Re: [j-nsp] M10i

2013-04-11 Thread Per Granath
https://www.juniper.net/techpubs/en_US/release-independent/junos/topics/reference/general/mic-mx-series-supported.html#toc-table-mics-mx80


-Original Message-
From: juniper-nsp-boun...@puck.nether.net 
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of joel jaeggli
Sent: Thursday, April 11, 2013 7:58 AM
To: nsp-juniper
Subject: Re: [j-nsp] M10i

On 4/10/13 5:45 PM, Chris Adams wrote:
 Once upon a time, Correa Adolfo acor...@mcmtelecom.com.mx said:
 I tought MX series were purely ethernet.
 I think that was true initially, but (for example) there are MX5-80 
 MICs to handle circuits from T1 up to OC192.

http://www.juniper.net/us/en/local/pdf/datasheets/1000378-en.pdf
___
juniper-nsp mailing list juniper-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] DDoS protection for J-series and SRX

2013-04-11 Thread James Howlett
Hello,

I have a small network with J6350 as a border router (BGP) and two SRX240H in a 
cluster.
Since few days my network is a victim of DDoS attacks. Majority of them are 
high pps count attacks.
Are there any methods to protect my network against such attacks. My J-series 
can handle quite a lot of pps, but my SRX die after getting more than 8000 new 
sessions per second.

Is there anything i can do here?

Regards,
jim
  
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDoS protection for J-series and SRX

2013-04-11 Thread Mark Menzies
Have a look at the screen options on both kits, we can apply basic DDoS
protection there and limit stuff like max connections over a short period
etc


On 11 April 2013 09:57, James Howlett jim.howl...@outlook.com wrote:

 Hello,

 I have a small network with J6350 as a border router (BGP) and two SRX240H
 in a cluster.
 Since few days my network is a victim of DDoS attacks. Majority of them
 are high pps count attacks.
 Are there any methods to protect my network against such attacks. My
 J-series can handle quite a lot of pps, but my SRX die after getting more
 than 8000 new sessions per second.

 Is there anything i can do here?

 Regards,
 jim

 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDoS protection for J-series and SRX

2013-04-11 Thread James Howlett
Hello,

I think I can't use screen on my J-series in 9.x software / router context.
Will SRX be able to handle it alone?

all best,
jim

Date: Thu, 11 Apr 2013 10:10:18 +0100
Subject: Re: [j-nsp] DDoS protection for J-series and SRX
From: m...@deimark.net
To: jim.howl...@outlook.com
CC: juniper-nsp@puck.nether.net

Have a look at the screen options on both kits, we can apply basic DDoS 
protection there and limit stuff like max connections over a short period etc



On 11 April 2013 09:57, James Howlett jim.howl...@outlook.com wrote:

Hello,



I have a small network with J6350 as a border router (BGP) and two SRX240H in a 
cluster.

Since few days my network is a victim of DDoS attacks. Majority of them are 
high pps count attacks.

Are there any methods to protect my network against such attacks. My J-series 
can handle quite a lot of pps, but my SRX die after getting more than 8000 new 
sessions per second.



Is there anything i can do here?



Regards,

jim



___

juniper-nsp mailing list juniper-nsp@puck.nether.net

https://puck.nether.net/mailman/listinfo/juniper-nsp


  
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDoS protection for J-series and SRX

2013-04-11 Thread Mark Menzies
The SRX definitely supports screen options and you can upgrade the J series
to something newer.  I think it was in 9.4 that Juniper got rid of the 2
versions of software for J series, ie the router and enhanced services
versions, so all newer versions have the security stuff built in.

Upgrading the J series to use screen is fairly straightforward but if you
are just looking to run the J series as a router we can turn off the main
security features but you may be better off with just having all interfaces
in same zone and allow intra zone traffic.

Your SRX running as the firewall should be able to cater as the only screen
device but it does make sense to apply DDoS protection as close to your
perimeter if you can to reduce the load on the upstream boxes.


On 11 April 2013 11:15, James Howlett jim.howl...@outlook.com wrote:

 Hello,

 I think I can't use screen on my J-series in 9.x software / router context.
 Will SRX be able to handle it alone?

 all best,
 jim

 --
 Date: Thu, 11 Apr 2013 10:10:18 +0100
 Subject: Re: [j-nsp] DDoS protection for J-series and SRX
 From: m...@deimark.net
 To: jim.howl...@outlook.com
 CC: juniper-nsp@puck.nether.net


 Have a look at the screen options on both kits, we can apply basic DDoS
 protection there and limit stuff like max connections over a short period
 etc


 On 11 April 2013 09:57, James Howlett jim.howl...@outlook.com wrote:

 Hello,

 I have a small network with J6350 as a border router (BGP) and two SRX240H
 in a cluster.
 Since few days my network is a victim of DDoS attacks. Majority of them
 are high pps count attacks.
 Are there any methods to protect my network against such attacks. My
 J-series can handle quite a lot of pps, but my SRX die after getting more
 than 8000 new sessions per second.

 Is there anything i can do here?

 Regards,
 jim

 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] port mirror on EX causing crash

2013-04-11 Thread Luca Salvatore
For anyone who is interested turns out we hit this bug

PR658614
When you configure both sFlow monitoring technology and port mirroring 
features, parity errors might occur, which might cause the switch to crash and 
then reboot.

We had sflow running, then turned on port mirrioring... two days later crash!


From: juniper-nsp-boun...@puck.nether.net [juniper-nsp-boun...@puck.nether.net] 
On Behalf Of Luca Salvatore [l...@ninefold.com]
Sent: Wednesday, 10 April 2013 3:35 PM
To: Ben Dale
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] port mirror on EX causing crash

Yes this is what has happened to us... twice in two days.
Only change on the switch was setting up a port mirror... This would probably 
consume a bit more memory which may have triggered the crash.

I have already organised the RMA, was just wondering about the mirroring.

Luca


-Original Message-
From: Ben Dale [mailto:bd...@comlinx.com.au]
Sent: Wednesday, 10 April 2013 3:14 PM
To: Luca Salvatore
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] port mirror on EX causing crash

Yep - listen to JTAC.

The parity error is definitely a sign that the memory on your switch is flakey 
- I had an EX4200 completely lock-up and drop out of a VC after 6 months of 
flawless operation.  Rebooted it and it came good, 24 hours later it dropped 
right back out again with the parity error again.

RMA and everything is happy again.

On 10/04/2013, at 2:50 PM, Luca Salvatore l...@ninefold.com wrote:

 Wondering if anyone has seen any issues with EX switches running port 
 mirroring - specifically seeing the switch generate a 'parity error' and 
 crashing?
 I have an EX4200 10.4r5.5, a few hours after turning on port mirroring  the 
 switch crashed.  It threw some memory parity errors which JTAC tells me means 
 the switch is faulty and should be replaced.

 The switch in question has been running fine for 3 years, but turning on a 
 ingress and egress port mirror (on a single port) seems to make the switch 
 have a bad day.  The switch isn't busy, and the port that I'm mirroring has 
 about 80 to 100Mb of traffic.  I'm mirroring the port to an IDS and would 
 like to keep it running for the foreseeable future.

 Any thoughts on this situation?
 Thanks
 Luca.


 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Config changes on VC with member down

2013-04-11 Thread Luca Salvatore
HI,
Quick question just for my own sanity :-/

If i make some config changes on a VC when one of the members is down, what 
happens to the config on the down member when it comes back up?  I'm assuming 
it will just sync with the master right?

thanks
Luca.

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDoS protection for J-series and SRX

2013-04-11 Thread Mark Kamichoff
On Thu, Apr 11, 2013 at 10:57:55AM +0200, James Howlett wrote:
 I have a small network with J6350 as a border router (BGP) and two
 SRX240H in a cluster.  Since few days my network is a victim of DDoS
 attacks. Majority of them are high pps count attacks.
 Are there any methods to protect my network against such attacks. My
 J-series can handle quite a lot of pps, but my SRX die after getting
 more than 8000 new sessions per second.
 
 Is there anything i can do here?

Definitely SCREENs, as other folks have said.

However, in the corner case where you're getting traffic for a
particular service or destination IP that isn't in use (maybe not in
this instance), a quick way of protecting the traffic from hitting the
flow module is to use a firewall filter with a discard action for that
traffic.

Just something to keep in your toobox..

- Mark

-- 
Mark Kamichoff
p...@prolixium.com
http://www.prolixium.com/


signature.asc
Description: Digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] Logical tunnels on MPC2 and MICs

2013-04-11 Thread Clarke Morledge
I am a little confused about logical tunnel-services configuration on the 
MPC2, for both the chassis platform and MX-80.   Do you really need a MIC 
installed in the MPC if you want to configure a logical-tunnel (lt)?


Part of me says you do not simply because the tunnel is happening on the 
PFE.  Since the PFE is sitting on the MPC2 itself, the MIC would not be 
necessary.


But then the other part of me knows that with the older non-Trio that the 
PFE is integrated with the physical interfaces, so perhaps a MIC in the 
Trio world is required. which I do not understand, since I do not get 
why the PFE needs a physical interface in order to get a tunnel to work.


If someone could straighten me out, that would be great.  Thanks.

Clarke Morledge
College of William and Mary
Information Technology - Network Engineering
Jones Hall (Room 18)
Williamsburg VA 23187
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Config changes on VC with member down

2013-04-11 Thread Ben Dale


On 11/04/2013, at 10:08 PM, Luca Salvatore l...@ninefold.com wrote:

 HI,
 Quick question just for my own sanity :-/
 
 If i make some config changes on a VC when one of the members is down, what 
 happens to the config on the down member when it comes back up?  I'm assuming 
 it will just sync with the master right?

That won't be a problem.  Your Master and Backup REs keep the configuration for 
all members, so any changes will be pushed out when the down member is 
re-joined/replaced.  

Check this out if you need more detailed information on the process:

http://www.juniper.net/techpubs/en_US/junos/topics/task/installation/virtual-chassis-ex4200-member-replacing-cli.html

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDoS protection for J-series and SRX

2013-04-11 Thread Dobbins, Roland

On Apr 11, 2013, at 3:57 PM, James Howlett wrote:

 Is there anything i can do here?

S/RTBH, flowspec, iACLs, GTSM, et. al.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

  Luck is the residue of opportunity and design.

   -- John Milton


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp