Re: [j-nsp] MX960 PEMs and 3 phase power

2023-03-22 Thread Julien Goodwin via juniper-nsp

On 23/3/23 2:27 am, Tom Storey via juniper-nsp wrote:

My thought is one PEM on one phase, such that if that phase drops, you drop
that PEM entirely. Or is it worthwhile spreading across phases to keep even
half of a PEM alive and supplying the chassis?


Start by going back to "if that phase drops", depending on where you are 
and how much load you present using any non-trivial amount of power may 
not be acceptable.


Then even consider if loss of a single phase is even a plausible outage 
that isn't going to mean a full loss right afterwards.

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Kernel errors on EX2200-C

2019-05-15 Thread Julien Goodwin
My home EX2200-C has started logging a few kernel errors per hour,
persisting after a reboot, and an upgrade to the latest 14.1 release
(I'd have tried a downgrade to the latest 12.3 release suggested, except
that release isn't available to me on the download site for some reason)


/kernel: kuackmem_ackentry_free: Invalid input ackptr 0xd121bff8, state 0
/kernel: filt_ackevent: kn 0xc3d7e7e0 kn_data 0x-1 num_entries -1
/kernel: kuackmem_ackentry_free: Invalid input ackptr 0xd121bff8, state 0
/kernel: filt_ackevent: kn 0xc3d7e7e0 kn_data 0x-1 num_entries -1

(The exact address changes each boot, but otherwise the same)

I'm guessing that this is likely a sign of imminent hardware failure and
I should try and rustle up either another 2200-C or better upgrade to a
2300-C. If there's a new version coming with 2.5g & PoE I'd love to test
it ;-P
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Use cases for IntServ in MPLS backbones

2018-10-02 Thread Julien Goodwin



On 02/10/18 20:26, Saku Ytti wrote:
> On Tue, 2 Oct 2018 at 13:21, Julien Goodwin  wrote:
> 
>> The trouble is, some providers might use a bit to mean something like
>> "prefer cheap EU paths" for Asia->AU traffic, leaving it set then causes
>> hundreds of milliseconds of latency. Some might even implement VPNs that
>> way causing blackholing.
> 
> I don't think so, If they use DSCP values as-is, then they MUST
> nullify them. Full and short pipe assume you use MPLS TC for internal
> decision, at which point you don't need to care or trust DSCP. If you
> use DSCP internally _AND_ trust Internet DSCP, it's broken
> configuration.

... and since when would *any* network ever have a subtly broken config?

Except for, you know, pretty much every network in practice.

>> We had a few cases where failing to set DSCP to zero at our edge (in
>> either direction) caused various issues, those also took weeks to
>> troubleshoot.
> 
> It is indeed possible to misconfig things. But it's not the problem of
> instance sending DSCP, it's problem of the instance having broken
> config based on DSCP.
> 
> 
> 
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Use cases for IntServ in MPLS backbones

2018-10-02 Thread Julien Goodwin



On 02/10/18 20:10, Saku Ytti wrote:
> Hey Mark,
> 
>> We remark all incoming Internet traffic DSCP values to 0.
>>
>> A few years ago, not doing this led to issues where customers were handling 
>> the DSCP values in such a way that any traffic marked as such was being 
>> dropped. Took weeks to troubleshoot.
> 
> Dropped by who? I as an Internet user would prefer my DSCP information
> to traverse internet, I do not ask it to be honoured.

The trouble is, some providers might use a bit to mean something like
"prefer cheap EU paths" for Asia->AU traffic, leaving it set then causes
hundreds of milliseconds of latency. Some might even implement VPNs that
way causing blackholing.

We had a few cases where failing to set DSCP to zero at our edge (in
either direction) caused various issues, those also took weeks to
troubleshoot.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Forced password resets?

2018-04-19 Thread Julien Goodwin


On 19/04/18 19:14, Saku Ytti wrote:
> Anyone up for some IETF fun? I think this PW problem can be mostly
> solved by an standard API. I imagine that you have some credentials
> wallet which supports the API, browser which supports the API and HTTP
> server which supports the API. You have some way to locally lock down
> and open the wallet, which is out-of-scope for the standard.
> Now when you register to new site, your browser asks site about
> authentication policy (what information is needed, what that
> information can look like) it then asks wallet to provide such
> information for set of hosts or URLs, and then browser offers this
> information to the server.

There's various proposals for that in web-land, some of which are
sane-ish (the exact rant is off-topic enough I'll skip it), some of them
also practical for non-interactive and non-web uses.

What is on-topic is there are some folk looking at standardising TACACS
as it's actually implemented, and then potentially an enhancement. I'd
*REALLY* love if client key negotiation of some form was in the
standard, so I could simply ssh to any router with key auth without
needing to statically configure keys on each router.

Draft:
https://tools.ietf.org/html/draft-ietf-opsawg-tacacs-10
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Going Juniper

2018-04-18 Thread Julien Goodwin
On 18/04/18 17:52, Gert Doering wrote:
> Hi,
> 
> On Wed, Apr 18, 2018 at 08:37:51AM +0100, adamv0...@netconsultings.com wrote:
>> Ha, I really wish Juniper would look at what XR did on whole host of things
>> :)
> 
> Judging from the recent threads on JunOS upgrade pains, seems they did...
> 
> "New feature: more annoying software upgrades than IOS XR!"

Next version: Randomly disappearing config lines, hope you didn't need
those BGP policies!

(Also, fun bar topic, IOS XR or Ironware, which is more painful for OS
upgrades?)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Going Juniper

2018-04-11 Thread Julien Goodwin
On 11/04/18 19:31, Saku Ytti wrote:
> I suspect more correct reason is that they don't see sufficient market
> potential in device like MX104. I think Cisco and Juniper are very
> confused about market, they appear to think entire market consists
> solely of large scale DC providers. That only addressable market is
> market which wants extremely dense 100GE boxes. 1GE is dead, 10GE is
> almost dead.


Even in networks like that there's uses for 1g that won't go away (heck,
some amazingly recent infrastructure kit is still 10m only). A box able
to have a few 1g ports, even sacrificing some 10g ports is fine, but
with a 100g uplink or two would be super handy.

Not least of which, having somewhere to plug my laptop in if I need to
visit a POP.


The datasheet for the MX204[1] implies that all the ports can be
switched to 1g mode, but I think only some can[2].

That's an improvement over when I first heard about the box (when the
JNPR folk I was talking to didn't understand why I might want some 100g
and 1g ports on the same box) which is great.

1:
https://www.juniper.net/assets/us/en/local/pdf/datasheets/1000597-en.pdf
specifically the table on page 3.

2:
https://www.juniper.net/documentation/en_US/junos/topics/concept/port-speed-capability-mx204router.html
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX204 and copper SFP?

2018-04-05 Thread Julien Goodwin
On 05/04/18 05:09, Niall Donaghy wrote:
> Even more sad to see that 1G ports retain their xe- naming rather than
> changing to ge- as you would hope and expect.

Isn't the first time that's happened, IIRC 10g PICs on T640s presented
as ge-x/x/x.

Newer kit seemed to be converging on et-x/x/x for any ethernet speed,
but perhaps not given the 204 is a brand new model.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper UDP Amplification Attack - UDP port 111 ?

2018-03-26 Thread Julien Goodwin
On 26/03/18 17:31, Chris Adams wrote:
> Got an MX204 - all the things left running on the Wind River Linux VM
> host are pretty embarrassing (even if there's no actual network access
> and so not a security issue).  I have no need on a router for RPC, BIND,
> Gluster, NFS, Zeroconf, Postfix, or dnsmasq; I'm not sure about Open
> vSwitch (haven't looked to see if JUNOS is using that or something).
> 
> Some of it looks like libvirt was installed and left with defaults, like
> autostarting a private network configured for NAT and dnsmasq.  That
> also probably pulled in NFS, Gluster, and Open vSwitch.

That sounds a lot like the first releases of Cisco's IOS-XE VM (my
memory says that it at least tried to start Samba, but I could be wrong).

Which is a shame for a bunch of reasons, not least since that probably
means it boots much slower than it should.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] Turns out lldpd leaks after a few years

2017-02-25 Thread Julien Goodwin
Somehow I've had stable power at home for almost 4 years

... and also forgotten to upgrade this thing.

... or fix the now very out of date interface descriptions.

root@ex2200-c> show log messages | last 
Feb 25 22:21:58 ex2200-c newsyslog[49500]: logfile turned over due to -F request
Feb 25 22:22:11  ex2200-c lldpd[1049]: TASK_OS_MEMHIGH: Using 50409 KB of 
memory, 100 percent of available
Feb 25 22:23:11  ex2200-c lldpd[1049]: TASK_OS_MEMHIGH: Using 50409 KB of 
memory, 100 percent of available
Feb 25 22:24:11  ex2200-c lldpd[1049]: TASK_OS_MEMHIGH: Using 50409 KB of 
memory, 100 percent of available

root@ex2200-c> show system uptime 
Current time: 2017-02-25 22:29:39 EST
System booted: 2013-03-09 16:47:26 EST (207w0d 05:42 ago)
Protocols started: 2013-03-09 16:50:04 EST (207w0d 05:39 ago)
Last configured: 2013-11-04 21:58:52 EST (172w5d 00:30 ago) by root
10:29PM  up 1449 days,  5:42, 1 user, load averages: 0.59, 0.69, 0.34


And now to upgrade to 14.3 (yes eventually 15.1).



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] DHCPv6 client on SRX210 - IPv6 forwarding breaks at lease expiration

2015-08-01 Thread Julien Goodwin

On 02/08/15 02:28, Chris Woodfield wrote:

TL;DR: IPv6 forwarding breaks when my DHCPv6 client lease expires, even though 
CLI output claims it’s been renewed.

I have an SRX210 as my home gateway, running 12.1X46-D35.1. This is running 
dual stack to Comcast, receiving a /56 DHCPv6 delegation and RA’ing a /64 to my 
home LAN.

I’ve noticed that after the 4-day lease time expires, I can no longer route 
IPv6; my outbound trace routes break at the device, like so:

admin@CAW-SRX210-HOME traceroute 2a03:2880:2130:cf05:face:b00c::1
traceroute6 to 2a03:2880:2130:cf05:face:b00c::1 
(2a03:2880:2130:cf05:face:b00c:0:1) from 2001:558:600a:5a:38f8:139:bba0:e7bb, 
64 hops max, 12 byte packets
traceroute: sendto: No route to host
  1 traceroute6: wrote 2a03:2880:2130:cf05:face:b00c::1 12 chars, ret=-1
^C

This is true despite a default ::/0 route in table going to the right place (confirmed via 
show route table inet6 and “show ipv6 nd” to verify route-link address-MAC 
association.

The fix is apparently to clear and renew the DHCPv6 client binding, via clear dhcpv6 
client binding interface int” then
request system dhcvp6 client renew interface int”. IPv6 packets immediately 
start flowing again :)

I’ve confirmed (via show dhcpv6 client binding) bindings are identical before 
and after the clear/renew, as well as the next-hop for ::/0.

This clearly seems buggy to me; has anyone else noticed this issue? Anyone know 
if this is a known issue (or even better, fixed in 12.1X47 or 12.3X48 
releases)? Any additional diags I should run next Wednesday morning when this 
happens again?


I have a related bug in 12.3X48-D10.3 that I kept meaning to post about. 
Every now and again (once every few weeks) the dhcpv6 client will simply 
expire and not attempt to renew, request ... renew ... works fine. No 
obvious log messages go with it, although I haven't enabled tracing.

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] SMB != Server Message Block

2015-07-10 Thread Julien Goodwin

Because I know a bunch of juniper staff read this list.

In the datasheet for both the QFX10k  PTX1k is an error, I pointed it 
out back when the QFX10k launched, but it's not fixed and the PTX1k 
sheet has the same error.


In both of them the Sub-Miniature B connectors used for timing have 
their names expanded as Server Message Block, which, while right for 
the network protocol is wrong in this case.


Yay for overloaded names.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Junos BGP update generation inefficiency -cause for concern?

2015-05-18 Thread Julien Goodwin
On 18/05/15 21:49, Saku Ytti wrote:
 The update-groups are created dynamically in JunOS as far as I know.
 That is if you have BGP group where neighbors have unique export
 policies, you will have multiple update-groups in configuration group.
 But I guess if you have two neighbors with same export policies in
 different configuration group, it likely won't share same
 update-group, haven't tested though.

I believe the two groups same policies do get two update-groups.

I'm not sure about neighbor with neighbor level policy the same as the
group level case though.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Juniper MX Upgrade / Configuration question

2014-10-16 Thread Julien Goodwin
On 16/10/14 21:07, Saku Ytti wrote:
 On (2014-10-16 09:52 +0200), Sebastian Wiesinger wrote:
 
 Hi Sebastian,
 
 I was wondering if anyone knows where a MX router stores the boot
 configuration its going to use after you load a new version of code
 on the router.
 
 a software upgrade does not change the configuration. It will use
 /config/juniper.conf.gz as always. I never saw anything else during SW
 upgrades.
 
 If I understood Matt correctly his problem is, he has already done 'request
 system software add', which stores the config somewhere to be used after
 upgrade and further commits will not be included in that.
 He'd like to make changes to the configs before reloading the boxes and ensure
 the config changes are included.

In this case you can simply follow the useful advice given by the
command to cancel the scheduled upgrade and reapply it once the config
changes have been made.

 I've been quite annoyed by this, since it means you have to be awake in
 maintenance window 30min-1h longer than you should, because you can't pre-load
 the new software then in maintenace window just boot.

I'm obviously missing something here, request system software add
takes less than five minutes on anything I've ever used (from SRX100
through the bigger T  MX kit).

Copying the image to the box may take more, but if that's true and you
don't pre-stage images you deserve what comes to you.

It's the reboot into the new image that's horribly slow.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Small P Router Recommendations

2014-06-05 Thread Julien Goodwin
On 05/06/14 13:30, Ben Dale wrote:
 
 On 5 Jun 2014, at 12:00 pm, Geoff Crawford geoff.crawf...@cwct.ca wrote:
 
 Hi guys!

 I'm a Juniper fan too, but I'll take a non-Juniper answer today. Seems to be 
 an MPLS heavily oriented list, so I figured you guys would know.

 I'm sure we'd all love an EX3200 take could run LDP, pack more than 1 label 
 and do it over aggregated interfaces. Is anyone else making a box that can 
 do that?
 
 If you're after a switch that'll do MPLS/L3VPN, check out the QFX5100.  All 
 10/40G though which might not be what you're after.

This.

If you're after a (true) P router and can handle a BGP-free core the
5100 should be good enough for most networks not big enough to justify a
PTX, at a fraction of the cost.

Sure there's not the redundancy of a PTX, but given that you can buy a
pair of 5100's at list and I'm fairly sure would still be cheaper than
the PTX.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Small P Router Recommendations

2014-06-05 Thread Julien Goodwin
On 05/06/14 22:22, Mark Tinka wrote:
 On Thursday, June 05, 2014 01:58:50 PM Julien Goodwin wrote:
 
 Sure there's not the redundancy of a PTX, but given that
 you can buy a pair of 5100's at list and I'm fairly sure
 would still be cheaper than the PTX.
 
 The issue I've always had with so-called MPLS-biased routers 
 and line cards is that native IPv6 is not yet MPLS-enabled, 
 today.
 
 So if your MPLS-biased line cards do not have enough FIB to 
 support a growing IPv6 table, that's not good.

And of course I doubt the 5100 has enough space for a full v6 table even
today (and that's before ECMP).

You're right, but things are finally improving here, and in theory this
works today, depending on what vendor combination and bugs you've got.
Although it'll be a while still before we can get a v6 native MPLS
network with no v4 needed at all, even for loopbacks.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Junos: snapshot ?

2014-03-04 Thread Julien Goodwin
On 04/03/14 20:39, R S wrote:
 A customer of mine runs MX960 (dual RE), SRX5800 and SRX3600 (cluster with 
 dual RE), EX8200 (dual RE) and EX4200 (in VC), in the weekend will run a 
 disaster recovery test powering off those devices.
 I’d like to avoid any problem with files corruptions, which is the safer 
 command to use to save current file systems of those devices family ?
 
 request system snapshot  enter

Snapshots won't help this. Snapshots aid recovery, they don't prevent
corruption.

 Can I ask to run this command in production time on all the mentioned devices 
 ?

Sure, on the EXen it can be a little slow, but should be 100% safe.
Remember to run it on both RE's on dual-RE platforms.

You may need slice alternate on the end of the command for the EXen,
and the exact command depends on JunOS release.

 Any additional suggestion ?

Make sure you actually have matching JunOS on all RE's in a
chassis/cluster/VC.

Ditto any scripts commit, event, etc.

If you're using fxp0 ensure both RE's have it patched.

Ensure system commit synchronise is set on all dual-re platforms.

Make sure rancid (or your equivalent) is actually working and has
current configs for all devices, sadly there's still a good chance of
corruption needing a rebuild on EX[34]200 after power loss.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] proposed changes to clear bgp neighbor

2014-02-27 Thread Julien Goodwin
On 28/02/14 00:48, Phil Shafer wrote:
 Sorry if I'm venturing toward shameless self promotion here, but
 this really is an area we try to work at.  That's part of the
 movation for asking if this one specific case is sufficiently
 irritating to break our own rules.

But it's not one specific case

clear foo thing

Is a horrible outage-causing command for a bunch of things.

Unless it's been similarly fixed clear rsvp session is a great way to
cause an outage[1] on many carrier networks.

What about clear isis adjacency?

I'd say review the lot of clear foo and fix them all.

It's *extremely* rare to actually want to reset all sessions on a real
production router passing traffic in my experience, in all my time I can
only think of one case where we deliberately used it.

Any automation relying on this I suspect has far worse problems.

1: OK, *I'd* call this an outage, but short term packet loss event for
those with lower standards.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] Juniper finally launches a route reflector platform

2014-02-24 Thread Julien Goodwin
And in a sensible form factor too.

http://www.juniper.net/us/en/products-services/routing/cse2000/

Can think of plenty of other use cases for the box as well.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Power issues on 10Gig link

2014-01-24 Thread Julien Goodwin
On 24/01/14 00:14, Ali Sumsam wrote:
 Hi All,
 
 I am using a SFP-10GBase-ER for my Cisco3750X for a 10gig link going to a
 Juniper MX5-T router (10GE XFP)
 
 
 I am receiving following logs on my Cisco3750X.
 
  %SFF8472-5-THRESHOLD_VIOLATION: Te1/1/2: Rx power low alarm; Operating
 value: -21.3 dBm, Threshold value: -20.0 dBm.
 
 No logs on Juniper.

You can, and probably should, log this as you would traffic levels via
SNMP, at least for longer haul optics.

 
 Does this mean I have to increase the power on the interface?
 Or is there anything else I need to look at?
 
 Following are the readings from my Juniper router.

Those are the thresholds, not the actual power levels involved, what's
the full output from show interfaces diagnostics optics

  Laser rx power high alarm threshold   :  1.2589 mW / 1.00 dBm
 Laser rx power low alarm threshold:  0.0158 mW / -18.01 dBm
 Laser rx power high warning threshold :  1. mW / 0.00 dBm
 Laser rx power low warning threshold  :  0.0199 mW / -17.01 dBm
 
 
 Regards,
 
 *Ali Sumsam  - *eintellego Networks Pty Ltd
 Senior Network Engineer
 a...@eintellegonetworks.com ; www.eintellegonetworks.com
 
 Phone: 1300 239 038; Cell +61 (0)450 609 592 ; skype://sumsam.ali80
 
 facebook.com/eintellegonetworks ;  http://twitter.com/networkceoau
 linkedin.com/in/alisumsam
 
 
 The Experts Who The Experts Call
 Juniper - Cisco - Cloud
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Power issues on 10Gig link

2014-01-24 Thread Julien Goodwin
On 24/01/14 12:39, Skeeve Stevens wrote:
 Hmmm.. Is there actually a way on Juniper to adjust the output power though?

I'm not aware of any MSA optics (SFP, XFP, GBIC, CFP, etc.) that have
controllable power levels. Certainly if you're using a transmission system
there's probably an adjustable attenuator involved, but not otherwise.




signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Heterogeneous LACP link

2013-09-16 Thread Julien Goodwin
On 16/09/13 11:52, Laurent CARON wrote:
 Current setup: 2 VCs (one on each site) each composed of 2xEX4200-24T
 
 I have the possibility of having a redundant connection between 2
 buildings distant of ~10/15 km.
 
 The main link is a pair of dark fibers on which I'll use 40 km XFP modules.
 
 The second link is a WDM transport on which I plan to use 2 short reach
 monomode SFP's (one on each side).
 
 2 questions:
 - Is it wise to mix SFP and XFP on the same LACP aggregate ?
 - Is it wise to mix 2 different technologies on a LACP aggregate
 (shuoldn't matter much, but I'd prefer hearing experiences ;)) ?

Others have answered well, but I think there's something missing.

It's not applicable in this case, but one other major thing to care
about on JNPR kit is that the ports share the same PFE type, for example
on MX mixing between DPC  MPC within a LAG is a bad idea, same for FPC3
vs FPC3-ES on T640/1600. They might *work*, but you're likely to
eventually run in to some ugly edge-cases.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] LN2600: an 8SFP Branch SRX

2013-08-02 Thread Julien Goodwin
Saw this come through on my RSS reader, it's worth a shout out as I'm
sure more people than just me have been wanting a branch SRX with decent
SFP density there's finally an option.

http://www.juniper.net/us/en/products-services/routing/ln-series/ln2600/

I'm assuming it runs the same branch SRX image as the rest of the line
as that's been true for the LN1000 and this looks like more of the same.

It's 48v only which is a shame, and being a rugged device I'm sure it's
reassuring expensive.

Also hidden in the datasheet is a reference to an LN2800 which has not
been announced, but is obviously a similar rugged 1ru box of some sort.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] EX3200 Power supplies

2013-07-27 Thread Julien Goodwin
On 26/07/13 01:52, Doug McIntyre wrote:
 On Thu, Jul 25, 2013 at 09:01:15AM -0400, Paulhamus, Jon wrote:
 Power Supply in EX3200 Switches
 The power supply in EX3200 switches is a hot-removable and hot-insertable 
 field-replaceable unit (FRU) that you can install on the rear panel without 
 powering off the switch or disrupting the switching function. The power 
 supply in EX3200 switches is not redundant.


 Does that mean if I pull a power supply out, the switch stores enough power 
 to stay running long enough to put the new one in and get powered up?
 
 
 What odd wording, since the EX3200 doesn't have two power supply slots.
 They probably took wording from the EX3300/EX4200 which do have two power
 supply slots, and which probably uses the same power supplies. 
 
 The EX3200 does have an RPS power port, so most likely what they
 intend to mean are that with the optional RPS deployed, and your main
 supply fails, you can hot swap it at that point, while running on RPS power. 
 
 And then deal with the oddities of running on RPS power. 
 
 But no, it won't keep running if you pull the single power supply out. 

The EX[34]200's do seem to have a lot more reserves when you pull power
than most kit. I actually wouldn't be surprised if you could manage to
do this, although doing it without crashing the cpu or forwarding chips
is a bit less likely.

If course if you want to do this the power supply has already failed
making this an academic concept only.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Advice on a 100Gbps+ environment

2013-07-02 Thread Julien Goodwin
On 03/07/13 00:56, Darius Jahandarie wrote:
 On Tue, Jul 2, 2013 at 9:55 AM, Drew Weaver drew.wea...@thenap.com wrote:
 And what is wrong with the MX80 as a peering/transit router for up to 80Gbps 
 of traffic?
 
 The lack of redundant REs + inability to have an external RE.

Other than the amount of CPU capacity on the MX80 (which has been done
to death here) do you really have RE's fail often enough to be a problem?

Sure on the larger boxes they're cheap enough that if you're really
loading the boxes you might as well have one, but if you add it up I
doubt they save that much downtime.

The most common failure I've seen on Juniper RE's (by far) is HDD
failures, which is largely mitigated on current kit with SSD's.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] SRX 3600 dropped packets - how to debug?

2013-05-28 Thread Julien Goodwin
On 28/05/13 19:40, ashish verma wrote:
 That said, I can't believe the firewall was *actually* dropping 1500pps of
 DNS traffic; we'd have widespread problems reported, surely. So, it seems
 that maybe ALG-processed traffic is being counted under packets dropped
 for show security flow statistics?

eDNS fallback perhaps?

I never understood the use of DNS ALG's, unless it's to perform a NAT
translation on addresses (which is a really bad idea) they just seem
like a waste of valuable resources. Far better to ACL down so that DNS
queries can only go to trusted DNS servers which can run something that
doesn't break on a malformed query.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX - Changing MAC address on different unit of the same interface

2013-04-05 Thread Julien Goodwin
On 06/04/13 03:59, sth...@nethelp.no wrote:
 No, this is not possible (and why would you need it?). If you think
 about this for a moment, it would require the ability to have 16k or
 so MAC addresses per physical interface. Highly unrealistic.

I can think of one common case, many IX's and shared (colo usually)
transit lans do static mac filters, and if you need to move the port
being able to override the mac can get you back up far quicker then
dealing with a support tech who may not understand the problem.

If that's a low-speed circuit aggregating it can make sense which can
easily lead to a request to do per-VLAN mac's.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] EX2200-C SNMP traps

2013-03-26 Thread Julien Goodwin
I upgraded a new EX2200-c to 12.3 the other day (was shipped with a broken 
release of 11.4), and every hour I'm getting clearly BS traps:

CHASSISD_SNMP_TRAP6: SNMP trap generated: Power Supply Removed 
(jnxContentsContainerIndex 2, jnxContentsL1Index 2, jnxContentsL2Index 1, 
jnxContentsL3Index 0, jnxContentsDescr Power Supply: Power Supply 0 @ 1/0/*, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Power Supply Removed 
(jnxContentsContainerIndex 2, jnxContentsL1Index 3, jnxContentsL2Index 1, 
jnxContentsL3Index 0, jnxContentsDescr Power Supply: Power Supply 0 @ 2/0/*, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Power Supply Removed 
(jnxContentsContainerIndex 2, jnxContentsL1Index 4, jnxContentsL2Index 1, 
jnxContentsL3Index 0, jnxContentsDescr Power Supply: Power Supply 0 @ 3/0/*, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 2, jnxContentsL2Index 1, 
jnxContentsL3Index 1, jnxContentsDescr FAN: Fan 1 @ 1/0/0, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 2, jnxContentsL2Index 1, 
jnxContentsL3Index 2, jnxContentsDescr FAN: Fan 2 @ 1/0/1, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 2, jnxContentsL2Index 1, 
jnxContentsL3Index 3, jnxContentsDescr FAN: PSU Fan @ 1/0/2, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 3, jnxContentsL2Index 1, 
jnxContentsL3Index 1, jnxContentsDescr FAN: Fan 1 @ 2/0/0, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 3, jnxContentsL2Index 1, 
jnxContentsL3Index 2, jnxContentsDescr FAN: Fan 2 @ 2/0/1, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 3, jnxContentsL2Index 1, 
jnxContentsL3Index 3, jnxContentsDescr FAN: PSU Fan @ 2/0/2, 
jnxOperatingState/Temp 1)
 CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 4, jnxContentsL2Index 1, 
jnxContentsL3Index 1, jnxContentsDescr FAN: Fan 1 @ 3/0/0, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 4, jnxContentsL2Index 1, 
jnxContentsL3Index 2, jnxContentsDescr FAN: Fan 2 @ 3/0/1, 
jnxOperatingState/Temp 1)
CHASSISD_SNMP_TRAP6: SNMP trap generated: Fan/Blower Removed 
(jnxContentsContainerIndex 4, jnxContentsL1Index 4, jnxContentsL2Index 1, 
jnxContentsL3Index 3, jnxContentsDescr FAN: PSU Fan @ 3/0/2, 
jnxOperatingState/Temp 1)

Anyone know if these are a bad way of telling me something I should care about, 
or are they just BS?



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] RAM Type for SRX240

2013-03-25 Thread Julien Goodwin
No idea what the actual form factor is, as I never got around to opening
the case of the one I had at $JOB[-1], but from the CPU's spec page:

DDR2 up to 800 MHz
1x 72-bit wide


On 25/03/13 13:33, Skeeve Stevens wrote:
 Hey all,
 
 I've heard quite a few people have self-upgraded their SRX240's from v1 to
 v2's simply by upgrading the RAM from 1Gb to 2Gb.
 
 Couple of questions.
 
 1. Any one got a photo of the inside of the SRX240 (can't find any on
 Google)
 
 2. What 'exact' kind of RAM is in the SRX240... slots, sizes, speed, ecc?,
 etc
 
 3. Is there anything else that makes the B2/H2 from a hardware perspective
 other than the RAM? i.e. CPU, etc?
 
 Can anyone point to a link online where I can get some details of people
 selling the specific kind of RAM... be nice if it was in .au, but happy to
 search myself once I know what it is.
 
 ...Skeeve
 
 *Skeeve Stevens - *eintellego Networks Pty Ltd
 ske...@eintellegonetworks.com ; www.eintellegonetworks.com
 
 Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
 
 facebook.com/eintellegonetworks ;  http://twitter.com/networkceoau
 linkedin.com/in/skeeve
 
 twitter.com/networkceoau ; blog: www.network-ceo.net
 
 
 The Experts Who The Experts Call
 Juniper - Cisco - Cloud
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX80 BGP performance after reboot

2013-02-14 Thread Julien Goodwin
On 14/02/13 18:55, joel jaeggli wrote:
 When we're doing a maintence we generally let the router converge with
 our route-reflectors prior to bringing up the transit/peer neighbors. so
 that routes learned from the transits are replacing existing fib routes.
 that also has a salubrious interaction with our loose rpf check.
 spontaneous reboots aren't quite adjustable like that.

This.

Why Juniper don't implement (or scream from the rooftops if there is) an
iBGP-settle ability I don't know.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] L2ALM errors on SRX?

2013-01-18 Thread Julien Goodwin
I've just started dumping syslog on my permanent lab devices at home,
and the SRX210 is regularly throwing this:

L2ALM: trying master connection, status 61, attempt 5000

The attempt increases, but the message is only logged very rarely (this
is shortly after a reboot).

I now see this on 11.4R2.14  11.4R6.5, but can't find any hits
searching for it, other then one KB article which indicates it's perhaps
VPLS related:

http://kb.juniper.net/InfoCenter/index?page=contentid=KB22637

Has anyone seen this?



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] SRX doing IPv6 on DSL

2012-12-10 Thread Julien Goodwin
(Thunderbird crashed taking away my first response)

Skeeve's post is spurred by a post of mine to Ausnog earlier today
looking for a new reliable home ADSL CPE.

In fact although I can now set family inet6 on a PPPoE interface, I
can't do something similar to family inet negotiate-address which
makes it useless for consumer circuits, even if I could avoid the need
for DHCP-PD (previously my ISP required DHCP-PD before they'd route a
static block, this may have changed).

The fact that I can't even do SLAAC on an Ethernet port means it's also
not usable if I was on FTTH.

On 10/12/12 23:26, Skeeve Stevens wrote:
 Hey all,
 
 Does anyone know is the SRX110 is capable of doing DHCP-PD or 6RD yet?
 
 If not, does anyone know of a X release or when it may hit mainline?
 
 IPv6 is starting to get popular with engineers and at the moment all they
 seem to be able to use are Cisco 877/887 and ISR's with DSL WIC cards.
 
 Surely Juniper has some plans afoot?
 
 ...Skeeve
 *
 
 *
 *Skeeve Stevens, CEO - *eintellego Pty Ltd
 ske...@eintellego.net ; www.eintellego.net
 
 Phone: 1300 753 383; Cell +61 (0)414 753 383 ; skype://skeeve
 
 facebook.com/eintellego ;  http://twitter.com/networkceoau
 linkedin.com/in/skeeve
 
 twitter.com/networkceoau ; blog: www.network-ceo.net
 
 The Experts Who The Experts Call
 Juniper - Cisco – IBM - Brocade - Cloud
 -
 Check out our Juniper promotion website!  eintellego.mx
 Free Apple products during this promotion!!!
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Error while validating a JunOS

2012-12-03 Thread Julien Goodwin
On 04/12/12 02:28, Phil Mayers wrote:
 On 03/12/12 14:45, Jason Fortier wrote:
 The export  junos does not support SSH and HTTPS.  Only the Domestic
 seems to.
 
 Correct.
 
 Interestingly, I recently seem to have lost access to download
 domestic JunOS for J-series, which I did previously have.
 
 I have retained domestic download access for SRX.

It's probably the new download page, there's a dropdown for domestic vs
worldwide that's a little non-obvious.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Weird SRX flow timeout issue

2012-11-12 Thread Julien Goodwin
On 12/11/12 06:37, Benny Amorsen wrote:
 Andrew Yager and...@rwts.com.au writes:
 
 By default the SRX closes the flow after 30 minutes (1800 seconds) as there 
 is no activity on the wire during this time.
 
 I have no SRX firewalls, so I cannot help you with your actual problem,
 but I can provide an ugly workaround...
 
 If you play with
 
 tcp_keepalives_count
 tcp_keepalives_idle
 tcp_keepalives_interval
 
 in postgresql.conf, you can get Postgres to send TCP keepalive every so
 often. That should keep the session open.

Sadly SRX doesn't (or at least a few years ago didn't) consider TCP
keepalives sufficient to keep the session open.

I found any form of application keepalive sufficient.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Weird SRX flow timeout issue

2012-11-12 Thread Julien Goodwin
On 12/11/12 16:03, Tim Eberhard wrote:
 Benny,
 
 I've been working with the SRX since before it was in beta loading it
 up on a SSG550-M and netscreen previous to that. TCP keep alives, or
 any tcp packet that transverses that session has ALWAYS reset the
 timeout. The only time where you would see this not working is if
 you had a situation of asymmetric routing or some time of crazy load
 balancing through firewalls.

All I can say is that as of late 2009 on branch SRX (specifically
SRX650, using then-current JunOS, probably 9.5) this was not the case
with SSH traffic (which IIRC doesn't have an ALG).

It wouldn't kill the session, just wouldn't extend it.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX - DWDM no link

2012-11-07 Thread Julien Goodwin
On 07/11/12 21:30, Luca Salvatore wrote:
 The fibre run is about 40Km point to point.  There are other people already 
 using it on their own frequencies at 10Gb so I know it works.
 While i'll admit my knowledge about DWDM stuff is not great, I do have plenty 
 of experience in the routing and switching space - just not much with the 
 long haul fiber stuff.

You'd also want to know the power loss (dB) to confirm loss rating.

With high power optics you also have the possibility of permanent damage
if you loop them back at short range, if you tried this earlier you may
already have destroyed them.

I presume this is all going into a passive mux or transponder-less
ROADM? If its going into a transponder you usually use SX or multimode
optics.

I'm also pretty sure that tunables only work on MIC ports on MX80 and
derivatives, not the fixed ports, here's one ref confirming:

http://labs.spritelink.net/juniper-mx-and-tunable-xfps

But this is apparently fixed in a JunOS new enough for the real MX10's.

...

 mx10-1 show interfaces diagnostics optics xe-1/2/0
 Physical interface: xe-1/2/0
 Laser bias current:  20.861 mA
 Laser output power:  1.4120 mW / 1.50 dBm
 Module temperature:  32 degrees C / 89 degrees F
 Laser rx power:  0. mW / - Inf dBm

That's snipped right? IIRC you should see the wavelength listed here,
but I don't have a tunable to hand (yay! excuse to buy a lab toy, shame
I have no money for such)


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Security bugs in documentation

2012-10-31 Thread Julien Goodwin
On 30/10/12 20:21, Bjørn Mork wrote:
 Using an open source viewer, all I see in that document is a single page
 displaying
 
  For the best experience, open this PDF portfolio in
   Acrobat 9 or Adobe Reader 9, or later.
 
 and a link to Get Adobe Reader Now!.  And sure enough, inspecting the
 pdf shows that it is a 5MB single page document:

Evince (the Gnome PDF reader) recently got the ability to view these,
it's somewhat non-obvious, but I figured it out when I downloaded
$DWDMVENDOR's documentation which was all in this format (last time I
encountered it was more then a year ago with $POWERSYSTEMSVENDOR when I
had to figure out how to extract files with pdftk, much easier now)

In the evince sidebar (Which normally shows Thumbnails or Index)
select Attachments and you can then read the sub-PDFs.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX5 to MX80 virtual chassis feature

2012-10-22 Thread Julien Goodwin
On 23/10/12 01:53, David Miller wrote:
 We were told 2+ years ago that Juniper would be releasing a module for
 the port in the back of the MX5 - MX80 that could be used to VC another
 MX -or- be used as high speed link to an EX (4200 / 8500).  This has
 changed a few times in our discussions with Juniper over the subsequent
 years from coming soon to no idea what you are talking about to
 coming soon again.  Latest responses from Juniper have been reasonably
 solid never going to happen.  My guess (merely a guess) is that
 marketing/product positioning folks within Juniper decided that this
 functionality would compete against their more expensive products and
 killed the development/release.

I had only ever heard that the rear MIC slot was for a future services
MIC, given a full size services MPC has now been shown (it's in the
photos in the MX2020 datasheet) if a MIC version is going to come it'll
probably be then.

As for high speed link to an EX something along those lines has now
been announced as Node Unifier for FEX-like support.

I'd be unsurprised if VC on MX80 turns out like LNS support, where it's
coming becomes we'll never do it and then here's the OS image
supporting it


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX960 AC power strip

2012-08-23 Thread Julien Goodwin
I double checked the hardware guide to ensure, and they're not fixed cable:

http://www.juniper.net/shared/img/products/mx-series/mx960/mx960-rear-high.jpg

(If you're using the high-cap supplies there's a second input on the
PSU's themselves)

So just 8x C18-19 cables would be fine.

On 23/08/12 23:59, JA wrote:
 Hi
 
 I need advice if someone is having an MX960 up on AC power.
 
 Usually high capacity (32A) power bars (PDU) come with C13 or C19 outlets
 while Juniper has no provision for such power cords. If European power
 cords are ordered with MX960, the CEE7/7 plug can be connected to Schuko
 outlets. But there is no Schuko PDU that supports more than 16A. One can
 easily exceed 16A if two power supplies are connected on same PDU.
 
 Can anyone recommend some alternative or if anyone faced similar situation?
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] root-login via ssh and 11.x

2012-06-26 Thread Julien Goodwin
On 26/06/12 22:09, Nick Kritsky wrote:
 FYI: It looks like in version 11 Juniper has changed default settings
 for system services ssh root-login.
 Now if you want to login as root via ssh, you have to explicitly allow
 it. in 10.X it was allowed by default.
 Tested on EX-4200, SRX-100.
 
 Funny thing is that documentation is still claiming that default
 setting is to allow:
 http://www.juniper.net/techpubs/en_US/junos11.4/topics/reference/configuration-statement/root-login-edit-system.html
 I don't have any device with 12.1 to test, but I suspect that the
 problem exists there as well.
 
 If anyone from J is reading - please update documentation or JunOS
 defaults. It would be nice to keep them in sync.

And a warning in the upgrade notes, I'm sure there's at least one site
that only uses root. (No, nobody I've every worked for has that, at
least on Juniper kit)

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Juniper Networks fail to protect Linx from outage

2012-06-05 Thread Julien Goodwin
On 05/06/12 15:43, Brent Jones wrote:
 On Mon, Jun 4, 2012 at 10:10 PM, ramesh@wipro.com wrote:
 
 Wats the product? EX Series switches responsible and couldn't protect?

They're MX960's (with a Trio loadout)

See:
http://www.nanog.org/meetings/nanog54/presentations/Wednesday/Cobb.pdf

 More likely that someone didn't filter advertisements or re-distribution
 correctly, rather than a software bug.
 Only more details will tell, TFA was pretty lame.
 Also a shame they already blame Juniper, when it sounds like they have
 barely begun diagnosing what truly happened, not very classy at all
 (especially if it turns out to be operator error).

Except that Juniper pretty much built this (according to
friends-of-friends), so it's either Juniper engineer error or JunOS bug.
At the very least Juniper would be fully aware of the config.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] vmember limits in EX series stack

2012-05-29 Thread Julien Goodwin
On 01/05/12 13:15, Naveen Nathan wrote:
 I'm attempting to retire a cisco 6509 setup, replacing it with an EX4200
 virtual chassis configuration (8 linecards). I've run into a warning
 when committing the configuration:
 
 warning: Exceeded vmember threshold limit, it is recommended to
 have not more than 32752 vmembers
 
 Our current setup has 200 VLANs defined; and can grow anywhere upto 300
 in the future.

(I *knew* there was a post I'd meant to reply to a while back...)

It's not clear from your post whether you know how VLAN's map to ports,
and how static they are, but one option that makes managing it fairly
sane is using apply groups. A simple (but not EX type) example is at:

http://laptop006.livejournal.com/55440.html

And a variant that's EX-specific made it into last year's tips book:

http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/junos-tips-techniques/



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Extremely high failure rate of SCB-E?

2012-05-28 Thread Julien Goodwin
On 29/05/12 07:11, Dave Temkin wrote:
 Anyone here running SCB-E's in a significant production deployment and
 found that there's an extremely high hardware failure rate?

I've no idea what the stats actually are, but this does make complete
sense. The chips on them will be new and should be expected to have
higher failure rates, at least until the first few production runs are
sold through.

As they don't have large SRAM/TCAM there shouldn't be the typical first
run of a new RAM process issues.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] 10ge wan phy with stm-64

2012-05-22 Thread Julien Goodwin
On 22/05/12 23:00, JA wrote:
 Hi
 
 Can anyone please confirm if below connectivity would work with 10ge wan
 phy router port at one side while other end router with stm-64 port?

No this won't work.

 rtr[10ge.wan.phy] --- sdh[stm64] --- dwdm.ring --- sdh[stm64] --- rtr[stm64]

WAN-PHY doesn't magically turn Ethernet into Sonet/SDH, it just changes
the bit rate, and sets enough of the framing to get through most
transport equipment.

Both ends need to be the same, LAN PHY, WAN PHY, or actual SONET/SDH.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] what would you put in this PoP

2012-05-22 Thread Julien Goodwin
On 23/05/12 08:32, MKS wrote:
 Hi
 
 Imagine a town of 15.000-20.000 people. What type of device/devices
 and size would you put into this town, given the following
 requirements
 
 Residential triple play (HSI, VoD, Multicast)
8 IP dslams (GigE)
Vod servers (4 GigE pors)
 
 Business connections (L3VPN)
10 Business connections on GigE
30-40 Business connections 10-100 mb

Consider terminating these subrate services on something like an EX to
save wasting gig/10g ports.


 AToM
 ATMoMPLS port mode, 4 STM1 ports needed.
Except for this an MX80 should work, and now there's the ATM MIC you
have that option, although it would limit you to 20 ge ports.

An alternative would be a larger MX with Trio cards.

 Uplinks on 10GbE in a ring based structure, current traffic levels 2-3
 gigs total
 BNG termination (pppoe) is not a requirement
 
 Spare parts are located 4-5 hours away.
 
 1) If you where given a clean slate, what would you put in?
 2) What do you put normally, given your normal capex level.
 
 Regards
 MKS
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MTBF of M-serie nodes and PICs

2012-05-14 Thread Julien Goodwin
On 14/05/12 02:00, Rachid DHOU wrote:
 Hi experts,
 
 Does anyone have the MTBF of M series routers and their PIC especially
 Ethernet PIC.
 Same question also for J-series.

It really is better to think in terms of *what* fails (for the larger M
and up).

The most common will be:
- Moving parts: fans, hard drives
- Memory
- Optical modules

Once you get past that you're into rare territory. MTBF is a horrible
measurement for network kit, you really only care if you need redundency
and if so how much, and MTBF doesn't actually tell you very much of that.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Regular maintenance advice

2012-04-03 Thread Julien Goodwin
On 04/04/12 00:28, Skeeve Stevens wrote:
 1. Show log messages
 
  a. Look at last few days for anything suspicious
 
   i. Interfaces flapping

show int | match flap is your friend. Also chassisd

 2. Show interfaces terse
 
  a. Anything down that shouldn’t be?

Also anything *up* that shouldn't be.

If you can be strict about it you can say anything but up/up and
down/down are problems.

 3. Show chassis alarm
 
  a. Look for any alarm information

If you have any EX (at least, can't remember for SRX/J, not for M/...)
also add:

show system alarms

(It's sad how few people know about this)

 4. Show system snapshot
 
  a. If older than 1 week then – ‘Request system snapshot’

er, why?
Do a snapshot on OS upgrade, shouldn't be needed after that.

Verifing commit sync is default is also good.

 5. Show system uptime
 
  a. As expected?
 
 6. Show system storage
 
  a. Confirm / (root) disk space is not getting full.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] 12.1 and a bunch of new product details out

2012-03-29 Thread Julien Goodwin
It's worth reading the 12.1 release notes if you run any M/MX/T as there's a 
bunch new and possibly useful, eg MPLS-TP, LLDP enhancements.

EX4[25]00 also now have NSSU in virtual chassis.

In other news there's a bunch of new inter

MIC's:
ATM - MIC-3D-8OC3-2OC12-ATM (12.1 release notes)
1xOC192 - MULTISERVICE INTERFACE MICS FOR MX SERIES
1x100Ge - 100g mic (both CFP and CXP)
2x40ge - 100g mic
10x10ge - 100g mic

MPC's:
MPC3 - 130g of bandwdith

100g MX - http://www.juniper.net/us/en/local/pdf/datasheets/1000353-en.pdf
OC192 MX - http://www.juniper.net/us/en/local/pdf/datasheets/1000378-en.pdf
12.1 release notes - 
http://www.juniper.net/techpubs/en_US/junos12.1/information-products/topic-collections/release-notes/12.1/junos-release-notes-12.1.pdf


SRX:
SRX550 - (essentially) an SRX650 with two GPIM becoming two mini PIM, two more 
copper gig-e and four SFP gig-e
datasheet - http://www.juniper.net/us/en/local/pdf/datasheets/1000281-en.pdf

ACX series:
Looks like new versions of BX series
datasheet - http://www.juniper.net/us/en/local/pdf/datasheets/1000397-en.pdf

PTX
PTX5000 HW guide is out
HW guide - 
http://www.juniper.net/techpubs/en_US/release-independent/junos/information-products/topic-collections/hardware/ptx-series//hwguide/ptx5000-hwguide.pdf
PTX PIC guide - 
http://www.juniper.net/techpubs/en_US/release-independent/junos/information-products/topic-collections/hardware/ptx-series/pic/ptx-series-pic.pdf

There's also a bunch of T4000 docs up now.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Only announce BGP learned networks

2012-02-20 Thread Julien Goodwin
On 21/02/12 01:10, Jonas Björklund wrote:
 policy-statement my-export-routes {
 term t10 {
 from {
 protocol bgp;
 route-filter 1.2.3.0/21 prefix-length-range /21-/24;
 route-filter 4.5.6.0/20 prefix-length-range /20-/24;
 }
 then accept;
 }
 term t100 {
 then reject;
 }
 }
 
 Some of my network begin to be announced. But not all of them.
 
 The one which was learned by OSPF *AND* BGP was not able to pass the
 policy. Only those which was learned from BGP.
 
 I want all networks learned from BGP (even those from OSPF) pass the
 policy.

Then remove from protocol bgp. The router is doing exactly what you
asked, you're simply missing two things:

1. Only active routes are considered in filters (for values of only that
suffice for this)

2. IGP (OSPF, IS-IS) routes are preferred over BGP in JunOS, unlike IOS

The way I do self export is a little more complex, but prevents route spam:

1. For my large blocks (really anything in more then one OSPF area) I
configure an aggregate route covering them, for example:
set routing-options aggregate route 10.23.64.0/18

Unless you specifically add a policy these will never be advertised
outside the router.

2. For all blocks I'm advertising I create a prefix-list:

set policy-options prefix-list self 10.23.64.0/18
set policy-options prefix-list self 10.2.3.4/24

3. Inside my outbound chain I simply do:
set policy-options policy-statement self-out from prefix-list self
set policy-options policy-statement self-out then accept

Which means the prefixes I expect (and *only* those exact prefixes) get
advertised.

(This only makes sense in smaller networks with few edge BGP speakers,
larger networks should use their existing confederation / reflector
boundries as points to inject that regions self into BGP)
-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Hash algorithms for LAG

2012-01-20 Thread Julien Goodwin
On 21/01/12 03:48, Pavel Lunin wrote:
 It depends on a platform. For M/MX/T the hashing algorithm is considered
 to be a kind of business secret (said to be patented, etc). For EX it's

Just to make an important point, it's either a secret *or* it's
patented, part of the point of a patent is that you publish your
invention in a way that others can replicate once it expires (true that
rarely happens these days)

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] QFX3500 optics lock?

2012-01-07 Thread Julien Goodwin
On 07/01/12 15:50, Salman Zahid wrote:
 2.  In terms of 3rd party optics support , we are evaluating the support 
 for 3rd party optics . Please continue to check the Juniper documentation and 
 talk to your account team for roadmap information .

My ire has cooled considerably since reading this statement yesterday,
so here's an attempt at a sane response.

Nobody is asking Juniper to *support* third party optics, they never
have before. All we want is, that like all other Juniper products to
date (that I'm aware of) that third party optics work, and have feature
parity.

If you're so worried about latency within a Qfabic making Juniper
branded (because I'll bet they're not even a special run, let alone
special model) optics required on the internal side of a fabric is
annoying, but not all that objectionable. There's also nothing wrong
with WONTFIXing latency tickets if the path is not 100% Juniper optics,
much as other issues with third party optics are handled today.

To lock third party optics out you had to *add* code to JunOS, remember
that.

Even ignoring common optic types (SR, LR, etc) there's still plenty of
reasons to want third party optics, passive C/DWDM is just the start,
RAD's [TE][13] SFP modules are another type that Juniper just don't offer.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] QFX3500 optics lock?

2012-01-06 Thread Julien Goodwin
On 07/01/12 13:34, Chuck Anderson wrote:
 To clarify my original question, does anyone know of any such
 server/storage/NIC/HBA vendors out there that insist you use their DAC
 cables?  I want to be sure not to buy those either, because last I
 checked, you can't put SFP+ DAC Vendor A on one end and SFP+ DAC
 Vendor B on the other end of the same DAC cable assembly.

At the very least NetApp used to require use of their DAC cables, with
an exception for (IIRC) Brocade cables going to a Brocade switch, I
doubt they actually locked it out though.

In the early days of UCS Cisco were weird (even for them) about this as
well.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JUNOS 9.6R3.8 on MX

2011-12-14 Thread Julien Goodwin
On 16/03/10 06:15, Richard A Steenbergen wrote:
...
 Mar 1 02:22:28.128 re1.router rpd[1281]: %DAEMON-4: bgp_pp_recv: 
 peer x.x.x.x (Internal AS ) sent unexpected extra data, probably insane 
...

Saw this today, combined idea with a coworker was to open a JTAC case
with the subject Insane in the Control Plane

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] J-Series Router Options

2011-11-07 Thread Julien Goodwin
On 07/11/11 06:18, R. Benjamin Kessler wrote:
 Hello All -
 
 We have a client with a lot of J-Series routers running 9.3 code or earlier.  
 We really like the features and functionality of JUNOS as a router and are 
 more than a little annoyed that Juniper seems to be forcing us to turn these 
 routers into firewalls.
 
 What are others doing to deal with the flow issues associated with more 
 recent versions of code?

You can essentially disable the flow mode, it still sucks up RAM (if
you're doing full BGP tables you need, at minimum 2GB, 3 or 4 is better)
but it can still pretty much do the old throughput.

 Also, many of these routers have small CF cards (e.g. 256MB or 512MB) which 
 will also cause issues with more modern versions of code.

Yep, replace with = 1GB cards. But if you have to open them anyway for
RAM doing both makes sense.

Most likely you'd build the new image  config in the lab and send out
RAM+CF to be upgraded on site.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] TCAM full on EX8200?

2011-10-16 Thread Julien Goodwin
On 16/10/11 16:55, Mark Tinka wrote:

 and if all you need is 10g LAN-PHY the MX
 with the 16-port MIC does it nicely.
 
 There should be a newer version of this line card coming 
 with WAN-PHY support.

10g WAN-PHY helps, but isn't actually enough.

Some long-haul applications require actual Sonet (well, usually SDH).
Fortunately those are few enough that a lack of density compared to 10g
ethernet isn't a massive issue.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] TCAM full on EX8200?

2011-10-16 Thread Julien Goodwin
On 16/10/11 13:28, Richard A Steenbergen wrote:
snip openflow rant

 Of course the traditional router vendors are also realizing that they 
 won't be able to compete on price given the massive volumes that third 
 party ASIC makers are doing, so they've already started building systems 
 around those chips. The Cisco ASR is EZChip, the Juniper EX is Marvell, 
 the Juniper QFX and a dozen other similar products are Broadcom, etc. 
 But ultimately, it still comes down to software. The exact same Broadcom 
 reference design box can be sold by Dell for $1k or by Force10 for $15k, 
 and the difference is the software. :)

Well, that's Dell and DellForce10 now...

Arista is the one company that seems poised to actually take this on and
keep coming out with good hardware, at a decent price, with a powerful,
open control plane. Their kit isn't Openflow interoperable yet that I
know of, but that should be doable.

 There are other potential solutions, for example:
 http://www.nanog.org/meetings/nanog50/presentations/Monday/NANOG50.Talk17.swhyte_Opensource_LSR_Presentation.pdf
 
 Yup, this is an example of software using OpenFlow.

So openflow...

It's no secret that my corporate overlords are playing with openflow
(that above presentation for example), but what everyone seems to be
espousing is big, single controllers managing large distributed
environments, something very much like Juniper's Qfabric, but that only
seems interesting, for now, in large datacenter environments. The one
above is using it simply as an abstraction layer for the hardware, not
for distributed features which I think is more practical in the near
term, at least outside of flat datacenter networks.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] TCAM full on EX8200?

2011-10-15 Thread Julien Goodwin
On 16/10/11 05:33, Richard A Steenbergen wrote:
 Hehe. Tag switching will make core routers really cheap, you'll have 
 a few really big PE routers only. Wasn't that the line we were sold 
 with TDP?
 
 And they totally could be too, if anyone bothered to actually make them. 
 You don't even need to spin custom ASICs (one could argue that their 
 might not be enough business to justify it anyways), label switching is 
 so easy from a hardware perspective that it's not even funny. Everyone 
 and their mother is busy churning out Broadcom Trident+ based 64x10G 1U 
 boxes right now (see: Juniper QFX, etc), and at a price of a couple 
 hundred bucks a 10G even on the high end. Why aren't these boxes making 
 great LSRs?

The chip with massive potential that's got me excited is the BCM56846,
64 10g or 16 40g (or a mix), essentially all on a single chip, no need
for external PHY's.

What's needed is for an OEM to build a generic router chassis that has
separate control plane, power, and forwarding modules that can be
swapped as needed. Potentially ATCA might be a good platform for this

But without someone building the full protocol suite already this might
be a hard business proposal.

 The problem is, the software side of MPLS (i.e. all of the associated 
 protocols surrounding it) is so complicated, only Cisco and Juniper have 
 figured out how to actually implement it correctly (and that is only 
 because they wrote most of it :P). All the hardware in the world doesn't 
 help you if you don't have the right software, and C/J shockingly don't 
 want to make a $10k box that obsoletes the need for a $1mil T-series. 
 This is why OpenFlow has them all running scared. :)

There are other potential solutions, for example:
http://www.nanog.org/meetings/nanog50/presentations/Monday/NANOG50.Talk17.swhyte_Opensource_LSR_Presentation.pdf

 The PTX is the first thing to actually attempt to be a label switching 
 router only, but even that one is a) still vaporware, and b) designed to 
 be sold to only a handful of super large carriers, and still at fairly 
 premium prices. All they're trying to do is keep the T-series business 
 unit from losing money to the MX-series business unit (since the MX is 
 just as capable of doing everything T does w/MPLS as a core router, but 
 at 1/4 the price), they aren't ACTUALLY trying to make a cheaper LSR. :)

I do object to the still vaporware, not due to ship until the end of
the year is closer. The main threat to the T-series is that 10ge
slowly removing the need for Sonet/SDH, and if all you need is 10g
LAN-PHY the MX with the 16-port MIC does it nicely.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] JUNOS and 128.0.0.0 martian (JFYI)

2011-10-10 Thread Julien Goodwin
On 10/10/11 23:39, Tima Maryin wrote:
 Hello!
 
 
 Recently RIPE NCC started to allocate addresses from 128/8 to end users,
 example:
 
 https://apps.db.ripe.net/whois/lookup/ripe/inetnum/128.0.0.0-128.0.7.255.html

 inet.0:
  128.0.0.0/16 orlonger -- disallowed

It's only the first /16, so not a huge problem, although I'm amazed that
RIPE didn't do reachability testing (APNIC are almost certainly the best
at this, see their reports for 1/8 for example). There's more then
enough Juniper's out there to cause massive issues if they'd tested.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX80 Questions

2011-08-27 Thread Julien Goodwin
On 27/08/11 22:13, Saku Ytti wrote:
 Hardwarewise scaling is same as any MPC in larger MX, but control-plane is lot
 less beefy than big brothers. Not really sure why, it's not like intel CPU
 would be significant BOM addition to MX80 compared to freescale.
 tinfoilhatdownscaling trio would have been expensive, lot cheaper to reduce
 the scale of the box is to fit it with poorer RE with less memory/tinfoilhat

OK that's not really fair. Even a trivial embedded Intel x86 (and most
usably performing clones) are a *lot* more complex then PowerPC can be
(which is still worse then the single-chip ARM systems now available).
In dollar terms after everything's added in it should have worked though.

I've yet to open up an MX80 (the one we had in the office was only
around for two days before it got shipped off to one of our POP's for an
experiment) to even see if there is space that could have hosted one.

Hopefully an SMP JunOS for it will come out sometime soon to let the RE
catch up with at least the slow Intel RE's.

I am still  aggro about the storage issue though (I suspect in a few
years selling retrofit storage upgrades for a few hundred dollars could
be a profitable side-business for someone).

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Juniper MX SCBE-MX-R

2011-08-11 Thread Julien Goodwin
On 08/11/11 19:00, Daniel Roesen wrote:
 On Wed, Aug 10, 2011 at 11:29:23PM -0400, Rakesh Shetty wrote:
  What I got from juniper is that the enhanced SCB will only be
 supported in 11.4 which is April 2012.
 
 We're hearing 11.4 is due end of 2011.

At the rate Juniper is slipping these days...

11.2 finally came out last week, just over a month late.

Juniper staff at various levels keep assuring me things are being put in
place to improve this, yet the trend is backwards.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-02 Thread Julien Goodwin
On 03/06/11 10:10, Richard A Steenbergen wrote:
 The integrated RE is probably the biggest design limitation. For 
 example, we just got bit by a bad flash drive on one, which caused the 
 kernel to lock up when writing to the disk. This required a physical 

That's the bigger problem. As I understand it, the flash is soldered on
similar to the EX's instead of just using an internal CF or SD slot
which would have helped.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX80 Opinions

2011-06-02 Thread Julien Goodwin
On 03/06/11 10:10, Richard A Steenbergen wrote:
 Juniper would really do well to introduce a 1U small/simple external RE 
 which can be connected over Ethernet, to redundantize a box like the 
 MX80, and to be a reasonably sized BGP route reflector.

There was talk of a VC-like implementation for the MX80, although I
don't know if that went anywhere.

Now that they have the XRE200 what about letting us install Junos64 on
it and making it a reflector platform.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX, Nat + BGP

2011-05-17 Thread Julien Goodwin
On 18/05/11 10:34, OBrien, Will wrote:
 I've been working through a nat configuration on my lab MX960 with a MS-DPC 
 blade that I've borrowed.
 To start, I'm trying to create a simple nat'd subnet. However, the NAT guide 
 that I've been provided doesn't really fit my current design.
 
 The example I'm looking at uses a nat pool that's defined like so:
 150.150.150.0/24
 
 with an outside interface that has say, 150.150.150.1/24 on it,
 
 Ok.
 
 Well, in my world, I use MX's for BGP announcements. So I'm trying to put the 
 NAT source interface on a lo0 instead of a normal interface.
 
 Is anyone else doing it this way or is there some other sneaky trick I'm 
 missing? So far applying the service filter only seems to break traffic.

I've not done NAT on MX only SRX, but with an SRX just announce the NAT
pool as a route (static and readvertise, for whatever reason just adding
a pool isn't enough to make it eligible for redist), don't need to
assign it to an interface at all.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Changing SSH port on EX switches, M routers

2011-04-03 Thread Julien Goodwin
On 03/04/11 02:13, Jesus Alvarez wrote:
 It should be trivial to implement a configurable SSH port in the Junos

True.

 firmware and this would help in securing the router. Practically all

I doubt it.

 scanners attempt SSH logins when port 22 is available but very few check
 all available ports. It is surprising that Juniper does not provide a
 way to change the SSH port.

In my experience if you change the port all that happens is the really
simple scans go away, but anything the least bit smart is still there.

The way to stop SSH being an issue is:

1. If possible firewall the port to allow known management traffic only.
Obviously most networks need to leave a few bounce hosts for
emergencies, but these can be *nix hosts that can run fail2ban or similar

2. Disable root auth (*especially* with JunOS, I find I need a root [not
super-user] shell roughly once a year, and start shell; su takes care
of that)

3. Disable password auth. As long as you don't trust any known
compromised keys (Debian SSL bug bites again) this stops everything.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] VPLS scalability question.. OTV answer?

2011-03-27 Thread Julien Goodwin
The short answer is:
http://www.juniper.net/techpubs/software/junos/junos92/swconfig-vpns/configuring-vpls-without-a-tunnel-services-pic.html

This is meant to just need recent-ish pic's facing the MPLS cloud.

On 28/03/11 09:53, Chris Evans wrote:
 All the communication that we've received from Juniper is that they perceive
 MPLS and VPLS to be their answer to Cisco's OTV. I've been researching VPLS
 on the Juniper platforms and I cannot find any definite information as to
 how much it can scale performance/bandwidth wise. VPLS requires either a VT
 interface or a LSI interface on that hardware. The VT interfaces can only be
 obtained by hardware that can do tunnel services, and the LSI interface is
 only on the MX platforms from what I can read.
 
 As tunnel PICs have limited performance and LSI interfaces 'steal' physical
 10Gig interfaces on the 10Gig MX blades (I know it won't on the GigE blades)
 how does Juniper expect to be able to provide high bandwidth VPLS while
 still providing high port density? The TRIO cards have some inline services,
 but does they offer these services? It seems like Juniper is expecting to
 throw another half baked solution out there to compete with Cisco and I'm
 not sure how they're going to scale the infrastructure. The Cisco solution
 uses the built in ASIC hardware to do this and do not require ports to be
 stolen, etc.. It really bothers me that you have to lose interfaces and/or
 install special hardware to do inline services, which only increases the
 cost of the platforms drastically.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] virtual router, M or J?

2011-03-10 Thread Julien Goodwin
On 10/03/11 18:42, Richard Zheng wrote:
 SRX seems to be a really good candidate. It looks like all models have
 almost identical features, the only difference is performance. I will
 buy a SRX100, maybe even 2 to test high availability.

The SRX100 is a nice test platform, but it does have a bunch of annoying
limitations vs the rest of the line. (Jumbo frames, MPLS bits, a bunch
of performance), although at least you can be sure it will work on anything.

 Customers may have overlapping address space and the virtual router may
 interact with their CPE routers too.

That only needs a routing instance, not a full virtual router which
makes things easier to manage.

 The only issue is that it doesn't support DC power and can't be deployed
 in some cases.

Depends on the model. SRX240  650 have DC variants (see the HW guide),
SRX1400 will get DC according to the data sheet.

 J-series seems much more expensive and doesn't have nearly as many
 features. DC power is available though. Just wonder what's application?

The J's are getting on a bit, they do support some interfaces that SRX
don't (xDSL, T/E3, ISDN BRI), and except for needing ~1GB more RAM with
the -ES (AKA SRX) code still make nice routing boxes for those places
where 1Gb throughput isn't needed.

 M-series seems really over priced for this application.

The smaller M's at this point are also old and due for replacement, the
MX80 covers a lot, but wouldn't suit your needs due to (current) lack of
services.

If and when Juniper launch SONET MIC's I think that will be the end of
the smaller M's.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] virtual router, M or J?

2011-03-09 Thread Julien Goodwin
It sounds like what you really want is just an SRX (Probably 2x240, 650
or 1400).

And unless you have overlapping address space there's no need for
virtual routers at all (and even then they'd only need to be routing
instances)

The J's at this point are essentially just (branch) SRX's with a
different chip.

On 10/03/11 16:36, Richard Zheng wrote:
 I'd like to solicit some advice on router selection. The requirement is to
 support many virtual routers, up to 50 to 100. It only needs a few GE
 interfaces. Many customers are aggregated to it. A virtual router is created
 for each customer to segregate among them. Built-in NAT and firewall
 services are used to route traffic to the Internet so that no external
 router/firewall is required. Since the traffic is not too heavy, I believe
 both M or J would do it. But I am not sure which one is better in this
 particular setup? M is hardware based, J is software based. But J seems to
 support more features although they are both based on the same software.



-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] virtual router, M or J?

2011-03-09 Thread Julien Goodwin
On 10/03/11 16:50, Julien Goodwin wrote:
 It sounds like what you really want is just an SRX (Probably 2x240, 650
 or 1400).

Scratch the 240's, from the data sheet:

Maximum security zones:
- SRX240 - 32
- SRX650 - 128
- SRX3k - 256 (1k should be the same, but not listed on it's data sheet)

 And unless you have overlapping address space there's no need for
 virtual routers at all (and even then they'd only need to be routing
 instances)
 
 The J's at this point are essentially just (branch) SRX's with a
 different chip.
 
 On 10/03/11 16:36, Richard Zheng wrote:
 I'd like to solicit some advice on router selection. The requirement is to
 support many virtual routers, up to 50 to 100. It only needs a few GE
 interfaces. Many customers are aggregated to it. A virtual router is created
 for each customer to segregate among them. Built-in NAT and firewall
 services are used to route traffic to the Internet so that no external
 router/firewall is required. Since the traffic is not too heavy, I believe
 both M or J would do it. But I am not sure which one is better in this
 particular setup? M is hardware based, J is software based. But J seems to
 support more features although they are both based on the same software.
 
 
 
 
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] J2350 Dual fast ethernet PIM

2011-03-03 Thread Julien Goodwin

What's the deal with the J23X0 and not supporting the dual fast-e pim.

Given the UPIM's are supported this makes little sense.

Although the pim guide, and JunOS itself say unsupported (and just
disabled in JunOS). They are used as an example in the hardware guide:

http://www.juniper.net/techpubs/hardware/junos-jseries/junos-jseries96/junos-jseries-hardware-guide/hw-hardware-features-j2320-j2350.html#hw-hardware-features-j2320-j2350

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] SRX advice

2011-02-03 Thread Julien Goodwin
On 04/02/11 16:12, Ryan Goldberg wrote:
 watchguard a) is the outbound nat box for about 70 small offices (we are a 
 small ISP too, these are fiber-connected customers).  it also handles some 
 amount of inbound nat for those customer's various servers, which may be in 
 the customers office, or a virtual host in our racks.  and maybe a half dozen 
 ssl-vpn road-warrior types.  There's also a dozen or so lan-to-lan ipsec 
 tunnels on it.  sustained 2-20 inbound.  light outbound.

That's an odd setup.

 watchguard b) is for internet facing windows boxes.  lotsa inbound nat.  
 sustained 2-20Mbit outbound
 watchguard c) is for our office, 55ish users.  some inbound nat too.  
 0-50Mbit inbound, widely varying
 watchguard d) is for one particular hosting customer where stability is 
 paramount.  The other firewalls get touched a lot (and as of late, have been 
 puking when they feel like it).  2-15Mbit of sustained web traffic, with the 
 odd spike or lull.

These three are fairly trivial.

 a 2821) terminates a bunch of lan-to-lan ipsec tunnels (VTI style) to 1841s 
 all over the place.  box is completely VRFed, no global table, all the 
 tunnels land in the INTERNET vrf and pop out in customer vlans, each their 
 own vrf.  10-30Mbit
 
 So - goal is to collapse all this onto a single pair of boxes running in an 
 HA config.  Watchguard a, b, and c are problematic, and are becoming more 
 problematic.  watchguard d is pretty quiet, but we are contractually 
 obligated to remove all SPOF from that clients setup.  the 2821 is very 
 quiet, no troubles.  

 My main question revolves around number of virtual routers.  We can't afford 
 a big enough box to stuff everything (as in, every customer network) in its 
 own vrf/routing-instance.  I will admit that I've become hooked on using vrfs 
 in cisco land on ISRs (a lot of double-ISP configs, random dirty hacks).  But 
 for our future firewall setup, I don't know what a bunch of routing-instances 
 really buys us, if anything (aside from the psychological aspect).  All we 
 really need is for all the private networks behind this thing to get natted 
 to their corresponding public ip(s), and if something behind the firewall 
 needs to talk to something else behind the firewall, it should go out and 
 back in (getting source nattted, then dest natted).  If the J-boxes can do 
 that without separate routing-instances, then we're good.

You only need instances (on SRX) for two things:
* Overlapping IP's need forwarding instances
* Multiple protocol instances (eg, seperate OSPF on either side) take
non-forwarding instances

 My other question involves HA stability.  I've seen instances with other kit 
 where introducing HA actually reduced availability.  SRX boxes like running 
 in HA, or are they fussy?

I don't run SRX's in HA, the only issues I've had in production are
firmware related (note that you can't do an online firmware upgrade of a
HA cluster, there's still a hit).

I would suggest an SRX650 over the SRX240, would be far more confident
in that handling your traffic load (on the services side, forwarding
should be trivial for even an SRX100).

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Sync-E and PTP (1588v2) support on Juniper equipment

2011-01-21 Thread Julien Goodwin
On 21/01/11 23:02, Timo Mallas wrote:
 It would be great if somebody who has got some experience with this could
 shed a little light on frequency (and ToD/phase) synchronization protocol
 like Sync-E and 1588v2 support on Juniper equipment? 
 
 A customer of ours is considering to migrante from legacy SDH network to
 IP/MPLS Ethernet network. At the moment IP/MPLS parti s clear, no problems
 there .. what's missing is synchronization part. I'm more or less aware of
 options Cisco is offering, but it would be nice to see if Juniper can offer
 something competitive as well J .. any input will be highly appreciated. 

Have you actually figured out exactly what needs timing?

Unless it's Cellular, DOCSIS, or SDH/PDH tunnels you shouldn't need it,
and for all of those AFAIK you can use local clocks.

Juniper did add sync-e support to the MX80 (modular version only) in
10.4, and they have better then average timing, but not sync-e or PTP in
the BX line.

Don't see any big likelihood of PTP support soon given that it's only
accurate on the LAN scale and not much better then NTP once it's gone a
few hops.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Routing to tunnel interfaces on M10i

2011-01-18 Thread Julien Goodwin
On 19/01/11 00:42, Alexander Shikoff wrote:
 But it seems that M10i does not route anything to this tunnel:
 I cannot ping 109.68.40.158 from any other place of my network.
 
 What's wrong with it? Thanks in advance.

So, here's a few things:

1. Are you running at least JunOS 9.2?
 - I had some issues with IPIP in 9.0 and 9.1, 9.2 and 10.0 have been fine

2. Do you have a tunnel pic?
 - Some quick googling does seem to confirm IPIP needs a tunnel pic
 - However traffic to the RE may still work without one

3. Are you advertising the routes for traffic behind the tunnel via your
IGP?
 - What does show route somewhere else say?
 - Does a traceroute show the expected path?

4. Does the *remote* site do the same for return traffic

5. Are you advertising a better route to the tunnel source (either way)
 - Some gear will bring a tunnel up, negotiate the IGP, then try to send
the encapsulated traffic over the tunnel itself (JunOS will do this with
both SRX and ES-pic IPSec), static /32's can help here

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Routing to tunnel interfaces on M10i

2011-01-18 Thread Julien Goodwin
On 19/01/11 01:35, Alexander Shikoff wrote:
 On Wed, Jan 19, 2011 at 01:20:00AM +1100, Julien Goodwin wrote:
 2. Do you have a tunnel pic?
  - Some quick googling does seem to confirm IPIP needs a tunnel pic
  - However traffic to the RE may still work without one
 
 I do not have it. I thought that tunnel pic is needed only for hardware
 processing of IP-IP or GRE tunnels, but it seems that without it 
 traffic is allowed only to RE.

Yes. Juniper's hardware routers simply don't do software fallback for
forwarding. You either get line-speed (or PIC-speed for ES, AS, Tunnel
etc) forwarding or nothing at all.

There is *one* case of software fallback I'm aware of in that BFD can,
on some platforms, be done at the hardware level with less RE
involvement (from an old thread on this list I think, should research it).

Another case worth mentioning is the VPLS no-tunnel-pic option which
uses the enhanced capabilities in some of the newer pic's (presumably
for double push operations) to run without a tunnel pic.

If you're willing to do the evil of using a P-style pic in a PE-style
FPC (well, chassis in this case) you can pick up a compatible tunnel pic
for less then US$500 on eBay, add some form of handle and remove the
steel base plate (if installed) and it works fine.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] logical-systems loopback's

2011-01-03 Thread Julien Goodwin
I'm starting to get logical-systems going on my M5, and I've hit
something odd that I've not seen before, and Google isn't helping.

Juniper M5, running 10.0R2.10.

When I configure a loopback in a logical-system (eg, lo0.6 for one of
them) all seems fine. When I try and use lo0.6 as the source address for
an unnumbered address (aggregated SDH in this case) I get a commit error:

[edit logical-systems zeta interfaces as1 unit 0 family inet]
  'unnumbered-address'
unable to get address from lo0.6
error: configuration check-out failed

I also get the same error when trying to use unnumbered-address on an LT
interface (as an aside, why only Ethernet  frame-relay options for LT
interfaces, PPP and/or HDLC would seem to make more sense, having no
encap at all would make even more)

If I try any other loopbacks I get:

[edit logical-systems zeta interfaces as1 unit 0 family inet
unnumbered-address]
  'lo0.0'
referred interface must have address configured under family inet
error: configuration check-out failed: (statements constraint check failed)

Which seems right, so there's clearly something special happening.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] logical-systems loopback's

2011-01-03 Thread Julien Goodwin
While I'm on the topic of things which aren't quite right, why does
commiting an aggregated-sonet or ethernet connection without setting
device count (chassis - aggregated-devices) not throw at least a
warning that this will silently fail?

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Cisco 7206 replacement

2010-12-28 Thread Julien Goodwin
On 29/12/10 04:39, Mark Tinka wrote:
 The things that currently annoy me with Juniper are:
   - JUNOS has been terrible, hopefully 2011 is a
 better year.

Absolutely, although I've found that only really in the SRX line where
both 10.3  10.4 are unusable as RPD never comes up (*second* JTAC case
for this to be opened this week).

   - Strange and silly hardware restrictions that
 inconvenience you when you least expect it, e.g.,
 lack of Translation Tables support on the MX
 DPC's, lack of H-QoS on the current 16-port 10Gbps
 MPC card, the need for additional Services PIC's
 for certain basic services (I agree that very
 advanced services would scale best when offloaded
 to dedicated hardware), e.t.c.

And Cisco aren't *worse* at this? Look at the supported platforms for
VPLS for example. I can run VPLS on an M40 if I had one (yes, with a
tunnel PIC, or specific other PIC's).

   - No decent contender to Cisco's ASR1000 platform -
 it currently makes no sense for us to invest in
 the M7i/M10i boxes, and yet the M120 and MX-series
 boxes are too large. I hope this can be rectified
 soon.

I'm not so sure about that. If you're ethernet only, *and* you need more
interfaces then an ASR1002 then the MX80 is a nice combo, but yes an
even smaller ethernet-only platform would still be great, although I
doubt Juniper will launch one as it would likely just cannibalise sales
of the MX80 (Something with just the interfaces from an SRX1400-10G
would be awesome).

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] On upgrading an M5

2010-12-26 Thread Julien Goodwin
I've just spent the last few days (when not gorging myself on seasonal
fare) upgrading an M5 for lab use, and thought a few notes might be
useful for next time I need to do it.

CF Upgrade:

1. Changing the CF in an RE-2.0 is a pain, disassemble, do the complete
upgrade, only then reassemble, you'll thank yourself after going back
for the tenth time.

2. If you don't zero the new CF (at least the first few MB) you'll need
to change the boot order *before* installing it:

r...@m5 start shell
r...@m5% sysctl machdep.bootdevs
machdep.bootdevs: pcmcia-flash,compact-flash,disk,lan
r...@m5% sysctl -w machdep.bootdevs=pcmcia-flash,disk,lan
machdep.bootdevs: pcmcia-flash,compact-flash,disk,lan -
pcmcia-flash,disk,lan

3. If you have pre-8.5 JunOS on a device it seems like it will ignore =
1GB CF, so you may need to snapshot, remove CF, upgrade JunOS, install
CF, snapshot back

4. If the CF isn't in the boot list some version of JunOS will simply
ignore it

5. If CF isn't in the boot list a major alarm goes in 9.3 (doesn't in
8.5, didn't test anything in between)

6. If the CF isn't in the boot list on upgrade, it will be added back
(at lest in a 9.3 - 10.0 upgrade)


PIC's:
P-style pic's still work without alarm, at least as of 10.0R2.10.

Just remember to add some form of ejector *before* installing into the
chassis, or at least mount it next to a PE pic.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper SRX and ssh freeze

2010-12-23 Thread Julien Goodwin
On 23/12/10 21:34, Florian Weimer wrote:
 * Julien Goodwin:
 
 For my SRX at the office back when I installed it (9.6 IIRC) *TCP*
 keepalives would not extend session timeouts, but *SSH* keepalives
 worked very well, that's the ServerAliveInterval setting in OpenSSH.
 
 Typically, TCP keepalives happen at such long intervals that they do
 not keep firewall state alive.

In my specific case (whinging admin in internal IT, not production) they
were at least every minute.

We do actually have some systems that are so old/weird they don't
support the ServerAliveInterval, but they're all fairly minor so it's
not usually a problem.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper SRX and ssh freeze

2010-12-21 Thread Julien Goodwin
On 22/12/10 04:53, Alfred Schweder wrote:
 Does SRX support ssh keepalive (like M- or J-serie)?
 
 SSGs drop the ssh session if they get a keepalive.
 Juniper isn't willing to fix this in the near future ;-(

For my SRX at the office back when I installed it (9.6 IIRC) *TCP*
keepalives would not extend session timeouts, but *SSH* keepalives
worked very well, that's the ServerAliveInterval setting in OpenSSH.

It's arguable whether this is correct, but as everything I use supports
the SSH keepalives it works for me, as well as being much better at
noticing when a connection *does* drop.


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX unsupported filter policer and actions on loopback lo0

2010-12-18 Thread Julien Goodwin
On 18/12/10 07:28, Chris Morrow wrote:
 yea, so... from:
 http://www.juniper.net/us/en/local/pdf/datasheets/1000215-en.pdf
 
 AFL includes licenses for IS-IS, BGP, MPLS and IPv6 routing

While we're on the topic, I'm still annoyed at this.

Juniper have publicly stated that they won't charge for IPv6, so why are
they still doing so on EX?

I can currently use OSPF3 due to what I presume is a bug in licence
enforcement, but that's not really a sane long-term option.

See Dave Ward's talk at the Google IPv6 implementers conference:
https://sites.google.com/site/ipv6implementors/2010/agenda

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] l2tp sessions on MX

2010-12-13 Thread Julien Goodwin
On 13/12/10 17:21, Amos Rosenboim wrote:
 L2TP termination is not currently supported on the MX.
 According to an SE I work with this is on their radar but no committed date 
 yet.

More to the point it's publicly advertised in the marketing materials
for the Trio boards  MX80.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] l2tp sessions on MX

2010-12-13 Thread Julien Goodwin
On 14/12/10 04:22, Phill Jolliffe wrote:
 MX + MPC + L2TP LAC functionality just arrived in 10.4

For those playing along at home it's page 23 of the release notes.

L2TP LAC support for subscriber management (MX Series routers)

But no LNS, or was that supported by way of the other platforms with LNS
support?

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Using SRX's for BGP and Firewalling

2010-11-09 Thread Julien Goodwin
On 09/11/10 20:12, Keegan Holley wrote:
 
 On Mon, Nov 8, 2010 at 10:26 PM, Julien Goodwin
 jgood...@studio442.com.au mailto:jgood...@studio442.com.au wrote:
 
 On 09/11/10 14:17, Keegan Holley wrote:
  BGP full feed on an SRX650 is fine, if you disable flow mode
 (as much as
  you can, don't forget the ALG's).
 
 
  What's the point of doing BGP on a firewall with firewallling
 turned off?
 
 Because they're cheaper then the J-series.
 
 
 Why bother with either if you're all ethernet? 
 

Because an SRX650, after discounts, is cheaper, and more robust then a
PC based (ie, standard rack pc, not a special one) router.

Especially once you add support, and don't forget that many carriers
want a DC PSU option, even if they don't use it.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Using SRX's for BGP and Firewalling

2010-11-08 Thread Julien Goodwin
On 09/11/10 02:38, Maqbool Hashim wrote:
 Hi,
 
 I'm looking at doing a multihomed BGP setup using two upstream Internet 
 providers.  We are obtaining PI space and would like to announce our PI space 
 via BGP to our upstreams.I'm looking at using one of the SRX range from 
 Juniper to handle the BGP and firewalling requirement for us.  We don't need 
 a full routing table.  Is it a realistic proposal to do the BGP and 
 firewalling on one device (an SRX) ?  Or am I creating a rod for my own back 
 by not using separate BGP routers and using separate devices to do the 
 firewalling for me.  I'd be interested in hearing if other people are using 
 the SRX's in a similar way.

Thunderbird just ate my response, grr.

BGP full feed on an SRX650 is fine, if you disable flow mode (as much as
you can, don't forget the ALG's).

BGP with a default inbound and advertising a few routes is fine with
firewalling.

Combining a full feed with firewalling is a bad idea, at least on the
branch kit, and probably the SRK1k and 3k.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] EX4200 JunOS Recommendation

2010-11-08 Thread Julien Goodwin
On 09/11/10 06:31, Keegan Holley wrote:
 I'm looking for a code recommendation for  EX4200's.  I'm planning some
 network wide upgrades and I have an idea of what I want to run, but I was
 curious what the list would recommend.  Most of the switches will be layer-2
 only with, 10G or AE uplinks, VC of course.  We've run into some
 pretty significant bugs in the past, just wondering what everyone else is
 running.

I'm still running 9.5 everywhere. Apart from one DHCP relay oddity it
works fine.

Once DHCP6 relay is in I'll upgrade, but the main reason I haven't is
that I currently have one feature working that shouldn't.

If Juniper actually delivered on their promise of IPv6 equality this
wouldn't be an issue (and that's enough for anyone who cares to figure
out what I mean).

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Using SRX's for BGP and Firewalling

2010-11-08 Thread Julien Goodwin
On 09/11/10 14:17, Keegan Holley wrote:
 BGP full feed on an SRX650 is fine, if you disable flow mode (as much as
 you can, don't forget the ALG's).
 
 
 What's the point of doing BGP on a firewall with firewallling turned off? 

Because they're cheaper then the J-series.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] Fwd: router recommendation

2010-10-25 Thread Julien Goodwin
On 26/10/10 08:54, Gabriel Blanchard wrote:
 We in fact use a J-6350 at our office and we couldn't even get it to handle a 
 full routing table. (at least not very well).

They handle a full routing table just fine. With the old packet-mode
software they could do a full table (as of January) in 1g of ram.

With flow-mode I've had to up ours to 3GB (above Juniper spec) at which
point they handle three full tables with plenty to spare.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SRX650 10GbE Interfaces

2010-10-20 Thread Julien Goodwin
On 20/10/10 23:20, Skeeve Stevens wrote:
 Hey all,
 
 On the Juniper product page for the SRX650 under interfaces it lists:
 
 2 x 10 GbE SFP+ / 10 GbE Base-T Copper
 
 I've found some obscure references to the PIM - code SRX-GP-2XE-SFPP-TX
 
 Which seems to suggest you get 2 * SFP+ and 2 * 10GBase-T.  That is a little 
 odd.

Fairly standard, you get the copper or the SFP. Same with plenty of
switches (eg, EX3200).

 Has anyone used these... I can't even find a picture on Google, and most of 
 my suppliers don't even list it - but one does.

I could *swear* I had some more details, but can't find anything. If you
trawl through the 10.2 release notes you get this:

2-Port 10-Gigabit Ethernet XPIM—The 2-Port 10-Gigabit Ethernet XPIM is
supported on SRX650 devices.

The 2-Port 10-Gigabit Ethernet XPIM provides a connection to high-speed
Ethernet networks through branch WAN service and allows carriers to
provide multiple levels of Ethernet service with a single connection
option for all service ranges. The 2-Port 10-Gigabit Ethernet XPIM is a
single-slot XPIM that can be installed only in the 20-gigabit GPIM slots
(slot 2 or 6) on the front panel of the SRX650 Services Gateway.

The 2-Port 10-Gigabit Ethernet XPIM contains two 10-Gigabit Ethernet
interfaces with both copper and small form-factor pluggable transceiver
(SFP) terminations, to support redundancy and enable the SRX650 Services
Gateway to be used as a pure security service device.

The following key features are supported on the 2-Port 10-Gigabit
Ethernet XPIM:
Online Insertion and Removal (OIR) capable.
Contains a total of four ports (two SFP+ and two 10GBASE-T). Only two of
the four ports can be active at any time; mix and match between the
copper and fiber types is supported.
...
Quad speed support for copper mode: 10GBASE-T IEEE 820.3an, 1000BASE-T
IEEE 802.3ab, 100BASE-T IEEE 802.3u, and 10BASE-T IEEE 802.3.
Standard quality-of-service (QoS) features.
User-configuration of fiber and copper ports:
When the interface is configured as a copper port, a typical Ethernet
configuration such as Autoneg is supported. Forced rate and link mode
are allowed. Four forced and Autoneg rates are provided: 10 gigabits, 1
gigabit, 100 Mbps, and 10 Mbps.

 Also, does anyone know why these modules are so damn expensive (about 
 US$9000) where most Cisco 2 port SFP+ modules, Juniper EX3200/4200 and HP 
 E2910al cards are all around the $1200-$1500 range.

If they're not shipping in quantity that alone could be enough, the 4SFP
/ 2SFP+ module for the EX4200 cost a customer nearly $5k each when first
available.

Then remember it's (essentially) a 2x10g module for a router that
doesn't just do ethernet (even if that's all anyone does use them for)
and so a lot of bits that are included as standard in ethernet-only gear
is on the module.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] Non-M SSG5X0 JunOS

2010-10-03 Thread Julien Goodwin
I recently picked up (due to being an idiot who forgot to *read*) a
non-M SSG550 intended for the lab.

I've put a J-series CF in it and it boots through to Initializing
product: 28 but appears to get in a hard hang after that.

Has anyone made JunOS work on them, or is there an actual hardware change?

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] OSPF default-lsa

2010-07-27 Thread Julien Goodwin
On 27/07/10 18:42, Luca Tosolini wrote:
 the default-lsa is not generated because of Junos 'active backbone
 detection'
 
 http://www.juniper.net/techpubs/software/junos/junos94/swconfig-routing/configuring-the-backbone-area-and-other-areas.html
 
 Active backbone detection is implemented to verify that area border
 routers are connected to the backbone. If the connection to the backbone
 area is lost, then the router’s default metric is not advertised,
 effectively rerouting traffic through another area border router with a
 valid connection to the backbone.
 
 I don't know if and how it can be disabled.

And a quick google later the magic appears to be (from Network Mergers
 Migrations, my copy of which is at home, and I wouldn't have looked
to it for OSPF insight).

set protocols ospf no-active-backbone

Which is now on all my area 0 routers.

Thanks a lot.



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] EX 4200 stability with BGP and OSPF redistribution ?

2010-06-22 Thread Julien Goodwin
On 22/06/10 18:13, Richard A Steenbergen wrote:
 With a healthy dose of complex commit scripts you can get an MX commit
 time up to 20 seconds in no time flat. Well at least you could, I
 noticed they did something in 9.6 to make it a lot faster (at least for
 me, with commit sync, etc). EX on the other hand can get to a 30 sec
 config with half the number of commit scripts and a much smaller config.
 Of course if you really want suffering try SRX, which takes 30 seconds
 to commit a nearly blank config. :)

I had a J6350 last night take over 10 minutes to commit.

Under heavy BGP load, and although it won't admit it I strongly believe
heavy memory pressures (two full feeds, plus four other feeds totalling
~50k routes on a 1GB system in 10.0R2, RAM has been ordered and the
second full feed turned off).

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX80 L2TP Functions

2010-06-11 Thread Julien Goodwin
Have a look at the hardware guide, it's out now (finally...).

The MX80 is four XFP slots (30Gbit bandwidth), plus two MIC slots for
interfaces, all Trio 3D based. Alternately the two MIC slots can be
replaced by 48 10/100/1g copper ethernet ports (40Gbit bandwidth)

*NONE* of the existing MX interface cards are used.

The one bit of good news from the hardware guide is that there's a third
MIC slot (or for the fixed, *a* MIC slot) reserved for later services
MIC's on the rear panel.

The Trio chipset is meant to, eventually, support nearly all the
services that currently require an MS-DPC.

Bad news from the hardware guide is that the RE is poor. 1.2Ghz CPU and
2Gb of ram (not 100% if it can be expanded, looks so), but in a nod to
the EX4200 two 4GB *fixed* storage drives on the board. The RE is also
not a separate board from the base.

There are cl[oc]k and sync BNC's on the rear panel as well, but no
details on them, sonet clocks are as RJ45's on the front panel.

Still, all said and done I'd love one on my desk as a VPLS/etc. testbed,
much smaller then the M40e I just got rid of.

On 11/06/10 16:14, Georgios Vlachos wrote:
 
 According to the pricelist the ms-dpc is not supported on the MX80
 
 
 -Original Message-
 From: juniper-nsp-boun...@puck.nether.net
 [mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of OBrien, Will
 Sent: Friday, June 11, 2010 7:18 AM
 To: Julien Goodwin
 Cc: juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] MX80 L2TP Functions
 
 L2tp is supported... With the ms-dpc on the mx960. I imagine it's the  
 same for the 80
 
 Will O'Brien
 
 On Jun 10, 2010, at 9:30 PM, Julien Goodwin  
 jgood...@studio442.com.au wrote:
 
 On 11/06/10 10:38, Skeeve Stevens wrote:
 Hey all,

 Does anyone know if they MX80's LNS/L2TP functions are available  
 out of the box as suggested in the datasheets, or will it be  
 available 'later' (with no specified timeframe).

 According to someone in Juniper AU I spoke to, the answer is later,
 possibly into next year.

 However that was prior to actual hardware shipment and not a  
 definitive
 statement.

 -- 
 Julien Goodwin
 Studio442
 Blue Sky Solutioneering

 signature.asc
 ATT1..txt
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
 


-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX80 L2TP Functions

2010-06-10 Thread Julien Goodwin
On 11/06/10 10:38, Skeeve Stevens wrote:
 Hey all,
 
 Does anyone know if they MX80's LNS/L2TP functions are available out of the 
 box as suggested in the datasheets, or will it be available 'later' (with no 
 specified timeframe).

According to someone in Juniper AU I spoke to, the answer is later,
possibly into next year.

However that was prior to actual hardware shipment and not a definitive
statement.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] SRX deployment / issues

2010-03-22 Thread Julien Goodwin
On 23/03/10 04:05, Hoogen wrote:
 I think the EX thread was really good and the feedback was awesome. I would
 like hear about similar experiences while deploying SRX Series gateways, I
 am assuming I would hear a lot on the branch boxes SRX 210,240,650 I would
 also love to hear feedback on SRX 3000/5000 if people have been using it in
 their setup, problems that their facing, improvements and general deployment
 scenario that have been used.

So the big gotcha with the SRX line is the lack of IPv6 support. I've
been assured by a Juniper tech rep that over 10.2-10.4 it should get
closer to parity.

From my big evil list:
* SRX650 allowed me to configure {{family ethernet-switching}} on the
internal ports, which isn't supported
* SRX650 only supports LACP on {{family ethernet-switching}} ports,
which excludes the internal ports, EX4200 doesn't have this problem

From the firewall section (much of these are feature reqs)
* Allow to change the default policy per {{from-zone a to-zone d}}
* Allow to do {{from-zone any ...}} or perhaps just {{from-zone [ a b c
] to-zone d}}, this would be a *major* PITA in a hosting environment
with a zone per customer.
* Allow to have {{from-zone ... to-zone ...}} with no rules, I know the
default is implied with it not there
* Allow to have {{address-set}} inside {{address-set}} (ie, group of
groups), this is a *huge* PITA for us now
* The warning on {{show}} for an undefined application is {{Warning:
application or application-set must be defined}} which sucks when
multiple apps are defined, {{commit check}} is fine
* Documentation is unclear re NAT pool IP addresses. I had to add the
pool address to a loopback to get things working, until then the route
was never offered.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] EX 8200 deployment

2010-03-21 Thread Julien Goodwin
On 21/03/10 02:03, Richard A Steenbergen wrote:
 We just deployed our first EX8208 a few days ago, running 10.1R1. 
 Gotchas so far:
 
 * Obviously this is a very different architecture from Juniper's normal 
 boxes, so be prepared for vlan space being shared across the entire box, 
 not a per-interface basis.

So far, apart from the MX I'm not aware of any Juniper gear that does
switching with multiple VLAN spaces.

 * In a move straight out of Foundry's playbook of how to fail at making
 a useable product, EX has no packet counters (cli or snmp) available for
 L3 vlan interfaces. It DOES have working counters if you do traditional 
 Juniper subinterface style vlans (interface blah, vlan-tagging, unit 123 
 vlan-id 123), but it does NOT work if you have to do RVI style (vlan 
 blah l3-interface vlan.123 and then put vlan blah in an ethernet 
 switching interface). Subinterface style is my preference anyways, so as 
 long as you only ever use vlans on point-to-point links this isn't a 
 problem, but the instant you need to put a VLAN on more than one port 
 you no longer get packet counters.

Thank you for doing the testing on this, I was assuming this was a bug
as I'd thought they couldn't be *that* stupid.

To make things worse counters for vlan.XXX traffic are also only the
traffic destined *to* the interface, not counting traffic routed *through*.

 * Related to the issue above, you can't mix subinterface style and 
 RVI style vlans on the same trunk port. The instant you need to do 
 anything more than classic subinterface style vlans, you have to convert 
 everything on the trunk to vlan/rvi style. For example, where I might 
 otherwise be able to get away with doing interface xe-1/0/0 unit 123 
 vlan-id 123 family inet blah, if I want to trunk a layer 2 vlan on that 
 same interface I now have to convert unit 123 to RVI style. One possible 
 workaround I have yet to test is doing a CCC instead of a vlan, to keep 
 the subinterface style. This would only work with 2-port member vlans 
 though, and I have yet to test the implications for mixing tagged and 
 untagged ports on EX, so this may not actually work for anyone at all. 

Either way please post.

 * Firewall filters are still a bit of a mess. You can't count or log
 anything, you can't use policers on either control plane or egress
 filters (heck you can't even commit a firewall filter with a policer in
 it if applied as an output filter), you can't match frags, etc, etc.

Lack of outbound policers also makes it fairly useless in many roles
where enforcing max bandwidth on a WAN link is required (At least here
in Australia carriers complain if you actually dump 100Mbit of traffic
on a 100Mbit point-to-point link).

 * I don't know who thought 2GB of storage on an RE was sufficient, but 
 it isn't. The best idea I've come up with so far is to grab some small 
 USB flash devices like http://www.geckoandfly.com/tag/small-usb/ and 
 deploy them on every RE so you have a little bit of working space.

I've only just upgraded a bunch of stuff *to* 2GB, and don't have any
real space issues. I would very much appreciate if Juniper would just
give us two, externally accessible CF slots for storage and have that be it.

 Other than that we haven't found any fundamental flaws in the box yet
 (though that may change by the time MPLS features get implemented :P). 
 Plenty of bugs to be sure, DOM isn't working right on any of our
 interfaces, pfe statistics don't work right, monitor interface on vlans
 isn't displaying correctly, prior to 10.1 the FPCs crashed if you tried
 to speak BGP flowspec to the box, etc, but we have cases open on all of
 the above. IMHO it definitely has the potential to be a very good box in
 the long term, but whoever didn't think to put vlan counters into the
 hardware really screwed the pooch something fierce. :)

So the EX (4200) bits from my personal list:
* EX4200 - bootp relay doesn't work when configured inside a
routing-instance, works when configured at top to use an instance
* The commands in
http://kb.juniper.net/index?page=contentid=KB13206cat=JUNOS_EXactp=LIST
don't exist in 9.5

I'm mostly on 10.0R2.10, but all our EX's are still 9.5.

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Re: [j-nsp] MX-80 rumors and heresay - any comments?

2010-03-18 Thread Julien Goodwin
On 19/03/10 16:49, Phil Pierotti wrote:
 Given the size/shape/ports of the soon-to-be-delivered MX-80, it's fairly
 obvious that it's targeted at the 7206-G2/ASR1004/SmartEdge-400 size of the
 market.
 
 Has anyone heard any rumors (or otherwise) of there being L2TP
 LAC/LNS/Tunnel-Switching functionality available on this platform (ie in
 real JunOS).

So I've yet to see a definitive statement, but I was looking at this
last night.

The MX MPC data sheet indicates L2TP support:
http://www.juniper.net/us/en/local/pdf/datasheets/1000294-en.pdf

Inline services include...
   Layer 2 Tunneling Protocol (L2TP), L2TP access
concentrator (LAC), and L2TP network server (LNS).
(Page 2, Junos Trio Chipset)

I have not seen a statement one way or the other on the MX80.

I too would love such a statement, as a potential project of mine is
contingent on that support.

Julien

-- 
Julien Goodwin
Studio442
Blue Sky Solutioneering



signature.asc
Description: OpenPGP digital signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp