kayan aikin da suka dace.
      rootuser@linux-host:~# dace shigar da dacewa-transport-https ca-certificates curl software-Properties-na kowa
      [sudo] kalmar sirri don lab
      Lissafin fakitin karatu… Anyi
      Gina dogara itace
      Karanta bayanan jihar… Anyi
      Lura, zabar 'apt' maimakon 'apt-transport-https'
      Za a shigar da ƙarin fakiti masu zuwa:……………………………………………….
    •  Ƙara ma'ajiyar Docker zuwa Advanced Packaging Tool (APT).
      rootuser@linux-host: ~# add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic barga"
      Samu:1 https://download.docker.com/linux/ubuntu Bionic InRelease [64.4 kB] Samu:2 https://download.docker.com/linux/ubuntu fakitin bionic/stable amd64 [18.8kB] Buga:3 http://archive.ubuntu.com/ubuntu Bionic InRelease
      Samu:4 http://archive.ubuntu.com/ubuntu Bionic-security InRelease [88.7 kB] Samu:5 http://archive.ubuntu.com/ubuntu Bionic-sabuntawa InRelease [88.7 kB] Samu:6 http://archive.ubuntu.com/ubuntu bionic/main Translation-en [516 kB] Samu:7 http://archive.ubuntu.com/ubuntu bionic-security/main Translation-en [329 kB] Samu:8 http://archive.ubuntu.com/ubuntu Bionic-updates/main Translation-en [422 kB] An samo 1,528 kB a cikin 8s (185 kB/s)
      Lissafin fakitin karatu… Anyi
    •  Sabunta bayanai tare da fakitin Docker.
      rootuser@linux- mai masaukin baki:~# sabuntawa mai dacewa
      Buga:1 https://download.docker.com/linux/ubuntu bionic A cikin Saki
      Buga:2 http://archive.ubuntu.com/ubuntu bionic A cikin Saki
      Buga:3 http://archive.ubuntu.com/ubuntu Bionic-security A cikin Saki
      Buga:4 http://archive.ubuntu.com/ubuntu bionic-updates A cikin Saki Lissafin fakitin Karatu… Anyi
      Gina dogara itace
      Karanta bayanan jihar… Anyi
    •  Sabunta fihirisar fakitin da ta dace, kuma shigar da sabon sigar Injin Docker.
      rootuser@linux-host:~# shigar docker-ce Lissafin fakitin Karatu… Anyi
      Gina dogara itace
      Karanta bayanan jihar… Anyi
      Za a shigar da ƙarin fakiti masu zuwa a cikin akwati.io docker-ce-cli docker-ce-rootless-extras docker-scan-plugin libltdl7 libseccomp2
      Fakitin da aka ba da shawara
      aufs-kayan aikin cgroupfs-mount | fakitin da aka ba da shawarar cgroup-lite
      pigz slirp4netns
      ………………………………………………………………………….
    •  Bincika don ganin idan shigarwa ya yi nasara.
      rootuser@linux-host: ~# docker versio
      Abokin ciniki: Injin Docker - Al'umma
      Sigar: 20.10.7
      API version: 1.41
      Tafi sigar: go1.13.15
      Git alkawarif0df350
      Gina: Laraba 2 ga Yuni 11:56:40 2021
      OS / Arch: Linux/amd64
      Magana: tsoho
      Gwaji :gaskiya
      Sabar: Injin Docker - Al'umma
      Injin
      Sigar
      : 20.10.7
      API version: 1.41 (mafi ƙarancin sigar 1.12)
      Tafi sigar: go1.13.15
      Git alkawarib0f5bc3
      Gina: Laraba 2 ga Yuni 11:54:48 2021
      OS / Arch: Linux/amd64
      Gwaji: karya
      kwantena
      Sigarku: 1.4.6
      GitCommit: d71fcd7d8303cbf684402823e425e9dd2e99285d
      runc
      SigarSaukewa: 1.0.0-rc95
      GitCommit: b9ee9c6314599f1b4a7f497e1f1f856fe433d3b7
      docker-init
      Sigarku: 0.19.0
      GitCommitku: 40ad0

TIP: Yi amfani da waɗannan umarni don shigar da abubuwan da kuke buƙata don yanayin Python da fakiti

  • apt-add-repository universe
  • dace-samu sabuntawa
  • dace-samu shigar da python-pip
  • Python -m pip shigar grpcio
  • python -m pip shigar grpcio-tools

Zazzagewa kuma Sanya Junos cRPD Software
Yanzu da kun shigar da Docker akan mai masaukin Linux kuma kun tabbatar da cewa Docker Engine yana gudana, bari mu zazzage shi
Junos cRPD software daga shafin saukar da software na Juniper Networks.
NOTE: Don saukewa, shigar, da fara amfani da Junos cRPD ba tare da maɓallin lasisi ba, duba Fara gwajin ku kyauta a yau.
NOTE: Kuna iya buɗe Case Admin tare da Kulawar Abokin Ciniki don gata don saukar da software.

  1. Kewaya zuwa shafin Tallafi na Juniper Networks don Junos cRPD: https://support.juniper.net/support/downloads/? p=crpd kuma danna sabuwar sigar.
  2. Shigar da ID na mai amfani da kalmar wucewa kuma karɓi yarjejeniyar lasisin mai amfani na ƙarshe na Juniper. Za a jagorance ku zuwa shafin saukar da hoton software.
  3. Zazzage hoton kai tsaye akan mai gidan ku. Kwafi da manna kirtani da aka samar kamar yadda aka umarce su akan allon.
    rootuser@linux-host: ~# wget -O junos-routing-crpd-docker-21.2R1.10.tgz https://cdn.juniper.net/software/
    crpd/21.2R1.10/junos-routing-crpd-docker-21.2R1.10.tgz?
    SM_USER=user1&__gda__=1626246704_4cd5cfea47ebec7c1226d07e671d0186
    Yana warware cdn.juniper.net (cdn.juniper.net)… 23.203.176.210
    Haɗa zuwa cdn.juniper.net (cdn.juniper.net)|23.203.176.210|:443… an haɗa.
    An aika buƙatar HTTP, ana jiran amsa… 200 Ok
    Tsawon: 127066581 (121M) [application/octet-rafi] Ajiye zuwa: âjunos-routing-crpd-docker-21.2R1.10.tgzâ
    junos-routing-crpd-docker-21.2R1.10.tgz 100%
    ========================================= ======================================= 121.18M 4.08MB/
    s a 34s
    2021-07-14 07:02:44 (3.57 MB/s) - âjunos-routing-crpd-docker-21.2R1.10.tgzâ adana [127066581/127066581]
  4. Load da hoton software na Junos cRPD zuwa Docker.
    rootuser@linux-host: ~# docker load -i junos-routing-crpd-docker-21.2R1.10.tgz
    6effd95c47f2: Load Layer [============================================= ====>] 65.61MB/65.61MB
    ………………………………………………………………………………………………………………………………………………………………… ..
    Hoton da aka ɗora: crpd:21.2R1.10
    rootuser@linux-host: ~# hotunan docker
    MAKARANTA TAG GIRMAN HOTO DA AKA Ƙirƙiri
    crpd 21.2R1.10 f9b634369718 makonni 3 da suka gabata 374MB
  5. Ƙirƙirar ƙarar bayanai don daidaitawa da var rajistan ayyukan.
    rootuser@linux-host: ~# ƙarar docker ƙirƙirar crpd01-config
    crpd01-config
    rootuser@linux-host: ~# ƙarar docker ƙirƙirar crpd01-varlog
    crpd01-varlog
  6. Ƙirƙiri misalin Junos cRPD. A cikin wannan example, za ku yi masa suna crpd01.
    rootuser @ linux-host: ~ # docker run -rm -detach -name crpd01 -h crpd01 -net = gada - gata -v crpd01-
    daidaitawa:/config -v crpd01-varlog:/var/log -it crpd:21.2R1.10
    e39177e2a41b5fc2147115092d10e12a27c77976c88387a694faa5cbc5857f1e
    A madadin, zaku iya ware adadin ƙwaƙwalwar ajiya zuwa misalin Junos cRPD yayin ƙirƙirar misalin.
    rootuser @ linux-host: ~ # docker run -rm -detach -name crpd-01 -h crpd-01 -gata -v crpd01-config:/
    saita -v crpd01-varlog:/var/log -m 2048MB -memory-swap=2048MB -it crpd:21.2R1.10
    GARGADI: Kwayar ku baya goyan bayan iyakan musanyawa ko ƙungiyar ba ta hauhawa ba. Ƙwaƙwalwar ajiya iyakance ba tare da musanya ba.
    1125e62c9c639fc6fca87121d8c1a014713495b5e763f4a34972f5a28999b56c
    Duba Abubuwan Bukatun Albarkatun cRPD don cikakkun bayanai.
  7. Tabbatar da sabbin bayanan kwantena da aka ƙirƙira.
    rootuser@linux-host: ~# docker ps
    UMMARNIN HOTUNAN ID ɗin kwantena
    SUNAYEN PORTS
    e39177e2a41b crpd:21.2R1.10 "/sbin/runit-init.sh" Kimanin minti daya da suka wuce Kusan minti daya 22/tcp, 179/
    tcp, 830/tcp, 3784/tcp, 4784/tcp, 6784/tcp, 7784/tcp, 50051/tcp crpd01
    rootuser@linux-host:~# docker stats
    KWANTA ID SUNAN CPU % MEM AMFANIN / IYAKA MEM % NET I/O BLOCK I/O PIDS
    e39177e2a41b crpd01 0.00% 147.1MiB / 3.853GiB 3.73% 1.24kB / 826B 4.1kB / 35MB 58
    KWANTA ID SUNAN CPU % MEM AMFANIN / IYAKA MEM % NET I/O BLOCK I/O PIDS
    e39177e2a41b crpd01 0.00% 147.1MiB / 3.853GiB 3.73% 1.24kB / 826B 4.1kB / 35MB 58
    KWANTA ID SUNAN CPU % MEM AMFANIN / IYAKA MEM % NET I/O BLOCK I/O PIDS
    e39177e2a41b crpd01 0.05% 147.1MiB / 3.853GiB 3.73% 1.24kB / 826B 4.1kB / 35MB 58

