Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-28 Thread Antti Ristimäki
Hi,

There might be some corner cases where running a combined RR/PE can cause 
mysterious issues. For example, there was (or is - I'm not sure whether it's 
fixed or not) an issue that a RR didn't advertise iBGP learned VPLS routes when 
the RR itself had a local attachment circuit in the given VPLS instance.

Antti

- On 16 Aug, 2018, at 17:39, tim tiriche tim.tiri...@gmail.com wrote:

> Hello,
> 
> I have a MPLS PE (L3VPN) router that is acting as full mesh iBGP within the
> US.  The other routers in the US are not RR and regular iBGP.  This router
> also acts as RR for Europe and takes in full BGP table.  Is there some
> caveats to watch out for?
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
> 
> 
> --
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-19 Thread Mark Tinka



On 17/Aug/18 16:28, Robert Raszuk wrote:

>
>
> Then best thing is to run two or three RRs in parallel each using
> different BGP code base - even for the same AFI/SAFI pair

With experience, I could consider this. But for now, it does seem like
overkill.

Either, not totally opposed to the idea.

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-19 Thread Mark Tinka



On 17/Aug/18 16:05, adamv0...@netconsultings.com wrote:

> And going virtual this really is a marginal spend in the grand scheme of 
> things.

If you're not going virtual for RR's, you are missing out.

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-19 Thread Mark Tinka



On 17/Aug/18 15:38, Saku Ytti wrote:

> I'm siding with Adam here. His disaster scenario actually happed to me
> in 3292. We ran for years VXR VPN route-reflectors, after we changed
> them to MX240 we added lot more RR's, with some hard justifications to
> management why we need more when we've had no trouble with the count
> we had.

Agreed, and I see the use-case as a possible pain-point, particularly
based on your experience.

We'll need to evaluate this on our side, as the path to this road is
onerous.


> Not only is it CAPEX irrelevant to have separate RR for IPv4 and IPv6,
> but you also get faster convergence, as more CPU cycles, fewer BGP
> neighbours, less routes. I view it as cheap insurance as well as very
> simple horizontal scaling.

This might be the case when using real routers as RR's. But having used
CSR1000v on x86 hardware for years now, you are not lacking for CPU
performance, even with 10's of sessions per RR, many of them with full
tables and several SAFI's.

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-18 Thread Mark Tinka



On 17/Aug/18 15:39, adamv0...@netconsultings.com wrote:

> Another alternative would be to spin up a separate BGP process, which I think 
> is supported only in XR, but once again that somewhat places one on the 
> outskirts of the common deployment graph.
> But I know Mark is using csr1k -so depending on the available NFVI resources 
> (I guess dedicated servers in this case), I think it's not that onerous to 
> spin up yet another VM right?

Turning another one up? Not a problem at all.

The issue is in operating more than you need to.

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Robert Raszuk
>
> It's about increasing the odds of it to fall on the right side,
>

Exactly !


> But comparing say XR and Junos, judging from the rest of the inner workings

I could experience empirically, I'd say they are sufficiently different
> implementations.
>

True. In fact even XE & XR BGP code core is quite different in spite of
number of failed
attempts to at least make new bgp features to share code.

The bottom line is that if you get badly malformed update, broken
attribute, illegal NLRIs, mistaken blast of BGP-LS etc .. the probability
that all of those BGP implementations crash is much less likely then when
compared that your chosen one will work even if you run two instances of
it.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread adamv0025
> From: Youssef Bengelloun-Zahr [mailto:benge...@gmail.com]
> Sent: Friday, August 17, 2018 3:43 PM
> To: Robert Raszuk
> Cc: adamv0...@netconsultings.com; Saku Ytti; Juniper List
> Subject: Re: [j-nsp] L3VPN/RR/PE on Same router
> 
> Hi,
> 
> 
> 
> Le 17 août 2018 à 16:28, Robert Raszuk  a écrit :
> 
> >> and that thing would then crash BGP on RRs, can't afford that happening.
> >
> > Then best thing is to run two or three RRs in parallel each using
> > different BGP code base - even for the same AFI/SAFI pair
> >
> > I am seeing number of networks running single vendor RRs and when
> > things melt they run around and claim that the problem was was really
> > so rear and unexpected :) Well usually bugs are of unexpected nature  
> 
> And I have seen the opposite, ie networks running multiple vendor RRs,
> ending up with crashs because of buggy BGP implementations.
> 
> At the end of the day, it is a question of tossing a coin and hopping it will 
> fall
> on the right side.
> 
It's about increasing the odds of it to fall on the right side,

Yes you can have multiple vendors that have the same quagga/bird BGP message 
parser code,
But comparing say XR and Junos, judging from the rest of the inner workings I 
could experience empirically, I'd say they are sufficiently different 
implementations.
  

adam 

netconsultings.com
::carrier-class solutions for the telecommunications industry::

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Robert Raszuk
 > And I have seen the opposite, ie networks running multiple vendor RRs,
> ending up with crashs because of buggy BGP implementations.

Hmmm since usually IBGP RRs do not talk to each other (leave alone RR
hierarchy aside) what you are essentially endorsing is single vendor
networks right ?

If I have Cisco PEs and Juniper RRs by your description it may crash ...
hence better to avoid it - right ?.

Good thing this is thread about iBGP not eBGP :):)

Thx
R.

On Fri, Aug 17, 2018 at 4:43 PM, Youssef Bengelloun-Zahr  wrote:

> Hi,
>
>
>
> Le 17 août 2018 à 16:28, Robert Raszuk  a écrit :
>
> >> and that thing would then crash BGP on RRs, can't afford that happening.
> >
> > Then best thing is to run two or three RRs in parallel each using
> different
> > BGP code base - even for the same AFI/SAFI pair
> >
> > I am seeing number of networks running single vendor RRs and when things
> > melt they run around and claim that the problem was was really so rear
> and
> > unexpected :) Well usually bugs are of unexpected nature  
>
> And I have seen the opposite, ie networks running multiple vendor RRs,
> ending up with crashs because of buggy BGP implementations.
>
> At the end of the day, it is a question of tossing a coin and hopping it
> will fall on the right side.
>
> >
> > Thx,
> > R.
> >
> >
> > On Fri, Aug 17, 2018 at 4:05 PM,  wrote:
> >
> >>> From: Saku Ytti [mailto:s...@ytti.fi]
> >>> Sent: Friday, August 17, 2018 2:38 PM
> >>> To: Mark Tinka
> >>> Cc: adamv0...@netconsultings.com; tim tiriche; Juniper List
> >>> Subject: Re: [j-nsp] L3VPN/RR/PE on Same router
> >>>
> >>> Hey Mark,
> >>>
> >>>>> Yes a good practice is to separate internet routes from
> >>>>> internal/services l3vpn routes onto separate BGP control planes
> >>>>> (different sessions at least) so that malformed bgp msg will affect
> >>>>> just one part of your overall BGP infrastructure.
> >>>>
> >>>> I see you've been giving this advice for quite some time now.
> >>>
> >>> I'm siding with Adam here. His disaster scenario actually happed to me
> in
> >>> 3292. We ran for years VXR VPN route-reflectors, after we changed them
> to
> >>> MX240 we added lot more RR's, with some hard justifications to
> >>> management why we need more when we've had no trouble with the count
> >>> we had.
> >>> After about 3 months of running MX240 reflectors, we got bad BGP UPDATE
> >>> and crashed each reflector, which was unprecedented outage in the
> history
> >>> of the network. And tough to explain to management, considering we just
> >>> had made the reflection more redundant with some significant
> investment.
> >>> I'm sure they believed we just had cocked it up, as people don't really
> >>> believe in chance/randomness, evident how people justify that things
> >> can't
> >>> be broken, by explaining how in previous moment in time it wasn't
> broken,
> >>> implying that transitioning from non-broken to broken is impossible.
> >>>
> >>> Note, this is not to trash on Juniper, all vendors have bad BGP
> >>> implementations and I'm sure one can fuzz any of them to find crash
> bugs.
> >>>
> >> Oh yeah for sure, the XR RRs too were crashing upon reception of
> malformed
> >> BGP updates in the past.
> >>
> >> Currently XR BGP is *somewhat protected by the "BGP Attribute Filter and
> >> Enhanced Attribute Error
> >> Handling" (now RFC 7606) which already proved itself to me (just got a
> log
> >> msg informing me the malformed attribute was deleted instead of an
> >> important transit session reset).
> >> Unfortunately can't enable it on junos as the code we run would instead
> of
> >> session reset crashed the rpd due to a bug if the RFC 7606 feature
> would be
> >> enabled.
> >>
> >> *But still I'd be haunted by what could happen if RFC 7606 would have
> >> missed something and that thing would then crash BGP on RRs, can't
> afford
> >> that happening.
> >>
> >>
> >>> Not only is it CAPEX irrelevant to have separate RR for IPv4 and IPv6,
> >> but you
> >>> also get faster convergence, as more CPU cycles, fewer BGP neighbours,
> >> less
> >>> routes. I view it as cheap insurance as well as very simple horizontal
> >> scaling.
> >>>
> >> And going virtual this really is a marginal spend in the grand scheme of
> >> things.
> >>
> >> adam
> >>
> >> netconsultings.com
> >> ::carrier-class solutions for the telecommunications industry::
> >>
> >>
> >> ___
> >> juniper-nsp mailing list juniper-nsp@puck.nether.net
> >> https://puck.nether.net/mailman/listinfo/juniper-nsp
> >>
> > ___
> > juniper-nsp mailing list juniper-nsp@puck.nether.net
> > https://puck.nether.net/mailman/listinfo/juniper-nsp
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Youssef Bengelloun-Zahr
Hi,



Le 17 août 2018 à 16:28, Robert Raszuk  a écrit :

>> and that thing would then crash BGP on RRs, can't afford that happening.
> 
> Then best thing is to run two or three RRs in parallel each using different
> BGP code base - even for the same AFI/SAFI pair
> 
> I am seeing number of networks running single vendor RRs and when things
> melt they run around and claim that the problem was was really so rear and
> unexpected :) Well usually bugs are of unexpected nature  

And I have seen the opposite, ie networks running multiple vendor RRs, ending 
up with crashs because of buggy BGP implementations.

At the end of the day, it is a question of tossing a coin and hopping it will 
fall on the right side.

> 
> Thx,
> R.
> 
> 
> On Fri, Aug 17, 2018 at 4:05 PM,  wrote:
> 
>>> From: Saku Ytti [mailto:s...@ytti.fi]
>>> Sent: Friday, August 17, 2018 2:38 PM
>>> To: Mark Tinka
>>> Cc: adamv0...@netconsultings.com; tim tiriche; Juniper List
>>> Subject: Re: [j-nsp] L3VPN/RR/PE on Same router
>>> 
>>> Hey Mark,
>>> 
>>>>> Yes a good practice is to separate internet routes from
>>>>> internal/services l3vpn routes onto separate BGP control planes
>>>>> (different sessions at least) so that malformed bgp msg will affect
>>>>> just one part of your overall BGP infrastructure.
>>>> 
>>>> I see you've been giving this advice for quite some time now.
>>> 
>>> I'm siding with Adam here. His disaster scenario actually happed to me in
>>> 3292. We ran for years VXR VPN route-reflectors, after we changed them to
>>> MX240 we added lot more RR's, with some hard justifications to
>>> management why we need more when we've had no trouble with the count
>>> we had.
>>> After about 3 months of running MX240 reflectors, we got bad BGP UPDATE
>>> and crashed each reflector, which was unprecedented outage in the history
>>> of the network. And tough to explain to management, considering we just
>>> had made the reflection more redundant with some significant investment.
>>> I'm sure they believed we just had cocked it up, as people don't really
>>> believe in chance/randomness, evident how people justify that things
>> can't
>>> be broken, by explaining how in previous moment in time it wasn't broken,
>>> implying that transitioning from non-broken to broken is impossible.
>>> 
>>> Note, this is not to trash on Juniper, all vendors have bad BGP
>>> implementations and I'm sure one can fuzz any of them to find crash bugs.
>>> 
>> Oh yeah for sure, the XR RRs too were crashing upon reception of malformed
>> BGP updates in the past.
>> 
>> Currently XR BGP is *somewhat protected by the "BGP Attribute Filter and
>> Enhanced Attribute Error
>> Handling" (now RFC 7606) which already proved itself to me (just got a log
>> msg informing me the malformed attribute was deleted instead of an
>> important transit session reset).
>> Unfortunately can't enable it on junos as the code we run would instead of
>> session reset crashed the rpd due to a bug if the RFC 7606 feature would be
>> enabled.
>> 
>> *But still I'd be haunted by what could happen if RFC 7606 would have
>> missed something and that thing would then crash BGP on RRs, can't afford
>> that happening.
>> 
>> 
>>> Not only is it CAPEX irrelevant to have separate RR for IPv4 and IPv6,
>> but you
>>> also get faster convergence, as more CPU cycles, fewer BGP neighbours,
>> less
>>> routes. I view it as cheap insurance as well as very simple horizontal
>> scaling.
>>> 
>> And going virtual this really is a marginal spend in the grand scheme of
>> things.
>> 
>> adam
>> 
>> netconsultings.com
>> ::carrier-class solutions for the telecommunications industry::
>> 
>> 
>> ___
>> juniper-nsp mailing list juniper-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>> 
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Robert Raszuk
> and that thing would then crash BGP on RRs, can't afford that happening.

Then best thing is to run two or three RRs in parallel each using different
BGP code base - even for the same AFI/SAFI pair

I am seeing number of networks running single vendor RRs and when things
melt they run around and claim that the problem was was really so rear and
unexpected :) Well usually bugs are of unexpected nature  

Thx,
R.


On Fri, Aug 17, 2018 at 4:05 PM,  wrote:

> > From: Saku Ytti [mailto:s...@ytti.fi]
> > Sent: Friday, August 17, 2018 2:38 PM
> > To: Mark Tinka
> > Cc: adamv0...@netconsultings.com; tim tiriche; Juniper List
> > Subject: Re: [j-nsp] L3VPN/RR/PE on Same router
> >
> > Hey Mark,
> >
> > > > Yes a good practice is to separate internet routes from
> > > > internal/services l3vpn routes onto separate BGP control planes
> > > > (different sessions at least) so that malformed bgp msg will affect
> > > > just one part of your overall BGP infrastructure.
> > >
> > > I see you've been giving this advice for quite some time now.
> >
> > I'm siding with Adam here. His disaster scenario actually happed to me in
> > 3292. We ran for years VXR VPN route-reflectors, after we changed them to
> > MX240 we added lot more RR's, with some hard justifications to
> > management why we need more when we've had no trouble with the count
> > we had.
> > After about 3 months of running MX240 reflectors, we got bad BGP UPDATE
> > and crashed each reflector, which was unprecedented outage in the history
> > of the network. And tough to explain to management, considering we just
> > had made the reflection more redundant with some significant investment.
> > I'm sure they believed we just had cocked it up, as people don't really
> > believe in chance/randomness, evident how people justify that things
> can't
> > be broken, by explaining how in previous moment in time it wasn't broken,
> > implying that transitioning from non-broken to broken is impossible.
> >
> > Note, this is not to trash on Juniper, all vendors have bad BGP
> > implementations and I'm sure one can fuzz any of them to find crash bugs.
> >
> Oh yeah for sure, the XR RRs too were crashing upon reception of malformed
> BGP updates in the past.
>
> Currently XR BGP is *somewhat protected by the "BGP Attribute Filter and
> Enhanced Attribute Error
> Handling" (now RFC 7606) which already proved itself to me (just got a log
> msg informing me the malformed attribute was deleted instead of an
> important transit session reset).
> Unfortunately can't enable it on junos as the code we run would instead of
> session reset crashed the rpd due to a bug if the RFC 7606 feature would be
> enabled.
>
> *But still I'd be haunted by what could happen if RFC 7606 would have
> missed something and that thing would then crash BGP on RRs, can't afford
> that happening.
>
>
> > Not only is it CAPEX irrelevant to have separate RR for IPv4 and IPv6,
> but you
> > also get faster convergence, as more CPU cycles, fewer BGP neighbours,
> less
> > routes. I view it as cheap insurance as well as very simple horizontal
> scaling.
> >
> And going virtual this really is a marginal spend in the grand scheme of
> things.
>
> adam
>
> netconsultings.com
> ::carrier-class solutions for the telecommunications industry::
>
>
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread adamv0025
> From: Saku Ytti [mailto:s...@ytti.fi]
> Sent: Friday, August 17, 2018 2:38 PM
> To: Mark Tinka
> Cc: adamv0...@netconsultings.com; tim tiriche; Juniper List
> Subject: Re: [j-nsp] L3VPN/RR/PE on Same router
> 
> Hey Mark,
> 
> > > Yes a good practice is to separate internet routes from
> > > internal/services l3vpn routes onto separate BGP control planes
> > > (different sessions at least) so that malformed bgp msg will affect
> > > just one part of your overall BGP infrastructure.
> >
> > I see you've been giving this advice for quite some time now.
> 
> I'm siding with Adam here. His disaster scenario actually happed to me in
> 3292. We ran for years VXR VPN route-reflectors, after we changed them to
> MX240 we added lot more RR's, with some hard justifications to
> management why we need more when we've had no trouble with the count
> we had.
> After about 3 months of running MX240 reflectors, we got bad BGP UPDATE
> and crashed each reflector, which was unprecedented outage in the history
> of the network. And tough to explain to management, considering we just
> had made the reflection more redundant with some significant investment.
> I'm sure they believed we just had cocked it up, as people don't really
> believe in chance/randomness, evident how people justify that things can't
> be broken, by explaining how in previous moment in time it wasn't broken,
> implying that transitioning from non-broken to broken is impossible.
> 
> Note, this is not to trash on Juniper, all vendors have bad BGP
> implementations and I'm sure one can fuzz any of them to find crash bugs.
> 
Oh yeah for sure, the XR RRs too were crashing upon reception of malformed BGP 
updates in the past.  

Currently XR BGP is *somewhat protected by the "BGP Attribute Filter and 
Enhanced Attribute Error
Handling" (now RFC 7606) which already proved itself to me (just got a log msg 
informing me the malformed attribute was deleted instead of an important 
transit session reset). 
Unfortunately can't enable it on junos as the code we run would instead of 
session reset crashed the rpd due to a bug if the RFC 7606 feature would be 
enabled. 

*But still I'd be haunted by what could happen if RFC 7606 would have missed 
something and that thing would then crash BGP on RRs, can't afford that 
happening.


> Not only is it CAPEX irrelevant to have separate RR for IPv4 and IPv6, but you
> also get faster convergence, as more CPU cycles, fewer BGP neighbours, less
> routes. I view it as cheap insurance as well as very simple horizontal 
> scaling.
> 
And going virtual this really is a marginal spend in the grand scheme of things.

adam

netconsultings.com
::carrier-class solutions for the telecommunications industry::
 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread adamv0025
> From: Robert Raszuk [mailto:rob...@raszuk.net]
> Sent: Friday, August 17, 2018 9:57 AM
> To: Mark Tinka
> Cc: adamv0...@netconsultings.com; juniper-nsp@puck.nether.net; cisco-
> n...@puck.nether.net
> Subject: Re: [j-nsp] L3VPN/RR/PE on Same router
> 
> Hey Mark,
> 
> It has been a while 
> 
> > We've been running all address families on the same RR's (different
> > sessions, obviously, but same hardware)
> 
> Out of pure curiosity how are you setting up different BGP sessions to the
> same RR ?
> 
> I think what Adam is proposing is real TCP session isolation, what you may be
> doing is just same single TCP session, but different SAFIs which is not the
> same.
> 
Yes Robert, I was indeed proposing separate TCP sessions at least -as that's 
the only way to protect against the default behaviour of terminating session 
upon malformed bgp update reception.

> Sure you can configure parallel iBGP sessions on the TCP level say between
> different loopback addresses to the same RR, but what would that really buy
> you ? You could even be more brave and use BGP multisession code path (if
> happens to be even supported by your vendor) which in most
> implementations I have seen is full of holes like swiss cheese but is this 
> what
> you are doing ?
> 
Another alternative would be to spin up a separate BGP process, which I think 
is supported only in XR, but once again that somewhat places one on the 
outskirts of the common deployment graph.
But I know Mark is using csr1k -so depending on the available NFVI resources (I 
guess dedicated servers in this case), I think it's not that onerous to spin up 
yet another VM right?


adam

netconsultings.com
::carrier-class solutions for the telecommunications industry::

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Saku Ytti
Hey Mark,

> > Yes a good practice is to separate internet routes from internal/services
> > l3vpn routes onto separate BGP control planes (different sessions at least)
> > so that malformed bgp msg will affect just one part of your overall BGP
> > infrastructure.
>
> I see you've been giving this advice for quite some time now.

I'm siding with Adam here. His disaster scenario actually happed to me
in 3292. We ran for years VXR VPN route-reflectors, after we changed
them to MX240 we added lot more RR's, with some hard justifications to
management why we need more when we've had no trouble with the count
we had.
After about 3 months of running MX240 reflectors, we got bad BGP
UPDATE and crashed each reflector, which was unprecedented outage in
the history of the network. And tough to explain to management,
considering we just had made the reflection more redundant with some
significant investment. I'm sure they believed we just had cocked it
up, as people don't really believe in chance/randomness, evident how
people justify that things can't be broken, by explaining how in
previous moment in time it wasn't broken, implying that transitioning
from non-broken to broken is impossible.

Note, this is not to trash on Juniper, all vendors have bad BGP
implementations and I'm sure one can fuzz any of them to find crash
bugs.

Not only is it CAPEX irrelevant to have separate RR for IPv4 and IPv6,
but you also get faster convergence, as more CPU cycles, fewer BGP
neighbours, less routes. I view it as cheap insurance as well as very
simple horizontal scaling.

-- 
  ++ytti
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Sebastian Wiesinger
* tim tiriche  [2018-08-16 16:40]:
> Hello,
> 
> I have a MPLS PE (L3VPN) router that is acting as full mesh iBGP within the
> US.  The other routers in the US are not RR and regular iBGP.  This router
> also acts as RR for Europe and takes in full BGP table.  Is there some
> caveats to watch out for?

You will run into problems if you try to have a Hub-and-Spoke L3VPN
with a downstream hub on the PE. Routes do not get advertised because
they already got exported from one routing table to another.  Or how
Juniper states it in:

https://www.juniper.net/documentation/en_US/junos/topics/example/bgp-vpn-session-flap-prevention.html

"The route export is not performed if the route in instance.inet.0 is
a secondary route. In Junos OS, a route is only exported one time from
one routing table as a primary route to another routing table as a
secondary route. "

Same when you enable the "advertise-from-main-vpn-tables" knob in
global bgp config.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Robert Raszuk
Just to clarify ... I was not really worried about how to follow various
lists - mail client does a good job to combine them into one folder, filter
duplicates etc ...

But when writing general reply/question to Mark today about BGP sessions I
noticed it only had j-nsp - but oh the question is general so where do I
post ? I added c-nsp ... that was the trigger for the above comment.

On a similar note I would love to hear comments from all of the members on
what linux tools they use to test pps on the routers ... which list should
I post it to ?

Cheers
R.

On Fri, Aug 17, 2018 at 12:06 PM,  wrote:

> > PS.  Have not been reading -nsp aliases for a while, but now I see that I
> > missed a lot !  Btw do we really need per vendor aliases here ? Wouldn't
> it
> > be much easier to just have single nsp list ? After all we all most
> likely
> > have all of the vendors in our networks (including Nokia !) and we are
> all
> > likely reading all the lists :) Or maybe there is one already ?
>
> Disagree. I follow several of the -nsp lists, but some of them much
> more closely than others. Having them all mixed up would definitely
> make this more difficult.
>
> Steinar Haug, Nethelp consulting, sth...@nethelp.no
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread sthaug
> PS.  Have not been reading -nsp aliases for a while, but now I see that I
> missed a lot !  Btw do we really need per vendor aliases here ? Wouldn't it
> be much easier to just have single nsp list ? After all we all most likely
> have all of the vendors in our networks (including Nokia !) and we are all
> likely reading all the lists :) Or maybe there is one already ?

Disagree. I follow several of the -nsp lists, but some of them much
more closely than others. Having them all mixed up would definitely
make this more difficult.

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Mark Tinka


On 17/Aug/18 10:56, Robert Raszuk wrote:

> Hey Mark,
>
> It has been a while 

It has, mate. Good to see you in these parts again :-)...


>
> Out of pure curiosity how are you setting up different BGP sessions to
> the same RR ? 
>
> I think what Adam is proposing is real TCP session isolation, what you
> may be doing is just same single TCP session, but different SAFIs
> which is not the same.

You're right; I should have clarified that better - we are, indeed,
running one TCP session with multiple SAFI's.

The only uniqueness between BGP sessions at a TCP level would be by IP
protocol, i.e., IPv4 and IPv6. But even within IPv6, we carry multiple
SAFI's across a single TCP session.


>
> Sure you can configure parallel iBGP sessions on the TCP level say
> between different loopback addresses to the same RR, but what would
> that really buy you ? You could even be more brave and use BGP
> multisession code path (if happens to be even supported by your
> vendor) which in most implementations I have seen is full of holes
> like swiss cheese but is this what you are doing ?

I'm not that brave :-).

But to your point, the complete hardware and Layer 4 separation of BGP
sessions, perhaps going one step further and having separate planes for
different SAFI's, is overkill, IMHO. But that's just me.

As I mentioned before, we've had our setup since 2014. With the
exception of x86 hardware being more sensitive to temperature
situations, causing related failures, we haven't had any issues at all.


> PS.  Have not been reading -nsp aliases for a while, but now I see
> that I missed a lot !  Btw do we really need per vendor aliases here ?
> Wouldn't it be much easier to just have single nsp list ? After all we
> all most likely have all of the vendors in our networks (including
> Nokia !) and we are all likely reading all the lists :) Or maybe there
> is one already ?

There isn't one to rule them all, AFAIK. In fact, Arista-NSP went live
just yesterday, if I'm not mistaken :-).

I think there is value in having separate lists for the different
vendors. I wouldn't say all network operators have each of them to make
one list the ideal. Besides, there are a lot of things I have zero
interest in on one list that I wish I could filter out (SRX on j-nsp,
ASA on c-nsp, as examples). You can imagine what that'd be like on a
single list :-).

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-17 Thread Robert Raszuk
Hey Mark,

It has been a while 

> We've been running all address families on the same RR's (different
> sessions, obviously, but same hardware)

Out of pure curiosity how are you setting up different BGP sessions to the
same RR ?

I think what Adam is proposing is real TCP session isolation, what you may
be doing is just same single TCP session, but different SAFIs which is not
the same.

Sure you can configure parallel iBGP sessions on the TCP level say between
different loopback addresses to the same RR, but what would that really buy
you ? You could even be more brave and use BGP multisession code path (if
happens to be even supported by your vendor) which in most implementations
I have seen is full of holes like swiss cheese but is this what you are
doing ?

Cheers,
R,.

PS.  Have not been reading -nsp aliases for a while, but now I see that I
missed a lot !  Btw do we really need per vendor aliases here ? Wouldn't it
be much easier to just have single nsp list ? After all we all most likely
have all of the vendors in our networks (including Nokia !) and we are all
likely reading all the lists :) Or maybe there is one already ?


On Fri, Aug 17, 2018 at 7:06 AM, Mark Tinka  wrote:

>
>
> On 16/Aug/18 17:15, adamv0...@netconsultings.com wrote:
>
> > Yes a good practice is to separate internet routes from internal/services
> > l3vpn routes onto separate BGP control planes (different sessions at
> least)
> > so that malformed bgp msg will affect just one part of your overall BGP
> > infrastructure.
>
> I see you've been giving this advice for quite some time now.
>
> We've been running all address families on the same RR's (different
> sessions, obviously, but same hardware) for almost 5 years. The only
> reason sessions have gone down is due to hardware problems. It didn't
> disrupt services because there are always 2 RR's, but we haven't seen an
> outage due to protocol problems in one address family spilling over into
> other address families.
>
> Of course, I see your concern, but from our own experience over several
> years, I've not seen this issue.
>
> I mention this because introducing this kind of separation is onerous.
>
> Mark.
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-16 Thread Mark Tinka



On 16/Aug/18 17:15, adamv0...@netconsultings.com wrote:

> Yes a good practice is to separate internet routes from internal/services
> l3vpn routes onto separate BGP control planes (different sessions at least)
> so that malformed bgp msg will affect just one part of your overall BGP
> infrastructure.

I see you've been giving this advice for quite some time now.

We've been running all address families on the same RR's (different
sessions, obviously, but same hardware) for almost 5 years. The only
reason sessions have gone down is due to hardware problems. It didn't
disrupt services because there are always 2 RR's, but we haven't seen an
outage due to protocol problems in one address family spilling over into
other address families.

Of course, I see your concern, but from our own experience over several
years, I've not seen this issue.

I mention this because introducing this kind of separation is onerous.

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-16 Thread Alexander Arseniev via juniper-nsp

Hello,

Yes there is

https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/advertise-from-main-vpn-table-edit-protocols-bgp.html

Also, either don't configure "family route-target" on this combined 
PE/RR at all, or configure "family route-target advertise-default" in 
order to be able to receive routes from all VRFs in Your network.


HTH

Thanks

Alex


On 16/08/2018 15:39, tim tiriche wrote:

Hello,

I have a MPLS PE (L3VPN) router that is acting as full mesh iBGP within the
US.  The other routers in the US are not RR and regular iBGP.  This router
also acts as RR for Europe and takes in full BGP table.  Is there some
caveats to watch out for?
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-16 Thread adamv0025
> Of tim tiriche
> Sent: Thursday, August 16, 2018 3:40 PM
> To: juniper-nsp@puck.nether.net
> Subject: [j-nsp] L3VPN/RR/PE on Same router
> 
> Hello,
> 
> I have a MPLS PE (L3VPN) router that is acting as full mesh iBGP within
the
> US.  The other routers in the US are not RR and regular iBGP.  This router
also
> acts as RR for Europe and takes in full BGP table.  Is there some caveats
to
> watch out for?

Yes a good practice is to separate internet routes from internal/services
l3vpn routes onto separate BGP control planes (different sessions at least)
so that malformed bgp msg will affect just one part of your overall BGP
infrastructure.

adam

netconsultings.com
::carrier-class solutions for the telecommunications industry::


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] L3VPN/RR/PE on Same router

2018-08-16 Thread Alexander Marhold
Yes, the PE should do next-hop-self, the RR should not do it
Route reflector can also be EBGP-Border Router, 
General use of next-hop self can result in inefficient forwarding

 use next-hop self only for EBGP learned routes

policy-statement bgp-export {
term ebgp {
from route-type external;
then {
next-hop self;
accept;
}
}
term ibgp {
from route-type internal;
then accept;
}
}

regards

alexander


-Ursprüngliche Nachricht-
Von: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] Im Auftrag von 
tim tiriche
Gesendet: Donnerstag, 16. August 2018 16:40
An: juniper-nsp@puck.nether.net
Betreff: [j-nsp] L3VPN/RR/PE on Same router

Hello,

I have a MPLS PE (L3VPN) router that is acting as full mesh iBGP within the
US.  The other routers in the US are not RR and regular iBGP.  This router
also acts as RR for Europe and takes in full BGP table.  Is there some
caveats to watch out for?
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] L3VPN/RR/PE on Same router

2018-08-16 Thread tim tiriche
Hello,

I have a MPLS PE (L3VPN) router that is acting as full mesh iBGP within the
US.  The other routers in the US are not RR and regular iBGP.  This router
also acts as RR for Europe and takes in full BGP table.  Is there some
caveats to watch out for?
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp