All passwords are: juniper123
Config file downloads:
You'll note that the final configs for J2300-3 and J2300-4 are missing. This is left as an exercise to the student (code: I accidentally deleted them)
Here is the final config for J2300-1
system { host-name J2300-1; root-authentication { encrypted-password "$1$KUi/iDD6$MCL5jDu1YOY34UJnY1Umx1"; ## SECRET-DATA } login { user admin { uid 2000; class super-user; authentication { encrypted-password "$1$2WNXM.8b$5xkkkgaya5VgOlTrJNG9E0"; ## SECRET-DATA } } services { ssh { root-login allow; protocol-version v2; } } syslog { user * { any emergency; } file messages { any notice; authorization info; } file interactive-commands { interactive-commands any; } } } interfaces { fe-0/0/0 { unit 0 { family inet { address 10.99.1.2/24; address 172.16.11.11/24; } } } fe-0/0/1 { vlan-tagging; unit 12 { bandwidth 10g; vlan-id 12; family inet { address 10.0.12.1/24; } family mpls; } unit 13 { vlan-id 13; family inet { address 10.0.13.1/24; } family mpls; } unit 100 { vlan-id 100; family inet { address 10.30.30.1/17; } } unit 101 { vlan-id 101; family inet { address 10.101.0.1/24; } } unit 102 { vlan-id 102; family inet { address 10.102.0.1/24; } } unit 1001 { vlan-id 1001; family inet { address 10.1.111.1/24; } } } lo0 { unit 0 { family inet { address 10.0.0.1/32; } } } } routing-options { graceful-restart; static { route 5.1.1.0/25 receive; route 5.2.1.0/25 receive; } forwarding-table { export LOAD-BALANCE; } } protocols { rsvp { interface fe-0/0/1.13; interface fe-0/0/1.12; } mpls { icmp-tunneling; label-switched-path R1-R6 { to 10.0.0.6; } interface fe-0/0/1.12; interface fe-0/0/1.13; } ospf { traceoptions { file ospf.log; flag graceful-restart detail; } graceful-restart { restart-duration 150; helper-disable; } traffic-engineering; external-preference 171; export [ LOOPBACK ADVERTISE-STATIC ]; import IGNORE; reference-bandwidth 25g; area 0.0.0.0 { area-range 10.101.0.0/16; virtual-link neighbor-id 13.13.13.13 transit-area 101.101.101.101; interface fe-0/0/1.12 { interface-type p2p; metric 5; te-metric 10000; retransmit-interval 8; authentication { simple-password "$9$RsaSKWN-b2ga69eM8XdV"; ## SECRET-DATA } bfd-liveness-detection { version 1; minimum-interval 1000; } neighbor 10.0.12.2; } interface fe-0/0/1.13 { interface-type p2p; link-protection; metric 5; te-metric 10000; retransmit-interval 8; authentication { md5 7 key "$9$ZPjqPQF6/AuEc7VbsJZ9AtOIheKWLNV"; ## SECRET-DATA } flood-reduction; bfd-liveness-detection { minimum-interval 1000; } } interface lo0.0 { passive; } label-switched-path R1-R6 { disable; metric 1; } } area 101.101.101.101 { interface fe-0/0/1.101 { authentication { simple-password "$9$YmoUHf5FCA0k.0IESMWGDi"; ## SECRET-DATA } } } area 102.102.102.102 { area-range 10.102.0.0/24 restrict; interface fe-0/0/1.102 { authentication { md5 88 key "$9$ZbUiqmPQ/CuX72aZU.m3n/AORrlM8LNreLNbwJZ/Ct"; ## SECRET-DATA } } } area 0.0.0.1 { nssa { default-lsa { default-metric 1000; metric-type 1; type-7; } no-summaries; area-range 3.0.0.0/8; area-range 4.0.0.0/8; } area-range 10.1.0.0/16 override-metric 5000; interface fe-0/0/1.1001 { priority 0; retransmit-interval 3; hello-interval 1; dead-interval 11; } interface fe-0/0/1.13 { secondary; } } area 30.30.30.30 { interface fe-0/0/1.100 { priority 255; } } } } policy-options { policy-statement ADVERTISE-STATIC { term 5.1.1-NET { from { protocol static; route-filter 5.1.1.0/25 exact; } then { metric 1; tag 1; external { type 1; } accept; } } term 5.2.1-NET { from { protocol static; route-filter 5.2.1.0/25 exact; } then { metric 2; tag 2; accept; } } } policy-statement FAVORITE-NETWORK { from { protocol static; route-filter 11.11.11.0/24 orlonger; } then { metric 11; accept; } } policy-statement IGNORE { from { route-filter 5.1.0.0/16 orlonger; route-filter 5.2.0.0/16 orlonger; } then reject; } policy-statement LOAD-BALANCE { then { load-balance per-packet; } } policy-statement LOOPBACK { from interface lo0.0; then accept; } policy-statement TEST { then { metric 10000; external { type 1; } } } }