[j-nsp] Junos EX - mcsnoopd high cpu

2011-12-22 Thread pkc mls

Hi all,

I have an issue with ex3200 devices on which mcsnoopd consumes a lot of 
cpu.


I'm searching for mcsnoopd info everywhere, but it looks like there is 
not much about this, except message logs.


The ex switches run the latest 10.4 release, and if you have a look at 
the releases notes there are already some fixes relates to mcsnoopd.


question 1 : (maybe silly, but I ask anyway)
Is it possible to stop the mcsnoopd on a device, if there is no 
multicast at all on the network ? (ie the switches are used as regular 
layer 2 switches with vlans).


question 2 :
is it possible to debug mcsnoopd ?

thanks.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Junos EX - mcsnoopd high cpu

2011-12-22 Thread Alex Arseniev

Answer 1:
edit
set system processes multicast-snooping disable
commit

HTH
Rgds
Alex

- Original Message - 
From: pkc mls pkc_...@yahoo.fr

To: juniper-nsp@puck.nether.net
Sent: Thursday, December 22, 2011 8:27 AM
Subject: [j-nsp] Junos EX - mcsnoopd high cpu



Hi all,

I have an issue with ex3200 devices on which mcsnoopd consumes a lot of 
cpu.


I'm searching for mcsnoopd info everywhere, but it looks like there is 
not much about this, except message logs.


The ex switches run the latest 10.4 release, and if you have a look at 
the releases notes there are already some fixes relates to mcsnoopd.


question 1 : (maybe silly, but I ask anyway)
Is it possible to stop the mcsnoopd on a device, if there is no 
multicast at all on the network ? (ie the switches are used as regular 
layer 2 switches with vlans).


question 2 :
is it possible to debug mcsnoopd ?

thanks.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Junos EX - mcsnoopd high cpu

2011-12-22 Thread Diogo Montagner
I think you can check the multicast counters under all interfaces and
see if they are increasing. Maybe someone is sending multicast traffic
and you don't know.

Thanks

On 12/22/11, pkc mls pkc_...@yahoo.fr wrote:
 Hi all,

 I have an issue with ex3200 devices on which mcsnoopd consumes a lot of
 cpu.

 I'm searching for mcsnoopd info everywhere, but it looks like there is
 not much about this, except message logs.

 The ex switches run the latest 10.4 release, and if you have a look at
 the releases notes there are already some fixes relates to mcsnoopd.

 question 1 : (maybe silly, but I ask anyway)
 Is it possible to stop the mcsnoopd on a device, if there is no
 multicast at all on the network ? (ie the switches are used as regular
 layer 2 switches with vlans).

 question 2 :
 is it possible to debug mcsnoopd ?

 thanks.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Sent from my mobile device

./diogo -montagner
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] MX VPLS Trunk with VLAN rewriting

2011-12-22 Thread Sebastian Wiesinger
Hi,

I'm trying to setup a VLPS Trunk (many VLANs - one VPLS instance) on
MX960 (Trio MPC) where each site has different local VLAN-IDs which
should be bridged over VPLS.

Example:

  Site 1   VPLS   Site 2
LAN1: vl100   vl10vl200
LAN2: vl301   vl11vl201


I did the following config:

Site1:
interfaces {
  ae2 {
unit 100 {
  encapsulation vlan-vpls;
  vlan-id 100;
  input-vlan-map {
  swap;
  vlan-id 10;
  }
  output-vlan-map swap;
  }
unit 301 {
  encapsulation vlan-vpls;
  vlan-id 301;
  input-vlan-map {
  swap;
  vlan-id 11;
  }
  output-vlan-map swap;
  }
}

routing-instances {
  test-service {
  instance-type vpls;
  vlan-id all;
  interface ae2.100;
  interface ae2.301;
  vrf-target target:65000:10003;
  protocols {
  vpls {
  no-tunnel-services;
  site local-ce {
  site-identifier 1;
  interface ae2.100;
  interface ae2.301;
  }
  mac-flush {
  any-interface;
  }
  }
  }
  }
}


Site2:

interfaces {
  ae2 {
unit 200 {
  encapsulation vlan-vpls;
  vlan-id 200;
  input-vlan-map {
  swap;
  vlan-id 10;
  }
  output-vlan-map swap;
  }
unit 201 {
  encapsulation vlan-vpls;
  vlan-id 201;
  input-vlan-map {
  swap;
  vlan-id 11;
  }
  output-vlan-map swap;
  }
}

routing-instances {
  test-service {
  instance-type vpls;
  vlan-id all;
  interface ae2.200;
  interface ae2.201;
  vrf-target target:65000:10003;
  protocols {
  vpls {
  no-tunnel-services;
  site local-ce {
  site-identifier 2;
  interface ae2.200;
  interface ae2.201;
  }
  mac-flush {
  any-interface;
  }
  }
  }
  }
}


When I try to commit this config I get an error:

[edit routing-instances test-service interface]
  'ae2.100'
interface with input/output vlan-maps cannot be added to a routing-instance 
with a vlan-id/vlan-tags configured

JunOS version is 11.2R4

When I remove vlan-id all from the VPLS instance the config commits
but no bridge is formed, the clients on each site cannot reach each
other.

Any idea what to do? Our Juniper consultant said it would be possible
to do this.

Regards

Sebastian

-- 
New GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
Old GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Junos 11.2R4.3 on MX

2011-12-22 Thread Sebastian Wiesinger
* Jeff Richmond jeff.richm...@gmail.com [2011-12-21 21:39]:
 Yes, doing a lab eval on it and it has a nasty mibd leak bug.
 Running a daily 11.2 build at the moment that fixes it (precursor to
 R5 coming out in January). So, I would wait for R5 if you plan on
 doing any SNMP work at all on the box. 

Same goes for VPLS, wait for 11.2R5, there is a bug which breaks VPLS
when you change your config.

Regards

Sebastian

-- 
New GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
Old GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX VPLS Trunk with VLAN rewriting

2011-12-22 Thread Derick Winkworth
I don't have the answer immediately for you, so I apologize.

But I wanted to chime in with a THIS IS WHAT I'M TALKING ABOUT comment.  The 
MX is super flexible and has loads of features with respect to 
VLANs/BRIDGING/VPLS/PBB etc, but its confusing as shit and the documentation is 
not the greatest. 

There really ought to be an entire book *just* about this topic.  Written in a 
tutorial fashion.  Covering Q-in-Q, VPLS, PBB, VLAN tag manipulation, bridging 
features, etc.  All on the MX specifically.  It needs to cover the various 
encapsulation types, family bridge, etc.

The MX solution guide isn't making it happen.

Still, I heart the MX immensely.  Especially now that we are finally seeing 
quality code on it...  or better quality code anyway.
 
Derick Winkworth
CCIE #15672 (RS, SP), JNCIE-M #721
http://packetpushers.net/author/dwinkworth/



 From: Sebastian Wiesinger juniper-...@ml.karotte.org
To: Juniper NSP juniper-nsp@puck.nether.net 
Sent: Thursday, December 22, 2011 8:34 AM
Subject: [j-nsp] MX VPLS Trunk with VLAN rewriting
 
Hi,

I'm trying to setup a VLPS Trunk (many VLANs - one VPLS instance) on
MX960 (Trio MPC) where each site has different local VLAN-IDs which
should be bridged over VPLS.

Example:

      Site 1   VPLS   Site 2
LAN1: vl100       vl10        vl200
LAN2: vl301       vl11        vl201


I did the following config:

Site1:
interfaces {
  ae2 {
    unit 100 {
      encapsulation vlan-vpls;
      vlan-id 100;
      input-vlan-map {
          swap;
          vlan-id 10;
      }
      output-vlan-map swap;
  }
    unit 301 {
      encapsulation vlan-vpls;
      vlan-id 301;
      input-vlan-map {
          swap;
          vlan-id 11;
      }
      output-vlan-map swap;
  }
}

routing-instances {
  test-service {
      instance-type vpls;
      vlan-id all;
      interface ae2.100;
      interface ae2.301;
      vrf-target target:65000:10003;
      protocols {
          vpls {
              no-tunnel-services;
              site local-ce {
                  site-identifier 1;
                  interface ae2.100;
                  interface ae2.301;
              }
              mac-flush {
                  any-interface;
              }
          }
      }
  }
}


Site2:

interfaces {
  ae2 {
    unit 200 {
      encapsulation vlan-vpls;
      vlan-id 200;
      input-vlan-map {
          swap;
          vlan-id 10;
      }
      output-vlan-map swap;
  }
    unit 201 {
      encapsulation vlan-vpls;
      vlan-id 201;
      input-vlan-map {
          swap;
          vlan-id 11;
      }
      output-vlan-map swap;
  }
}

routing-instances {
  test-service {
      instance-type vpls;
      vlan-id all;
      interface ae2.200;
      interface ae2.201;
      vrf-target target:65000:10003;
      protocols {
          vpls {
              no-tunnel-services;
              site local-ce {
                  site-identifier 2;
                  interface ae2.200;
                  interface ae2.201;
              }
              mac-flush {
                  any-interface;
              }
          }
      }
  }
}


When I try to commit this config I get an error:

[edit routing-instances test-service interface]
  'ae2.100'
    interface with input/output vlan-maps cannot be added to a routing-instance 
with a vlan-id/vlan-tags configured

JunOS version is 11.2R4

When I remove vlan-id all from the VPLS instance the config commits
but no bridge is formed, the clients on each site cannot reach each
other.

Any idea what to do? Our Juniper consultant said it would be possible
to do this.

Regards

Sebastian

-- 
New GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
Old GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
            -- Terry Pratchett, The Fifth Elephant
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX VPLS Trunk with VLAN rewriting

2011-12-22 Thread Serge Vautour
Hello,

Have you tried building this up from a very simple setup that works and adding 
complexity as you go? I've done something like this with the vlan-id all 
before but not with the VLAN tag manipulations at the same time.

The first thing that looks odd to me is the input-vlan map. Why do you need it? 
Swap on egress should be enough. Another thing I'm not sure about is both 
sub-interfaces in the same site. I'd put them in separate sites. 


Try making this work by using the same VLAN on both ends, then add the VLAN 
manipulation. I've got something that looks almost exactly the same as this in 
my lab and it works:


interfaces {
  ae2 {
    unit 100 {
  encapsulation vlan-vpls;
  vlan-id 100;
  }
    unit 301 {
  encapsulation vlan-vpls;
  vlan-id 301;
  }
}

routing-instances {
  test-service {
  instance-type vpls;
  vlan-id all;
  interface ae2.100;
  interface ae2.301;
  vrf-target target:65000:10003;
  protocols {
  vpls {
  no-tunnel-services;
  site vlan100 {
  site-identifier 1;
  interface ae2.100;
  }
  site vlan301 {
  site-identifier 2;
  interface ae2.301;
  }
  }
  }
  }
}


Use the same config on both ends, update the site-IDs to make all 4 unique.


If you get this working, start adding the egress swap. I am having trouble 
reasoning how it will work. The box needs a way to know what traffic to 
associate to which sub-interface. I don't think it can do that in this case. 


I hope that helps.

Serge





 From: Sebastian Wiesinger juniper-...@ml.karotte.org
To: Juniper NSP juniper-nsp@puck.nether.net 
Sent: Thursday, December 22, 2011 10:34:43 AM
Subject: [j-nsp] MX VPLS Trunk with VLAN rewriting
 
Hi,

I'm trying to setup a VLPS Trunk (many VLANs - one VPLS instance) on
MX960 (Trio MPC) where each site has different local VLAN-IDs which
should be bridged over VPLS.

Example:

      Site 1   VPLS   Site 2
LAN1: vl100       vl10        vl200
LAN2: vl301       vl11        vl201


I did the following config:

Site1:
interfaces {
  ae2 {
    unit 100 {
      encapsulation vlan-vpls;
      vlan-id 100;
      input-vlan-map {
          swap;
          vlan-id 10;
      }
      output-vlan-map swap;
  }
    unit 301 {
      encapsulation vlan-vpls;
      vlan-id 301;
      input-vlan-map {
          swap;
          vlan-id 11;
      }
      output-vlan-map swap;
  }
}

routing-instances {
  test-service {
      instance-type vpls;
      vlan-id all;
      interface ae2.100;
      interface ae2.301;
      vrf-target target:65000:10003;
      protocols {
          vpls {
              no-tunnel-services;
              site local-ce {
                  site-identifier 1;
                  interface ae2.100;
                  interface ae2.301;
              }
              mac-flush {
                  any-interface;
              }
          }
      }
  }
}


