Re: [j-nsp] best practices for cleaning the router for new deployment

2011-08-21 Thread Chris Kawchuk
I think request system zeroize is what you're looking for.

- Chris.


On 2011-08-22, at 9:45 AM, Martin T wrote:

 What are the best practices for cleaning the router in order to deploy
 it in some other site? I did set system root-authentication
 plain-text-password in order to have some sort of temporary root
 password. Then I set configuration file to defaults using the load
 factory-default. After this I did request system storage cleanup in
 order to delete all the log files and temporary files. How to clear
 show system commit output? Any additional suggestions for cleaning
 the router?
 
 
 regards,
 martin
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] best practices for cleaning the router for new deployment

2011-08-21 Thread Dale Shaw
Hi Martin,

On Mon, Aug 22, 2011 at 9:45 AM, Martin T m4rtn...@gmail.com wrote:

 What are the best practices for cleaning the router in order to deploy
 it in some other site?

We usually go with request system zeroize

cheers,
Dale
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] traffic load balancing between Juniper and Cisco equipment

2011-08-21 Thread Martin T
Is it possible to load-balance traffic between a Juniper M10i and
Cisco 1812 using two different last-mile(ADSL2+) providers? Topology
should be like this:

http://img803.imageshack.us/img803/8766/loadb.png

Idea is to use both ADSL2+ links simultaneously in order to achieve
better speed. In case on of the link fails, the traffic should use the
available ADSL2+ path. Is such load-balancing doable using the Juniper
PE router and Cisco CPE? If yes, what are the optimal/easiest
technologies to achieve the goals I described?


regards,
martin
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] best practices for cleaning the router for new deployment

2011-08-21 Thread Martin T
Chris, Dale:

request system zeroize will according to description Erase all
data, including configuration and log files. Are the files under user
directories in /var/home/ deleted as well? What about users? And am I
correct, that request system zeroize doesn't affect system files- I
mean after executing the zeroize and rebooting the router, it boot's
up nicely with the currently installed JUNOS just all the
configuration, log and temporary files are deleted?


regards,
martin


2011/8/22 Dale Shaw dale.shaw+j-...@gmail.com:
 Hi Martin,

 On Mon, Aug 22, 2011 at 9:45 AM, Martin T m4rtn...@gmail.com wrote:

 What are the best practices for cleaning the router in order to deploy
 it in some other site?

 We usually go with request system zeroize

 cheers,
 Dale

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Single SRX DSCP writing before traffic is encrypted into IPSec

2011-08-21 Thread ben b
Last I heard from JTAC, this was still not available with no ETA.  Even with
several high profile enterprises requesting it.

-Ben

On Wednesday, August 10, 2011, Andrew Jones and...@commitconfirmed.com
wrote:
 Hi,

 I've got an SRX240 runing 10.4R4.5 running at a brach site serving as
 the site gateway and I figure out a way to write DSCP values before
traffic
 is encrypted into an IPSec VPN due to the SRX being the only device at the
 site. The only place I can apply outbound DSCP marking is on the Interface
 that the IPSec VPN lies, since you can't configure dscp rewrites on the
 st0.x interfaces. This works okay since the IPSec packet is marked and
 scheduled correctly, but once the traffic makes it to the other site and
is
 decrypted, the DSCP marking is lost and needs to be re-marked again. It
also
 makes it hard to audit how much traffic is being put into each class when
 doing J-Flow exports, or if certain types of traffic are being marked
 correctly.

 Has anyone else got a similar setup or experienced and fixed this issue?
I'm
 currently terminating VPN's on the physical interface itself, could I
 potentially move this to a vlan.x interface and perform outbound DSCP
 marking there?
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp