Re: [j-nsp] [c-nsp] general question on VRFs and FIBs...

2011-09-27 Thread Derick Winkworth
All:

I actually received quite a few responses off-list to this question.  

We have to deal with many different audit/compliance agencies each with their 
own guidelines. One of their guidelines is that security zones should reside on 
physically separate switches.  However, in an MPLS based on environment they 
allow for VRF/VSI separation on the same physical device.  The reason is that 
each instance has its own RIB and its own FIB structures.  At least, this is 
what I've heard now from multiple auditors over the last 6 or 7 years while 
working for different companies.  

I'm questioning this in general because we are looking at OpenFlow.  In 
particular, the question came up Are separate structures really necessary?  
What if the FIB lookup was entirely hash-based (source-port included) and each 
entry in the hash table had a mask-structure associated with it (for src/dst 
mac and IPs?).    

I previously blogged that a (totally hypothetical) multi-tenant network built 
entirely with PBR or FBF would not pass audit because of a lack of separate RIB 
and separate FIB structures for each tenant in the network.  Why wouldn't this 
pass audit?  OpenFlow is similar.  In this potential OpenFlow design there 
would still be separate VRFs on the controllers, but ultimately the forwarding 
would be compiled into this single hash table structure.  

So I'm questioning a basic assumption here: Are separate FIB structures for 
each VPN required? What I am hearing is mainly ASIC/NPU/FPGA design/performance 
concerns.  Robert expressed some concerns over one VPN potentially impacting 
other VPNs with something like route instability or table corruption of some 
kind.. crashing was the word he used :-).
 
I did spray a few lists with this question, but they are lists where the right 
people generally lurk...

 
Derick Winkworth
CCIE #15672 (RS, SP), JNCIE-M #721
http://packetpushers.net/author/dwinkworth



From: Robert Raszuk rob...@raszuk.net
To: Gert Doering g...@greenie.muc.de
Cc: Derick Winkworth dwinkwo...@att.net; juniper-nsp@puck.nether.net 
juniper-nsp@puck.nether.net; cisco-...@puck.nether.net 
cisco-...@puck.nether.net
Sent: Tuesday, September 27, 2011 3:58 AM
Subject: Re: [c-nsp] general question on VRFs and FIBs...

Hi Gert,

 address first, VRF second.

Well no one sane would do that ;) I believe what Derick was asking was 
why not have incoming_interface/table_id - prefix lookup.

And while in software each VRF has separate RIB and FIB data structures 
for reasons already discussed on L3VPN IETF mailing list in actual 
hardware on a given line card however this may no longer be the case.

Also side note that most vendors still did not implement per 
interface/per vrf MPLS labels (even in control plane) so all labels are 
looked up in a global table with just additional essentially control 
plane driven twicks to protect from malicious attacks in the case of 
CSC/Inter-AS.

Cheers,
R.

 Hi,

 On Mon, Sep 26, 2011 at 01:18:05PM -0700, Derick Winkworth wrote:
 I'm trying to find an archived discussion or presentation discussing
 why exactly the industry generally settled on having a separate
 FIB table for each VRF vs having one FIB table with a column that
 identifies the VRF instance?  I'm not finding it, but I'm guessing
 its because of performance issues?

 Lookup would fail for overlapping address space if you lookup
 address first, VRF second.

 How do you find the right entry if you have

    10.0.0.0/8 vrf red
    10.0.0.0/16 vrf green
    10.0.1.0/24 vrf blue

 and try to look up 10.0.0.1 in vrf red?  You'll find the /24 entry, which
 is tagged vrf blue.

 Alternatively, you'd need to explode the /8 entry for vrf red if *another*
 VRF adds a more specific for that /8.

 gert



 ___
 cisco-nsp mailing list  cisco-...@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] [c-nsp] general question on VRFs and FIBs...

2011-09-27 Thread Robert Raszuk

Hi Derick,

 I previously blogged that a (totally hypothetical) multi-tenant
 network built entirely with PBR or FBF would not pass audit because
 of a lack of separate RIB and separate FIB structures for each tenant
 in the network.  Why wouldn't this pass audit?  OpenFlow is similar.

Well I would like to observe that there may be an easy way to pass the 
audit both in the FBF Junos case as well as OpenFlow.


- For FBF you may easily configure in the shipping boxes multiple VPLS 
instances which are as separate as VRFs. Then FBF can be controlled per 
instance basis (including even identical filters with different actions).


- For OpenFlow is the same thing. OpenFlow capable switch can support 
multiple OpenFlow instances. In fact each such instance can belong to 
different administrative domain and can be controlled by quite different 
set of Openflow controllers. IMHO it is again no worse then VRF like 
separation analogy.


Best,
R.



All:

I actually received quite a few responses off-list to this question.


We have to deal with many different audit/compliance agencies each
with their own guidelines. One of their guidelines is that security
zones should reside on physically separate switches.  However, in an
MPLS based on environment they allow for VRF/VSI separation on the
same physical device.  The reason is that each instance has its own
RIB and its own FIB structures.  At least, this is what I've heard
now from multiple auditors over the last 6 or 7 years while working
for different companies.

I'm questioning this in general because we are looking at OpenFlow.
In particular, the question came up Are separate structures really
necessary?  What if the FIB lookup was entirely hash-based
(source-port included) and each entry in the hash table had a
mask-structure associated with it (for src/dst mac and IPs?).

I previously blogged that a (totally hypothetical) multi-tenant
network built entirely with PBR or FBF would not pass audit because
of a lack of separate RIB and separate FIB structures for each tenant
in the network.  Why wouldn't this pass audit?  OpenFlow is similar.
In this potential OpenFlow design there would still be separate VRFs
on the controllers, but ultimately the forwarding would be compiled
into this single hash table structure.

So I'm questioning a basic assumption here: Are separate FIB
structures for each VPN required? What I am hearing is mainly
ASIC/NPU/FPGA design/performance concerns.  Robert expressed some
concerns over one VPN potentially impacting other VPNs with something
like route instability or table corruption of some kind.. crashing
was the word he used :-).

I did spray a few lists with this question, but they are lists where
the right people generally lurk...


Derick Winkworth CCIE #15672 (RS, SP), JNCIE-M #721
http://packetpushers.net/author/dwinkworth


 From: Robert
Raszukrob...@raszuk.net To: Gert Doeringg...@greenie.muc.de Cc:
Derick Winkworthdwinkwo...@att.net;
juniper-nsp@puck.nether.netjuniper-nsp@puck.nether.net;
cisco-...@puck.nether.netcisco-...@puck.nether.net Sent: Tuesday,
September 27, 2011 3:58 AM Subject: Re: [c-nsp] general question on
VRFs and FIBs...

Hi Gert,


address first, VRF second.


Well no one sane would do that ;) I believe what Derick was asking
was why not have incoming_interface/table_id -  prefix lookup.

And while in software each VRF has separate RIB and FIB data
structures for reasons already discussed on L3VPN IETF mailing list
in actual hardware on a given line card however this may no longer be
the case.

Also side note that most vendors still did not implement per
interface/per vrf MPLS labels (even in control plane) so all labels
are looked up in a global table with just additional essentially
control plane driven twicks to protect from malicious attacks in the
case of CSC/Inter-AS.

Cheers, R.


Hi,

On Mon, Sep 26, 2011 at 01:18:05PM -0700, Derick Winkworth wrote:

I'm trying to find an archived discussion or presentation
discussing why exactly the industry generally settled on having a
separate FIB table for each VRF vs having one FIB table with a
column that identifies the VRF instance?  I'm not finding it, but
I'm guessing its because of performance issues?


Lookup would fail for overlapping address space if you lookup
address first, VRF second.

How do you find the right entry if you have

10.0.0.0/8 vrf red 10.0.0.0/16 vrf green 10.0.1.0/24 vrf blue

and try to look up 10.0.0.1 in vrf red?  You'll find the /24 entry,
which is tagged vrf blue.

Alternatively, you'd need to explode the /8 entry for vrf red if
*another* VRF adds a more specific for that /8.

gert



___ cisco-nsp mailing
list  cisco-...@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp archive at
http://puck.nether.net/pipermail/cisco-nsp/


___
juniper-nsp mailing list juniper-nsp@puck.nether.net

Re: [j-nsp] [c-nsp] general question on VRFs and FIBs...

2011-09-27 Thread Keegan Holley
2011/9/27 Gert Doering g...@greenie.muc.de

 Hi,

 On Mon, Sep 26, 2011 at 01:18:05PM -0700, Derick Winkworth wrote:
  I'm trying to find an archived discussion or presentation discussing
  why exactly the industry generally settled on having a separate
  FIB table for each VRF vs having one FIB table with a column that
  identifies the VRF instance?  I'm not finding it, but I'm guessing
  its because of performance issues?

 Lookup would fail for overlapping address space if you lookup
 address first, VRF second.

 How do you find the right entry if you have

  10.0.0.0/8 vrf red
  10.0.0.0/16 vrf green
  10.0.1.0/24 vrf blue

 and try to look up 10.0.0.1 in vrf red?  You'll find the /24 entry, which
 is tagged vrf blue.

 Alternatively, you'd need to explode the /8 entry for vrf red if *another*
 VRF adds a more specific for that /8.



I'm not claiming to understand why equipment manufacturers chose one method
over another.  However, if the vrf's all have separate tables in the real
world then that should require the table lookup to come before the prefix
lookup.  If not there would be no way to figure out which fib to search.  If
you apply the same logic to routes in the same FIB it works, at least in
theory.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Ethernet switching support across a chassis cluster for the SRX3000 series

2011-09-27 Thread Chen Jiang
No, Ethernet Switching in not supported either in standalone or in cluster
in SRX HE, which include SRX1K/3K/5K.

On Wed, Sep 21, 2011 at 4:21 AM, Morgan McLean wrx...@gmail.com wrote:

 Hi,

 Does anybody know if ethernet switching across a chassis cluster on an
 SRX3600 (with swfab interface etc) is supported like it is on the 240 and
 650 branch models? Juniper has been useless in providing me with an
 answer. I really dislike reth groups and have vlans coming from two core
 switches that the SRX needs to provide L3 gateways for. Using something
 like
 spanning tree would be extremely useful for me.

 As a side question, do I need another SPC and NPC if 10 gig traffic is
 flowing between the two SRX's over the fab or swfab connections? That would
 be another interface and bandwidth to account for...or is that included
 with
 SRX capabilities?

 Thanks!
 Morgan
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp




-- 
BR!



   James Chen
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] [c-nsp] general question on VRFs and FIBs...

2011-09-27 Thread Keegan Holley
 Now in dcef mode
 With a separate FIB+Adjacency tables per vrf
 You could copy only subset of FIB and Adjacency tables to the linecard
 based on which vrfs the interfaces on the particular line-card are asociated
 with
 -to save up some memory
 (than a proces would be needed to request FIB resend from the RP when
 interface on a line-card would be asociated with a new vrf)


This would also work with a single FIB as well as long as the routes were
marked with what vrf they belong in.

Maybe we're missing the obvious.  It's possible that there is no real reason
why it separate FIBs were used.  It's possible that this decision was made
before vrf and L3VPN were common technologies and it was considered safer to
have separate FIBs.  Also, in the event of a forwarding bug or even a
security hole it's alot easier to maintain the integrity of a VRF if it's
forwarding entries are separate from the others.



 adam
 -Original Message-
 From: cisco-nsp-boun...@puck.nether.net [mailto:
 cisco-nsp-boun...@puck.nether.net] On Behalf Of Gert Doering
 Sent: Tuesday, September 27, 2011 9:58 AM
 To: Derick Winkworth
 Cc: juniper-nsp@puck.nether.net; cisco-...@puck.nether.net
 Subject: Re: [c-nsp] general question on VRFs and FIBs...

 Hi,

 On Mon, Sep 26, 2011 at 01:18:05PM -0700, Derick Winkworth wrote:
  I'm trying to find an archived discussion or presentation discussing
  why exactly the industry generally settled on having a separate
  FIB table for each VRF vs having one FIB table with a column that
  identifies the VRF instance?  I'm not finding it, but I'm guessing
  its because of performance issues?

 Lookup would fail for overlapping address space if you lookup
 address first, VRF second.

 How do you find the right entry if you have

  10.0.0.0/8 vrf red
  10.0.0.0/16 vrf green
  10.0.1.0/24 vrf blue

 and try to look up 10.0.0.1 in vrf red?  You'll find the /24 entry, which
 is tagged vrf blue.

 Alternatively, you'd need to explode the /8 entry for vrf red if *another*
 VRF adds a more specific for that /8.

 gert
 --
 USENET is *not* the non-clickable part of WWW!
   //
 www.muc.de/~gert/ http://www.muc.de/%7Egert/
 Gert Doering - Munich, Germany
 g...@greenie.muc.de
 fax: +49-89-35655025
 g...@net.informatik.tu-muenchen.de

 ___
 cisco-nsp mailing list  cisco-...@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] [c-nsp] general question on VRFs and FIBs...

2011-09-27 Thread Robert Raszuk

Hi Keegan,


over another.  However, if the vrf's all have separate tables in the real
world then that should require the table lookup to come before the prefix
lookup.  If not there would be no way to figure out which fib to search.


For packets coming from customer (CE) there is no need for any 
additional lookup as switching vectors of the interfaces 
(logical/physical) are already locked to a given VRF.


/* One exception of the above is Policy Based VRF selection where you 
are choosing VRF dynamically based on preconfigured policy or even 
remote radius lookup. in this configuration interfaces are not bounded 
to any VRF. */


For packets coming from the core to a PE the VPN label directly points 
to the right VRF (per vrf label/aggregate label case). For per CE or per 
prefix labels no IP lookup is necessary in the VRFs at all for packets 
going to the CE.


Thx,
R.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] [c-nsp] general question on VRFs and FIBs...

2011-09-27 Thread Keegan Holley
2011/9/27 Robert Raszuk rob...@raszuk.net

 Hi Keegan,


  over another.  However, if the vrf's all have separate tables in the real
 world then that should require the table lookup to come before the prefix
 lookup.  If not there would be no way to figure out which fib to search.


 For packets coming from customer (CE) there is no need for any additional
 lookup as switching vectors of the interfaces (logical/physical) are already
 locked to a given VRF.

 /* One exception of the above is Policy Based VRF selection where you are
 choosing VRF dynamically based on preconfigured policy or even remote radius
 lookup. in this configuration interfaces are not bounded to any VRF. */

 For packets coming from the core to a PE the VPN label directly points to
 the right VRF (per vrf label/aggregate label case). For per CE or per prefix
 labels no IP lookup is necessary in the VRFs at all for packets going to the
 CE.



I think you misunderstood.  This is all part of the same lookup.  The first
is matched by the interface, the second by policy and the third by mpls
tag.  My point is that it is the same operation across multiple FIBs or a
single FIB.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Ethernet switching support across a chassis cluster for the SRX3000 series

2011-09-27 Thread Morgan McLean
Thanks for the reply, it took JTAC like three days to come up with that
answer. Can you believe it?

Anybody know if this is planned to be supported in the future?

Thanks!
Morgan

On Tue, Sep 27, 2011 at 7:01 AM, Chen Jiang iloveb...@gmail.com wrote:

 No, Ethernet Switching in not supported either in standalone or in cluster
 in SRX HE, which include SRX1K/3K/5K.

 On Wed, Sep 21, 2011 at 4:21 AM, Morgan McLean wrx...@gmail.com wrote:

 Hi,

 Does anybody know if ethernet switching across a chassis cluster on an
 SRX3600 (with swfab interface etc) is supported like it is on the 240 and
 650 branch models? Juniper has been useless in providing me with an
 answer. I really dislike reth groups and have vlans coming from two core
 switches that the SRX needs to provide L3 gateways for. Using something
 like
 spanning tree would be extremely useful for me.

 As a side question, do I need another SPC and NPC if 10 gig traffic is
 flowing between the two SRX's over the fab or swfab connections? That
 would
 be another interface and bandwidth to account for...or is that included
 with
 SRX capabilities?

 Thanks!
 Morgan
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp




 --
 BR!



James Chen

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Installation of jweb on MX80 fails

2011-09-27 Thread Alex D.

Hello,
i have a Juniper MX80 running JUNOS 10.4R6.5. I installed the domestic 
version jinstall-ppc-10.4R6.5-domestic-signed.tgz with ssh daemon. Now i 
tried to install package jweb-10.4R6.5-signed.tgz, but while validation 
i got the following error:


Web management gatekeeper process: mgd: unable to execute 
/usr/sbin/httpd-gk: Bad file descriptor

mgd: error: configuration check-out failed

Is someone here who knows this problem and can give me a hint how to fix it?

Thanks in advance...
Regards,
alex
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] commit action

2011-09-27 Thread Morris McDonald
Hello all,
 
On a J-Series or SRX-3400 if a change is made to the configuration under the 
service and then a commit is executed what is the affect on the other daemons?
Specifically the RPD?    Are the routing tables rebuilt?    Are the sessions 
reset?   
 
Thanks
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Installation of jweb on MX80 fails

2011-09-27 Thread Alex D.

I didn't know that jweb isn't supported on MX80 with JUNOS  11.3/11.4.
I will try it with one of these releases eventually in our test lab.

Thanks for your help.
Regards,
Alex

Am 27.09.2011 21:39, schrieb Kevin Shymkiw:

What if you try 11.3 or 11.4?  I know it wasn't supported in the MX80 until
an 11.x release.

Kevin

On Tue, Sep 27, 2011 at 2:48 PM, Alex D.listensamm...@gmx.de  wrote:


Hello,
i have a Juniper MX80 running JUNOS 10.4R6.5. I installed the domestic
version jinstall-ppc-10.4R6.5-**domestic-signed.tgz with ssh daemon. Now i
tried to install package jweb-10.4R6.5-signed.tgz, but while validation i
got the following error:

Web management gatekeeper process: mgd: unable to execute
/usr/sbin/httpd-gk: Bad file descriptor
mgd: error: configuration check-out failed

Is someone here who knows this problem and can give me a hint how to fix
it?

Thanks in advance...
Regards,
alex
__**_
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/**mailman/listinfo/juniper-nsphttps://puck.nether.net/mailman/listinfo/juniper-nsp





___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Pulse Client Mobile Devices with SRX ?

2011-09-27 Thread Paulhamus, Jon
I've heard from more than one Juniper employee to stay away from any client VPN 
solution on the SRX's -  period - so I've stayed with using Cisco ASA's and 
IPSec or AnyConnect SSL VPN for our deployments.  




From: Chris Gapske [cgap...@paducahpower.com]
Sent: Tuesday, September 27, 2011 9:20 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] Pulse Client Mobile Devices with SRX ?

Sorry Very new at this but I would like to ask for help on an issue.

I am getting conflicting stories on the ability of the SRX.  TAC says they 
cannot get Mobile  Devices such as Android or Idevices to connect with the 
pulse client.
However I have heard reports of people getting there Android devices to work 
can anybody confirm this ?

Thank you .. I am pretty new at the SRX thank you.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Pulse Client Mobile Devices with SRX ?

2011-09-27 Thread Jonathan Lassoff
On Tue, Sep 27, 2011 at 6:20 AM, Chris Gapske cgap...@paducahpower.com wrote:
 Sorry Very new at this but I would like to ask for help on an issue.

 I am getting conflicting stories on the ability of the SRX.  TAC says they 
 cannot get Mobile  Devices such as Android or Idevices to connect with the 
 pulse client.
 However I have heard reports of people getting there Android devices to work 
 can anybody confirm this ?

 Thank you .. I am pretty new at the SRX thank you.

Apparently it is possible to do on some SRX platforms. I've only had
success in terminating mobile clients against the Secure Access
(SA-series) devices running IVE/SSL VPN software.

I found this KB article on doing it. It utilizes the Dynamic VPN
feature. http://kb.juniper.net/InfoCenter/index?page=contentid=KB17641

Beware the Android client though -- as of several months ago, it only
provided a wrapped web browser, rather than real IP tunneling. The iOS
Pulse client does proper tunneling though.

Good luck.

Cheers,
jof

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Pulse Client Mobile Devices with SRX ?

2011-09-27 Thread OBrien, Will
Pulse is ssl. Srx only supports IPSec.
The windows client supports IPSec, so it works.

Will O'Brien

On Sep 27, 2011, at 8:51 AM, Chris Gapske cgap...@paducahpower.com wrote:

 Sorry Very new at this but I would like to ask for help on an issue.
 
 I am getting conflicting stories on the ability of the SRX.  TAC says they 
 cannot get Mobile  Devices such as Android or Idevices to connect with the 
 pulse client.
 However I have heard reports of people getting there Android devices to work 
 can anybody confirm this ?
 
 Thank you .. I am pretty new at the SRX thank you.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Pulse Client Mobile Devices with SRX ?

2011-09-27 Thread Joel jaeggli
On 9/27/11 18:58 , Jonathan Lassoff wrote:
 On Tue, Sep 27, 2011 at 6:20 AM, Chris Gapske cgap...@paducahpower.com 
 wrote:
 Sorry Very new at this but I would like to ask for help on an issue.

 I am getting conflicting stories on the ability of the SRX.  TAC says they 
 cannot get Mobile  Devices such as Android or Idevices to connect with the 
 pulse client.
 However I have heard reports of people getting there Android devices to work 
 can anybody confirm this ?

 Thank you .. I am pretty new at the SRX thank you.
 
 Apparently it is possible to do on some SRX platforms. I've only had
 success in terminating mobile clients against the Secure Access
 (SA-series) devices running IVE/SSL VPN software.
 
 I found this KB article on doing it. It utilizes the Dynamic VPN
 feature. http://kb.juniper.net/InfoCenter/index?page=contentid=KB17641
 
 Beware the Android client though -- as of several months ago, it only
 provided a wrapped web browser, rather than real IP tunneling. The iOS
 Pulse client does proper tunneling though.

2.1 which has been around for a while does support ip tunneling but only
on devices where the end user has root access, which either means you
have developer phones or they've been hacked.

 Good luck.
 
 Cheers,
 jof
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp