Re: [j-nsp] SRX IPSEC performance

2012-09-14 Thread Devin Kennedy
Hi Ashish:

I recently tested the SRX3400 for IPsec tunnel setup rates and was able to
setup 3600 tunnels using IxVPN testing tool.  I only sent traffic across the
tunnels for 1 minute but the testing was successful.  We were running 4x SPC
and 2xNPC in our configuration.  We were using one GE WAN interface as well.
Our primary purpose was just to test that number of IPsec tunnels that we
needed for a future implementation.  


Devin


-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of ashish verma
Sent: Thursday, September 13, 2012 5:35 PM
To: juniper-nsp
Subject: [j-nsp] SRX IPSEC performance

Hi All,

Has anyone here done IPSEC performance tests for SRX3k and share your
results?
Juniper claims that with 1400bytes of packet with 2SPC and 1NPC VPN
throughput is 3Gbps. How much have you achieved?

Ashish
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] nssa default route

2012-08-16 Thread Devin Kennedy
Hi Ryan:

Have you already tried adding the 'type-7' knob to the NSSA area?

[edit]
Devin@MX10-1# set protocols ospf area 1 nssa default-lsa ?  
Possible completions:
  <[Enter]>Execute this command
+ apply-groups Groups from which to inherit configuration data
+ apply-groups-except  Don't inherit configuration data from these groups
  default-metric   Metric for the default route in this area
(1..16777215)
  metric-type  External metric type for the default type 7 LSA
(1..2)
  type-7   Flood type 7 default LSA if no-summaries is
configured << This knob
  |Pipe through a command

Since you are configuring 'no-summaries' and the default route comes through
as such I believe you need to allow it as a type-7 instead.





-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of ryanL
Sent: Thursday, August 16, 2012 1:48 PM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] nssa default route

tl;dr - when i kill one of my mx's, the default route disappears on my ex's.
and, the remaining ospf database entry is for the router that died, not the
router that remains active.

i might be a little slow on the uptick here, but this seems pretty straight
forward to me. i can't figure out what's up. i'm pretty new to junos, so
bear with me.

m = mx
e = ex
standard physical full mesh

mx1 lo0 = 1.1.1.1
mx2 lo0 = 1.1.1.2

m - m
| x |
e - e

my mx are ospf area 0 and area 1 nssa. the ex are area 1 nssa only.
mx's inject default into nssa.

config on mx:

//
area 0.0.0.0 {
interface lo0.0 {
passive;
}
interface ae0.0 {
interface-type p2p;
bfd-liveness-detection {
minimum-interval 300;
multiplier 3;
full-neighbors-only;
}
}
}
area 0.0.0.1 {
nssa {
default-lsa default-metric 10;
no-summaries;
}
interface ae1.0 {
interface-type p2p;
bfd-liveness-detection {
minimum-interval 300;
multiplier 3;
full-neighbors-only;
}
}
interface ae2.0 {
interface-type p2p;
bfd-liveness-detection {
minimum-interval 300;
multiplier 3;
full-neighbors-only;
}
}
}
//

config on ex:

//
area 0.0.0.1 {
nssa;
interface lo0.0 {
passive;
}
interface ae1.0 {
interface-type p2p;
bfd-liveness-detection {
minimum-interval 300;
multiplier 3;
full-neighbors-only;
}
}
interface ae2.0 {
interface-type p2p;
bfd-liveness-detection {
minimum-interval 300;
multiplier 3;
full-neighbors-only;
}
}
interface ae0.0 {
interface-type p2p;
bfd-liveness-detection {
minimum-interval 300;
multiplier 3;
full-neighbors-only;
}
}
}
//

routes before killing mx2:
>show route 0.0.0.0

inet.0: 28 destinations, 28 routes (28 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

0.0.0.0/0  *[OSPF/10] 00:08:40, metric 15
> to 10.254.1.2 via ae1.0
  to 10.254.1.4 via ae2.0

ospf database before killing mx2:
> show ospf database

OSPF database, Area 0.0.0.1
 Type   ID   Adv Rtr   Seq  Age  Opt  Cksum  Len
Router  *10.255.1.1   10.255.1.1   0x848e  2283  0x20 0x7c36 168
Router   10.255.1.2   10.255.1.2   0x8486  2284  0x20 0x1e89 168
Router   1.1.1.1 1.1.1.2 0x83e2   513  0x20 0x7006  72
Router   1.1.1.2 1.1.1.2 0x83e8  1082  0x20 0x7bf2  72
Summary  0.0.0.0  1.1.1.1 0x8001   513  0x20 0xeaa8  28
Summary  0.0.0.0  1.1.1.2 0x80b4  1082  0x20 0x7d61  28



routes after killing mx2:
> show route 0.0.0.0
# show ospf database

OSPF database, Area 0.0.0.1
 Type   ID   Adv Rtr   Seq  Age  Opt  Cksum  Len
Router  *10.255.1.1   10.255.1.1   0x849041  0x20 0x286f 144
Router   10.255.1.2   10.255.1.2   0x848842  0x20 0x6030 144
Router   1.1.1.1 1.1.1.2 0x83e2   612  0x20 0x7006  72
Router   1.1.1.2 1.1.1.2 0x83e8  1181  0x20 0x7bf2  72
Summary  0.0.0.0  1.1.1.2 0x80b4  1181  0x20 0x7d61
28  #<---dead router!

so, what happened to my remaining router's ospf database entry, and that
secondary default route?

thanks for any insight. i'm going to open a case with jtac as well.

ryanL
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether

Re: [j-nsp] Best practice MTU?

2012-04-26 Thread Devin Kennedy



Sent from my Samsung Galaxy Note™, an AT&T LTE smartphone

 Original message 
Subject: Re: [j-nsp] Best practice MTU?
From: Jack Bates 
To: Chris Kawchuk 
CC: Re: [j-nsp] Best practice MTU?

I agree, as long as the transport between devices supports the MTU. This 
is especially important with device interoperability. Cisco, for 
example, apparently pads out ISO hello packets to MTU (Juniper limits it 
to maximum ISO packet size). If the packet is discarded by transport 
medium, the ISIS session will not come up. Found this one out increasing 
MTU by 4 to support a single MPLS tag. lol

Jack

On 4/26/2012 6:33 PM, Chris Kawchuk wrote:
> I usually set the interface physical MTU as high as it goes (per device), but 
> manually set protocol inet to MTU 1500 (for things like OSPF to work). This 
> allows for as-large-as-MTU-as-MPLS-can-do. Other address families aren't that 
> picky about MTU matching.
>
>
> ge-1/0/5 {
>  description "LINK to another IP/OSPF/MPLS device - May or May not 
>support MTU 9192 on the physical but inet4/OSPF is 1500 so it works";
>  mtu 9192;
>  unit 0 {
>  family inet {
>  mtu 1500;
>  address 10.102.10.1/24;
>  }
>  family mpls;
>  }
> }
>
> - CK.
>
>
>
> On 2012-04-27, at 7:32 AM, OBrien, Will wrote:
>
>> We've been pushing out jumbo frames across our new core lately. Right now 
>> I've got multiple boxes from multiple vendors that all support different 
>> maximum MTUs.
>>
>> Example: Juniper MX960/480, Nexus 7009, Nexus 5k/2k, Catalyst 4900, 
>> Nortel/Avaya 8600 All different maximums.
>>
>> Anyone have suggestions for a best practice MTU? (That is over 9000?!)
>>
>>
>> Thanks!
>>
>> Will
>> ___
>> juniper-nsp mailing list juniper-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] looking for jncie-sp study follow

2012-04-24 Thread Devin Kennedy
Hi Stefan:

Do you also have a recommendation for study materials for the JNCIP-SP
(taking to renew JNCIE-M) and also for study towards the JNCIE-SEC exams?  



Best Regards,

Devin J Kennedy
Juniper Engineer - AT&T Labs
dk5...@att.com


-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Stefan Fouant
Sent: Tuesday, April 24, 2012 10:57 AM
To: bruno.juniper
Cc: juniper-nsp
Subject: Re: [j-nsp] looking for jncie-sp study follow

On 4/23/2012 11:26 PM, bruno.juniper wrote:
> Looking for study folks; My exam is in 2 moths.skype: brunojuniper

Your best bet is to go through all the labs in JIR, AJSPR, JMV, JMR, and
JCOS. Mock these up and go through as many different scenarios as possible.
Also, the labs in Harry Reynolds' JNCIP and JNCIE Study Guides are still
good to go through as they are somewhat representative of the type of stuff
you will seen on the exam.

In addition, have you taken our JNCIE-SP bootcamp? You can order these
materials from our OnFullfillment website.

--
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ENT, JNCI
Technical Trainer, Juniper Networks

Follow us on Twitter @JuniperEducate
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

2012-03-05 Thread Devin Kennedy
Hi Stefan:

Thanks again for your input.  It looks like it won't take this command
either on the SRX...  See below when configuring the
physical-interface-policer:

juniper@SRX210-1-ipv6# edit firewall policer cos1_drop_80_out_small 

[edit firewall policer cos1_drop_80_out_small]
juniper@SRX210-1-ipv6# show 
filter-specific;
##
## Warning: statement ignored: unsupported platform (srx210he)
##
physical-interface-policer; <<<<<<<<<<<<<<<<<<<<
if-exceeding {
bandwidth-limit 800k;
burst-size-limit 100k;
}
then discard;


We are running Junos 10.4R9.5 as well.  



Thanks,

Devin



-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Devin Kennedy
Sent: Friday, March 02, 2012 1:17 PM
To: 'Stefan Fouant'; juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

Thanks Stefan!  I'll try that out and see if that will work for us.


-Original Message-
From: Stefan Fouant [mailto:sfou...@shortestpathfirst.net]
Sent: Friday, March 02, 2012 12:55 PM
To: 'Devin Kennedy'; juniper-nsp@puck.nether.net
Subject: RE: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

Hi Devin,

Have you tried using a Physical Interface Policer? A Physical Interface
Policer will allow you to apply your policers across different terms across
different firewall filters, that are applied to different protocol families
on a single physical interface, and then it will merge all the filters which
call that policer on the same physical interface. The cool thing is you can
use this across different logical interfaces that might even be in different
routing instances!

Try something along the following:

[edit firewall]
policer cos1_drop_8000K_out_medium {
physical-interface-policer;  < This is required
if-exceeding {
bandwidth-limit 8m;
burst-size-limit 1m;
}
then discard;
}
family inet {
filter filter-ipv4 {
physical-interface-filter;  < This is required
term 1 {
from {
protocol tcp;
port 80;
}
then {
policer cos1_drop_8000K_out_medium;
accept;
}
}
}
}
family inet6 {
filter filter-ipv6 {
physical-interface-filter;  < This is required
term 1 {
from {
protocol tcp;
port 80;
}
then {
policer cos1_drop_8000K_out_medium;
accept;
}
}
}
}

HTHs.

Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks

> -Original Message-
> From: Devin Kennedy [mailto:devinkennedy...@hotmail.com]
> Sent: Thursday, March 01, 2012 9:08 AM
> To: juniper-nsp@puck.nether.net
> Subject: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter
> 
> Hello:
> 
> 
> 
> We are currently testing dual stack CoS on the Juniper platform and 
> we're not seeing any way to aggregate the policing applied to IPv4 and 
> IPv6.  We want to allocate a customer a specific amount of bandwidth, 
> say 10m (including both IPv4 and IPv6 traffic in any proportional 
> amount), and have the traffic policed to 10m regardless of the amount 
> of IPv4 or IPv6 traffic.
> 
> 
> 
> 
> I see there is an option to use a logical-interface-policer at the 
> unit
> level:
> 
> 
> 
> firewall policer 10M-policing
> 
> {
> 
> logical-interface-policer;
> 
> if-exceeding {
> 
> bandwidth-limit 10m;
> 
> burst-size-limit 100k;
> 
> }
> 
> then discard;
> 
> }
> 
> 
> 
> 
> 
> interfaces {
> 
>  fe-2/0/3 {
> 
>   vlan-tagging;
> 
>unit 200 {
> 
>vlan-id 200;
> 
> policer {
> 
> input 10M-policing;
> 
> output 10M-policing;
> 
> }
> 
> 
> 
> However, we are policing differently for each CoS queue so we need to 
> call policers via MF and BA filters.  The problem is that there has to 
> be a different filter for each family (inet and inet6), so the two are 
> not able to use an aggregate amount.  So if we apply the same 10m 
> policer to each family it won't aggregate and instead applies an 
> instance of the policer for each family (so a total of 20m).
> 
> 
> 
> Does anyone know if it's possible to configure an aggregate policer 
> across two different firewall filters?  Below is an example of what we 
> are currently doing:
> 
> 
> 
> ge-0/0/1 {
> 
> per-unit-scheduler;
> 
> vlan-tagging;
> 
> speed 100m;
> 
> link-mode full-duplex;
> 
> gigether-options {
> 
>

Re: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

2012-03-02 Thread Devin Kennedy
Thanks Stefan!  I'll try that out and see if that will work for us.


-Original Message-
From: Stefan Fouant [mailto:sfou...@shortestpathfirst.net] 
Sent: Friday, March 02, 2012 12:55 PM
To: 'Devin Kennedy'; juniper-nsp@puck.nether.net
Subject: RE: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

Hi Devin,

Have you tried using a Physical Interface Policer? A Physical Interface
Policer will allow you to apply your policers across different terms across
different firewall filters, that are applied to different protocol families
on a single physical interface, and then it will merge all the filters which
call that policer on the same physical interface. The cool thing is you can
use this across different logical interfaces that might even be in different
routing instances!

Try something along the following:

[edit firewall]
policer cos1_drop_8000K_out_medium {
physical-interface-policer;  < This is required
if-exceeding {
bandwidth-limit 8m;
burst-size-limit 1m;
}
then discard;
}
family inet {
filter filter-ipv4 {
physical-interface-filter;  < This is required
term 1 {
from {
protocol tcp;
port 80;
}
then {
policer cos1_drop_8000K_out_medium;
accept;
}
}
}
}
family inet6 {
filter filter-ipv6 {
physical-interface-filter;  < This is required
term 1 {
from {
protocol tcp;
port 80;
}
then {
policer cos1_drop_8000K_out_medium;
accept;
}
}
}
}

HTHs.

Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks

> -Original Message-
> From: Devin Kennedy [mailto:devinkennedy...@hotmail.com]
> Sent: Thursday, March 01, 2012 9:08 AM
> To: juniper-nsp@puck.nether.net
> Subject: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter
> 
> Hello:
> 
> 
> 
> We are currently testing dual stack CoS on the Juniper platform and 
> we're not seeing any way to aggregate the policing applied to IPv4 and 
> IPv6.  We want to allocate a customer a specific amount of bandwidth, 
> say 10m (including both IPv4 and IPv6 traffic in any proportional 
> amount), and have the traffic policed to 10m regardless of the amount 
> of IPv4 or IPv6 traffic.
> 
> 
> 
> 
> I see there is an option to use a logical-interface-policer at the 
> unit
> level:
> 
> 
> 
> firewall policer 10M-policing
> 
> {
> 
> logical-interface-policer;
> 
> if-exceeding {
> 
> bandwidth-limit 10m;
> 
> burst-size-limit 100k;
> 
> }
> 
> then discard;
> 
> }
> 
> 
> 
> 
> 
> interfaces {
> 
>  fe-2/0/3 {
> 
>   vlan-tagging;
> 
>unit 200 {
> 
>vlan-id 200;
> 
> policer {
> 
> input 10M-policing;
> 
> output 10M-policing;
> 
> }
> 
> 
> 
> However, we are policing differently for each CoS queue so we need to 
> call policers via MF and BA filters.  The problem is that there has to 
> be a different filter for each family (inet and inet6), so the two are 
> not able to use an aggregate amount.  So if we apply the same 10m 
> policer to each family it won't aggregate and instead applies an 
> instance of the policer for each family (so a total of 20m).
> 
> 
> 
> Does anyone know if it's possible to configure an aggregate policer 
> across two different firewall filters?  Below is an example of what we 
> are currently doing:
> 
> 
> 
> ge-0/0/1 {
> 
> per-unit-scheduler;
> 
> vlan-tagging;
> 
> speed 100m;
> 
> link-mode full-duplex;
> 
> gigether-options {
> 
> no-auto-negotiation;
> 
> }
> 
> unit 2001 {
> 
> vlan-id 2001;
> 
> family inet {
> 
> filter {
> 
> output cos_filter;
> 
> }
> 
> address x.x.x.x/30;
> 
> }
> 
> family inet6 {
> 
> filter {
> 
> output cos_filter-v6;
> 
> }
> 
> address x::x/64;
> 
> }
> 
> }
> 
> }
> 
> 
> 
> The cos_filter then calls BA and MF filters such as:
> 
> 
> 
> [edit]
> 
> juniper@SRX210-2-IPV6# show firewall family inet filter cos1_MF
> 
> term 1 {
> 
> from {
> 
> protocol [ udp tcp ];
> 
> port 2081;
> 
> }
> 
> then {
> 
> policer cos1_drop_8000K_out_medium;
> 
> count COS1_MF_counter;
> 

Re: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

2012-03-02 Thread Devin Kennedy
Thanks for your response Krasi.  Unfortunately it appears it's not supported
on the SRX/J series in that way.  It won't commit stating that it's the
wrong platform for using the logical-interface-policer statement in that
manner.

 

 

 

From: Krasimir Avramski [mailto:kr...@smartcom.bg] 
Sent: Thursday, March 01, 2012 11:16 AM
To: Devin Kennedy
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] Dual Stack Aggregate Policing via Firewall Filter

 

Hi,
It is possible to reference logical-interface-policer in interface-specific
filters for inet and inet6 families.

Krasi

On 1 Mar 2012 16:11, "Devin Kennedy"  wrote:

Hello:



We are currently testing dual stack CoS on the Juniper platform and we're
not seeing any way to aggregate the policing applied to IPv4 and IPv6.  We
want to allocate a customer a specific amount of bandwidth, say 10m
(including both IPv4 and IPv6 traffic in any proportional amount), and have
the traffic policed to 10m regardless of the amount of IPv4 or IPv6 traffic.




I see there is an option to use a logical-interface-policer at the unit
level:



firewall policer 10M-policing

{

logical-interface-policer;

if-exceeding {

   bandwidth-limit 10m;

   burst-size-limit 100k;

}

then discard;

}





interfaces {

 fe-2/0/3 {

 vlan-tagging;

  unit 200 {

  vlan-id 200;

   policer {

   input 10M-policing;

   output 10M-policing;

}



However, we are policing differently for each CoS queue so we need to call
policers via MF and BA filters.  The problem is that there has to be a
different filter for each family (inet and inet6), so the two are not able
to use an aggregate amount.  So if we apply the same 10m policer to each
family it won't aggregate and instead applies an instance of the policer for
each family (so a total of 20m).



Does anyone know if it's possible to configure an aggregate policer across
two different firewall filters?  Below is an example of what we are
currently doing:



ge-0/0/1 {

   per-unit-scheduler;

   vlan-tagging;

   speed 100m;

   link-mode full-duplex;

   gigether-options {

   no-auto-negotiation;

   }

   unit 2001 {

   vlan-id 2001;

   family inet {

   filter {

   output cos_filter;

   }

   address x.x.x.x/30;

   }

   family inet6 {

   filter {

   output cos_filter-v6;

   }

   address x::x/64;

   }

   }

}



The cos_filter then calls BA and MF filters such as:



[edit]

juniper@SRX210-2-IPV6# show firewall family inet filter cos1_MF

term 1 {

   from {

   protocol [ udp tcp ];

   port 2081;

   }

   then {

   policer cos1_drop_8000K_out_medium;

   count COS1_MF_counter;

   forwarding-class cos1;

   accept;

   }

}



[edit]

juniper@SRX210-2-IPV6# show firewall family inet filter cos1_ba

term 1 {

   from {

   dscp [ 46 40 ];

   }

   then {

   policer cos1_drop_8000K_out_medium;

   count cos1_BA_PLP_Low_counter;

   forwarding-class cos1;

   accept;

   }

}



And here is the common policer called by both the inet and inet6 filters (MF
and BA for each family):



[edit]

juniper@SRX210-2-IPV6# show firewall policer cos1_drop_8000K_out_medium

filter-specific;

if-exceeding {

   bandwidth-limit 8m;

   burst-size-limit 1m;

}

then discard;





We need that 8m to apply to both families together.  Any pointers?







Thanks,



Devin

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Dual Stack Aggregate Policing via Firewall Filter

2012-03-01 Thread Devin Kennedy
Hello:

 

We are currently testing dual stack CoS on the Juniper platform and we're
not seeing any way to aggregate the policing applied to IPv4 and IPv6.  We
want to allocate a customer a specific amount of bandwidth, say 10m
(including both IPv4 and IPv6 traffic in any proportional amount), and have
the traffic policed to 10m regardless of the amount of IPv4 or IPv6 traffic.


 

I see there is an option to use a logical-interface-policer at the unit
level:

 

firewall policer 10M-policing

{

logical-interface-policer;

if-exceeding {

bandwidth-limit 10m;

burst-size-limit 100k;

}

then discard;

}

 

 

interfaces {

 fe-2/0/3 {

  vlan-tagging;

   unit 200 {

   vlan-id 200;

policer {

input 10M-policing;

output 10M-policing;

}

 

However, we are policing differently for each CoS queue so we need to call
policers via MF and BA filters.  The problem is that there has to be a
different filter for each family (inet and inet6), so the two are not able
to use an aggregate amount.  So if we apply the same 10m policer to each
family it won't aggregate and instead applies an instance of the policer for
each family (so a total of 20m).  

 

Does anyone know if it's possible to configure an aggregate policer across
two different firewall filters?  Below is an example of what we are
currently doing:

 

ge-0/0/1 {

per-unit-scheduler;

vlan-tagging;

speed 100m;

link-mode full-duplex;

gigether-options {

no-auto-negotiation;

}

unit 2001 {

vlan-id 2001;

family inet {

filter {

output cos_filter;

}

address x.x.x.x/30;

}

family inet6 {

filter {

output cos_filter-v6;

}

address x::x/64;

}

}

}

 

The cos_filter then calls BA and MF filters such as:

 

[edit]

juniper@SRX210-2-IPV6# show firewall family inet filter cos1_MF 

term 1 {

from {

protocol [ udp tcp ];

port 2081;

}

then {

policer cos1_drop_8000K_out_medium;

count COS1_MF_counter;

forwarding-class cos1;

accept;

}

}

 

[edit]

juniper@SRX210-2-IPV6# show firewall family inet filter cos1_ba

term 1 {

from {

dscp [ 46 40 ];

}

then {

policer cos1_drop_8000K_out_medium;

count cos1_BA_PLP_Low_counter;

forwarding-class cos1;

accept;

}

}

 

And here is the common policer called by both the inet and inet6 filters (MF
and BA for each family):

 

[edit]

juniper@SRX210-2-IPV6# show firewall policer cos1_drop_8000K_out_medium 

filter-specific;

if-exceeding {

bandwidth-limit 8m;

burst-size-limit 1m;

}

then discard;

 

 

We need that 8m to apply to both families together.  Any pointers?

 

 

 

Thanks,

 

Devin

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Junos Load Balancing Behavior

2012-02-02 Thread Devin Kennedy
Hello:

 

I'm looking for some insight on the load balancing behavior that Junos uses
by default.  We are certifying our Junos platform CE routers (SRX, MX10,
M7i) and not seeing what we expected given the documentation we have.  

 

According to the Juniper docs and the old JNCIP study guide, OSPF will
automatically load balance if there are two equal cost routes.  And indeed
in the routing table we have default route advertised via OSPF to a CE
router which shows two next hops (one to each of two PE's).  

 

juniper@SRX240-5> show route 0/0 exact 

 

inet.0: 23 destinations, 23 routes (23 active, 0 holddown, 0 hidden)

+ = Active Route, - = Last Active, * = Both

 

0.0.0.0/0  *[OSPF/150] 20:45:21, metric 112, tag 13979

  to 10.7.122.1 via ge-0/0/6.0

> to 10.7.122.2 via ge-0/0/6.0

 

However in the forwarding table there is only one next-hop shown and when
testing traffic flows we don't see any load balancing by default.  

 

juniper@SRX240-5> show route forwarding-table destination 0/0

Routing table: default.inet

Internet:

DestinationType RtRef Next hop   Type Index NhRef Netif

defaultuser 0ulst 262142 2

  80:71:1f:c0:3c:81  ucst   584 4 ge-0/0/6.0

defaultperm 0rjct36 4

0.0.0.0/32 perm 0dscd34 2

 

Routing table: __master.anon__.inet

Internet:

DestinationType RtRef Next hop   Type Index NhRef Netif

defaultperm 0rjct   517 1

0.0.0.0/32 perm 0dscd   515 1

 

Everything goes across the one next hop only (the one with the > in front of
it).  We have to add an export policy to the routing-options
forwarding-table stanza to get it to work.  

 

This is from the Junos documentation for OSPF for version 10.4:

 

"When several equal-cost routes to a destination exist, traffic is
distributed equally among them."  

 

http://www.juniper.net/techpubs/en_US/junos10.4/topics/concept/ospf-routing-
overview.html

 

Shouldn't the load balancing work by default as the documentation would lead
one to believe?  Does anyone have any insight into this?  Is the
documentation incorrect and you actually are required to always add a
load-balancing export policy in order to get the desired load-balancing
behavior?

 

 

 

Best Regards,

 

Devin J Kennedy

Juniper Engineer - AT&T Labs

 

 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] M160 SFM BOGUS ERRORS

2011-06-09 Thread Devin Kennedy
Due to the shared memory architecture of the M160, the bogus cells could be 
coming from any of the FPCs or the problem could be the SFM itself.  Usually 
the problem is caused by an FPC in my experience.  

To isolate the offending FPC, you can do the following steps:
 
1) reboot each FPC one at a time
2) look for any bchip (or bogus cell) errors reported in syslog during bootup
 
This should expose the FPC that is introducing the bogus cells.
 
But JTAC may have more commands they can run that may not require you to reboot 
the FPC's one by one if this router is a critical router.  So I would recommend 
opening a case with them.  

 

-Original Message-
From: Mario Andres Rueda Jaimes [mailto:maeve2...@gmail.com] 
Sent: Thursday, June 09, 2011 11:22 AM
To: Devin Kennedy
Cc: juniper-nsp@puck.nether.net
Subject: RE: [j-nsp] M160 SFM BOGUS ERRORS

Devin

We are running junos 9,6R3.8 the messages seen once the SFM goes up, are like 
this

Jun  9 13:58:16fpc0 DCHIP(0/3): H/S link Tx12(0) overflow
Jun  9 13:58:16   fpc0 DCHIP(0/3): H/S link Tx12(1) overflow
Jun  9 13:58:16   fpc6 DCHIP(6/0): H/S link Tx12(1) overflow
Jun  9 13:58:16   fpc6 DCHIP(6/0): H/S link Tx12(2) overflow
Jun  9 13:58:19   fpc7 DCHIP(7/1): H/S link Tx12(0) overflow
Jun  9 13:58:19   fpc0 DCHIP(0/3): H/S link Tx12(1) overflow
Jun  9 13:58:20   fpc0 DCHIP(0/3): H/S link Tx12(0) overflow
Jun  9 13:59:15   fpc6 DCHIP(6/0): H/S link Tx12(1) overflow

right now only bogus errors are seen

Regards


-Mensaje original-
De: Devin Kennedy 
Para: 'Mario Andres Rueda Jaimes' , 
juniper-nsp@puck.nether.net
Asunto: RE: [j-nsp] M160 SFM BOGUS ERRORS
Fecha: Thu, 9 Jun 2011 10:34:18 -0400

In my experience, these can be caused by either the SFM or one of the FPCs.


In the messages log, do you see any B chip errors?  What version of Junos?  

Usually this indicates a hardware issue and often requires an RMA of the faulty 
SFM or FPC.  You should open a case with JTAC for this.  


-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Mario Andres Rueda 
Jaimes
Sent: Thursday, June 09, 2011 10:12 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] M160 SFM BOGUS ERRORS

Hi All,

We are getting following error messages on our M160 Router, there is no traffic 
impact, anyone can help with this ?


Jun  9 14:03:57   sfm2 Bogus Cell incremented since last 
reported.3
Jun  9 14:05:27   sfm2 Bogus Cell incremented since last reported.  



Thanks and Regards

___
juniper-nsp mailing list juniper-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/juniper-nsp




___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] M160 SFM BOGUS ERRORS

2011-06-09 Thread Devin Kennedy
In my experience, these can be caused by either the SFM or one of the FPCs.


In the messages log, do you see any B chip errors?  What version of Junos?  

Usually this indicates a hardware issue and often requires an RMA of the
faulty SFM or FPC.  You should open a case with JTAC for this.  


-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Mario Andres Rueda
Jaimes
Sent: Thursday, June 09, 2011 10:12 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] M160 SFM BOGUS ERRORS

Hi All,

We are getting following error messages on our M160 Router, there is no
traffic impact, anyone can help with this ?


Jun  9 14:03:57   sfm2 Bogus Cell incremented since last 
reported.3
Jun  9 14:05:27   sfm2 Bogus Cell incremented since last reported.  



Thanks and Regards

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper Equivalent to Cisco's qos pre-classify?

2011-06-07 Thread Devin Kennedy
Thanks Jon.  Actually we need this to work on the SRX210, SRX240, J4350 and
M7i.  We did find that we were able to add a input/output filter in order to
classify on the sp- interface, but the SRX/J boxes don't allow application
of a filter at all for the st0 interface it seems.  

 

Thanks for the input in regards to the M-series, however; this will help us
with the M7i for sure.  

 

From: Jonathan Looney [mailto:jonloo...@gmail.com] 
Sent: Tuesday, June 07, 2011 2:16 PM
To: Devin Kennedy
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] Juniper Equivalent to Cisco's qos pre-classify?

 

You didn't specify the platform.

If you're speaking of something with an AS or MS card/module of some kind,
then you can do this by classifying the pre-encrypted packet anytime between
input and encryption. If you want to classify it on output to the encryption
module, you would apply the classifier to the appropriate (inside) unit on
the sp-* interface. I believe you can even apply a re-write rule on that
interface that will change the original (unencrypted) packet's ToS bits as
it transmitted to the AS/MS card/module for encryption. The ToS bits should
get copied to the ESP (encrypted) packet's IP header, and I believe the
router should maintain the previously-assigned forwarding class and loss
priority for the packet. You'll just need to make sure you don't
accidentally change the forwarding class/loss priority as the encrypted
packet makes its way through the router a second time. Then, if desired, you
can apply a custom rewrite rule on output. (Keep in mind that - if I recall
correctly - the default IP precedence output rule may cause packets from
other forwarding classes to be marked as best effort.)

If you're speaking of an SRX device, then I can't help you definitively.
However, I suspect it may work in a similar way if you substitute st
interface for sp-* interface in the above.

Hope that helps.

-Jon

On Tue, Jun 7, 2011 at 11:19 AM, Devin Kennedy 
wrote:

Hello:



I'm trying to get our current CoS configurations to work with IPsec.  I know
that the ToS bits are copied to the IP header that ESP places on the
encrypted payload.  However, we are currently utilizing MF classifiers, so
we are classifying based on dest/source addresses and ports.  The problem is
that the classification happens after encryption so all of our packets are
being sent to the BE queue (since the TCP header is no longer visible after
encryption).



Is anyone aware of a command or a method of accomplishing the same thing as
Cisco's "qos pre-classify" command so that the classification is done before
the encryption process?





Thanks for any help on this.







Best Regards,



Devin J Kennedy





___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Juniper Equivalent to Cisco's qos pre-classify?

2011-06-07 Thread Devin Kennedy
Hello:

 

I'm trying to get our current CoS configurations to work with IPsec.  I know
that the ToS bits are copied to the IP header that ESP places on the
encrypted payload.  However, we are currently utilizing MF classifiers, so
we are classifying based on dest/source addresses and ports.  The problem is
that the classification happens after encryption so all of our packets are
being sent to the BE queue (since the TCP header is no longer visible after
encryption).  

 

Is anyone aware of a command or a method of accomplishing the same thing as
Cisco's "qos pre-classify" command so that the classification is done before
the encryption process?

 

 

Thanks for any help on this.

 

 

 

Best Regards,

 

Devin J Kennedy

 

 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] IKE Key Life-times on J-series vs. SRX

2011-06-02 Thread Devin Kennedy
Thanks Stefan.  This is what I was thinking should be the case as well.  



-Original Message-
From: Stefan Fouant [mailto:sfou...@shortestpathfirst.net] 
Sent: Thursday, June 02, 2011 4:29 PM
To: 'Devin Kennedy'; juniper-nsp@puck.nether.net
Subject: RE: [j-nsp] IKE Key Life-times on J-series vs. SRX

> -Original Message-
> From: juniper-nsp-boun...@puck.nether.net [mailto:juniper-nsp- 
> boun...@puck.nether.net] On Behalf Of Devin Kennedy
> Sent: Thursday, June 02, 2011 3:59 PM
> To: juniper-nsp@puck.nether.net
> Subject: Re: [j-nsp] IKE Key Life-times on J-series vs. SRX
> 
> Does anyone know if the lifetime value used for the IKE session is 
> determined by the initiator?  It appears from the behavior I've 
> observed that the lifetime value is always determined by whichever 
> peer is in the initiator role.

That shouldn't be the case, but will need to do some digging.

It should always be that the peers use the lesser of the two lifetime
settings as their negotiated IKE SA lifetime.

Stefan Fouant
JNCIE-M #513, JNCIE-ER #70, JNCI
GPG Key ID: 0xB4C956EC


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] IKE Key Life-times on J-series vs. SRX

2011-06-02 Thread Devin Kennedy
Does anyone know if the lifetime value used for the IKE session is
determined by the initiator?  It appears from the behavior I've observed
that the lifetime value is always determined by whichever peer is in the
initiator role.  



-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Devin Kennedy
Sent: Thursday, June 02, 2011 11:37 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] IKE Key Life-times on J-series vs. SRX

Hello All:

 

I am seeing a difference in behavior on the J4350 vs. the SRX240 for the IKE
key lifetime negotiation for IPsec phase 1.  In both cases the peer is a
Cisco 1841.  Please see outputs below.  Has anyone else run into this?  I
would expect that it ought to take the lower lifetime value as it does on
the SRX240.  

 

BTW, I’m running Junos 10.4R4.5 on both Juniper routers.

 

On the SRX I saw what I expected to see, which is that the negotiated value
is the lesser of the two if they do not match:

 


SRX240


 

[edit]

Devin@SRX240-1# show security ike proposal testikeprop 

authentication-method pre-shared-keys;

dh-group group2;

authentication-algorithm sha1;

encryption-algorithm aes-256-cbc;

 

[edit]

Devin@SRX240-1# run show security ike security-associations detail 

IKE peer 10.10.3.89, Index 7707821,

  Role: Initiator, State: UP

  Initiator cookie: ed10b684f40a71d2, Responder cookie: 3c2a1fb09e701c34

  Exchange type: Main, Authentication method: Pre-shared-keys

  Local: 10.10.3.93:500, Remote: 10.10.3.89:500

  Lifetime: Expires in 28795 seconds

  Peer ike-id: 10.10.3.89

  Xauth assigned IP: 0.0.0.0

  Algorithms:

   Authentication: sha1 

   Encryption: aes-cbc (256 bits)

   Pseudo random function: hmac-sha1

  Traffic statistics:

   Input  bytes  :  688

   Output bytes  :  880

   Input  packets:4

   Output packets:5

  Flags: Caller notification sent 

  IPSec security associations: 1 created, 0 deleted

  Phase 2 negotiations in progress: 1

 

Negotiation type: Quick mode, Role: Initiator, Message ID: 1851437682

Local: 10.10.3.93:500, Remote: 10.10.3.89:500

Local identity: ipv4_subnet(any:0,[0..7]=10.100.9.0/24)

Remote identity: ipv4_subnet(any:0,[0..7]=10.100.7.0/24)

Flags: Caller notification sent, Waiting for done

 


Cisco 1841


 

crypto isakmp policy 1

encr aes 256

authentication pre-share

group 2

 

C1841-2#show crypto isakmp policy

 

Global IKE policy

Protection suite of priority 1

   encryption algorithm:  AES - Advanced Encryption Standard (256
bit keys).

   hash algorithm:Secure Hash Standard

   authentication method: Pre-Shared Key

   Diffie-Hellman group:  #2 (1024 bit)

   lifetime:86400 seconds, no volume limit

Default protection suite

   encryption algorithm:  DES - Data Encryption Standard (56 bit
keys).

   hash algorithm:Secure Hash Standard

   authentication method: Rivest-Shamir-Adleman Signature

   Diffie-Hellman group:  #1 (768 bit)

   lifetime:86400 seconds, no volume limit

 

C1841-2#show crypto isakmp sa detail

Codes: C - IKE configuration mode, D - Dead Peer Detection

   K - Keepalives, N - NAT-traversal

   X - IKE Extended Authentication

   psk - Preshared key, rsig - RSA signature

   renc - RSA encryption

IPv4 Crypto ISAKMP SA

 

C-id  Local   Remote  I-VRFStatus Encr Hash Auth DH
Lifetime Cap.

 

1156  10.10.3.89  10.10.3.93   ACTIVE aes  sha  psk  2  0
D   

   Engine-id:Conn-id =  ???

(deleted)

 

1155  10.10.3.89  10.10.3.93   ACTIVE aes  sha  psk  2
07:59:34 D   

   Engine-id:Conn-id =  SW:155

 

 

With the J4350 in place of the SRX240 with the same configuration as shown
for the SRX240 and same configuration as shown for the Cisco 1841, I see:

 


J4350


 

[edit]

Devin@J4350-1# show security ike proposal testikeprop ß No lifetime
configured so should use default of 28800

authentication-method pre-shared-keys;

dh-group group2;

authentication-algorithm sha1;

encryption-algorithm aes-256-cbc;

 

[edit]

Devin@J4350-1#

 

Devin@J4350-1> show security ike security-associations detail 

IKE peer 10.10.3.89, Index 4833153,

  Role: Responder, State: UP

  Initiator cookie: b4443ecf19364ac2, Responder cookie: 7c741a4fcb0f5558

  Exchange type: Main, Authentication method: Pre-shared-keys

  Local: 10.10.3.85:500, Remote: 10.10.3.89:500

  Lifetime: Expires in 86321 seconds

  Peer ike-id: 10.10.3.89

  Xauth assigned IP: 0.0.0.0

  Algorithms:

   Authentication: sha1 

   Encryption: aes-cbc (256 bits)

   Pseudo random function: hmac-sha1

  Traffic statistics:

   Input  bytes  :  864

   Output bytes  : 1092

   Input  packets: 

[j-nsp] IKE Key Life-times on J-series vs. SRX

2011-06-02 Thread Devin Kennedy
Hello All:

 

I am seeing a difference in behavior on the J4350 vs. the SRX240 for the IKE
key lifetime negotiation for IPsec phase 1.  In both cases the peer is a
Cisco 1841.  Please see outputs below.  Has anyone else run into this?  I
would expect that it ought to take the lower lifetime value as it does on
the SRX240.  

 

BTW, I’m running Junos 10.4R4.5 on both Juniper routers.

 

On the SRX I saw what I expected to see, which is that the negotiated value
is the lesser of the two if they do not match:

 


SRX240


 

[edit]

Devin@SRX240-1# show security ike proposal testikeprop 

authentication-method pre-shared-keys;

dh-group group2;

authentication-algorithm sha1;

encryption-algorithm aes-256-cbc;

 

[edit]

Devin@SRX240-1# run show security ike security-associations detail 

IKE peer 10.10.3.89, Index 7707821,

  Role: Initiator, State: UP

  Initiator cookie: ed10b684f40a71d2, Responder cookie: 3c2a1fb09e701c34

  Exchange type: Main, Authentication method: Pre-shared-keys

  Local: 10.10.3.93:500, Remote: 10.10.3.89:500

  Lifetime: Expires in 28795 seconds

  Peer ike-id: 10.10.3.89

  Xauth assigned IP: 0.0.0.0

  Algorithms:

   Authentication: sha1 

   Encryption: aes-cbc (256 bits)

   Pseudo random function: hmac-sha1

  Traffic statistics:

   Input  bytes  :  688

   Output bytes  :  880

   Input  packets:4

   Output packets:5

  Flags: Caller notification sent 

  IPSec security associations: 1 created, 0 deleted

  Phase 2 negotiations in progress: 1

 

Negotiation type: Quick mode, Role: Initiator, Message ID: 1851437682

Local: 10.10.3.93:500, Remote: 10.10.3.89:500

Local identity: ipv4_subnet(any:0,[0..7]=10.100.9.0/24)

Remote identity: ipv4_subnet(any:0,[0..7]=10.100.7.0/24)

Flags: Caller notification sent, Waiting for done

 


Cisco 1841


 

crypto isakmp policy 1

encr aes 256

authentication pre-share

group 2

 

C1841-2#show crypto isakmp policy

 

Global IKE policy

Protection suite of priority 1

   encryption algorithm:  AES - Advanced Encryption Standard (256
bit keys).

   hash algorithm:Secure Hash Standard

   authentication method: Pre-Shared Key

   Diffie-Hellman group:  #2 (1024 bit)

   lifetime:86400 seconds, no volume limit

Default protection suite

   encryption algorithm:  DES - Data Encryption Standard (56 bit
keys).

   hash algorithm:Secure Hash Standard

   authentication method: Rivest-Shamir-Adleman Signature

   Diffie-Hellman group:  #1 (768 bit)

   lifetime:86400 seconds, no volume limit

 

C1841-2#show crypto isakmp sa detail

Codes: C - IKE configuration mode, D - Dead Peer Detection

   K - Keepalives, N - NAT-traversal

   X - IKE Extended Authentication

   psk - Preshared key, rsig - RSA signature

   renc - RSA encryption

IPv4 Crypto ISAKMP SA

 

C-id  Local   Remote  I-VRFStatus Encr Hash Auth DH
Lifetime Cap.

 

1156  10.10.3.89  10.10.3.93   ACTIVE aes  sha  psk  2  0
D   

   Engine-id:Conn-id =  ???

(deleted)

 

1155  10.10.3.89  10.10.3.93   ACTIVE aes  sha  psk  2
07:59:34 D   

   Engine-id:Conn-id =  SW:155

 

 

With the J4350 in place of the SRX240 with the same configuration as shown
for the SRX240 and same configuration as shown for the Cisco 1841, I see:

 


J4350


 

[edit]

Devin@J4350-1# show security ike proposal testikeprop ß No lifetime
configured so should use default of 28800

authentication-method pre-shared-keys;

dh-group group2;

authentication-algorithm sha1;

encryption-algorithm aes-256-cbc;

 

[edit]

Devin@J4350-1#

 

Devin@J4350-1> show security ike security-associations detail 

IKE peer 10.10.3.89, Index 4833153,

  Role: Responder, State: UP

  Initiator cookie: b4443ecf19364ac2, Responder cookie: 7c741a4fcb0f5558

  Exchange type: Main, Authentication method: Pre-shared-keys

  Local: 10.10.3.85:500, Remote: 10.10.3.89:500

  Lifetime: Expires in 86321 seconds

  Peer ike-id: 10.10.3.89

  Xauth assigned IP: 0.0.0.0

  Algorithms:

   Authentication: sha1 

   Encryption: aes-cbc (256 bits)

   Pseudo random function: hmac-sha1

  Traffic statistics:

   Input  bytes  :  864

   Output bytes  : 1092

   Input  packets:5

   Output packets:5

  Flags: Caller notification sent 

  IPSec security associations: 1 created, 0 deleted

  Phase 2 negotiations in progress: 1

 

Negotiation type: Quick mode, Role: Responder, Message ID: 931695683

Local: 10.10.3.85:500, Remote: 10.10.3.89:500

Local identity: ipv4_subnet(any:0,[0..7]=10.100.11.0/24)

Remote identity: ipv4_subnet(any:0,[0..7]=10.100.7.0/24)

Flags: Caller notification sent, Waiting for done

 


 


Cisco 1841


 

C184

Re: [j-nsp] Trying to get OSPF to work across IPsec for Redundancy

2011-04-29 Thread Devin Kennedy
I was finally able to get this working.  I had to set the MTU's explicitly
on each sub unit (I just set them to 1500).  I guess the default MTU that
the st0 and sp- interfaces use doesn't work well with OSPF.  



-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of OBrien, Will
Sent: Friday, April 29, 2011 10:08 AM
To: Dale Shaw
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] Trying to get OSPF to work across IPsec for Redundancy

We were using two tunnels to separate peers. 1 to a pci network and another
for office workers to be on our normal user network.

I will see if I can dig up details later today

Will

Sent from my iPad

On Apr 29, 2011, at 9:05 AM, "Dale Shaw"  wrote:

> Hi Stefan,
> 
> On Friday, April 29, 2011, Stefan Fouant 
> 
wrote:
>> I have successfully built IPsec tunnels using a Secure Tunnel 
>> interface terminating in both 'virtual-router' and 'forwarding' 
>> Routing Instances using Junos 10.4R4.3.  I also had no problems 
>> getting OSPF up and running using both Multipoint or Point-to-Point
configurations.
>> 
> 
> Interesting!
> 
> Like Will, I've been bitten by the "OSPF over st0.x in a routing 
> instance" problem. For us it seems to pop up when there are multiple 
> tunnels (in discrete instances) established between the same peers.
> 
> Did your testing happen to include the multiple tunnels scenario?
> 
> Will, do you happen to have a PR # for the problem? We've experienced 
> it on 10.0R3 and R4. It's not widely supported in those releases but 
> Juniper initially told us it should work. It's the #1 reason we're 
> looking at 10.4.
> 
> Cheers,
> Dale

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Trying to get OSPF to work across IPsec for Redundancy

2011-04-21 Thread Devin Kennedy

Hello All:

 

I'm trying to get OSPF up over IPsec.  We have two IPsec tunnels, a primary and 
a secondary that our spoke router can use.  We want to have the spoke router 
run OSPF across both and then in case of a failure of the primary hub router 
(where the primary IPsec tunnel terminates) OSPF will direct traffic over the 
backup tunnel to the backup hub.  

 

So far I have seen OSPF on the spoke router come up just a couple of times but 
only to one or the other peer.  It never has come up to both peers.  Here are 
my configurations for OSPF and the services interfaces below.  Also BGP is up 
on all routers and all routers are reachable via BGP.

 

If anyeone can guide me in the right direction to get OSPF working over IPsec 
that would be most apprectiated!  

 

Spoke router:

 

[edit]
Devin@SRX210-2# show protocols ospf   
area 0.0.0.2 {
interface st0.0 {
interface-type p2p;
neighbor 10.10.10.1;
}
interface st0.1 {
interface-type p2p;
neighbor 10.10.11.1;
}
}

[edit]
Devin@SRX210-2# show interfaces st0 
unit 0 {
point-to-point;
family inet {
address 10.10.10.2/30;
}
}
unit 1 {
point-to-point;
family inet {
address 10.10.11.2/30;
}
}

 

Primary Hub router:

 

[edit]
Devin@M7i-1# show protocols ospf   
area 0.0.0.2 {
interface sp-1/2/0.1 {
interface-type p2p;
neighbor 10.10.10.2;
}
}

[edit]
Devin@M7i-1# show interfaces sp-1/2/0 
unit 1 {
point-to-point;
family inet {
address 10.10.10.1/30;
}
service-domain inside;
}
unit 2 {
family inet;
service-domain outside;
}

 

Backup hub router:

 

[edit]
Devin@J4350-1# show protocols ospf   
area 0.0.0.2 {
interface st0.0 {
interface-type p2p;
neighbor 10.10.11.2;
}
}

[edit]
Devin@J4350-1# show interfaces st0 
unit 0 {
point-to-point;
family inet {
address 10.10.11.1/30;
}
}

 



DJ


  
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp