BLOG: Information Experience (iX)
Juniper Employee , Juniper Employee Juniper Employee
BLOG: Information Experience (iX)
Dreams Can Come True: Three Brand New Network Configuration Examples to Make Your (Work) Life Better
Sep 15, 2014

Due to popular demand, Juniper iX is proud to have recently published three new network configuration examples (NCEs)! We really hope one or all of these will help make your life better and your business more profitable:

  • Configuring Group VPN on Routing Devices
  • Configuring Multi-Segment Pseudowires
  • Configuring Inline Video Monitoring Using Media Delivery Index Metrics


For those of you not familiar with NCEs, they are documents that provide overview information and step-by-step configuration examples for some of Juniper’s more complex technologies and features. Many Juniper customers have found these useful in launching new endeavors or in working to improve their existing network.




We love to be able to give you this kind of helpful information. If, while reading one of these, you think, gee, I’d really like to have something similar for this other technology, please reach out to us. Many of our NCEs are born out of suggestions from customers and Juniper sales engineers.


Until then, enjoy the summaries below. We hope one or all of the NCEs will help solve some pressing problems you’ve been working on.


Configuring Group VPN on Routing Devices


Video, voice, and many other applications that are highly sensitive to latency are growing exponentially. Because of this, VPNs that connect branches only by going through a central site aren’t always optimal. A direct connection between remote sites is often required if you want to reduce latency. At the same time, government regulations and other concerns in security are making doing this, especially when the connections go through a service provider network, more difficult to manage.




What’s a network manager to do?


If these challenges sound familiar to you, you might consider implementing Group VPNs in your network.


Group VPNs are manageable, scalable, and secure. They provide any-to-any encrypted communication by replacing statically configured pair-wise IKE connections per peer with a dynamic group key management system. By providing encryption across private IP and MPLS networks, the group VPN implementation simplifies the management of secure

branch-to-branch communication.


Group VPNs provide these main benefits:

  • Data security and transport authentication that support security compliance and internal regulation by encrypting all WAN traffic.
  • High-scale network meshes that eliminate complex peer-to-peer key management with group encryption keys.
  • Network intelligence such as full-mesh connectivity, natural routing path, and quality of service (QoS) in MPLS networks.
  • Authenticated membership control with a centralized key server.
  • Low latency and jitter through full-time, direct communications between sites, without requiring transport through a central hub.
  • Reduced traffic loads on customer premises equipment (CPE) and provider-edge (PE) encryption devices by using the core network for replication of multicast traffic, avoiding packet replication at each individual peer site.


For more information on Group VPN, see Configuring Group VPN on Routing Devices.


Configuring Multi-Segment Pseudowires


Are you interested in controlling costs? What about extending services over a variety of access and metro infrastructures while still keeping your business profitable? Do you enjoy the benefits of Layer 2 circuits and pseudowires but want to expand their scalability?


If so, you would likely benefit from learning more about multi-segment pseudowires in this brand new network configuration example.




With Multi-Segment pseudowires (MS-PW), you can configure up to 254 pseudowire segments from a local to a remote PE router. MS-PWs require minimum provisioning on stitching provider edge (S-PE) devices; therefore, they reduce the configuration burden associated with statically configured Layer 2 circuits while still enabling you to use Label Distribution Protocol (LDP) as the underlying signaling protocol.


MS-PWs allow integration of multiple packet switching network types while leveraging the features and functionality that come with multi-layered networks and control planes. They also reduce the complexity of the tunnel mesh while providing a scalable edge-and-provider node.


As a result, configuring an MS-PW helps control costs, extending services over a variety of access and metro infrastructures, while allowing you to maintain profitability. MS-PWs also optimize network resources, improve network and services management, and provide support for end-to-end QoS.


To learn more about MS-PWs and to see an end-to-end example of an MS-PW implementation, please check out Configuring a Multi-Segment Pseudowire.


Configuring Inline Video Monitoring Using Media Delivery Index Metrics


No one likes a choppy video. However, if the buffering of packets on your network is not adequate, that’s exactly what users will get. Lack of appropriate buffering causes the loss of packets and jitter. But how do you know how much buffering is needed, especially when bandwidth and buffering needs vary widely?


Inline video monitoring on the MX Series 3D Universal Edge Routers will allow you to identify buffering needs for streaming media through the use of MDI metrics. By using MDI metrics to perform measurements under varying load conditions, you can identify sources of significant jitter or packet loss and take appropriate action.


This NCE will provide you with an overall understanding of inline video monitoring and an example of how to enable inline video monitoring so that you can improve the quality of streaming media over your network.


For more information, see Configuring Inline Video Monitoring Using Media Delivery Index Metrics.

0 Kudos