Re: [j-nsp] Juniper vMX limitations

2015-07-31 Thread Ben Dale

 On 30 Jul 2015, at 11:11 pm, Chris Adams c...@cmadams.net wrote:
 
 Once upon a time, Phil Bedard phil...@gmail.com said:
 I’m sure they’ve had it running in VMWare, but it’s a little more difficult 
 and you need the Enterprise Plus version of vSphere to get virtual serial 
 ports. I’d be more comfortable running it under KVM myself.   
 
 Just an FYI: if you are looking for a KVM-based virtualization setup
 that has more of the functionality of VMWare (not just CLI-based local
 VMs), check out oVirt http://www.ovirt.org/.

And similarly ProxMox - https://www.proxmox.com/en/proxmox-ve - I haven’t 
tried vMX on it yet, but it’s a pretty nice ESX replacement for general purpose 
use


 -- 
 Chris Adams c...@cmadams.net
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Proper Break of MPLS RSVP Ring

2015-07-16 Thread Ben Dale
Hi Levi,

 On 17 Jul 2015, at 5:22 am, Levi Pederson levipeder...@mankatonetworks.net 
 wrote:
 This is displaying it self in my output by not having an RSVP Neighbor
 (neighbor down hellos sent) between CD (and therefore sending my traffic
 inefficiently 3/4 way around the ring instead of the 1/4 hop it could.
 Last bit of information is that D sees C as a neighbor but is down.  C does
 not even see D as a neighbor at all.

This sounds like an L2 issue, or perhaps a misconfiguration - all nodes should 
be RSVP neighbours in order to be able to signal LSPs across those interfaces.

Check your protocols rsvp config for the logical interfaces between D.

Use monitor traffic interface D-C interface on D to confirm that RSVP is 
being sent out of the box.

Check any control-plane filtering/firewall filters you have configured on C 
(though it seems to be receiving just fine from B).

 I'm wondering how RSVP breaks that link.  All the documentation I can find
 are focused on LSP validation/creation and not on Link Breaks to stop layer
 2 loops (is my assumption).  If one of my intervening links goes own I
 would like to correct it and then move the break to the specified point.
 But the RSVP documentation is rather...limited to only LSPs if I am reading
 it correctly.

RSVP won’t break the link to stop loops (the LSPs will carry service labels 
which may not even be L2 services), it will simply establish the LSP across the 
best/shortest path between endpoints (based on your TE settings), and if this 
becomes unavailable (and depending on your configuration) it will simply 
re-establish over any alternate path (which it sounds like is working well).

Cheers,

Ben

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Basic Implementation of VLAN/LogicalPort across MPLS

2015-07-07 Thread Ben Dale
Hi Levi,

 I've setup an MPLS ring and with your help it's running beautifully. With
 it I can easily make port congruence across the MPLS ring with few issues.
 For example send a single from one side of the MPLS ring to the other if
 the signal lands on a port directly.  I.E a physical interface.

Based on your previous email, I’m assuming your transport labels are all 
RSVP-based.

 Where I'm having trouble now is landing or starting from a logical
 interface such as a VLAN.

For an aggregate interface, make sure you have flexible-ethernet-services 
configure on the physical interface (or vlan-ccc, but if not all units are 
going to be l2circuits, then stick with flexible-ethernet-services), and then 
encapsulation vlan-ccc for all the sub-interfaces you wish to tunnel:

interfaces {
ae0 {
aggregated-ether-options {
lacp {
active;
}
vlan-tagging;
encapsulation flexible-ethernet-services;
unit 10 {
encapsulation vlan-ccc;
vlan-id 10;
}
unit 20 {   
encapsulation vlan-ccc;
vlan-id 20;
}
}
}

To bring up an l2circuit, it’s just a simple matter of assigning and ID to the 
port, and mapping it to a remote PE:

protocols {
l2circuit {
neighbor 1.2.3.4 {— the far-side PE loopback where you want the 
other end of the tunnel to come out
interface ae0.10 {   — your local interface
virtual-circuit-id 10;   — unique identifier
}
}
}
}

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MPLS Endpoint Discussion

2015-07-02 Thread Ben Dale


 On 3 Jul 2015, at 12:25 am, Levi Pederson levipeder...@mankatonetworks.net 
 wrote:
 
 All,
 
 I've created simpler MPLS ring between a total of 6 MPLS 4550s.  My
 questions what IP do I use for the Label Switched Path Endpoints. I can't
 seem to find a best practice.
 
 Specifically this code
 
 Obfuscated as I'm a little to literal with my descriptions
 
 set protocols mpls label-switched-path PE2-to-PE1 to 10.254.1.1
 set protocols mpls label-switched-path PE2-to-PE3 to 10.254.1.6
 set protocols mpls label-switched-path PE2-to-PE4 to 10.254.0.4
 
 
 Do I use the /30 that exists between the Legs?
 
 Or should I use the LoopBack0 ?
 
 My thought would be Leg itself as it creates the path.  But some documents
 state LoopBack.

Always use loopbacks - if the link goes down (or the preceding node), the 
destination of the LSP goes with it - Junos will not maintain prefixes for 
downed interfaces.  

You mention this being a ring - if you target the LSP to a loopback, your IGP 
will provide an alternative path after a failure.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Log Message

2015-06-11 Thread Ben Dale
Hi Mohammad,

On 11 Jun 2015, at 4:32 pm, Mohammad Khalil eng.m...@gmail.com wrote:

 Hi all
 I have mx480 in place and I am having the below log messages
 Jun  8 18:23:10  CR01-A fpc5 NH: Failed to find nh (1657) for deletion
 Jun  8 18:23:10  CR01-A fpc5 NH: Failed to find nh (1629) for deletion
 Jun  8 18:49:25  CR01-A fpc5 NH: Failed to find nh (1627) for deletion
 Jun  8 18:49:25  CR01-A fpc5 NH: Failed to find nh (1437) for deletion
 Jun  8 18:49:25  CR01-A fpc5 NH: Failed to find nh (1433) for deletion
 Jun  8 18:49:25  CR01-A fpc5 NH: Failed to find nh (1344) for deletion
 Jun  9 00:04:20  CR01-A fpc5 NH: Failed to find nh (1354) for deletion
 Jun  9 00:04:20  CR01-A fpc5 NH: Failed to find nh (1309) for deletion
 Jun  9 06:23:23  CR01-A xntpd[1296]: kernel time sync enabled 6001
 Jun  9 06:40:28  CR01-A xntpd[1296]: kernel time sync enabled 2001
 Jun  9 08:05:51  CR01-A xntpd[1296]: kernel time sync enabled 6001
 Jun  9 08:22:54  CR01-A xntpd[1296]: kernel time sync enabled 2001
 Jun  9 10:22:22  CR01-A xntpd[1296]: kernel time sync enabled 6001
 Jun  9 10:39:28  CR01-A xntpd[1296]: kernel time sync enabled 2001
 
 I have tried to look for it in , but nothing useful
 Any ideas?
 
 Thanks in advance
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


This looks like you:

https://prsearch.juniper.net/InfoCenter/index?page=prcontentid=PR494528

Under certain circumstances we will report 'NH: Failed to find nh () for 
deletion' for child links of an aggregate. When an aggregate next-hop is 
deleted we delete all the children next-hops, if the child next-hop is not 
found then the messages is printed. However, this message is cosmetic since the 
child next-hop can be deleted earlier to aggregate next-hop delete.

Resolved in 10.2R4 10.3R3 10.3R4 10.4R2 11.1R1 11.2R1

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRx self-generated traffic

2015-05-18 Thread Ben Dale

On 18 May 2015, at 11:21 pm, M Abdeljawad via juniper-nsp 
juniper-nsp@puck.nether.net wrote:

 Hello
 I have three questions related to SRX self-generated traffic
 1- How to force the SRX self-generated traffic to get out to internet through 
 certain link (suppose I have two internet connections)?

Self-generated traffic will use inet.0 to determine the best path anywhere.  
I'm not aware of any way to perform policy-based routing on self-generated 
traffic, as FBF is applied on ingress.

 2- Is it possible to carry the self-generated traffic over a VPN tunnel 
 terminated on the SRX?

Yes, however there are some caveats to this approach depending on the specific 
traffic you are generating.  

In general though, you want to have numbered interfaces (eg: your st0.x 
interface has an IP address assigned to it) so that the source IP of the 
traffic is something sane (traffic sourced from an unnumbered tunnel interface 
will otherwise select the underlying interface IP address, which may be public).

Depending on what you are trying to do, you might find this useful:

set system default-address-selection 

This sources all system-generated IP traffic from the loopback interface if one 
is defined.  Depending on which zone your loopback is in, you can then 
configure policies to suit.

 3-Can we proxy the self-generated traffic to some proxy server?

In the case of traffic like syslog, DNS and software updates then yes this 
should be possible (for various definitions of proxy).

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] interoperation between MSTP and old STP

2015-05-17 Thread Ben Dale
Hi Victor,

On 15 May 2015, at 6:06 pm, Victor Sudakov v...@mpeks.tomsk.su wrote:

 Colleagues,
 
 I have several EX4200 switches with redundant links, all are running
 MSTP with a couple of MSTIs.
 
 If I include an older switch which can only run old-fashioned STP,
 will they interoperate and still keep the topology loop-free? What if
 it can run STP and RSTP, but not MSTP?

They will interoperate, however there are key differences to be aware of:
- STP/RSTP forms topology with STP bridges regardless of whether correct VLANs 
are trunked on ports - this can mean that topologies may form that isolate VLAN 
segments if you haven't configured trunked ports correctly on all links
- STP/RSTP bridges will treat an MSTP network (regardless of how many switches 
it contains) as single contiguous bridge, so you may find that the ports that 
block in your RSTP network aren't quite where you expected them to be when 
simply counting the radius from the root bridge.  

 
 A link to some good documentation is also appreciated.
 
 TIA for any input.

I highly recommend Petr Lapukhov's work here:

http://blog.internetworkexpert.com/2010/02/22/understanding-mstp/

The configuration and outputs are IOS-based and there are a few PVST+ interop 
discussions, but the supporting protocol description and break-down is truly 
excellent.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Passing Traffic over SRX Cluster Fabric

2015-05-03 Thread Ben Dale
Hi Mahmoud,

On 3 May 2015, at 10:27 pm, M Abdeljawad via juniper-nsp 
juniper-nsp@puck.nether.net wrote:

 Hi 
 I have two SRX Cluster, and the design requires that the traffic pass through 
 the fabric-link.but noticed some drop on the traffic when traffic pass 
 through the fabric link.
 Is there a limitation for passing traffic over fabric link (the passing 
 traffic size was around 500M, and the fabric link is 10G)
 RegardsMahmoud
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

If you're deliberately running a Z-mode traffic (and even if you're not) you 
need to check that you've set the MTU on the physical interfaces of the fabric 
link to be large enough to take the biggest frame you would receive on your 
reth/revenue interfaces plus overhead.  The recommended/max values are 8900 for 
reth/revenue ports and 9014 for the fabric link.

Reference Guide:
http://kb.juniper.net/library/CUSTOMERSERVICE/GLOBAL_JTAC/NT260/SRX_HA_Deployment_Guide.pdf

Cheers,

Ben

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX secure wire and layer 2 pdus

2015-04-28 Thread Ben Dale
Hi Ross,

On 29 Apr 2015, at 1:43 am, Ross Vandegrift r...@kallisti.us wrote:

 Hi all,
 
 The documentation for SRX secure wire has thrown me for a loop.  It
 says: secure wire is a kind of transparent mode, and transparent mode
 interfaces pass all ARP and non-IP broadcast/multicast.  So a secure
 wire should pass BPDUs and LACPDUs.
 
 I think that's a mistake.  If both secure wire interfaces land on the
 same switch, RSTP/MSTP ought to block one of the interfaces.  Separate
 switches won't help if both are multihomed to common distribution
 switches.  The secure wire will look like two edge interfaces were
 cabled together, and RSTP/MSTP will block.
 
 I setup a test with two ex4200s and a secure wire between them.  No
 BPDUs or LACPDUs make it across.  Seems good, but now I'm nervous
 that the behavior doesn't match the documentation.
 
 Have I missed something?  Case is open, but it stalled at the repeat
 the documentation stage.
 
 https://www.juniper.net/techpubs/en_US/junos12.3x48/topics/concept/layer-2-secure-wire-understanding.html
 
 Ross
 

The doco needs a slight update (or better yet, a cross-reference) to the link 
below.  

In the documentation for Transparent Mode, it mentions the Layer 2 bridging 
exceptions on SRX that apply when using a bridge-domain for transparent-mode, 
which is the same method SecureWire uses for tying interfaces together.

http://www.juniper.net/techpubs/en_US/junos11.4/information-products/topic-collections/security/software-all/layer-2/index.html?topic-52744.html

You'll see there that xSTP is specifically called out.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX: Hardware-Down for an irb logical unit

2015-04-28 Thread Ben Dale
Hi Chuck,

On 29 Apr 2015, at 9:32 am, Chuck Anderson c...@wpi.edu wrote:

 What would cause an irb logical interface unit to stay in
 Hardware-Down?  I'm using identical configs on 4 different routers
 (different IPs of course), and one of them won't come up.  There is at
 least one physical interface in the BD that is up.  The irb physical
 interface is up.  There are many other irb logical units that are up
 and working fine, just this one unit that is down.
 

This is usually caused because there are no physical interfaces up in the 
bridge-domain.  

I notice you've got an aggregated-ethernet interface in there - if you have 
LACP enabled, but no LACP partner, the physical link will stay up, but the 
logical interface will go down, thus taking down your IRB as well.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] vpls question

2015-04-27 Thread Ben Dale
On 27 Apr 2015, at 5:57 pm, james list 
jameslis...@gmail.commailto:jameslis...@gmail.com wrote:

Well indeed OSPF is running also with customer peer in the other side of the 
MPLS cloud (CE2) and PE3/4 (still other side)... and it's due by customer 
requested design to have VPLS and OSPF on the PEs...

So I understand that putting protocols vpls connectivity-type irb do not 
solve...

I'm wondering why and the expected behaviour...


If you have a VPLS with two PEs joining to one CE at each site, you've created 
two loops, one at each site.

Standard behaviour is to define both PEs as a single site in the VPLS and use 
multi-homing and site-preference to keep one PE-CE interface inactive until 
such time as the other is required as already mentioned.

You can't run OSPF across both links without bringing them both up, which will 
create an L2 loop - these things are mutually exclusive.

The protocols vpls connectivity-type irb will keep the instance up if you 
have irbs defined and the PE-CE link goes down, but this doesn't really help 
you though.

It might be time to break out the sock puppets and have a robust discussion 
with your customer.


cheers
James

2015-04-27 0:36 GMT+02:00 Ben Dale 
bd...@comlinx.com.aumailto:bd...@comlinx.com.au:
Hi James,

On 27 Apr 2015, at 5:31 am, james list 
jameslis...@gmail.commailto:jameslis...@gmail.com wrote:

 Hi amarjeet
 Because if PE1 fails there is faster convergence to PE2 due to neighbor
 already established.


Is there a reason you wouldn't consider using an L3VPN instead of a VPLS?  It 
seems odd to me that you would be using L3 adjacencies to an L2 service.

If it really is L2 fail-over you are chasing, then Amarjeet is correct - 
multihoming and site-preference are designed for exactly this purpose.

If you customer requires L3 connectivity across your VPLS, you would be better 
off carrying their OSPF across the VPLS and let their CEs form adjacencies with 
each other - that way, you can take care of L2 fail-over, and the customer is 
responsible for L3.

Cheers,

Ben



 Cheers
 James
 Il 24/apr/2015 13:23, james list 
 jameslis...@gmail.commailto:jameslis...@gmail.com ha scritto:

 I have a VPLS multi-homed environment with two MX routers (PE1 and PE2)
 connected to a single ethernet switch (CE1). I have PE1 configured with
 site-preference as primary and PE2 as backup.


 Behind the CE1 there is a router running OSPF with both MX (on irb
 interface).


 My goal is to have:

 1)Multihoming to prevent loops

 2)Let the router run two OSPF neighbor with both PE and not just one
 with the primary PE.

 I’m wondering if using:


 set routing-instances  protocols vpls connectivity-type irb


 instead of the default (connectivity-type ce) could give me the option to
 reach my goal number 2) and if I can introduce any drawback.


 Or if there is another solution keeping 1).


 I don’t have a lab to test…


 Any help/feedback is really appreciated.


 Greetings

 James

 ___
 juniper-nsp mailing list 
 juniper-nsp@puck.nether.netmailto:juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] solution to a firewall question

2015-04-26 Thread Ben Dale


Hi Vijesh,

On 24 Apr 2015, at 1:18 am, Vijesh Chandran vij...@juniper.net wrote:

 Hi all,
  I am wondering if we have a solution to this issue.
  I need two firewall attached to an interface as input-list. e.g.: f1 and f2.
  Input-list [f1 f2]
  f1 to match a condition (all tcp port 80) and accept and count that packet.
  f2 to classify those packets based on code points and push to a forwarding 
 class. Is this possible?
 
 -Thanks,
 Vijesh
 

If f2 is only matching on code-points, is there any reason you can't just use a 
class-of-service classifier instead for this functionality?

Cheers,

Ben

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] vpls question

2015-04-26 Thread Ben Dale
Hi James,

On 27 Apr 2015, at 5:31 am, james list jameslis...@gmail.com wrote:

 Hi amarjeet
 Because if PE1 fails there is faster convergence to PE2 due to neighbor
 already established.
 

Is there a reason you wouldn't consider using an L3VPN instead of a VPLS?  It 
seems odd to me that you would be using L3 adjacencies to an L2 service.

If it really is L2 fail-over you are chasing, then Amarjeet is correct - 
multihoming and site-preference are designed for exactly this purpose.

If you customer requires L3 connectivity across your VPLS, you would be better 
off carrying their OSPF across the VPLS and let their CEs form adjacencies with 
each other - that way, you can take care of L2 fail-over, and the customer is 
responsible for L3.

Cheers,

Ben



 Cheers
 James
 Il 24/apr/2015 13:23, james list jameslis...@gmail.com ha scritto:
 
 I have a VPLS multi-homed environment with two MX routers (PE1 and PE2)
 connected to a single ethernet switch (CE1). I have PE1 configured with
 site-preference as primary and PE2 as backup.
 
 
 Behind the CE1 there is a router running OSPF with both MX (on irb
 interface).
 
 
 My goal is to have:
 
 1)Multihoming to prevent loops
 
 2)Let the router run two OSPF neighbor with both PE and not just one
 with the primary PE.
 
 I’m wondering if using:
 
 
 set routing-instances  protocols vpls connectivity-type irb
 
 
 instead of the default (connectivity-type ce) could give me the option to
 reach my goal number 2) and if I can introduce any drawback.
 
 
 Or if there is another solution keeping 1).
 
 
 I don’t have a lab to test…
 
 
 Any help/feedback is really appreciated.
 
 
 Greetings
 
 James
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX550 SRX-GP-8SERIAL

2015-04-14 Thread Ben Dale


On 15 Apr 2015, at 9:22 am, Herro91 herr...@gmail.com wrote:

 Hi,
 
 Does anyone know how many 8 port serial GPIM's can be installed into an
 SRX550?

http://www.juniper.net/techpubs/en_US/release-independent/junos/topics/concept/gpim-srx-series-overview.html

seems to suggest up to 6 can be installed in the available GPIM slots

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Aggregate policer config

2015-04-09 Thread Ben Dale


On 9 Apr 2015, at 10:22 am, Mark Tees markt...@gmail.com wrote:

 I would be curious to know if/how the aggregate behaviour works
 between different line cards/PFE.

I was wondering this too, so I did a bit of digging - Page 198 of Doug Hanks' 
MX Series book suggests it doesn't - quoting:

The same filter can be applied to multiple interfaces at the same time.  By 
default on MX Routers, these filters will sum (or aggregate) their counters and 
policing actions when those interfaces share a PFE.

I've only got MX80s here in the lab just now, which I think share a PFE for 
both FPC 0 and FPC1 - I can apply the same filter/policer to both a 10G and a 
1G interface and get the aggregate bandwidth between interfaces to be dictated 
by the policer.

 Just to clarify here:
 
 set firewall policer POLICER-800M filter-specific
 set firewall policer POLICER-800M if-exceeding bandwidth-limit 800m
 set firewall policer POLICER-800M if-exceeding burst-size-limit 10m
 set firewall policer POLICER-800M then discard
 
 This should result in the policer/counter actions being created per
 the filter they are used in but still shared within that filter
 providing interface-specific is not used right?

Yes, correct, however I suspect that the policer aggregate would again be per 
PFE.

So, back to the OP's question - you *should* be able to use a single filter, 
provided both your customer's links are on an MPC1 or MPC3E with 1G / 10G MICs.

If that's not the case, then stick with the per-interface 800M policer and just 
apply local-preference to your customers routes as you import them to ensure 
their traffic is always preferred via the 10G link (while it's up), and use 
MED/metric to encourage them to use the 10G link for their outbound.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Aggregate policer config

2015-04-08 Thread Ben Dale
Aggregate policing should be the default behaviour for a *filter*, as long as 
you don't apply the interface-specific knob.

Create a dedicated filter for this customer and apply it to both interfaces.

set firewall family any filter CUST-A-800M term POLICE-800M then policer 
POLICER-800M
set firewall family any filter CUST-A-800M term POLICE-800M then accept

traffic over either interface will contribute to the filter counter.

The policer itself can be generic/re-used by other filters as long as you 
*include* filter-specific.

set firewall policer POLICER-800M filter-specific
set firewall policer POLICER-800M if-exceeding bandwidth-limit 800m
set firewall policer POLICER-800M if-exceeding burst-size-limit 10m
set firewall policer POLICER-800M then discard

Cheers,

Ben

On 8 Apr 2015, at 7:15 am, Matthew Crocker matt...@corp.crocker.com wrote:

 
 Hello,
 
 A customer with two connections to my mx240.  I want to police their total 
 bandwidth to 800mbps. Right now I have a 800mbps policer but that gives them 
 800mbps on each circuit.
 
 Customer Interface 1 is a VLAN on a 10G interface
 Customer Interface 2 is a VLAN on a 1G interface
 
 Each interface has its own /30 IP subnet with a  BGP session on each customer 
 IP
 
 Customer buys X bandwidth we want to give them X bandwidth over a pair of 
 circuits.  If one circuit goes down the policer needs to be set to the X 
 bandwidth the purchased.
 
 Thanks
 
 -Matt
 
 --
 Matthew S. Crocker
 President
 Crocker Communications, Inc.
 PO BOX 710
 Greenfield, MA 01302-0710
 
 E: matt...@crocker.com
 P: (413) 746-2760
 F: (413) 746-3704
 W: http://www.crocker.com
 
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX2200 LLDP Port Info

2015-03-26 Thread Ben Dale
Hi Bill,

On 27 Mar 2015, at 3:16 am, Bill Blackford bblackf...@gmail.com wrote:
 Seems to be undesired behavior. So, far I have not found anything in the
 release notes that would indicate a fix. any thoughts on this from the
 group?

What you're seeing on the EX2200 changes from version to version

11.4R7 ignores the description and sends the logical interface name eg: 
ge-0/1/0.0
12.3R4.6 overrides the interface name with the description eg: Link to switchA 
- ge-0/0/0

In fact, the behaviour of LLDP from platform to platform across the whole range 
is pretty inconsistent:

MX80 - 14.2R1.9 (shows ifIndex of neighbouring interface):
Local InterfaceParent InterfaceChassis Id  Port info  
System Name
ge-1/1/2   -   40:b4:f0:49:98:f0   505
ACX1100 
ge-1/0/0   ae0 5c:5e:ab:0e:7f:40   516
MX80-B  
ge-1/1/0   ae0 5c:5e:ab:0e:7f:40   526
MX80-B  
ge-1/1/5   -   5c:5e:ab:0e:7f:40   531
MX80-B  

ACX1100 - 12.3something (shows ifIndex of neighbouring interface, and has no 
Parent interface to identify aggregates)
Local Interface Chassis IdPort info System Name
ge-0/0/45c:5e:ab:0e:60:30 528   MX80-A   
ge-0/0/15c:5e:ab:0e:7f:40 517   MX80-B   
ge-0/0/05c:5e:ab:0e:7f:40 527   MX80-B   

I seem to recall older versions of MX code (11 or 12) used to send the 
description field as well.

As for why - one example I know of is that there is a provider here that uses 
LLDP to send through the Circuit ID of their tails via Port Description, which 
is nice for operations staff on the remote end for ticket logging.

Anyway, you can partially resolve this issue with the following:

set protocols lldp port-id-subtype interface-name

This means that the *sending* LLDP device will now send the interface name in 
the Port ID field instead of the ifindex.  Unfortunately, the show lldp 
neighbors command will still only show the value of the Port Description 
field, which will get overridden by the interface description.  Instead you'll 
need to use show lldp neighbours interface ifd to see it.

BEFORE:

bdale@GD-eng-22c# run show lldp neighbors interface ge-0/1/1.0 
...
Neighbour Information:
Chassis type   : Mac address
Chassis ID : b0:a8:6e:8d:5a:40
Port type  : Locally assigned
Port ID: 527   -
Port description   : Uplink to GD-eng-22c
System name: GD-rck-22c 
   
AFTER:

bdale@GD-eng-22c# run show lldp neighbors interface ge-0/1/1.0 
.
Neighbour Information:
Chassis type   : Mac address
Chassis ID : b0:a8:6e:8d:5a:40
Port type  : Interface name
Port ID: ge-0/1/0   -
Port description   : Uplink to GD-eng-22c
System name: GD-rck-22c

To fix this though, I've put together an op script that behaves in a similar 
manner to show lldp neighbors except that it lists the Port ID field as well: 
https://github.com/dfex/DFEXjunoscripts/blob/master/show-lldp-neat.slax

It works works on the EX22/42 okay, but the EX doesn't seem to support remote 
execution (eg: op url 
https://github.com/dfex/DFEXjunoscripts/blob/master/show-lldp-neat.slax) across 
any of the version I've tried: 11.4R7.5, 12.3R2.5, 12.3R4.6, 12.3R6.6, 
13.2X51-D20.2.

On the MX under 14.2R1.9, remote execution works, but the script is a bit 
borked as it seems to be trying to re-use the variable from the previous 
iteration in for-each - let me know if anyone has an better experiences.

Cheers,

Ben

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] info VC QFX

2015-03-24 Thread Ben Dale
Hi James,

On 25 Mar 2015, at 1:35 am, james list jameslis...@gmail.com wrote:

 Hi folks,
 on QFX VC is there a way to configure VME interface to respond on each
 module of the VC instead to be redirected on the master RE ?
 
 If yes a little configuration example is appreciated.
 

I can't speak for QFX VC, but on EX VC this isn't possible.

If you need to get to a specific member (eg: 2), use:

request session member 2

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] next junos versions

2015-03-10 Thread Ben Dale
On 10 Mar 2015, at 12:49 am, james list jameslis...@gmail.com wrote:

 Hi
 is there a way to know the expected delivery date of the next Junos
 releases ?
 I'd a look to the path finder but I found nothing

You used to be able to set your watch by the four releases a year, now, not so 
much.

The following table shows previous major version release dates (FRS Date).

http://www.juniper.net/support/eol/junos.html

From 12.x it moved to 3 major releases/year and as of 14.x I believe it's down 
to two now?  Not counting all the Xversion feature releases for the various 
platforms.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX extended DHCP server static address binding

2015-01-15 Thread Ben Dale
Hi Misak,

 I can successfully describe  host 089 in Pool1 and it will get predefined 
 IP address, but if I do the same for Pool2 to assign host IP address from 
 that pool, host gets random address from Pool1. My  guess is that DHCP server 
 will never consider Pool2 configuration until all Pool1 addresses will be 
 assigned. For me it's a clearly bug in that case.

You are correct:

http://www.juniper.net/techpubs/en_US/junos13.3/topics/task/configuration/subscriber-management-address-assignment-pool-linking.html

linked pools won't be utilised until the primary pool is depleted, so not 
really a bug, but 

 Please advise how I can assign IP address from Pool2 to host. Juniper MX480, 
 JunOS 14.2R1.9

I don't think this is possible - if you move the host definition into Pool1 
with it's correct IP address, it'll fail the network range bounds check.

The only option I can see would be defining a network range that covers both 
Pools (if this is even possible) inside Pool1, then configure two separate 
range definitions inside that to cover your current address ranges.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX High-end Packet mode

2014-12-17 Thread Ben Dale
Hi Mahmoud,

On 18 Dec 2014, at 3:34 am, M Abdeljawad via juniper-nsp 
juniper-nsp@puck.nether.net wrote:

 I have three questions about packet mode on high-end SRX firewalls
 - Is it supported on SRX high-end firewalls to switch the firewall to packet 
 mode altogether using the below command which supported on branch 
 firewalls;(set security forwarding-options family mpls mode packet-based)

Feature navigator seems to suggest they can support packet-based for IPv6 [1] 
(not MPLS) in 12.1X44, but the SRX Series Book (older) suggest packet-mode is 
branch-only [2]. 

 - Is it supported on SRX high-end firewalls to partially convert some traffic 
 to packet mode (selective packet forwarding using filters)?

I don't believe so

 - Is it possible to operate MPLS on SRX high-end firewalls without enabling 
 packet-mode?

No

Cheers,

Ben

[1] http://pathfinder.juniper.net/feature-explorer/
[2] 
https://books.google.com.au/books?id=2HSLsTJIgEQCpg=PA163lpg=PA163dq=srx+packet-mode+mplssource=blots=_fxiZyPIytsig=tIuoDMgJWzpRyHCiIXyMKU-KNdohl=ensa=Xei=tgqSVLDtIMv08QX9yIHACwved=0CCIQ6AEwATgK#v=onepageq=srx%20packet-mode%20mplsf=false




___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Transfer some task from MX to VRR

2014-12-07 Thread Ben Dale
On 2 Dec 2014, at 12:41 am, Robert Hass robh...@gmail.com wrote:

 I think vMX can forward data.
 
 vMX indeed will be full-featured router. But my questions was related to
 move part of control-plane (basically whole BGP part of rpd) to external
 server. Maybe OpenFlow somehow helps here ? How openflow take care of eBGP
 to customers ? Session should be on router or on OpenFlow controller ? OF
 v1.3 just has been implemented in JunOS 14.x releases for MX series.

This is completely doable without the need for Openflow.

The vMX is delivered as two VMs - a vRE and vPFE and logically they communicate 
in the same way as the RE and PFE do in an MX today eg: an internal ethernet 
switch sends control-plane information down to the forwarding engine.

Whether this happens on a single host machine across a vSwitch, or across a 
physical network is now completely irrelevant, normal constraints not 
withstanding (congestion/loss etc).  

It's not a big stretch to imagine being able to one day ditch the vPFE and take 
a bunch of head-less MXs (hardware-based) acting as remote FPCs to a pair of 
centralised vREs - like JCS/TXM but on more commoditised server hardware, or 
even a Q-Fabric with MXs as nodes and commodity directors/interconnect.  

Given that control-plane traffic is pretty minimal, and with all the cool FIB 
localisation knobs coming down in 14.x, the scaling/design implications of this 
get pretty interesting.

Heck - it should be possible to one day take the much-maligned MX80 RE and 
replace it with a remote intel-based monster, and get 64-bit Junos in the mix.

Emulating the backplane for inter-FPC traffic is going to be a barrel of fun 
though!

Ben


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Best design can fit DC to DC

2014-11-04 Thread Ben Dale
I recommend you take a good long look at E-VPN:

http://www.juniper.net/documentation/en_US/junos13.2/topics/concept/evpns-overview.html

https://conference.apnic.net/data/37/2014-02-24-apricot-evpn-presentation_1393283550.pdf

http://www.cisco.com/c/en/us/products/collateral/routers/asr-9000-series-aggregation-services-routers/whitepaper_c11-731864.html

It is supported in one form or another on MXs, ASRs and ALU boxes and presents 
P2MP services just like a VPLS, only with control-plane based MAC learning, 
active/active multi-homing and a bunch of other goodness which will probably 
spell the end for OTV (which under the hood is essentially MPLS over GRE with 
some smarts), and maybe even replace VPLS and L2VPN/EoMPLS longer term.

OTV limits you to a single platform (N7K only last I looked) from a single 
vendor and you have to anchor your tunnels on your Data Centre switch.  Now 
your interconnect is tied to your DC fabric.  How inconvenient.

Stretching L2 domains over 1000km of wouldn't be my first suggestion either.

I've had a bit of a play with VCF and it seems to work as advertised, but be 
aware of mixed-mode limitations if you need to bring in lots of 1GE ports (eg: 
EX4300) - they don't support TISSU.  Putting 1GE SFPs into a QFX5100 is a 
slightly more expensive workaround though.

Ben

On 5 Nov 2014, at 12:06 pm, Oliver Garraux oli...@g.garraux.net wrote:

 I don't think L2 extension is a good idea, but if you have to, OTV is the
 way to do it IMO.  Particularly since you have to support non virtualized
 infrastructure, and may have  2 sites in the future.  OTV isn't going to
 have sub-second convergence (though I think it might support BFD in the
 future?)
 
 35km isn't too bad latency wise.  1000km will be much trickier.  Things
 like storage replication will be more difficult.  And while OTV can easily
 isolate FHRP's to send outbound traffic out the local default gateway,
 traffic tromboning with inbound traffic might be an issue.  (If inbound
 traffic is routed to the wrong data center, the extra latency from having
 to go across 1000km to get to the datacenter where the box actually is will
 suck).  I think LISP in theory could help with this, but would involve
 changes to how traffic gets *to* your data centers.
 
 Also, in general don't overlook the integration of storage / network /
 system stuff.  IE, if you lose all the links between the data centers,
 storage / networking / systems all need to fail over to the same place.  If
 you can, do lots of disruptive testing before going into production.  A
 previous organization I've been with discovered (and fixed) many issues
 with L2 extension through pre-production testing of everything.
 
 Oliver
 
 -
 
 Oliver Garraux
 Check out my blog:  blog.garraux.net
 Follow me on Twitter:  twitter.com/olivergarraux
 
 On Fri, Oct 31, 2014 at 9:41 AM, R LAS dim0...@hotmail.com wrote:
 
 Hi all
 a customer of mine is thinking to renew DC infrastructure and
 interconnection among the main (DC1) and secondary (DC2), with the
 possibility in the future to add another (DC3).
 
 Main goal are: sub-second convergence in case of a single fault of any
 component among DC1 and DC2 (not DC3), to have the possibility to extend L2
 and L3 among DCs, to provide STP isolation among DCs, to provide ports on
 the server at eth 1/10Gbs speed.
 
 DC1 and DC2 are 35 km away, DC3 around 1000 km away from DC1 and DC2.
 
 Customer would like to design using Cisco or Juniper and at the end to
 decide.
 
 Talking about Juniper my idea was to build and MPLS interconnection with
 MX240 or MX104 in VC among DC1 and DC2 (tomorrow will be easy to add DC3)
 and to use QFX in a virtual chassis fabric configuration.
 
 Does anybody have these kind of config ?
 Is it stable QFX ?
 Any other suggestion/improvement ?
 
 And if you would go with Cisco, what do you propose in this scenario ?
 
 Rgds
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] BRAS IPv4/IPv6 Combined Policer RADIUS Attributes

2014-11-02 Thread Ben Dale
Hi Darren,

 
 Our requirement is per below. For example, the bandwidth package is 5Mbps.
 The IPv4  IPv6 should be policed jointly to bandwidth of 5Mbps rather than
 individual IPv4 or IPv6 family policing. If policing is done individually
 for IPv4 (5Mbps) and for IPv6 (5Mbps), the user is getting bandwidth of
 10Mbps jointly  which we tried to avoid.


Modify your PPPoE template so that you're applying the filter under 
$junos-interface-unit rather than the address family:

PPPOE-IP-PROFILE {
interfaces {
pp0 {
unit $junos-interface-unit {
ppp-options {
pap;
}
pppoe-options {
underlying-interface $junos-underlying-interface;
server;
}
filter {
input 5m;
output 5m;
}
family inet {
unnumbered-address $junos-loopback-interface;
}
family inet6 {
unnumbered-address $junos-loopback-interface;
}
}
}
}   
}

That will police regardless of the underlying address family.

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] controlling the source IP for the Dns Proxy feature

2014-10-15 Thread Ben Dale
Hi Andy,

I have come across this exact issue using the feature.

There was a good reason why we didn't use default address selection that 
escapes me just now, but I had a slight advantage in that I was using 
route-based VPNs, so I was able to number the st0 interface with a /32 from the 
corporate range and source my queries from there.

Unfortunately policy-based VPNs are extremely limiting when it comes to things 
like this.  I can't think of too many scenarios where I'd even use them any 
more.  If you don't have too many sites, I'd seriously consider migrating them 
across.
 
Cheers,

Ben

On 16 Oct 2014, at 1:28 am, Andy Litzinger andy.litzinger.li...@gmail.com 
wrote:

 Hello,
 is anyone out there using the dns-proxy feature for the branch SRX?  Are
 there any clever tricks for specifying the source address the SRX uses to
 query name servers?  It does not appear to be a config option.
 
 with the default config it appears to use the IP of the outbound
 interface.  If I add the config statement 'set system default address
 selection' i can influence it to use the lo0.0 address, which can solve my
 issue, but not in a way i prefer.
 
 my exact problem is the following:
 I have an SRX 220H in a remote office. It has an trust and untrust zone.
 users sit on the trust zone and receive dhcp from the SRX and use the SRX
 as their default gateway and dns server.  There is a policy based vpn that
 connects from the untrust zone to our corp HQ.  I have the dns-proxy config
 set up so that if a dns request is going to an intranet zone, e.g.
 corp.example.com, then it should use DNS servers that live across the
 tunnel in our corp HQ.  If they are looking up anything else, they use
 google dns servers.
 
 here's the relevant config:
 dns-proxy {
interface {
interface facing users;
}
default-domain * {
forwarders {
8.8.8.8;
8.8.4.4;
}
}
default-domain corp.example.com {
forwarders {
corp hq name server1;
corp hq name server 2;
}
}
 }
 
 the problem is without the 'default address selection' set the SRX tries to
 use the untrust interface IP as the source IP to query our corp HQ name
 servers, but the traffic doesn't enter the tunnel because it doesn't match
 the vpn policy.  And I can't change the policy to allow it because the
 untrust interface IP is the endpoint of the tunnel.  It looks like the
 source zone of the dns query is junos-host- is it possible maybe to set up
 a junos-host zone to untrust zone NAT when going to corp-hq IP space?
 
 or is there another clever solution?
 
 thanks!
 -andy
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] controlling the source IP for the Dns Proxy feature

2014-10-15 Thread Ben Dale
I've certainly had no issue with stability using route-based VPN.

As far as multiple subnet (proxy-id / traffic selectors) support, as of 
12.1X46-D10 this is now native in Junos - 

http://kb.juniper.net/InfoCenter/index?page=contentid=KB28820

and is dead simple to configure.

If you're a little gun shy on 12.1X code and are still running old-faithful 
builds like 11.4RLate, then there are a couple of options:

- If your subnets are contiguous, just widen the mask to include them in a 
single crypto-map on the Cisco side (even if that means widening the mask a LOT)

- If your subnets are arbitrarily selected from different RFC1918 blocks 
(DOH!), then create separate P2 bindings for each subnet:

http://kb.juniper.net/InfoCenter/index?page=contentid=KB20543

just be aware that this will only work if the multiple subnets are on the Cisco 
side (which seems to be true in your case)

There are a few other hacks out there using FBF as well.  J-NET has some good 
material:

http://forums.juniper.net/t5/SRX-Services-Gateway/SRX-multiple-proxy-ID-on-route-based-VPN-with-multiple-local/td-p/172002/page/2

Cheers,

Ben

On 16 Oct 2014, at 8:35 am, Andy Litzinger andy.litzin...@theplatform.com 
wrote:

 I'd happily use route-based vpns if they are supported in my use case.
 Based on Kbs and internet lore, it seemed policy based was the best bet
 for stability.
 
 My two tunnel endpoint devices are the SRX and a Cisco ASA.
 On the SRX side I've got a single subnet but on the ASA side I've got two
 subnets.  I would happily use a simple policy on the ASA side like 'permit
 ip any SRX side IP subnet SRX side mask' if i was confident I wasn't
 going to have squirrely issues with connectivity.
 
 What do you think?
 
 -andy
 
 On 10/15/14 3:22 PM, Ben Dale bd...@comlinx.com.au wrote:
 
 Hi Andy,
 
 I have come across this exact issue using the feature.
 
 There was a good reason why we didn't use default address selection that
 escapes me just now, but I had a slight advantage in that I was using
 route-based VPNs, so I was able to number the st0 interface with a /32
 from the corporate range and source my queries from there.
 
 Unfortunately policy-based VPNs are extremely limiting when it comes to
 things like this.  I can't think of too many scenarios where I'd even use
 them any more.  If you don't have too many sites, I'd seriously consider
 migrating them across.
 
 Cheers,
 
 Ben
 
 On 16 Oct 2014, at 1:28 am, Andy Litzinger
 andy.litzinger.li...@gmail.com wrote:
 
 Hello,
 is anyone out there using the dns-proxy feature for the branch SRX?  Are
 there any clever tricks for specifying the source address the SRX uses
 to
 query name servers?  It does not appear to be a config option.
 
 with the default config it appears to use the IP of the outbound
 interface.  If I add the config statement 'set system default address
 selection' i can influence it to use the lo0.0 address, which can solve
 my
 issue, but not in a way i prefer.
 
 my exact problem is the following:
 I have an SRX 220H in a remote office. It has an trust and untrust zone.
 users sit on the trust zone and receive dhcp from the SRX and use the
 SRX
 as their default gateway and dns server.  There is a policy based vpn
 that
 connects from the untrust zone to our corp HQ.  I have the dns-proxy
 config
 set up so that if a dns request is going to an intranet zone, e.g.
 corp.example.com, then it should use DNS servers that live across the
 tunnel in our corp HQ.  If they are looking up anything else, they use
 google dns servers.
 
 here's the relevant config:
 dns-proxy {
   interface {
   interface facing users;
   }
   default-domain * {
   forwarders {
   8.8.8.8;
   8.8.4.4;
   }
   }
   default-domain corp.example.com {
   forwarders {
   corp hq name server1;
   corp hq name server 2;
   }
   }
 }
 
 the problem is without the 'default address selection' set the SRX
 tries to
 use the untrust interface IP as the source IP to query our corp HQ name
 servers, but the traffic doesn't enter the tunnel because it doesn't
 match
 the vpn policy.  And I can't change the policy to allow it because the
 untrust interface IP is the endpoint of the tunnel.  It looks like the
 source zone of the dns query is junos-host- is it possible maybe to set
 up
 a junos-host zone to untrust zone NAT when going to corp-hq IP space?
 
 or is there another clever solution?
 
 thanks!
 -andy
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4200 VC Cabling

2014-09-30 Thread Ben Dale
I've never had any issues doing it either way.  It'll auto-detect the topology, 
even if you have only a single link.

What I have seen though is a bunch of units (at least a couple of months back) 
coming out of the factory booting form the backup image (like the build image 
was corrupt), so it may have nothing to do with your VC build at all.

Just upgrade to JTAC preferred, snapshot all members (and read a long novel 
while you wait for that to finish) and then reboot the whole chassis.


On 1 Oct 2014, at 9:23 am, Skeeve Stevens 
skeeve+juniper...@eintellegonetworks.com wrote:

 Hi all,
 
 We're doing a bunch of 2 x EX4200 in VC.
 
 Once we connect the VC cables, one of the Junos seems to be corrupted.
 
 We're currently using the ring X cabling.. but I have seen another option
 for a 2 member stack of | |
 
 Anyone got any thoughts?
 
 *
 **   **
 **  WARNING: THIS DEVICE HAS BOOTED FROM THE BACKUP JUNOS IMAGE  **
 **   **
 **  It is possible that the primary copy of JUNOS failed to boot up  **
 **  properly, and so this device has booted from the backup copy.**
 **   **
 **  Please re-install JUNOS to recover the primary copy in case  **
 **  it has been corrupted and if auto-snapshot feature is not**
 **  enabled. **
 **
 
 ...Skeeve
 
 *Skeeve Stevens - *eintellego Networks Pty Ltd
 ske...@eintellegonetworks.com ; www.eintellegonetworks.com
 
 Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
 
 facebook.com/eintellegonetworks ;  http://twitter.com/networkceoau
 linkedin.com/in/skeeve
 
 twitter.com/theispguy ; blog: www.theispguy.com
 
 
 The Experts Who The Experts Call
 Juniper - Cisco - Cloud - Consulting - IPv4 Brokering
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] BGP Peer formatting

2014-09-22 Thread Ben Dale
On 10 Sep 2014, at 11:32 am, Ben Dale bd...@comlinx.com.au wrote:

 Failing that, I just hacked up an op script to only show a summarised version 
 from each peer - output here:
 
 https://github.com/dfex/DFEXjunoscripts/blob/master/show-bgp-neat.md
 
 Code here:
 
 https://github.com/dfex/DFEXjunoscripts/blob/master/show-bgp-neat.slax
 
 The script *should* sum all the prefixes from each RIB into a single 
 summarised number per peer, but I haven't had a chance to test it too 
 thoroughly yet.  Feedback/Pull Requests welcome.
 

Okay, looks like I managed to upload an incomplete non-working script instead 
of the one I was actually testing on my router.  

Thanks to those who pointed this out!

Corrected version is now up on Github - tested on SRX, ACX and MX (all single 
RE) 

Hey Phil, when can we have git native in Junos?!  ; )


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] BGP Peer formatting

2014-09-22 Thread Ben Dale


On 23 Sep 2014, at 5:57 am, Eugeniu Patrascu 
eu...@imacandi.netmailto:eu...@imacandi.net wrote:

On Mon, Sep 22, 2014 at 4:24 PM, Phil Shafer 
p...@juniper.netmailto:p...@juniper.net wrote:
Ben Dale writes:
 https://github.com/dfex/DFEXjunoscripts/blob/master/show-bgp-neat.slax

Very cool!

Hey Phil, when can we have git native in Junos?!  ; )

How about:

op url 
https://raw.githubusercontent.com/dfex/DFEXjunoscripts/master/show-bgp-neat.slax



--- JUNOS 12.1X44-D35.5 built 2014-05-19 22:11:33 UTC

 op url 
 https://raw.githubusercontent.com/dfex/DFEXjunoscripts/master/show-bgp-neat.slax

error: ^


error: 
/var/tmp/tmp_opzhxmSf/...transferring.file.DdJl9A/show-bgp-neat.slax:35:
 error: 
/var/tmp/tmp_opzhxmSf/...transferring.file.DdJl9A/show-bgp-neat.slax:34:
 parse error, unexpected T_BARE before 'set':

SNIP

Okay, one small caveat to this script - it looks like the use of mutable 
variables (mvar and set) was only introduced in SLAX 1.1 / Junos 12.2, so it's 
actually not going to work on older versions of Junos.

I know 11.4 is the trusted choice for most people on MX at the moment, so when 
I get some time I'll attempt a mind-bending re-write using the older immutable 
var format.

Stay tuned, and thanks again for all the direct feedback!

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] BGP Peer formatting

2014-09-22 Thread Ben Dale

On 23 Sep 2014, at 1:48 pm, Phil Shafer p...@juniper.net wrote:

 Ben Dale writes:
 Okay, one small caveat to this script - it looks like the use of mutable 
 variables (mvar
 and set) was only introduced in SLAX 1.1 / Junos 12.2, so it's actually not 
 going to wo
 rk on older versions of Junos.
 
 I know 11.4 is the trusted choice for most people on MX at the moment, so 
 when I get som
 e time I'll attempt a mind-bending re-write using the older immutable var 
 format.
 
 In this case, you don't need the mvars.  Let sum() do the iteration:
 
for-each ($neighbour-list/bgp-peer) {
output jcs:printf(%-20s%-15s%-12s%-10s%-10s%-10s%-10s%-5s,
peer-address,
peer-as,
peer-state,
elapsed-time,
   sum(bgp-rib/active-prefix-count),
   sum(bgp-rib/received-prefix-count),
   sum(bgp-rib/accepted-prefix-count),
description);   
}
 
 Thanks,
 Phil

Love your work Phil : )

That's a heck of a lot simpler/cleaner than the recursive monstrosity I've been 
putting together!

Changes have been pulled into github, so if you're running 11.4 or earlier, 
give it another try now.

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX9200 DHCP Relay

2014-09-18 Thread Ben Dale
SELECTING means that an OFFER has been sent to the client (or at least the 
switch thinks it has relayed it), but the REQUEST hasn't come back from the 
client.

I have seen this in some instances where the client is expecting a Unicast 
reply from the relay agent rather than a broadcast or vice-versa - fix with:

set forwarding-options dhcp-relay overrides layer2-unicast-replies

Nice tip on the route-suppression statement William - that one has been 
annoying me for a while with JDHCPd on the SRX...

Cheers,

Ben

On 19 Sep 2014, at 12:01 am, Chris Jones ch...@sdnessentials.com wrote:

 My DHCP clients are all stuck in SELECTING state. Has anyone ever seen that, 
 or maybe know what causes it?
 
 root@DVT-EX9200 show dhcp relay binding
 
 IP addressSession Id  Hardware address   Expires State  
 Interface
 0.0.0.0   18  00:25:90:3d:76:34  0   SELECTING  irb.30
 0.0.0.0   19  00:25:90:3d:e5:13  0   SELECTING  irb.30
 0.0.0.0   17  00:25:90:6d:f0:c3  0   SELECTING  irb.30
 0.0.0.0   23  d4:be:d9:95:b6:4f  0   SELECTING  irb.16
 
 
 
 
 On Sep 16, 2014, at 3:13 PM, William McLendon wimcl...@gmail.com wrote:
 
 this is a working DHCP config on EX9200s — make sure you include the 
 forward-snooped-clients all-interfaces statement, or any transit DHCP packet 
 that traverses an interface without DHCP relay configured will be eaten by 
 the EX9200 — its the most asinine thing in the world to have (a carryover 
 from MX some sort of DHCP security i’m sure), but its completely 
 undocumented it does this from what i’ve seen.
 
   dhcp-relay {
   forward-snooped-clients all-interfaces;
   server-group {
   CAMPUS {
   192.168.168.168;
   }
   }
   active-server-group CAMPUS;
   route-suppression {
   destination;
   }
   group LOCAL-NETS {
   interface ge-5/0/0.304;
   interface irb.9;
   }
   }
 }
 
 
 the route-suppression destination statement also prevents it from installing 
 access-internal host routes and permanent ARP entries for every DHCP lease.
 
 
 will
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 Chris Jones, JNCIE-ENT #272 / JNCIP-SP
 SDN Engineer
 www.sdnessentials.com
 Cell: 858-888-0373
 E-Mail: ch...@sdnessentials.com 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] VPN into M7i

2014-09-18 Thread Ben Dale
No Panny, the only VPN support on M-Series is IPSEC.

I would recommend a 3rd-party client like Shrewsoft 


On 17 Sep 2014, at 8:55 pm, Panny Malialis pa...@hotlinks.uk wrote:

 Hello,
 
 I'm looking for a simple example of a VPN into a Junos device with an ASII 
 pic from a Mac or PC (L2TP/PPTP) but can't seem to find anything?
 
 Is this even possible?
 
 Many Thanks
 
 Panny Malialis
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] BGP Peer formatting

2014-09-09 Thread Ben Dale

On 10 Sep 2014, at 7:54 am, Scott Harvanek scott.harva...@login.com wrote:

 This is a silly/OCD question;
 
 I've faced this before and I can't recall how it was prettied up...
 
 If I recall there is a way to pretty up the formatting of show bgp summary;
 
 Peer AS  InPkt OutPktOutQ   Flaps Last Up/Dwn 
 State|#Active/Received/Accepted/Damped...
 XXX.XXX.XXX.XXX   X4463666 120866   0   0 5w3d 
 9:31:20 Establ
  inet.0: 272410/510233/510233/0
 
 To remove the line break / fix the table formatting.  I've tried adjusting 
 screen-width with no joy.
 
 Halp?

There's a few ways to neaten it, but it's a case of which information you can 
live without:

show bgp summary | except inet 
show bgp group summary | match l:

Failing that, I just hacked up an op script to only show a summarised version 
from each peer - output here:

https://github.com/dfex/DFEXjunoscripts/blob/master/show-bgp-neat.md

Code here:

https://github.com/dfex/DFEXjunoscripts/blob/master/show-bgp-neat.slax

The script *should* sum all the prefixes from each RIB into a single summarised 
number per peer, but I haven't had a chance to test it too thoroughly yet.  
Feedback/Pull Requests welcome.

Cheers,

Ben



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] rpm / ip-monitoring

2014-08-29 Thread Ben Dale
Hi Mattias,

It is still possible to bend it to your will ; )

I may be misunderstanding your topology, but essentially you have a Primary 
link via a WAN circuit that receives a BGP-sourced default, and a backup ADSL 
connection that receives a default via DHCP/PPP, and has an IPSEC tunnel back 
to your head office.  Are you trying to move the default route to your IPSEC 
tunnel interface, or the underlying cheap line?

You could try the following:

Set up a static default with a high metric (so that it will lose to both DHCP 
and BGP) via your IPSEC tunnel/underlying link.  If the underlying link is not 
point-to-point (eg: you will need to know the far-side IP), you can point it 
down your IPSEC tunnel, or anywhere else - it should never actually get used):

set routing-options static route 0.0.0.0/0 next-hop at-1/0/0.0
set routing-options static route 0.0.0.0/0 preference 190

Then in your ip-monitoring policy, you can override this dummy route with a 
better metric than both BGP and DHCP:

set services ip-monitoring policy Local-Internet-Test match rpm-probe Internet
set services ip-monitoring policy Local-Internet-Test then preferred-route 
route 0.0.0.0/0 next-hop at-1/0/0.0
set services ip-monitoring policy Local-Internet-Test then preferred-route 
route 0.0.0.0/0 preferred-metric 1

Now when your test fails (even if BGP does not):

inet.0: 49 destinations, 51 routes (49 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

0.0.0.0/0 *[Static/1] 00:13:15, metric2 0
 via at-1/0/0.0
[Access-Internal/12] 00:21:45
 to 192.168.1.2 via at-1/0/0.0
[BGP/170] 2d 21:51:10, localpref 100
AS path: 65500 I, validation-state: unverified
 to 172.30.3.2 via ge-0/0/3.0


Cheers,

Ben

On 29 Aug 2014, at 3:30 am, Mattias Gyllenvarg 
matt...@gyllenvarg.semailto:matt...@gyllenvarg.se wrote:

Even is the default routes are both from dynamic protocols (BGP and DHCP).

For a regular static this is perfect.

No such luck in this sollution.

//Mattias


On Thu, Aug 28, 2014 at 4:17 PM, Ben Dale 
bd...@comlinx.com.aumailto:bd...@comlinx.com.au wrote:
Rather than making configuration changes, if you're running recent code (12.1) 
on branch SRX, have a look at the preferred-route option in ip-monitoring.

You can override your default route dynamically based on the RPM failing, 
without having to override config.

The day this is feature (and ip-monitoring in general) is merged back down to 
mainline Junos will be a glorious one...

Cheers,

Ben

On 28 Aug 2014, at 9:00 pm, Mattias Gyllenvarg 
matt...@gyllenvarg.semailto:matt...@gyllenvarg.se wrote:

 I have looked over these and they are the basis of the configuration I am
 using.

 The setup is advanced in some senses.

 The Primary link is a to an IP-VPN running BGP to the mpls cloud of a
 global operator.
 So, from there I get a default that I override with a static OR dynamic
 default to a local Internet connection that also serves as backup via IPsec
 (BGP on top of that too but peers with a HUB node and not the cloud).

 As the local internet is just a cheap line, I do not have the luxury of BGP
 and so must use some other metod like this one.

 What I would have want is to have the ip-monitor not actually disable the
 interface and just set the admin-distance for it to the worst level.

 That way the test would still work as it requests the packet be sent by the
 exact interface, but no other traffic would take this route unless all
 other options are down.

 //Mattias



 On Thu, Aug 28, 2014 at 10:50 AM, Darren O'Connor 
 darre...@outlook.commailto:darre...@outlook.com
 wrote:

 A small topology diagram would help so we could figure out exactly what
 this interface points to. Not sure if its in the path or not. If it is,
 then the below comments already state what the problem is.

 Thanks
 Darren
 http://www.mellowd.co.uk/ccie



 Date: Wed, 27 Aug 2014 17:52:02 -0700
 From: gonna...@gmail.commailto:gonna...@gmail.com
 To: juniper-nsp@puck.nether.netmailto:juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] rpm / ip-monitoring

 Instead of disabling the interface, can you just alter routing to avoid
 that path, but RPM could still test since that interface would still be
 up?

 -Mike Gonnason


 On Wed, Aug 27, 2014 at 5:37 PM, Tyler Christiansen 
 ty...@adap.tvmailto:ty...@adap.tv
 wrote:

 Good point.  I glossed over that a bit.

 In that case, you won't even be able to test if it's working or not as
 you
 have disabled it (as Andrew points out).  I suppose you could write a
 script that re-enables the interface every hour or twenty four hours or
 whatever interval, then the RPM probe would just shut it back down if
 it's
 not fixing, but that seems a bit of a hassle.

 --tc


 On Wed, Aug 27, 2014 at 4:35 PM, Andrew Jones 
 a...@jonesy.com.aumailto:a...@jonesy.com.au
 wrote:

 Surely the test will never recover without

Re: [j-nsp] rpm / ip-monitoring

2014-08-29 Thread Ben Dale
Okay, I'm still sure this can be made to work ; )

I'm still a little hazy on your setup though - based on your email:
You have a local line which gets an address via DHCP and a default gateway with 
a preference of 12
You then also receive another default via BGP over an IPSEC tunnel over this 
same local line interface with a preference of 170
You then have an MPLS service/Native VPN which receives another BGP-sourced 
default route, presumably also with a preference of 170

If that is the case, configure a static with high preference (170) pointing to 
your MPLS service/Native VPN, and override this with the lower preference route 
via your ip-monitoring policy on local-line/Internet failure - it should still 
work exactly as described, unless I'm missing something else?

Ben


On 29 Aug 2014, at 7:42 pm, Mattias Gyllenvarg 
matt...@gyllenvarg.semailto:matt...@gyllenvarg.se wrote:

Ben

Close but no cigar.

The IPsec also receives a default via BGP so that works like a charm. No need 
for interface routing.

The thing is that we use the local line for Internet use, so the primary 
default route goes out that way.
The IPsec is there if the Native VPN line fails.

So, what I want this ip-monitor/rpm to do is fail over the local internet to 
the Native VPN in case the local line is broken some how.

Regards
Mattias



On Fri, Aug 29, 2014 at 12:59 PM, Ben Dale 
bd...@comlinx.com.aumailto:bd...@comlinx.com.au wrote:
Hi Mattias,

It is still possible to bend it to your will ; )

I may be misunderstanding your topology, but essentially you have a Primary 
link via a WAN circuit that receives a BGP-sourced default, and a backup ADSL 
connection that receives a default via DHCP/PPP, and has an IPSEC tunnel back 
to your head office.  Are you trying to move the default route to your IPSEC 
tunnel interface, or the underlying cheap line?

You could try the following:

Set up a static default with a high metric (so that it will lose to both DHCP 
and BGP) via your IPSEC tunnel/underlying link.  If the underlying link is not 
point-to-point (eg: you will need to know the far-side IP), you can point it 
down your IPSEC tunnel, or anywhere else - it should never actually get used):

set routing-options static route 0.0.0.0/0http://0.0.0.0/0 next-hop at-1/0/0.0
set routing-options static route 0.0.0.0/0http://0.0.0.0/0 preference 190

Then in your ip-monitoring policy, you can override this dummy route with a 
better metric than both BGP and DHCP:

set services ip-monitoring policy Local-Internet-Test match rpm-probe Internet
set services ip-monitoring policy Local-Internet-Test then preferred-route 
route 0.0.0.0/0http://0.0.0.0/0 next-hop at-1/0/0.0
set services ip-monitoring policy Local-Internet-Test then preferred-route 
route 0.0.0.0/0http://0.0.0.0/0 preferred-metric 1

Now when your test fails (even if BGP does not):

inet.0: 49 destinations, 51 routes (49 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

0.0.0.0/0http://0.0.0.0/0 *[Static/1] 00:13:15, metric2 0
 via at-1/0/0.0
[Access-Internal/12] 00:21:45
 to 192.168.1.2 via at-1/0/0.0
[BGP/170] 2d 21:51:10, localpref 100
AS path: 65500 I, validation-state: unverified
 to 172.30.3.2 via ge-0/0/3.0


Cheers,

Ben

On 29 Aug 2014, at 3:30 am, Mattias Gyllenvarg 
matt...@gyllenvarg.semailto:matt...@gyllenvarg.se wrote:

Even is the default routes are both from dynamic protocols (BGP and DHCP).

For a regular static this is perfect.

No such luck in this sollution.

//Mattias


On Thu, Aug 28, 2014 at 4:17 PM, Ben Dale 
bd...@comlinx.com.aumailto:bd...@comlinx.com.au wrote:
Rather than making configuration changes, if you're running recent code (12.1) 
on branch SRX, have a look at the preferred-route option in ip-monitoring.

You can override your default route dynamically based on the RPM failing, 
without having to override config.

The day this is feature (and ip-monitoring in general) is merged back down to 
mainline Junos will be a glorious one...

Cheers,

Ben

On 28 Aug 2014, at 9:00 pm, Mattias Gyllenvarg 
matt...@gyllenvarg.semailto:matt...@gyllenvarg.se wrote:

 I have looked over these and they are the basis of the configuration I am
 using.

 The setup is advanced in some senses.

 The Primary link is a to an IP-VPN running BGP to the mpls cloud of a
 global operator.
 So, from there I get a default that I override with a static OR dynamic
 default to a local Internet connection that also serves as backup via IPsec
 (BGP on top of that too but peers with a HUB node and not the cloud).

 As the local internet is just a cheap line, I do not have the luxury of BGP
 and so must use some other metod like this one.

 What I would have want is to have the ip-monitor not actually disable the
 interface and just set the admin-distance for it to the worst level.

 That way the test would still work

Re: [j-nsp] rpm / ip-monitoring

2014-08-28 Thread Ben Dale
Rather than making configuration changes, if you're running recent code (12.1) 
on branch SRX, have a look at the preferred-route option in ip-monitoring.

You can override your default route dynamically based on the RPM failing, 
without having to override config.  

The day this is feature (and ip-monitoring in general) is merged back down to 
mainline Junos will be a glorious one...

Cheers,

Ben

On 28 Aug 2014, at 9:00 pm, Mattias Gyllenvarg matt...@gyllenvarg.se wrote:

 I have looked over these and they are the basis of the configuration I am
 using.
 
 The setup is advanced in some senses.
 
 The Primary link is a to an IP-VPN running BGP to the mpls cloud of a
 global operator.
 So, from there I get a default that I override with a static OR dynamic
 default to a local Internet connection that also serves as backup via IPsec
 (BGP on top of that too but peers with a HUB node and not the cloud).
 
 As the local internet is just a cheap line, I do not have the luxury of BGP
 and so must use some other metod like this one.
 
 What I would have want is to have the ip-monitor not actually disable the
 interface and just set the admin-distance for it to the worst level.
 
 That way the test would still work as it requests the packet be sent by the
 exact interface, but no other traffic would take this route unless all
 other options are down.
 
 //Mattias
 
 
 
 On Thu, Aug 28, 2014 at 10:50 AM, Darren O'Connor darre...@outlook.com
 wrote:
 
 A small topology diagram would help so we could figure out exactly what
 this interface points to. Not sure if its in the path or not. If it is,
 then the below comments already state what the problem is.
 
 Thanks
 Darren
 http://www.mellowd.co.uk/ccie
 
 
 
 Date: Wed, 27 Aug 2014 17:52:02 -0700
 From: gonna...@gmail.com
 To: juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] rpm / ip-monitoring
 
 Instead of disabling the interface, can you just alter routing to avoid
 that path, but RPM could still test since that interface would still be
 up?
 
 -Mike Gonnason
 
 
 On Wed, Aug 27, 2014 at 5:37 PM, Tyler Christiansen ty...@adap.tv
 wrote:
 
 Good point.  I glossed over that a bit.
 
 In that case, you won't even be able to test if it's working or not as
 you
 have disabled it (as Andrew points out).  I suppose you could write a
 script that re-enables the interface every hour or twenty four hours or
 whatever interval, then the RPM probe would just shut it back down if
 it's
 not fixing, but that seems a bit of a hassle.
 
 --tc
 
 
 On Wed, Aug 27, 2014 at 4:35 PM, Andrew Jones a...@jonesy.com.au
 wrote:
 
 Surely the test will never recover without intervention, as the
 interface
 it uses gets disabled?
 
 
 On 28.08.2014 02:28, Tyler Christiansen wrote:
 
 I could be mistaken, but I believe it automatically reverts when the
 test
 is successful unless you specify no-preempt.
 
 
 On Wed, Aug 27, 2014 at 12:50 AM, Mattias Gyllenvarg 
 matt...@gyllenvarg.se
 wrote:
 
 Dear List
 
 I have a rpm /ip-monitor setup that is supposed to test the
 function
 of a
 local internet line (ping internet destination).
 
 And disable it if it is not responding.
 
 This works fine BUT, how do I get it to re-enable when it is
 working
 again.
 
 I need this to work with DHCP so I cannot work with a default
 route.
 
 
 **
 
 services {
rpm {
probe Internet {
test PING-GOOGLE-DNS {
target address 8.8.8.8;
probe-count 5;
probe-interval 2;
test-interval 20;
thresholds {
total-loss 4;
}
destination-interface fe-0/0/3.0;
}
}
}
ip-monitoring {
policy Local-Internet-Test {
match {
rpm-probe Internet;
}
then {
interface fe-0/0/3 {
disable;
}
}
}
}
 }
 
 *
 
 --
 *Med Vänliga Hälsningar / Best Regards*
 *Mattias Gyllenvarg*
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 --
 
 *Tyler Christiansen | Technical Operations*
 tyler http://adap.tv/@adap.tv http://adap.tv/ | www.adap.tv
 *m :* 864.346.4095
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 

Re: [j-nsp] Viability of EX4300 in a primarily l3 environment?

2014-08-06 Thread Ben Dale
I believe this to be the case as well - when you run a mixed-mode virtual 
chassis (45/42) you end up moving the entire chassis to the lowest common 
denominator (45xx) and reducing your ARP table size down to 8K along with 
associated routing entries .

There's a nice side-by-side of the whole range here:

http://www.juniper.net/fragment.do?xmlPath=/cn/zh/products-services/switching/ex-series/modules/product-comparison.xmlxslPath=/shared/xsl/product-compare/compare.xslcompPP=trueheight=300

Ben

On 7 Aug 2014, at 3:07 am, Tyler Christiansen ty...@adap.tv wrote:

 On Wed, Aug 6, 2014 at 6:59 AM, Paul S. cont...@winterei.se wrote:
 
 That lower arp limit is precisely why we're looking at the 4300, though.
 
 Which, by the way, does anyone happen to know if the arp limit stays the
 same when the 4200s are put into VC mode -- or do they increase at all?
 
 ​
 I believe ARP is handled by the RE, so in a virtual chassis, the ARP limit
 would be the same.  I could be wrong, though.
 
 --tc
 ​
 
 
 On 8/6/2014 午後 10:31, Scott Granados wrote:
 
 +1 on the 4200.
 
 Had very good luck with the 4200 series.  Also had good luck with the
 4300 but there were some bugs.  In a basic operation mode though they are
 quite stable.  That being said I was really pleased with the 4200 and you
 might want to check them out assuming the lower arp limit isn’t an issue.
 
 On Aug 6, 2014, at 7:30 AM, Yucong Sun sunyuc...@gmail.com wrote:
 
 I used ex4200 to do exactly what you did before.  ex4200 releases is
 pretty
 rock solid, feature extensive, although with lower arp entry limits.
 
 Given the price difference maybe you can connect each l2 domain to its
 own
 ex4200 and have them do ospf routing among selves, which maybe give you
 better failure tolerances compare to a single core.
 
 
 On Wed, Aug 6, 2014 at 6:35 PM, Giuliano Cardozo Medalha 
 giuli...@wztech.com.br wrote:
 
 we are using ex4300 with the last release available
 
 the setup is pretty simple using virtual chassis, lag, L3 and poe
 
 it works pretty fine and we do not have any serious problems
 
 sometimes the poe controller goes down but we have a case oppened in
 jtac
 to try solve it
 
 Sent from my iPhone
 
 On 06/08/2014, at 07:15, Sebastian Wiesinger 
 juniper-...@ml.karotte.org
 
 wrote:
 
 * Paul S. cont...@winterei.se [2014-08-02 05:18]:
 
 Hi folks,
 
 We're considering the EX4300 to run routing (l3) for a few
 hypervisors of ours that are connected via l2.
 
 Primarily interested due to the rather massive arp limit (64, 000)
 on the switch, but we've been told (and searched for ourselves to
 find out) that the 4300 platform has been plagued by random issues
 since launch.
 
 I don't have hands-on experience but I looked at the EX4300 platform
 for a new deployment. If you look at the current release notes:
 
 
 http://www.juniper.net/techpubs/en_US/junos13.2/
 information-products/topic-collections/ex-qfx-series/
 release-notes/ex-qfx-series-junos-release-notes-13.2X51-D25.pdf
 
 There are a lot of (serious) bugs still getting fixed so I'm not sure
 how mature this platform is. One big reason for that is probably
 because EX4300 uses other chips than the rest of the 4xxx series
 (Broadcom).
 
 Regards
 
 Sebastian
 
 --
 GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0
 B9CE)
 'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE
 THE
 
 SCYTHE.
 
   -- Terry Pratchett, The Fifth Elephant
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 -- 
 
 *Tyler Christiansen | Technical Operations*
 tyler http://adap.tv/@adap.tv http://adap.tv/ | www.adap.tv
 *m :* 864.346.4095
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] config msti vlan range?

2014-07-21 Thread Ben Dale
Hi Victor,

It's pretty straightforward:

set protocols mstp msti 5 vlan [10-50 60-90]

Cheers,

Ben

On 22 Jul 2014, at 1:22 pm, Victor Sudakov v...@mpeks.tomsk.su wrote:

 Colleagues,
 
 I have now the following configuration:
 
 admin@sw-km270# show protocols mstp msti 2
 vlan [ management ENERGY NATEKS PASOLINK-Management MNCS ITSO ];
 
 How do I replace the explicit list of vlans with a range like
 10500 ?  What's the configuration command syntax?
 
 I suppose it's a general Junos syntax question (using ranges of
 values) but somehow I cannot find the obvious. Thanks a lot for helping.
 
 
 -- 
 Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
 sip:suda...@sibptus.tomsk.ru
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Could you pls clarify a bit about OAM for link fault management?

2014-07-11 Thread Ben Dale
Hi Victor,

Something like this should do the trick once you've configured it on both ends:

set protocols oam ethernet link-fault-management action-profile UDLD event 
link-adjacency-loss
set protocols oam ethernet link-fault-management action-profile UDLD action 
syslog
set protocols oam ethernet link-fault-management action-profile UDLD action 
link-down
set protocols oam ethernet link-fault-management interface ge-0/0/23.0 
apply-action-profile UDLD

We had a similar issue to solve at some sites connected via Free-Space Optics 
units.

Cheers,

Ben

On 11 Jul 2014, at 12:45 pm, Victor Sudakov v...@mpeks.tomsk.su wrote:

 Colleagues,
 
 I have pairs of EX4200 switches connected via third party MUXes. When
 the actual physical medium goes down, the MUXes do not shutdown their
 Ethernet interfaces. So I need some sort of point-to-point L2 link fault
 management between the EX4200s.
 
 I thought OAM could be used for this purpose. However after reading
 http://www.juniper.net/techpubs/en_US/junos9.4/topics/task/configuration/lfm-ethernet-oam-configuring-ex-series-cli.html
 and references therein I am a bit confused. I don't need those
 remote-loopback and allow-remote-loopback features, profiles and
 other complicated stuff, do I? 
 
 All I need from OAM is some kind of L2 keepalive. Do you have a good
 configuration example?
 
 Thanks a lot for any input.
 
 -- 
 Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
 sip:suda...@sibptus.tomsk.ru
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] warning: dhcp-service subsystem not running - not needed by configuration

2014-07-07 Thread Ben Dale
Hi Victor,

There are actually two completely different DHCP daemons in Junos now - dhcpd 
and jdhcpd.

When you configure statements under system / services / dhcp you are using 
dhcpd and will need to use:

show system services dhcp server binding
restart dhcp

When you configure statements under system / services / dhcp-local-server you 
are affecting jdhcpd and need to use:

show dhcp server binding 
restart dhcp-service

The two are mutually exclusive (for obvious reasons).

Cheers,

Ben

On 7 Jul 2014, at 8:32 pm, Victor Sudakov v...@mpeks.tomsk.su wrote:

 Dave Bell wrote:
 As per 
 http://forums.juniper.net/t5/Ethernet-Switching/DHCP-service/td-p/14917
 
 try running
 'restart dhcp gracefully'
 
 I have tried that, makes no difference:
 
 admin@sw-km337 restart dhcp gracefully
 Dynamic Host Configuration Protocol process started, pid 65064
 
 {master:0}
 admin@sw-km337 show dhcp server binding
 warning: dhcp-service subsystem not running - not needed by configuration.
 
 {master:0}
 admin@sw-km337
 
 From /var/log/messages:
 
 Jul  7 17:29:30  sw-km337 mgd[65061]: UI_RESTART_EVENT: User 'admin' 
 restarting daemon 'Dynamic Host Configuration Protocol process'
 Jul  7 17:29:30  sw-km337 init: dhcp (PID 65062) exited with status=0 Normal 
 Exit
 Jul  7 17:29:30  sw-km337 init: dhcp (PID 65064) started
 
 
 -- 
 Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
 sip:suda...@sibptus.tomsk.ru
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX FBR and destination nat

2014-06-26 Thread Ben Dale
Hi Yuriy,

This exact configuration is documented quite thoroughly in Recipe 12 in the Day 
One: Juniper Ambassadors' Cookbook for Enterprise found here:

http://www.juniper.net/us/en/community/junos/training-certification/day-one/networking-technologies-series/cookbook-for-enterprise/

Credit for this particular one (and the 5 different solutions provided!) goes 
to Peter Klimai! 

Cheers,

Ben

On 26 Jun 2014, at 11:39 pm, Yuriy B. Borysov yokod...@yokodzun.kiev.ua wrote:

 Hello!
 
 I have two connections to the ISP on SRX220H (12.1X45-D15.5). 
 
 ISP1 - 1.1.1.2 on my side, 1.1.1.1 - gw (int pp0.0)
 ISP2 - 2.2.2.2 on my side, 2.2.2.1 - gw (int pp0.1)
 
 Default gateway looks in to pp0.1 
 
 I need to do destination nat to host in lan PC (10.121.0.101) via non 
 default ISP1 (int pp0.0).
 
 First of all, configure FBR for LAN network via pp0.0:
 
 routing-options 
 interface-routes {
rib-group inet all;
}
 
 .
 
 rib-groups {
all {
import-rib [ inet.0 cat.inet.0 ];
   }
 
 .
 
 cat {
instance-type forwarding;
routing-options {
   static {
 route 0.0.0.0/0 next-hop pp0.0;
   }
   }
 }
 
 ..
 
 firewall family inet filter cat
 term route-to-cat {
from {
source-address {
10.121.0.0/24;
}
}
then {
routing-instance cat;
}
 }
 term default {
then accept;
 }
 
 .
 
 interfaces ge-0/0/0.99 
 description cctv;
 vlan-id 99;
 family inet {
mtu 1500;
filter {
input cat;
}
address 10.121.0.200/24;
 }
 
 .
 
 security policies from-zone cctv to-zone untrust 
 policy proxmox-inet {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
 }
 
 security policies from-zone untrust to-zone cctv
 policy cctv-access {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
 }
 
 
 Everything looks OK, outgoing traffic goes via pp0.0
 
 After that, configure dest nat:
 
 pool cctv-rdr {
address 10.121.0.101/32;
 }
 
 rule-set cctv-rdr {
from interface pp0.0;
rule cctv-rdr { 
match {
destination-address 1.1.1.2/32;
}
then {
destination-nat {
pool {
cctv-rdr;
}
}
}
}
 }
 
 
 Traffic comes through pp0.0 but returns through pp0.1
 That breaks port forward (due to uplink urpf).
 
 Where I'm wrong in my configuration?
 
 Thanks!
 
 
 -- 
 WBR, Yuriy B. Borysov
 YOKO-UANIC | YOKO-RIPE
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Small P Router Recommendations

2014-06-04 Thread Ben Dale

On 5 Jun 2014, at 12:00 pm, Geoff Crawford geoff.crawf...@cwct.ca wrote:

 Hi guys!
 
 I'm a Juniper fan too, but I'll take a non-Juniper answer today. Seems to be 
 an MPLS heavily oriented list, so I figured you guys would know.
 
 I'm sure we'd all love an EX3200 take could run LDP, pack more than 1 label 
 and do it over aggregated interfaces. Is anyone else making a box that can do 
 that?

If you're after a switch that'll do MPLS/L3VPN, check out the QFX5100.  All 
10/40G though which might not be what you're after.

 
 Need to aggregate a bunch of SRXs, and drag it back to the office. I was 
 thinking, would there be any ill-effects to building a larger subnet and 
 connecting all the SRXes together with a standard L2 switch, and then have 
 the switch uplink to the closest P router? Sure would be nice for adding more 
 boxes in the future, no need to touch the P.

Why not just run another SRX as a PE and aggregate via that?  The MPLS 
feature-set is pretty comprehensive - L2VPN, VPLS, L3VPN, L2Circuit etc.

 
 Oh, and have they got L3VPN/VPLS figured out on the ACX yet?

L3VPN works just fine, but L2 services are coming soon.

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX104 with full BGP table problems

2014-05-18 Thread Ben Dale
 
 You can cool a Sandy/Ivy Bridge CPU in a laptop at +40C degrees in direct
 sunlight outside (e.g. Panasonic Thoughbook) and they can't cool the same
 type of CPU in a datacenter with ~20-22 degrees ambient temperature and
 very powerful fans that are present in a router? I doubt it that the Xeon
 versions of those CPUs produce much more heat. Factor in the fact that they
 can go all SSD and you can have a very small package that can act as a RE
 (think of a very mini mini version of Intel NUC).

The 104s are rated for use in -40 to +65° C and based on the form-factor are 
designed for use in areas a little less comfortable than your average data 
centre (places where MX80s are not designed to go like de-mountables/cabinets). 

 There has to be another reason for the crappy REs in these routers.

Yeah, I'm kinda surprised the 104s maintained the same CPU, but I guess it 
meant much less code re-spin.  

Looking forward to the day when there is a commonish RE (eg: intel-based) for 
all REs across the fleet.  You would think this would save a pile of 
development work...


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] ACX1xxx Images

2014-05-13 Thread Ben Dale
Hi Skeeve,

The ACX1100 AC units have dual PSUs built-in - there are two C16 sockets on the 
front left of the unit.

I can send you a photo, but there is a nice drawing on Page 4 (and 43) of the 
hardware guide:

http://www.juniper.net/techpubs/en_US/release-independent/junos/information-products/topic-collections/hardware/acx-series/acx1000/hwguide/acx1000-hwguide.pdf

Cheers,

Ben

On 14 May 2014, at 8:56 am, Skeeve Stevens 
skeeve+juniper...@eintellegonetworks.com wrote:

 Hey all,
 
 I am trying to find a picture of the ACX1000 and ACX1100 so I can see how
 they do the redundant power that they claim in the sales information, but
 all the images on the Juniper Image Library and google are of DC units.
 
 If anyone could shoot me a couple of photos, that would be awesome.
 
 If someone could also confirm they do redundant power, that would be
 fantastic.
 
 ...Skeeve
 
 *Skeeve Stevens - *eintellego Networks Pty Ltd
 ske...@eintellegonetworks.com ; www.eintellegonetworks.com
 
 Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
 
 facebook.com/eintellegonetworks ;  http://twitter.com/networkceoau
 linkedin.com/in/skeeve
 
 twitter.com/theispguy ; blog: www.theispguy.com
 
 
 The Experts Who The Experts Call
 Juniper - Cisco - Cloud - Consulting - IPv4 Brokering
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX Active/Passive cluster with redundant route based IPSec - connectivity to AWS VPC

2014-05-05 Thread Ben Dale
Further to Morgan and Andrew's comments, the st0 interface will follow 
whichever interface you have bound to the external-interface in your IKE 
Gateway configuration (ge-0/0/0.0 in the AWS example), so if you bind this to a 
reth (and have the st0 interface in the same redundancy group) you'll be golden.



On 6 May 2014, at 10:44 am, Morgan McLean wrx...@gmail.com wrote:

 Andy,
 
 Assuming you have your own IP space, you put a public address on the
 loopback. Whichever member is active for lo0 will handle the IPSEC if i
 recall.
 
 Theres some juniper docs on the details. ST0 will always be on which ever
 node is primary.
 
 Thanks,
 Morgan
 
 
 On Mon, May 5, 2014 at 5:37 PM, Andrew Jones a...@jonesy.com.au wrote:
 
 You don't need to do anything special to make the st0 interface redundant,
 it will always run on the active node.
 
 
 On 06.05.2014 08:38, Andy Litzinger wrote:
 
 Hi Morgan,
 
 I presume that with regards to the loopback you are referring to the
 external interface I use as my IPSec peer toward Amazon?
 
 what about the internal logical st interface that I need to create in
 order
 to route my internal traffic into the tunnel?  How do I make that
 redundant?
 
 thanks!
 -andy
 
 
 On Mon, May 5, 2014 at 3:30 PM, Morgan McLean wrx...@gmail.com wrote:
 
 Use your loopback and put that in a reth.
 
 Thanks,
 Morgan
 
 
 On Mon, May 5, 2014 at 3:23 PM, Andy Litzinger 
 andy.litzinger.li...@gmail.com wrote:
 
 Hi All,
  Two related questions.  I have a pair of SRX 3400s in an
 Active/Passive
 cluster.  They rely on an external gateway for internet access (i.e. my
 ISPs don't terminate on the SRXs).  I am setting up redundant tunnels to
 an
 AWS VPC.  Amazon has an example for J-Series (
 
 http://docs.aws.amazon.com/AmazonVPC/latest/
 NetworkAdminGuide/Juniper.html
 ),
 but I don't think it's for a cluster set-up.
 
 Here are my questions:
 
 1 - If I want to set up a redundant secure tunnel interface (e.g. st0),
 should i bind it to an reth interface?
 
 2 - Has anyone connected an Active/Passive SRX cluster to an AWS VPC?
 Any
 tips or tricks you care to share?
 
 regards,
 -andy
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] apply-path regex for specific interface matching

2014-04-07 Thread Ben Dale

On 7 Apr 2014, at 6:37 pm, Dave Bell 
m...@geordish.orgmailto:m...@geordish.org wrote:

I'm not sure you can do exactly what you are interested in. I would use two 
prefix lists as follows.

policy-options {
prefix-list list1 {
apply-path interfaces ae* unit * family inet address *;
}
prefix-list list2 {
apply-path interfaces ge-1/[01]/[0-5] unit * family inet address 
*;
}
}


Thanks Dave and Tim - looks like multiple lists will have to do.





On 7 April 2014 02:45, Ben Dale 
bd...@comlinx.com.aumailto:bd...@comlinx.com.au wrote:
Dredging up an old thread here, but I have a requirement for an apply-path that 
matches ae* and ge-1/[01]/[0-4] unit * (for a prefix-list).

I must be missing something fundamental about the regex you can use in 
apply-path though, because all combinations I've tried seem to fail.

About as close as I can get to something that actually gives me results is 
interfaces [ae|ge-1/0/]* unit * family net address * which isn't all 
that useful.

It doesn't look like apply-path supports any nesting of regexes either eg: 
interfaces [ae|ge-1/[01]/]* returns no results at all

Any thoughts?

On 26 Feb 2014, at 1:48 pm, Michael Gehrmann 
mgehrm...@macquarietelecom.commailto:mgehrm...@macquarietelecom.com wrote:

 Hi Ben,

 I believe this document on the juniper site is what you were looking for.

 http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept/junos-cli-wildcard-characters-configuration-groups-usage.html

 Cheers
 Mike

 -Original Message-
 From: juniper-nsp 
 [mailto:juniper-nsp-boun...@puck.nether.netmailto:juniper-nsp-boun...@puck.nether.net]
  On Behalf Of Ben Dale
 Sent: Wednesday, 26 February 2014 9:43 AM
 To: juniper-nsp@puck.nether.netmailto:juniper-nsp@puck.nether.net
 Subject: [j-nsp] apply-path regex for specific interface matching

 Hi all,

 I'm trying to generate a prefix-list for all CE-facing interfaces on a PE 
 (assume L3VPN).

 As a test, I'm just trying to match all ge interfaces, but the following 
 returns no match at all:

 prefix-list CE-LINKS {
apply-path interfaces ge-* unit * family inet address *; }

 I've tried both ge*, ge-* but no luck either way, and as soon as I remove 
 ge-, I get all interface prefixes as expected.

 I vaguely remember a post here on this a while back, but I haven't been able 
 to track it down and google/Juniper docs are not providing any info.

 Is anyone aware of 1) a solution, or 2) any docs that go through what regex 
 is actually available in apply-path?

 Thanks,

 Ben

 ___
 juniper-nsp mailing list 
 juniper-nsp@puck.nether.netmailto:juniper-nsp@puck.nether.net 
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list 
juniper-nsp@puck.nether.netmailto:juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Are IRB interfaces still not functional under SRX?

2014-04-02 Thread Ben Dale
On the branch at least - if you configure an irb interface, the box will fail 
commit check unless it is in transparent mode and it is only useable for 
management

On 3 Apr 2014, at 7:05 am, Per Westerlund p...@westerlund.se wrote:

 I'm offline right now, but last time I checked, IRBs with bridge domains (SRX 
 in transparent/L2 mode) were only used for management, no forwarding of 
 transit traffic possible.
 
 /Per
 
 2 apr 2014 kl. 21:46 skrev Morgan McLean wrx...@gmail.com:
 
 Just double checking that IRB interfaces are not able to be used for
 routing under the SRX3k and 5k series? I have a customer asking to have
 cabinets uplink directly to the SRX3600 (no cluster), which means I'd have
 to use bridge domains.
 
 But, I don't think this will even work. Am I correct?
 
 Thanks,
 Morgan
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Best device to fit for a project

2014-04-01 Thread Ben Dale
SRX550 is pretty much your only option in the branch if you require dual power 
supply, but is in every other way overspecced (and thus priced) for the 
remainder of your branch requirements.  If you can do without the RPS, then I'd 
go with either an SRX220 or 240, which will easily handle the remainder of your 
requirements.

Are you sure you want 7-10GBps of IPSEC?  I'm not sure what market you're in, 
but I don't imagine a 10Gbps WAN port is particularly cheap from your carrier 
(since you list price as being important).  

If you absolutely need this much crypto though, then you'll be looking at 
somewhere between an SRX650 and an SRX1400 plus appropriate 10G XPM/IOC.

As for scalability - no issues - the 650 will support up to 3,000 tunnels and 
the 1400 was good for about 15,000 last time I looked - it's probably gotten 
better since then.

Ben

On 1 Apr 2014, at 4:37 pm, R S dim0...@hotmail.com wrote:

 For a project (70 branch offices and 2 Headquarters connected in an hubspoke 
 topology with IPSEC over MPLS among branch and HQ) I’m looking for the best 
 device which cover the following items:
 
 Branch:
 Single device 
 At least two Ethernet interfaces (WAN/LAN)
 Ipsec supporting 10-50-100 Mbs
 Routing protocols such as BGP-OSPF
 NAT
 Redundant power supply (some site not but in principle I need it)
 
 HeadQuarter:
 Single device with XE intf 
 At least two Ethernet interfaces (WAN/LAN)
 IPSEC supporting up to 7-10 Gbs of IPSEC (the sum of branches)
 Routing protocols such as BGP-OSPF
 NAT
 Redundant power supply
 
 Firewall is not needed, MPLS will be runned by the carrier, the devices and 
 IPSEC are on-top of MPLS.
 I’m looking for the best solution in terms of scalability and price (very 
 important).
 
 Also any advice with experience for the decision is appreciated.
 
 Regards
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Best device to fit for a project

2014-04-01 Thread Ben Dale
Check out AutoVPN as well:

http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/security-autovpn-spoke-authentication-understanding.html

It's hub-and-spoke (as opposed to full-mesh) and a little simpler than GDOI, 
but you do take the overhead of having to managing PKI across your fleet.

Ben

On 1 Apr 2014, at 6:17 pm, Per Westerlund p...@westerlund.se wrote:

 Another possibility is a cluster of units to take care of the dual PSU 
 requirement.
 
 For the low end you can mount 2 SRX100 in a 1U tray, and make them a cluster. 
 Will not handle 100Mbps IPsec, but will do 10 Mbps easily, perhaps 50 Mbps 
 depending on how you count and configure (50 bidir is actually 100 in 
 processing power etc). None of the branch SRX have crypto chip, all IPsec is 
 done in CPU, have to watch that.
 
 Clustered 220/240 would take care of dual PSU for 100 Mbps IPsec, but 
 unfortunately two boxes.
 
 I don’t have pricing available and don’t run any of these myself, but what 
 about a small MX5 (or similar) with service-card (MS-MIC) for the hub site? 
 It claims throughput of 9Gbps. Would that fit the bill instead of the bigger 
 SRX boxes?
 
 /Per
 
 PS: With plain IPsec, no internet tunnel requirement, and SRX everywhere, you 
 can use GDOI (Group VPN, Cisco: GET VPN), but unfortunately that does not 
 work with clusters. Can’t have both right now, sorry. Saves lots of problems 
 managing pre-shared keys etc.
 
 1 apr 2014 kl. 09:36 skrev Ben Dale bd...@comlinx.com.au:
 
 SRX550 is pretty much your only option in the branch if you require dual 
 power supply, but is in every other way overspecced (and thus priced) for 
 the remainder of your branch requirements.  If you can do without the RPS, 
 then I'd go with either an SRX220 or 240, which will easily handle the 
 remainder of your requirements.
 
 Are you sure you want 7-10GBps of IPSEC?  I'm not sure what market you're 
 in, but I don't imagine a 10Gbps WAN port is particularly cheap from your 
 carrier (since you list price as being important).  
 
 If you absolutely need this much crypto though, then you'll be looking at 
 somewhere between an SRX650 and an SRX1400 plus appropriate 10G XPM/IOC.
 
 As for scalability - no issues - the 650 will support up to 3,000 tunnels 
 and the 1400 was good for about 15,000 last time I looked - it's probably 
 gotten better since then.
 
 Ben
 
 On 1 Apr 2014, at 4:37 pm, R S dim0...@hotmail.com wrote:
 
 For a project (70 branch offices and 2 Headquarters connected in an 
 hubspoke topology with IPSEC over MPLS among branch and HQ) I’m looking 
 for the best device which cover the following items:
 
 Branch:
 Single device 
 At least two Ethernet interfaces (WAN/LAN)
 Ipsec supporting 10-50-100 Mbs
 Routing protocols such as BGP-OSPF
 NAT
 Redundant power supply (some site not but in principle I need it)
 
 HeadQuarter:
 Single device with XE intf 
 At least two Ethernet interfaces (WAN/LAN)
 IPSEC supporting up to 7-10 Gbs of IPSEC (the sum of branches)
 Routing protocols such as BGP-OSPF
 NAT
 Redundant power supply
 
 Firewall is not needed, MPLS will be runned by the carrier, the devices and 
 IPSEC are on-top of MPLS.
 I’m looking for the best solution in terms of scalability and price (very 
 important).
 
 Also any advice with experience for the decision is appreciated.
 
 Regards
   
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] system archival configuration and filenames

2014-04-01 Thread Ben Dale
Hi Victor,

This was discussed here a little while back - in short there is no way to 
archive them unzipped them except to have a server-side script monitoring the 
directory you FTP to and doing it for you.

As for the naming, that is odd - the standard format for these files is:

router-name_juniper.conf.n.gz_MMDD_HHMMSS

Cheers,

Ben

On 2 Apr 2014, at 4:11 am, Victor Sudakov v...@mpeks.tomsk.su wrote:

 Dear Colleagues,
 
 I have configured the following:
 
 admin@sw-us-parabel show configuration system archival
 configuration {
transfer-on-commit;
archive-sites {
ftp://cfg@10.14.140.125/  password $9$WqR8X-4oGiHm24; ## 
 SECRET-DATA
}
 }
 
 on an EX4200 with JUNOS 12.3R3.4.
 
 The files which end up on the FTP server look like this: 
 
 acc_transfer_link_3775
 acc_transfer_link_3811
 acc_transfer_link_3874
 
 and they come gzipped.
 
 How can I configure the archived configs to be a) plain text (not gzipped)
 and b) somehow related to the name of the switch?
 
 Thanks in advance for any ideas.
 
 -- 
 Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
 sip:suda...@sibptus.tomsk.ru
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX100 LDAP

2014-03-19 Thread Ben Dale
It's been a long time since I've played with this, but it's not something 
simple like:

set access-profile TPAD

is it?  The Junos doco doesn't mention it, but for some applications you need 
to specifically activate the access-profile.


On 18 Mar 2014, at 8:54 pm, Шепелев Андрей xamalon...@gmail.com wrote:

 Hi All !
 
 I`m trying to made a web portal auth with LDAP integration on SRX 100.
 
 Here is the config:
 
 ## Last changed: 2014-03-11 05:44:05 UTC
 version 11.2R4.3;
 system {
host-name test-srx100.adm.n.tp.ru;
root-authentication {
encrypted-password $1$yo2A3wox$K/.Epl658XW1r4Z9BgDWm0; ##
 SECRET-DATA
}
name-server {
10.60.0.5;
8.8.8.8;
}
services {
ssh;
telnet;
xnm-clear-text;
web-management {
http;
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
processes {
general-authentication-service {
traceoptions {
file auth-debug;
flag all;
}
}
}
 }
 interfaces {
fe-0/0/0 {
unit 0;
}
fe-0/0/1 {
vlan-tagging;
unit 101 {
description Users;
vlan-id 101;
family inet {
address 10.60.0.200/24;
}
}
unit 105 {
description Management;
vlan-id 105;
family inet {
address 172.20.0.200/24;
}
}
}
fe-0/0/2 {
unit 0;
}
fe-0/0/3 {
unit 0;
}
fe-0/0/4 {
unit 0;
}
fe-0/0/5 {
unit 0;
}
fe-0/0/6 {
unit 0;
}
fe-0/0/7 {
unit 0 {
description ISP1;
family inet {
address 46.250.34.22/24;
}
}
}
vlan {
unit 0;
}
 }
 routing-options {
static {
route 0.0.0.0/0 next-hop 46.250.34.1;
route 10.60.0.0/21 next-hop 10.60.0.1;
route 172.20.0.0/24 next-hop 172.20.0.1;
}
 }
 protocols {
stp;
 }
 security {
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set trust-to-untrust {
from zone trust;
to zone untrust;
rule source-nat-rule {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
}
policies {
from-zone trust to-zone untrust {
policy trust-to-untrust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
firewall-authentication {
pass-through {
access-profile TPAD;
web-redirect;
}
}
}
}
}
}
}
zones {
security-zone trust {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
fe-0/0/1.101;
fe-0/0/1.105;
}
}
security-zone untrust {
screen untrust-screen;
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
fe-0/0/0.0 {
host-inbound-traffic {
system-services {
dhcp;
tftp;
}
}
 

Re: [j-nsp] Disable STP on a port with ELS?

2014-03-08 Thread Ben Dale
I seem to recall reading that at least on the 4300 ELS, spanning-tree is now no 
longer implicitly enabled on every port, so disable is no longer required 
because it is the default state unless you have explicitly referenced the 
interface.

Would love to confirm this with someone who has access to either 4300, 9200 or 
QFX5100 in front of them

Ben
 On 9 Mar 2014, at 1:49 am, Chuck Anderson c...@wpi.edu wrote:
 
 Here is another Enhanced Layer 2 Software question.  Is it possible to
 disable STP participation on a port?  The disable command seems to
 be missing from these hierarchies, at least on 13.2X51 for QFX5100:
 
 protocols stp interface  disable
 protocols rstp interface  disable
 protocols mstp interface  disable
 protocols vstp interface  disable
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Ben Dale
If you're stuck with password-based login (rather than SSH keys), leave 
yourself one go at missing your password, then increase the backoff-factor up 
to 10 to put a 10-second wait for guess number 3:

set system services ssh root-login deny
set system login retry-options backoff-threshold 2
set system login retry-options backoff-factor 10

It won't stop a bot, but it will slow it down a bit.

Phil - while you're at it with Junos enhancements - any chance of giving us a

set system services ssh port 1024-65535

Yes it's security through obscurity, but it's also low hanging fruit..

Failing that, there is a:

set system login deny-sources

maybe an allow-sources might be a bit more useful in this instance?  Less 
sophisticated users tend to shoot themselves in the foot with firewall filters 
quite regularly.

Ben

On 27 Feb 2014, at 8:21 am, Harri Makela harri_mak...@yahoo.com wrote:

 Hi There
 
 I am constantly getting these log messages for last few days:-
 
 sshd[21015]: Failed password for root from X.X.103.152 port 21067 ssh2
 sshd[21016]: Received disconnect from X.X.103.152: 11: Normal Shutdown, Thank 
 you for playing
 
 
 Are these indicating any brute-force attack ?Thanks
 HM
 
 
 
 
 On Wednesday, 26 February 2014, 21:15, juniper-nsp-requ...@puck.nether.net 
 juniper-nsp-requ...@puck.nether.net wrote:
 
 Send juniper-nsp mailing list submissions to
 juniper-nsp@puck.nether.net
 
 To subscribe or unsubscribe via the World Wide Web, visit
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 or, via email, send a message with subject or body 'help' to
 juniper-nsp-requ...@puck.nether.net
 
 You can reach the person managing the list at
 juniper-nsp-ow...@puck.nether.net
 
 When replying, please edit your Subject line so it is more specific
 than Re: Contents of juniper-nsp digest...
 
 
 Today's Topics:
 
1. Re: proposed changes to clear bgp neighbor (ryanL)
2. Re: proposed changes to clear bgp neighbor (Phil Shafer)
3. Re: proposed changes to clear bgp neighbor (Eric Van Tol)
4. Re: proposed changes to clear bgp neighbor (Jerry Dent)
5. Re: proposed changes to clear bgp neighbor (Brent Sweeny)
6. Re: proposed changes to clear bgp neighbor
   (Fernando Garcia Fernandez)
7. Re: proposed changes to clear bgp neighbor (ryanL)
8. Re: proposed changes to clear bgp neighbor
   (Jonas Frey (Probe Networks))
9. Re: proposed changes to clear bgp neighbor (sth...@nethelp.no)
 
 
 --
 
 Message: 1
 Date: Wed, 26 Feb 2014 12:22:51 -0500
 From: ryanL ryan.lan...@gmail.com
 To: p...@juniper.net
 Cc: Juniper for Network Service Providers
 juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] proposed changes to clear bgp neighbor
 Message-ID:
 cak_-tsayrdjhuatsnbokn2nrkcrjjgb3zwtr_cljizkuxcx...@mail.gmail.com
 Content-Type: text/plain; charset=ISO-8859-1
 
 it's a nice-to-have, maybe? but this sounds more like an opportunity for
 you to sell some JNCIA courses. i mean, how long has junos been around now?
 
 
 On Wed, Feb 26, 2014 at 10:36 AM, Phil Shafer p...@juniper.net wrote:
 
 Juniper users,
 
 We've been asked to make a change the clear bgp neighbor command
 to make the neighbor or all argument mandatory.  The root cause
 is the severe impact of clear bgp neighbor and the increasing
 accidental use of this command without a specific neighbor.
 
 In general, we avoid changing commands to add mandatory arguments,
 but my feeling is that the impact and severity of this specific
 command makes this an acceptable occasion for such a change.
 
 I'm looking for feedback about this change.  My working assumption
 is that clear bgp neighbor is a sufficiently rare command and
 would not be used in automation/scripts, so the impact of making
 the neighbor/all argument mandatory would be minimal.  Is this
 assumption accurate?
 
 Thanks,
   Phil
 
 [I've set reply-to to myself to avoid impacting the list]
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 --
 
 Message: 2
 Date: Wed, 26 Feb 2014 13:44:42 -0500
 From: Phil Shafer p...@juniper.net
 To: ryanL ryan.lan...@gmail.com
 Cc: Juniper for Network Service Providers
 juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] proposed changes to clear bgp neighbor
 Message-ID: 201402261844.s1qiiggl031...@idle.juniper.net
 Content-Type: text/plain
 
 ryanL writes:
 it's a nice-to-have, maybe? but this sounds more like an opportunity for
 you to sell some JNCIA courses. i mean, how long has junos been around now?
 
 Not selling anything; just trying to solve a problem multiple
 customers have reported and escalated.  I'm a software developer,
 working on the UI code (CLI, MGD, configuration, XML API, scripting)
 for 17+ years.
 
 JUNOS 3.0 (the first release with the ui code) shipped during the
 

[j-nsp] apply-path regex for specific interface matching

2014-02-25 Thread Ben Dale
Hi all,

I'm trying to generate a prefix-list for all CE-facing interfaces on a PE 
(assume L3VPN).

As a test, I'm just trying to match all ge interfaces, but the following 
returns no match at all:

prefix-list CE-LINKS {
apply-path interfaces ge-* unit * family inet address *;
}

I've tried both ge*, ge-* but no luck either way, and as soon as I remove 
ge-, I get all interface prefixes as expected.

I vaguely remember a post here on this a while back, but I haven't been able to 
track it down and google/Juniper docs are not providing any info.

Is anyone aware of 1) a solution, or 2) any docs that go through what regex is 
actually available in apply-path?

Thanks,

Ben

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] VLAN's on EX4300 with 13.2X50-D15.3

2014-02-20 Thread Ben Dale

On 20 Feb 2014, at 6:00 pm, Per Granath per.gran...@gcc.com.cy wrote:

 For the mixed VC, the options are EX42+EX4550 or EX43+QFX.
 
 For VC, the EX42 uses VCP-cables, while the EX43 uses QSFP-DAC-cables 
 (assuming you do not want to waste your 10G ports).
 
 EX42 and EX43 has the same price.
 EX4550 is somewhat cheaper than QFX.

A word of caution on the same price between EX42/43:

If you want to use the EX4300 for L3 (and lets face it, that's probably 
everyone) you'll require the Enhanced Feature License for OSPFv2/3, IGMP v1/v2, 
PIM, VRF-Lite, QinQ and OAM.  EX4200 includes all this in the base license.

Both still require the Advanced Feature License for BGP, ISIS and MPLS.

If you want to install the Advanced Feature License on EX4300 though, you need 
to buy both the EFL *and* AFL.  

All features are still available for testing without licenses, but you get the 
nag message every minute in syslog.

All that said, being able to VC up to 5 of these things together with a 
dedicated 40G between any two is pretty darn cool.

Ben





___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] VLAN's on EX4300 with 13.2X50-D15.3

2014-02-19 Thread Ben Dale

On 20 Feb 2014, at 11:22 am, Mark Tinka mark.ti...@seacom.mu wrote:

 On Wednesday, February 19, 2014 10:47:33 PM Aaron Dewell 
 wrote:
 
 The main advantage of the 4300 vs. 4200 is 4x10G uplinks
 instead of 2, and 40G QSFP+ ports which can be either VC
 or routed.  It's a lot more flexible platform and much
 more compatible with others (read: QFX5100) than the
 EX4200 will ever be.
 
 Can anyone speak to buffer sizes and whether egress policing 
 is supported?
 
 Mark.

From what I've been able to gather, there is a single PFE on them with 5MB 
shared.

The feature guide suggests port/queue shaping is available and it mentions 
policing under Routing Policy/Packet Filtering features, but I suspect this is 
just the traditional filter-based stuff:

http://www.juniper.net/techpubs/en_US/release-independent/junos/topics/concept/ex-series-software-features-overview.html#cos-features-by-platform-table

Ben



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper Product against DDoS

2014-02-18 Thread Ben Dale
So I had a tech session on the DDoS Secure product a while back and my takeaway 
was that it is targeted at the low'n'slow style of DDoS rather than volumetric 
attacks that products like Arbour et. al. assist with mitigating - at the end 
of the day, you position it logically in front of your servers/LB (it's a 
transparent bridge).

In drastically simplified terms, it uses a truck load of heuristics and other 
magic™ to determine whether requests to your infrastructure are machine-based 
or interactive, and then depending on whether traffic flows are in profile or 
not (servers under load etc.), reacts.  Webcrawlers and other legit machine 
traffic are also handled gracefully.

The technology behind it looks quite interesting, and coupled with WebApp 
Secure/Mykonos it is certainly a different take on the typical mod_secure/WAF 
story for any content providers.

It would be nice if product marketing had picked a slightly less evocative name 
though - when someone says DDoS, I'm sure most think instantly of pipe-filling 
packet storms.

Ben 

On 19 Feb 2014, at 1:06 am, Benoit Plessis b.ples...@doyousoft.com wrote:

 Le 18/02/2014 15:46, Samol a écrit :
 Hi Experts,
 
 Does Juniper provide any DDoS solution ? would you please recommend the
 product line for this solution if there is?
 
 thanks,
 
 Hi,
 
 No expert here but there is the DDoS Secure appliance on there sales
 list, something from
 a company recently bougth (http://www.webscreen-technology.com/).
 
 It's a dell computer server hardware apparently, with a custom (up to
 where?) software.
 
 I should receive one shortly so shall see ...
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] VLAN's on EX4300 with 13.2X50-D15.3

2014-02-18 Thread Ben Dale
Hi Janusz,

You may want to read through this document too:

http://www.juniper.net/techpubs/en_US/junos13.2/topics/task/configuration/getting-started-els.html

there are quite a few changes to the way you're used to doing things with VLANs 
and interfaces on EX4300s, which you'll find incredibly frustrating after using 
any of the other EXs up until now.

Also, upgrade your code to 13.2X50-D18 right now.  No, really.  You'll thank me 
later.  

It's not actually available on the download page, but if you follow the link on 
right where it shows JTAC recommended code which redirects you to the 
password-protected KB Article on recommended versions, which you can then dig 
through to find the link to the specific EX4300 software Technical Services 
Bulletin, which lists the 13-odd critical PRs that seemed to make it out the 
door and finally the link to the actual software...  

or for Hitchhikers fans: It was on display in the bottom of a locked filing 
cabinet stuck in a disused lavatory with a sign on the door saying 'Beware of 
the Leopard'.

https://download.juniper.net/software/junos/regressed/13.2X50-D18/jinstall-ex-4300-13.2X50-D18-domestic-signed.tgz




On 19 Feb 2014, at 1:44 pm, Janusz Wełna janusz.we...@gmail.com wrote:

 Hi,
 
 
 Why when I have below config:
 
  ge-0/0/44 {
description test;
unit 0 {
family ethernet-switching {
vlan {
members vlan103;
}
storm-control default;
 
   unit 103 {
description test;
family inet {
address 10.46.163.1/29;
 
 
vlan103 {
description test;
vlan-id 103;
l3-interface vlan.103;
 
 
 
 
 I cannot ping from EX4300 10.46.163.1 and I cannot ping 10.46.163.1 from
 server connected to ge-0/0/44
 
 
 
 
 But when I add below:
 
 
 irb {
unit 103 {
family inet {
address 10.46.163.1/29;
 
 
 and delete :
 
 
 vlan103 {
description SGI;
vlan-id 103;
l3-interface vlan.103
 
 
 
 
 ping works correctly.
 
 
 On EX3300, EX4200 and EX2200 I not need setup irb interface, why I need on
 EX4300 ?
 
 
 
 Br,
 
 
 Janusz
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] VLAN sub-ints and VPLS

2014-01-20 Thread Ben Dale
Hi Tom,

 
 Great, no more errors, try to commit again:
 
 # commit
 [edit interfaces ge-0/0/12]
  'unit 0'
vlan map ge-0/0/12: input-vlan-map and output-vlan-map are valid
 on untagged interfaces only for ethernet-ccc and ethernet-vpls
 encapsulations
 error: configuration check-out failed
 
 But you just told me I need to use  tagging? And there is no
 ethernet-vpls encapsulation for units. wtf?
 
 Maybe its just not possible on an SRX, perhaps it doesnt have the
 smarts, or maybe Im just missing something really obvious.
 
 Any help appreciated. Cheers!

Switch your physical interface encapsulation to vlan-vpls and try committing 
again

Cheers,

Ben


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] OSPF neig / SRX cluster / LACP

2014-01-15 Thread Ben Dale

On 16 Jan 2014, at 11:22 am, Samol molas...@gmail.com wrote:
 
 I got OSPF neighbor UP for all neighbors (RI: OUTSIDE and INSIDE) but not
 for Routing Instance (RI) INSIDE between SRX and MX-B. and If I shutdown
 interface on SRX-B (secondary) that connecting MX, all OSPF neighbors are
 UP.
 

Check it in layers:
- is the reth interface on SRX-B definitely up when you have both links enabled
show chassis cluster interfaces
- is your LACP up between MX-B and the cluster - bearing in mind that you 
cannot have a single  LAG between MX-B and your SRX (it will need to be a LAG 
to each cluster node)
show lacp interfaces
- if the neighbor is only down on one of the RIs, assuming you have a VLAN 
between the MX and the SRX to carry each RI - double check that the VLAN is 
actually tagged on both LAGs between the two boxes
show bridge domain interface aex.0

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] OSPF neig / SRX cluster / LACP

2014-01-15 Thread Ben Dale
I'm surprised that this is even working at all.

http://www.juniper.net/techpubs/en_US/junos12.2/topics/concept/interface-security-aggregated-ethernet-lacp-chassis-cluster-understanding.html

Specifically:

Note: The redundant Ethernet interface LAG child links from each node in the 
chassis cluster must be connected to a different LAG at the peer devices. If a 
single peer switch is used to terminate the redundant Ethernet interface LAG, 
two separate LAGs must be used in the switch.

From a single MX a single LAG should got to a single individual node from the 
chassis cluster.

Can you paste the OSPF configs from each RI on the SRX and MX-B?

On 16 Jan 2014, at 2:51 pm, Samol molas...@gmail.com wrote:

 what i'm doing is LACP (ae) from MX to LACP (reth) SRX where one link is on 
 Node0 and another is on node1. both link on SRX are member of Reth. 
 
 Admin@coolSRX# show interfaces reth1  
 vlan-tagging;
 redundant-ether-options {
 redundancy-group 1;
 lacp {
 passive;
 periodic fast;
 }
 }
 
 {primary:node0}[edit]
 Admin@coolSRX# run show lacp interfaces reth1 
 Aggregated interface: reth1
 LACP state:   Role   Exp   Def  Dist  Col  Syn  Aggr  Timeout  
 Activity
   ge-0/0/4   ActorNoNo   Yes  Yes  Yes   Yes Fast   
 Passive
   ge-0/0/4 PartnerNoNo   Yes  Yes  Yes   Yes Fast
 Active
   ge-9/0/4   ActorNoNo   Yes  Yes  Yes   Yes Fast   
 Passive
   ge-9/0/4 PartnerNoNo   Yes  Yes  Yes   Yes Fast
 Active
 LACP protocol:Receive State  Transmit State  Mux State 
   ge-0/0/4  Current   Fast periodic Collecting 
 distributing
   ge-9/0/4  Current   Fast periodic Collecting 
 distributing
 
 All interfaces are UP. Reth's on SRX are also up. ae interfaces on MX-A and B 
 are also UP.  
 
 Regards,
 
 
 
 2014/1/16 Ben Dale bd...@comlinx.com.au
 
 On 16 Jan 2014, at 11:22 am, Samol molas...@gmail.com wrote:
 
  I got OSPF neighbor UP for all neighbors (RI: OUTSIDE and INSIDE) but not
  for Routing Instance (RI) INSIDE between SRX and MX-B. and If I shutdown
  interface on SRX-B (secondary) that connecting MX, all OSPF neighbors are
  UP.
 
 
 Check it in layers:
 - is the reth interface on SRX-B definitely up when you have both links 
 enabled
 show chassis cluster interfaces
 - is your LACP up between MX-B and the cluster - bearing in mind that you 
 cannot have a single  LAG between MX-B and your SRX (it will need to be a LAG 
 to each cluster node)
 show lacp interfaces
 - if the neighbor is only down on one of the RIs, assuming you have a VLAN 
 between the MX and the SRX to carry each RI - double check that the VLAN is 
 actually tagged on both LAGs between the two boxes
 show bridge domain interface aex.0
 
 Ben
 
 
 
 -- 
 Samol Khoeurn
 (855) 077 55 64 02 / (855) 067 41 88 66
 Network Engineer 
 Cisco: CCNA/CCNP SP/CCIP/
 Juniper: JNCIA/JNCIS-ENT,SP,SEC/JNCIP-ENT
 www.linkedin.com/in/samolkhoeurn
 OSPF on SRX clustering.png


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] OSPF neig / SRX cluster / LACP

2014-01-15 Thread Ben Dale
You'll see in Cooper's blog that both nodes are going back into a *single* EX 
switch with *two* ae interfaces configured - one to each node.

These ae links have two ports allocated to them.

All LACP does is provide redundancy/balancing between ports to the primary node 
- the secondary node will be down from a reth perspective, even if the LACP 
shows as up.

On 16 Jan 2014, at 4:42 pm, Samol molas...@gmail.com wrote:

 Hi Aaron,
 
 LACP is running on the reth interface and reth's are up. below is the
 configuration:
 
 Admin@coolSRX# show interfaces reth1
 vlan-tagging;
 redundant-ether-options {
redundancy-group 1;
lacp {
passive;
periodic fast;
}
 }
 
 this link was successful for this. http://cooperlees.com/blog/?p=401
 
 
 
 2014/1/16 Aaron Dewell aaron.dew...@gmail.com:
 
 reth interfaces are for failover not for bundle.  You can use two LAGs 
 within a reth interface (multiple interface on a single node in a LAG) but 
 not across both.  It's up (probably) because you aren't running LACP.  If 
 you turn on LACP, then various links will be down.  I'm going to guess 
 that's why the OSPF session from the right MX is down - because the MX is 
 transmitting to the wrong node for that redundancy-group and it's being 
 ignored.
 
 On Jan 15, 2014, at 11:52 PM, Samol wrote:
 I can't access to the devices at the moment, but basically what we did
 was under each routing instance, we just put the interfaces inside the
 ospf area. very straight forward configuration of ospf. I have thought
 of links LAG from MX should only connect to each node individually.
 but it's interesting that LAG are running even though links are
 connected two different nodes (this is for Reth interface). But I
 tried to use AE interface on SRX cluster, the theory is true that we
 can't bundle two links that land on different node. we just can't
 commit.  that is the reason we move to Reth.
 
 
 Regards,
 
 
 
 
 2014/1/16 Ben Dale bd...@comlinx.com.au:
 I'm surprised that this is even working at all.
 
 http://www.juniper.net/techpubs/en_US/junos12.2/topics/concept/interface-security-aggregated-ethernet-lacp-chassis-cluster-understanding.html
 
 Specifically:
 
 Note: The redundant Ethernet interface LAG child links from each node in 
 the chassis cluster must be connected to a different LAG at the peer 
 devices. If a single peer switch is used to terminate the redundant 
 Ethernet interface LAG, two separate LAGs must be used in the switch.
 
 From a single MX a single LAG should got to a single individual node from 
 the chassis cluster.
 
 Can you paste the OSPF configs from each RI on the SRX and MX-B?
 
 On 16 Jan 2014, at 2:51 pm, Samol molas...@gmail.com wrote:
 
 what i'm doing is LACP (ae) from MX to LACP (reth) SRX where one link is 
 on Node0 and another is on node1. both link on SRX are member of Reth.
 
 Admin@coolSRX# show interfaces reth1
 vlan-tagging;
 redundant-ether-options {
   redundancy-group 1;
   lacp {
   passive;
   periodic fast;
   }
 }
 
 {primary:node0}[edit]
 Admin@coolSRX# run show lacp interfaces reth1
 Aggregated interface: reth1
   LACP state:   Role   Exp   Def  Dist  Col  Syn  Aggr  Timeout  
 Activity
 ge-0/0/4   ActorNoNo   Yes  Yes  Yes   Yes Fast   
 Passive
 ge-0/0/4 PartnerNoNo   Yes  Yes  Yes   Yes Fast
 Active
 ge-9/0/4   ActorNoNo   Yes  Yes  Yes   Yes Fast   
 Passive
 ge-9/0/4 PartnerNoNo   Yes  Yes  Yes   Yes Fast
 Active
   LACP protocol:Receive State  Transmit State  Mux State
 ge-0/0/4  Current   Fast periodic Collecting 
 distributing
 ge-9/0/4  Current   Fast periodic Collecting 
 distributing
 
 All interfaces are UP. Reth's on SRX are also up. ae interfaces on MX-A 
 and B are also UP.
 
 Regards,
 
 
 
 2014/1/16 Ben Dale bd...@comlinx.com.au
 
 On 16 Jan 2014, at 11:22 am, Samol molas...@gmail.com wrote:
 
 I got OSPF neighbor UP for all neighbors (RI: OUTSIDE and INSIDE) but not
 for Routing Instance (RI) INSIDE between SRX and MX-B. and If I shutdown
 interface on SRX-B (secondary) that connecting MX, all OSPF neighbors are
 UP.
 
 
 Check it in layers:
 - is the reth interface on SRX-B definitely up when you have both links 
 enabled
 show chassis cluster interfaces
 - is your LACP up between MX-B and the cluster - bearing in mind that you 
 cannot have a single  LAG between MX-B and your SRX (it will need to be a 
 LAG to each cluster node)
 show lacp interfaces
 - if the neighbor is only down on one of the RIs, assuming you have a 
 VLAN between the MX and the SRX to carry each RI - double check that the 
 VLAN is actually tagged on both LAGs between the two boxes
 show bridge domain interface aex.0
 
 Ben
 
 
 
 --
 Samol Khoeurn
 (855) 077 55 64 02 / (855) 067 41 88 66
 Network Engineer
 Cisco: CCNA/CCNP SP/CCIP/
 Juniper: JNCIA/JNCIS-ENT,SP,SEC/JNCIP-ENT
 www.linkedin.com

Re: [j-nsp] NTP Reflection

2014-01-13 Thread Ben Dale

On 14 Jan 2014, at 12:31 pm, Mark Tees markt...@gmail.com wrote:

 What I was referring to was a detailed ACL/Filter for lo0 that only allows
 traffic for enabled services on the routing engine.
 
 For example if Juniper posted a firewall filter template with all the
 possible services customers could then activate/deactivate what they need
 from the policy and log fails before discarding etc.

What you think you're after is show system connections which is more or less 
netstat -an and shows all ports that are listening on your RE - you can now 
filter at will.

Providing a list of every service for people to modify is not going to solve 
these problems - Oh hey, I'm using NTP, I'd better enable all those rules..

What you actually want is an ACL with ONLY the services you've actually 
configured and understand from the source/destinations you're using them from 
and deny all else - then you *mostly* don't need to worry about this sort of 
thing.

If your employer is too tight to spring for the MX book (worth every cent and 
then some), the following free Day One books will provide everything you're 
after (sign up for a J-Net login if you don't already have one):

http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/securing-routing-engine/
http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/hardening-junos-devices-checklist/
http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/configuring-junos-policies/

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] qfabric 1536k mac address?

2014-01-02 Thread Ben Dale
At a guess I'd say it's because in Q-Fabric, the MAC-learning is performed by 
a similar to a VPLS instance per VLAN rather than traditional per-switch CAM 
tables.  

I imagine this allows for better scalability/optimisation.

The switch CAM would then only need to worry about L2-adjacent QF nodes and 
adjacent hosts.

On 2 Jan 2014, at 5:28 pm, giovanni rana superburri...@hotmail.com wrote:

 Hi, during the evaluation of a new data center architecture, how can qfabric 
 support so many Mac addresses? The qfx3500 node supports only 128k Mac 
 tables, how can they get 1536k as declared in the data sheet? Is it because 
 of an optimized use of mac-vlan pairs? 
 Thanks for any answer and happy 2014! 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper MX104

2013-11-12 Thread Ben Dale
That and I think a lot of the BRAS migration functionality (LNS/LAC etc) was 
late to the party after being told it wasn't going to happen for anything lower 
than the 240.

On 13 Nov 2013, at 12:51 pm, Bill Blackford bblackf...@gmail.com wrote:

 My personal feeling is the MX80 wasn't widely adopted as a lower density
 subscriber box given the lack of redundant REs. The MX104 may find it's
 niche as a BRAS.
 
 
 
 
 On Tue, Nov 12, 2013 at 5:25 PM, Eric Van Tol e...@atlantech.net wrote:
 
 One thing to keep in mind about these boxes is that, like the
 MX5/10/40/80, the built-in 10G ports do not do hierarchical QoS (per-unit
 scheduling).  I'm confused as to why this is, considering they are
 Trio-based routers, but I digress.  I personally don't think that the
 astronomical cost to enable the 10G ports on all the low-end MX routers is
 worth it, considering they can't even do per-unit scheduling.
 
 -evt
 
 -Original Message-
 From: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] On
 Behalf Of
 joel jaeggli
 Sent: Tuesday, November 12, 2013 4:00 PM
 To: Saku Ytti
 Cc: juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] Juniper MX104
 
 
 On Nov 12, 2013, at 12:46 PM, Saku Ytti s...@ytti.fi wrote:
 
 On (2013-11-12 20:14 +), Tom Storey wrote:
 
 Why so much just to enable some ports? How do they come up with that
 kind of price? Pluck it out of thin air?
 
 The hardware has been paid for, and I know thats only list pricing,
 but it still seems ridiculous.
 
 The question might have been rhetoric. But I'll bite.
 
 The BOM on these boxes is nothing, I'm guessing less than 1kUSD. But
 the
 volume you can sell them also is very very small, so the margins need
 to
 be
 very high to be able to design and support them.
 Licensing allows you to sell to larger group of people, people who
 normally
 would buy smaller/inferior box, now can afford it,  which in turn
 allows
 you
 to reduce your margins, making you more competitive.
 
 I actually like it. I wish vendors like Agilent/Ixia, Spirent would
 sell
 test-kit with some sort of 'per hours used' license. Lot of SPs have
 need
 for
 proper testing kit, but only will need them very irregularly. And
 renting
 is
 always such a chore. It's same thing there, BOM is nothing, but volume
 is
 even
 lower, so prices are ridiculously high, consequently proper testing is
 very
 rarely done by other than telco size SPs.
 
 It's one of those things where you work with account team. if the
 commercial
 terms don't work out for most potential buyers, then the product won't be
 successful and either things will change or they won't.
 
 --
 ++ytti
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 -- 
 Bill Blackford
 
 Logged into reality and abusing my sudo privileges.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper MX104

2013-11-12 Thread Ben Dale
MS-MIC is out for the MX5-80:

http://www.juniper.net/us/en/local/pdf/datasheets/1000454-en.pdf

doesn't look like there isn't a services port on the back of the 104 though:

http://www.juniper.net/shared/img/products/mx-series/mx104/mx104-rear-high.jpg

maybe you can use one of the front slots?

On 13 Nov 2013, at 2:52 pm, Skeeve Stevens 
skeeve+juniper...@eintellegonetworks.com wrote:

 Does anyone know how many users the MX104 will be able to handle though?
 
 The 4000 user limit on the MX80 was quite low.
 
 Does the MX104 have the services port on the back like the MX80?  I'm waiting 
 for the CGN Services card which was supposed to be released around now.
 
 
 ...Skeeve
 
 Skeeve Stevens - eintellego Networks Pty Ltd
 ske...@eintellegonetworks.com ; www.eintellegonetworks.com
 Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
 facebook.com/eintellegonetworks ; linkedin.com/in/skeeve 
 twitter.com/theispguy ; blog: www.theispguy.com
 
 The Experts Who The Experts Call
 Juniper - Cisco - Cloud
 
 
 On Wed, Nov 13, 2013 at 3:46 PM, Ben Dale bd...@comlinx.com.au wrote:
 That and I think a lot of the BRAS migration functionality (LNS/LAC etc) 
 was late to the party after being told it wasn't going to happen for anything 
 lower than the 240.
 
 On 13 Nov 2013, at 12:51 pm, Bill Blackford bblackf...@gmail.com wrote:
 
  My personal feeling is the MX80 wasn't widely adopted as a lower density
  subscriber box given the lack of redundant REs. The MX104 may find it's
  niche as a BRAS.
 
 
 
 
  On Tue, Nov 12, 2013 at 5:25 PM, Eric Van Tol e...@atlantech.net wrote:
 
  One thing to keep in mind about these boxes is that, like the
  MX5/10/40/80, the built-in 10G ports do not do hierarchical QoS (per-unit
  scheduling).  I'm confused as to why this is, considering they are
  Trio-based routers, but I digress.  I personally don't think that the
  astronomical cost to enable the 10G ports on all the low-end MX routers is
  worth it, considering they can't even do per-unit scheduling.
 
  -evt
 
  -Original Message-
  From: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] On
  Behalf Of
  joel jaeggli
  Sent: Tuesday, November 12, 2013 4:00 PM
  To: Saku Ytti
  Cc: juniper-nsp@puck.nether.net
  Subject: Re: [j-nsp] Juniper MX104
 
 
  On Nov 12, 2013, at 12:46 PM, Saku Ytti s...@ytti.fi wrote:
 
  On (2013-11-12 20:14 +), Tom Storey wrote:
 
  Why so much just to enable some ports? How do they come up with that
  kind of price? Pluck it out of thin air?
 
  The hardware has been paid for, and I know thats only list pricing,
  but it still seems ridiculous.
 
  The question might have been rhetoric. But I'll bite.
 
  The BOM on these boxes is nothing, I'm guessing less than 1kUSD. But
  the
  volume you can sell them also is very very small, so the margins need
  to
  be
  very high to be able to design and support them.
  Licensing allows you to sell to larger group of people, people who
  normally
  would buy smaller/inferior box, now can afford it,  which in turn
  allows
  you
  to reduce your margins, making you more competitive.
 
  I actually like it. I wish vendors like Agilent/Ixia, Spirent would
  sell
  test-kit with some sort of 'per hours used' license. Lot of SPs have
  need
  for
  proper testing kit, but only will need them very irregularly. And
  renting
  is
  always such a chore. It's same thing there, BOM is nothing, but volume
  is
  even
  lower, so prices are ridiculously high, consequently proper testing is
  very
  rarely done by other than telco size SPs.
 
  It's one of those things where you work with account team. if the
  commercial
  terms don't work out for most potential buyers, then the product won't be
  successful and either things will change or they won't.
 
  --
  ++ytti
  ___
  juniper-nsp mailing list juniper-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
  ___
  juniper-nsp mailing list juniper-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
  --
  Bill Blackford
 
  Logged into reality and abusing my sudo privileges.
  ___
  juniper-nsp mailing list juniper-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper MX104

2013-11-12 Thread Ben Dale
Yeah, my take on that is that MPC0 is pretty much anything built-in on the 
MX5/80 - eg: the front 10G ports are xe-0/0/0

My guess is that the rear slot is just another MIC slot (slot 1) MPC 0 so 
something like sp-0/1/0 or whatever designation gets used.  

The front MIC slots are ge-1/0/0-19  and ge-1/1/0-19 etc. 

On 13 Nov 2013, at 3:33 pm, Skeeve Stevens 
skeeve+juniper...@eintellegonetworks.com wrote:

 Isn't that using the front MIC slot though?
 
 The rear 'Services Slot' is an MPC slot isn't it?
 
 Based on the following:
 
 MS-MIC 16G - MS-MIC with 16 GB of memory provides 9GB of service throughput, 
 occupies single MIC slot on MX5, MX10, MX40, and MX80 3D Universal Edge 
 Routers, as well as on the MPC1, MPC2, and MPC3 cards for the MX2020, MX2010, 
 MX960, MX480, 
 and MX240 3D Universal Edge Router.
 
 MS-MPC-128 - MS-MPC with 128 GB of memory (32 GB per NPU), provides 60Gbps of 
 service throughput, occupies a single slot in MX2020, MX2010, MX960, MX480, 
 and MX240 3D Universal Edge Routers
 
 The rear picture of the MX80 at 
 http://www.juniper.net/shared/img/products/mx-series/mx80/mx80-rear-high.jpg
 
 Says MPC 0 and MIC 1 in smaller writing under it.
 
 From front right slot is also called 1/MIC 1
 
 I think we need further clarification.
 
 
 
 
 ...Skeeve
 
 Skeeve Stevens - eintellego Networks Pty Ltd
 ske...@eintellegonetworks.com ; www.eintellegonetworks.com
 Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
 facebook.com/eintellegonetworks ; linkedin.com/in/skeeve 
 twitter.com/theispguy ; blog: www.theispguy.com
 
 The Experts Who The Experts Call
 Juniper - Cisco - Cloud
 
 
 On Wed, Nov 13, 2013 at 4:04 PM, Ben Dale bd...@comlinx.com.au wrote:
 MS-MIC is out for the MX5-80:
 
 http://www.juniper.net/us/en/local/pdf/datasheets/1000454-en.pdf
 
 doesn't look like there isn't a services port on the back of the 104 though:
 
 http://www.juniper.net/shared/img/products/mx-series/mx104/mx104-rear-high.jpg
 
 maybe you can use one of the front slots?
 
 On 13 Nov 2013, at 2:52 pm, Skeeve Stevens 
 skeeve+juniper...@eintellegonetworks.com wrote:
 
  Does anyone know how many users the MX104 will be able to handle though?
 
  The 4000 user limit on the MX80 was quite low.
 
  Does the MX104 have the services port on the back like the MX80?  I'm 
  waiting for the CGN Services card which was supposed to be released around 
  now.
 
 
  ...Skeeve
 
  Skeeve Stevens - eintellego Networks Pty Ltd
  ske...@eintellegonetworks.com ; www.eintellegonetworks.com
  Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
  facebook.com/eintellegonetworks ; linkedin.com/in/skeeve
  twitter.com/theispguy ; blog: www.theispguy.com
 
  The Experts Who The Experts Call
  Juniper - Cisco - Cloud
 
 
  On Wed, Nov 13, 2013 at 3:46 PM, Ben Dale bd...@comlinx.com.au wrote:
  That and I think a lot of the BRAS migration functionality (LNS/LAC etc) 
  was late to the party after being told it wasn't going to happen for 
  anything lower than the 240.
 
  On 13 Nov 2013, at 12:51 pm, Bill Blackford bblackf...@gmail.com wrote:
 
   My personal feeling is the MX80 wasn't widely adopted as a lower density
   subscriber box given the lack of redundant REs. The MX104 may find it's
   niche as a BRAS.
  
  
  
  
   On Tue, Nov 12, 2013 at 5:25 PM, Eric Van Tol e...@atlantech.net wrote:
  
   One thing to keep in mind about these boxes is that, like the
   MX5/10/40/80, the built-in 10G ports do not do hierarchical QoS (per-unit
   scheduling).  I'm confused as to why this is, considering they are
   Trio-based routers, but I digress.  I personally don't think that the
   astronomical cost to enable the 10G ports on all the low-end MX routers 
   is
   worth it, considering they can't even do per-unit scheduling.
  
   -evt
  
   -Original Message-
   From: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] On
   Behalf Of
   joel jaeggli
   Sent: Tuesday, November 12, 2013 4:00 PM
   To: Saku Ytti
   Cc: juniper-nsp@puck.nether.net
   Subject: Re: [j-nsp] Juniper MX104
  
  
   On Nov 12, 2013, at 12:46 PM, Saku Ytti s...@ytti.fi wrote:
  
   On (2013-11-12 20:14 +), Tom Storey wrote:
  
   Why so much just to enable some ports? How do they come up with that
   kind of price? Pluck it out of thin air?
  
   The hardware has been paid for, and I know thats only list pricing,
   but it still seems ridiculous.
  
   The question might have been rhetoric. But I'll bite.
  
   The BOM on these boxes is nothing, I'm guessing less than 1kUSD. But
   the
   volume you can sell them also is very very small, so the margins need
   to
   be
   very high to be able to design and support them.
   Licensing allows you to sell to larger group of people, people who
   normally
   would buy smaller/inferior box, now can afford it,  which in turn
   allows
   you
   to reduce your margins, making you more competitive.
  
   I actually like it. I wish vendors like Agilent/Ixia, Spirent would

Re: [j-nsp] J-series, hoping packets between routing-instances

2013-11-07 Thread Ben Dale
Hi Mike,

First.. Yikes!

Second - yes this is possible.  It is perfectly legal to use FBF to bounce 
across routing instances and still match security policy - just ensure your 
security policy includes the source and destination zones for the *ultimate* 
destination of the flow is correct - whether it exists in the instance the 
traffic ends up in is ignored by the flow engine.

On 8 Nov 2013, at 12:37 am, Mike Williams mike.willi...@comodo.com wrote:

 Hi all,
 
 I might have painted myself into a corner here, so I'm here looking for 
 options from people far cleverer than I.
 
 Firstly, a bit of history.
 
 We're using J6350s, and SRX650s, as security devices on a stick.
 Our Ms and MXs punt packets into a routing instance on the security devices 
 with firewall filters. Those routing instances purposely only use the most 
 basic of static routes possible (10/8, 192.168/16, etc), so we can be certain 
 what zones packets pass through so the policies match.
 
 That all works fine.
 
 
 We're also centralising our inter-site IPSec onto the Js and SRXs, but need 
 OSPF there, so have a second routing-instance and a partial mesh of routed 
 tunnels between them.
 Still, all good.
 Offices and what-not have tunnels tied directly to the IPSec 
 routing-instances 
 and OSPF metrics keep traffic flows sane.
 All hunky dory.
 
 
 
 Now the problem.
 
 I need to take traffic from servers behind an M/MX have it policy'd by the 
 security routing instance, then encrypted by the IPSec routing-instance.
 If I punt traffic into security, let it come back to the router, then punt 
 it back into ipsec, everything works as expected.
 However each packet has to pass across the M/MX-J/SRX link 4 times, in out, 
 in out. Shake it all about.
 
 Obviously this would be better if we could shortcut the M/MX step in the 
 middle and move packets from security to ipsec, and ipsec to security 
 directly.
 
 As security doesn't run OSPF/BGP/ISIS/etc adding a static route next-table 
 ipsec.inet.0 is fine.
 ipsec *does* run OSPF though, so I need to do FBF to override that. I've 
 tried a then routing-instance security filter applied on output on the 
 interface facing the M/MX, but my traffic get lost somewhere. Security 
 policies from 'input-ipsec-zone' to 'output-security-zone' were added.
 
 
 I'm wondering if 'moving' packets from routing-instance to routing-instance 
 on 
 a flow-mode device simply screws up security policies. As one of the input or 
 output interface don't exist in the routing-instance.
 So I figured *routing* packets from routing-instance to routing-instance 
 would 
 be better. Time for some logical tunnels! J-series devices don't support 
 logical tunnels though.
 
 Argh!
 
 -- 
 Mike Williams
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 100% CPU HIT on EX4200

2013-11-07 Thread Ben Dale
You might want to share your Junos version too

Being an EX, follow up Graham's suggestions with:

show log messages (filtered down to times during the event)
show spanning-tree bridge (check Time since last topology change/number of 
changes - this is usually a culprit in pegging CPU)


On 8 Nov 2013, at 10:57 am, Graham Brown juniper-...@grahambrown.info wrote:

 Hi Sam,
 
 'show chassis routing-engine' and 'show system processes extensive' are two
 commands to start with, when investigating this issue.
 
 The second command will show you what process is consuming resources etc.
 
 HTH,
 Graham
 
 
 On 8 November 2013 13:51, Samol molas...@gmail.com wrote:
 
 Hi All,
 
 CPU on EX4200 run up to 100% for a period of time and I have not yet found
 what caused this. Based on your experiences, what are the things that can
 cause this and what are the commands to check this ?
 
 Thanks,
 Sam
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 -- 
 Graham Brown
 Twitter - @mountainrescuer https://twitter.com/#!/mountainrescuer
 LinkedIn http://www.linkedin.com/in/grahamcbrown
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] srx cluster - port channel - cisco switches - esx devices - 12.1x45-d15.5 some virtual machines can't be reached

2013-10-24 Thread Ben Dale
On 24 Oct 2013, at 5:48 pm, pkc_mls pkc_...@yahoo.fr wrote:

 Le 24/10/2013 00:55, Ben Dale a écrit :
 Can you confirm that you have two active port-channels configured on the 
 Cisco side, one into each SRX? 
 From the docs I found I was assuming a single port-channel could handle all 
 interfaces attached to the same reth on srx.
 
 For example, if ge-0/0/2, ge-0/0/3, ge-5/0/2, ge-5/0/3 are attached to reth0, 
 can I connect all the ports to the same etherchannel on the stack ?
 
 

No, there will be two sub-LAGs formed from the SRX - one on the active node, 
and one on the standby node.  To downstream devices, these appear as distinct 
LACP bundles, even though they are part of the same reth interface on the SRX.

There is a rather wordy explanation of it here, but the Note box in the middle 
of the page is probably a good summary:

http://www.juniper.net/techpubs/software/junos-security/junos-security10.2/junos-security-swconfig-interfaces/understand-lacp-in-cc-mode-section.html

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] srx cluster - port channel - cisco switches - esx devices - 12.1x45-d15.5 some virtual machines can't be reached

2013-10-23 Thread Ben Dale
On 24 Oct 2013, at 1:12 am, pkc_mls pkc_...@yahoo.fr wrote:

 Hi all,
 
 I'm running a cluster of srx 240 connected to a pair of cisco 2960 switches 
 with a port channel.
 
 ESXi servers are also connected to the same stack of cisco switches.
 
 vlan 1000 with ip 192.168.100.0 is used for out of band management and 
 reachability.
 
 I'm using a dedicated virtual router to route the traffic from this vlan to 
 other vlans.
 
 Some virtual machines can be reached but some others can't.
 
 I upgraded today to 12.1X45-D15.5, as I require vpn termination on loopback 
 interface,
 and I suspect this release to have introduced weirdness into the 
 configuration.
 
 Does anyone use a pair of srx devices with this release 12.1X45-D15.5 have 
 some issues with
 this kind of configuration ?
 
 Are there any specific configurations to be used on the port channels 
 connected to the srx on the cisco stack ?
 
 Best regards.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 

Can you confirm that you have two active port-channels configured on the 
Cisco side, one into each SRX?
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Spanning Tree Inconsistent State

2013-10-02 Thread Ben Dale
Hi Crist,

It is certainly possible to have blocked ports on a root bridge - consider a 
case where the switch is patched to itself.

Having a root port is a little unusual though?!!.  

Restarting RSTP is going to cause a topology change or two amongst your 
neighbours so try to do it during low traffic.

It might be worth using LLDP to trace out physical connections too just to make 
sure there isn't a cabling issue.

Ben

On 03/10/2013, at 9:50 AM, Crist Clark cjc+j-...@pumpky.net wrote:

 I am a little confused about the spanning tree state on an EX4200 VC,
 running 11.4R5.5.
 
 
 
 {master:0}
 cjc@dmz4200 show spanning-tree bridge
 
 STP bridge parameters
 Context ID  : 0
 Enabled protocol: RSTP
 Root ID   : 32768.88:e0:f3:77:53:81
 Hello time: 2 seconds
 Maximum age   : 20 seconds
 Forward delay : 15 seconds
 Message age   : 0
 Number of topology changes: 20
 Time since last topology change   : 3661899 seconds
 Topology change initiator : xe-0/1/0.0
 Topology change last recvd. from  : 88:e0:f3:74:51:6a
 Local parameters
   Bridge ID   : 32768.88:e0:f3:77:53:81
   Extended system ID  : 0
   Internal instance ID: 0
 
 {master:0}
 cjc@dmz4200 show spanning-tree interface
 
 Spanning tree interface parameters for instance 0
 
 InterfacePort IDDesignated  Designated PortState  Role
port IDbridge ID  Cost
 ge-0/0/0.0 128:513  128:513  32768.88e0f3775381 2  FWDDESG
 ge-0/0/47.0128:560  128:560  32768.88e0f3775381 2  FWDDESG
 xe-0/1/0.0 128:609  128:609  32768.88e0f3775381  2000  FWDROOT
 xe-0/1/2.0 128:611  128:611  32768.88e0f3775381  2000  FWDDESG
 ge-1/0/0.0 128:625  128:625  32768.88e0f3775381 2  FWDDESG
 ge-1/0/47.0128:672  128:672  32768.88e0f3775381 2  FWDDESG
 xe-1/1/0.0 128:721  128:776  32768.50c58dac4c81  2000  BLKALT
 xe-1/1/2.0 128:723  128:723  32768.88e0f3775381  2000  FWDDESG
 
 
 So what I'm confused about is that the show spanning-tree bridge output
 says that this switch is the root bridge, yet the per-interface output
 indicates that there are ROOT and ALT ports. Also, the bridge ID for the
 ROOT port is the switch itself? Whereas the ALT port is what I would
 expect, except that it again seems to contradict the idea that this switch
 is the root bridge.
 
 
 
 I think my RSTP on this switch is in some messed up state? When I turn on
 traceoptions for rstp, I see sucpicious stuff like,
 
 
 Oct  2 11:26:59.532378 PISM: Port xe-1/1/0.0: IMPOSSIBLE EVENT/STATE
 Combination Occured
 Oct  2 11:26:59.532396 PISM: Event routine returned FAILURE
 Oct  2 11:26:59.532414 MSG: RstPortInfoMachine function returned FAILURE!
 
 Oct  2 11:26:59.532441 RECV: PortReceiveStateMachine Action returned
 FAILURE!
 
 Oct  2 11:26:59.532467 MSG: RstPortReceiveMachine function returned FAILURE!
 
 Oct  2 11:26:59.532493 MSG: RstHandleInBpdu function FAILED!
 
 Is there a low risk way to reset RSTP on a production switch?
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX Command

2013-09-24 Thread Ben Dale
Just blew the dust off it and it still works ; )

http://pastebin.com/xiszACPf

If you're applying this to a chassis cluster, you may need to replace the line:

for-each ($policies-list/security-context/policies) {

with 

for-each ($policies-list/multi-routing-engine-item/security-context/policies) {

Enjoy,

Ben

On 24/09/2013, at 4:43 PM, Maarten van der Hoek maar...@vanderhoek.nl wrote:

 Hi Ben,
 
 Did you succeed in building that script ?
 (e.g. do you have it somewhere ? ;-) )
 
 We've been playing with exports and then import in Excel...but still not
 very nice.. 
 A better solution would be nice.
 (we can't you Junos-Space / or so because most deployments are in separate
 Small / Branch offices)
 
 Brgds,
 
 Maarten van der Hoek
 
 -Oorspronkelijk bericht-
 Van: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] Namens Ben
 Dale
 Verzonden: dinsdag 24 september 2013 6:46
 Aan: Edward Dore
 CC: juniper-nsp@puck.nether.net; Harri Makela
 Onderwerp: Re: [j-nsp] SRX Command
 
 After I spent a bit of time building an op script to print policy matches
 out in a nicely formatted table, I notice that this feature is now available
 for all policies even without the then count action from 12.1:
 
 show security policies hit-count
 
 Cheers,
 
 Ben
 
 On 24/09/2013, at 8:45 AM, Edward Dore
 edward.d...@freethought-internet.co.uk wrote:
 
 You'll need to add the count action to the then statement on each
 security policy if you want to track the number of times that the policy has
 been matched.
 
 Edward Dore
 Freethought Internet
 
 On 23 Sep 2013, at 23:08, Harri Makela wrote:
 
 Hi All
 
 Is there any command in SRX which I can use to check number of times FW
 policy has been used. Actually I want to clear all FW policies which are
 not being used for last 12 months or so.  I don`t know much about scripting
 but can try to get some help if I can think of a command which can be rung
 through different zones combinations.
 
 
 Thanks in Advance !
 HM
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net 
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net 
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX Command

2013-09-24 Thread Ben Dale
Harri,

As per the link below - add then count to all your policies (using the 
following apply-group will do this quickly for you):

set groups COUNT-ALL security policies from-zone * to-zone * policy * 
then count
set apply-groups COUNT-ALL

If you install the op-script provided and run it after a month or so, it will 
show you pretty quickly which policies are being used, but if you don't want to 
use an op script, try:

run show security policies detail | match Policy:|zone|lookups

Again - the lookups field will only be there if the policy has count enabled.

Cheers,

Ben

On 24/09/2013, at 10:37 PM, Harri Makela harri_mak...@yahoo.com wrote:

 Thanks for lookup
 
 We have JUNOS Software Release [10.4R5.5] and it doesn`t look like that we 
 have the option indictaed in last mail
 
 admin@SRX-3600-P show security policies ?
 Possible completions:
   [Enter]Execute this command
   detail   Show the detailed information
   from-zoneShow the policy information matching the given source 
 zone
   policy-name  Show the policy information matching the given policy 
 name
   to-zone  Show the policy information matching the given 
 destination zone
   |Pipe through a command
 {primary:node0}
 admin@SRX-3600-P show security policies hit
^
 
 I can capture all duplicate policies and delete which are not required for 
 same flow but the ones which are not being used and are there for nothing, I 
 would like to delete them. Not sure how I can accomlpish that with a JUNOS 
 command which I have to run in parallel with a shell script.
 
 Looking forward to get some feedback.
 
 Thanks
 HM
 
 
 
 From: Ben Dale bd...@comlinx.com.au
 To: Edward Dore edward.d...@freethought-internet.co.uk 
 Cc: Harri Makela harri_mak...@yahoo.com; juniper-nsp@puck.nether.net 
 juniper-nsp@puck.nether.net 
 Sent: Tuesday, 24 September 2013, 5:45
 Subject: Re: [j-nsp] SRX Command
 
 After I spent a bit of time building an op script to print policy matches out 
 in a nicely formatted table, I notice that this feature is now available for 
 all policies even without the then count action from 12.1:
 
 show security policies hit-count
 
 Cheers,
 
 Ben
 
 On 24/09/2013, at 8:45 AM, Edward Dore 
 edward.d...@freethought-internet.co.uk wrote:
 
  You'll need to add the count action to the then statement on each 
  security policy if you want to track the number of times that the policy 
  has been matched.
  
  Edward Dore 
  Freethought Internet 
  
  On 23 Sep 2013, at 23:08, Harri Makela wrote:
  
  Hi All
  
  Is there any command in SRX which I can use to check number of times FW 
  policy has been used. Actually I want to clear all FW policies which are 
  not being used for last 12 months or so.  I don`t know much about 
  scripting but can try to get some help if I can think of a command which 
  can be rung through different zones combinations.
  
  
  Thanks in Advance !
  HM
  ___
  juniper-nsp mailing list juniper-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/juniper-nsp
  
  ___
  juniper-nsp mailing list juniper-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/juniper-nsp
  
 
 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX Command

2013-09-23 Thread Ben Dale
After I spent a bit of time building an op script to print policy matches out 
in a nicely formatted table, I notice that this feature is now available for 
all policies even without the then count action from 12.1:

show security policies hit-count

Cheers,

Ben

On 24/09/2013, at 8:45 AM, Edward Dore edward.d...@freethought-internet.co.uk 
wrote:

 You'll need to add the count action to the then statement on each 
 security policy if you want to track the number of times that the policy has 
 been matched.
 
 Edward Dore 
 Freethought Internet 
 
 On 23 Sep 2013, at 23:08, Harri Makela wrote:
 
 Hi All
 
 Is there any command in SRX which I can use to check number of times FW 
 policy has been used. Actually I want to clear all FW policies which are 
 not being used for last 12 months or so.  I don`t know much about scripting 
 but can try to get some help if I can think of a command which can be rung 
 through different zones combinations.
 
 
 Thanks in Advance !
 HM
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Automation of EX code upgrade

2013-09-19 Thread Ben Dale
If you're talking green fields (out-of-the-box) then there are a couple of ways 
depending on the current Junos release the switch is running:

12.2 - Automatic Software Download

http://www.juniper.net/techpubs/en_US/junos/topics/task/configuration/ex-series-software-automatic-download-upgrading.html

=12.2 - Zero Touch Provisioning

http://www.juniper.net/techpubs/en_US/junos12.2/topics/concept/software-image-and-configuration-automatic-provisioning-understanding.html

Try to stagger upgrades if you can, or learn the effects of having a hundred 
switches hitting a TFTP server for a ~110MB image file.  Neither of these 
methods will display the success of the upgrades though.

If your switches are already deployed, then a better way to do it is with Junos 
Space.  

The nice thing about the Space method is that you can upgrade smaller groups of 
switches at a time, pre-stage the images up to each switch and schedule the 
entire process.  Each upgrade is given a Job ID and that Job ID will return 
success or failure depending on the outcome, even in the pre-staging if you 
don't have room on your flash for the image..

This functionality is built into the base Space platform too, which you can 
download and install with a 60(?)-day trial license.

Cheers,

Ben

On 20/09/2013, at 8:04 AM, Mick Burns bmx1...@gmail.com wrote:

 Hey all,
 
 I am looking for ideas/previous experience in the best way to automate the
 upgrade of multiple (let's say about a hundred units) EX switches in large
 datacenters.  Let's assume here they are a mix of 3200 and 4200 and all of
 them runs the same JunOS release.  Any failure must be quickly identified
 for a manual upgrade.
 
 Any help or advice is much appreciated.
 Mick B.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCN guard on Juniper EX

2013-09-11 Thread Ben Dale
Hi Dennis,

The closest thing Junos has at the moment is root-guard, which would stop your 
Netgears assuming root for the topology, but AFAIK TCNs would still be accepted 
and acted upon.

Are your netgear boxes manageable?  You can't force ports into edge mode to 
stop this?

On 11/09/2013, at 8:18 PM, Dennis Hagens r...@ipaddr.nl wrote:

 Hi All,
 
 Is there some way to filter out STP TCN BPDU's on a Juniper EX series switch?
 
 We have some old Netgears in our office environment (yes, I need to get rid 
 of those) which send TCN's on edge port flaps.
 This causes a lot of reconvergence / mac table flushes on our datacenter 
 switches, which are connected via layer 2 with the office. We currently 
 hooked up an HP switch with TCN  guard to mitigate this, but this introduces 
 a SPOF.
 
 Any ideas?
 
 Thanks,
 
 Dennis Hagens
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] how check MAG SA's cpu and memory

2013-09-04 Thread Ben Dale
If you boot the device up with a console cable attached, you'll get the BIOS 
dump to serial.  In the case of a MAG2600, it's running an Intel Atom @ 1.6Ghz 
and has 2GB of RAM:

AMIBIOS(C)2006 American Megatrends, Inc.
JPR-PICCOLO-2NBP (B150) V1.3 PN (10/18/2010)
CPU : Genuine Intel(R) CPU N270   @ 1.60GHz
 Speed : 1.60 GHz

The MCH is operating with DDR2-533/CL4 in Single-Channel Mode
Initializing USB Controllers .. Done.
2040MB OK

Cheers,

Ben

On 04/09/2013, at 4:26 PM, 徐见 xujia...@gmail.com wrote:

 Hi all:
 
 As the title said, I want to know SA and MAG’s cpu and memory
 information, 
 
 I have a box, MAG2600, how do I get them, or where could I get them from
 internet?
 
 I have checked the datasheets, no message.
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] QinQ termination on branch SRX

2013-09-02 Thread Ben Dale
Hi Darren,

On 02/09/2013, at 7:34 PM, Darren O'Connor darre...@outlook.com wrote:

 Does anyone know if this is supported on branch SRX devices yet? The only 
 thing I can find is a thread from two years ago stating 'we are working on 
 it' - 
 http://forums.juniper.net/t5/SRX-Services-Gateway/Terminating-q-in-q-on-a-SRX220h/td-p/104350
 
 I'm trying to get the equivalent of the Cisco config:
 interface gi0/1.10
 encap dot1q 200 second-dot1q 10
 ip address x.x.x.x
 


This came in 12.1X44D10:

http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/security-interface-vlan-tagging-configuring.html

You'll need something like this:

bdale@clx-bdr# show interfaces fe-0/0/4  
flexible-vlan-tagging;
unit 50 {
vlan-tags outer 200 inner 10;
family inet {
address 172.17.17.1/24;
}
}

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] VPN tunnel between OpenSwan and SRX220

2013-08-18 Thread Ben Dale
Hi Laurent.

Is your ultimate goal to get the GRE running over IPSEC, or just a vanilla 
IPSEC tunnel?  Your configuration will need to change either way:

If you want GRE over IPSEC:

You need to remove the /32 on the st0.0 interface and the Openswan 
rightsourceip and make them a contiguous subnet eg:
172.31.254.41/30 on the Juniper side
172.31.254.42/30 on the Openswan side

Now adjust your GRE configuration to use these addresses for source and 
destination on both ends
Now adjust your remote proxy-id on the SRX  and leftsubnet on Openswan to match 
(just the IPs, leave the mask as /32).

The logic behind this is that you will only encrypt traffic between 
172.31.254.41/32 and 172.31.254.42/32 which will be your GRE tunnelled traffic 
(all other traffic will be wrapped up inside this GRE).  

As an aside - the last time I checked, the SRX seemed to only use the Proxy-ID 
to negotiate the tunnel and then promptly ignored it and allowed you to send 
and receive whatever traffic your routes and policy allowed.

If you're just trying to do vanilla IPSEC tunnels:

Again, change the /32s on the st0.0 and Openswan rightsourceip:
172.31.254.41/30 on the Juniper side (or leave it unnumbered)
172.31.254.42/30 on the Openswan side

Now on the SRX change your proxy-id local to 192.168.123.0/24 and remote to 
whatever is sitting behind the Openswan box (eg: leftsubnet)
On Openswan, change the right-subnet to 192.168.123.0/24 and left-subnet to 
whatever you're trying to tunnel across (or leave it as-is if it's just this 
host, or you're source-natting)

Once you've got this in place and st0.0 comes up, you'll just need to point 
static routes on the SRX side to st0.0 or the Openswan next-hop (172.31.254.42) 
and vice-versa.

If it's still not working, send through the output of:

show security ipsec security-associations

Cheers,

Ben

On 07/08/2013, at 1:55 AM, Laurent CARON lca...@unix-scripts.info wrote:

 Hi,
 
 I'm trying to establish a VPN tunnel between a SRX220 and an OpenSwan box.
 
 SRX is:
 Model: srx220h
 JUNOS Software Release [12.1X44-D20.3]
 
 OpenSwan: 2.6.37
 
 Both are currently hooked on a test LAN.
 
 192.168.0.18 = openswan box on lan
 192.168.0.120 = juniper box on lan
 
 172.31.254.41 = ipsec on juniper box
 172.31.254.27 = ipsec on openswan box
 
 172.31.255.27 = loopback on juniper box
 
 Not relevant for now:
 10.254.2.33 = gre tunnel on openswan side
 10.254.2.34 = gre tunnel on juniper side
 
 Here is the config on the Juniper side:
 
 set interfaces ge-0/0/0 mtu 1514
 set interfaces ge-0/0/0 unit 0 family inet address 192.168.0.120/24
 
 set interfaces gr-0/0/0 unit 0 tunnel source 172.31.254.41
 set interfaces gr-0/0/0 unit 0 tunnel destination 172.31.254.27
 set interfaces gr-0/0/0 unit 0 family inet address 10.254.2.34/32
 
 set interfaces lo0 unit 0 family inet address 172.31.255.41/32
 
 set interfaces st0 unit 0 family inet address 172.31.254.41/32
 
 set interfaces vlan unit 0 family inet address 192.168.123.1/24
 
 set routing-options static route 172.31.254.27/32 next-hop st0.0
 
 set security ike traceoptions file vpn-debug-ike
 set security ike traceoptions flag all
 
 set security ike proposal ike_aes_128 authentication-method pre-shared-keys
 
 set security ike proposal ike_aes_128 dh-group group2
 set security ike proposal ike_aes_128 authentication-algorithm sha1
 set security ike proposal ike_aes_128 encryption-algorithm 3des-cbc
 set security ike proposal ike_aes_128 lifetime-seconds 3600
 
 set security ike policy phase1_aes_128 mode main
 set security ike policy phase1_aes_128 proposals ike_aes_128
 set security ike policy phase1_aes_128 pre-shared-key ascii-text pwd
 
 set security ike gateway RTR-SIEGE-001 ike-policy phase1_aes_128
 set security ike gateway RTR-SIEGE-001 address 192.168.0.18
 set security ike gateway RTR-SIEGE-001 no-nat-traversal
 set security ike gateway RTR-SIEGE-001 external-interface ge-0/0/0.0
 
 set security ipsec proposal ipsec_aes_128 protocol esp
 set security ipsec proposal ipsec_aes_128 authentication-algorithm 
 hmac-sha1-96
 
 set security ipsec proposal ipsec_aes_128 encryption-algorithm 3des-cbc
 set security ipsec proposal ipsec_aes_128 lifetime-seconds 3600
 
 set security ipsec policy phase2_aes_128 proposals ipsec_aes_128
 
 set security ipsec vpn VPN_TO_SIEGE-001 bind-interface st0.0
 set security ipsec vpn VPN_TO_SIEGE-001 ike gateway RTR-SIEGE-001
 set security ipsec vpn VPN_TO_SIEGE-001 ike proxy-identity local 
 172.31.254.41/32
 set security ipsec vpn VPN_TO_SIEGE-001 ike proxy-identity remote 
 172.31.254.27/32
 set security ipsec vpn VPN_TO_SIEGE-001 ike proxy-identity service any
 set security ipsec vpn VPN_TO_SIEGE-001 ike ipsec-policy phase2_aes_128
 set security ipsec vpn VPN_TO_SIEGE-001 establish-tunnels immediately
 
 set security flow traceoptions file vpn-debug
 set security flow traceoptions flag basic-datapath
 set security flow traceoptions flag packet-drops
 
 set security flow tcp-mss ipsec-vpn mss 1412
 
 

Re: [j-nsp] Config archive subtleties

2013-08-07 Thread Ben Dale
I haven't use this in anger for a while, so apologies if some of this 
functionality is already available, but how about:

- an option to disable compression of the config file
- an option to specify the naming convention used - eg: always back up to a 
single file-name rather than appending the date and let your existing version 
control handle the diffs
- checking it into git/subversion rather than just copying it to upstream 
folder (hey, a guy can dream)


On 08/08/2013, at 5:25 AM, Phil Shafer p...@juniper.net wrote:

 7 aug 2013 kl. 18:03 skrev Phil Mayers p.may...@imperial.ac.uk:
 Recently this fell apart on us, as the SSH key on the server changed and the 
 archival 
 transfers started to silently[1] fail.
 
 Ick.  Silence is deadly.  This (and the other issues) is now PR 910647.
 
 All of which has me wondering if the feature is more trouble than it's worth.
 
 We definitely should be making it more robust and stable, but to
 me the value of catching each commit as a distinct delta is a win.
 It should also have the commit time, user, and commit comment, if
 given.  Having this in a repo means one can ask questions like who
 has changed config in my network since last Friday? or when did
 this statement get added in the first place?.
 
 What else can we do to make this more worthwhile?
 
 Thanks,
 Phil
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] LN2600: an 8SFP Branch SRX

2013-08-04 Thread Ben Dale
I have one here on my desk and on paper, they're basically an SRX240 wrapped in 
7kgs of heatsink (with SFP interfaces). 

Of note though is that they do stack up rather well against unmanageable honey 
badgers:

http://www.flickr.com/photos/junipernetworks/9394081849/

Cheers,

Ben

On 03/08/2013, at 2:12 AM, Phil Fagan philfa...@gmail.com wrote:

 Makes sense; good to see Juniper...and SRX...in that field.
 
 
 On Fri, Aug 2, 2013 at 10:08 AM, Eduardo Barrios
 eduardo.barr...@lcra.orgwrote:
 
 
 Rugged means it's IEEE1613 compliant. For the electric utility companies
 these devices go in substations so they need to keep forwarding packets
 when introduced in those environments with higher temperatures and a lot of
 EMI (Electro Magnetic Interference) - can't blame it on the solar flare
 theory. ;-)
 
 Also utilities are beginning to run their protective relay protocols
 through IP networks so they are looking for reliability or risk blowing out
 $2mil transformers.
 
 I've been testing the LN2600 and yes it does run the SRX code.
 
 HTH,
 Eduardo
 
 Eduardo Barrios, EIT, JNCIS-SP
 IP/MPLS Telecommunications Specialist
 Lower Colorado River Authority  | 3505 Montopolis Dr. |  Austin, TX 78744
 512.730.6332 ph
 
 
 
 -Original Message-
 From: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] On Behalf
 Of Phil Fagan
 Sent: Friday, August 02, 2013 10:12 AM
 To: Julien Goodwin
 Cc: juniper-nsp
 Subject: Re: [j-nsp] LN2600: an 8SFP Branch SRX
 
 Where do these rugged devices usually get put? Just outdoors?
 
 
 On Fri, Aug 2, 2013 at 8:05 AM, Julien Goodwin jgood...@studio442.com.au
 wrote:
 
 Saw this come through on my RSS reader, it's worth a shout out as I'm
 sure more people than just me have been wanting a branch SRX with decent
 SFP density there's finally an option.
 
 http://www.juniper.net/us/en/products-services/routing/ln-series/ln2600/
 
 I'm assuming it runs the same branch SRX image as the rest of the line
 as that's been true for the LN1000 and this looks like more of the same.
 
 It's 48v only which is a shame, and being a rugged device I'm sure it's
 reassuring expensive.
 
 Also hidden in the datasheet is a reference to an LN2800 which has not
 been announced, but is obviously a similar rugged 1ru box of some sort.
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 --
 Phil Fagan
 Denver, CO
 970-480-7618
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 
 -- 
 Phil Fagan
 Denver, CO
 970-480-7618
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4550 version

2013-07-24 Thread Ben Dale
I believe 12.3R2 still has the bug where the syslog fills up with erroneous 
messages about one or both of the power supplies being removed (12.3R1 
complains about the fan tray AND the power supplies).  This is finally put to 
bed in 12.3R3

Cheers,

Ben

On 24/07/2013, at 7:56 PM, Pierre-Yves Maunier j-...@maunier.org wrote:

 I'll be deploying a couple of EX4550 doing mainly L3/MPLS stuff (ospf,
 bgp, l3vpn, l2circuit) and I'm going to roll out 12.3R3.4.
 
 Generally I prefer using at least an R3 release and as Juniper
 promised me that 12.3 would be 'the next 11.4' then I'm going for this
 one.
 
 2013/7/24 Luca Salvatore l...@ninefold.com:
 Hi All,
 
 Just got a couple of new EX4550 switches... current recommended version is 
 12.2r2.5
 But I just saw tha the 12.2 train is up release 5.3.
 
 Just wondering what the rest of you guys are running  and if you have any 
 horror stories.
 I'm not doing VC with these guys, they are going to be a pretty simple layer 
 2 aggregation type switch.
 
 Thanks.
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX devices upgraded to 2GB ram

2013-07-23 Thread Ben Dale

On 24/07/2013, at 12:53 AM, Pavel Lunin plu...@senetsy.ru wrote:

 
 22.07.2013 19:09, Gavin Henry wrote:
 This is the info we got from our supplier in UK who is a Juniper Elite
 partner:
 
  It's the same functionality and operation, just comes with 2G memory.
 It's part of a general refresh of the line that Juniper are doing just now
 to support future applications.
 
 Not sure how close those applications are. Some more UTM apps?
 
 
 That's true, but there is a caveat (apart from the minimal JUNOS version).
 
 Although I haven't asked local SE, I'm sure the -H2 models won't cluster with 
 the old SRXes. So people planning to upgrade their already installed SRXes to 
 clusters must either speed up or they will need to buy two boxes instead of 
 one. EoL for old models is 31 Dec 2013 but the channels will obviously hold 
 the new models as soon as they get rid of old stocks.
 

Not even remotely true - I have a 240H and a 240H2 clustered together on my 
desk right beside me - no issues..  

Unscientifically, the H2 does seem to boot faster so make it your primary when 
you can ; )   

This transition isn't that big a deal - it's happened plenty of times in the 
past.  J-Series with 256MB RAM and flash anyone?

Ben


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4550 version

2013-07-23 Thread Ben Dale
I pulled one out of the box the other day and whatever it shipped with wouldn't 
bring up 10G DAC cables (Cisco branded) and the backlight on the LCD panel 
didn't work (?!!) until I upgraded it (12.3R3), which fixed both issues.

On 24/07/2013, at 2:49 PM, Mark Tinka mark.ti...@seacom.mu wrote:

 On Wednesday, July 24, 2013 03:27:23 AM Luca Salvatore 
 wrote:
 
 Just got a couple of new EX4550 switches... current
 recommended version is 12.2r2.5 But I just saw tha the
 12.2 train is up release 5.3.
 
 Just wondering what the rest of you guys are running  and
 if you have any horror stories. I'm not doing VC with
 these guys, they are going to be a pretty simple layer 2
 aggregation type switch.
 
 We've been running ours since January this year, and back 
 then, only 12.2R2.4 was available for the chassis.
 
 Nothing major on our end, just pure Layer 2 aggregation in 
 the core. Haven't seen any problems yet, but our deployment 
 isn't that interesting. I use them mostly for the port 
 speed.
 
 Mark.
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] limitation to vrrp-group inheritance on MX?

2013-07-22 Thread Ben Dale
Hi Clarke,

Even though you have vrrp-inherit-from enabled, the interfaces are still 
participating in VRRP, albeit at a much slower rate (just enough to keep 
downstream ARP refreshed) so the MX is still allocating a specific VRRP MAC per 
group and thus the 255 limit still applies per interface.

See 
http://www.juniper.net/techpubs/en_US/junos11.4/topics/task/configuration/vrrp-inheritance-for-a-group-configuring.html

And in particular:

the groups that are inheriting the state do send out VRRP advertisements once 
every 2 to 3 minutes so as to facilitate MAC address learning on the switches 
placed between the VRRP routers.

Cheers,

Ben

On 23/07/2013, at 7:18 AM, Clarke Morledge chm...@wm.edu wrote:

 It looks like there is a limitation as to the number of times you can inherit 
 settings from a particular vrrp-group on a single interface, but is this 
 correct?
 
 Assume you have a single vlan with multiple IP subnets configured. However, 
 all you need is to have a single vrrp-group where all of the other IP subnets 
 can inherit vrrp config information from, let's say, the vrrp group with the 
 preferred address.  For example:
 
 [edit interfaces irb unit 100]
 MX# show
 family inet {
address 192.168.37.3/25 {
preferred;
vrrp-group 100 {
priority 125;
accept-data;
virtual-address 192.168.37.1;
}
}
address 192.168.38.3/25 {
vrrp-group 101 {
virtual-address 192.168.38.1;
vrrp-inherit-from {
active-interface irb.100;
active-group 100;
}
}
}
address 192.168.39.3/25 {
vrrp-group 102 {
virtual-address 192.168.39.1;
vrrp-inherit-from {
active-interface irb.100;
active-group 100;
}
}
}
 }
 
 
 For each IP address configured on the IRB interface (associated with one 
 particular vlan), you must have a DIFFERENT vrrp-group configured, even 
 though the inheriting addresses are only effectively using the vrrp-group 
 number as unique identifiers and place holders.
 
 If you try to use the SAME vrrp-group number for each address; e.g. 100, 
 you get a configuration error upon commit:
 
 Duplicate interface: irb unit: 100 vrrp-group: 100 for address:.
 
 Vrrp has a limitation as to the nunmber of groups available per vlan, 255. 
 Granted, having more than 255 addresses per interface is a lot, but it seems 
 arbitrary that the MX limits you to only having 255 IP subnets per vlan that 
 can use VRRP.
 
 Having a maximum of 255 VRRP active groups per vlan makes sense, as this is 
 what the VRRP standard specifies, but when you have a bunch of basically 
 inactive groups that inherit from one active group, it seems bizarre that 
 Junos says, NOPE, you can only have a maximum of 254 placeholders for 
 inactive vrrp groups per interface.
 
 Am I misunderstanding something here?
 
 Clarke Morledge
 College of William and Mary
 Information Technology - Network Engineering
 Jones Hall (Room 18)
 Williamsburg VA 23187
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Advice on a 100Gbps+ environment

2013-07-03 Thread Ben Dale
The QFX3600 is probably a little expensive for L2, but 64x 10GE ports in a 1RU 
ToR (or 16x 40GE, or a combination in the middle) is pretty solid.  

According to the docs they also support link aggregation up to 32 members[1].  
Would be interesting to know if this allows 40GE ports to be used natively in 
an aggregated ethernet...

[1] 
http://www.juniper.net/techpubs/en_US/junos12.3/topics/reference/general/qfx-series-software-features-overview.html#high-availability-features-by-platform-table

 
 On Tue, Jul 2, 2013 at 11:00 AM, Morgan McLean wrx...@gmail.com wrote:
 
 Wow, this thread snowballed into quite the MX80 debate. For the record, I
 run two in production where I am employed full time and they perform
 beautifully, though woefully underutilized.
 
 Using static routes and /32's as peering endpoints is a great option I
 skimmed over, I'll see if the upstream can do this...they should.
 
 Unfortunately, the customer signed the contract for bandwidth with
 inteliquent; we have existing 10G with telia and 10G with cogent along with
 a couple existing 10G from inteliquent, but I'm not sure if they'll stay.
 So I didn't really have much say...I think the price point was more
 important than the benefits of signing to a few carriers. In short, I'm
 working on that.
 
 This traffic should be mostly web.
 
 Sorry, I meant to say OSPF and ECMP. I would like to be able to run the
 VRRP at the end of row and extend L3 as far as I can, but I guess the
 customer wants to be able to spread machines in the same environments among
 multiple rows, which is understandable, but that means I need to run L2
 from distribution to access. Each row needs 100gbps useable, so I suppose 4
 x 40GBE LAGs would do the trick nicely. If my client doesn't want to spend
 the money in that area...
 
 Any good aggregation switch suggestions? Juniper is doesn't provide good
 ports for $ in the switching realmcustomer balked at the cost for a
 four port 40G blade on a 9200. Might check out brocade..
 
 Thanks,
 Morgan
 
 
 On Tue, Jul 2, 2013 at 8:13 AM, Christian de Balorre 
 cdebalo...@neotelecoms.com wrote:
 
 Slow control-plane. No RE redundancy. More limited rib  fib than regular
 MX. Cryptic licensing scheme.
 Otherwise nothing really wrong.
 
 Christian
 
 Le 02/07/2013 15:55, Drew Weaver a écrit :
 
 And what is wrong with the MX80 as a peering/transit router for up to
 80Gbps of traffic?
 
 Thanks,
 -Drew
 
 
 -Original Message-
 From: juniper-nsp [mailto:juniper-nsp-bounces@**puck.nether.net
 juniper-nsp-boun...@puck.nether.net]
 On Behalf Of Dobbins, Roland
 Sent: Tuesday, July 02, 2013 9:01 AM
 To: juniper-nsp Puck
 Subject: Re: [j-nsp] Advice on a 100Gbps+ environment
 
 
 On Jul 2, 2013, at 7:19 PM, Mark Tinka wrote:
 
 Says who?
 
 Doh - MX*480*, not MX*80*.  My mistake.
 
 --**--**
 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com
 
  Luck is the residue of opportunity and design.
 
   -- John Milton
 
 
 __**_
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/**mailman/listinfo/juniper-nsp
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 __**_
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/**mailman/listinfo/juniper-nsp
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 __**_
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/**mailman/listinfo/juniper-nsp
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 
 --
 Thanks,
 Morgan
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] similar ASA feature (RRI) on SRX

2013-06-24 Thread Ben Dale

On 25/06/2013, at 7:08 AM, OBrien, Will obri...@missouri.edu wrote:

 You can just point the route at the st0.x interface. When it's down, the 
 route won't install in the table.
 
 

Just watch this in 11.4R5.5 (and others nearby) - there was a bug introduced 
that kept the state of the tunnel sub-interface up even once the security 
associations were cleared.  Fixed in 12.1R4 (at least).



 On Jun 24, 2013, at 3:57 PM, Alberto Santos wrote:
 
 Hi,
 
 it looks like a possibility, but the remote IP address keeps changing because 
 it is dialup connection. can't monitor the next hop.
 
 
 BR
 
 
 Alberto Santos
 CCIE #26648
 JNCIS-SP - ITIL-F
 ...Fix your DNS, make it dual-stack, take your mail server and make it 
 dual-stack, take your web server and make it dual-stack... by Randy 
 Bush/RIPE IPv6
 
 
 On 24 June 2013 13:15, OBrien, Will 
 obri...@missouri.edumailto:obri...@missouri.edu wrote:
 https://kb.juniper.net/InfoCenter/index?page=contentid=KB24362
 
 On Jun 24, 2013, at 8:38 AM, Alberto Santos wrote:
 
 Hi there,
 
 I'm swapping a cisco ASA and I found myself stuck on how configure any
 similar to cisco RRI(reverse route injection) feature on junos,I'm load
 balacing with a BigIP between them and I need to know where the tunnel is
 active in order to advertise it on OSPF, has anyone experience any in the
 past? please send your thoughts, just keep in my that I can't run any IGP
 over the tunnel .
 
 
 BR/Alberto
 ___
 juniper-nsp mailing list 
 juniper-nsp@puck.nether.netmailto:juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX to vshield lan2lan

2013-06-20 Thread Ben Dale
Hi Klaus,

I just had a quick peek in the vShield manual - it looks like it only supports 
IKEv2, so you'll need to add the following line to your config:

set security ike gateway gw_lan_to_remote version v2-only

Ben

On 21/06/2013, at 4:35 AM, klauzi kla...@gmail.com wrote:

 Just wanted to double check that the interface is assigned to a zone at
 least.
 
 Did you try to enable the traceoptions under security ike to get more
 information? Best way is, that you are the responder in ike negotiation.
 Make sure that the other side initiates the ike traffic
 
 There is a document regarding vpn troubleshoooting:
 Search for: JSeries_SRXSeries_Route-based_VPN_to_ScreenOS_v13.pdf
 
 edit security ike traceoptions
 set file size 1m
 set flag policy-manager
 set flag ike
 set flag routing-socket
 commit
 
 Regards,
 
 Klaus
 
 
 On Thu, Jun 20, 2013 at 6:58 PM, bizza biz...@gmail.com wrote:
 
 Actually is assigned to WAN zone. Should I put it in LAN (where policies
 and other stuffs are)?
 
 Regards
 bizza
 
 
 On Thu, Jun 20, 2013 at 6:54 PM, Klaus Groeger kla...@gmail.com wrote:
 
 Did you assign the st0.x interface to a zone?
 
 
 
 
 
 --
 bizza
 http://www.rm-rf.eu/
 
 
 
 
 -- 
 nil extimescere
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Share static routes between routing-instances on EX series

2013-06-18 Thread Ben Dale
Hi Andy,

On 19/06/2013, at 9:29 AM, Andy Litzinger andy.litzin...@theplatform.com 
wrote:

SNIP

 
 I will try rib groups next, but I think I read somewhere that EX switches 
 don't support importing static routes via rib groups.
 
 I suppose this could also be solved by Filter Based Forwarding, but I'd like 
 to avoid that if possible; it just doesn't seem as clean.
 
 thanks in advance!
 -andy

The normal way to do it would be to have your static route with a 
next-table action, however it doesn't look like the EX (12.3) gives you that 
option (SRX and MX - no problem).

Which leaves you with either filter-based forwarding and the routing-instance 
action / rib-groups. 

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] BOOTP helper on MX vrf

2013-06-13 Thread Ben Dale
It's also now available on the SRX as of 12.1X44D10.  

One to watch though - Mac OSX and most other non-windows clients will fail to 
get an address from the JDHCP daemon because they set the BOOTP Unicast flag on 
all requests, whereas Windows will fall-back to broadcast after 30 seconds.  
The following command will fix it even though the text of the knob says the 
complete opposite of what it seems to do:

set system services dhcp-local-server group BLAH interface BLAH overrides 
no-unicast-replies
(or under your routing-instance)

Ben


On 13/06/2013, at 9:03 PM, Sebastian Wiesinger juniper-...@ml.karotte.org 
wrote:

 Hello,
 
 as I'm hearing conflicting information regarding bootp helper on MX
 routers in a vrf routing-instance, has anyone a working configuration?
 
 What I need:
 
 Forward DHCP broadcast requests from one vrf interface to a central
 DHCP server in the same VRF (classical bootp helper functionality). I
 don't want bootp helper on *every* interface, just a few.
 
 So any information regarding this is appreciated.
 
 Regards
 
 Sebastian
 
 -- 
 GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
 'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE 
 SCYTHE.
-- Terry Pratchett, The Fifth Elephant
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] I've got some bone head problem on an srx...but I don't see it.

2013-06-11 Thread Ben Dale

On 12/06/2013, at 11:29 AM, Morgan McLean wrx...@gmail.com wrote:

 I have an SRX cluster at an office with a single connection to the web at
 the moment. It has a couple ipsec connections out to our datacenters, and a
 couple local subnets hanging on RETH interfaces.
 
 For the life of me, I can't figure out why I'm unable to ping out from this
 system. Even if I try to ping the point to point between us and Verizon, a
 direct route, it won't work unless I specify the source address as our
 local interface address.
 
 Outbound nat from clients behind the SRX works fine. The loopback is in
 trust, and I have a couple zones + trust with a source nat rule using the
 verizon interface IP as the egress point. Destination nat rules work.
 
 So everything seems to work...except from the SRX. As a result, we cannot
 ping the SRX remotely...but again IPSEC works.
 
 Any great tips? None of our other SRX's behave like this...and its driving
 me nuts!

Being a cluster, this isn't fxp0 interface shenanigans is it?  Do you have the 
managemen function zone applied to fxp0?

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] [OT] unit-level vs interface-level description

2013-05-27 Thread Ben Dale


On 28/05/2013, at 12:58 AM, Nick Kritsky nick.krit...@gmail.com wrote:

 Hi fellow J-users,
 
 I hope I will not trigger some long-forgotten flame-war by that question.
 But I do wonder: what are the best practices for interface/unit
 descriptions?
 Do you put them on interface-level or unit-level? Especially when you have
 pure-L3 interface that only has unit 0 with family inet on it.
 
 Do you put description to interface level? Unit level? Or both levels? Or
 do you put it on both levels but different descriptions?
 
 I've seen people using different approaches, and I am just curious what's
 driving them.

For external links I tend to roll with:

set interfaces ge-0/0/0 description Connected to (Device X Port Y)
set interfaces ge-0/0/0 unit 0 description Circuit ID / Carrier Description

Where I'm talking to kit I control/where available, I tend to leave the 
physical stuff to something more accurate and self-updating like LLDP.  

On my to do list is writing an event-script that checks interfaces with LLDP 
neighbours every 24 hours or so and updates interface descriptions 
appropriately.

Driving my approach is being 6 stanzas deep in a config and being able to run 
top show interfaces ? and getting a nicely summarised list of the ports I 
should be referencing.

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Maximum IPsec (st0) tunnels for SRX-series

2013-05-05 Thread Ben Dale
As long as your tunnels don't breach the IPSEC Throughput numbers, you should 
be right™.  

I have a few SRX240s out there with upwards of 500 tunnels on them, some 
dynamic routing (3 core sites only), and they're sitting at around 50% CPU.  
They're all running DPD with intervals of 10 and 3 (which I think is as low as 
you can go).  

The scaling numbers I've seen for SRX1400s (for route-based VPNs) are the same 
as SRX3600s, and about double what the data sheet numbers currently show.

Ben

On 06/05/2013, at 10:02 AM, Dale Shaw dale.shaw+j-...@gmail.com wrote:

 Hi all,
 
 Just looking for some real-world experience with the maximum practical
 number of IPsec tunnel (st0) interfaces supported on SRX-series --
 everything from low end/branch up to high end.
 
 The data sheets say:
 
 SRX100: 128
 SRX110: 128
 SRX210: 256
 SRX220: 512
 SRX240: 1,000
 SRX550: 2,000
 SRX650: 3,000
 SRX1400: ?
 SRX3x00: 7,500
 SRX5x00: 15,000
 
 Those are some pretty hefty numbers as you move up the product family
 but as we all know, sometimes data sheets are pure fantasy, dreamt up
 by sales/marketing types after lavish and expensive liquid lunches.
 
 I just wanted to know if anyone's seen control planes turn into molten
 goop trying to wrangle, say, 100-150 tunnels.
 
 (I'm not worried about forwarding performance as all I'm looking at
 doing is fully-meshing an existing enterprise WAN where the SRX boxen
 are doing a great job shuffling packets (er, I mean flows) around.)
 
 cheers,
 Dale
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SSG20 PBR to Web Proxy

2013-05-01 Thread Ben Dale
Hi Josh,

I would recommend putting the proxy in it's own subnet and zone (even just a 
/30 off to the side).  Then you can apply policy routing on your external 
interface for inbound traffic, and the LAN interface for your outbound traffic.

If you let return connections go directly back to the client, I suspect that 
you're proxy won't end up being able to cache anything.

Cheers,

Ben

On 01/05/2012, at 2:08 PM, Josh Farrelly j...@base-2.co.nz wrote:

 Hi guys.
  
 We have a customer who’d like to implement a transparent web proxy 
 configuration using a Sophos Web Appliance. They sit behind an SSG20 that 
 connects them to the Internet. I’m suggesting the proxy will have an IP in 
 the LAN range.
  
 I’ve confirmed with Sophos that the proxy will correctly handle connections 
 if we policy-route any packets matching a destination port of TCP 80  443 to 
 it using the firewall, however I’m a little confused about how the return 
 traffic should be handled.
  
 I don’t believe the proxy will rewrite the layer 3 address of the packets it 
 sends out, so return traffic back from the external web servers will be 
 (theoretically) sent back to the internal IP address, which is the client 
 directly.
  
 Does anyone have any experience in implementing this, or any suggestions how 
 we go about returning the traffic to the proxy and not directly to the end 
 client? Any suggestions otherwise? Explicit mode on the proxy is not an 
 option.
  
 Regards,
  
 Josh Farrelly
 Senior Project Engineer
 
 P +64 9 630 4095 
 M +64 21 919 885 
 E j...@base-2.co.nz
 
 PO Box 24666, Royal Oak, Auckland 1345.
 126 Valley Rd, Mt Eden, Auckland 1024.
 
 www.base-2.co.nz
 
 image001.gif
 
  
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 3G/4G on SRX

2013-05-01 Thread Ben Dale
Hi Jeff,

To use the USB port on the branch SRX 100,110 or 210 as 3G/4G backup you need a 
sierra wireless modem.

There are very few listed on Juniper's supported list, but at least here in 
Australia I've found that most available Sierra 3G modems tend to work 
including:

USB306
SW312U
AC326U
AC310U
SW319U

4G is a different story thanks to new chipsets/drivers and only the Sierra 320U 
seems to work.

Depending on your carrier and the frequency that they operate at, you should be 
able to pick up unlocked SW cards on ebay or aliexpress pretty easily, then 
just drop your SIM in.

The alternative is grabbing a Juniper CX111 wireless bridge (which is a 
Cradlepoint CBA750 OEM) - they support a much bigger range of cards and will 
work with pretty much any router.  

http://www.cradlepoint.com/compatibility

Choose CBA750 in the Select Your Product menu on the right and you'll get the 
complete list:

Ben

On 02/05/2013, at 12:53 AM, Jeff Rooney jtroo...@nexdlevel.com wrote:

 Does anyone have any experience using a prepaid or month to month 3G/4G
 connection on a branch SRX? I am looking to replace a dial backup with a
 cellular connection, but the documentation is pretty weak and only
 references a Sierra Wireless AirCard.
 
 Any suggestions? Thanks.
 
 Jeff
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] CoS Configuration

2013-04-14 Thread Ben Dale

On 14/04/2013, at 1:32 PM, Giuliano Medalha giuli...@wztech.com.br wrote:

 Hi,
 
 Does anyone has some experience implementing CoS using Radius for MX Series
 with PPPoE License ?
 
 We are looking for a specific solution that:
 
 - Can allocate bandwidth of 1 Mbps for a subscriber user (PPPoE dynamic
 interface) for the first 1MB.
 
 - After the first 1MB  we will need to reduce the bandwidth for 512
 kbps.
 
 Witch mechanism or configuration we could use to do something similar to
 that ?
 
 Thanks a lot,
 
 Giuliano
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 

Hi Giuliano,

Juniper's SRC platform will do this but if you just want something simple, 
standard RADIUS CoA on the MX will let you change CoS filters on the fly.  You 
would simply trigger the CoA based on external events (such as accounting db 
information).  

To shape someone after only 1MB would mean that your accounting interval would 
have to be pretty short though.

Cheers,

Ben


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Config changes on VC with member down

2013-04-11 Thread Ben Dale


On 11/04/2013, at 10:08 PM, Luca Salvatore l...@ninefold.com wrote:

 HI,
 Quick question just for my own sanity :-/
 
 If i make some config changes on a VC when one of the members is down, what 
 happens to the config on the down member when it comes back up?  I'm assuming 
 it will just sync with the master right?

That won't be a problem.  Your Master and Backup REs keep the configuration for 
all members, so any changes will be pushed out when the down member is 
re-joined/replaced.  

Check this out if you need more detailed information on the process:

http://www.juniper.net/techpubs/en_US/junos/topics/task/installation/virtual-chassis-ex4200-member-replacing-cli.html

Cheers,

Ben
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] port mirror on EX causing crash

2013-04-09 Thread Ben Dale
Yep - listen to JTAC.

The parity error is definitely a sign that the memory on your switch is flakey 
- I had an EX4200 completely lock-up and drop out of a VC after 6 months of 
flawless operation.  Rebooted it and it came good, 24 hours later it dropped 
right back out again with the parity error again.

RMA and everything is happy again.

On 10/04/2013, at 2:50 PM, Luca Salvatore l...@ninefold.com wrote:

 Wondering if anyone has seen any issues with EX switches running port 
 mirroring - specifically seeing the switch generate a 'parity error' and 
 crashing?
 I have an EX4200 10.4r5.5, a few hours after turning on port mirroring  the 
 switch crashed.  It threw some memory parity errors which JTAC tells me means 
 the switch is faulty and should be replaced.
 
 The switch in question has been running fine for 3 years, but turning on a 
 ingress and egress port mirror (on a single port) seems to make the switch 
 have a bad day.  The switch isn't busy, and the port that I'm mirroring has 
 about 80 to 100Mb of traffic.  I'm mirroring the port to an IDS and would 
 like to keep it running for the foreseeable future.
 
 Any thoughts on this situation?
 Thanks
 Luca.
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 1000Base-T SFP shows Link Up without cable inserted

2013-04-01 Thread Ben Dale


On 01/04/2013, at 5:55 AM, Mathias Sundman math...@nilings.se wrote:

 I've just upgraded two of my MX5-T boxes to 11.4R7.5 and after that my 3rd 
 party 1000Base-T SFP (Transmode originals based on Finisar) started to show 
 Link Up as soon as the SFP is inserted (no cable inserted).
 
 On 11.2R5.4 it worked as it should. 11.4R1.14 that the boxes came with was 
 also broken.
 
 Bug or feature? Has anyone used any Juniper original 1000Base-T SFPs on the 
 MX-5/10/40/80-T platform with JunOS 11.4?

Both ; )  I've seen this a few times across various versions with different 
3rd-party 1GBaseT transceivers.  I don't know the specifics of why the issue is 
caused, but after swapping suppliers, and upgrading code, the issue appears to 
have gone away.

I guess that is the risk of using 3rd party - I'm not sure how much luck you'll 
have logging a case
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


  1   2   3   >