Mataki 2: Up da Gudu

Shiga cikin CLI
Kuna saita Junos cRPD ta amfani da umarnin Junos CLI don ayyukan kwatance. Ga yadda ake samun shiga Junos CLI:

  1. Shiga cikin akwati Junos cRPD.
    rootuser@linux-host: ~# docker exec -it crpd01 cli
  2. Duba sigar Junos OS.
    rootuser@crpd01> nuna sigar
    tushen@crpd01> nuna sigar
    Sunan mai watsa shiriku: crpd01
    SamfuraSaukewa: CRPD
    JunosSaukewa: 21.2R1.10
    Sigar fakitin cRPD: 21.2R1.10 wanda magini ya gina akan 2021-06-21 14:13:43 UTC
  3. Shigar da yanayin sanyi.
    rootuser@crpd01> saita
    Shigar da yanayin sanyi
  4. Ƙara kalmar sirri zuwa asusun mai amfani na tushen gudanarwa. Shigar da kalmar sirrin rubutu bayyananne.
    [gyara] rootuser@crpd01# saitin tushen-tabbatar da kalmar sirri-rubutu-password
    Sabuwar kalmar sirri
    Sake rubuta sabon kalmar sirri:
  5. Ƙaddamar da tsari.
    [gyara] rootuser@crpd01# sadaukar
    aikata cikakke
  6. Shiga cikin misalin Junos cRPD tare da CLI kuma ci gaba da keɓance tsarin.

Matsalolin cRPD masu haɗin haɗin kai
Yanzu bari mu koyi yadda ake gina hanyoyin haɗin kai-zuwa-maki tsakanin kwantena biyu na Junos cRPD.

A cikin wannan example, muna amfani da kwantena guda biyu, crpd01 da crpd02, kuma muna haɗa su ta amfani da hanyoyin sadarwa na eth1 waɗanda ke da alaƙa da gadar OpenVswitch (OVS) akan gadar. Muna amfani da gadar OVS don sadarwar Docker saboda tana goyan bayan sadarwar runduna da yawa kuma tana samar da ingantaccen sadarwa. Koma ga misali mai zuwa:

Juniper-cRPD-Containerized-Routing-Protocol-Daemonac-iage-01

  1. Shigar da kayan aikin sauya OVS.
    rootuser@linux-host:~# dace-samu shigar openvswitch-switch
    sudo] kalmar sirri don lab:
    Lissafin fakitin karatu… Anyi
    Gina dogara itace
    Karanta bayanan jihar… Anyi
    Za a shigar da ƙarin fakiti masu zuwa:
    libpython-stdlib libpython2.7-mafi ƙarancin libpython2.7-stdlib openvswitch-na kowa python-mafi ƙarancin pythonsix
    python2.7 python2.7-mafi ƙarancin
  2. Kewaya zuwa hanyar usr/bin directory kuma yi amfani da umarnin wget don saukewa da shigar da docker OVS.
    rootuser@linux-host: ~# cd /usr/bin
    rootuser@linux-host: ~# wgethttps://raw.githubusercontent.com/openvswitch/ovs/master/utilities/ovs-docker
    –2021-07-14 07:55:17– https://raw.githubusercontent.com/openvswitch/ovs/master/utilities/ovs-docker
    Yana magance raw.githubusercontent.com (raw.githubusercontent.com)… 185.199.109.133, 185.199.111.133,
    185.199.110.133,…
    Haɗa zuwa raw.githubusercontent.com (raw.githubusercontent.com)|185.199.109.133|:443… haɗe.
    An aika buƙatar HTTP, ana jiran amsa… 200 Ok
    Tsawon: 8064 (7.9K) [rubutu/bayani] Ajiye zuwa: âovs-docker.1â
    ovs-docker.1 100%
    =========================================== ========================================= 7.88K -.-KB/
    s a 0s
    2021-07-14 07:55:17 (115 MB/s) - âovs-docker.1â adana [8064/8064]
  3. Canja izini akan gadar OVS.
    rootuser@linux-host:/usr/bin chmod a+rwx ovs-docker
  4. Ƙirƙiri wani akwati na Junos cRPD mai suna crpd02.
    rootuser @ linux-host: ~ # docker run -rm -detach -name crpd02 -h crpd02 -net = gada - gata -v crpd02-
    daidaitawa:/ config -v crpd02-varlog:/var/log -it crpd:21.2R1.10
    e18aec5bfcb8567ab09b3db3ed5794271edefe553a4c27a3d124975b116aa02
  5. Ƙirƙiri gada mai suna my-net. Wannan matakin yana haifar da musaya na eth1 akan crpd01 da crdp02.
    rootuser@linux-host: ~# cibiyar sadarwar docker ƙirƙira -internal my-net
    37ddf7fd93a724100df023d23e98a86a4eb4ba2cbf3eda0cd811744936a84116
  6. Ƙirƙirar gadar OVS kuma ƙara crpd01 da crpd02 kwantena tare da mu'amalar eth1.
    rootuser@linux-host: ~# ovs-vsctl add-br crpd01-crpd02_1
    rootuser@linux-host: ~# ovs-docker add-port crpd01-crpd02_1 eth1 crpd01
    rootuser@linux-host: ~# ovs-docker add-port crpd01-crpd02_1 eth1 crpd02
  7. Ƙara adiresoshin IP zuwa musaya na eth1 da zuwa ga musaya na loopback.
    rootuser@linux-host: ~# docker exec -d crpd01 ifconfig eth1 10.1.1.1/24
    rootuser@linux-host: ~# docker exec -d crpd02 ifconfig eth1 10.1.1.2/24
    rootuser@linux-host: ~# docker exec -d crpd01 ifconfig lo0 10.255.255.1 netmask 255.255.255.255
    rootuser@linux-host: ~# docker exec -d crpd02 ifconfig lo0 10.255.255.2 netmask 255.255.255.255
  8. Shiga cikin akwati crpd01 kuma tabbatar da saitin dubawa.
    rootuser@linux-host: ~# docker exec -it crpd01 bash
    rootuser@crpd01:/# ifconfig
    …..
    da 1: tutoci=4163 mutum 1500
    inet 10.1.1.1 netmask 255.255.255.0 watsawa 10.1.1.255
    inet6 fe80:: 42:acff: fe12:2 prefixlen 64 scopeid 0x20
    ether 02:42:ac:12:00:02 txqueuelen 0 (Ethernet)
    RX fakiti 24 bytes 2128 (2.1 KB)
    Kurakurai RX 0 sun sauke 0 overruns 0 firam 0
    TX fakiti 8 bytes 788 (788.0 B)
    Kurakurai TX 0 sun sauke 0 overruns 0 mai ɗaukar kaya 0 karo 0
    ......
  9. Aika ping zuwa akwati crpd02 don tabbatar da haɗin kai tsakanin kwantena biyu. Yi amfani da adireshin IP na eth1 na crpd02 (10.1.1.2) don buga akwati.
    ping 10.1.1.2-c 2
    PING 10.1.1.2 (10.1.1.2) 56 (84) bytes na bayanai.
    64 bytes daga 10.1.1.2: icmp_seq = 1 ttl = 64 lokaci = 0.323 ms
    64 bytes daga 10.1.1.2: icmp_seq = 2 ttl = 64 lokaci = 0.042 ms
    - 10.1.1.2 kididdigar ping -
    Fakiti 2 da aka watsa, 2 sun karɓa, 0% asarar fakiti, lokaci 1018ms
    rtt min/ajg/max/mdev = 0.042/0.182/0.323/0.141 ms
    Fitowar ta tabbatar da cewa kwantena biyu na iya sadarwa da juna.

Sanya Buɗe Mafi Gajerun Hanya Na Farko (OSPF)
Yanzu kuna da kwantena guda biyu, crpd01 da crpd02, waɗanda aka haɗa kuma suna sadarwa. Mataki na gaba shine kafawa
makwabcin maƙwabta don kwantena biyu. Masu amfani da hanyoyin sadarwa na OSPF dole ne su samar da maƙwabtansu a da
za su iya raba bayanai tare da maƙwabcin.

  1. Sanya OSPF akan akwati crpd01.
    [gyara] rootuser@crpd01# nuna manufofin-zaɓuɓɓuka
    Bayanin siyasa adv {
    lokaci 1 {
    daga {
    hanya-tace 10.10.10.0/24 daidai
    }
    sannan karba
    }
    }
    [edit] rootuser@crpd01# nuna ladabi
    ospf {
    yanki 0.0.0.0 {
    dubawa eth1;
    dubawa lo0.0
    }
    fitarwa adv
    }
    [gyara] rootuser@crpd01# nuna zaɓuka-zaɓuɓɓuka
    na'ura mai ba da hanya tsakanin hanyoyin sadarwa-ID 10.255.255.1;
    a tsaye {
    hanya 10.10.10.0/24 ƙi
    }
  2. Ƙaddamar da tsari.
    [gyara] rootuser@crpd01# sadaukar
    aikata cikakke
  3. Maimaita matakai 1 da 2 don saita OSPF akan akwati crpd02.
    rootuser@crpd02# nuna manufofin-zaɓuɓɓuka
    Bayanin siyasa adv {
    lokaci 1 {
    daga {
    hanya-tace 10.20.20.0/24 daidai;
    }
    sannan karba;
    }
    }
    [gyara] rootuser@crpd02# nuna zaɓuka-zaɓuɓɓuka
    na'ura mai ba da hanya tsakanin hanyoyin sadarwa-ID 10.255.255.2
    a tsaye {
    hanya 10.20.20.0/24 ƙi
    }
    [edit] rootuser@crpd02# nuna ladabi ospf
    yanki 0.0.0.0 {
    dubawa eth1;
    dubawa lo0.0
    }
    fitarwa adv;
  4. Yi amfani da umarnin nuni don tabbatar da maƙwabtan OSPF waɗanda ke da kusancin kai tsaye.
    rootuser@crpd01> nuna ospf makwabcin
    Adireshin Interface ID na Jiha Pri Dead
    10.1.1.2 eth1 Cikakkun 10.255.255.2 128 38
    rootuser@crpd01> nuna ospf hanya
    Tsohuwar Teburin Hanyar Hanyar Topology:
    Hanyar Prefix Hanyar NH Metric NextHop Nexthop
    Nau'in Adireshin Interface Type Type/LSP
    10.255.255.2 Intra AS BR IP 1 eth1 10.1.1.2
    10.1.1.0/24 Intra Network IP 1 eth1
    10.20.20.0/24 Ext2 hanyar sadarwa IP 0 eth1 10.1.1.2
    10.255.255.1/32 Intra Network IP 0 lo0.0
    10.255.255.2/32 Intra Network IP 1 eth1 10.1.1.2

Fitowar tana nuna adireshin madauki na kwantena da adiresoshin madauki na kowane kwantena wanda yake kusa da shi nan da nan. Fitowar ta tabbatar da cewa Junos cRPD ta kafa dangantakar maƙwabta ta OSPF kuma ta koyi adiresoshin su da musaya.

View Junos cRPD Core Files
Lokacin da core file An ƙirƙira, za ku iya samun abin fitarwa a cikin babban fayil /var/crash. Jigon da aka samar files ana adana su akan tsarin da ke ɗaukar kwantena Docker.

  1. Canja zuwa kundin adireshi inda ya fadi files ana adanawa.
    rootuser@linux-host: ~# cd /var/crash
  2. Jerin hadarin files.
    rootuser@linux-host:/var/crash# ls -l
    duka 32
    -rw-r—- Tushen 1 29304 Jul 14 15:14 _usr_bin_unattended-upgrade.0.crash
  3. Gano wurin ainihin files.
    rootuser@linux-host:/var/crash# sysctl kernel.core_pattern
    kernel.core_pattern = |/bin/bash -c “$@” - eval /bin/gzip> /var/crash/%h.%e.core.%t-%p-%u.gz

Mataki na 3: Ci gaba

Taya murna! Yanzu kun gama tsarin farko na Junos cRPD!

Menene Gaba?
Yanzu da kun saita kwantena na Junos cRPD da kafa sadarwa tsakanin kwantena biyu, ga wasu abubuwa da kuke son saitawa na gaba.

Idan kana so Sannan
Zazzage, kunna, da sarrafa lasisin software don buɗe ƙarin fasalulluka don Junos cRPD ɗinku Duba Lasisin Software na Flex don cRPD kuma Sarrafa lasisin cRPD
Nemo ƙarin bayani mai zurfi game da shigarwa da daidaita Junos cRPD Duba Rana ta Daya: Cloud Native Roting tare da cRPD
Bincika abubuwan blog game da Junos cRPD tare da Desktop Docker. Duba Juniper cRPD 20.4 akan Desktop Docker
Saita hanyoyin zirga-zirga da hanyoyin sadarwa Duba Ka'idojin Gudanarwa da hanyoyin sadarwa
Koyi game da Juniper Networks mafitacin tuƙi na gajimare Kalli bidiyon Cloud-Native Routing Overview

Janar bayani
Anan akwai kyawawan albarkatu waɗanda zasu taimaka muku ɗaukar ilimin Junos cRPD zuwa mataki na gaba

Idan kana so Sannan
Nemo cikakkun takaddun samfur don Junos cRPD Duba Takardun cRPD
Bincika duk takaddun da ke akwai don Junos OS Ziyarci Takardun Junos OS
Ci gaba da sabuntawa akan sabbin fasalolin da aka canza da sanannun Dubi Bayanan Sakin Junos OS da warware batutuwa Duba Bayanan Sakin Junos OS
  • Juniper Networks, alamar Juniper Networks, Juniper, da Junos alamun kasuwanci ne masu rijista na Juniper Networks, Inc. a cikin
  • Amurka da sauran kasashe. Duk sauran alamun kasuwanci, alamun sabis, alamun rajista, ko alamun sabis masu rijista mallakin masu su ne. Juniper Networks ba ta da alhakin kowane kuskure a cikin wannan takaddar.
  • Juniper Networks suna da haƙƙin canzawa, gyaggyarawa, canja wuri, ko in ba haka ba sake duba wannan ɗaba'ar ba tare da sanarwa ba.
  • Haƙƙin mallaka © 2023 Juniper Networks, Inc. Duk haƙƙin mallaka. Rev. 01, Satumba 2021.

Takardu / Albarkatu

Juniper cRPD Containerized Roting Protocol Daemonac [pdf] Jagorar mai amfani
cRPD Containerized Roting Protocol Daemonac, cRPD, Containerized Roting Protocol Daemonac, Roting Protocol Daemonac, Protocol Daemonac

Magana

Bar sharhi

Ba za a buga adireshin imel ɗin ku ba. Ana yiwa filayen da ake buƙata alama *