Re: [j-nsp] lable unicast

2013-06-11 Thread Addy Mathur
On Tuesday, June 11, 2013, Oren Peled wrote:

 Hi all

 Can I get information about mpls label unicast here

 And how to separate networks in level 1
 Regards
 Oren.


I'm assuming the question is about BGP LU.  The following guide may help.

http://www.juniper.net/us/en/local/pdf/design-guides/8020013-en.pdf

Regards,
Addy.


 Oren Peled
  IP Network Dep.
  Technologies div.
  Partner Communications Company LTD.
  Office: +972-547815661
  Mobile: +972-544815661
  Mail: oren.pe...@orange.co.il javascript:;blocked::mailto:
 yaniv.michalov...@orange.co.il javascript:;

 
 This message contains information that may be confidential or privileged.
 If you are not the intended recipient, you may not use, copy or disclose
 to anyone any of the information in this message. If you have received
 this message and are not the intended recipient, kindly notify the sender
 and delete this message from your computer.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net javascript:;
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] instance-specific filters for VPLS BUM/flood filtering

2012-11-14 Thread Addy Mathur
Folks:

When Trio MPCs were released, original behavior pertaining to policer
behavior on VPLS instances was different from that observed on I-CHIP DPCs
(as has been uncovered in this thread).  This was changed via PR/674408,
which should now be externally viewable.  It changes the default Trio MPC
behavior to be more in line with I-CHIP DPC default.

https://prsearch.juniper.net/InfoCenter/index?page=prcontentid=PR674408

Regards,
Addy.

On Fri, Nov 9, 2012 at 2:57 PM, Christopher E. Brown 
chris.br...@acsalaska.net wrote:


 Please share case #, I have same complaints in discussion with our SE
 and up that chain.

 Personally I think they need to add instance-specific as a keyword to
 the policer to make them shared or not-shared by choice.  95% of the
 time I need unshared, but can think of a few cases where shared sould be
 useful.


 On 11/8/12 7:06 AM, Saku Ytti wrote:
 
  In my mind, the default is fine.  It is consistent with normal behavior
  and there are times when a shared policer would be desired.  The lack
 of
  a instance specific option though, that is stupid beyond belief,
  shocking surprise.
 
  To me the biggest problem is, you cannot know if instance policers are
  shared or not, as it is version dependent.
 
  I opened JTAC case (I can unicast case# if you want to pass it to your
  account team).
 
  Query:
  
  Case A)
 
  # show firewall filter PROTECT-FROM_IP_OPTION
 
  term police-ip-options {
 
  from {
 
  ip-options any;
 
  }
 
  then {
 
  policer POLICE-IP_OPTIONS;
 
  count police-ip-options;
 
  }
 
  }
 
  term accept-all {
 
  then {
 
  count accept-all;
 
  accept;
 
  }
 
  }
 
 
 
  # show firewall policer POLICE-IP_OPTIONS
 
  if-exceeding {
 
  bandwidth-limit 3m;
 
  burst-size-limit 320;
 
  }
 
  then discard;
 
 
 
  set routing-instances RED forwarding-options family inet filter
  PROTECT-FROM_IP_OPTION
 
  set routing-instances BLUE forwarding-options family inet filter
  PROTECT-FROM_IP_OPTION
 
 
 
  Will RED and BLUE share 3Mbps, or will each get own 3Mbps?
 
 
 
 
 
  Case B)
 
 
 
  ...amily vpls filter PROTECT-UNKNOWN_UNICAST
 
 
  term unknown_unicast {
 
  from {
 
  traffic-type unknown-unicast;
 
  }
 
  then {
 
  policer POLICE-UNKNOWN_UNICAST;
 
  accept;
 
  }
 
  }
 
  term accep {
 
  then accept;
 
  }
 
 
 
  show configuration firewall policer POLICE-UNKNOWN_UNICAST
 
  if-exceeding {
 
  bandwidth-limit 42m;
 
  burst-size-limit 100k;
 
  }
 
  then discard;
 
 
 
  set routing-instances GREEN forwarding-options family vpls filter input
  PROTECT-UNKNOWN_UNICAST
 
  set routing-instances YELLOW forwarding-options family vpls filter input
  PROTECT-UNKNOWN_UNICAST
 
 
 
  Will GREEN, YELLOW share 42Mbps or get own 42Mbps policers?
  
 
 
 
  JTAC response
  
  Query: If you configure same FW with policer to multiple instances, what
 is expected result? Should policer be shared or should it be dedicated per
 instances?
  JTAC: It will be dedicated per instance. In your example RED and BLUE
 will consume 3MB independently.
  ---
 
 
 
 
  But as per my own testing, I know IP-OPTIONS policer was shared in 10.4
 (which
  is what I want for IP options). And VPLS policer I want not-shared, as
 in 11.4.
 
 


 --
 
 Christopher E. Brown   chris.br...@acsalaska.net   desk (907) 550-8393
  cell (907) 632-8492
 IP Engineer - ACS
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JUNOS mx lag minimum bandwidth

2012-07-29 Thread Addy Mathur
On Saturday, July 28, 2012, Schahzad Zafar wrote:

 Hi list,

 I am not aware of if we can configure LAG  to forward traffic only if
 certin bandwidth (not full links as in minimum links instead line 2.5 G )
 is available.

 I was looking at JNCIE work book and some where there was a task to
 configure LAG interface to forward traffic only if there 2.5 G bandwidth is
 available i am only aware of option to have minimum Links to keep the LAG
 up.

 Intrestingly show interface ae0 shows Minimum Links required as well as
 Minimum Bandwidth Capacity too which is more confusing me.

 Any one know about it ?


Have you looked into bandwidth-based-metrics?

http://www.juniper.net/techpubs/en_US/junos10.0/information-products/topic-collections/config-guide-routing/routing-dynamically-adjusting-ospf-interface-metrics-based-on-bandwidth.html



 --
 Best Regards
 Schahzad
 0092 - 321 -9001131

 Never argue with an idiot, they will just *drag you* down to *their level
 and beat* you with experience.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net javascript:;
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DSCP classifier on CCC interface

2012-03-20 Thread Addy Mathur
Serge:

What platform/line-card are you trying this on?  This is possible in JUNOS
11.4 when using Trio/MPC line-cards on the MX.  See 11.4 release notes:

http://www.juniper.net/techpubs/en_US/junos11.4/information-products/topic-collections/release-notes/11.4/index.html?topic-62949.html#jd0e3519

--Addy.

On Mon, Mar 19, 2012 at 2:27 PM, Serge Vautour sergevaut...@yahoo.cawrote:

 Hello,

 Would anyone know if it's possible to apply a DSCP classifier on a CCC
 interface? Here's what I have:


 Interface:

 ge-1/2/1 {
 encapsulation ethernet-ccc;
 unit 0;
 }

 Routing-Instance:

 instance-type l2vpn;
 interface ge-1/2/1.0;
 vrf-target target:123:41;
 protocols {
 l2vpn {
 encapsulation-type ethernet;
 no-control-word;
 site Site1 {
 site-identifier 1;
 interface ge-1/2/1.0;
 }
 }
 }

 Class-of-Service interface:

 ge-1/2/1 {
 unit 0 {
 classifiers {
 dscp dscp-classifier;
 }
 }
 }


 Class-of-service classifier:

 dscp dscp-classifier {
 import default;
 forwarding-class expedited-forwarding {
 loss-priority low code-points [ 101000 101001 101010 101011 101100
 101101 101110 10 ];
 }
 }


 Note that the L2VPN is port based. Any valid ethernet frame will go
 through.


 To test this I generate a ping and set the ToS field to 101. The
 classifier above should drive this to the EF class but it isn't.


 I'm wondering if maybe you can't use a DSCP classifier on a non-IP
 interface? Anybody tried this before? I thought I'd try this mailing list
 before opening a case.

 Thanks,
 Serge
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Random BGP peer drops

2012-02-15 Thread Addy Mathur
Serge:

Do you have ldp synchronization enabled?

http://www.juniper.net/techpubs/en_US/junos10.4/topics/usage-guidelines/routing-configuring-synchronization-between-ldp-and-igps.html

--Addy.

On Tuesday, February 14, 2012, Serge Vautour sergevaut...@yahoo.ca wrote:
 Hello,

 We have an MPLS network made up of many MX960s and MX80s. We run OSPF as
our IGP - all links in area 0. BGP is used for signaling of all L2VPN 
VPLS. At this time we only have 1 L3VPN for mgmt. LDP is used for for
transport LSPs. We have M10i as dedicated Route Reflectors. Most MX are on
10.4S5. M10i still on 10.0R3. Each PE peers with 2 RRs and has 2 diverse
uplinks for redundancy. If 1 link fails, there's always another path.

 It's been rare but we've seen random iBGP peer drops. The first was
several months ago. We've now seen 2 in the last week. 2 of the 3 were
related to link failures. The primary path from the PE to the RR failed.
BGP timed out after a bit. Here's an example:

 Feb  8 14:05:32  OURBOX-re0 mib2d[2279]: %DAEMON-4-SNMP_TRAP_LINK_DOWN:
ifIndex 129, ifAdminStatus up(1), ifOperStatus down(2), ifName xe-7/0/0
 Feb  8 14:05:32  OURBOX-re0 mib2d[2279]: %DAEMON-4-SNMP_TRAP_LINK_DOWN:
ifIndex 120, ifAdminStatus up(1), ifOperStatus down(2), ifName xe-0/0/0
 Feb  8 14:06:33  OURBOX-re0 rpd[1413]: %DAEMON-4: bgp_hold_timeout:3660:
NOTIFICATION sent to 10.1.1.2 (Internal AS 123): code 4 (Hold Timer Expired
Error), Reason: holdtime expired for 10.1.1.2 (Internal AS 123), socket
buffer sndcc: 0 rcvcc: 0 TCP state: 4, snd_una: 1056225956 snd_nxt:
1056225956 snd_wnd: 16384 rcv_nxt: 3883304584 rcv_adv: 3883320968, hold
timer 0

 BGP holdtime is 90sec. This is more than enough time for OSPF to find the
other path and converge. The BGP peer came back up before the link so
things did eventually converge.

 The last BGP peer drop happened without any links failure. Out of the
blue, BGP just went down. The logs on the PE:

 Feb 13 20:40:48  OUR-PE1 rpd[1159]: %DAEMON-4: bgp_hold_timeout:3660:
NOTIFICATION sent to 10.1.1.2 (Internal AS 123): code 4 (Hold Timer Expired
Error), Reason: holdtime expired for 10.1.1.2 (Internal AS 123), socket
buffer sndcc: 0 rcvcc: 0 TCP state: 4, snd_una: 2149021074 snd_nxt:
2149021074 snd_wnd: 16384 rcv_nxt: 2049196833 rcv_adv: 2049213217, hold
timer 0
 Feb 13 20:40:48  OUR-PE1 rpd[1159]:
%DAEMON-4-RPD_BGP_NEIGHBOR_STATE_CHANGED: BGP peer 10.1.1.2 (Internal AS
123) changed state from Established to Idle (event HoldTime)
 Feb 13 20:41:21  OUR-PE1 rpd[1159]:
%DAEMON-4-RPD_BGP_NEIGHBOR_STATE_CHANGED: BGP peer 10.1.1.2 (Internal AS
123) changed state from OpenConfirm to Established (event RecvKeepAlive)

 The RR side shows the same:

 Feb 13 20:40:49  OUR-RR1-re0 rpd[1187]:
%DAEMON-4-RPD_BGP_NEIGHBOR_STATE_CHANGED: BGP peer 10.1.1.61 (Internal AS
123) changed state from Established to Idle (event RecvNotify)
 Feb 13 20:40:49  OUR-RR1-re0 rpd[1187]: %DAEMON-4:
bgp_read_v4_message:8927: NOTIFICATION received from 10.1.1.61 (Internal AS
123): code 4 (Hold Timer Expired Error), socket buffer sndcc: 57 rcvcc: 0
TCP state: 4, snd_una: 2049196833 snd_nxt: 2049196871 snd_wnd: 16384
rcv_nxt: 2149021095 rcv_adv: 2149037458, hold timer 1:03.112744
 Feb 13 20:41:21  OUR-RR1-re0 rpd[1187]:
%DAEMON-4-RPD_BGP_NEIGHBOR_STATE_CHANGED: BGP peer 10.1.1.61 (Internal AS
123) changed state from EstabSync to Established (event RsyncAck)
 Feb 13 20:41:30  OUR-RR1-re0 rpd[1187]: %DAEMON-3: bgp_send: sending 30
bytes to 10.1.1.61 (Internal AS 123) blocked (no spooling requested):
Resource temporarily unavailable


 You can see the peer wasn't down long and re-established on it's own. The
logs on the RR make it look like it received a msg from the PE that it was
dropping the BGP session. The last error on the RR seems odd as well.


 Has anyone seen something like this before? We do have a case open
regarding a large number of LSA retransmits. TAC is saying this is a bug
related to NSR but shouldn't cause any negative impacts. I'm not sure if
this is related. I'm considering opening a case for this as well but I'm
not very confident I'll get far.


 Any help would be appreciated.


 Thanks,
 Serge
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] tag-protocol-id matching in vlan-tags

2011-07-28 Thread Addy Mathur
On Wednesday, July 27, 2011, David Ball davidtb...@gmail.com wrote:
 MX running 10.0 (DPCE-R-20GE-2XGE for int in question)

 Should I expect that a logical unit configured with 'vlan-tags outer
 0x88A8.100' would also permit frames using TPID 8100 and VLAN ID 100 ?
  I kinda expected not (since it doesn't 'match'), yet if I change my
 test set to send normal 0x8100.100 frames, they're still accepted by
 the interface (config below) and stuffed into the associated VPN.

 [edit interfaces ge-1/1/0]
 flexible-vlan-tagging;
 encapsulation flexible-ethernet-services;
 gig-ether-options {
  no-auto-negotiation;
  ethernet-switch-profile {
tag-protocol-id 0x88A8;
  }
 }
 unit 100 {
  encapsulation vlan-ccc;
  vlan-tags outer 0x88A8.100;
  input-vlan-map pop;
  output-vlan-map push;
 }

  Are my expectations that specifying the TPID in the vlan-tags
 statement would ONLY match frames with that TPID wrong?  Practice
 would indicate that I'm wrong, but I guess I'm wondering if this is
 expected behaviour.

David:  I don't believe your expectation is incorrect. Could you please post
the exact JUNOS release (including minor version) and the output of show
interface ge-1/1/0?


 TIA,

 David
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper MX80 IRB

2010-07-28 Thread Addy Mathur
On Wednesday, July 28, 2010, Mark Tinka mti...@globaltransit.net wrote:
 On Tuesday, July 27, 2010 10:31:18 pm Chuck Anderson wrote:

 Finally, JTAC/ATAC can't even figure out the above!!!  I
 have a case open and they *still* haven't come to the
 solution because they haven't realized that Today Trio
 only supports the old style config and what that really
 means.

 The disconnect between JTAC and the core of the development
 team has always been there, in my opinion. It took a whole
 year of back-and-forth with JTAC on a case that, when it was
 finally escalated to a senior engineer within Juniper, was
 resolved in 30 minutes. No, seriously...

 It's easy to assume that just because JTAC work for Juniper,
 they're familiar with JUNOS and the Juniper hardware. But
 this, as I've seen time  time again, really isn't the case.

 Mark.


Although it doesn't answer the specific question raised via this
thread, the following link dose offer some general guidance on Trio
chipset features.  Should mostly be applicable to the MX80 as well.

http://www.juniper.net/techpubs/en_US/release-independent/junos/topics/reference/general/mpc-mx-series-features.html

Regards,
Addy.

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper MX80 IRB

2010-07-27 Thread Addy Mathur
On Tuesday, July 27, 2010, Tim Vollebregt t...@interworx.nl wrote:

 On Jul 26, 2010, at 11:25 PM, Chuck Anderson wrote:

 On Mon, Jul 26, 2010 at 06:52:14PM +0200, Tim Vollebregt wrote:
 We have just received a Juniper MX80 and are building the configuration.
 The machine is running Junos 10.2 R1.8

 The issue we are experiencing is that the IRB interface seems to be
 not working, although it seems to be configured correctly.
 Configuration:

 Try configuring it the old 9.2 way and let us know if it works:

 ge-1/0/0 {
       unit 200 {
           encapsulation vlan-bridge;
            vlan-id 200;

 irb {
        unit 200 {
            family inet {
                address x.x.x.x/27;
                address x.x.x.x/29;

 bridge-domains {
    VLAN200 {
        domain-type bridge;
        vlan-id 200;
       interface ge-1/0/0.200;
        routing-interface irb.200;

 Thanks.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


 Hi Chuck,

 I'm getting errors when changing to this configuration. It is only possible 
 to use encapsulation vlan-bridge on unit 0. And when I change it to unit 0:

 messageVLAN Encapsulation: Not allowed on untagged interfaces/message
 /xnm:error

 source-daemondcd/source-daemon
 edit-path[edit interfaces ge-1/0/0]/edit-path
 statementunit 0/statement
 message invalid encapsulation/message
 /xnm:error
 error: configuration check-out failed

 This issue seems to be really strange as we have it working the 10.x way on 
 another router. When I configure Ge-1/0/0 as a routed interface it works fine.

 Regards,

 Tim




 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


Tim:

Could you please paste in your entire ge-1/0/0 interface and
bridge-domain VLAN200 configuration at the time you do get the commit
error?

Thanks,
Addy.

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Setting forwarding-class in firewall filter, non-match behaviour

2010-06-20 Thread Addy Mathur
I personally think Dale's firewall configuration is better.  The
config allows for a packet to exit fw filter evaluation once a match
condition is met, by being subjected to a single action.  Derick's FW
filter forces a packet to traverse all terms regardless of a match,
and is subjected to at least two actions via two different terms
(fwd-class + next-term AND accept).  And there's no real need for the
latter.

Regards,
Addy.


On 6/20/10, Derick Winkworth dwinkwo...@att.net wrote:
 This is probably better:

 term BEST-EFFORT
 thenforwarding-class best-effort
 next-term
 term DSCP-EF
 fromdscp ef
 thenforwarding-class expedited-forwarding
 next-term
 term default-accept
 thenaccept


 You can insert additional terms later to modify loss-priority, sampling,
 etc... after the classification portion of the filter but before the
 default-accept.  I would use a rewrite rule to modify DSCP on egress, so
 that its consistent across platforms.





 
 From: Dale Shaw dale.shaw+j-...@gmail.com
 To: juniper-nsp@puck.nether.net
 Sent: Sun, June 20, 2010 3:59:12 AM
 Subject: [j-nsp] Setting forwarding-class in firewall filter, non-match
 behaviour

 Hi all,

 Re: setting the forwarding-class of a packet through a firewall filter.

 Many (almost all) of the examples I've looked at do not include a
 catch-all term to handle packets not matched by any explicitly-defined
 terms. At the risk of exposing myself as a J-noob...

 Is it safe to assume that, if the desired result is that packets NOT
 matched by explicitly-defined terms are permitted, a catch-all term
 must be configured with an 'accept' (or some other non-terminating)
 action?

 Using this input filter example:
 (stolen from
 http://www.juniper.net/techpubs/en_US/junos10.2/topics/usage-guidelines/policy-configuring-actions-in-firewall-filter-terms.html)

 firewall {
 filter filter1 {
   term 1 {
from {
 dscp 2;
}
then {
 dscp 0;
 forwarding-class best-effort;
}
   }
   term 2 {
from {
 dscp 3;
}
then {
 forwarding-class best-effort;
}
   }
 }
 }

 I read this as:

 - if the packet is marked DSCP 2, set DSCP to 0 and place in
 'best-effort' forwarding class and accept the packet.
 - if the packet is marked DSCP 3, place in 'best-effort' forwarding
 class and accept the packet.
 - discard all other packets

 Am I missing something?

 I think what I really want, to avoid dropping traffic, is something like:

 firewall {
 filter FILTER1 {
   term TERM1 {
from {
 dscp ef;
}
then forwarding-class expedited-forwarding;
   }
   term DEFAULT {
then forwarding-class best-effort;
accept;
   }
 }
 }

 ...then rewrite DSCP bits on egress based on the forwarding-class, or
 do it all within the firewall filter (depending on platform).

 (I know I don't strictly need the 'accept;' command in the DEFAULT
 term, but for the sake of clarity, I think it's a good option)

 Cheers,
 Dale
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Sent from my mobile device
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] ospfv3 - JUNOS sends zero mtu in dbd - stuck in ExStart

2010-06-18 Thread Addy Mathur
I ran into this a few years ago.  Even without going into the JUNOS
implementation (they will probably tell you that this is
works-as-designed, and that this was a conscious decision), this
should not cause an issue in the OSPF session establishment.

Per RFC 2328 section 10.6,

If the Interface MTU field in the Database Description packet
indicates an IP datagram size that is larger than the router can
accept on the receiving interface without fragmentation, the
Database Description packet is rejected.  Otherwise, if the
neighbor state is:
...
ExStart
If the received packet matches one of the following cases,
then the neighbor state machine should be executed with the
event NegotiationDone (causing the state to transition to
Exchange)...


Theoretically, MTU=0 would imply that the DBD packets should always be
received/processed, and thereby *not* cause any interop concerns.

--Addy.


On Thu, Jun 17, 2010 at 6:29 PM, Volker D. Pallas juniper-...@sqmail.de wrote:
 Hi again,

 yeah, this makes total sense!
 At first I thought this is a JUNOS-problem, as Cisco does send the right
 mtu along.

 I closed the bug report on the quagga bugzilla for now (with closed/invalid)
 and will
 talk to JTAC.
 I'll get back to you and the list as soon as I have some confirmation and/or
 fix.

I'm not so sure anymore. A fellow reader has challenged my
interpretation of the RFC wording, that it might mean OSPF virtual
links, not tunnel (and similar virtual, non-physical) interfaces.
Upon re-reading with that interpretation in mind, I tend to agree.

Thinking further about it, mtu=0 for OSPF virtual links makes sense, as
only OSPF PDUs are being tunnelled, no actual traffic. So there is no
sensible MTU to report in the DBD packets. On real tunneling interfaces
though, everything (OSPF PDUs and actual traffic) gets tunnelled, and
the tunnel has a real MTU associated.

So in fact, I think my interpretation was wrong and JUNOS is actually
misbehaving by advertising MTU=0. It should report the tunnel interface
L3 MTU.

Sorry for the noise. I suggest raising a case with JTAC and closing off
the Quagga bug filing.

 No, not at all! Thanks a lot for your input! I did not even read the
 appropriate
 RFC before you posted, which I should do next time.

BTW, I noticed your Linux tunnel interface being named gre-nc - I
guess the gre part is a leftover misnomer from trying GRE encaps?

 exactly ;-) It's actually sit now on the linux side

Best regards from Porz to Porz,
Daniel

 and best wishes back to you!

 Volker
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Load Balance in VRF by Junos

2010-04-06 Thread Addy Mathur
Gabriel:

What kind of flows and variations exist in your traffic?  Regardless
of the loadbalance configuration, without enough variance, traffic
distribution will be polarized.

Regards,
Addy.


On 4/5/10, Gabriel Farias gabrielfaria...@gmail.com wrote:
 Hi,

 I configured the router the suggested parameters in URL:

 {master}[edit]

 RT110# show policy-options policy-statement load-balance

 term 1 {

 then {

 load-balance per-packet;

 }

 }



 RT110# show routing-options

 forwarding-table {

 export load-balance;

 }

 RT110# show forwarding-options

 load-balance {

 indexed-next-hop;

 }

 hash-key {

 family inet {

 layer-3;

 layer-4;

 }

 }

 The continuing imbalance in the physical interfaces:

 {master}[edit]

 RT110# run show interfaces ge-3/0/3 | match rate

   Input rate: 520010728 bps (98183 pps)

   Output rate: 585910320 bps (176371 pps)



 {master}[edit]

 RT110# run show interfaces ge-3/0/0 | match rate

   Input rate: 621317752 bps (107767 pps)

   Output rate: 107517264 bps (17319 pps)


 The configuration is correct? Or we would have to configure within the
 routing-instances dados.


 Thanks

 Gabriel Farias



 2010/4/5 Serge Vautour sergevaut...@yahoo.ca

 Hello,

 eBGP shouldn't come into play here. Your physical interfaces are bundled
 as
 1 logical interface (ae0). Load balancing over L3 LAG interfaces works the
 same as ECMP links. You have to configure this:


 http://www.juniper.net/techpubs/en_US/junos10.0/information-products/topic-collections/config-guide-policy/policy-configuring-per-packet-load-balancing.html

 Stefan has suggested this below. Have you tried it?. Can you post your
 relevant config?

 What I find weird is you do have some egress traffic on both physical
 links. It's just not even close to being balanced. Without any load
 balancing configs, I would expect to see 0 bps on one link. Do you have
 enough flows? If most of your traffic is generated from just a few flows,
 you may not be able to get much better.

 Serge


 - Original Message 
 From: Gabriel Farias gabrielfaria...@gmail.com
 To: mail-list mohan.nand...@gmail.com
 Cc: juniper-nsp@puck.nether.net; uniper-nsp-boun...@puck.nether.net
 Sent: Mon, April 5, 2010 1:20:33 PM
 Subject: Re: [j-nsp] Load Balance in VRF by Junos

 Stefan,

 This configuration has no effect, because the connection (PE x CE) uses
 EBGP
 routing within the VRF dados.

 What I need is to balance the outbound traffic of physical interfaces of
 RT110, you have any other suggestions?

 Thanks
 Gabriel Farias



 2010/4/5 mail-list mohan.nand...@gmail.com

  try this and see if it makes any difference...
 
  set forwarding-options hash-key family mpls label-1
   set forwarding-options hash-key family mpls payload ip
  or
  set forwarding-options hash-key family mpls label-1
   set forwarding-options hash-key family mpls label-2
  set forwarding-options hash-key family mpls payload ip
 
 
 
 
 
  On Mon, Apr 5, 2010 at 8:35 AM, Gabriel Farias 
 gabrielfaria...@gmail.comwrote:
 
  Stefan,
 
  Any suggestions to correct this imbalance?
 
  Thanks,
  Gabriel Farias
 
  2010/4/1 Gabriel Farias gabrielfaria...@gmail.com
 
   Sorry for my bad translation, follows the configuration:
  
   *Interfaces*:
   show configuration interfaces ge-3/0/0
   description *BA* G2/47 - SW001;
   gigether-options {
   802.3ad ae0;
   }
   show configuration interfaces ge-3/0/3
   description *BA* G1/47 - SW001;
   gigether-options {
   802.3ad ae0;
   }
   show configuration interfaces ae0
   description *BA* Po150 - SW001;
   mtu 9192;
   unit 0 {
   family inet {
   address 10.251.40.53/30;
   }
   }
  
   *VRF instances*:
   show configuration routing-instances dados
   instance-type vrf;
   interface ae0.0;
   ...
   protocols {
   bgp {
   group PEER-SW001 {
   type external;
   hold-time 30;
   peer-as 65100;
   as-override;
   neighbor 10.251.40.54;
   }
   }
  
   What I need is to balance the outbound traffic of physical
   interfaces,
  see
   that is constant unbalance
  
   {master}
   RT110 show interfaces ge-3/0/0 | match rate
 Input rate : 271677184 bps (69055 pps)
 Output rate: 37802544 bps (10429 pps)
  
   {master}
   RT110 show interfaces ge-3/0/3 | match rate
 Input rate : 293302512 bps (61095 pps)
 Output rate: 628471504 bps (134276 pps)
  
   {master}
   RT110 show interfaces ge-3/0/0 | match rate
 Input rate : 298597864 bps (70456 pps)
 Output rate: 34856992 bps (8756 pps)
  
   {master}
   RT110 show interfaces ge-3/0/3 | match rate
 Input rate : 288075200 bps (57232 pps)
 Output rate: 657782056 bps (129224 pps)
  
  
  
  
   2010/3/31 Stefan Fouant sfou...@shortestpathfirst.net
  
   I'm sorry, your request is getting lost in translation. Why don't
   you
  just
   show us your configs and do a 'show 

Re: [j-nsp] Verify loss priority for a forwarding class

2010-03-13 Thread Addy Mathur
Just realized that you're using an M7i - this is not supported.  The
other thing I can think of would be to configure a tos/dscp rewrite
rule on egress for that specific forwarding-class and loss-priority
high, and confirm the tos/dscp values on the tester.

--Addy.


On 3/13/10, meryem Z merye...@hotmail.com wrote:

 Hello ,

 There is no loss-priority criteria to match on it.
 Possible completions are below:

 Thanks.



 # set firewall filter test_plp term 1 from ?
 Possible completions:
 address  Match IP source or destination address
 + ah-spi   Match IPSec AH SPI value
 + ah-spi-exceptDo not match IPSec AH SPI value
 + apply-groups Groups from which to inherit configuration data
 + apply-groups-except  Don't inherit configuration data from these groups
 destination-address  Match IP destination address
 + destination-classMatch destination class
 + destination-class-except  Do not match destination class
 + destination-port Match TCP/UDP destination port
 + destination-port-except  Do not match TCP/UDP destination port
 destination-prefix-list  Match IP destination prefixes in named list
 + dscp Match Differentiated Services (DiffServ) code point
 + dscp-except  Do not match Differentiated Services (DiffServ) code
 point
 + esp-spi  Match IPSec ESP SPI value
 + esp-spi-except   Do not match IPSec ESP SPI value
   first-fragment   Match if packet is the first fragment
 + forwarding-class Match forwarding class
 + forwarding-class-except  Do not match forwarding class
   fragment-flags   Match fragment flags (in symbolic or hex formats)
 + fragment-offset  Match fragment offset
 + fragment-offset-except  Do not match fragment offset
 + icmp-codeMatch ICMP message code
 + icmp-code-except Do not match ICMP message code
 + icmp-typeMatch ICMP message type
 + icmp-type-except Do not match ICMP message type
 interfaceMatch interface name
 + interface-group  Match interface group
 + interface-group-except  Do not match interface group
 interface-setMatch interface in set
 + ip-options   Match IP options
 + ip-options-exceptDo not match IP options
   is-fragment  Match if packet is a fragment
 + packet-lengthMatch packet length
 + packet-length-except  Do not match packet length
 + port Match TCP/UDP source or destination port
 + port-except  Do not match TCP/UDP source or destination port
 + precedence   Match IP precedence value
 + precedence-exceptDo not match IP precedence value
 prefix-list  Match IP source or destination prefixes in named list
 + protocol Match IP protocol type
 + protocol-except  Do not match IP protocol type
   service-filter-hit   Match if service-filter-hit is set
 source-address   Match IP source address
 + source-class Match source class
 + source-class-except  Do not match source class
 + source-port  Match TCP/UDP source port
 + source-port-except   Do not match TCP/UDP source port
 source-prefix-list   Match IP source prefixes in named list
   tcp-established  Match packet of an established TCP connection
   tcp-flagsMatch TCP flags (in symbolic or hex formats)
   tcp-initial  Match initial packet of a TCP connection
 [edit]
 mer...@liscr2# set firewall filter test_plp term 1 from

 Date: Thu, 11 Mar 2010 07:14:31 -0500
 Subject: Re: [j-nsp] Verify loss priority for a forwarding class
 From: addy.mat...@gmail.com
 To: merye...@hotmail.com; david@orange-ftgroup.com;
 juniper-nsp@puck.nether.net

 Meryem:

 Maybe try a firewall filter with a counter on the egress interface?
 Something like:

 from forwarding-class forwarding-class_name
 from loss-priority high
 then count fc-blah_lp-high
 then accept

 --Addy.


 On 3/11/10, meryem Z merye...@hotmail.com wrote:
 
  Hello David ,
 
  Thanks for your response, but this command is supported M320 routers and
  T-series routing platforms only..
  Is there any equivalent for M7i routers ?
 
 
  Thank you.
 
 
  From: david@orange-ftgroup.com
  To: merye...@hotmail.com
  CC: juniper-nsp@puck.nether.net
  Date: Wed, 10 Mar 2010 14:12:10 +0100
  Subject: RE: [j-nsp] Verify loss priority for a forwarding class
 
  Hi,
 
  You can view drops at the fabric level via the command :
 
   show class-of-service fabric statistics
 
  David
 
 
 
 
  David Roy
  Orange France - RBCI IP Technical Assistance Center
  Tel.   +33(0)299876472
  Mob. +33(0)685522213
  Email. david@orange-ftgroup.com
 
 
  -Message d'origine-
  De : juniper-nsp-boun...@puck.nether.net
  [mailto:juniper-nsp-boun...@puck.nether.net] De la part de meryem Z
  Envoyé : mercredi 10 mars 2010 13:17
  Cc : juniper-nsp@puck.nether.net
  Objet : [j-nsp] Verify loss priority for a forwarding class
 
 
  hello Community,
 
  I configured a forwarding class with high priority 

Re: [j-nsp] Verify loss priority for a forwarding class

2010-03-11 Thread Addy Mathur
Meryem:

Maybe try a firewall filter with a counter on the egress interface?
Something like:

from forwarding-class forwarding-class_name
from loss-priority high
then count fc-blah_lp-high
then accept

--Addy.


On 3/11/10, meryem Z merye...@hotmail.com wrote:

 Hello David ,

 Thanks for your response, but this command is supported M320 routers and
 T-series routing platforms only..
 Is there any equivalent for M7i routers ?


 Thank you.


 From: david@orange-ftgroup.com
 To: merye...@hotmail.com
 CC: juniper-nsp@puck.nether.net
 Date: Wed, 10 Mar 2010 14:12:10 +0100
 Subject: RE: [j-nsp] Verify loss priority for a forwarding class

 Hi,

 You can view drops at the fabric level via the command :

  show class-of-service fabric statistics

 David




 David Roy
 Orange France - RBCI IP Technical Assistance Center
 Tel.   +33(0)299876472
 Mob. +33(0)685522213
 Email. david@orange-ftgroup.com


 -Message d'origine-
 De : juniper-nsp-boun...@puck.nether.net
 [mailto:juniper-nsp-boun...@puck.nether.net] De la part de meryem Z
 Envoyé : mercredi 10 mars 2010 13:17
 Cc : juniper-nsp@puck.nether.net
 Objet : [j-nsp] Verify loss priority for a forwarding class


 hello Community,

 I configured a forwarding class with high priority loss. Now I need to
 verify that the traffic sent under this forwarding class ( using a traffic
 generator) has a high priority loss. The show interface queue  doesn't
 show this information. is there any other way to do it ?

 Thank you.


  
 _
 Votre messagerie et bien plus où que vous soyez. Passez à Windows Live
 Hotmail, c'est gratuit !
 https://signup.live.com/signup.aspx?id=60969
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

 *
 This message and any attachments (the message) are confidential and
 intended solely for the addressees.
 Any unauthorised use or dissemination is prohibited.
 Messages are susceptible to alteration.
 France Telecom Group shall not be liable for the message if altered,
 changed or falsified.
 If you are not the intended addressee of this message, please cancel it
 immediately and inform the sender.
 

   
 _
 Hotmail : une messagerie performante et gratuite avec une sécurité signée
 Microsoft
 https://signup.live.com/signup.aspx?id=60969
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Sent from my mobile device

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp