Tag Archives: Notas

Notas estudo Advanced Junos Enterprise Routing (AJER)

Um dos cursos recomendados para obter o JNCIP-ENT é o Advanced Junos Enterprise Routing (AJER). Aqui ficam as minhas notas para download.

Objectives

After successfully completing this course, you should be able to:

  • Describe the various OSPF link-state advertisement (LSA) types.
  • Explain the flooding of LSAs in an OSPF network.
  • Describe the shortest-path-first (SPF) algorithm.
  • Describe OSPF area types and operations.
  • Configure various OSPF area types.
  • Summarize and restrict routes.
  • Identify scenarios that require routing policy or specific configuration options.
  • Use routing policy and specific configuration options to implement solutions for various scenarios.
  • Describe basic BGP operation and common BGP attributes.
  • Explain the route selection process for BGP.
  • Describe how to alter the route selection process.
  • Configure some advanced options for BGP peers.
  • Describe various BGP attributes in detail and explain the operation of those attributes.
  • Manipulate BGP attributes using routing policy.
  • Describe common routing policies used in the enterprise environment.
  • Explain how attribute modifications affect routing decisions.
  • Implement a routing policy for inbound and outbound traffic using BGP.
  • Identify environments that might require a modified CoS implementation.
  • Describe the various CoS components and their respective functions.
  • Explain the CoS processing along with CoS defaults on SRX Series Services Gateways.
  • Describe situations when some CoS features are used in the enterprise.
  • Implement some CoS features in an enterprise environment.
  • Describe IP multicast traffic flow.
  • Identify the components of IP multicast.
  • Explain how IP multicast addressing works.
  • Describe the need for reverse path forwarding (RPF) in multicast.
  • Explain the role of Internet Group Management Protocol (IGMP) and describe the available IGMP versions.
  • Configure and monitor IGMP.
  • Identify common multicast routing protocols.
  • Describe rendezvous point (RP) discovery options.
  • Configure and monitor Protocol Independent Multicast (PIM) sparse modes.
  • Configure and monitor RP discovery mechanisms.
  • Describe the basic requirements, benefits, and caveats of source-specific multicast (SSM).
  • List the address ranges used for SSM.
  • Illustrate the role of Internet Group Management Protocol version 3 (IGMPv3) and PIM sparse mode (PIM-SM) in an SSM implementation.
  • Configure and monitor SSM.

Intended Audience

This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.

Course Level

AJER is an advanced-level course.

Prerequisites

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also have working experience with basic routing principles.

Students should also attend the Introduction to the Junos Operating System (IJOS), Junos Routing Essentials (JRE), and Junos Intermediate Routing (JIR) courses prior to attending this class.

Course Contents

Day 1

Chapter 1: Course Introduction

Chapter 2: OSPF

  • OSPFv2 Review
  • Link-State Advertisements
  • Protocol Operations
  • OSPF Authentication
  • OSPFv3
  • Lab 1: Configuring and Monitoring OSPF

Chapter 3: OSPF Areas

  • Review of OSPF Areas
  • Stub Area Operation
  • Stub Area Configuration
  • NSSA Operation
  • NSSA Configuration
  • Route Summarization
  • Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization

Chapter 4: OSPF Case Studies and Solutions

  • IGP Transition Overview
  • Transition Case Study
  • OSPF Multiarea Adjacencies
  • External Reachability
  • Virtual Links
  • Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Policy

Day 2

Chapter 5: BGP

  • Review of BGP
  • BGP Operations
  • Load Balancing Options
  • Path Selection and Configuration Options
  • Lab 4: Implementing BGP

Chapter 6: BGP Attributes and Policy

  • Policy and BGP
  • BGP Attributes
  • Details and Manipulation of Common BGP Path Attributes
  • Lab 5: BGP Attributes

Chapter 7: Enterprise Routing Policies

  • Enterprise BGP Core Network Design
  • Enterprise External Network Deployment
  • Lab 6: Implementing Enterprise Routing Policies

Day 3

Chapter 8: Introduction to Multicast

  • Overview of Multicast
  • Multicast Addressing
  • RPF
  • IGMP

Chapter 9: Multicast Routing Protocols and SSM

  • Overview of Multicast Routing Protocols
  • PIM-SM Using the ASM Model
  • Lab 7: Implementing PIM-SM
  • PIM-SM Using the SSM Model
  • Lab 8: Implementing SSM

Chapter 10: Class of Service

  • CoS Components Review and Case Study
  • CoS Processing and CoS Defaults on the SRX Series Device
  • Policing
  • Virtual Channels
  • Monitoring with Resource Performance Monitoring
  • Lab 9: Implementing CoS Features in the Enterprise

Appendix A: BGP Route Reflection

  • Route Reflection Operation
  • Configuration and Routing Knowledge
  • Lab 10: BGP Route Reflection (Optional)

 

Notas estudo Introduction to the Junos Operating System (IJOS)

Um dos cursos recomendados para obter o JNCIA-Junos é o Introduction to the Junos Operating System (IJOS) . Aqui ficam as minhas notas para download.

Objectives

After successfully completing this course, you should be able to:

  • Describe the basic design architecture of the Junos OS.
  • Identify and provide a brief overview of Junos devices.
  • Navigate within the Junos CLI.
  • Perform tasks within the CLI operational and configuration modes.
  • Restore a Junos device to its factory-default state.
  • Perform initial configuration tasks.
  • Configure and monitor network interfaces.
  • Describe user configuration and authentication options.
  • Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP.
  • Monitor basic operation for the Junos OS and devices.
  • Identify and use network utilities.
  • Upgrade the Junos OS.
  • Perform file system maintenance and password recovery on a Junos device.
  • Navigate within the Junos J-Web interface.

Intended Audience

This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.

Course Level

IJOS is an introductory-level course.

Prerequisites

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite.

Course Contents

Day 1

Chapter 1: Course Introduction

Chapter 2: Junos Operating System Fundamentals

  • The Junos OS
  • Traffic Processing
  • Platforms Running the Junos OS

Chapter 3: User Interface Options

  • User Interface Options
  • The Junos CLI: CLI Basics
  • The Junos CLI: Operational Mode
  • The Junos CLI: Configuration Mode
  • Lab 1: The Junos CLI

Chapter 4: Initial Configuration

  • Factory-Default Configuration
  • Initial Configuration
  • Interface Configuration
  • Lab 2: Initial System Configuration

Chapter 5: Secondary System Configuration

  • User Configuration and Authentication
  • System Logging and Tracing
  • Network Time Protocol
  • Archiving Configurations
  • SNMP
  • Lab 3: Secondary System Configuration

Chapter 6: Operational Monitoring and Maintenance

  • Monitoring Platform and Interface Operation
  • Network Utilities
  • Maintaining the Junos OS
  • Password Recovery
  • Lab 4: Operational Monitoring and Maintenance

Appendix A: Interface Configuration Examples

  • Review of the Interface Configuration Hierarchy
  • Interface Configuration Examples
  • Using Configuration Groups

Appendix B: The J-Web Interface

  • The J-Web GUI
  • Configuration
  • Lab 5 (Optional): The J-Web Interface

 

Notas estudo Advanced Junos Enterprise Switching (AJEX)

Um dos cursos recomendados para obter o JNCIP-ENT é o Advanced Junos Enterprise Switching (AJEX). Aqui ficam as minhas notas para download.

Objectives

After successfully completing this course, you should be able to:

  • Implement filter-based VLAN assignments.
  • Restrict traffic flow within a VLAN.
  • Manage dynamic VLAN registration.
  • Tunnel Layer 2 traffic through Ethernet networks.
  • Review the purpose and operations of a spanning tree.
  • Implement multiple spanning-tree instances in a network.
  • Implement one or more spanning-tree instances for a VLAN.
  • List the benefits of implementing end-user authentication.
  • Explain the operations of various access control features.
  • Configure and monitor various access control features.
  • Describe processing considerations when multiple authentication and access control features are enabled.
  • Describe some common IP telephony deployment scenarios.
  • Describe features that facilitate IP telephony deployments.
  • Configure and monitor features used in IP telephony deployments.
  • Explain the purpose and basic operations of CoS.
  • Describe CoS features used in Layer 2 networks.
  • Configure and monitor CoS in a Layer 2 network .
  • Describe a basic troubleshooting method.
  • List common issues that disrupt network operations.
  • Identify tools used in network troubleshooting.
  • Use available tools to resolve network issues.

 

Intended Audience

This course benefits individuals responsible for configuring and monitoring EX Series switches.

Course Level

AJEX is an advanced-level course.

Prerequisites

Students should have an intermediate-level of networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course, the Junos Routing Essentials (JRE) course, and the Junos Enterprise Switching (JEX) course prior to attending this class.

Course Contents

Day 1

Chapter 1: Course Introduction

Chapter 2: Advanced Ethernet Switching

  • Virtual Local Area Networks
  • Automating VLAN Administration
  • Tunneling Layer 2 Traffic
  • Lab 1: Advanced Ethernet Switching

Chapter 3: Advanced Spanning Tree

  • Spanning Tree Review
  • MSTP
  • VSTP
  • Lab 2: Advanced Spanning Tree

Chapter 4: Authentication and Access Control

  • Authentication Overview
  • Access Control Features
  • Overview of Authentication Processing
  • Lab 3: Authentication and Access Control

Day 2

Chapter 5: Deploying IP Telephony Features

  • Deployment Scenarios
  • IP Telephony Features
  • Case Study: Deploying IP Telephony Features
  • Lab 4: Deploying IP Telephony Features

Chapter 6: Class of Service

  • Class of Service Review
  • Processing and Feature Overview
  • Case Study: Implementing Class of Service
  • Lab 5: Class of Service

Chapter 7: Monitoring and Troubleshooting Layer 2 Networks

  • Introduction to Monitoring and Troubleshooting
  • Monitoring and Troubleshooting Tools
  • Case Studies
  • Lab 6: Monitoring and Troubleshooting

Notas Estudo BCVRE 170-010 parte 4

Chapter 9 Logging

Logging Basics

As Log messages são guardadas /var/log/messages, quando o ficheiro atinge 500kb
renomeia-o para messages.0 e abre um novo ficheiro.

O vRouter mantém os logs separados para bootup messages, PPP connection setup, IPsec connection setup, e outras features

[email protected]:~$ show log | match ERROR | more
May 16 13:30:50 training pluto[5686]: ERROR: “peer-76.74.103.7-tunnel-1”
#995: sendto on pppoe1 to 76.74.103.7:500 failed in ISAKMP notify. Errno 22:
Invalid argument
May 16 13:31:20 training pluto[5686]: ERROR: “peer-76.74.103.7-tunnel-1”
#995: sendto on pppoe1 to 76.74.103.7:500 failed in ISAKMP notify. Errno 22:
Invalid argument
May 18 00:10:55 training pluto[5686]: ERROR: “peer-76.74.103.7-tunnel-1”
#1043:sendto on pppoe1 to 76.74.103.7:500 failed in ISAKMP notify. Errno 22:
Invalid argument

show log all
!Mostra as ultimas 10 entradas
show log tail

Feature-Specific Logging

Actvar o debugging

[email protected]:~$ monitor protocol ospf enable ?
Possible completions:
database-timer
Enable OSPF database-timer debugging
events        Enable OSPF event packet debugging
ifsm          Enable OSPF ifsm debugging
lsa           Enable OSPF lsa debugging
nfsm          Enable OSPF nfsm debugging
nsm           Enable OSPF nsm debugging
packet        Enable OSPF packet debugging
route         Enable OSPF route debugging

[email protected]:~$ monitor protocol ospf enable events ?
Possible completions:
<Enter>       Execute the current command
abr           Enable OSPF abr event debugging
asbr          Enable OSPF asbr event debugging
lsa           Enable OSPF lsa event debugging
nssa          Enable OSPF nssa event debugging
os            Enable OSPF os event debugging
router        Enable OSPF router event debugging
vlink         Enable OSPF vlink event debugging

Para realizar logs de tráfego em transito (NAT,Firewall,etc) é preciso activar o log nas respectivas rules

[email protected]# set nat source rule 10 log enable

As entradas sao guardadas em /var/log/messages

Monitor Real-Time

Monitorizar em real-time

monitor protocol ospf
monitor nat source

Crtl-C para sair da captura

Sample Log Output

OSPF Hello packets:

[email protected]:~$ monitor protocol ospf enable packet hello
[email protected]:~$ monitor protocol ospf
Apr  5 20:30:51 vRouter ospfd[1949]: Hello received from [172.24.42.53] v
[eth2:192.168.13.1]
Apr  5 20:30:51 vRouter ospfd[1949]:  src [192.168.13.3],
Apr  5 20:30:51 vRouter ospfd[1949]:  dst [224.0.0.5]
Apr  5 20:30:51 vRouter ospfd[1949]: Packet 172.24.42.53 [Hello:RECV]:
Options *|-|-|-|-|-|E|*
Apr  5 20:30:51 vRouter ospfd[1949]: make_hello: options: 2, int:
eth1:192.168.12.1
Apr  5 20:30:51 vRouter ospfd[1949]: make_hello: options: 2, int:
eth2:192.168.13.1
Apr  5 20:30:51 vRouter ospfd[1949]: Hello sent to [224.0.0.5] via
[eth1:192.168.12.1].
Apr  5 20:30:51 vRouter ospfd[1949]: make_hello: options: 2, int:
eth3:192.168.101.1
Apr  5 20:30:51 vRouter ospfd[1949]: Hello sent to [224.0.0.5] via
[eth2:192.168.13.1].
Apr  5 20:30:51 vRouter ospfd[1949]: Hello sent to [224.0.0.5] via
[eth3:192.168.101.1].

NAT packets:

[email protected]# set nat source rule 30 log enable

[email protected]# run show log nat
Apr  5 18:17:01 vRouter kernel: [595980.330716] [NAT-SRC-30-MASQ] IN=
OUT=pppoe1
SRC=192.168.2.104 DST=173.12.167.194 LEN=56 TOS=0x00 PREC=0x00 TTL=62
ID=52504 PROTO=UDP SPT=7172 DPT=64544 LEN=36
Apr  5 18:17:01 vRouter kernel: [595980.341042] [NAT-SRC-30-MASQ] IN=
OUT=pppoe1
SRC=192.168.2.104 DST=173.12.167.194 LEN=56 TOS=0x00 PREC=0x00 TTL=62
ID=16918 PROTO=UDP SPT=7172 DPT=64545 LEN=36
Output omitted

Chapter 10 OSPF Single-Area

Configuring OSPF

[email protected]# show protocols ospf
area 0 {
network 10.1.1.0/24
network 10.10.1.0/24
network 10.10.2.0/24
}

[email protected]# show protocols
ospf {
area 0 {
network 10.0.0.0/8
}
default-information {
originate {
}
}
passive-interface eth1
passive-interface eth2
}

Verifying OSPF Operations

[email protected]:~$ show ip route
Codes: K – kernel, C – connected, S – static, R – RIP, B – BGP
O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2
i – IS-IS, L1 – IS-IS level-1, L2 – IS-IS level-2, ia – IS-IS inter
area
> – selected route, * – FIB route, p – stale info
Gateway of last resort is not set
O       10.1.1.0/24 [110/1] is directly connected, eth1, 00:02:57
C    *> 10.1.1.0/24 is directly connected, eth1
O    *> 10.2.1.0/24 [110/2] via 10.10.1.2, eth2, 00:01:30
O    *> 10.2.2.0/24 [110/2] via 10.10.1.2, eth2, 00:01:30
O    *> 10.3.1.0/24 [110/2] via 10.10.2.2, eth3, 00:00:41
O    *> 10.3.2.0/24 [110/2] via 10.10.2.2, eth3, 00:00:41
O       10.10.1.0/24 [110/1] is directly connected, eth2, 00:02:57
Output omitted

[email protected]:~$ show ip ospf neighbors
OSPF Process 0:
Neighbor ID     Pri State           Dead Time Address         Interface
172.24.42.52      1 Full/DR           31.721s 10.10.1.2       eth1
172.24.42.53      1 Full/DR           35.533s 10.10.2.2       eth2

[email protected]:~$ show ip ospf database
OSPF Router with ID (172.24.42.51) (Process ID 0)
Router Link States (Area 0.0.0.0)
Link ID         ADV Router      Age  Seq#       CkSum  Link count
172.24.42.51    172.24.42.51     869 0x80000005 0x1d44 3
172.24.42.52    172.24.42.52     884 0x80000005 0x84f7 3
172.24.42.53    172.24.42.53     836 0x80000005 0xe555 4
Net Link States (Area 0.0.0.0)
Link ID         ADV Router      Age  Seq#       CkSum
10.10.1.1       172.24.42.51     918 0x80000001 0x04a5
10.10.2.1       172.24.42.51     869 0x80000001 0x07a0
AS External Link States
Link ID         ADV Router      Age  Seq#       CkSum  Route              Tag
0.0.0.0         192.168.200.1     10 0x80000002 0xa3f1 E2 0.0.0.0/0       254

[email protected]:~$ show ip ospf database router 172.24.42.51
OSPF Router with ID (192.168.200.1) (Process ID 0)
Router Link States (Area 0.0.0.0)
LS age: 1587
Options: 0x2 (-|-|-|-|-|-|E|-)
Flags: 0x0
LS Type: router-LSA
Link State ID: 192.168.200.1
Advertising Router: 192.168.200.1
LS Seq Number: 80000005
Checksum: 0x1d44
Length: 60
Number of Links: 3
Link connected to: Stub Network
(Link ID) Network/subnet number: 10.1.1.0
(Link Data) Network Mask: 255.255.255.0
Number of TOS metrics: 0
TOS 0 Metric: 1
Link connected to: a Transit Network
(Link ID) Designated Router address: 10.10.1.1
(Link Data) Router Interface address: 10.10.1.1
Number of TOS metrics: 0
TOS 0 Metric: 1
Link connected to: a Transit Network
(Link ID) Designated Router address: 10.10.2.1
(Link Data) Router Interface address: 10.10.2.1
Number of TOS metrics: 0
TOS 0 Metric: 1

Referências:

Notas Estudo BCVRE 170-010 parte 1

Notas Estudo BCVRE 170-010 parte 2

Notas Estudo BCVRE 170-010 parte 3

Vyatta vRouter 5400 Online Documentation

Brocade Certified vRouter Engineer 2013 (BCVRE) Exam

Voucher gratuito Brocade Certified vRouter Engineer (BCVRE) 170-010 Exam

Network Functions Virtualization

Certification Brocade Community

Certification Exam Information

Notas Estudo BCVRE 170-010 parte 3

Chapter 7 NAT

3 tipos de NAT:
Source NAT
Destination NAT
Bidirectional NAT – combina a source e destination NAT para translation em ambas as direções

NAT Rulebases

O NAT usa rulebases diferentes para cada tipo de NAT, as rulebases são ordenadas numericamente e quando e feito um match o vRouter termina a execução da respectiva rulebase sem analisar outras rulebases.

Cada rulebase inclui 3 parâmetros:

Filtros, identificando o tráfego a ser Nated. Caso não seja definido nenhum filtro, todo e qualquer tráfego faz match.
Post-translation address, define o IP a ser substituído quando e feito o NAT. A opção masquerade usa o address da interface outbound
A interface onde a rule e aplicada e a direção.Deve ser especificada uma interface.

Caso seja especificado um port number no filtro ou post-translation address, deve ser especificado o Layer 4 protocol (TCP,UDP,ambos)

!NAT do tráfego com origem no source address usando o endereço da interface
[email protected]# show nat source
rule 10 {
source {
address 192.168.0.0/16
}
outbound-interface eth1
translation {
address masquerade
}
}

!Fazer o translate de vários port numbers de um IP Publico para um IP privado
[email protected]# show nat destination
rule 10 {
destination {
address 1.3.5.7
port 80
}
inbound-interface eth1
translation {
address 10.2.3.4
}
protocol tcp
}
rule 20 {
destination {
address 1.3.5.7
port 25
}
inbound-interface eth1
translation {
address 10.5.6.7
}
protocol tcp
}
rule 30 {
destination {
address 1.3.5.7
port 53
}
inbound-interface eth1
translation {
address 10.8.9.1
}
protocol udp
}

vyatta[email protected]:~$ show nat source rule
Disabled rules are not shown
Codes: X – exclude rule, M – masquerade rule
rule    intf              translation
—-    —-              ———–
M10     eth1             saddr 192.168.100.0/24 to 216.134.166.19
proto-all        sport ANY

[email protected]:~$ show nat destination rules
Disabled rules are not shown
Codes: X – exclude rule
rule    intf              translation
—-    —-              ———–
10      eth1             daddr 1.3.5.7 to 10.2.3.4
proto-tcp        dport 80
20      eth1             daddr 1.3.5.7 to 10.5.6.7
proto-tcp        dport 25
30      eth1             daddr 1.3.5.7 to 10.8.9.1
proto-udp        dport 53

[email protected]:~$ show nat source statistics
rule   pkts    bytes   interface
—-   —-    —–   ———10     528     38349   eth1
20     0       0       eth1
30     1359K   96M     eth1

!Ver as NAT translations activas
[email protected]:~$ show nat source trans
Pre-NAT              Post-NAT             Prot  Timeout
192.168.2.102        216.134.166.19       tcp   47
192.168.2.104        216.134.166.19       udp   0
192.168.2.102        216.134.166.19       udp   49
192.168.2.104        216.134.166.19       tcp   431740
192.168.2.104        216.134.166.19       tcp   431522
192.168.2.102        216.134.166.19       udp   179
192.168.2.104        216.134.166.19       tcp   431739
192.168.2.104        216.134.166.19       tcp   431988
192.168.2.104        216.134.166.19       tcp   431928
192.168.2.104        216.134.166.19       tcp   431810
192.168.2.106        216.134.166.19       tcp   326344
192.168.2.102        216.134.166.19       udp   28
192.168.2.102        216.134.166.19       udp   54
192.168.2.102        216.134.166.19       udp   179
192.168.2.104        216.134.166.19       udp   6
192.168.2.102        216.134.166.19       tcp   431848

Exclusion Filters

Permite excluir que sejam efetuados determinados NATs, por exemplo quando existem túneis VPN

Estes filters podem ser criados usando um ! ou “bang” como NOT Operator

[email protected]# show nat destination
rule 10 {
destination {
address 10.10.10.0/24
}
exclude
outbound-interface eth0
}
rule 40 {
outbound-interface eth0
translation {
address masquerade
}
}

Chapter 8 Licensing and Upgrades

Nota:Apartir de 1 Novembro 2013 o entitlement e processo de upgrade descrito neste documento já não se encontra disponível

Para registar o softawre e necessario configurar os seguintes parametros:
• Repository username
• Repository password
• Entitlement key

!Verificar se o vRouter foi registado com o Vyatta entitlement server
show entitlement

Upgrading the vRouter

Para efetuar upgrade usar o comando upgrade system image, este automaticamente
ira efectuar download da nova versão. É necessário ter pre-configurado os username/password de acesso ao repositório, senão serão solicitados os dados durante o upgrade

A imagem do vRouter tem 2 componentes: o próprio software vRouter e os respectivos controladores do Linux (drivers,system,..)
Caso o system template tenha sofrido alterações, e necessário efetuar um upgrade manual senão o processo de upgrade continua normalmente.

O processo manual e similar ao criar uma nova VM com alguns passos adicionais:

1. Download the new template just as you did for your initial installation.
2. Copy the configuration file from your existing virtual machine. You can use SCP or FTP to copy it to an
external server, or use simple copy-paste from a console window.
3. Edit the configuration file to remove the hardware-specific settings. We’ll show you the details of what to
remove on the next screen.
4. Install a new virtual machine using the new template.
5. When your new VM has booted up, copy your edited configuration file to /config/config.boot on the new
system. This is the default configuration file for the vRouter device.
6. Reboot your new VM. When it boots, it will read the hardware values from the hypervisor software, and
pull the rest of the configuration data from the configuration file you just copied over.
7. Once your new VM is fully operational, you can cut over operations from the old VM. This cut over
represents the only downtime your network will experience during the upgrade process, and should be
almost non-disruptive depending on your hypervisor software.
You can verify the success of your device upgrade with the commands  show version and show system image

Referências:

Notas Estudo BCVRE 170-010 parte 1

Notas Estudo BCVRE 170-010 parte 2

Vyatta vRouter 5400 Online Documentation

Brocade Certified vRouter Engineer 2013 (BCVRE) Exam

Voucher gratuito Brocade Certified vRouter Engineer (BCVRE) 170-010 Exam

Network Functions Virtualization

Certification Brocade Community

Certification Exam Information