- play_arrow Introduction
- play_arrow Router Data Extraction
- play_arrow Routing Protocols
- play_arrow Equal Cost Multiple Paths
- play_arrow Static Routes
- play_arrow Policy-Based Routes
- play_arrow Virtual Private Networks
- NorthStar Planner Virtual Private Networks Overview
- Importing VPN Information from Router Configuration Files
- Viewing the Integrity Checks Reports
- Accessing VPN Summary Information
- Accessing Detailed Information for a Particular VPN
- VPN Topology View
- Route-Target Export/Import Relationships
- Additional Methods to Access VPN Information
- VPN Path Tracing
- VPN Design and Modeling Using the VPN Wizard
- L3 (Layer 3) VPN
- L3 Hub-and-Spoke VPN
- L2M (Layer2-Martini) VPN
- L2K (Layer2-Kompella) VPN
- VPLS-BGP VPN (for Juniper)
- VPLS-LDP VPN
- L2CCC (Circuit Cross-Connect) VPN
- Inter-AS VPN
- Forming VPN Customer Groups
- Deleting or Renaming VPNs
- VPN Configlet Generation
- Adding Traffic Demands in a VPN
- VPN Traffic Generation
- VPN-Related Reports
- VPN Monitoring and Diagnostics
- play_arrow GRE Tunnels
- play_arrow Multicast
- NorthStar Planner Multicast Overview
- NorthStar Planner Recommended Multicast Instructions
- Creating Multicast Groups
- Creating Multicast Demands
- Viewing Multicast Demands in the Network
- Comparing Multicast with Unicast
- Multicast SPT Threshold
- Multicast Reports
- Multicast Simulation
- Collecting Multicast Path Data from Live Network
- Importing Multicast Path Data
- Multicast Data Processing
- Viewing Multicast Trees
- play_arrow Class of Service
- NorthStar Planner Class of Service Overview
- NorthStar Planner Recommended CoS Instructions
- The QoS Manager
- Define Class Maps
- Create Policies for Classes
- Attach Policies to Interfaces
- Adding Traffic Inputs
- Using the Text Editor
- Reporting Module
- IP Flow Information
- Link information
- Traffic Load Analysis
- Traffic Load by Policy Class
- CoS Alias File
- Bblink File
- Policymap File
- Demand File
- Traffic Load File
- play_arrow Routing Instances
- play_arrow Traffic Matrix Solver
- play_arrow LSP Tunnels
- NorthStar Planner LSP Tunnels Overview
- Viewing Tunnel Info
- Viewing Primary and Backup Paths
- Viewing Tunnel Utilization Information from the Topology Map
- Viewing Tunnels Through a Link
- Viewing Demands Through a Tunnel
- Viewing Link Attributes/Admin-Group
- Viewing Tunnel-Related Reports
- Adding Primary Tunnels
- Adding Multiple Tunnels
- Mark MPLS-Enabled on Links Along Path
- Modifying Tunnels
- Path Configuration
- Specifying a Dynamic Path
- Specifying Alternate Routes, Secondary and Backup Tunnels
- Adding and Assigning Tunnel ID Groups
- Making Specifications for Fast Reroute
- Specifying Tunnel Constraints (Affinity/Mask or Include/Exclude)
- Adding One-Hop Tunnels
- Tunnel Layer and Layer 3 Routing Interaction
- play_arrow Optimizing Tunnel Paths
- play_arrow Tunnel Sizing and Demand Sizing
- play_arrow Tunnel Path Design
- Tunnel Path Design Overview
- Tunnel Path Design Instructions
- Designing Tunnel Paths Overview
- Backup Path Configuration Options
- Default Diversity Level
- Evaluate/Tune Options
- Advanced Options
- Viewing Design Results
- Tunnel Modifications
- Exporting and Importing Diverse Group Definitions
- Advanced Path Modification
- play_arrow Inter-Area MPLS-TE
- play_arrow Point-to-Multipoint (P2MP) Traffic Engineering
- NorthStar Planner P2MP Traffic Engineering Overview
- Point-to-Multipoint Traffic Engineering Instructions
- Import a Network That Already has Configured P2MP LSP Tunnels
- Examine the P2MP LSP Tunnels
- Create P2MP LSP Tunnels and Generate Corresponding LSP Configlets
- Examine P2MP LSP Tunnel Link Utilization
- Perform Failure Simulation and Assess the Impact
- play_arrow Diverse Multicast Tree Design
- Diverse Multicast Tree Design Overview
- Diverse Multicast Tree Instructions
- Open a Network That Already Has a Multicast Tree
- Set the Two P2MP Trees of Interest to be in the Same Diversity Group
- Using the Multicast Tree Design Feature to Design Diverse Multicast Trees
- Using the Multicast Tree Design Feature
- play_arrow DiffServ Traffic Engineering Tunnels
- DiffServ Traffic Engineering Tunnels Overview
- Using DS-TE LSP
- Hardware Support for DS-TE LSP
- NorthStar Planner Support for DS-TE LSP
- Configuring the Bandwidth Model and Default Bandwidth Partitions
- Forwarding Class to Class Type Mapping
- Link Bandwidth Reservation
- Creating a New Multi-Class or Single-Class LSP
- Configuring a DiffServ-Aware LSP
- Tunnel Routing
- Link Utilization Analysis
- play_arrow Fast Reroute
- NorthStar Planner Fast Reroute Overview
- Fast Reroute Supported Vendors
- Import Config and Tunnel Path
- Viewing the FRR Configuration
- Viewing FRR Backup Tunnels
- Viewing Primary Tunnels Protected by a Bypass Tunnel
- Modifying Tunnels to Request FRR Protection
- Modifying Links to Configure Multiple Bypasses (Juniper only)
- Modifying Links to Trigger FRR Backup Tunnel Creation (Cisco)
- FRR Design
- FRR Auto Design
- FRR Tuning
- Viewing Created Backup Tunnels
- Generating LSP Configlets for FRR Backup Tunnels
- Failure Simulation—Testing the FRR Backup Tunnels
- Exhaustive Failure
- Link, Site and Facility Diverse Paths
- play_arrow Cisco Auto-Tunnels
- play_arrow Integrity Check Report
- play_arrow Compliance Assessment Tool
- Compliance Assessment Tool Overview
- Using The Compliance Assessment Tool
- CAT Testcase Design
- Creating a New Project
- Loading the Configuration Files
- Creating Conformance Templates
- Reviewing and Saving the Template
- Saving and Loading Projects
- Run Compliance Assessment Check
- Compliance Assessment Results
- Publishing Templates
- Running External Compliance Assessment Scripts
- Scheduling Configuration Checking in Task Manager
- Building Templates
- Special Built-In Functions
- Paragon Planner Keywords For Use Within a Rule
- More on Regular Expressions
- IP Manipulation
- play_arrow Virtual Local Area Networks
- play_arrow Overhead Calculation
- play_arrow Router Reference
BGP Report
When the client session is opened for the first time, the BGP Report should be checked to make sure that the network has no obvious BGP configuration errors.
The output file that is written to the output directory is called “BGPRPT.runcode”.
BGP Integrity Check Report:
BGP statistics – This section shows:
The total number of BGP speakers in the network
The total number of neighbors
The total number of policies
The list of all ASs and the number of their BGP speakers
content_copy zoom_out_map****************************************************** * BGP Integrity Check Report ****************************************************** -- 17 BGP speakers,89 neighbors,283 members,183 policies -- 3 local AS: ASno 65522: 9 routers ASno 65511: 7 routers ASno 65534: 1 routers
Neighbor AS Specification Error Check Report
This section shows any errors about ASs that are not specified correctly. For example, router A declares that its neighbor, router B, is in AS65524, but router B is actually in AS65522.
* * * * * Neighbor AS Specification Error Check Report AS Location Nbr_AS Nbr_IP_Addr Nbr-Location ValidAS Comments 65511 X39 65524 10.49.226.34 Q39 65522 *** 1 AS specification errors
In the example above, the Neighbor AS Specification Error Check Report shows that there is an error in the node (Location) X39. The neighbor node(Nbr-Location) is Q39 and the neighbor AS (Nbr_AS) is 65524, which should be 65522 as shown in the ValidAS field.
Unbalanced BGP Neighbor Check Report
The BGP protocol requires that if router A declares router B
to be its neighbor, then router B also has to declare that router
A is its neighbor. If not, then an unbalanced neighbor occurs. This
section reports any unbalanced neighbors between BGP speakers within
the network.* * * * *
Unbalanced
BGP Neighbor Check Report
# Unbalanced BGP Neighbor = 2 AS Location Nbr_AS Nbr-Location 65511 S39 65511 X39 65511 W39 65511 X39
The Unbalanced BGP Neighbor Check Report shows that there are two unbalanced neighbors. On the first record S39 declares that X39 is its neighbor but X39 does not declare that S39 is its neighbor. The second record shows a similar error.
IBGP Mesh Connectivity Check Report
All IBGP speakers within an AS have to be fully meshed, unless route reflectors or confederation are used. This section shows if any AS is not fully meshed. A full mesh for both IPV4 and VPNV4 address families are checked.
* * * * * IBGP Mesh Connectivity Check Report AS65522: #IPV4 IBGP neighbor=0. Check mesh definition for VPNV4 address family AS 65522: passed mesh connectivity checking ---- VPNV4 AS65511: S39 is not defined as X39's neighbor IPV4 VPNV4 AS65511: W39 is not defined as X39's neighbor AS65511: 2 neighbor definition missing AS65533: IPV4, VPNV4, L2VPN IBGP neighbors are not defined AS 65534: passed mesh connectivity checking
The IBGP Mesh Connectivity Check Report above shows the following
AS65522 is fully meshed for the VPNV4 address family but no IBGP neighbors exist for IPV4 address family.
AS6511 is not fully meshed for IPV4 and VPNV4. For the VPNV4 address family, S39 and W39 are not defined as X39’s neighbors. For the IPV4 address family, W39 is not defined as X39’s neighbor.
AS65534 passes the mesh connectivity check for both IPV4 and VPNV4.
AS65533 is missing IBGP neighbors for the IPV4, VPNV4, and L2VPN address families.
IPV4/VPNV4/L2VPN Route Reflector Statistics
These three sections indicate the route reflector statistics,
including number of route reflectors, number of route reflector clients,
and hierarchical route reflector information. Route reflector clients
with only one route reflector are listed as a warning that they do
not have redundant route reflectors defined. The following is an example
of the IPV4 route reflector statistics:IPV4 Route
Reflector Statistics: 200 BGP Speakers, 8 Route Reflectors, 100 Route
Reflector Clients
Redundant Route Reflectors
are not defined at 2 RR Clients
1. WDC1, RR= PHI1
2. WDC2, RR= PHI1
#Route Reflector Hierarchy Level= 3 Top Level: 4RR(s) 1. NYC1, 2. NYC2, 3. BOS1, 4. BOS2, Level 2: 3RR(s) 1. PHI1, RR= NYC1 NYC2 1. PHI2, RR= NYC1 NYC2 2. BOS3, RR= BOS1 BOS2 Level 3: 1RR(s) 1. TRE1, RR= PHI1 PHI2
VPNV4 and L2VPN route reflector statistics are similarly provided.
It is recommended that all errors reported in the BGP Report file get fixed before carrying on further analysis. One way to do it is to correct the errors on the configuration files and then run through getipconf again.