Re: [j-nsp] Juniper publishes Release notes as pdf

2024-03-18 Thread Tobias Heister via juniper-nsp

I think the main story here is: Offer both/different versions!
Once the content is there it should be very little effort to render 
multiple different outputs.


In the days of ancient past you could just convert each section/page of 
the website (including Release Notes) into a PDF (documentation still 
has that at most locations) or get a properly authored PDF version

which has use-cases e.g.:
- searching it
- offline availability (i have been in "offline" situations where help 
apropos did not cut it, bonus points during an outage)


(Back than we even could download a full documentation PDF bundle/"CD" 
in one place which again is cool to have offline or to fullfill the "we 
want to have all documentation handed to us" tender knob :))


I am also not a big fan that the HTML based Release Notes have been 
changed month/years ago to have clickable section per subchapter (e.g. 
per feature family per platform) where it once was one bigger document.


Want to scroll trough everything new on e.g. 22.1R1 for MX?
https://www.juniper.net/documentation/us/en/software/junos/release-notes/22.1/junos-release-notes-22.1r1/topics/new-features/mx-new-features-22.1r1.html
Nope, clicking dozens of times it is

Want the same for 20.4?
https://www.juniper.net/documentation/en_US/junos/information-products/topic-collections/release-notes/20.4/topic-150554.html#jd0e7524
Just scroll (or ctrl+f)

if i want a PDF i can click the button in the top right (as long as it 
is still there).


regards
Tobias

Am 18.03.2024 um 16:59 schrieb Michael Hare via juniper-nsp:

TLDR: Juniper: please keep the PDFs.  I like control-F.

I may need a lesson in remedial use of browsers, but I find the PDFs useful and 
I don't print them.  Do people really have the time to navigate/click on all of 
these hyperlinks, or am I missing an obvious way to control-F the entire 
release notes in the web?
Example:
https://www.juniper.net/documentation/us/en/software/junos/release-notes/22.4/junos-release-notes-22.4r1/index.html

-Michael


-Original Message-
From: juniper-nsp  On Behalf Of
Andrey Kostin via juniper-nsp
Sent: Monday, March 18, 2024 7:37 AM
To: Joe Horton 
Cc: Juniper Nsp 
Subject: Re: [j-nsp] Juniper publishes Release notes as pdf

Thanks, Joe.

Right, pdf only for SR releases has been a while, but not very long, the
change happened just few months ago. My personal preference would be to
read html that can adapt to screen size, etc. Imo the value of pdf is to
be able to print a paper copy, but it's hard to imagine that somebody
would print release notes in the present time.

Kind regards,
Andrey

Joe Horton via juniper-nsp писал(а) 2024-03-15 21:36:

Correct.

SR releases – PDF only, and I think it has been that way a while.
R release – html/web based + PDF

And understand, I’ll pass along the feedback to the docs team.

Joe



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://urldefense.com/v3/__https://puck.nether.net/mailman/listinfo/junip
er-
nsp__;!!Mak6IKo!KwspzhVpA4H07DE07WwOX7O2Mcz02FfnRg1MEuPyGll8k
uhy28xOFgROPz-6ojKOiKfVJ4bNsRh3o85dwy4jnaE8Nzc$

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper QFX5200-32c and QSFP28 channelized optics

2023-12-29 Thread Tobias Heister via juniper-nsp

Hi,

While it sometimes works to let 25G transceivers run at 10G (depending 
on Transceiver and Device(s)) i think in this case you will need a 
different transceiver.


See e.g. HCT for reference: 
https://apps.juniper.net/hct/product/?prd=QFX5200-32C


the PSM only lists 25 and 100 as being supported: 
https://apps.juniper.net/hct/model/?component=JNP-QSFP-100G-PSM4


For 10G SM Breakout something like 
https://apps.juniper.net/hct/model/?component=JNP-QSFP-4X10GE-LR would 
be the way to go.



regards
Tobias

Am 29.12.2023 um 02:38 schrieb Lee Starnes via juniper-nsp:

Hello everyone,

I am running into an issue on our QFX5200 switches where I have installed a
QSFP-100G-PSM4 optic. This can do 1G/10G/25G on the 4 channels. My issue is
that I am not able to get the interfaces to go to 10G even though I have
set them as such.

If setting all 4 channels to 10G only a single interface shows at 100G. If
I set them all to 25G, all 4 show as 25G. Then if I change one of the
channels to 10G, all 4 remain as 25G.

Is this an issue with how I am setting this up or an issue with the type of
Optic being used? Below is the config for the ports in the last state I
tested.

chassis {
 fpc 0 {
 pic 0 {
 port 0 {
 channel-speed 10g;
 }
 port 1 {
 channel-speed 25g;
 }
 port 2 {
 channel-speed 25g;
 }
 port 3 {
 channel-speed 25g;
 }

Thanks for any info or documents you can point me to.

Best,

-Lee
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX304 - Edge Router

2023-10-25 Thread Tobias Heister via juniper-nsp

Am 25.10.2023 um 14:25 schrieb Aaron1:

Years ago I had to get a license to make my 10g interfaces work on my MX104


If we are going into the HW direction and not features. Yes, that is 
correct MX104 had some Port based licensing.


There was also MX5 -> MX10 -> MX40 -> MX80
And some not so enforced things like "only MS-MIC in Slot X" etc. :)

regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX304 - Edge Router

2023-10-25 Thread Tobias Heister via juniper-nsp

Am 25.10.2023 um 11:57 schrieb Xavier Beaudouin via juniper-nsp:

So there are a couple of enforced licenses even on MX ... and they have
always been enforced. Subscriber MGMT is one of these features.


Well I remember wanted to use dhcp server on a MX204 for a local lan used 
only...
for local administrators... that required some license I didn't have

Well this thing was working like a charm on M7i (yeah this is attic I know), and
it never asked me a license for spawning isc-dhcpd ...
So no this is no more "honor based".
They copy the worse part of Cisco with their license mess...


It does not help, but this actually makes sense in a weird way :)

local dhcp server on MX is considered a feature which sources in the 
Subscriber mgmt part of the code and hence depends on the subscriber 
mgmt features i mentioned above. And these were always enforced on MX.


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX304 - Edge Router

2023-10-25 Thread Tobias Heister via juniper-nsp

Am 25.10.2023 um 08:01 schrieb Saku Ytti via juniper-nsp:

On Tue, 24 Oct 2023 at 22:21, Aaron Gould via juniper-nsp
 wrote:


My MX304 trial license expired last night, after rebooting the MX304,
various protocols no longer work.  This seems more than just
honor-based... ospf, ldp, etc, no longer function.  This is new to me;
that Juniper is making protocols and technologies tied to license.  I
need to understand more about this, as I'm considering buying MX304's.


Juniper had assured me multiple times that they strategically have
decided to NEVER do this. That it's an actual decision they've
considered at the highest level, that they will not downgrade devices
in operation. I guess 'reboot' is not in-operation?


I am surprised and it goes against everything i have seen and 
experienced so far on any MX (including MX304).


So there are a couple of enforced licenses even on MX ... and they have 
always been enforced. Subscriber MGMT is one of these features.


Also some form of encryption is typically enforced due to export 
regulations and other silly things. Also the rare use cases where 
external feeds (e.g. for stateful services on services cards) might expire.


That being said, i have not yet seen any expired flex license on any MX 
as we typically play with perpetuals. But not having a license has never 
killed features like Routing Protocols, LDP or similar for me. We run 
the boxes in the lab without licenses regularly (because we are too lazy 
to (re)apply them between tests and/or wipes) including MX304 and Junos 
up to 23.2.


I would be very surprised if there are actually code path that kill 
features in Junos on purpose yet (having seen the quality of the other 
parts of the license parser).


So i would rather suspect some weird combination of misbehaviour and/or 
bug and not an intention to disable stuff for now.


The flex license nagging comes in different stages and intensity 
depending e.g. in HW and sometimes card Generation, which makes license 
mgmt a lot of "fun" in chassis with cards that "need" a license and 
cards that "can have" a license and cards than "do not need" a license 
at all :)


The SE teams (or your partner of choice) have access to the current 
plans of where license nagging and license installation is needed to 
stop the nagging and where it is optional.


I will try to get my hands on a short live trial license to replicate 
that behaviour soonish to look into that now :)


After all ... there is not much that surprise me any more on vendor 
licensing ...


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] CVE-2023-4481

2023-09-17 Thread Tobias Heister via juniper-nsp

Hi,

On 11.09.2023 19:55, Tom Beecher wrote:

Which in theory opens a new attack vector for the future.


What is the attack vector you foresee for a route sitting as hidden with 
the potentially offending attributes stripped off?


It is theoretical, but if you do $something with a prefix and maybe even 
the "malformed" attribute and do not throw the prefix away completely 
$something in parsing and keeping the prefix further down the line could 
stumble over $whatever else makes the prefix special.


This implies "problems"/bugs in the code parsing the prefix and its 
attributes, which can be assumed to not exist, but doing $something is 
more likely to hit a problem than not doing $something.


By keeping the prefix and doing $something with it you do more than 
before and might hit a code path that was not hit before when the 
session was reseted or when the prefixes are just discarded.


In an ideal world where all code and parsing is perfect all is fine.
Do i think this is likely or a real world problem we will hit soon? 
Probably not. Do i think that it is a theoretic vector to hit problems 
not yet seen in the wild at some point? Yes I do.


So, like with all features and knobs, you might want to consider whether 
it brings you any benefit to keep the prefixes in hidden state or 
"minimize" processing of things you will maybe never look at.


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] CVE-2023-4481

2023-08-31 Thread Tobias Heister via juniper-nsp

Hi,

Am 30.08.2023 um 18:09 schrieb heasley via juniper-nsp:

Tue, Aug 29, 2023 at 03:42:41PM -0700, David Sinn via juniper-nsp:

A network I operate is going with:

 bgp-error-tolerance {
 malformed-route-limit 0;
 }

The thoughts being that there is no real reason to retain the malformed route 
and the default of 1000 is arbitrary. We haven't really seen a rash of them, so 
adjusting the logging hasn't proven needed yet.


It does seem arbitrary.  retaining all seems like a better choice,
operationally.  allowing the operator diagnose why a route is missing;
show route  hidden.


Which in theory opens a new attack vector for the future.

As the update is malformed it could do $something to the handling in 
e.g. RPD or other daemons by processing them somehow wrong. By not 
holding or further process any of them that could (maybe, hopefully?) be 
minimized.


Of course proper code and handling of malformed things would be even 
better, but you know ...


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Converting QFX3600 from QF Interconnect to standalone mode

2023-02-07 Thread Tobias Heister via juniper-nsp

Hi,

Its been age since we needed to convert one of them.
AFAIR all 3600 Nodes can be converted. The bigger Interconnect Node had 
no option for that.


They state a couple of warnings and pre requisites in the documentation: 
https://www.juniper.net/documentation/us/en/software/junos/qfx3000-g-deployment/topics/task/device-mode-converting.html


e.g.
"Always convert the device mode to standalone before you remove the 
component from the QFabric system. If you remove the component from the 
QFabric system before converting the device mode to standalone, the 
switch might not operate properly. For example, the output of the show 
chassis hardware command might display no FPCs or interfaces for the 
switch."


Have you tried a complete usb reinstall already? I kind of remember we 
had to completely start from scratch for at least one of the boxes.


regards
Tobias

Am 07.02.2023 um 00:16 schrieb Vincentz Petzholtz via juniper-nsp:

Hi Daniel,

Have you checked IF the device model in question is capable of running in 
"standalone" mode?
As far as I remember there were models which did not support it (especially the 
ones used for IC in a jnp qfabric).

Best regards,
Vincentz
--

Am 04.02.2023 um 23:21 schrieb Daniel Roesen via juniper-nsp 
:

Hi,

just trying to convert a couple of QFX3600 QFabric interconnet nodes to
standalone mode via "request chassis device-mode standalone". They
state "after next boot: standalone", but come up again in QF-IC mode,
still stating "after next boot: standalone".

JUNOS 13.1X50-D15.1

The conversion worked sorta fine with the QFX3500s, but all QFX3600 do
fail...

Anybody got a clue how to beat them into submission?

Best regards,
Daniel

--
CLUE-RIPE -- Jabber: d...@cluenet.de -- dr@IRCnet -- PGP: 0xA85C8AA0
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] polishing an antique m7i

2022-07-08 Thread Tobias Heister via juniper-nsp

Hi,

If you have any active support contract or a contact to an SE person 
they typically can provide access to old and no longer listed releases 
on demand as they do archive them internally. We recently had to request 
some 14.X code for a complicated VC upgrade procedure involving a failed 
member.


Unfortunately the public download section seems to get automatically 
purged every now and than and releases older than X are removed. 
Especially for EOL platforms.


regards
Tobias

Am 07.07.2022 um 21:45 schrieb Randy Bush via juniper-nsp:

- old m7i with RE-B-1800X1-4G-S
- currently running 14.2R7.5
- hard disk dying
- have nice new 1tb sata ssd for it
- juniper support download is pushing 15.1R7.9 at me
- should i worry about increased memory use or license changes in 15?
- if so, where the heck is 14?


If 14 is missing from the repository, then it's probably because it is
EoL.


so is the m7i :)


I can't find 14 for even the MX, so chances are Juniper stopped
maintaining it a while ago. I recall debuting 14 into our network back
in 2014, and it had tons of problems. I'd be surprised if Juniper are
still actively supporting it.


i am not expecting active support of 14 or the m7i.  i am expecting an
archive of historical releases just as application softwares have.


For the M7i, chances are your memory footprint will bulge with 15


exactly my fear.  it was running 14 successfully as the disk drive
failed.  i want to run 14 when the new drive is installed (in the next
day or two).  this seems a reasonable desire.


- and with the support portal rearrangement, i can not find
destructions for making a bootable usb stick from
install-media-15.1R7.dms (on a mac or an rPi, of course:) 


`dd in=Desktop/ISOs/install-media-15.1R7.dms of=/dev/disk6 bs=1m`
resulted in

 ryuu.rg.net:/Users/randy> sudo fdisk /dev/disk6
 Password:
 Disk: /dev/disk6geometry: 979/255/63 [15728640 sectors]
 Signature: 0xAA55
 Starting   Ending
  #: id  cyl  hd sec -  cyl  hd sec [ start -   size]
 
  1: 04  880   0   1 -  879   0   1 [   1893232 -  20480] DOS FAT-16
 *2: A5  680   0   1 -  879   0   1 [   680 -1892552] FreeBSD
  3: 000   0   0 -0   0   0 [ 0 -  0] unused
  4: 000   0   0 -0   0   0 [ 0 -  0] unused

which is somewhat reassuring, though the start/size of #1 is a bit odd

randy
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] FlowSpec rules being installed, but not matching any traffic

2022-04-14 Thread Tobias Heister via juniper-nsp

Hi,

I doubt that BGP Flow Spec is systested or supported on any QFX5k platform.

Feature Explorer (while not perfect :)) does support me in that 
thinking: 
https://apps.juniper.net/feature-explorer/parent-feature-info.html?pFKey=1541=BGP+Flow+Specification


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] what's the difference between vMX and vMX evaluation?

2021-10-22 Thread Tobias Heister via juniper-nsp

Hi,

On 22.10.2021 08:42, Chen Jiang via juniper-nsp wrote:

I see there are 2 download links for vMX, one is vMX, one is  vMX
evaluation.

What's the difference between the two?


On Paper the Eval is for public Evals 
(https://www.juniper.net/us/en/dm/vmx-trial-download.html) and the 
regular Downloads are for the paid version.


Image wise they are the same (down to the md5sum). The eval is quite old 
(18.2) by now and the default eval license you get will only work on the 
"old" image types (up until 19.1) as they changed the license format.


I would anticipate a newer eval version (and license) soon as 18.2 is 
End of Engineering since June and will be end of Support in December.


In the meantime your SE or maybe your VAR should also be able to provide 
newer images and working trial licenses if needed.


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] upgrading an antique 240

2021-07-16 Thread Tobias Heister via juniper-nsp

Hi,

On 15.07.2021 22:46, Randy Bush via juniper-nsp wrote:

Good point! TSB16735 says last version of Junos to support SCB-MX960 is 16.2


Junos 17.3R3-S10
Junos 18.4R2-S5
Junos 19.3R3-S2
Junos 19.4R3-S3


so which steps to get from 14 to 16.2?  15.x 16.2?


https://support.juniper.net/support/eol/software/junos/
Although the last supported Release is 16.2, you might want to run 
16.1$latest. It feels like 16.2 was intended to be supported longer, but


"16.1R7: EOE extended to 28-Jul-2020 and EOS extended to 28-Jan-2021."

So the "newest" Release is most likely 16.1 as the End of Engineering 
was later and therefore more fixes/changes went into that than into 16.2.


End of Services was extended for 16.2 as well:
"16.2: EOS extended to 01-May-2021 for T4000, TX-3D, MX240/480/960, 
PTX3000 and PTX5000."

But end of engineering was not.

And as we are past both end of services now, it might make more sense to 
stick with the release that got more engineering.


Most of our customers still holding onto RE2000 are on 16.1
Some managed to upgrade successfully even beyond that, but its not 
supported and might create interesting problems. Similar to when RE1300 
was not intended to go past 14.2 but would still run on 15.X an newer 
often :)


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX204 Maximum Packet Rates

2021-05-20 Thread Tobias Heister

Hi,

MX204 has some limitations in terms of pps rates for smaller packet 
sizes if inline-flow is configured compared to e.g. MX10003 not only but 
also related to the pfe/fabric layout (no fabric in 204). So even if 
they are the same pfe they might behave differently.


The details are not public, so you might want to reach out to your 
partner/SE.


regards
Tobias

On 20.05.2021 12:39, Peter Sievers wrote:

Hi Leon,

both MX204 und MX10003/LC2103 use
eagle forwarding ASIC, LC2103 Linecard has 3xASIC,
MX204 has 1xASIC, WAN Output Rate for eagle
pfe is for 100G Interface ~110 MPPS.

Assumption is, that you got the traffic on the
MX10003 over more than one PFE/ASIC incoming.

BR,

.peter

On 20.05.21 11:49, Leon Kramer wrote:

Hello,

during an approximate 240 Mpps / 80 Gbps UDP DDOS attack to one target IP
we have experienced a massive and immediate packet loss at an MX204 
router.


The attack was coming in through MX10003 and MX204. The MX204 was not 
able
to forward more than 120 Mpps during the attack. The MX10003 forwarded 
180

Mpps without any issue.

Both routers are running Juniper 18.4R2-S3. The MX204 has all 4 x 100 
Gbps

interfaces active in use.

Any idea if 120 Mpps for Juniper MX204 is already the hardware 
limitation?

This would equal to only roughly 41 Gbps of the attacks packet size of 43
bytes. We are certain that no policer or firewall filter lead to the 
packet

drops.

Anyone has a recommendation what could be done to increase performance?


Kind Regards
Leon Kramer
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX204 and QSFP+ breakouts

2021-05-01 Thread Tobias Heister

Hi,

On 30.04.2021 23:21, Ross Halliday wrote:

Do FS QSFP+ breakout DACs and AOCs work on this platform? Is there some magic 
sauce firmware I'm too daft to find?



We had some troubles in 40G and 100G DACs on MX204 and MX10003. e.g. 40G 
DAC worked in $old versions and suddenly stopped in $newer versions. It 
seems it stopped working when 100G DAC support was officially 
introduced/supported.


https://apps.juniper.net/hct/product/?prd=MX204
Officially they do not support 40G DAC (regardless of type), but 4x10G 
SR or LR Breakouts are supported and do work in our LAB.


Sometimes it can make a difference whether or not the third party optics 
are coded to the correct SKUs. So it may help to play around with 
different codings, i think FS also offers a Box to change the programming?


Juniper has specific SKUs where they support the 4x10G Breakout (e.g. 
QSFPP-4X10GE-LR and SFPP-4X10GE-SR), but so far Breakout also worked 
fine on other parallel optical transceiver we tried.


regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QSA modules and DDM/DOM readings

2021-03-05 Thread Tobias Heister

Hi,

Am 05.03.2021 um 15:49 schrieb Karl Gerhard:

I tried QSAs from two different vendors but to no avail. I wonder if anyone has 
succeded in getting DDM/DOM readings on a QSA adapter. Is it the QFX5100-48T's 
fault or is it the QSA+SFP Modules that are at fault?


QFX5100 is not listed to officially support the QSA: 
https://apps.juniper.net/hct/model/?component=MAM1Q00A-QSA=sPlatforms
Even on QFX5110 it was added as late as 19.4

While the QSA probably did work even before (never tried it in the QFXes) its 
likely that Code for DOM readings and such might not be in there on that 
platforms or in your release.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX204 port 1G

2020-10-09 Thread Tobias Heister

Hi,

Am 09.10.2020 um 13:12 schrieb Łukasz Trąbiński:

In Lab I'm trying to set up 1G port on MX204.


You might need to play around with autoneg options. we have a working 1G LX SFP 
running on 18.4R1-S7 on MX204

in our case thats the gigether section:
gigether-options {
no-flow-control;
no-auto-negotiation;
speed 1g;
}

Not sure if the Flow Control stuff was mandatory, but without the 
no-auto-negotation the link was not useable. It might also help to check 
autoneg settings on the other end (if you have access).

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] How to pick JUNOS Version

2020-08-19 Thread Tobias Heister

Hi,

On 19.08.2020 16:42, Colton Conor wrote:

How do you plan which JUNOS version to deploy on your network? Do you stick
to the KB21476 - JTAC Recommended Junos Software Versions or go a different
route? Some of the JTAC recommended code seems to be very dated, but that
is probably by design for stability.
https://kb.juniper.net/InfoCenter/index?page=content=KB21476=METADATA


just for the record (some of you will already know) ... there is no longer a 
recommended release.
The Article was renamed: "Suggested Releases to Consider and Evaluate"

For any real recommendation you would have to buy a service which analyzes you 
configs and cross checks PRs.

But in reality nothing much has changed, even before the rename the 
recommendation was not very strong anyway, just a general guideline.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] ipfix is not accounting next-ip firewall actions properly

2020-06-24 Thread Tobias Heister

Hi,

On 24.06.2020 12:28, Marcel Bößendörfer wrote:

*Issue: *However, IPFIX is not considering the next-ip, instead it's acting
like the next-ip would not exist at all. That means, traffic from
192.168.0.2 is reported to be egressing multiple interfaces like the router
would handle it without the next-ip rule. So it seems that the sampling is
taking place before the firewall rule is applied. This is a very unexpected
behaviour. In reality traffic from that source IP is only egressing the
interface that's related to 192.168.1.1.


I have seen things like this with Flow Export on MX before. In my case it was filter 
based forwarding towards a different RI with different interfaces for TE purposes. In 
that case the flow export would match the "Original" destination before the FBF 
took place which lead to wrong flow statistics on $collector.

This was years ago and i never checked back on that, seems like the behavior is 
still there.

I kind of remember it happening for flow-spec drop/rate-loimit routes/filters 
as well. So Flow would still report the traffic ingressing the interfaces while 
the filters were already blocking them. Which in the Case of flow-Spec was a 
good thing, because you could keep the announcement active as long as the 
attack lasted.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 upgrade path 18.4R

2020-06-14 Thread Tobias Heister

Hi,

On 14.06.2020 10:50, Robert Hass wrote:

I have old MX80 running 10.4R14.2.
I would like to upgrade it to 18.4R.
But what upgrade I should use ?

10.4R -> 15.1R and to 18.4R ?


There are probably official upgrade pathes taking a dozen intermediate 
steps (three LTS releases at a time or something like that is officially 
supported, and starting from $some version in the 16/17 all releases are 
considered LTS). As The MX80 takes ages to do just one upgrade this 
would take days. Also it could be quite hard to actually get 
intermediate releases for the older steps (JTAC typically has them on 
request)


I would suggest to backup the config do a usb reinstall to the target 
release and reapply the config.


--
regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX routers and DAC cables?

2020-06-12 Thread Tobias Heister

Hi,

On 12.06.2020 20:39, Chris Adams wrote:

Is anybody using DAC cables on MX routers?  We have a customer with an
MX10003 connected to EX4600 switches with 40G DAC cables (Juniper parts,
not third-party).  Upon upgrading the router JUNOS to 18.2R3-S3, none of
the interfaces with a DAC cable would come up on the router end.

JTAC's response was that no DAC cables are supported on any MX routers.

That seems a little odd to me... I thought DAC cables are a part of the
various specs, so saying they're not supported is saying those aren't
actually Ethernet ports to me.


DAC and AOC are transceivers, and officially only a specific set of 
transceivers are supported per platform.


For MX10003 you can check here: 
https://apps.juniper.net/hct/product/#prd=MX10003


There are 40GE AOC supported for that box, but not 40GE DAC. For 100GE 
DAC are actually supported in later Junos version.


That being said typically DAC worked in MX for 10G and even 40G on most 
noxes, but on MX10003 we had a lot of problems with 40G DACs and 
eventually replaced most/all of of them with optical transceivers.


Even on 100GE you might need to set the FEC config depending on what and 
where you connect the other DAC end.


While 10G mostly worked everywhere we had a fair share of trouble on 40 
and 100GE on various vendors and platforms.


--
regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SNMP very slow on MX10003

2020-05-25 Thread Tobias Heister

Hi,

On 25.05.2020 18:25, Leon Kramer wrote:

If you think that SNMP is too slow, what alternative can you recommend
for fetching interface counters?


Probably the canonical answer these days is streaming telemetry which can be 
done directly from the PFE for a lot of counters.

In a former life when SNMP got too slow we sometimes switches to screenscraping 
"show interfaces | display XML" via SSH/netconf. But this would only help if 
the data itself is presented fast enough. We had boxes where presenting thh data itself 
towards the cli/SNMP agent was the bottleneck so the method of pulling it made no 
difference.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Rate selectability on MPC7E-MRATE

2020-05-06 Thread Tobias Heister

Hi,

On 06.05.2020 20:15, Vincentz Petzholtz wrote:

That’s not true and you sad it yourself. You have 240G per PIC.
With 2x100G ports enabled you can still set one remaining port to 40G on the 
same pic.
And it also works just fine.


Which part of my last mail is not true? Maybe i did not make myself clear 
enough?

If you configure the PIC in per port mode/level, you can different modes per 
port and hence have 2x100GE and 1x40/4x10GE on the same PIC. See the first part 
of my last mail.
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/rate-selectability-configuring.html#id-configuring-rate-selectability-at-port-level

If you configure the PIC in PIC speed mode/level 100GE you will only have 
2x100GE and nothing else per pic, as described in the second part of my last 
mail
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/rate-selectability-configuring.html#id-configuring-rate-selectability-at-pic-level

The later could make sense if you use e.g. SCBE2 and want 2+1/1+1 mode and not 3+0/2+0 to 
reduce the level of card to fabric/slot "oversub"as you only get up to 480G per 
Slot on that SCBE2 if all boards are active at the same time.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Rate selectability on MPC7E-MRATE

2020-05-06 Thread Tobias Heister

On 06.05.2020 18:24, Brian Johnson wrote:

A wise man once told me… “Just because you can do something, doesn’t mean you 
should”. More specific, “Just because you can do it in the Junos config, 
doesn’t mean it’s supported.” Junipers licensing “honor system” required 
honorable intentions. ;)


I would say it is supported. Even the documentation has an example where one 
port of the group is 100GE and two others are 10GE:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/rate-selectability-configuring.html#id-configuring-rate-selectability-at-port-level

Also with MPC7 its not like its honor based to only use 240G per PFE ... its a 
hard limit ;)

If you run in PIC Mode with 100GE set, than in deed the other ports are 
disabled:
"For example, if you choose to configure PIC 0 at 100-Gbps speed, only ports 2 and 5 
of PIC 0 operate at 100-Gbps speed, while the other ports of the PIC are disabled."
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/rate-selectability-configuring.html#id-configuring-rate-selectability-on-mpc7e-multi-rate-to-enable-different-port-speeds

I mean what else should it do, there are only two 100GE Ports per PFE anyway ;)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Rate selectability on MPC7E-MRATE

2020-05-06 Thread Tobias Heister

Hi,

On 06.05.2020 18:03, Chris Wopat wrote:

On Wed, May 6, 2020 at 9:41 AM Brian Johnson  wrote:


So you have a 4x10G breakout and a 100G QSFP28 in the same group of 3 
interfaces and they are all working? Just because I can install and configure 
the optics, doesn’t mean they will function. This would conflict with what is 
coming from Juniper Product teams.

To be clear, I realize that the ports do not “disappear” because you insert the 
QSP28 into the port group, just that they will not work. :)


We've been this with MPC7s, works fine. You can squeeze the 240g out
of each PIC just fine, you simply cannot oversub.

 fpc 7 {
 pic 0 {
 port 2 {
 speed 100g;
 }
 port 4 {
 speed 10g;
 }
 port 5 {
 speed 100g;
 }
 }
 }

ports 4 and 5 in same 'group of 3', et-7/05 up at 100g and
xe-7/0/4:[0-3] up at 10g.


I always wondered whether there is an explicit knob to disable a port in order 
to prevent accidental wrong configs or transceivers inserts down the road. Of 
course you can annotate the existing ports or the pic, but besides that. Also 
what happens if somebody plugs in a transceiver into any of the remaining 
ports? Will the setup just fall apart?

You have 6 Ports per PFE and if you do 100GE on two of them you will end up with 
something similar to the above config (you can choose whether to do 40 or 10GE on one of 
the ports).  Which leaves three interfaces unconfigured or not listed in the config. In 
fact whenever one port is configured to 100G you will "loose" at least one of 
the ports and have to leave it not listed in config for things to work.

If at some point in the future somebody configures any of the remaining ports 
for an invalid  speed it will not work. Even worse default mode for MPC7E-MRATE 
is to fallback to 10GE Mode on all ports on invalid config which could kill 
your 100GE production ports. Luckily you have to bounce the PFE for speed 
changes, which could be even worse if your wrong config hits you during your 
next reboot if you do not mind the alarms ;)

"If rate selectability is not configured or if invalid port speeds are configured, 
each port operates as four 10-Gigabit Ethernet interface"
"When you change an existing port speed configuration at the port level, you must 
reset the MPC7E-MRATE PIC for the configuration to take effect. An alarm is generated 
indicating the change in port speed configuration."

https://www.juniper.net/documentation/en_US/junos/topics/topic-map/rate-selectability-configuring.html

So it would be great to have a config option to explicitly disable specific 
ports and not just leave them unconfigured. Of course you can also misconfigure 
any of the disabled ports into a unsupported speed combo, but it would be a bit 
more visible that they are disabled by intention.

You probably could configure all ports and literally "deactivate" the configs 
that you do not want to be enabled and annotate that, but it feels a bit clunky.

Especially on boxes like MX204 and MX10003 we would always explicitly configure 
the ports into a valid config combination to prevent somebody from putting in 
transceivers and the box trying to be smart and mess up your ports. I think you 
cannot easily do that on the MPC7

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Managing MX480 fxp0

2019-11-23 Thread Tobias Heister

Hi,

On 22.11.2019 19:48, Dave Bell wrote:

This is definitely not possible. You can’t jump from the data plane out of
the fxp port. This is why things like jflow are only possible inband


The official statement is that it is neither possible nor supported. It was 
even highly marketed as separation in the earlier days.
But i have seen a couple of occurrences (including a network crippling looping 
and therefore amplification of traffic e.g. back in the M5i days) where some 
traffic leaked from fxp0 to data plane and/or vice versa.

Even if it would work you would not want it as the CP/DP link is pretty "slow" 
and already tasked with lots of other things which it struggles with at times ;)

--
regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Ramp up old MX480

2019-08-28 Thread Tobias Heister

On 28.08.2019 17:10, Brian Johnson wrote:

Do you know if you have the enhanced mid-plane? If not, it’s a chassis upgrade 
to install MPC3 or better line cards.


There is no need to upgrade the chassis even with old midplane. The worst you 
get is performance impact on MPC4/5E on SCBE2 or MPC10E on SCBE2/3.
All MPCs will work on old midplane (some with reduced capacity)

MPC7E and the already proposed 16 Port 10GE MPC (technically a quad MPC2 trio 
cramped into one card) work fine on the old mid-plane.

You will loose support for some linecards when upgrading fabrics (e.g. no DPC 
from SCBE2 onward, and no MPC1/2E(non NG) from SCBE3 onward)

If you only need some 10GE Ports you could just use the 16 Port 10GE Cards with 
the existing SCB and deactivate/use 8 of the ports. The cards are probably 
cheap enough on the second hand market to justify it.
If you can get used SCBEs you can go up to 12 Ports (1+1 fabrics) or 16 Ports 
(2+0 fabrics) if memory serves well.

For new cards cheapest per port price typically comes from MPC7E ... but 
overall costs depend on target number of 10GEs.
Cooling/Filter and Power supplies will need upgrading as already mentioned from 
others.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] rib-groups && VPN reflection

2019-04-18 Thread Tobias Heister

Hi,

On 18.04.2019 10:13, Adam Chappell wrote:

But the abstraction seems to be incomplete. The method of copying routes to
bgp.l3vpn.0 is similar if not identical, under-the-hood, to the initial
rib-group operation I am performing at route source to leak the original
inet.0 route and this route, as seen in the VRF.inet.0 table, becomes a
Secondary route.

As such, it apparently isn't candidate for further cloning/copying into
bgp.l3vpn.0, and as a consequence the "leaked" route doesn't actually make
it into the VPN tables of other PEs.


Yes, L3VPN under the hood is more or less rib-groups in disguise. There is 
actually a command i forgot which shows you the internal rib-groups it uses to 
do the L3VPN magic.


My question to others is, is this a well-known man-trap that I am naively
unaware of?  Is it simply the case that best practice to get reflection off
of production VRF-hosting PEs is actually mandatory here, or are others
surprised by this apparent feature clash?  Can I reasonably expect it to be
addressed further down the software road?  Or is there another, perhaps
better, way of achieving my objective?


This behavior is probably deeply rooted in the architecture, so i would not 
expect it to change.

I faced the same issue when building a DDoS Mitigation ON/OFF Ramp setup.

My workaround was to bring up an lt-interface and run a routing protocol 
between VRF and inet.0 announcing all the routes you need.
As i did not want to the actual traffic to forward over that lt interfaces (and 
stealing BW from the PFE) i created a policy to change the next-hop to a 
specific dummy next-hop IP.

That dummy-next-hop IP used next-table XYZ and pointed directly into the table 
i wanted. Once the routes are learned and resolved the Forwarding table points 
directly into the other VRF/Table and i could not see any problems in terms of 
performance or similiar with this.

The setup is running in production for a couple of years now. It is a bit ugly and 
violates the "4am Rule" where any on Call Engineer woken at 4am should 
immediately understand what is going on, but well it is what it is ;)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] fusion QFX5120 and MX204

2019-04-13 Thread Tobias Heister

Hi,

Am 12.04.2019 um 22:10 schrieb Aaron Gould:

Trying to do fusion from MX204 (AD) to QFX5120-48Y-8C (SD). but getting this
message..  "Satellite image not available"

  

Is a QFX5120-48Y-8C capable of being a satellite device in fusion ? 


Not yet. 
https://www.juniper.net/documentation/en_US/junos/topics/concept/fusion-components.html

Fusion PE supports EX4300, QFX5100/5110 and QFX5200

Interesting side Note on QFX5200 being supported as Satellite and my favorite 
Fun Fact on Fusion PE. MX80 is supported as AD and QFX5200 is supported as SAT.
This allows us to build the most useless router in the world with 248x100GE 
Interfaces (31x100GE on 8 QFX5200) + 24x10GE Interfaces (1x100GE broken into 
3x10GE + 1x10GE for AD Connectivity) with a oversubscription factor of at least 
2483:1 per SAT and MX80 control plane. The worst of all worlds!

Similar Math applies to MX104 as AD.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Fusion using vMX and vQFX

2019-04-12 Thread Tobias Heister

Hi,

On 12.04.2019 15:34, Aaron Gould wrote:

Can I do Fusion using vMX and vQFX ?  Will it work?


Leaving aside the use case and what you would actually want/could to do with it 
this will not work.
vQFX is basically QFX10k and QFX10k can not be used as Sat in any Fusion 
deployment (it can be AD in DC flavor).

So even if Fusion would be supported and/or work on vMX (which i doubt) there 
would be no virtual SAT to connect.
Also of course you would need a License for the AD in Fusion PE (which uses MX 
as AD) in order to use it.

Even MX150 (which is vMX on NFX Appliance) is not supported as AD for fusion.

--
regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4600 or QFX5110

2019-03-18 Thread Tobias Heister

Hi,

Am 18.03.2019 um 19:57 schrieb Gert Doering:

On Mon, Mar 18, 2019 at 06:50:26PM +, Giuliano C. Medalha wrote:

EVPN-VXLAN in general is supported using PFL license (QFX) ... that is not too 
much expensive

AFL license will support MPLS (L2circuit) and EVPN MPLS features in some 
platforms ... but is costs more.

https://forums.juniper.net/t5/Enterprise-Cloud-and/Welcome-QFX5120-48Y/ba-p/329900


This is for QFX.

The original question was "what license is needed on EX4600 to get
EVPN with VXLAN"?


You will need the AFL. There is no EFL or PFL for EX4600.

https://www.juniper.net/documentation/en_US/junos/topics/topic-map/understanding_software_licenses.html#jd0e690

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] inline-jflow monitoring

2019-01-02 Thread Tobias Heister

Hi,

On 02.01.2019 13:18, sth...@nethelp.no wrote:

 From 16.1R1 and up you should also configure the ip flow table sizes
as the default is 1024 entries for v4 if I'm not mistaken. Not sure if
this is your current issue but is something to consider as well. Also
check flex-flow-sizing as an option.


Note that changing the flow table sizes has traditionally resulted in
a reboot of the line card.


https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/ipv4-flow-table-size.html

"NOTE: Prior to Junos OS Release 16.1R1 and 15.1F2, any changes in the configured 
size of the flow table initiates an automatic reboot of the FPC, and we recommend that 
you run this command in a maintenance window."

Whatever this means for now ;)
I kind of remember that we changed that without reboot on 16.x and 17.x code on 
some routers.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] inline-jflow monitoring

2019-01-02 Thread Tobias Heister

Hi,

On 02.01.2019 11:49, Saku Ytti wrote:

Trio does IPFIX in HW, it can inspect each and every packet with no
different cost. So if your flow table can survive it, do 1:1 and get
more visibility.


AFAIK not all Trio Generations and variants are able to do 1:1 at Line Rate.
IIRC MPC5E and newer are very close to 1:1 in all scenarios while older 
MPC/TRIO were lower (in the 1:4 - 1:10 range worst case)
I think it was one of the marketed benefits of MPC5 and MPC2/3-NG that they now 
can do 1:1 while the older stuff was not able to do so.

Of course you can argue whether line rate 64k packets are actually a typical 
use case or not ;)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] LSP's with IPV6 on Juniper

2018-08-27 Thread Tobias Heister

Hi,

Am 27.08.2018 um 18:57 schrieb Olivier Benghozi:

An yes, the MPLS control-plane uses only IPv4: (the intercos between routers 
are in IPv4, LDP uses IPv4, IGP uses IPv4, and IPv6 is really announced over 
specific AFI/SAFI (labeled unicast IPv6 for 6PE, VPNv6 for 6VPE) in IPv4 
MP-iBGP sessions ; but it doesn't matter.


There is LDPv6 on Juniper since a couple of releases (i believe 16.x)
https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/configuring-ldp-native-ipv6-support.html

So in theory you could run IPv6 only control Plane (IGP, LDP, BGP) with MPLS 
Data Plane. As there is no 4PE you either need to do v4 in MPLS VPN/VRF or run 
v4 and v6 Control plane in parallel to get v4 across.
There is no v6 RSVP yet, but you might get your TE needs from SR/Spring.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper vs Arista

2018-08-14 Thread Tobias Heister

On 14.08.2018 08:34, Mark Tinka wrote:

On 14/Aug/18 08:26, Gert Doering wrote:


Mailman claims "there isn't yet", but if Jared would add one, I'd
subscribe :-)

https://puck.nether.net/mailman/listinfo/


As would I...


+1


--
regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4200 virtual chassis problem, master going into linecard mode

2018-07-26 Thread Tobias Heister

Hi,

On 26.07.2018 09:06, Victor Sudakov wrote:

I don't like to explain what others say but I think yes. It's been known
behavior since always: in a two-member VC always disable split-detection.
You can google for other threads on this in this list.

It's always been kind of poorly documented. Last time I checked the docs,
instead of just writing clearly that it must be disabled in two-members
mode, they "don't recommend" it with some kind of hand-waving explanation
that if you estimate that the backup RE failure probability is higher that
a split-brain condition blah-blah-blah... Just disable split-detection,
that's it :)


Tomorrow we are planning a lab with and without split-detection. I
hope this solves the issue for us, and if it does, I'm sure to make a
note in my engineering journal.


Yes, no-split-detection did help.


I would like to add to that. My point of view is that you do not always disable 
split-detection in a two member VC.
You can do so if you know what that implies.

The reasoning for the remaining node going into LC mode is that only the 
portions of the VC having the majority of nodes stays up and operational. In a 
two member VC if for whatever reason one of the nodes looses connection to the 
other, we cannot have a majority so both sides go down. Even if it is the only 
node remaining.

But imagine an error scenario where the second node does not crash, but for whatever 
reason both sides stay up, but the connection between them gets lost. With 
split-detection configured, both sides will go down and you have a controlled service 
outage. When no split-detection is configured both sides remain up and you might have 
interesting effects happening in your network with two switches with the same 
configuration and same "identity" being up and forwarding. I have seen that 
happening in DC scenarios doing stp to other devices and it is not pretty!

So always check the implications of what the command are doing. If in your case 
an active/active split scenario (for worst case) works out better than a 
completely offline VC, that is perfectly fine. I have seen lots of scenarios 
where it would not be the expected or wanted behavior. But in my world a VC is 
no real redundancy method it is just stacking-NG for additional ports under one 
MGMT so i would have two VCs if i relay need redundancy in most setups. But 
that is just me ;)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Enhanced MX480 Midplane?

2017-11-16 Thread Tobias Heister

Hi,

Am 16.11.2017 um 10:36 schrieb Sebastian Becker:

this is the information out of the "Juniper Tech Club" in Cologne in June 2016. 
So not only provided to us.
If needed I can verify that with Juniper.


Feel free to do that. My informationen and recent verification from Juniper 
confirm my assumption (hence no speed difference between midplanes for MPC7 and 
only 480G in 3+0)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Enhanced MX480 Midplane?

2017-11-15 Thread Tobias Heister

Hi,

Am 15.11.2017 um 09:13 schrieb Sebastian Becker:

that’s not right. You need to differ between redundancy and non-redundancy-mode:

With Fabric Redundancy in MX960 (SCBEs: 2 active, 1 spare):

Premium2 Chassis (non-enhanced midplane):
MPC5E205G
MPC7E400G

Premium3 Chassis (enhanced midplane):
MPC5E240G
MPC7E480G

In the non-redundant mode (so all three SCBEs are online and active) you will 
not suffer from any limitation as long as all three are online. But if one dies 
you will have the limitations in a Premium2 chassis. So it depends on the model 
you want to use. We need a full redundant switching fabric so we have to 
calculate with these limitations.


At least according to my information there is no difference in enhanced/non 
enhanced for MPC7 on SCBE2 in any MX.
There is no way to get full 480G with 2+1 with SCBE2. You can get 480 in 3+0 
mode. (both on MX960)

The first SCB* with 2+1 and Linerate for MPC7 will be SCBE3.

But hey, your version would make more sense but all my documents and 
information since the release of MPC7 say otherwise.
On the other hand there are not many customers in DE who would/should know 
better :)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Enhanced MX480 Midplane?

2017-11-14 Thread Tobias Heister

Hi,

Am 14.11.2017 um 13:27 schrieb Sebastian Becker:

The enhanced midplane allows you already to use higher bandwidth with redundancy at 
least on the MX960. 205G per slot (not > enhanced) against 240G per slot (enhanced) 
So if you want to use a MPC5E-100G10G and populate every port (2x100G plus 4x10G) > 
you need the enhanced midplane and the SCBE2. Same for the MPC5E-40G10G and the 
Q-Versions of these cards. Otherwise you > overbook the midplane.


Funny enough the MPC7 has no reduced Bandwidth with the non enhanced Midplane, 
so for now only MPC4/5 suffer from that old midplane. I always wondered why 
that is the case. Might be a combination of PFE/Trio Generation and 
frequency/speed per Serdes to Fabric connectivity. If somebody knows the 
details i am eager to know.

We will see what SCBE3 might bring there (other than allowing us to run MPC7 at 
full speed with redundancy and pave the way for future MPC)

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] LACP on mixed virtual chassis QFX5100/EX4300

2015-11-04 Thread Tobias Heister

Hi,

Am 03.11.2015 um 23:23 schrieb ThienDuc Nguyen:

I was trying to create a LACP bundle between two ports : one on a EX4300,
the other on a QFX5100.
Both link have their speed negotiated at 1GE (but the interface name on the
QFX is xe-, I can't force it to ge-, and their are no way to force the
speed on the QFX).
if I set the lacp speed to 1ge, the configuration can't commit because it
sees the QFX interface as a 10G interface...


Is their a special knob to activate it, or I need to create LACP on the
same device family ?  (the version is  14.1X53-D30.3)


From what you wrote i would suspect that you use a QFX5100 copper version?
If they behave anything like the EX45XX Copper Versions the interfaces will 
always be xe- regardless of them being only used with 1GE neighbors. Would be 
funny if the interface name would change when lower speeds are negotiated.

Probably the config parser checks the physical interfaces and finds out that it 
is a 10G interface on QFX and 1G Interface on EX and will not commit as mixed 
speed AEs are only supported in later MX code.

I do not know a way around that and do not have copper QFX at hand to check. 
Probably you will have hit one of these corner case situations that nobody 
thought about and nobody ever encountered and nobody ever asked about (at least 
if you ask jtac :))

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] pfed downward spike received from pfe

2015-03-22 Thread Tobias Heister

Hi,

Am 22.03.2015 um 10:36 schrieb Simon Frerichs:

we see the following error on MX80 running BGP and IS-IS twice a day.
Traffic forwarding seems to be uninterrupted.

pfed: downward spike received from pfe for ibytes_reply:3684981055620
ibytes_record:3684981121451 for ifl:344 loc_id:00010002


https://prsearch.juniper.net/InfoCenter/index?page=prcontentid=PR833091

These downward spike messages are informational and do not indicate that an error 
exists in the router.   The message originates from the router's PFED (packet forwarding 
engine daemon) and indicates that information is being downloaded from a particular 
interface.

Trigger:

This problem will be seen if following condition is met:

* This PFED message is reported when interface statistics received from the PFE are 
smaller than the previously fetched value from PFE (stored in the stats 
database).

Just another Junos log message you could put into your syslog message filter 
which probably already is a mile long.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Merging routes from VRF to inet.0

2015-01-16 Thread Tobias Heister

Hi,

Am 16.01.2015 um 20:49 schrieb Tom Eichhorn:

I have found an answer why my rib-groups and everything is not working:
All fiddling with RIB-groups is for PE-CE, and not for PE-PE.
As the primary route is in bgp.l3vpn.0, I cannot leak from vrf.inet.0, which is 
the secondary table for the route.

(If somebody asks why I can't do the leaking on the CE-PE router - there is 
non. The other side of the
VPN is a contrail controller, which only speaks inet-vpn.).

I also discussed with this my SE, and they didn't had a quick answer but have 
to discuss internally,
but I hope that our community here maybe also has an idea howto leak routes 
received via inet-vpn to inet.0...


From my research there is no way to leak routes that were learned via inet-vpn 
to inet.0 besides running routing protocols between instances.

I did a dirty hack the other day where i needed to move routes from inet.0 to 
vrf.inet.0 and leaking was no option (do not ask) It is the other way around 
from your setup but the concept should be similar.

I configured a static route (e.g. something from the documentation prefix or other 
bogus prefix) with next-table statement (in your case in inet.0 with next-table 
vrf.inet.0), setup BGP via lt- between the instances and used an import policy to change the 
next-hop to point to the prefix of the static route configured earlier. The BGP needs to be 
multihop or to have the accept-remote-nexthop knob configured because the next-hop is 
remote. You will need to be able to match the routes you want to leak/export via policy 
to do so.

This way forwarding is done directly to/from inet.0 (without) using the lt- 
interface and all the bandwidth constraints it suffers. Also 1G tunneling is 
basically always free (on MX) even with DPCs so you will not loose any 
interfaces when activating tunnels.

Maybe you can derive something from that for your setup. This will not work if 
there is already a static route with next table from vrf.inet.0 to inet.0 
because the config parser will deny it for possible loops. But maybe you can 
use rib-groups or other leaking methods for that direction.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 SCB firmware issue

2014-12-23 Thread Tobias Heister

Hi,

Am 23.12.2014 um 23:23 schrieb Dave Peters - Terabit Systems:

1 alarm currently active
Alarm time   Class  Description
2014-12-23 21:50:13 UTC  Major  CB 0 FPGA Revision unsupported

In looking over the Juniper documentation, there's a request system firmware command to 
update the SCB, but unfortunately, I'm not seeing that option (meaning request system ? 
doesn't reveal firmware as a possibility). I'm also not seeing any specific BIOS/firmware files in 
the download section of the Juniper MX Series portion of the Juniper website.


It is a hidden command, so you have to manually complete it. After the firmware 
it starts to auto complete:


request system firmware ?
Possible completions:
  downgrade
  upgrade



request system firmware upgrade ?
Possible completions:
  fpc  Upgrade FPC ROM monitor
  pic  Upgrade PIC firmware
  vcpu Upgrade VCPU ROM monitor


The output above is from an MX240 with SCB.

I have never seen that error showing up but from what i have seen on similar 
situations the firmware should be embedded in junos and the firmware upgrade 
should just work without additional files. But SCB seems not to be a valid 
upgrade target on MX:


request system firmware upgrade scb
error: command is not valid on the mx480


tested on MX480 with SCBE

Would you by any chance have bought SCBE2 (they would probably not been 
available in used condition) instead of SCB. Just asking because SCBE2 is 
supported starting from 13.something and does not work in 12.3

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MPC3E oversubscribe rate with two 10x10GE MICs

2014-11-30 Thread Tobias Heister

Hi,

Am 01.12.2014 um 00:22 schrieb Robert Hass:

I'm currently using MPC3E with one 10x10GE MICs in my MX480 and MX960
routers.

I need to add 10GE ports, if I will put second 10x10GE MIC in existing
MPC3E what will be oversubscribe rate ? I'm not sure but docs says about
200Gbps for MPC3E then It should be wire-speed if docs claims full-duplex
or 1:2 if docs claims half-duplex.


Afaik the MPC3E has one 130G Trio so two 10x10GE will be oversubribed 200:130


What is best solution (from price point of view) to have 16 x 10GE in 1
slot on MX480/MX960 ? MPC3E + 10x10GE MICs or something different ?


The 16x10GE is line rate (with SCBE and higher) there is also the 32x10 MPC4E 
wich is oversubriced 320:260 on SCBE or line rate on SCBE2.
So depending on your SCB and the need for linerate you have several choices.  
Then just do the math and calculate your per 10G oversub/line rate port price.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3 to the rack and L2 services over MPLS

2014-11-30 Thread Tobias Heister

Hi,

Am 27.11.2014 um 08:59 schrieb Sebastian Wiesinger:

Is there any switch in the portfolio that would give you the ability
to do L3 to the rack and still have multipoint L2 services implemented
over it? VPLS or even better EVPN as L2 MPLS service would be
required.

My perfect setup would be: L3 to the rack switch with BGP and MPLS on
top. Then over that implement your standard MPLS services for L2.


EVPN should come to the QFX5100 at some point. So maybe check with your SE 
about a time frame and maybe beta builds.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX IPv6 VRRP

2014-08-13 Thread Tobias Heister

Hi,

Am 12.08.2014 um 23:36 schrieb ashish verma:

/64 is not bad if it solves your problem and I guess most of the people use /64 
as minimum.


It might be really bad using /64 everywhere, for example have a look at
http://inconcepts.biz/~jsw/IPv6_NDP_Exhaustion.pdf

When talking about a security platform where everything is firewalled in the 
first place hopefully it will not come to any NDP actions at all (because the 
firewall killed all the inbound traffic before that), /64s might be a viable 
solution.

But at least IPv6 VRRP (which also uses RAs, at least on Juniper) can work with 
prefixes  /64 and will happily send RAs with smaller prefixes, so in theory 
you should be able to spread your default GW via RAs even with smaller prefixes. 
You will use the SLAAC capabilities, but depending on the deployment scenario it 
might be OK.

That being said, i have no idea whether one can configure RAs on Juniper gear 
(besides from VRRPv6) which uses/announces smaller prefixes than /64.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX5 and MIC 2x10G

2014-08-06 Thread Tobias Heister

Hi,

Am 06.08.2014 um 09:48 schrieb Robert Hass:

Is 2x10G MIC supported in MX5 chassis ?
I just need to have router with 2x10G interfaces, and best choice will be
MX5-T + MIC2x10G for me.


The MX5 supports every MIC (exception the MS-MIC which is only supported in the 
back slot) in its first slot. So yes you can use a 2x10G MIC in the MX5.
There is a table of what is supported on which MX5-MX80 License Level in the 
Data Sheet http://www.juniper.net/us/en/local/pdf/datasheets/1000374-en.pdf

I always think it is amusing that the on Board Ports get enabled after the 
MIC slots are enabled, but thats the way their business goes.

--
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] move routes from VRF to inet.0

2014-02-03 Thread Tobias Heister
Hi,

I am trying to wrap my head around a (seemingly) simple l3VPN Setup with 
internet access. I am labing this up right now and got stuck.

The setup is very simple: 

CE1 -- PE1 -- PE2 -- CE2

We have a l3VPN between CE1 und CE2, routes are exchanged and all routes from 
CE1 are seen by CE2 and vice versa. In this example CE-PE protocol is OSPF, but 
it could be any protocol i guess. We do have a sham-link setup between the PEs, 
so we do not need to redistribute the routes from BGP to OSPF on the PEs. Up to 
here eveything works fine.

We now want to give the customer/VRF access to the internet at PE1. PE1 has a 
full table in inet.0 so we configure a static default route on CE1 pointing to 
table inet.0

static {
route 0.0.0.0/0 next-table inet.0;
}

On CE1 we redistribute that default route to ospf so that CE2 knows how to 
reach the internet
CE2 can see the default route and will route all traffic to CE1

Now we need to let the Internet know how to reach the IPs of CE1 and CE2. 
Lets assume they use public addresses and we do not need to use nat.
We can use rib-groups to move the interfaces routes for CE1 to inet.0 we can 
also use a rib-group under protocols ospf in the routing instance on PE1 to get 
the ospf routes into inet.0

## routing instance ##

routing-options {
interface-routes {
rib-group inet C1-internet;
}
}
protocols {
ospf {
rib-group C1-internet;
export C1-export-default;

}
}

## rib-group

C1-internet {
import-rib [ C1.inet.0 inet.0 ];
}

Afterwards we do have all the routes known via OSPF and all the direct routes 
visible in inet.0
But what about the routes from CE2? They are only know as BGP routes imported 
via the vrf-target configuration.
Is there any way to move these BGP routes to the inet.0 table in PE1?

I have tried a couple of things e.g. auto-export but it seems only to work on 
the OSPF and direct routes, and i already have them covered with the rib-groups 
from above. Simply putting an route with next-table VRF into inet.0 will not 
work because we already have a route pointing back to inet.0 in this table and 
the junos parser will not let that happen.

 error: [rib inet.0 routing-options static]
 next-table may loop

I also tried to find help in the documentation, but it seems that this scenario 
is not covered. I also found a couple of older threads around the internet, but 
none of them really has a solution.

There might be a couple of alternate solutions coming to mind:
1. move all internet Routes to the CE1 table and use static routes to point 
back at the VRF with next-table from inet.0 which will not really scale beyond 
a single l3vpn.
2. use a separate VRF for the internet routes and use auto-export, rib-groups, 
vrf-import/export policy to move routes around. This would need a rework of our 
network and is not really feasible right now.

Do i miss something, like an easy knob? Or am i asking the wrong questions?

-- 
Kind Regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] m10 re-333 latest version of junos

2013-09-10 Thread Tobias Heister
Hi,

Am 10.09.2013 21:49, schrieb N. Max Pierson:
 I have a couple of old m10s with re-333s in them and I would like to
 upgrade them to whatever the last version of Junos code they can run. These
 are lab routers and not production. Can someone point me in the right
 direction? I've seen a few folks say 10.4 will work, but I only see the
 m120, m160, m320 etc on the downloads page. I assume the m120 image would
 work in this case?

We are currently running 10.4 (R9 i should upgrade them) on our lab M5s with 
RE2.0 or RE3.0.

You can use the M-series, MX high end series  T-series Install Package which 
is a universal image for all the m-series devices. In theory newer releases (11 
or even 12) should work as well, but i have not tried it myself. It might be 
they removed support for EOL Hardware somewhere down the line.

Depending on the release you come from you might need/want to use the 
M-series, MX high end series  T-series Install Media if you do not want to 
perform a nearly endless upgrade chain. 

You might need additional compact flash to install the newer releases. We used 
off the shelf cf cards which just worked. If you can find some old memory it 
can be quite handy because the newer releases use lots of memory.

This Router is currently idle with basically factory default configuration
 lab@LR2 show chassis routing-engine
 Routing Engine status:
 Temperature 36 degrees C / 96 degrees F
 CPU temperature 36 degrees C / 96 degrees F
 DRAM   384 MB
 Memory utilization  77 percent
 CPU utilization:
   User   0 percent
   Background 0 percent
   Kernel 1 percent
   Interrupt  0 percent
   Idle  98 percent
 Model  RE-2.0

-- 
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4550 and 3rd Party SFP-1GE-LX

2013-06-06 Thread Tobias Heister
Hi,

Am 06.06.2013 14:30, schrieb Saku Ytti:
 On (2013-06-06 18:40 +0800), Joe Wooller wrote:
 
 This is basically what is happening (i think) the PFE becomes unusable until 
 you reboot. Is there a way to see what ports are on what PFE?
 
 I'm not familiar with EX4550, I would expect it's single PFE.

EX4550 seems to have single PFE as indicated by a show virtual-chassis 
protocol database which only lists one LSP.

An EX4200 on the other hand has 3 PFEs which is reflected by the 
virtual-chassis protocol database listing 3 LSPs and is also mentioned in a 
couple of documents (e.g. the Reynolds switching
book)

regards
Tobias




___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Am I carrying this route or not ?

2013-03-24 Thread Tobias Heister
Hi All,

Am 24.03.2013 00:26, schrieb Jeff Wheeler:
 Whoever that person is that said something about use next-hop-self
 in this context, either you misunderstood them, or you shouldn't
 listen to them anymore.  That has nothing to do with looking to see if
 your router knows about a route.

This sounds like the OP wants to help the cloudfare guys who send the following 
mail to DECIX/AMSIX (and probably other IX) yesterday.

 We're currently seeing a very large attack directed to our IP on AMS-IX (X). 
 
 We request that all peers:
 
 1) Don't carry this route (X/22) in your backbone. (you can set 
 next-hop-self, etc). It'll save other security concerns and possible free 
 transit you're giving away to others.
 2) Filter any traffic within to the AMS-IX exchange fabric (again, X/22), 
 except for your point to [multi]point BGP communications.

-- 
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SNMP ifIndex 0 on MX after ISSU

2013-03-08 Thread Tobias Heister
Hi,

Am 08.03.2013 16:33, schrieb Jonas Frey (Probe Networks):
 did anyone ever notice problems with wrong/changed SNMP ifIndex settings
 after ISSU?
 We ISSU upgraded a MX from 10.4R9.2 to 11.4R7.5 and after this some of
 the ifIndex changed.

We had that a couple of time with the MX series (with and without ISSU), the 
last time it happened from 9.6RX to 10.4RX on a couple of systems.
We will soon go from 10.4RX to 11.4RX so i am expecting it to happen again.

 How do i get the ifIndex right? The workaround for EX doesnt help as
 there is no such process to restart on MX series.

I am not aware of a way to fix that. We usually have to fix it in our NMS, 
which is really annoying every time it happens.

regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX Switch Question

2013-01-10 Thread Tobias Heister
Hi,

Am 10.01.2013 14:03, schrieb Paul Stewart:
 Per port ingress and egress bandwidth control (rate limiting with burst)
 
 Per VLAN ingress and egress bandwidth control (rate limiting on a per VLAN
 basis with burst)

As you mentioned this could be the problem or showstopper.
We have not yet found an EX platform (tried 2200/3200/4200/4500/8200) which 
supported policing on egress (using Firewall filters and policing, never tried 
using QoS)

Just tested it on en EX8216 running 10.4R9
Referenced filter 'test123' can not be used as policer not supported on egress

I do not know if this is a hardware or software problem and if it may be solved 
in later releases (if software problem). The latest code we run is 11.4R1 on 
EX2200/3200/4200/4500 and there
it is not possible. I kind of remember it being a hardware problem but i am not 
sure.

We would have a couple use cases for this feature too so we would be interested 
in any findings.

regards
Tobias


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Strange ARP issue on M7i

2012-08-14 Thread Tobias Heister
Hi

Am 14.08.2012 15:12, schrieb Markus:
 Isn't that weird? Where did that arp entry come from and why was it saved on 
 the Juniper for so long, and only got removed after I removed the static 
 routing of that /24?

We saw a similar thing a short time ago on an MX480 running 10.4R9
In our case it was a bgp route pointing to a no longer existing ip address as 
the next-hop. The arp entry for this ip address stayed active as long as there 
was an active route for it.
Even clearing the arp cache witch clear arp hostname x.x.x.x did not do the 
trick. The next-hop ip was gone for several weeks and the arp entry had low 
timeout values left but never expired.
After clearing the route the arp entry vanished as expected.

I guess something keeps the arp entry from being deleted as long as there are 
or were forwarding entries in the fib for it at any time.

-- 
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Strange ARP issue on M7i

2012-08-14 Thread Tobias Heister
Hi,

Am 14.08.2012 22:09, schrieb Jonathan Lassoff:
 A dynamic routing protocol and BFD would be see this right away and
 move traffic, but this would break any static routes that rely on any
 dynamism with ARP and next-hops.
 
 Moral of the story, as I see it: avoid static routing.

At least in our case it was a bgp route with a third-party next-hop (server) 
living on a connected LAN segment.
So we could not be saved by BFD in this case, but i admit its a special setup.

But it is funny that this behavior is present across platforms (M7i to MX with 
DPC) and junos versions (from 8.0 to 10.4) but this of course may have been 
coincidence.

-- 
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 6PE and BGP signaled lsps

2012-07-30 Thread Tobias Heister
-group {
inet interfaces;
inet6 v6-interfaces;
}
}
rib-groups {
interfaces {
import-rib [ inet.0 inet.3 ];
import-policy only-lo;
}
v6-interfaces {
import-rib [ inet6.0 inet6.3 ];
import-policy only-lo;
}
}


##R3

#bgp
group ibgp {
type internal;
local-address R3
family inet {
unicast;
labeled-unicast {
rib {
inet.3;
}
}
}
family inet6 {
unicast;
labeled-unicast {
rib {
inet.3;
}
explicit-null;
}
}
export nhs;
cluster R3
neighbor R1
neighbor R5
}
}

#policy

policy-statement nhs {
term one {
from {
rib inet.3;
route-filter 0.0.0.0/0 prefix-length-range /32-/32;
}
then {
next-hop self;
accept;
}
}
term two {
from {
rib inet6.3;
route-filter ::/0 prefix-length-range /128-/128;
}
then {
next-hop self;
accept;
}
}
}

##R2/R4

only mpls + igp config no need to add anything ipv6 or bgp related

[1] http://www.juniper.net/us/en/local/pdf/design-guides/8020013-en.pdf

-- 
Kind Regards
Tobias Heister
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 6PE and BGP signaled lsps

2012-07-24 Thread Tobias Heister
Am 24.07.2012 07:21, schrieb Antti Ristimäki:
 On 2012-07-23 16:22, Tobias Heister wrote:
 The document about scaling with labeled bgp [2] has a section about 6PE but 
 it does not help much. First of all the method explained to get interface 
 routes to inet6.3 does not work (at
 least on 10.4R9 but I figured out the correct way myself) and then when I 
 try to follow the instructions and assign a ipv6 loopback manually and try 
 to advertise it via family inet6
 labeled-unicast rib inet6.3 I get the following commit error: BGP: ribgroup 
 inet6.3 is not defined for this address family and nlri
 
 Have you tried to configure a named rib-group where you specify inet6.3 as an 
 import RIB?

If I understood you correctly you want me to do something like this:

show routing-options rib-groups 6PE
import-rib inet6.3;

show protocols bgp group XXX family inet6
labeled-unicast {
rib-group 6PE;
explicit-null;
}

Unfortunately this gives a similar error: BGP: ribgroup 6PE: inet6.3 not a 
valid primary rib for this nlri.

What is funny too is that the document about scaling with labeled bgp [1] does 
not mention the explicit-null parameter in the family inet6- labeled-unicast.
But when removing it the router says: Missing mandatory statement: 
'explicit-null' Also it states the parameter under labeled-unicast is rib and 
not rib-group
I am starting to believe that this guide is for different JunOS Version where 
they have changed the syntax and behaviour.

[1] http://www.juniper.net/us/en/local/pdf/design-guides/8020013-en.pdf

regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] 6PE and BGP signaled lsps

2012-07-23 Thread Tobias Heister
Dear All,

I am trying to wrap my head around this for some days now and it seems I am 
stuck. Sorry for the lengthy post, bit I tried to give as much information as 
possible.
I have 6 routers setup like this, currently all are logical-systems on a 
MX80-48T running 10.4R9 in our lab.

  /--- 9 --- 8 --- \
10 | |  5
  \--- 3 --- 4 --- /

all routers in the same AS, the IGP is ISIS with a single level2, all loopbacks 
visible on all routers via ISIS
routers 4, 8 and 5 are setup with a ldp lsp full mesh
routers 10, 9, 3, 4, 8 are setup with a rsvp lsp full mesh

The goal is to use labeled BGP to get a lsp up between routers 5 and 10 to use 
for services ( 6PE, inet-vpn etc.) as we are not allowed to extend neither the 
ldp nor the rsvp area to the other routers.

What I have done so far:
routers 4 and 8 are route reflectors for family inet unicast, family inet 
labeled-unicast and family inet6 labeled-unicast
routers 5 and 10 are configured like this:

## routing-options:
interface-routes {
rib-group inet interfaces;
}
rib-groups {
interfaces {
import-rib [ inet.0 inet.3 ];
import-policy only-lo;
}
}

## bgp:
type internal;
local-address 5/10
import prefer-inet3-bgp;
family inet {
unicast;
labeled-unicast {
rib {
inet.3;
}
}
}
family inet6 {
labeled-unicast {
explicit-null;
}
}
export export-inet3-lo
neighbor 4
neighbor 8

## policy
policy-statement only-lo:
term one {
from interface lo0.10;
then accept;
}
term two {
to rib inet.3;
then reject;
}
term three {
to rib inet.0;
then accept;
}

policy-statement prefer-inet3-bgp:
from {
protocol bgp;
rib inet.3;
route-filter 0.0.0.0/0 prefix-length-range /32-/32;
}
then {
preference 9;
accept;
}

policy-statement export-inet3-lo:
from {
protocol direct;
route-filter 0.0.0.0/0 prefix-length-range /32-/32;
}
then accept;

routers 4 and 8 are setup like this:

## bgp:
type internal;
local-address 4/8
family inet {
unicast;
labeled-unicast {
rib {
inet.3;
}
}
}
family inet6 {
labeled-unicast {
explicit-null;
}
}
export export-agg;
cluster 4/8
neighbor 10
neighbor 9
neighbor 3
neighbor 5

## policy
relevant term from policy-statement export-agg
term inet3 {
from {
protocol bgp;
rib inet.3;
route-filter 0.0.0.0/0 prefix-length-range /32-/32;
}
then {
next-hop self;
}
}

As far is I understand everything is fine. I have lsps (or at least routes in 
inet.3) to each other on routers 5 and 10

inet.3 on router 5
10.0.10.10/32  *[BGP/9] 1d 08:08:26, localpref 100, from 10.0.10.4
  AS path: I
 to 10.0.4.1 via ge-1/0/3.110, Push 300752
[BGP/9] 1d 08:08:27, localpref 100, from 10.0.10.8
  AS path: I
 to 10.0.4.13 via ge-1/0/3.107, Push 300272

inet.3 on router 10
10.0.10.5/32   *[BGP/9] 1d 03:02:33, localpref 100, from 10.0.10.4
  AS path: I
 to 10.0.0.6 via ge-1/0/4.101, label-switched-path R4
[BGP/9] 1d 03:02:33, localpref 100, from 10.0.10.8
  AS path: I

forwarding for example from router 5 to a bgp prefix learned from router 10 
uses this lsp and the labels show up in a traceroute just fine.
both lsps are going via router 4 (which as far as i understand) is normal in 
this setup

now I want to use this lsp for 6PE and turned on ipv6-tunneling under protocols 
mpls on both routers. family inet6 labled-unicast on the Route reflectors is 
already in place (see above)
family inet6 on all core facing interfaces is also configured. Everything is as 
expected for all the lsps inside the rsvp area and as well for all lsps inside 
the ldp area. I have entries in the inet6.3 table (for the mapped v4 address) 
and IPv6 Traffic is passing fine.

for example inet6.3 on R10
:::10.0.10.3/128
   *[RSVP/7/1] 1d 10:08:33, metric 10
 to 10.0.0.6 via ge-1/0/4.101, label-switched-path R3

Unfortunately the lsp (or better said the mapped address) signaled via bgp does 
not show up in table inet6.3

I have read a bunch of documentation the last days and have not found a lot of 
help for this situation. The 6PE Feature Guide [1] says This feature can be 
implemented with label-switched paths (LSPs) using the Label Distribution 
Protocol (LDP) or Resource Reservation Protocol (RSVP). I am not quite sure if 
this means that it only can work with ldp/rsvp or if this is just a lack in 
documentation.

The document about scaling with labeled bgp [2] has a section about 6PE but it 
does not help much. First of all the method explained to get interface routes 
to inet6.3 does not work (at least on 10.4R9 but I figured out the correct way 
myself) and then when I try to follow the instructions and assign a ipv6 
loopback manually 

Re: [j-nsp] 6PE and BGP signaled lsps

2012-07-23 Thread Tobias Heister
Am 23.07.2012 16:14, schrieb Per Granath:
 Is there any reason why you are not running LDP-tunneling to/from R4/R8 and 
 R10?

This woule be a viable solution, but as mentioned per definition it is not 
allowed (or for a better term wanted) in this scenario to extend ldp beyond 4, 
8 and 5 (not even via rsvp tunneling) routers 9, 3 and 10 are not allowed to 
run ldp on any interface.
In a real world network i would probably consider ldp tunneling but this is 
more a can it be done this way scenario.

regards
Tobias


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 6PE and BGP signaled lsps

2012-07-23 Thread Tobias Heister
Am 23.07.2012 16:28, schrieb Per Granath:
 Am 23.07.2012 16:14, schrieb Per Granath:
 Is there any reason why you are not running LDP-tunneling to/from R4/R8
 and R10?

 This woule be a viable solution, but as mentioned per definition it is not
 allowed (or for a better term wanted) in this scenario to extend ldp beyond
 4, 8 and 5 (not even via rsvp tunneling) routers 9, 3 and 10 are not allowed 
 to
 run ldp on any interface.
 In a real world network i would probably consider ldp tunneling but this is
 more a can it be done this way scenario.

 
 R10 would need to run LDP only on lo0 ...

I know, but in this scenario any interface means any interface including lo0 :) 
or just to put it another way: no ldp process on router 10

regards
Tobias
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp