[j-nsp] 2014-07 Security Bulletin: Junos: Denial of Service in TCP packet processing (CVE-2004-0230)

2014-07-10 Thread Richard A Steenbergen
Hey Juniper,

If you're going to send out a security update on what is literally now a 
10 year old issue (god I feel old), you should at least wait until 
Throwback Thursday. :)

2014-07 Security Bulletin: Junos: Denial of Service in TCP packet 
processing (CVE-2004-0230)

Junos now implements the TCP robustness improvements outlined in Section 4 
of RFC 5961. Junos will send an ACK in response to any SYN or RST flag 
received, irrespective of the sequence number.

The following software releases have been updated to resolve this specific 
issue: Junos OS 11.4R11, 12.1R10, 12.1X44-D35, 12.1X45-D25, 12.1X46-D20, 
12.1X47-D10, 12.2R8, 12.3R6, 13.1R4, 13.2R4, 13.3R2, 14.1R1, and all 
subsequent releases (i.e. all releases built after 14.1R1).


-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] proposed changes to clear bgp neighbor

2014-02-27 Thread Richard A Steenbergen
On Wed, Feb 26, 2014 at 10:36:39AM -0500, Phil Shafer wrote:
 Juniper users,
 
 We've been asked to make a change the clear bgp neighbor command
 to make the neighbor or all argument mandatory.  The root cause
 is the severe impact of clear bgp neighbor and the increasing
 accidental use of this command without a specific neighbor.
 
 In general, we avoid changing commands to add mandatory arguments,
 but my feeling is that the impact and severity of this specific
 command makes this an acceptable occasion for such a change.
 
 I'm looking for feedback about this change.  My working assumption
 is that clear bgp neighbor is a sufficiently rare command and
 would not be used in automation/scripts, so the impact of making
 the neighbor/all argument mandatory would be minimal.  Is this
 assumption accurate?

Personally I'd support this, either through requiring an all, or 
adding a yes/no confirmation after executing the command (which sounds 
like it would solve the problem for those silly humans, without 
impacting the scripting interfaces as badly). This is a sufficiently 
rare command in a good way that you should really have some form of 
additional error check, just like delete from the top level of the 
config.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] NTP Reflection

2014-01-13 Thread Richard A Steenbergen
Dear Juniper,

Please tell me you didn't actually do this. Please tell me that I'm just 
missing something, and that you would never do something so insane. Did 
you guys REALLY ship code that automatically enables an NTP server that 
responds to the world, with no authentication or options to restrict 
access or commands, whenever someone configures the router to be an NTP 
client? Because that's sure what it looks like.

The documentation on the subject is interesting too:

http://www.juniper.net/techpubs/en_US/junos13.1/topics/task/configuration/network-time-protocol-time-server-time-services-configuring.html

Configuring the Router or Switch to Operate in Client Mode:
* Do something

Configuring the Router or Switch to Operate in Server Mode:
* Do the exact same thing

Sigh... I'd be more disappointed, but hey it doesn't crash anything when 
someone uses your routers as an NTP reflection attack amplifier, so I 
suppose you can at least be proud of that.

For anyone who doesn't know what I'm talking about, you might want to 
read:

http://blog.cloudflare.com/understanding-and-mitigating-ntp-based-ddos-attacks
https://isc.sans.edu/forums/diary/NTP+reflection+attack/17300

And then start making sure UDP/123 is blocked in your lo0 firewall 
filters.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] ddos-protection

2013-07-11 Thread Richard A Steenbergen
Does anyone have any good documentation on exactly what types of packets 
match each of the ddos-protection protocols out there? 

For example, I was just helping someone who was getting a flood of 
sample:pfe hits on an MX, and I noticed the documentation says exactly 
nothing about it:

http://www.juniper.net/techpubs/en_US/junos/topics/reference/command-summary/show-ddos-protocols.html

sample - The following sample packet types are available:
   pfe - Packet Forwarding Engine packets.

Now for this particular one it wasn't too hard to figure out that they 
meant excessive sampled packets being punted from the pfe to the RE, in 
this case from a firewall then log action. But, that's probably not 
even close to obvious to the vast majority of people, and there are a 
lot of other matches in here that aren't terribly self-explanitory 
either. It also seems like there should be some overview documentation 
explaining what the default rate-limits are for each type, but I'm not 
finding it.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] ISSU timeouts on MX upgrades due to large routing tables?

2013-05-22 Thread Richard A Steenbergen
On Tue, May 21, 2013 at 09:01:57PM -0400, Clarke Morledge wrote:
 I was curious to know if anyone has run into any issues with large 
 routing tables on an MX causing ISSU upgrades to fail?
 
 On several occasions, I have been able to successfully do an 
 In-Software-Service-Upgrade (ISSU) in a lab environment but then it 
 fails to work in production.
 
 I find it difficult to replicate the issue in a lab, since in 
 production I am dealing with lots of routes as compared to a small 
 lab.  Does anyone have any experience when the backup RE gets its new 
 software, then reboots, but since it takes a long time to populate the 
 routing kernel database on the newly upgraded RE that it appears to 
 timeout?
 
 I have seen behavior like this with upgrades moving from 10.x to a 
 newer 10.y and from 10.x to 11.y.

We had that issue for many years. There is a hard-coded timeout in the 
NSR process which is very easy to hit if you have a box with a large 
number of routes.

We had a case open on it for about 1.5 years, but Juniper refused to 
actually fix it (it works fine in the lab), and eventually we just 
gave us and declared ISSU to be dead. There are way too many other bugs 
with it anyways, even turning on NSR caused nothing but problems.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Best route reflector platform

2013-04-24 Thread Richard A Steenbergen
On Sun, Apr 21, 2013 at 02:47:58PM +0400, Pavel Lunin wrote:
 2. Branch SRX do not support more than 2G of RAM. Moreover about 700M+ is
 preallocated for flow session table and it is not released even when you
 switch the box into packed mode (well, at least used to be last time I
 checked a year or so ago). Plus JUNOS itself. In practice you have just
 about ~700M of free control plane memory on SRX650.

A decent amount of memory is required for RR purposes too. We're pretty 
much to the point that if its not running 64-bit JUNOS (which actualley 
only bumps the max rpd memory from 2GB to 3GB, so it's not that big an 
improvement :P) it either won't work at all, or won't survive for very 
long. And that's after taking a lot of steps to reduce core IBGP mesh 
route load. I haven't touched any of the virtual SRX stuff, does it 
run 64-bit JUNOS?

In fairness I really don't think there is a big market for dedicated 
RR's, so I'm sure it isn't on the top of anyone's radar. That said, it 
is an absurdly easy problem to solve, with almost no work required (ship 
JUNOS on 1U PC and call it JCS100). So besides greatly pissing off many 
of its largest customers, they're leaving money on the floor and forcing 
people into other solutions with other vendors. I really can't imagine 
that the benefit of selling an extra MX240 chassis, even if sold at 
regular price, is worth the money being lost from everyone else.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Best route reflector platform

2013-04-17 Thread Richard A Steenbergen
On Tue, Apr 16, 2013 at 09:26:29AM +1000, Craig Askings wrote:
 
 I'd love to see Juniper take the xre200, slap some extra ram into it 
 and call it their route reflector platform.
 
 It would be a reasonable compromise between using generic compute and 
 Juniper getting $$$ for selling you some tin.

I begged them to do this right when that box first came out, but there 
were no takers. They cripple it in software so the XRE can't be made to 
run rpd stand-alone and act as a route reflector.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] interface-transmit-statistics

2013-02-23 Thread Richard A Steenbergen
I was skimming through some release notes and noticed the following new 
feature, which was supposedly added in 12.3 and 11.4R3 (new features in 
an R3 release? *cough*):

http://www.juniper.net/techpubs/en_US/junos12.3/topics/concept/interface-transmit-statistics-reporting-improvements-overview.html
http://www.juniper.net/techpubs/en_US/junos/topics/reference/configuration-statement/interface-transmit-statistics-edit-interfaces.html

The description on this is pretty vague, but it SOUNDS like this might 
compensate for the long-standing issue where the L2 overhead on packets 
don't get reported in the SNMP counters on Juniper hardware, in 
violation of the spec and opposition to how every other vendor does it. 
Actually it doesn't sound like this at all (did I mention this 
description is ridiculously vague and poorly written), but that's a 
pretty serious long-standing issue that I'd LOVE to see get addressed, 
and the only one I can think of related to transmit statistics, so I'm 
hopeful that this is what it fixes. If anybody has any further details, 
it'd be much appreciated. :)

That said, what hardware is it actually supported on? The release notes 
just say MX, but when I try it on MPC-16XGE or MPC2 interfaces on a 
box running 11.4R6 it says:

dcd[1550]: %DAEMON-3: Interface-Transmit-Statistics Knob not supported 
on this hardware. Will have no effect.

And a more interesting question, would this also affect the packet 
counters reported to MPLS LSPs when doing auto-bandwidth calculations? 
This issue causes one of the biggest problems with auto-bandwidth on 
Juniper, the lack of L2 overhead in the counters makes it possible for 
high-pps traffic like a DoS attack to be completely invisible to RSVP, 
causing uncompensated for congestion.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] MQ-chip bandwidth drops

2013-01-25 Thread Richard A Steenbergen
Does anybody know how an MX (Trio) hitting MQ-Chip memory bandwidth 
limitations will report the drops? I've got a couple of boxes reporting 
fabric drops in show pfe statistics traffic and show class-of-service 
fabric statistics (though of course the two numbers aren't even close 
to the same :P), but there aren't any corrosponding drops on the mqchip 
fi counters or show chassis fabric statistics, plus none of them are 
MX960 + 16-port MPC so they should be getting full fabric capacity 
anyways. Does an MQ drop count as a fabric drop maybe?

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Question about Routing Engine Redundancy on MX

2013-01-09 Thread Richard A Steenbergen
On Wed, Jan 09, 2013 at 12:39:05PM -0600, Jose Sanchez wrote:
 Hello,
 
 Does anybody know if the RE Redundancy in Juniper MX Routers requires that
 both RE are the same hardware or it is enough that the REs has the same
 JUNOS Version?

As long as they're reasonably similar it should work fine. For MX that 
pretty much means RE-2000 and RE-1300, you have no hope in hell of 
mismatching the new ones (RE-1800x2/4, which require 64-bit JUNOS) with 
the old ones. For some definition of work of course (for all of the 
active redundancy), where in my experience the answer is it doesn't. 
:)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Question about Routing Engine Redundancy on MX

2013-01-09 Thread Richard A Steenbergen
On Wed, Jan 09, 2013 at 03:43:04PM -0500, Paul Stewart wrote:
 Thanks RAS.. that's interesting as we've never actually tried that...
 
 Have you tried this in a production environment or would you?  Do we 
 have any idea on whether or not JTAC would support this configuration 
 officially?
 
 I realize these are loaded questions - just really curious on this 
 topic as it opens up some new possibilities for us in some 
 deployments...  Our SE basically told us to run from this idea 
 previously...

The difference between an RE-2000 and an RE-1300 is pretty minimal. Yeah 
it's a slightly slower CPU, and maybe it has less RAM, but the 
architecture itself is still basically the same. If you configure NSR 
you'll be passing a lot of internal state in raw form back and forth, so 
you have no hope of making it work between completely different 
architectures like the REs which run JUNOS 64, but technically speaking 
there is nothing that would prevent something like RE-1300 and RE-2000 
from talking and working.

Personally I wouldn't run any of it in production, after having been 
bitten by way too many extremely severe bugs in NSR/GRES over the last 
many years. I've probably suffered 1000x more operational impact from 
NSR related bugs than I've EVER saved from NSR working correctly, and 
don't even get me started on the massive design flaws of GRES. At this 
point you're MUCH more likely to make your router work correctly if you 
turn on as few knobs as possible, and NSR is a pretty darn complex thing 
to actually make work correctly.

Plus, I don't think I've actually had NSR work correctly in about 4-5 
years now. There are hard-coded time-outs during the NSR sync process 
after the backup RE reboots, and if your network is big enough that you 
carry some decent number of BGP paths it will take so long to sync that 
this will time out and fail the entire process. I once had a case open 
about this issue, but after about 1.5 years of being unable to explain 
it to the idiot in JTAC I just gave up. I checked several years later, 
and it was still broken in exactly the same way, so I'm going to guess 
that no other large network dares to run NSR either. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDOS and MX-240's

2013-01-08 Thread Richard A Steenbergen
On Mon, Jan 07, 2013 at 08:10:45PM -0800, Eric Cables wrote:
 It's interesting that Flowspec was one of the presentations at the Bay Area
 Juniper User's Group in October, and heavily used by CloudFlare.
 
 http://www.slideshare.net/junipernetworks/flowspec-bay-area-juniper-user-group-bajug

I did warn Terry about this issue before he gave that presentation, but 
note that their performance requirements are MUCH lower than mine. The 
graphs in this presentation show 100-1000Mbps attacks and 45kpps 
attacks, which doesn't require much in the way of router resources. Line 
rate for a 10GE is 14.88Mpps, and when you suddenly can't do more than 
4Mpps per port because of a couple dozen flowspec rules, I consider this 
a BIG problem. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DDOS and MX-240's

2013-01-07 Thread Richard A Steenbergen
On Mon, Jan 07, 2013 at 05:41:06AM +, Dobbins, Roland wrote:
 
 On Jan 6, 2013, at 11:14 PM, Richard Gross wrote:
 
  I am seeking advise.  If you wanted to block 800K /32's from your inbound 
  pipes, how would you do it?
 
 You don't need nor want to do this.  Flowspec and S/RTBH are very 
 useful tools for blocking, as Chris indicated, but nobody needs to 
 block 800K /32s.

http://mailman.nanog.org/pipermail/nanog/2011-January/030051.html

Still has the same issue. Juniper has basically let Flowspec bit-rot 
into complete uselessness since Pedro left.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] VPLS issues

2012-11-30 Thread Richard A Steenbergen
Does anybody have any experience with forced LSP path selection for VPLS 
circuits? Long story short, when we fire up traffic on one particular 
VPLS instance, we're seeing SOME of the traffic it's carrying being 
blackholed. The pattern is one of certain IP or even TCP port pairs 
being blocked, and it seems to rotate over time, which screams hashing 
across multiple LSPs where one of them is doing something bad, and it 
changes as the LSPs resignal over time to me. To try and lock this 
down, I'm trying to force the VPLS traffic to route over a single LSP, 
in the usual manner with a forwarding-table export policy, and a very 
simple extended community regexp against the vrf-target community.

term VPLS {
from community MATCH_VPLS;
then {
install-nexthop lsp-regex .*-SILVER.*;
load-balance per-packet;
accept;
}
}

But it sure as hell doesn't look like it's narrowing the LSP selection:

ras@re0.router show route forwarding-table family vpls table blah
Routing table: blah.vpls
VPLS:
DestinationType RtRef Next hop   Type Index NhRef Netif
...
00:xx:xx:xx:xx:xx/48 user 0  indr 1050634 5
 idxd  3223 2
   idx:1  xx.xx.142.132 Push 262153, Push 655412(top)  
4543 1 xe-7/3/0.0
   idx:1  xx.xx.142.62  Push 262153, Push 752660, Push 
691439(top)  1315 1 xe-4/1/0.0
   idx:2  xx.xx.142.132 Push 262153, Push 758372(top)  
1923 1 xe-7/3/0.0
   idx:2  xx.xx.142.62  Push 262153, Push 382341, Push 
691439(top)  2541 1 xe-4/1/0.0
   idx:3  xx.xx.142.132 Push 262153, Push 758372(top)  
1923 1 xe-7/3/0.0
   idx:3  xx.xx.142.62  Push 262153, Push 382341, Push 
691439(top)  2541 1 xe-4/1/0.0
   idx:4  xx.xx.142.30  Push 262153, Push 714676(top)  
1500 1 xe-4/1/1.0
   idx:4  xx.xx.142.62  Push 262153, Push 619458, Push 
378636(top)  3864 1 xe-4/1/0.0
   idx:xx xx.xx.142.82  Push 262153, Push 601828(top)   
989 1 xe-5/0/0.0
   idx:xx xx.xx.142.132 Push 262153, Push 684644(top)  
3516 1 xe-7/3/0.0
   idx:xx xx.xx.142.62  Push 262153, Push 528898, Push 
760875(top)  4766 1 xe-4/1/0.0
   idx:xx xx.xx.142.62  Push 262153, Push 792036, Push 
691439(top)  3473 1 xe-4/1/0.0

Any ideas, about this or about troubleshooting the forwarding plane for 
VPLS in general? Other than that VPLS just sucks... :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] How reliable is EX multichassis? 3300 and 8200 switches

2012-10-26 Thread Richard A Steenbergen
On Fri, Oct 26, 2012 at 07:44:27PM -0200, Giuliano Medalha wrote:
 Morgan,
 
 I really dont know why JUNIPER did this kind of crazy environment with 
 EX8200.
 
 Considering the MX family (240, 480 and 960 with TRIO 3D) and the new 
 MX-L I think you do not need the external routing engines for virtual 
 chassis.

An external routing engine is actually a really good idea, you should 
ask them to do it more, not less. There is absolutely no reason the RE 
needs to be in the chassis, all it does it drive up the cost and slow 
down upgrade cycles. When was the last time you saw a several year old 
off the shelf PC that cost $32k?

In the EX's case, the EX8200 is vastly underprovisioned on the stock RE 
(one of the worst design decisions of all times), so it REALLY benefits 
from an external RE. I never actually tried it in production though, so 
no comments about the reliability (IMHO multi-chassis boxes are for 
people who can't figure out routing protocols, I'd personally rather 
have two independant control-planes instead).

I'm still sad that I couldn't get Juniper to bless the XRE200 as an 
external route reflector, since it's an infinitely more useful form 
factor than a JCS, but alas lack of common sense knows no bounds. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Krt queue issues

2012-10-01 Thread Richard A Steenbergen
On Mon, Oct 01, 2012 at 03:15:39PM +0300, Saku Ytti wrote:
 
 JunOS is exceedingly poorly performing platform in control-plane, 
 especially with PPC control-plane. 200 neighbours on MX80 does not sound 
 like a good idea right now. You probably should have gone with bigger MX 
 where you'd get XEON.
 
 MX80 has faster CPU than RSP720, but RSP720 runs circles around MX80 :/ 

Indeed. For extra fun, try watching your show route forwarding-table 
summary after you reboot, and see how long it takes for your router to 
actually get a full table installed. The more BGP load you have on the 
device, the more you'll see that it totally stalls the installation of 
routes into the FIB. At this point I can't describe it as anything less 
than a major architectural flaw which Juniper is completely powerless to 
fix.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] mx-class units now advertisement management interface networks in BGP

2012-09-29 Thread Richard A Steenbergen
On Thu, Sep 27, 2012 at 08:28:46PM -0400, Jeff Wheeler wrote:
 On Thu, Sep 27, 2012 at 1:49 PM, Jo Rhett jrh...@netconsonance.com wrote:
  I don't know when Juniper broke this
 
 Hey, Jo, I remember Junos working like this since forever.  I'm 100%
 sure it has worked like this since way before MX80 existed.

I dunno what he's complaining about, JTAC solved the issue in less than a 
year, so he's already ahead of the curve. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] route BGP stall bug

2012-07-18 Thread Richard A Steenbergen
On Wed, Jul 18, 2012 at 12:03:39AM +0200, Tim Vollebregt wrote:
 Hi All,
 
 This morning during a maintenance I experienced the route stall bug 
 Richard mentioned a few times already on j-nsp.
 
 Hardware kit:
 -MX480 with SCB (non-e)
 -2 x RE-S-1800x4
 -4 x MPC 3D 16x 10GE
 Software version: 10.4R8.5
 During this maintenance I was placing 2 new routing engines into the 
 router, replacing the 'old' RE-S-2000. This router is pushing a lot of 
 traffic and receiving 14 x full BGP tables from eBGP peers/1 RR 
 session to it's 'mate'/several iBGP peers with partial tables

Rest assured this issue is still alive and well in every piece of code 
I've ever looked at. I've basically just given up and accepted that 
Juniper can't actually handle a large number of routes, and nobody seems 
capable of fixing it. EX's are especially bad, I can't get a full fib 
installed from a reboot in anything less than an hour, even if I turn 
off most of the BGP sessions so it converges faster. Either stop 
carrying so many routes (14x full tables = you're screwed), or go buy a 
Cisco. :(

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Update on 10.4R9 stability for MX?

2012-05-21 Thread Richard A Steenbergen
On Mon, May 21, 2012 at 03:43:33PM +0200, Mark Tinka wrote:
 On Thursday, May 10, 2012 01:59:55 AM Richard A Steenbergen 
 
  There is a serious issue with MPLS RSVP auto-bandwidth in
  10.4R9, which can cause the reservation calculations to
  be off by quite a bit. The least broken code we've found
  so far is 10.4S9, I'm surprised they haven't done an R10
  yet.
 
 As far back as I can remember, Richard, you've pretty much 
 had this particular issue with almost every major train 
 Juniper have released :-).

I wish it was a single issue, at least then I would have one definite 
thing to bitch about. It's more like a dozen different issues affecting 
the same subsystem, in a dozen different versions of code, over the last 
couple of years. You could say the same thing about SNMP, it's been 
broken about as many times over about as many different revisions 
(including recent ones :/).

10.4S9 does seem to have solved this latest issue, which was causing 
wildly inaccurate reservations. It's almost comical when RSVP tries to 
reserve a several petabit LSP (not much to do with recent JUNOS except 
laugh at this point, right? :P), but it's a lot less funny when nearly 
empty high-priority LSPs get mis-calculated to several gigabits and 
start causing incorrect preemptions...

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] JUNOS downloads

2012-05-21 Thread Richard A Steenbergen
Has anybody else noticed that the old software download page isn't 
getting updated at the same time as the new one? For example, 11.4R3 
came out 3 days ago, but it isn't listed on the old software page at 
all. The new and improved system also appears to require javascript to 
work properly, for example the proceed button at the bottom of the 
EULA acceptance is non-functional in lynx or elinks if you're trying to 
download your JUNOS images via a unix shell.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Update on 10.4R9 stability for MX?

2012-05-09 Thread Richard A Steenbergen
On Wed, May 09, 2012 at 03:13:26PM -0400, Clarke Morledge wrote:
 It has been a couple of months since the JTAC recommended Junos 
 software versions has been updated for the MX.  As of February, the 
 recommendation was to use 10.4R8.5 for the MX, except that there is an 
 issue related to BFD configurations on the DPC line cards.  
 Supposedly, the fix is in 10.4R9.
 
 In looking at the release notes, there are some issues that have been 
 resolved in the 11.x series but nothing noted yet for any future 
 10.4.x releases.  Perhaps there are future 10.4.x versions planned to 
 carry forward these fixes?
 
 I am curious to know about anyone's experience with 10.4R9 over the 
 past few months.  I have DPC only currently; i.e. no MPC hardware -- 
 and no MultiServices.

There is a serious issue with MPLS RSVP auto-bandwidth in 10.4R9, which 
can cause the reservation calculations to be off by quite a bit. The 
least broken code we've found so far is 10.4S9, I'm surprised they 
haven't done an R10 yet.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Woot. Updated MX software recommendation

2012-04-11 Thread Richard A Steenbergen
On Wed, Apr 11, 2012 at 01:19:01PM -0400, Chris Morrow wrote:
 
 counting is hard... let's go shopping?? wtf?

Yeah, it's not like we need to bill customers with these routers or 
anything. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JNCIP-SP latest dumps

2012-03-30 Thread Richard A Steenbergen
On Fri, Mar 30, 2012 at 11:59:35PM +1100, Skeeve Stevens wrote:
 
 I would like to see exams include man pages, or at least an approved 
 reference book that would let you look up obscure crap you almost 
 never need to know off the top of your head.

The labs actually do include full access to the documentation, since 
memorization of obscure commands isn't really the goal of the test. The 
prometric exams are a bit more limited of course, due to the shared 
testing environment, but they're a lot simpler too. FWIW I personally 
think the new -SP exams are complete and utter crap compared to the 
classic -M exams, or at least the JNCIP-SP that I took to renew my JNCIE 
was at any rate... They're far more Cisco-like these days, full of 
totally useless questions, poor grammar, and ambiguous or even flat out 
incorrect answers, so plan accordingly. :(

 Binary-Hex-Decimal math... bullshit, I can't believe we're not 
 able to use even a calculator these days... even highschool exams 
 allow calculators!

I don't remember any of this on any Juniper exams I've ever taken, but 
if you can't do simple binary-hex-decimal math you have bigger 
problems. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 100Base-LX10 and MX80

2012-03-04 Thread Richard A Steenbergen
On Wed, Feb 29, 2012 at 02:35:09PM +0100, ??ukasz Dudzi??ski wrote:
 
 I did it already. The topic you have mentioned does not cover the 
 essence of my question. I've asked for that specific SFP 
 (100Base-LX10), not for using third party optics at all. The problem 
 is that I don't know if it is possible to use 100Base-LX10 optics in 
 MX80, because Juniper documentation does not mention about 
 100Base-LX10 SFP. There is a note regarding 100Base-FX (FE on MMF), 
 but no 100Base-LX10 (FE on SMF).

Generally speaking, the answer is unless the pluggable requires some 
special handling from the router above and beyond what is considered 
'normal' relative to the other pluggables, it WILL work regardless of 
whether or not it is officially supported.

So far the only two examples I've found of the above are copper vs fiber 
(copper sometimes requires special handling to do things like detect 
link state properly), and 100 vs 1000. The LX10 part is irrelevent, if 
it was a 1000BASE optic you could throw in 1km or 100km and the router 
wouldn't know the difference, but you're on shaky ground with the 100 
support. You also run into questions about whether 100 is even supported 
at all, since there are different ways to implement the PHY, one with 
10/100/1000 support, and another with 1000-only.

My personal recollection is that MX back in the DPC days only supported 
1000. I could probably go dust off some documentation on the internals 
of the MX80 and tell you whether the PHY for the modular version 
supports 10/100/1000 for the SFPs or not (its a slightly different hw 
layout for modular vs non-modular, obviously the non-modular does 
because its 10/100/1000 copper), but its late and lets be honest I 
really don't care that much. :) I'm sure someone else will do it now 
that I've taunted them though (I can think of at least 5 or 6 usual 
suspects who probably know this off the top of their head :P), so just 
consider the above as generic advice for when this question comes up 
again in the future. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Firewall filter using a prefix-list, not updating

2012-03-04 Thread Richard A Steenbergen
On Sun, Mar 04, 2012 at 04:45:04PM -, David Gee wrote:
 
 If I create a relatively simple filter such as the one below, and 
 attach it as an output filter on a vlan interface, it works as per the 
 prefix-list it references. However, if I update the prefix-list, like 
 add an additional /32, the firewall filter does not permit it. If I 
 remove and re-apply the filter, it has no effect on the new addition 
 to the prefix-list (even though the prefix shows up in the 
 prefix-list). To force the new prefix to become active, I have had to 
 re-apply the firewall filter statement that references the prefix-list 
 (i.e. delete it, and re-apply it). Is this normal?

Depends on your definition of normal. I run into firewall bugs like 
this all the time these days (probably on my 6th one in the last 2 
years). When in doubt, remove the filter and re-apply, this causes a 
data structure rebuild on the hw and makes the badness go away. And just 
consider yourself lucky that it doesn't cause the FPCs to crash when you 
reorder firewall terms like on EX8200 running 11.1R5. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Sources for SFP+ optics

2012-02-23 Thread Richard A Steenbergen
On Fri, Feb 24, 2012 at 12:06:03AM +0200, Saku Ytti wrote:
 On (2012-02-23 16:53 -0500), Brandon Ross wrote:
  
  I have no idea how they do it, but I can tell you for certain that
  I've been able to source DWDM optics for my clients within a week
  every single time.  And yes, I'm referring to specific colors.
 
 Sure you can source them, by querying multiple sources. But no one 
 carries stock of everything, you simply cannot offload them at profit 
 then, unless your customers are ready to pay high premium.

Good/cheap DWDM optics are, generally speaking, in universally short 
supply. Production has barely been staying ahead of demand for quite 
some time now, hence the 7-8 week lead times from manufacturers. Agreed, 
you might get lucky and find someone who happens to have the color and 
optic type you're looking for on occasion, but there is nobody who is in 
a position to maintain an inventory of everything and still sell them 
at close to wholesale prices. There just isn't any money in it, which 
is why everyone who cares self-spares (often with the help of tuneables 
as universal donors) .

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SCB-E

2012-02-08 Thread Richard A Steenbergen
On Wed, Feb 08, 2012 at 07:44:10AM +0100, Daniel Roesen wrote:
 
 So as far as things stand, SCB-E not deployable before mid 2012 
 earliest if (and that's a big if when looking at 10.4 experience) 
 11.4R3 is going to be usable.

Given the state of the code and the lack of faith/experience in 11.4 
(i.e. I don't know any sane companies with an interesting network 
running 11.4 right now, and thus I have zero faith that it has been well 
tested), maybe the correct answer is to backport some kind of SCB-E 
support to the 10.4 train. Then again, considering that they are STILL 
introducing new showstopper bugs in a bugfix-only code train even at 
10.4R8, maybe this is a bad idea.

I really don't know what else to say about this issue, other than:

*SIGH*

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QFX3500 optics lock?

2012-01-09 Thread Richard A Steenbergen
On Fri, Jan 06, 2012 at 09:34:35PM -0500, Chuck Anderson wrote:
 Like I said, that is nuts.  I will NEVER buy the QFX then as long as
 this vendor arrogance exists.  And don't give me this but we
 haven't tested it with every possible SFP+ vendor so we can't allow
 you to use any vendor crap.

FWIW they've actually had serious problems interoperating correctly with 
copper SFPs from other vendors, on EX and MX. There are still unsolved 
issues with ports showing link state up despite nothing being plugged 
in. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QFX3500 optics lock?

2012-01-09 Thread Richard A Steenbergen
On Sat, Jan 07, 2012 at 11:45:40AM +, Phil Mayers wrote:
 Oh for the love of...
 
 In terms of practical what now ideas, have you tried to source a 
 Juniper compatible SFP+ i.e. someone has blown the string into the 
 EEPROM? Or maybe investigate FlexOptix' flexBox?

FWIW eoptolink's stock SFP+'s seem to not set off the NON-JNPR flag in 
EX without any additional hackery required, though I have no clue at all 
if they'd work properly in a QFX.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QFX3500 optics lock?

2012-01-09 Thread Richard A Steenbergen
On Sun, Jan 08, 2012 at 02:27:44PM +1100, Julien Goodwin wrote:
 
 Nobody is asking Juniper to *support* third party optics, they never 
 have before. All we want is, that like all other Juniper products to 
 date (that I'm aware of) that third party optics work, and have 
 feature parity.

Be careful what you ask for... We've seen many issues with the support 
for third party optics, for example we still have ongoing issues with 
Cisco copper SFPs which show link up despite nothing being plugged in 
when used in an MX80... It's not as bad as a blatant lock, but if they 
don't have to support it they don't need to fix it either. :)

The better way to say it is, we aren't going to call you and make you 
fix it if it's just one broken optic doing something bad, but we still 
expect you to make every reasonable effort to make your product work 
correctly with other standards compliant components.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QFX3500 optics lock?

2012-01-09 Thread Richard A Steenbergen
On Sun, Jan 08, 2012 at 12:11:19PM +, Phil Mayers wrote:
 However - crappy though they were, imagine my irritation when, even 
 with service unsupported-transceiver, a duplicate SFP serial number 
 caused err-disable on BOTH ports, and requires BOTH transceivers to be 
 removed.
 
 It's not obvious to me that this is a reasonable response; the 1st 
 transceiver was in, and forwarding packets. Why disable it? What 
 possible value does that add?

Actually, this one I get... They're trying to detect and block a 
counterfeit product that says Cisco on it, and which as you said, was 
introduced into the supply chain without your knowledge that it was an 
inferior fake (and maybe even without your VARs knowledge too). This is 
COMPLETELY different from artificially disabling a third party's 
product.

Of course, if they weren't so busy trying to do the later there wouldn't 
be nearly as much demand for people doing the former, but they're still 
probably justified in blocking the duplicate serial #'s of Cisco 
products.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QFX3500 optics lock?

2012-01-09 Thread Richard A Steenbergen
On Mon, Jan 09, 2012 at 11:37:03PM +, Phil Mayers wrote:
 
 I am not trying to compare this to vendor locking. They are indeed 
 completely different, and I merely cite it as illustration of one other 
 position on the spectrum of transceiver permissiveness.
 
 I will grant that denying the new optic is understandable. But 
 shutting down an existing link is deeply unhelpful (as well as TOTALLY 
 NON-OBVIOUS to the person inserting the optics).
 
 For starters - what if the existing link is a Genuine Cisco(tm) SFP? 
 Then the forged SFP not only doesn't work (fine) but stops a valid SFP 
 from working (not fine). Unlikely I will admit, but not impossible.
 
 I will also add that I have no evidence this duplicate checking is 
 limited to transceivers matching CISCO* in the EEPROM; for all I know, 
 it does it for any transceiver...

In theory the way it's supposed to work is that a cryptographically 
verifiable code based on the serial number (probably some sort of hash, 
but no clue what they actually use) is written to the EEPROM. That way, 
Cisco can give the actual manufacturers a list of SN's and codes equal 
to the number of units they're purchasing, to prevent the classic 
counterfeiting problem of the factory in China running during the day 
for the customer and at night for themselves.

But even without defeating the hash, they can always just clone the 
serial number from a known good one... Of course in theory there should 
never be two identical serial numbers, so when they do show up in the 
same chassis you should be guaranteed that they're both counterfeit. 
Of course, I'm sure mistakes do happen from time to time, and you could 
make the argument that it's bad to affect production customer traffic if 
the customer didn't know, but there is at least some logic behind it.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Junos 11.2R4.3 on MX

2011-12-24 Thread Richard A Steenbergen
On Sat, Dec 24, 2011 at 09:27:55PM +0800, Mark Tinka wrote:
 On Friday, December 23, 2011 07:51:45 PM Sebastian Wiesinger 
 wrote:
 
  Oh and to fix it you have to reset the VPLS BGP sessions.
  Changing the config back does not help.
 
 That's a nasty bug.

So, just another day using JUNOS then? :)

It would almost be funny, if it wasn't so tragic.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DA rejects

2011-12-18 Thread Richard A Steenbergen
On Sat, Dec 17, 2011 at 08:11:39AM -0500, Paul Stewart wrote:
 
 It has magically started working again for the customer, which is 
 quite strange.  Again, very confident this is a CPE issue but wanted 
 to ensure I understood how JunOS will look at ARP output like above 
 (make sure there is no confusion) :)

Erm, did you move the customer to a new endpoint on your side? If so, 
you were probably receiving DA Rejects because they had your old router 
MAC address stuck in their arp cache, and it magically fixed itself 
when their ARP cache timed out and it re-learned the gateway mac.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DA rejects

2011-12-18 Thread Richard A Steenbergen
On Thu, Dec 15, 2011 at 02:11:18PM -0500, randy.tay...@bell.ca wrote:
 I have seen this before facing Cisco device running CDP.  Maybe you 
 have something that is running on your box that it does not 
 understand.

DA Rejects are when your router receive receives a packet that is 
destined for a MAC address that isn't it... This is normal/expected 
behavior in small doses, since even on a switched network the unknown 
unicast flooding stage of MAC learning will result in a few packets 
being sent to ports that weren't actually the correct destinations. If 
the router was an ordinary host these would be the type of packets you 
would need to turn on promiscuous mode to see.

This is not to be confused with L3 Incompletes, which is what you're 
probably thinking about re: CDP. This simply means a packet without a L3 
header that the router doesn't know what to do with (since the Juniper 
device doesn't speak CDP), and thus discards.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Difference MX DPC-R / DPCE-R

2011-12-14 Thread Richard A Steenbergen
On Mon, Dec 12, 2011 at 05:05:20PM +0100, Nicolaj Kamensek wrote:
 Hello list,
 
 can anyone name the major differences between those modules? DPC are 
 becoming available in the used market for small money and I am wondering 
 if a DPC non-E is good enough for a classical access router environment 
 with 30.000+ ARP entries and a growing number of IPv6 neighbours but 
 nothing fancy overall.
 Since it's hard to find any facts about this:
 
 - does it matter memory-wise if the requirements above are applied to 
 just one routed port or to multiple switched/routed ports?
 - do bundled links still double the amount of memory required?

Well since nobody has answered this one correctly I guess I'll do it... 
The only difference between DPC and DPCE is the size of the microcode on 
the EZChip ASIC used for L2 framing (1.5KB vs 6KB instruction space). 

Almost no features require the larger microcode space, so you should be 
pretty safe... When the DPCs first came out, almost nothing used the 
EZChips at all, and even over the last couple years the only thing I've 
seen that doesn't like running on the Rev A's is PBB (Provider Backbone 
Bridging). Maybe you can get someone from Juniper to provide a more 
extensive list, but it's pretty safe to assume that nothing about the 
config you mentioned above will be impacted by DPC non-E's at all.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] traffic drops to 8 Gb/s when a firewall filter is applied

2011-12-14 Thread Richard A Steenbergen
On Fri, Dec 09, 2011 at 01:19:54PM -0500, Keegan Holley wrote:
 Yea but it should have enough silicon to do simple policing in 
 hardware unless you have every single other feature on the box 
 enabled. If a policer with no queueing, and no marking etc, caused 
 throughput to decrease by 20% across the board I'd inquire about their 
 return policy.  Hopefully, it's the policer config.  Most of my 10G 
 interfaces do not require policers, but I've got 1G interfaces with 
 hundreds of logicals each with a unique policer. 

Unfortunately not... There are all kinds of ways to make I-chip cards 
not deliever line rate performance even with relatively simple firewall 
rules, and it's very poorly logged when this does happen. Admittedly 
I've never seen a simple then accept push it over the edge, but maybe 
it was RIGHT on the edge before... Try looking for some discards, such 
as WAN_DROP_CNTR, on the *INGRESS* interface (i.e. not the one where you 
added the egress filter). For xe-x/y/0 do:

start shell pfe network fpcx
show ichip y iif stat

example:

  Traffic stats:
 Counter NameTotal   Rate  Peak Rate
   --  -- --
   GFAB_BCNTR 4229125816477883 949530 1276098290
 KA_PCNTR0  0  0
 KA_BCNTR0  0  0
  Discard counters:
 Counter NameTotal   Rate  Peak Rate
   --  -- --
WAN_DROP_CNTR  298  0 82
FAB_DROP_CNTR 1511  0419
 KA_DROP_CNTR0  0  0
   HOST_DROP_CNTR0  0  0

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Resource Temporarily Unavailable - Juniper MX

2011-12-14 Thread Richard A Steenbergen
On Mon, Dec 05, 2011 at 07:48:22AM -0500, Paul Stewart wrote:
 Can anyone shed some light on these log messages?
 
 Nov 30 04:48:21  core2.toronto1 rpd[1359]: bgp_send: sending 19 bytes to
 xx.xxx.52.50 (External AS x) blocked (no spooling requested): Resource
 temporarily unavailable

 grep Resource temporar /usr/include/errno.h
#define EAGAIN  35  /* Resource temporarily unavailable */

 man 2 send
...

 [EAGAIN]   The socket is marked non-blocking and the requested
operation would block.

It's just a socket message saying it can't write the data it wants to 
write into that particular TCP session... This COULD potentially 
indicate a problem, such as congestion or errors, but it can also just 
be a quick dump of data filling up the socket buffer before the other 
side can read it. 99% odds are this is cosmetic. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Summarize Global Table

2011-10-25 Thread Richard A Steenbergen
On Tue, Oct 25, 2011 at 06:45:27PM +0100, Phil Mayers wrote:
 
 This (aggregate routes on next-hop) comes up now and again, and the 
 idea seems to be controversial for some people. Various criticisms are 
 cited - unpredictability (a single route change could result in a 
 large jump in FIB use), performance implications, and fairly limited 
 improvement (the thread cited below reckons 30% mean, 10% worst case, 
 45% best case, depending on connectivity topology)

Foundry did dynamic FIB aggregation using a covering default route to 
remove more specifics 10-some years ago, back when they had routers 
with only enough CAM for 8k or 16k FIB entries (ye olde Ironcore days). 
It actually worked pretty darn well, and the improvement IS significant 
in my experience (anyone who claims otherwise is full of shit or not 
being realistic in their modeling). It's also pretty straightforward to 
implement, I could prototype the code for it in a few minutes.

The only REAL objections seem to be:

a) The benefits are very non-deterministic, and customers may/will be 
confused if they make one covering route change and it causes thousands 
of FIB entries to be created or destroyed as a result. Nobody likes 
confusing customers more than is necessary, especially when your support 
organization is as disasterously broken as JTAC.

b) It's not entirely impossible that doing this won't cause breakage in 
some unanticipated way. For example, say someone rapidly flaps a 
covering route, which causes a lot of FIB churn. There are a lot of 
potential implementations for performance, interaction with the krt, 
etc. Somebody has to actually take the time to model and test this to 
make sure it doesn't cause something to break/crash/blackhole/etc in 
practice. I'm personally not sure it would actually be any worse than 
the hour+ times to install a full FIB that some of these boxes are 
suffering from already, but I can understand why nobody is particularly 
eager to jump in and own this issue if they don't have to do so.

c) Vendors would much rather sell you new cards wih more FIB capacity 
than find a way to implement a free solution in software (big shocker, 
I know). :)

Of course given the EX8200 situation, where they've knowingly sold a 
bunch of cards that can't possibly do what they claimed they could do, 
maybe a horde of pissed off customers will motivate some renewed 
interest in providing some software assistance.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCAM full on EX8200?

2011-10-23 Thread Richard A Steenbergen
On Sun, Oct 23, 2011 at 01:20:28PM +0400, Pavel Lunin wrote:
 TBH, I haven't checked the pricing but I'd expect Brocade MLX
 
 MLX(e) is an edge device and is much like MX in most things. It's 
 cheaper but at a cost of some features lack and few caveats. Although 
 it's a good product, it's not a label-oriented LSR anyway.

The hardware functionality for label switching in MLX/XMR seems to be 
fine (as far as I can tell), it's only the software that is still a 
giant mess. To be honestly they seem to be ok for very simple stuff like 
pseudowires, but last I looked things like rsvp-te were still a complete 
and total mess. Global Crossing recently tried to roll out XMRs as pure 
LSR supercore boxes alongside existing T640s, and a whole bunch of 
blackholing and pissed off customers later they seem to have abandoned 
that project and moved the boxes to L3 edge router roles. As I said, I 
have yet to find ANY vendor other than Cisco/Juniper who ACTUALLY 
understand MPLS well. And even those guys I wonder about sometimes. :)

On Sun, Oct 23, 2011 at 12:24:05PM +0300, Tarko Tikan wrote:

 Same way MX is not ment to be used as LSR, yet everyone does that.

That's because we're not stupid (well, some of us aren't at any rate), 
and we know the difference between what the box is promoted for in 
marketing vs what it can actually do. :)

Foundry on the other hand doesn't appear to have any serious MPLS 
users at all (beyond relatively simple pseudowire/vpls, nothing I would 
classify as serious at any rate).

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCAM full on EX8200?

2011-10-22 Thread Richard A Steenbergen
On Sat, Oct 22, 2011 at 08:19:33PM +0400, Pavel Lunin wrote:
 
 As far as I understand, it's not really correct to compare difficulty 
 of these two operations, since they are performed by two different 
 units inside the chip. While label lookup instead of full IP table can 
 dramatically simplify the lookup unit's life, the unit, which inspects 
 packets and extracts bits from them, must be still quite complex even 
 for label-only router. Hashing ALU's life is not a peace of cake 
 either. Say, EX series PFE use only 6-bit seeds to construct hash on 
 them. In case you want to push a whole 20-bit label to the hash seed, 
 I'm afraid, you'll need more bits in ALU registers, more cycles or 
 something else.

Well, nobody said it was EASY, just EASIER. :)

The point is, just by going from full tables to not-full-tables you can 
start taking advantage of existing commodity chips which CAN do IP and 
some pretty deep hashing already, and move from thousands of dollars per 
10GE and 80-120G/slot (MX/ASR-style) down into hundreds of dollars per 
10GE and 480-640G/slot.

Personally my take is that PTX missed the mark as far as interesting 
target customer size goes. There are still a *LOT* of places where you 
could very easily replace a $1mil core T/CRS box at $retardecarrier with 
a $10-20k 1-2U box that does 64x10GE, or 40GE, etc. But obviously 
Juniper doesn't want to canibalize from their own T (or at worst MX) 
market, which is why only made the PTX product that they did (pick 
between massive or super-$%^ing massive, and at only ~MX-style port 
prices).

Eventually someone will come along and realize that there is an untapped 
market here, and then the promise of cheap label switching routers will 
be fulfilled. IMHO the reasons this hasn't happened yet are a) only 
Cisco/Juniper *REALLY* have a good handle on the software side of MPLS, 
and b) not enough non-carriers are currently running (or even currently 
able to conceptualize running) label-only cores. Of course the large 
carriers with the most to gain also tend to be the least innovative and 
the most unwilling to consider cost when designing their architecture, 
until they go bankrupt of course. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCAM full on EX8200?

2011-10-15 Thread Richard A Steenbergen
On Sat, Oct 15, 2011 at 11:04:37AM +0100, Phil Mayers wrote:
 
 ...whereas because ACLs are variable length, determined by customers 
 and possibly large, performance of a RAM-based ACL algorithm is hard 
 to predict, and people want predictable performance, and usually 
 line-rate performance.

Just wait until you figure out that it's possible to get significantly 
less than line-rate performance out of an I-chip with just a dozen 
relatively simple firewall terms. :(

 Hehe. Tag switching will make core routers really cheap, you'll have 
 a few really big PE routers only. Wasn't that the line we were sold 
 with TDP?

And they totally could be too, if anyone bothered to actually make them. 
You don't even need to spin custom ASICs (one could argue that their 
might not be enough business to justify it anyways), label switching is 
so easy from a hardware perspective that it's not even funny. Everyone 
and their mother is busy churning out Broadcom Trident+ based 64x10G 1U 
boxes right now (see: Juniper QFX, etc), and at a price of a couple 
hundred bucks a 10G even on the high end. Why aren't these boxes making 
great LSRs?

The problem is, the software side of MPLS (i.e. all of the associated 
protocols surrounding it) is so complicated, only Cisco and Juniper have 
figured out how to actually implement it correctly (and that is only 
because they wrote most of it :P). All the hardware in the world doesn't 
help you if you don't have the right software, and C/J shockingly don't 
want to make a $10k box that obsoletes the need for a $1mil T-series. 
This is why OpenFlow has them all running scared. :)

The PTX is the first thing to actually attempt to be a label switching 
router only, but even that one is a) still vaporware, and b) designed to 
be sold to only a handful of super large carriers, and still at fairly 
premium prices. All they're trying to do is keep the T-series business 
unit from losing money to the MX-series business unit (since the MX is 
just as capable of doing everything T does w/MPLS as a core router, but 
at 1/4 the price), they aren't ACTUALLY trying to make a cheaper LSR. :)

If more people used MPLS, and if some competetive vendor could figure 
out how to write all the protocols for it to run on a small/cheap box, 
the core router market could get REALLY interesting.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCAM full on EX8200?

2011-10-15 Thread Richard A Steenbergen
On Sat, Oct 15, 2011 at 02:56:01PM -0400, Jeff Wheeler wrote:
 
 Most customers find that their Juniper boxes still operate at wire 
 rate even when they load up some ugly filters.  On some boxes in some 
 cases, however, that is not true.  But to generalize, M/MX does 
 everything with RAM, provides the operator with more flexibility, but 
 also gives him a little more rope with which to hang himself.

It turns out that on I-chip, a dozen or so relatively simple filter 
terms are enough to exceed maximum number of accesses that give you line 
rate performance. It's especially bad if you try to use filter chains, 
since there is no next filter command, and the next term command 
(which is REQUIRED in every term in order to keep processing things 
further into the chain) is relatively expensive (4 lookups each, and you 
only get ~28 for line rate performance).

Having flowspec routes is another good way to make it angry, since they 
get evaluated on every ingress interface. Even worse, when you DO exceed 
your lookup capacity, the only symptom will be silent packet drops, with 
nothing logged on any interface counter outside of show ichip commands 
in the pfe shell.

We had to kill our filter chains and use commit script built non-chain 
filters to implement chain-like logic (i.e. re-use of common filter 
config components), it was the only way to do it without killing the 
box.


 I doubt Juniper has ignored the possibility of grafting some CAM onto 
 their router boxes for certain operations, but when you already have 
 the ALU+RAM method RD'd and you can simply scale it up a little bit, 
 this is probably more sensible than adding a power-hungry CAM and all 
 the guts necessary to interface to it, and then do more RD to have 
 the control-plane figure out how to take advantage of it, and *then* 
 still live with the fact that Juniper firewall filters *still* give 
 you the flexibility to make that operation not perform at wire rate 
 also.

They actually did put TCAM onto the modular MPCs (i.e. MPC1 and MPC2, 
but not the 16x10GE MPC, and also I'd like to take this opportunity to 
offer an extreme DIAF to whoever butchered the use of the word 
modular on these products!) for exactly this reason. But I've been 
told there are no immediate plans to actually add any support for it in 
software, if ever. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCAM full on EX8200?

2011-10-15 Thread Richard A Steenbergen
On Sun, Oct 16, 2011 at 12:56:41PM +1100, Julien Goodwin wrote:
 
 What's needed is for an OEM to build a generic router chassis that has 
 separate control plane, power, and forwarding modules that can be 
 swapped as needed. Potentially ATCA might be a good platform for this

This is already being worked on through something called OpenFlow, which 
aims to provide an open API to programming the hardware so that anyone 
can come along and write their own software for it. The chip makers are 
already able to produce massively high performance hardware for cheap, 
but none of them can figure out how to write the software for it to save 
their lives. This is why vendors are so scared of OpenFlow, if someone 
else can come along and write a good OS/BGP/etc for someone else's 
hardware they're in for a world of hurt.

At this point vendors like Cisco and Juniper aren't actually hardware 
companies, they're software companies. In many ways their hardware is 
inferior to the absurdly cheap and high performance chips being produced 
by folks like Broadcom (with the caveat that many times those chips have 
design flaws caused by lack of practical experience, see: nearly 
everyting wrong with the EX, for example :P), but the software is what 
keeps people buying the hardware.

Of course the traditional router vendors are also realizing that they 
won't be able to compete on price given the massive volumes that third 
party ASIC makers are doing, so they've already started building systems 
around those chips. The Cisco ASR is EZChip, the Juniper EX is Marvell, 
the Juniper QFX and a dozen other similar products are Broadcom, etc. 
But ultimately, it still comes down to software. The exact same Broadcom 
reference design box can be sold by Dell for $1k or by Force10 for $15k, 
and the difference is the software. :)

 There are other potential solutions, for example:
 http://www.nanog.org/meetings/nanog50/presentations/Monday/NANOG50.Talk17.swhyte_Opensource_LSR_Presentation.pdf

Yup, this is an example of software using OpenFlow.

 I do object to the still vaporware, not due to ship until the end of
 the year is closer. The main threat to the T-series is that 10ge
 slowly removing the need for Sonet/SDH, and if all you need is 10g
 LAN-PHY the MX with the 16-port MIC does it nicely.

It's been talked about for a while, but I'll believe it when I actually 
see it. :) PTX is also priced very similarly to MX hardware, so while it 
may indeed be cheaper than T, that doesn't really mean much (except 
for which Juniper business unit gets the revenue :P). It's not anything 
revolutionary, that one is still waiting to happen.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] TCAM full on EX8200?

2011-10-13 Thread Richard A Steenbergen
On Thu, Oct 13, 2011 at 02:19:40PM +0200, Michele Bergonzoni wrote:
 Il 13/10/2011 13.31, Chen Jiang ha scritto:
  AFAIK, The EX8200 use SRAM for FIB and TCAM for ACL, that's not like
  EX2200/3200/4200 that use TCAM for all FIB and ACL.
 
  You could vty to line card and try this knob and see what happened:
  PFEM2(vty)# show shim route lpm-dmm-stats
 
 Not sure to understand how something can switch data at that speed using 
 SRAM as a FIB, but it's consistent with my TCAM appearing almost empty.
 
 Anyway, here's the output:
 
 
 PFEM2(vty)# show shim route lpm-dmm-stats
 
 IPV4
 -
 
 ShadowIdx: 0Partition: 0
 
 numOfUsedBlocks  : 2077numOfAllocatedBytes  : 48216
 numOfFreeBytes   : 2046640 numOfPickAllocatedBytes  : 48380
 numOfPickAllBlocks   : 2370
 
 ShadowIdx: 0Partition: 1
 
 numOfUsedBlocks  : 320 numOfAllocatedBytes  : 667884
 numOfFreeBytes   : 1427132 numOfPickAllocatedBytes  : 672216
 numOfPickAllBlocks   : 448
 
 ShadowIdx: 0Partition: 2
 
 numOfUsedBlocks  : 17569   numOfAllocatedBytes  : 
 2083064
 numOfFreeBytes   : 11952   numOfPickAllocatedBytes  : 
 2083816
 numOfPickAllBlocks   : 22343


EX8200 uses SRAM for forwarding lookups, and TCAM for firewall 
filtering. SRAM is perfectly capable of doing lookups at these speeds, 
and infact is a lot more flexible than TCAM, whereas TCAM is actually 
much better suited for doing high speed packet filtering.

At any rate, your problem is in partion 2. See how you have 2MB 
allocated and only 11k free, while in partition 0 it is almost 
completely unused, and in partition 1 only 667k out of 2MB is used? One 
of your SRAM partitions is full, and thus you can't add more routes to 
the FIB.

Determining exactly how this happened, and how far you need to plant 
your foot up Juniper's ass to get it fixed, is best left as an excercise 
for the reader. All I will say is that they are now selling -ES 
(enhanced scale) linecards for EX8200 which have more SRAM capacity.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] download.juniper.net mime types

2011-09-13 Thread Richard A Steenbergen
On Tue, Aug 30, 2011 at 01:52:45PM -0500, Richard A Steenbergen wrote:
 Dear Juniper,
 
 You guys broke your mime types again, at least for all the 10.4S6.6 
 service release URLs. :)

Sigh... I know nobody wants to bother trying to be standards compliant 
or testing things on any platform other than IE these days, but I really 
can't believe nobody cares about not serving up your .tgz junos 
downloads with Content-Type: plain/html... Does nobody else notice that 
it's now an epic pain in the ass to download code with something like 
lynx?

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Securing management access to Juniper gear

2011-09-03 Thread Richard A Steenbergen
On Fri, Sep 02, 2011 at 02:37:11PM -0400, Mark Kamichoff wrote:
 
 I'm not an EX guru, but I believe the same concepts can be applied.

With the caveats that:

1) lo0 filters *WILL* (quite incorrectly) match data plane exception 
packets that get punted to the RE for further processing as well, such 
as TTL expiring traceroute packets routing THROUGH the box. Mostly this 
issue applies to EX, which seems to punt a whole bunch of everything to 
the RE rather than deal with it on the FPC CPU like traditional Juniper 
hardware, but the same thing actually still happens with TTL expiring 
packets being popped out of an LSP on MX Trio hardware too. You need to 
make exceptions for this in your lo0 filter, or else you'll find your 
control plane filters matching more than just control plane packets, 
breaking traceroute/etc, and generally pissing everyone off. I believe 
there was also a related ongoing issue on EX where an lo0 filter with an 
explicit deny of all traffic at the end would actually match ARP traffic 
too, so you should probably be careful with those as well. :)

2) EX lo0 filters don't actually work correctly for DoS prevention, they 
get applied *AFTER* the packets have already destroyed the RE, and thus 
are completely ineffective at defending the boxes from attack. The only 
way to correctly block control plane traffic on EX is with ingress 
filters on real intefaces (or RVIs).

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JUNOS 10.4S6 for EX8200 - PR/676826

2011-09-01 Thread Richard A Steenbergen
On Wed, Aug 31, 2011 at 08:59:26PM +0800, Mark Tinka wrote:
 10.4R4.5 today on our EX3200's/4200's.

We were forced (kicking and screaming) into 11.1S2 on our EX8200s for 
some feature support that just wasn't available any other way, but all 
things considered the code has actually been pretty darn good (as far as 
EX code goes). Put it this way, I was expecting a LOT worse. Yes you can 
still royally screw up the fib if you insert cards while it's 
converging, or make it take an hour to update the fib by looking at it 
funny, but things have actually been relatively stable and light on the 
other major issues (crashing, blackholing, etc). Chalk one up to the 
new development process I guess, though personally I'm still pretty darn 
annoyed at the whole hour to update the fib thing. :)

  SRX, you might as well run whatever came on it,
  because it won't work anyway.  The ALGs don't work, at
  times proxy arp doesn't work, your logs will be full of
  interesting (and scary) error messages, bugs that were
  supposed to have been fixed aren't, licensed features
  (like dynamic-vpn) don't work at ALL, etc.
 
 None here, but the constant pain about them on the list is 
 glaring.

I have an SRX210 in my basement doing my home routing, and it is the 
only free device I've ever been given that I would seriously consider 
returning and asking for my money back. Broken doesn't even begin to 
describe it, my condolences to anyone who actually needs to run these 
things in production.

  M/T series probably have the most flexibility as 
 they
  have been around long enough not to push people towards
  10.4/11.[12] -- people can just select the appropriate
  SR.
 
 Agree - we have far fewer issues with these as they're older 
 and most of the new junk going into Junos today isn't to do 
 with them save for a couple of features (which are sometimes 
 hardware dependent) and general bug fixes.
 
 We've hit some silly bugs on the M-/T-series lately, but 
 nothing near as bad as the MX.

We've been running 10.4 on MX ever since R4, with a healthy mix of 
I-chip and Trio boxes (not combined though), and the code has actually 
been pretty solid. Yes there are some outstanding issues somewhere 
between annoying and obnoxious but you can work around it that still 
aren't fixed until R7, but in the grand scheme of things it all mostly 
works. Then again, after the debacle that was 10.2 I'm excited when the 
things don't randomly shoot flaming packets out of their ass, so maybe 
it's just a case of lowered expectations. :)

 Can't blame you. If you're new to Juniper, just coming from 
 Cisco, feelings might be familiar. If you started with 
 Juniper back in the days of Junos 5, 6, 7 and 8.4, as they 
 say, Those were the days.

About as good as Cisco is where I'd put things today on the code 
reliability scale. Not to say that I'm happy with that state of 
affairs, but as Homer would say, urge to kill... fading :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JUNOS 10.4S6 for EX8200 - PR/676826

2011-09-01 Thread Richard A Steenbergen
On Thu, Sep 01, 2011 at 11:48:36AM -0400, Paul Stewart wrote:
 Actually I'm curious as well - RAS is not typically wrong though about 
 this kind of stuff ;)
 
 We have numerous SRX deployed for firewall and router functionality - 
 some are running Dynamic VPN (which yes, we've had issues with - 
 definitely it's not perfect).  We've been bitten by some surprises as 
 well ... so I'm not disagreeing, just saying that we're pretty used to 
 these issues we've encountered and don't deploy if we know they will 
 come up. Typically, we use them as site to site VPN boxes along with 
 firewalling.
 
 I have an SRX210 at my home as well - run the full UTM suite on it and 
 had no real issues (granted it's a home environment to be fair).
 
 RAS, can you share a few highlights of broken?

Just doing simple routing and IPSec tunnels, and we're talking every 
random little thing you can possibly imagine, across about a dozen 
different versions of code and a lot of time hoping it would get better. 
I still have to reboot the thing once every few weeks just to keep the 
packets forwarding.

The most insane thing I saw was when trying to use BGP to originate a 
/24 over my IPSec tunnels, you couldn't keep the sessions up for more 
than ~24 hours without restarting rpd. I've had to disable just about 
every feature to keep things even mostly working, for example the last 
time I tried to configure IPv6 on a gre tunnel it would sometimes 
randomly not configure ANY IPs on the interface when it would boot. You 
could show int terse gr-#/#/# and they just wouldn't be there, no 
matter what the config was, etc. I'd have more reliable internet at home 
if I had a Linksys. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] download.juniper.net mime types

2011-08-30 Thread Richard A Steenbergen
Dear Juniper,

You guys broke your mime types again, at least for all the 10.4S6.6 
service release URLs. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JUNOS 10.4S6 for EX8200 - PR/676826

2011-08-30 Thread Richard A Steenbergen
On Wed, Aug 31, 2011 at 07:42:21AM +1000, Dale Shaw wrote:
 Hi all,
 
 So, --sigh--, it looks like there are still severe bugs being
 discovered in JUNOS 10.4:
 
 http://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2011-08-348actionBtn=Search
 
 Does anyone know more about PR/676826 and what the various
 conditions that trigger it might be? Anyone know when the defect was
 introduced?
 
 I've opened a JTAC case in an attempt to find out more because we've
 just embarked on an upgrade to 10.4R6; if the bug can/will bite us I
 need to decide whether to stick with 10.4R6, go to 10.4S6, or wait for
 10.4R7.

We hit this bug on several MX devices running junos 64 at the 49 day 
mark. 10.4R7 isn't due until October, so if you're running the new REs 
you probably want to go with S6.6 for the fix.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] CWDM SFP+ 10gigE

2011-08-30 Thread Richard A Steenbergen
On Tue, Aug 30, 2011 at 06:31:04PM -0400, Chuck Anderson wrote:
 Has anyone tried third-party CWDM SFP+ 10gigE transceivers in MX Trio
 or EX4500?  A quick Google search turns up many vendors I haven't
 heard of:

We're running many of the 40km DWDM SFP+ in EX8200 quite successfully, 
can't speak to the other platforms.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper MX SCBE-MX-R

2011-08-11 Thread Richard A Steenbergen
On Thu, Aug 11, 2011 at 07:33:20AM -0400, Chuck Anderson wrote:
 
 I'd rather they slip and put out well tested, stable code than to just
 release what they have on a specific time schedule.

Don't worry, they can still find a way to fail at both.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Any takers on 10.4R5.5 yet ?

2011-06-27 Thread Richard A Steenbergen
On Mon, Jun 27, 2011 at 11:05:48AM -0600, David Ball wrote:
   I know it's unreasonable to have people continually posting to the
 list asking about which code is best, but I know many were waiting for
 a stable 10.4 revision (due in part to its' EEOL nature) but last I
 heard, 10.4R2 (or was it R3) wasn't ready for primetime.  Didn't find
 much in the archives about 10.4R4.

10.4R4 has been the least problematic code on MX (either trio or ichip, 
but not mixed) that we've seen in a very long time, probably at least 
1.5 years. There were a handful of mostly minor issues in it, but in 
theory they've been fixed in 10.4R5 (though we have only a couple of 
routers running R5 so far, so we don't have a massive experience base 
yet). As always it varies by your feature set, but for a v4/v6/mpls/bgp 
heavy core router things are finally starting to look up. About damn 
time too. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Understanding versioning of service and regular releases

2011-06-03 Thread Richard A Steenbergen
On Fri, Jun 03, 2011 at 11:58:00AM +0200, Tore Anderson wrote:
 On 2011-05-27, JUNOS 11.1S2 was released for the EX. So this release is
 a couple of weeks newer than JUNOS 11.1R2.3. However,
 https://www.juniper.net/customers/csc/software/junos_software_versions.jsp
 says 11.1R2.3 is the recommended version for the EX 4500 in VC
 configurations.

Let me throw out some warnings about 11.1S2 for EX real quick.

First off, when you upgrade a backup RE (we saw this on EX8200 but it 
might apply to VC's too) and are running some older code on the master 
(we saw this on several dfiff versions of 10.1, 10.2, and 10.3), there 
is a ~15% chance that when the backup RE comes online is will cause the 
router to completely stop forwarding traffic. This isn't a case of the 
backup stealing control of the pfe, and it doesn't leave anything in the 
logs, it just silently disrupts the master RE so it can't reach 
anything, and stays that way until you restart the router or switch over 
to the 11.1 RE. We've seen this happen several times now on several 
different routers, no GRES or anything like that, and there is no PR 
yet.

Also, they've done something to royally hose the sync process between 
master and backup RE on this code. When running 11.1S2 on the backup, 
and any of a dozen different versions of 10.1, 10.2, or 10.3 (haven't 
tested 10.4, doesn't seem to happen when both REs are running 11.1S2), a 
commit sync will always fail. This wouldn't be so bad, except that on EX 
(at least on EX8200) you CAN'T disable commit sync, even if you don't 
specify it it always does it. This means that you will never be able to 
commit with the backup RE online, and the only workaround seems to be to 
reboot the backup RE before you commit on the master so that it sees it 
offline and successfully ignores it. Again no PR on this yet.

No experience with it on 3200/4200/4500/VCs yet, but based on our 
experience w/EX8200 so far this code should come with a warning label, 
may be hazardous to your health. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-03 Thread Richard A Steenbergen
On Fri, Jun 03, 2011 at 08:31:51AM -0700, Serge Vautour wrote:
 Hello,
 
 Would it be possible for you to share what code version you recommend 
 for Trio? We've had a few MX80s in Prod with 10.2S6 for a while now. 
 We need to add MPC cards to our MX960s and are struggling what version 
 to go with. Continue with 10.2 or move to 10.4? We're also planning on 
 adding alot more MX80s.

As of right now we're doing 10.4R4 on new deployments/upgrades of MX80 
and MPC, and it's working reasonably well. It's not perfect of course, 
we have a few fixes already in the queue for 10.4R5 and just found a new 
rpd coredump the other day, but it's a hell of a lot better than any 
previous 10.4 builds, and now seems to be the right time to pick up the 
EEoL release. 

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-03 Thread Richard A Steenbergen
On Sat, Jun 04, 2011 at 12:04:09AM +0800, Mark Tinka wrote:
 
 One thing to think seriously about is whether you're going to run your 
 MX's with a mixture of DPC's and MPC's. Depending on which features 
 you need to turn on, you may not be able to boot DPC cards if you have 
 MPC's installed as well.
 
 I'd seriously suggest checking with your SE before turning up any 
 features if you're going to mix DPC's and MPC's, or if certain 
 features for the MPC's seem kinky. We've had too much pain for some 
 items.

Agreed 100%, plus getting line-rate out of a mixed DPC/MPC environment 
is a real bitch for a number of reasons, so you'll be MUCH better off if 
you convert a whole chassis at a time. Though I will say that 10.4R4 
didn't give us ANY grief when doing mixed DPC/MPC during the actual 
conversion maintenance, which is a first for the dozen or so places 
where we've done this already. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SSH/Telnet session hanging

2011-06-02 Thread Richard A Steenbergen
On Thu, Jun 02, 2011 at 05:44:38AM -0700, Serge Vautour wrote:
 Hello,
 
 I'm confused by your statement that BGP is limited to 4096. I have BGP 
 peers up with 8192:

From RFC4271:

4.  Message Formats

   This section describes message formats used by BGP.

   BGP messages are sent over TCP connections.  A message is processed
   only after it is entirely received.  The maximum message size is 4096
   octets.  All implementations are required to support this maximum
   message size.  The smallest message that may be sent consists of a
   BGP header without a data portion (19 octets).

I suppose JUNOS lets it use an MSS of Nx4096 that will fit in the PMTU. 
Then again, there was a long standing bug that shows 2x whatever the 
actual MSS was on show system connections output too, so who knows. :) 
But under protocols bgp neighbor x.x.x.x tcp-mss the maximum value you 
can specify if you aren't doing automatic PMTUD is 4096, go figure.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-02 Thread Richard A Steenbergen
On Thu, Jun 02, 2011 at 04:26:54PM -0700, Doug Hanks wrote:
 Daniel,
 
 I have nothing but good things to say about the MX80.

I have almost nothing but good things to say, now that 90-95% of the 
cripling Trio-specific bugs have been worked out of the current code.

The integrated RE is probably the biggest design limitation. For 
example, we just got bit by a bad flash drive on one, which caused the 
kernel to lock up when writing to the disk. This required a physical 
power cycle to bring the box back every time it happened, left no 
evidence in the logs (so we had to catch it actually happening on 
console to know what was going on), and required a complete RMA of the 
chassis to fix. The lack of redundant REs severely limits the potential 
of this otherwise excellent little box. Oh and don't forget, a single RE 
will make your upgrade process take a lot longer too.

Juniper would really do well to introduce a 1U small/simple external RE 
which can be connected over Ethernet, to redundantize a box like the 
MX80, and to be a reasonably sized BGP route reflector.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-02 Thread Richard A Steenbergen
On Fri, Jun 03, 2011 at 11:47:30AM +1000, Julien Goodwin wrote:
 
 There was talk of a VC-like implementation for the MX80, although I 
 don't know if that went anywhere.
 
 Now that they have the XRE200 what about letting us install Junos64 on 
 it and making it a reflector platform.

We actually tested the XRE200 for RR use (since it's a hell of a lot 
more sane than a JCS), but they specifically lock it down so you can't 
run BGP on it directly. This is the only JUNOS platform which is SMP 
enabled right now, and from what I've heard the regular kernel krt isn't 
thread safe, so my theory is to make it do SMP they may have had to 
disable some of the normal routing operations and only make it capable 
of controlling other EX chassis. I'm sure it would make a fine, if very 
overpriced, Olive though. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-02 Thread Richard A Steenbergen
On Thu, Jun 02, 2011 at 09:59:15PM -0400, jnprb...@gmail.com wrote:
 Although expensive, you can buy the JCS1200 with 64-bit Junos to run 
 as a standalone RR.  It's probably more economical if you could also 
 benefit from VPNv4 RRs for MPLS VPN deployments.

Price aside, anyone who wants a 12U RE needs to have their head 
examined. :) How freaking hard can it be to take an off-the-shelf 1U PC, 
slap a Juniper logo on the front, mark it up 20x like everything else, 
and sell it to us as a fully supported RR? I'm still confused how this 
has managed to escape their attention.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80 Opinions

2011-06-02 Thread Richard A Steenbergen
On Thu, Jun 02, 2011 at 07:11:31PM -0700, Doug Hanks wrote:
 The new MX REs run 64-bit Junos.

64-bit JUNOS != SMP enabled. The only difference is the amount of ram it 
can address, those fancy quad-core CPUs only run on a single core. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] JUNOS major releases - differences between revisions

2011-05-20 Thread Richard A Steenbergen
On Fri, May 20, 2011 at 10:38:22AM -0700, Jim Boyle wrote:
 You can also take a look at the results from our online PRSearch application.
 
 http://www.juniper.net/prsearch/
 
 Select 10.4R3, or 10.4R4 and show the results Closed in that 
 release.  That will show available PRs with commits/resolution in that 
 release (Closed isn't quite accurate here as the PR may be open for 
 other releases or follow-on actions)
 
 Thanks to Alex for the pointers on the release notes.  In general, the 
 release notes show what is fixed in that release (under Resolved 
 Issues for each section).  So if you check the PRs in the 10.4R4 ones, 
 and cross check them on the web, you should find they are resolved in 
 10.4R4.
 
 I'll admit that finding the this information isn't as easy as it 
 should be.  Juniper certainly has room for improvement here for 
 usability as well as consistency of information.  We are working 
 towards improvements in this area.

Alas we find that something like 75% of our PRs end up being marked 
confidential until we ask for them to be changed (sometimes multiple 
times :P), even when there is no reason for them to be, which tends to 
make the PR search all but useless for any real work. And I won't even 
start complaining about the accuracy of the PR public facing 
descriptions, that would be a whole 'nother thread. :) Sorry but the 
only way to get any real work done is to have an RE or SE be your bitch 
and look up the PRs to tell you what they're REALLY about, hoping for 
anything else is a complete fantasy.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX switches and TCAM utilisation

2011-05-18 Thread Richard A Steenbergen
On Wed, May 18, 2011 at 05:10:54PM +0100, William J Hulley wrote:
 Hi,
 
 I'm using some EX3200s running 10.0S6.1 and developing a configuration 
 using filter based forwarding to policy route traffic between routing 
 instances.
 
 It's all working fine in the lab but I'm concerned about the potential 
 growth of the firewall policy and utilisation of the TCAM in 
 production and would obviously like to model the usage and monitor it.
 
 Are there any known supported/un-supported ways of getting useful 
 stats out of the box beyond just relying on syslog messages saying 
 there isn't enough cam?

Drop into the fpc shell from root, like so:

RE:0% vty fpc0

BSD platform (MPC 8544 processor, 48MB memory, 0KB flash)

PFEM0(vty)# 


Next you need to find the vendor ID for the platform, like so:

PFEM0(vty)# show tcam vendor
Vendor = internal_ch3_tcam Vendor_id = 1

For EX8200 it's vendor id 6, for EX3200 it seems to be vendor id 1.

Then you need to find the instance ID for the hardware you're looking 
for. On EX8200 I know instance 2 is used for GE cards, instance 4 is 
used for XE cards. On EX3200 there only seems to be instance 2 (as 
you'd expect):

PFEM0(vty)# show tcam vendor 1 instances

 Vendor InstancePage Size

 internal_ch3_tcam 2 4 


So then to view the usage info for this vendor/instance:

PFEM0(vty)# show tcam vendor 1 instance 2 rules
Number of rules as Ingress PACL: 0
Number of rules as Ingress VACL: 0
Number of rules as Ingress RACL: 528
Number of rules as   Egress PCL: 135

528 Ingress RACL rules

HW-indexPage_idEntry_idrule_size fw_idRule

6296   1574   0227
AUTOFW-INVALID-PROTOCOLS.ext.0
6298   1574   2227
AUTOFW-INVALID-PROTOCOLS.ext.1
6496   1624   0227
AUTOFW-BORDER-FILTERED-PROTOCOLS.ext.0
6498   1624   2227
AUTOFW-BORDER-FILTERED-PROTOCOLS.ext.1
6708   1677   0227
AUTOFW-BORDER-LIMIT-IP-OPTIONS.ext.0
6710   1677   2227
AUTOFW-BORDER-LIMIT-IP-OPTIONS.ext.1
6960   1740   0227
AUTOFW-LIMIT-ICMP-ECHO.ext.0
...

TCAM utilization: 1326(used), 12938(free), 14264(total)

And there is your total tcam utilization above. Depending on code and 
platform it may show you a slightly different view, for example here is 
the utilization on an EX8200 running older 10.1 code:

PFEM15(vty)# show tcam vendor 6 instance 4 rules
Instance 4
  DB 0  Ingr PACL:0/ 996 (current/max) rules. Util. 0.000%
  DB 1  Ingr VACL:0/   12288 (current/max) rules. Util. 0.000%
  DB 2  Ingr RACL:  410/   32768 (current/max) rules. Util. 1.251%
  DB 3   Egr PACL:0/1024 (current/max) rules. Util. 0.000%
  DB 4   Egr PCL1:  103/8188 (current/max) rules. Util. 1.258%

But you get the gist. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SFP Status and Conditions

2011-05-11 Thread Richard A Steenbergen
On Wed, May 11, 2011 at 03:39:39PM -0300, Giuliano Medalha wrote:
 People,
 
 Is it any possible to monitor the SPF status of an EX switch ?
 
 Is there some commands to see SFP or XFP or SFP+ status ?
 
 - power
 - model
 - temperature
 
 Some SFP supports DD for verification.  Juniper supports it ?

show interfaces diagnostics optics

You may also be interested in http://juniper.cluepon.net/OS_dom, which 
adds a sorely needed summary view for DOM.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX Series | 10.4R3.4 Limited Received Routes

2011-05-01 Thread Richard A Steenbergen
On Sat, Apr 30, 2011 at 08:48:59AM -0700, Bill Blackford wrote:
 So if what you are saying is that the EX, only being capable of 16k 
 routes, will only Receive and Accept a random smattering of a full 
 table being sent up to 16k and any filters beyond that filter on the 
 16k Received and installs that balance as Active?
 
 If this assumption is correct, then what I'm seeing is expected 
 behavior?

The 16k limit is a RIB limit from the default hard-coded configuration 
on small-EX's. This doesn't really protect the FIB, as the FIB is much 
smaller still, more along the lines of 12k total unicast entries for 
IPv4 (and much less if you actually install IPv6 routes) on 
EX3200/4200..

You can see the RIB limit at /etc/config/ex-series-defaults.conf:

routing-options {
rib inet.0 {
maximum-prefixes 16384;
}
rib inet6.0 {
maximum-prefixes 4096;
}

All you have to do to override this is apply those options with 
increased values to your own configuration. Of course if you do, you'll 
immediately hit the next limit, a hard-coded maximum data size of 128MB 
which will cause rpd to coredump when it allocates that much memory. To 
change this, you have to edit /boot/loader.conf and increase the 
kern.maxdsiz line to something a little more sensible (like say 512MB). 
Unfortunately this value will be blown away every time you do a new 
jinstall, so you'll need to keep it up to date every time you upgrade.

To not flood your FIB, you'll need to block a bunch of routes at the 
RIB-FIB export layer, which happens in a policy you apply at 
routing-options forwarding-table export XX. For example, you might 
want to allow a default, static, isis|ospf, and some internal cust 
routes, but otherwise block the rest of the BGP routes to keep the table 
size small.

None of this has anything to do with an arbitrary liit of 28k active 
routes. If you were bumping up against the maximum-prefixes config, the 
number would be 16k total for the RIB, not 28k. When this limit gets 
hit the future routes are just silently dropped from the RIB, which is 
certainly a lot better than the Cisco method of disabling CEF and making 
the box unusuable until someone goes to reboot it. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] ex4200 egress filter

2011-04-28 Thread Richard A Steenbergen
On Thu, Apr 28, 2011 at 12:22:43PM +0100, Nick Ryce wrote:
 Hi Chris,
 
 The issue should be resolved next week in a service release against 
 11.1R1

We hit this issue while testing 11.1R1, and oh what a mighty big screwup 
it was on Juniper's part too (that it even tries to parse the packets 
that are killing it in the first place, when NOT CONFIGURED TO DO SO, 
simply boggles the mind). Unfortunately it's also not the only packet 
of death which crashes the FPCs issue in 11.1 on EX, we also discovered 
another one which DIDN'T get fixed in 11.1S1, so you're taking your life 
into your own hands if you try to run that code in production. Oh and 
BTW, 11.1 on EX will also blackhole your packets while BGP converges 
following bootup, for up to 15 minutes in our testing. Consider 
yourselves warned. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] ex4200 egress filter

2011-04-28 Thread Richard A Steenbergen
On Thu, Apr 28, 2011 at 05:17:46PM +0200, Tore Anderson wrote:
 * Richard A Steenbergen
 
  We hit this issue while testing 11.1R1, and oh what a mighty big screwup 
  it was on Juniper's part too (that it even tries to parse the packets 
  that are killing it in the first place, when NOT CONFIGURED TO DO SO, 
  simply boggles the mind). Unfortunately it's also not the only packet 
  of death which crashes the FPCs issue in 11.1 on EX, we also discovered 
  another one which DIDN'T get fixed in 11.1S1, so you're taking your life 
  into your own hands if you try to run that code in production.
 
 Hi Richard,
 
 Could you be a bit more specific about this issue that remains
 outstanding in 11.1S1? Is there a PSN for it?
 
 I have a pair of EX4500s in my lab for setup currently, and any older
 release isn't an option due to the lack of IPv6 and VC support.

No comment on how to reproduce it, at least until they fix it and ok the 
release of details. No PSN yet, but basically it's just another magic 
packet of death which crashes the FPCs, similar to the last NetBIOS 
issue. Almost all of our testing is on EX8200, but often times these 
things behave similarly across the smaller EX's too. I'm just warning 
people not to jump into 11.1S1 expecting everything to work great, 
because it most certainly does not. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] output-list for ex4200

2011-04-27 Thread Richard A Steenbergen
On Wed, Apr 27, 2011 at 12:24:25PM +0100, Nick Ryce wrote:
 
 Any ideas if this is supported in 10.4 as we have a standard ACL we 
 use on most customer vlans and then a customer specific vlan?

Nah, filter chains are definitely not supported on EX, and I'm not aware 
of any near term plans to add it.

Even on the major platforms, filter chains aren't exactly a completely 
well-thought-out solution. Doing the next term operation that you need 
to force packets to be evaluated all the way through the chain actually 
consumes lookup capacity inside the firewall processing, and it is 
surprisingly easy to exhaust this capacity. For example, something on 
the order of a dozen filter terms in a chain, doing relatively simple 
matching, is enough to exhaust the capacity of an I-Chip on an MX DPC. 
When this happens, you'll suddenly discover that your ports are no 
longer capable of doing line rate packets/sec, and there will be no 
indications of the drops short of poking around in the show ichip 
commands on the PFE. Needless to say, this can make for a really bad 
day.

We use a commit script to automatically build unique per-interface 
firewall filters out of individual filter config components. It's not 
pretty, but unfortunately this is really the only practical way to get 
the kind of config reuse you're looking for, not to mention the only way 
to actually protect the control plane on the EX. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 troubles.

2011-04-13 Thread Richard A Steenbergen
On Wed, Apr 13, 2011 at 01:27:15PM -0400, Chris Evans wrote:
 Question to you all...
 
 It seems like alot of folks run bleeding edge code with some if these 
 major bugs popping up.I also get the impression that a lot of shops 
 don't test code before they deploy.
 
 I'm just curious how this works for you. In my company we would get 
 seriously reprimanded for deploying software that is not tested and 
 any time we have outages we have to go through big hoops to understand 
 why how to fix etc.. so we do the best we can to deploy 
 architectures/platforms/code that wont have issues.
 
 I couldn't imagine being bleeding edge in a service provider 
 environment, its just a concept I can't fathom being in the 
 environment I'm in..

Nobody wants to run bleeding edge code, but newer code is required to 
support new hardware such as the MX Trio cards (which are much cheaper 
per port, higher density, and more featureful). Unfortunately a lot of 
the older newer code that had initial support for the new hardware 
(such as 10.2) is *REALLY* buggy, which makes the bug fixes in really 
new code a lot more attractive. We've tried to look at 10.4R3 (since it 
finally fixes ISSU for us for the first time in close to 2 years :P), 
but it's still just too buggy in the lab, so we're still doing 10.3R3 on 
new MX deployments/upgrades. Overall 10.3R3 has been relatively less 
bad than a lot of other recent code.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 troubles.

2011-04-13 Thread Richard A Steenbergen
On Wed, Apr 13, 2011 at 10:48:30AM -0700, Derick Winkworth wrote:
 
 They don't 
 
 1.? immediately just blame you or 
 2.? just tell you to upgrade and sit and do nothing until you do 
 3.? or tell you that you should have known that with some very narrow set of 
 unlikely circumstances after two or three weeks?some bug will occur.? 

I don't know what 7 leaf clover you picked to have that kind of luck, 
but all 3 of the above describe nearly every one of my (many, many) JTAC 
cases. I'd also throw in:

4. Repeatedly fail to read/comprehend anything you say in the ticket, 
sometimes for months (or even years) on end.

Just the other day I had an exchange with ATAC which went something like 
this:

Me Hi, when this bgp neighbor flaps it sometimes doesn't syslog the 
event correctly, and instead records garbage messages.

ATAC The bgp neighbor is flapping, that is why you are logging the 
neighbor down, can I close this case?

I couldn't make this stuff up if I tried. :) 

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 troubles.

2011-04-13 Thread Richard A Steenbergen
On Wed, Apr 13, 2011 at 10:09:12AM -0700, Keith wrote:
 
 We saw random reboots, sometimes hourly, with the first MPC
 and this was on 10.4R2.6. Juniper wanted to RMA it.
 
 When the latest MPC and MIC arrive I will update to 10.4R3.4
 and see how that goes.

Honestly, sometimes they get a little too RMA happy and throw that out 
as the solution instead of actually trying to find the real issue. 
Personally I'd be far more inclined to believe that the problem is 
software than it is two bad cards in a row, especially where 10.4R2 is 
involved. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX80-48T Fan Speed Variation

2011-04-05 Thread Richard A Steenbergen
On Tue, Apr 05, 2011 at 11:42:08PM +0200, Daniel Roesen wrote:
 
 JUNOS logging is a desaster. Either you get FAR too much noise (JUNOS
 developers love to leave a bouqet of debug messages in there,
 miscategorized as something else than debug), or you don't get relevant
 things anymore (like link/adjacency up events). Looks like extensive
 logging regexp is the only way to get proper logging. :-(

A mechanism to recategorize syslogging on an event basis using a policy 
(so you can fix these terrible defaults) is very VERY high on my feature 
request list. I forget the exact details, but the last I heard there was 
at least some interest in implementing this some time in the next year 
or so. If you agree that this is an important feature, please ask your 
account teams to make this a higher prority. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Changing SSH port on EX switches, M routers

2011-04-01 Thread Richard A Steenbergen
On Fri, Apr 01, 2011 at 08:23:31PM -0400, Jesus Alvarez wrote:
 Hi,
 
 Is there a way to change the SSH port for managing the EX switches and M 
 routers? We normally avoid using the standard port 22.

No, I've been asking for this feature. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] XFP-10G-L-OC192-SR1

2011-03-24 Thread Richard A Steenbergen
On Thu, Mar 24, 2011 at 08:07:57AM -0400, Paul Stewart wrote:
 Hi folks.
 
 These are 10KM optics - how short of a run can you use them for?  We 
 have several of these spared at the moment and I'd like to use them 
 for connections between MX480's in the same rack. will they run too 
 hot?

http://www.nanog.org/meetings/nanog48/presentations/Sunday/RAS_opticalnet_N48.pdf

See page 79. LR and below has no blindness danger even back-to-back, ER 
has a blindness danger but not a damage danger, and ZR you can actually 
damage if you don't have enough attenuation before going into the 
receiver.

We don't even bother with shorter reach optics, after way too many 
issues encountered with SR and the like. It's easier (and cheaper if you 
have the right sources) to just buy all LR and standardize on SMF than 
it is to bother maintaining two inventories and mucking with orange 
cables even for intra-rack stuff.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 10.0 or 10.4?

2011-03-22 Thread Richard A Steenbergen
On Tue, Mar 22, 2011 at 05:18:47PM +0100, bas wrote:
 Hi All,
 
 Well, after this thread I still didn't know which version I should
 choose for our 960 with MPC's only.
 From what I read it was; In the field (Ras, Raphael) we see 10.3r3 as
 the better choice, and people who talk to JTAC say 10.4r2 is the
 better choice.
 
 (Of course it depends on configuration and config.)
 
 But we chose to upgrade to 10.3r3, and installed the version this morning.
 The upgrade seemed to have gone smooth, but after all BGP sessions had
 been re-established, and prefixes re-learnt the CPU stayed at 100%.
 
 Dropping to shell I saw rpd consuming 99% CPU.
 Looking at task accounting and rtsockmon I saw no obvious causes.
 A failover to the backup RE had no effect, the new master RE consumed
 100% within a couple of minutes.
 
 A colleague of mine did a trace of the process saw that the cycles are
 being consumed by getrusage system calls.
 
 Tomorrow morning we'll try to restart routing, if that has no effect
 we will try 10.4r2.

Haven't seen that here. Both 10.3R3 and 10.4R2 picked up a very similar 
set of fixes (they have very close release dates) for major PRs which 
were giving us grief, but 10.3R3 seemed to introduce less new ones in 
the process. 10.4R3 just came out yesterday, so feel free to give it a 
shot and report back, but most of our 10.3R3 issues have been relatively 
less bad than normal.

Occasional logging of these junk messages:

Mar 22 11:47:12.629  re1.xx1.xxx1 /kernel: %KERN-3: Unlist request: unilist(nh 
index = 1049538) found on the rnhlist_deleted_root patnode, hence returning

Logging of these junk messages (note the incorrect timestamps too, these 
were actually logged AFTER the Mar 22 output above :P):

Mar  4 10:29:50.527  re1.cr1.xxx1 rpd[89570]: %DAEMON-4: , hold timer 
1:07.860442
Mar  4 10:47:22.577  re1.cr1.xxx1 rpd[89570]: %DAEMON-4: , hold timer 
1:22.570405
Mar  4 10:55:44.479  re1.cr1.xxx1 rpd[89570]: %DAEMON-4: , hold timer 
1:21.765648
Mar  4 10:59:59.056  re1.cr1.xxx1 rpd[89570]: %DAEMON-4: , hold timer 
1:19.371199
Mar  4 11:02:04.228  re1.cr1.xxx1 rpd[89570]: %DAEMON-4: , hold timer 
1:18.704278

Weird stuff like that. Probably the worst issue we've seen so far is 
that on MX w/MPC cards (not sure if its the sw or hw) doing an l2circuit 
to a vlan-ccc endpoint and then confusing vlan-maps to push/pop the vlan 
tag off of the packet before encapsulating in the pseudowire (so you can 
mismatch vlan IDs on the endpoints) seems to block ISIS packets from 
being transported (most likely blocking 802.3 LLC frames is my guess). 

On EX there is a definite problem with the power supplies getting stuck 
110v low power mode as far as the chassis is concerned, which is an 
issue if you need 220v power to fully and redundantly power your FPCs. 
But at least this code hasn't crashed or blown up massively yet (or 
failed to do some really important operation like say correctly counting 
packets in SNMP so you can bill your customers), which is definitely an 
improvement over a lot of other recent JUNOS code. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 10.0 or 10.4?

2011-03-22 Thread Richard A Steenbergen
On Tue, Mar 22, 2011 at 05:18:47PM +0100, bas wrote:
 From what I read it was; In the field (Ras, Raphael) we see 10.3r3 as
 the better choice, and people who talk to JTAC say 10.4r2 is the
 better choice.

Oh and btw, I have multiple confirmed reports of YET ANOTHER major 
memory leak in mib2d in 10.4R2. Hope everyone learned their lesson about 
trusting JTAC version recommendations. :)

From 10.4R3 release notes:

The mib2d process leaks memory during SNMP walks. [PR/586074: This issue 
has been resolved.]

I'm going to assume it's that. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] about 10.4R3 on EX

2011-03-22 Thread Richard A Steenbergen
On Tue, Mar 22, 2011 at 12:54:25PM -0700, Kaj Niemi wrote:
 Hi,
 
 sarcasm
 To whomever who decided to introduce new features in a R3 release, thanks
 ;-( Specifically installing jloader separately is highly appreciated.
 /sarcasm

Sadly, they've been silently introducing new features in the middle of a 
bug fix release (and introducing new bugs too, which is how I find out 
about them) for a while now. But for extra bonus points, be prepared for 
the upgrade to take a REALLY long time to complete too. :)

From the release notes:

How Long Will the Upgrade Process Take?

The process of upgrading to a resilient dual-root partitions release 
takes longer due to the additional step of upgrading the loader software 
and a longer reboot time while the disk is reformattedto four partitions 
during the reboot of the switch that completes the Junos OS upgrade. The 
reformat increases the reboot time for EX2200, EX3200, EX4200, and 
EX4500 switches by 5 to 10 minutes. For EX8200 switches, the reboot time 
increases by 10 to 25 minutes per Routing Engine, and additional reboots 
are required.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] about 10.4R3 on EX

2011-03-22 Thread Richard A Steenbergen
On Tue, Mar 22, 2011 at 03:46:36PM -0500, Richard A Steenbergen wrote:
 The process of upgrading to a resilient dual-root partitions release 
 takes longer due to the additional step of upgrading the loader software 
 and a longer reboot time while the disk is reformattedto four partitions 
 during the reboot of the switch that completes the Junos OS upgrade. The 
 reformat increases the reboot time for EX2200, EX3200, EX4200, and 
 EX4500 switches by 5 to 10 minutes. For EX8200 switches, the reboot time 
 increases by 10 to 25 minutes per Routing Engine, and additional reboots 
 are required.

Also, in reading the upgrade process for the new boot loader, it says:

For an EX8200 switch with redundant Routing Engines, you must upgrade 
the loader software on both Routing Engines. You can upgrade the loader 
software on a Routing Engine only when it is master. Make sure that 
graceful Routing Engine switchover (GRES) and nonstop active routing 
(NSR) are disabled before you begin the upgrade.

The requirement that you can only upgrade it when the RE is the master 
is a pretty serious issue. This means you can't just pre-stage the 
upgrade on the backup RE and then switch over to it in a single move, 
you've got to take down the entire device for the duration of multiple 
reloads (4 apparently, 2 per RE * 2 REs) to complete the upgrade. Is 
there some other interpretation of this that I'm missing? From my quick 
lab testing it looks like you can at least get the jinstall and 25 
minute reformatting out of the way beforehand, but you've still got to 
be master to upgrade the actual loader.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SFPs in MX.

2011-03-18 Thread Richard A Steenbergen
On Fri, Mar 18, 2011 at 12:40:14PM -0700, Keith wrote:
 
 FPC slot 0, PIC slot 0 information:
Type 10x 1GE(LAN) SFP
StateOnline
PIC version 2.22
Uptime 4 hours, 58 minutes, 49 seconds
 
 PIC port information:
FiberXcvr vendor
Port  Cable typetype  Xcvr vendorpart number   
 Wavelength
0 GIGE 1000LX10 SMMRV COMM, INC. SFP-GD-LX 1310 nm
1 GIGE 1000SX   MMMRVSFP-DGD-SX850 nm
2 GIGE 1000Tn/a   MRVSFP-GA-R  n/a
3 GIGE 1000Tn/a   MRVSFP-GA-R  n/a
 
 The uptime is not a good sign as I upgraded this box and rebooted both RE's:
 
 System booted: 2011-03-17 13:31:12 PDT (22:54:34 ago)
 
 Going through the messages log it appears an CHASSISD_SNMP_TRAP10: FRU 
 Power-On is being generated then a whole lot of messages that looks 
 like a whack of processes are restarting.
 
 Can't go into production like this.

That means the DPC in question was rebooted 5 hours ago. If you weren't 
adding or restarting the card then, go look through the logs and figure 
out why. Scroll back starting at that FRU Power-On message.

As for the MRV optics, yes they are non-Juniper branded. Juniper (or any 
other router vendor for that matter) doesn't actually make their own 
optics, they just slap a label on optics from a variety of other 
suppliers. Fortunately Juniper doesn't play games with vendor locking of 
optics, so you shouldn't have any problems.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Juniper equivalents for migration from Cisco

2011-03-17 Thread Richard A Steenbergen
On Thu, Mar 17, 2011 at 11:23:59AM +0200, Delian Delchev wrote:
 You may mistakenly assume that EX8200 is equivalent to 65xx, and it 
 is, in size. But against 65xx and 76xx the more correct juniper 
 product should be the MX.

Not really. The best direct comparison to the EX8200 is the Nexus 7k 
line, but 6500/7600s with LAN cards are at least a pretty close runner 
up (trading in some higher bandwidths and lower prices per port for a 
more mature platform with some features that haven't been written for 
EX8200 or N7K yet). Comparing 6500/7600 to MX is pretty apples to 
oranges, especially if you aren't talking about a 7600 stuffed full of 
expensive ES/SIP cards. You've really gotta get into ASR9k before you 
can even start to make a comparison to MX in most categories, which is 
no big shock considering ASR9k was made specifically to compete against 
the MX.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 10.0 or 10.4?

2011-03-17 Thread Richard A Steenbergen
On Tue, Mar 15, 2011 at 10:57:56AM -0700, Steve Feldman wrote:
 
 What sorts of bugs did you see in 10.4R2?

We were just testing 10.4 on MX, since EX features are being a lot more 
actively developed, thus making major version jumps much more risky. For 
example, when we tried moving from 10.1 to 10.2 on EX8200 we discovered 
a major SNMP issue caused by some internal changes that broke polling 
and caused severe billing issues. There are a lot of firewall specific 
changes in 10.4 for EX which we wanted more time to properly test before 
deploying, since this is an area which tends to cause major outages when 
bugs do pop up. I already outlined a few of the issues we found on 
10.4R2 on MX in a previous post, and seeing as it seemed much less 
stable than 10.3R3 for near equivalent features and bugfixes I didn't 
see the point of pursuing it further right now.

 JTAC is recommending 10.4R2 on our EX8200s to fix a bug (PR581625 in 
 10.1R4) where some of our firewall filter rules were being silently 
 ignored.

Well, here is what I can tell you about the reasons behind our most 
recent move to 10.3R3 on EX8200 (where these are all fixed). A couple of 
these were actually fixed in 10.2R3, but a few other nasty issues were 
introduced at the same time, making 10.2R3 unusable in production. We're 
heading towards 11.1 in the near future for other reasons anyways, which 
is why we went after 10.3R3 instead of 10.2R4 for our next major code 
goal, but 10.4R2 was definitely not confidence inspiring based on the 
issues we saw under MX. :)

PR588115 - Changing the forwarding-table export policy twice in a row 
quickly (while the previous change is still being evaluated) will cause 
rpd to coredump.

PR581139 - Similar to above, but causes the FPC to crash too. Give it 
several minutes before you commit again following a forwarding-table 
export policy change.

PR523493 - Mysterious FPC crashes

PR509303 - Massive SNMP slowness and stalls, severely impacting polling 
of 10.2R3 boxes with a decent number of interfaces (the more interfaces 
the worse the situation).

PR566782 PR566717 PR540577 - Some more mysterious rpd and pfem crashes, 
with extra checks added to prevent it in the future.

PR559679 - Commit script transient change issue, which sometimes causes 
changes to not be picked up correctly unless you do a commit full.

PR548166 - Sometimes most or all BGP sessions on a CPU loaded box will 
drop to Idle following a commit and take 30+ minutes to come back up.

PR554456 - Sometimes netconf connections to EX8200's will result in junk 
error messages being logged to the XML stream, corrupting the netconf 
session.

PR550902 - On a CPU loaded box sometimes BGP policy-statement evaluation 
will simply stop working, requiring a hard clear of the neighbor (or 
ironically enough, sometimes just renaming the term in the policy will 
fix it :P) to restore normal evaluation.

PR521993 - Ports on EX8200 FPCs will sometimes not initialize correctly, 
resulting in situations where for example ports 4 and 5 on every FPC 
will be able to receive packets but never transmit them. If you continue 
to try and transmit packets down a wedged port (such as would happen if 
the port is configured for L2), it will cause the FPC to crash.

There are also significant BGP convergence performance improvements 
introduced in 10.3R3 and 10.4R2 if you have a lot of routes with 
communities on them. For us this reduced convergence times on EX8200 
with a few transit and ibgp rr feed views (~2mil paths) from 1 hour+ to 
15-20 minutes. Still not good by any means, but significantly less 
bad.

Of course there are a few other issues introduced in 10.3R3 too 
(shocker, that NEVER happens :P), but I already discussed them 
previously. Ultimately I think 10.4 will be more interesting in its R3 
or R4 timeframe, with SRs past that, but I don't think we're going to 
end up using it much on EX8200 (as I said, we're being forced into 11.1 
to support specific hardware anyways).

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] 10.0 or 10.4?

2011-03-15 Thread Richard A Steenbergen
On Tue, Mar 15, 2011 at 07:43:25PM +1100, Chris Kawchuk wrote:
 Just installed 14 x MX960s for a large Aussie Mobile company - The 
 release train we've decided on is 10.4R2 for now, due to EEOL support; 
 and the fact that 10.0 didn't support a few of the cards we added. 
 (16x10GE Trio for example didn't come till 10.2).

I hear people make this argument a lot, but in many cases it seems to be 
more of a knee-jerk reaction than a logical decision. The EEOL branches 
are definitely interesting once you get into the post-R4 timeframe, but 
I question the sensibility of trying to deploy it in the R2 timeframe 
just because it is the EEOL train.

Honestly, in many cases the code doesn't even begin to get stable until 
it reaches R4 and EOL status. The problem we run into is that we almost 
always discover at least one serious bug in every R4, no matter how 
well-intentioned the development efforts, but because R4 marks the end 
of engineering status we're constantly chasing the next branch to get a 
bugfix for things introduced in the previous branch. Of course what that 
really means is we discover all new brokeness in the new branch, and the 
cycle starts all over again. EEOL releases can end up being a lot more 
stable since you aren't introducing any new features (though anyone who 
tells you they don't introduce a ton of new bugs just doing service 
releases is completely full of it :P), so they're a good thing.

But, what is the real benefit to deploying 10.4R2 now, as opposed to say 
10.3R3? Either way you'll have to do an upgrade later on, so until you 
get to 10.4R4 there is no difference in 10.4 being the EEOL branch. We 
recently spent a fair bit of time trying to decide between 10.3R3 and 
10.4R2 for a lot of MX960 and EX8200 upgrades, and came to the 
conclusion that 10.4R2 was significantly buggier. Why JTAC is 
recommending it I can't even begin to guess, I really think they have 
the recommended version page hooked up to a random number generator some 
days, but in our testing it wasn't even close.

Which isn't to say 10.3R3 is perfect, but it's definitely on the less 
broken than ever side of things. So far we haven't had any issues with 
Trio hardware or snmp problems that we saw in 10.2R3 or 10.3R2, and if 
you carry a large number of BGP routes with communities you'll see some 
significant performance gains in policy evaluation which can improve 
convergence times quite a bit. Off the top of my head some issues we've 
seen with 10.3R3 so far are:

* Syslogging of BGP messages seems quite broken, in many cases not 
logging state changes correctly at all.
* ISIS packets inside a l2circuit are eatten by MX's when vlan-mapping 
is configured on the endpoint vlan-ccc.
* EX8200 power supplies will think they're running in 1200W 110V input 
power mode if you reinsert them after a reboot, even if fed with 220V 
power which should run them in 2000W mode. This will cause cards to 
power down if the chassis thinks there is insufficient power, so you may 
not have proper power supply redundancy.

No doubt there are plenty more too, but at least in a core service 
provider role it's been a lot less bad (lets just say its nice to not 
have to hard clear bgp neighbors to make policy changes take effect :P).

 I have also hear that 10.4 also included a mass 
 re-write/re-development of a lot of the JunOS code; trying to bring it 
 back within a manageable framework. (Note how it went from 10.2R3 to 
 10.4, skipping a 10.3 release for some platforms). Hence, 10.4 is the 
 new code base. I don't know if this is a good thing or a bad thing 
 initially, but should only improve with time.

Actually it's the opposite, 10.3 and 10.4 were both nobody touch 
anything that isn't essential no-feature releases, to try and bring the 
development framework into a more manageable state. I'll confirm that 
they're less broken than 10.2, but that certainly doesn't take much. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Uplink failure detection in EX series

2011-03-15 Thread Richard A Steenbergen
On Tue, Mar 15, 2011 at 12:25:59PM +0100, Tore Anderson wrote:
 Hi,
 
 I'm wondering if it possible to configure something equivalent to the 
 EX2500's Uplink Failure Detection on the JUNOS-based EX series 
 switches? I want to designate a couple of interfaces as uplink ports, 
 and if they all go down, all the other ports on the switch should be 
 disabled as well.

I think uplink failure detection is on the roadmap for 11.1, though I'm 
not sure about the EX-specificness of it.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] sflow on 2x EX4200 VC - no sflow data send

2011-03-15 Thread Richard A Steenbergen
On Tue, Mar 15, 2011 at 02:15:52PM +, Giovanni Bellac wrote:
 
 The problem is, that the VC is not exporting sflow data to the 
 collector.

We found a number of sFlow issues in our testing. For example, it didn't 
actually export any data at all on routed interfaces until 10.2. Of 
course it's not actually useable for us until they fix some of the 
missing fields (like dst ifindex and nexthop, added in 10.4 I believe), 
so our testing was very limited. Actually it probably won't be usable in 
our production systems until the fix the lack of a netmask field (i.e. 
it'll tell you that the dst IP is 1.2.3.4, but they don't send the field 
to tell you that the dst route was 1.2.3.0/24), so we're still waiting 
to do anything serious with it. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Debug vmcore files

2011-03-01 Thread Richard A Steenbergen
On Tue, Mar 01, 2011 at 07:21:58AM -0500, Scott T. Cameron wrote:
 You could use gdb.  But the likelihood of any success without source 
 code is slim.

You'd be absolutely amazed how much JTAC stupidity can be avoided by 
looking at the coredump backtrace yourself, without needing source 
access. As I understand it they use some point and click tool for 
automatically identifying PRs which match a coredump, and in my 
experience their tool is on crack a VERY high percentage of the time. 
Being able to say uh no, that's not even close to what I see in the 
backtrace, please try again can literally cut months off the time it 
takes for a case to be resolved.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Qfabric

2011-02-26 Thread Richard A Steenbergen
On Sat, Feb 26, 2011 at 10:06:45PM -0800, Joel Jaeggli wrote:
 you'll find no tcam in your high-end MX style platforms and ultimately 
 the power requirements for large amounts of cam will doom the current 
 iterations of tcam technology. 800w per slot devices are bad enough 
 2kw per slot devices would be a serious pain.

Technically not true, MPCs (the modular ones, not the 16x10G card) have 
TCAM on them, it's just not actually used by any software yet, and it 
would be used for accelerated firewall lookups not routing. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Qfabric

2011-02-24 Thread Richard A Steenbergen
On Thu, Feb 24, 2011 at 10:03:30AM -0500, Stefan Fouant wrote:
 
 No offense, but you are dead wrong on this issue.  I come in contact 
 with organizations every single day who have mission critical data 
 requirements and latency is a VERY big requirement for many of these 
 organizations.  And while this might not be your experience given the 
 financial services organization you work with, reduced latency was a 
 key enabler/differentiator for the NYSE and one of the main reasons 
 that they chose Juniper for their next-generation data centers.

That doesn't actually make it important, it just means there are some 
customers out there who believe the hype. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Qfabric

2011-02-24 Thread Richard A Steenbergen
On Thu, Feb 24, 2011 at 10:55:10AM -0500, Jared Mauch wrote:
 
 I heard about someone building a microwave link btw CHI and NYC due to 
 the lower latency compared to fiber and technology that they are able 
 to attain.  This is valuable for the high frequency traders, which 
 while they operate networks,
 
 These might care about the latency, but people suffering from other 
 services that are not latency sensitive (eg: TCP) esp when using 
 modern IP stacks, this is less of an issue for 95% of the people out 
 there.

You're talking about multiple miliseconds of propagation latency, and 
one very very specific application (which doesn't even demand a specific 
latency in and of itself, just that you are better than the other guy 
so you can out-trade him). When it comes to microseconds of latency in 
the forwarding plane of a switch/router, I'm far less convinced that 
this is a real issue.

I'm sure you can find people who will vehemently testify that their quad 
shielded 4 thick $300 Monster HDMI cable makes their tv's picture 
noticably better too, but that doesn't make it true.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SNMP if-mib stops responding

2011-02-15 Thread Richard A Steenbergen
On Tue, Feb 15, 2011 at 06:27:29PM +0200, Amos Rosenboim wrote:
 Hello all,
 This morning one of our MX routers stopped responding to SNMP if-mib queries. 
 It responds nicely to other SNMP queries.
 The SNMP responses simply arrive empty.
 Restarting SNMP does not help.
 We are running 10.2R3.
 
 Is anyone aware of this issue and is there any workaround or is a 
 software upgrade the only solution ?

restart mib-process

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] How to access routing engine BIOS

2011-02-09 Thread Richard A Steenbergen
On Wed, Feb 09, 2011 at 07:41:36PM +0200, Martin T wrote:
 
 Press DEL to enter SETUP
 
 
 However, pressing the Delete button(or F1, F2, Esc which are often
 used in order to enter BIOS) does nothing. It this possible to access
 BIOS on some routing engines? Is this possible to change boot device
 order in routing engine BIOS?

DEL will work, you've just gotta work on your timing. It's very tricky. 
:)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] How to access routing engine BIOS

2011-02-09 Thread Richard A Steenbergen
On Wed, Feb 09, 2011 at 06:22:07PM +, Martin T wrote:
 Ok :) Any hints? Even if I press DEL rapidly, it still continues with
 normal boot process..

Keep trying until you get it right. :) You need to hit it sooner than 
you expect, due to the lag time of drawing the screen at 9600bps. I've 
done it hundreds of times, it DOES work, but the timing is tricky.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] juniper / mx series fib usage information?

2011-02-08 Thread Richard A Steenbergen
On Tue, Feb 08, 2011 at 07:08:21PM -0600, Michael Hare wrote:
 Hello-
 
 A quick google didn't help; is there a way to tell how much space you 
 have left in your FIB [absolute RAM, percentage, whatever], specifically 
 for an MX with DPCs?

ras@re1.router start shell pfe network fpc0 

ADPC platform (1200Mhz MPC 8548 processor, 1024MB memory, 512KB flash)

ADPC0(re1.router vty)# sh jtree 0 memory  
Jtree memory segment 0 (Context: 0x4430cfd0)
---
Memory Statistics:
   16777216 bytes total
6366560 bytes used
   10407144 bytes available (6060032 bytes from free pages) ---
   3024 bytes wasted
488 bytes unusable
  32768 pages total
  11529 pages used (2568 pages used in page alloc)
   9403 pages partially used
  11836 pages free (max contiguous = 11285)

You can also see a breakdown of the individual services like so, but the 
output above will take multiple tables into account and show you the 
true utilization on the rldram. In a default configuration, segment 0 is 
your routing memory, segment 1 is your firewall filters.

ADPC0(re1.router vty)# sh jtree 0 summary
 Protocol  Routes  Bytes Used
-  --  --
 IPv4  341307 4906680
 IPv64579   84256
 MPLS 4876792
Multi-service   1  16

 I am contemplating activating cymru fullbogons [v4/v6].  We currently 
 carry about 350,000k v4 and 5000k v6 routes.
 
 While initially I'm not worried, my gut tells me the v6 fullbogons 
 feed will not be sustainable as it is already at 30k route for ~5k 
 active v6 announcements.  While their template doesn't suggest so, I 
 plan to put in ingress prefix-limit maximum on their sessions to 
 something 'reasonable'.

Carrying a bogons bgp feed is pretty darn close to worthless really, but 
you're in no danger of bumping an MX's route capacity unless you're 
running multiple tables.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 JunOS version.

2011-01-28 Thread Richard A Steenbergen
On Fri, Jan 28, 2011 at 02:03:54PM -0800, Keith wrote:
 
 Currently the box is running 10.2R1.8. It has a MIC-3D 20 port card, 
 MPC1, and RE-S-2000.

Juniper just put out a tech bulletin this morning admitting the obvious, 
that 10.2R1/R2/R3 and 10.3R1 for Trio (MPC) cards are massively broken 
and shouldn't be used. Try 10.3R2, it's been mostly ok for us (not 
counting the bug we hit the other day where all the MPCs crashed in an 
endless loop after updating a prefix-list referenced in a firewall 
filter on them, but at least so far this seems rare :P). Alas 10.3R3 
seems to be delayed, but you'll be far better off with 10.3R2 than you 
will with 10.2R1 in the config above.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 JunOS version.

2011-01-28 Thread Richard A Steenbergen
On Fri, Jan 28, 2011 at 06:15:08PM -0500, Paul Stewart wrote:
 We're still running 10.0R3.10 on MX platform (MX480) and with an 
 uptime of about 261 days and no obvious issues (notice I choose my 
 words carefully there) is there a reason to upgrade or just sit back 
 at this point?  I realize this is a bit of a loaded question but today 
 we have no issues that we're aware of.

The simpler your network and the less features you use (and to some 
extent, the less observant you are :P), the less likely you are to run 
into bugs. You're also using the older DPC cards which are a lot more 
stable, the fun starts with the brand new MPC/Trio cards. If it ain't 
broke, why fix it. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] MX480 JunOS version.

2011-01-28 Thread Richard A Steenbergen
On Fri, Jan 28, 2011 at 07:10:27PM -0500, Jonathan Towne wrote:
 
 I actually find myself in the same situation as the OP, as I just 
 powered up and started doing some initial configuration, testing, and 
 most of all: some learning on our new MX480 (with MX-MPC2-3D), it 
 seems to have shipped with 10.3R1.9 on it.  Can you elaborate on the 
 bustedness of this release at all, or bound to secrecy?
 
 I haven't run into anything weird yet, but I'm very early on in the 
 process, only having some basic connectivity to a few LAN switches, 
 and a logical system with a pair of IBGP sessions up inside it.  Where 
 should I expect oddity, as I was hoping to wait and get a better lab 
 setup with it to try an ISSU to 10.3R2 to see how it goes (I also have 
 GRES and NSR enabled..)?

This has been discussed to death already, go look at some past threads 
on Trio/code stability in recent months. Lots of issues have been seen, 
like several different ways to break snmp counters, blackholing of 
packets under various mpls configurations, crashing MPCs, etc, etc. Also 
ISSU doesn't work on Trio hardware yet, so don't get your hopes up, and 
doing a GRES switchover is one way to trigger SNMP counter issues on 
that code.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] SNMP polling issue MX

2011-01-09 Thread Richard A Steenbergen
On Sun, Jan 09, 2011 at 04:14:04PM +0300, Tarique A. Nalkhande - BMC wrote:
 All,
 
 Even we faced a similar problem on our MX's running 10.2R3. Further 
 findings revealed memory leak bug for mib2d process.. restarting mib2d 
 fixed it.
 Juniper is probably tracking it through some internal PR, the 
 committed release is 10.2R3 which doesn't look likely.

Hrmm supposedly the mib2d memory leak is fixed was 10.2R3, but we never 
actually tested it, we just skipped straight ahead to 10.3R2 on new 
deployments (as there were many other SNMP bugs still not fixed in 10.2 
at the time). A quick and dirty workaround for the memory leak issue is 
to periodically restart the mib2d process, which you can do with an 
event script like so:

event-options {
generate-event {
/* Adjust ttimer as necessary based on memory consumption */
restart-mib2d time-interval 604800;
}
policy restart-mib2d {
events restart-mib2d;
/* Adjust this too, to something slightly less than above */
within 60 {
not events restart-mib2d;
}
then {
event-script restart-mib2d;
}
}
}

/var/db/scripts/op/restart-mib2d.slax:

version 1.0;
ns junos = http://xml.juniper.net/junos/*/junos;;
ns xnm = http://xml.juniper.net/xnm/1.1/xnm;;
ns jcs = http://xml.juniper.net/junos/commit-scripts/1.0;;
import ../import/junos.xsl;
 
match / {
op-script-results {
var $restart-mib2d = {
command restart mib-process gracefully;
}
var $result = jcs:invoke($restart-mib2d);
}
}

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] current JunOS versions for MX80, EX8200?

2011-01-07 Thread Richard A Steenbergen
 0pf+0w
0.088u 0.137s 0:00.61 34.4% 4345+2926k 0+0io 0pf+0w
0.104u 0.159s 0:00.68 36.7% 4491+3047k 0+0io 0pf+0w
0.114u 0.159s 0:03.94 6.5%  4425+3080k 0+0io 0pf+0w
0.111u 0.147s 0:00.80 31.2% 4441+3026k 0+0io 0pf+0w
  ^^^

I forget if 10.1R4 had most of the fixes for the issues we've been 
dealing with, but it might be your best runner up if you need something 
that works immediately (and if you don't mind that sflow doesn't work at 
all on routed interfaces in pre-10.2 code). If you can wait a little 
while, we're currently targeting 10.3R3 as our new try to fix 
everything release for EX8200, and it's due out at the end of Jan.

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] RE accessories

2010-12-24 Thread Richard A Steenbergen
On Fri, Dec 24, 2010 at 08:21:18AM -0500, Paul Stewart wrote:
 That's hilarious! ;)
 
 Can I get one for every case I have open please?  Please ship 28 of 
 them immediatelyhehehe

I wonder if I can get an ER filed to make the humping speed variable 
based on the load on the router. :)

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] RE accessories

2010-12-23 Thread Richard A Steenbergen
Dear Juniper,

I will deploy one of these on every router until all my cases are 
resolved. :)

http://cluepon.net/ras/juniper-accessory.wmv

Love,
ras

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


  1   2   3   4   5   >