Site2:

interfaces {
  ae2 {
    unit 200 {
      encapsulation vlan-vpls;
      vlan-id 200;
      input-vlan-map {
          swap;
          vlan-id 10;
      }
      output-vlan-map swap;
  }
    unit 201 {
      encapsulation vlan-vpls;
      vlan-id 201;
      input-vlan-map {
          swap;
          vlan-id 11;
      }
      output-vlan-map swap;
  }
}

routing-instances {
  test-service {
      instance-type vpls;
      vlan-id all;
      interface ae2.200;
      interface ae2.201;
      vrf-target target:65000:10003;
      protocols {
          vpls {
              no-tunnel-services;
              site local-ce {
                  site-identifier 2;
                  interface ae2.200;
                  interface ae2.201;
              }
              mac-flush {
                  any-interface;
              }
          }
      }
  }
}


When I try to commit this config I get an error:

[edit routing-instances test-service interface]
  'ae2.100'
    interface with input/output vlan-maps cannot be added to a routing-instance 
with a vlan-id/vlan-tags configured

JunOS version is 11.2R4

When I remove vlan-id all from the VPLS instance the config commits
but no bridge is formed, the clients on each site cannot reach each
other.

Any idea what to do? Our Juniper consultant said it would be possible
to do this.

Regards

Sebastian

-- 
New GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
Old GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
            -- Terry Pratchett, The Fifth Elephant
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX VPLS Trunk with VLAN rewriting

2011-12-22 Thread Sebastian Wiesinger
* Serge Vautour sergevaut...@yahoo.ca [2011-12-22 17:28]:
 Hello,
 
 Have you tried building this up from a very simple setup that works
 and adding complexity as you go? I've done something like this with
 the vlan-id all before but not with the VLAN tag manipulations at
 the same time.

Hi,

yes I begun with a simple setup where I just connected two sites with
one vlan on each site and vlan-id none. The VLAN manipulation is the
only thing that doesn't seem to work.


 The first thing that looks odd to me is the input-vlan map. Why do
 you need it? Swap on egress should be enough. Another thing I'm not
 sure about is both sub-interfaces in the same site. I'd put them in
 separate sites. 

I need the input-vlan-map to rewrite the vlan tag so that it is the
same in the vpls instance on both sites.

The subinterfaces are on the same L2 switch, why should I put them in
different sites? What if I have 100 subinterfaces, I can't (or don't
want to) make 100 sites for that on every PE.

 Try making this work by using the same VLAN on both ends, then add
 the VLAN manipulation. I've got something that looks almost exactly
 the same as this in my lab and it works:

If I have the same VLAN on both sites it works, but I don't have that
in the production setup so that's not an option. :(

Regards

Sebastian

-- 
New GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
Old GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Unit ID's and q-in-q

2011-12-22 Thread Benny Amorsen
I am wondering if any of you have suggestions for allocating unit
numbers for q-in-q interfaces on the MX platform.

For plain VLAN's it is quite easy; just use the VLAN as the unit ID.
That does not work for q-in-q because unit numbers are integers. The
obvious solution 1017 for outer 1010 inner 7 does not work either,
as the unit ID seems to be limited to be at most 16384.

Just adding them sequentially is a possibility, but with several hundred
subinterfaces per physical interface it becomes challenging for
operators to find the correct unit ID for a particular VLAN. Perhaps I
will have to add a per-interface unit ID database to our provisioning
system.

Ideas are welcome!


/Benny


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Unit ID's and q-in-q

2011-12-22 Thread Derick Winkworth
Just do it sequentially and then write an op script that takes the vlan(s) as 
an argument to show you the interface info you are looking for...


Sent from Yahoo! Mail on Android

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Policy based (firewall filter) VLAN Tag Manipulation on EX

2011-12-22 Thread Chris Kawchuk
Hey j-nsp Folks,

I'm pretty much at wit's end trying to get policy-based VLAN Tag Manipulation 
working on an EX in a nice/non-convoluted way.

As per JNPR's docs, you can do 1:1 swapping by using the mapping statement 
against an interface in the vlan declaration, in conjunction with declaring 
your interface as access. This works because it dovetails in with the Q-in-Q 
abilities on the EX. ( kb.juniper.net/InfoCenter/index?page=contentid=KB16755 
). Note, you can also 'push' an outer VLAN tag onto an incoming VLAN as well, 
thus making it effectively QinQ; although there's easier ways of accomplishing 
this.

i.e.:

interfaces {
ge-0/0/0 {
mtu 9192;
unit 0 {
family ethernet-switching {
port-mode access;
}
}
}
}

vlans {
customer {
vlan-id 100;
interface {
   ge-0/0/0.0 {
   mapping {
30 {
swap;
}
}
}
   }
   }
}

This successfully makes ge-0/0/0 a trunk port, looking for incoming VLAN 30, 
and translates to VLAN 100 and dumps the frame into my customer VLAN. (and 
vice versa for egress traffic.. it gets re-written as VLAN 30 on egress). 
(Note: you don't actually need to declare 'dot1q-tunneling' in the VLAN 
definition stanza for this to work.. as it's just a straightforward 'swap' as 
per JNPR's own docs).

Caveat:

You need to declare a mapping for every VLAN you want to use on that port 
(since it's basically an access port now).
- You cannot declare the port as being 'trunk', lets say, to allow some 
non-translcated tags to pass, and selectively translate others.
- i.e. I have 200 VLANs on that trunk, and only need to swap one of them, I 
actually have to swap all 200 of them, albeit most of then just 'swap' to the 
same VLAN ID.
- result: Nasty convoluted config to handle 1 vlan translation as an exception.

_

Better way:

So, the JNPR docs mention the ability to do policy-based (i.e. 'firewall 
filter based') translation instead (Of course, no examples given that I could 
see).
( 
http://www.juniper.net/techpubs/en_US/junos10.4/topics/concept/qinq-tunneling-ex-series.html
 ) - See the section on Firewall filters allow you to map an interface to a 
VLAN based on a policy, which requires use of firewall filter to map to a 
VLAN, the vlan option has to be configured as part of the firewall filter and 
the mapping policy option must be specified in the interface configuration for 
each logical interface using the filter.

Which works like this:

interfaces {
ge-0/0/0 {
mtu 9192;
unit 0 {
family ethernet-switching {
port-mode trunk;
vlan {
members [   ];
}
filter {
input vlan-translations;
}
}
}
}

firewall {
family ethernet-switching {
filter vlan-translations {
term map {
from {
dot1q-tag 30;
}
then {
accept;
vlan customer;  // you could also say 'vlan 100' here.. 
either works.
}
}
term accept-all-else {
then {
accept;   // Unless you like black-holing traffic... =) 
 
}
}
}
}
}


vlans {
customer {
vlan-id 100;
interface {
ge-0/0/0.0 {
mapping {
policy;
}
}
dot1q-tunneling;   // this time you need to include it, or it doesn't 
work
}
}
}


So, this method allows you to use, say, vlan  and  as 'normal' trunked 
VLANs, and if the port ever sees VLAN 30 come in, it'll translate it to VLAN 
100. This makes the configuration nice (as you can use a standard trunk port 
now, and just call the input filter to translate the 'exceptions' you need).

This actually works, but alas, it seems to work only in one direction

Result:
- Incoming Tag 30 gets translated to Tag 100. 
- Outgoing Tag 100 stays as Tag 100. (I though the whole point of declaring 
'mapping policy' was to make the EX 'aware' that you needed bi-directional 
translation)
- I assume I'm doing something Just Plain Wrong[tm]... i.e. the EX was never 
meant to do bi-directional translation this way.

tcpdump:

Incoming: Broadcast, ethertype 802.1Q (0x8100), length 46: vlan 30, p 0, 
ethertype ARP, arp who-has 10.102.255.3 tell 10.102.255.1
Outgoing: ethertype 802.1Q (0x8100), length 60: vlan 100, p 0, ethertype ARP, 
arp reply 10.102.255.3 is-at 50:c5:8d:a0:5d:15

Incoming: Broadcast, ethertype 802.1Q (0x8100), length 46: vlan 30, p 0, 
ethertype ARP, arp who-has 10.102.255.3 tell 10.102.255.1
Outgoing: