On Wed, 20 Feb 2008, Lukasz Trabinski wrote:
Jan 23 03:40:38 r4 smartd[4216]: standby_request: Error:
atastandbyarmset(TRUE): Inappropriate ioctl for device
Jan 23 05:05:44 r3 smartd[4185]: atastandbyarmset: ioctl: Inappropriate
ioctl for device
My question is, is it big problem for
Hello
After upgrade JunOS to 8.5R1.14 and according to PR/253775 and
http://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2008-02-011actionBtn=Search
I have got:
Jan 23 03:40:38 r4 smartd[4216]: standby_request: Error:
atastandbyarmset(TRUE): Inappropriate ioctl for device
Jan 23
On Wed, 20 Feb 2008, Pekka Savola wrote:
This means that JunOS would have spun off the disk but didn't due to a bug.
So it's more than just disk monitoring.
This may have impact on the lifetime of the routing engine, but which way is
not very clear to me (spinning up and down the disk
Please the recently-issued Technical Bulletin on this...
https://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2008-02-011actionBtn=Search
(Requires login accessot the Juniper support web-site.)
Paul Goyette
Juniper Networks Customer Service
JTAC Senior Escalation Engineer
PGP Key ID
Ack, thanks everyone for the advice. I'll try out the various options
in our test lab and see what works. Thanks again for the quick replies!
Network Engineer
214-981-1954 (office)
214-642-4075 (cell)
[EMAIL PROTECTED]
http://www.speakeasy.net
-Original Message-
From: E.S
Find a friend with a full BGP feed and set up an ebgp multihop peer to them?
Just make sure to filter updates out (and hopefully he/she is filtering in
from you) to cover those oops moments.
:)
HTH,
Scott
PS. Otherwise, there's a lot of Cut/Paste involved and Ctrl-H for
Search/Replace.
If you can get a full route table from someone you can play it back to your
routers in your testbed by using RouteM.
HTH.
Stefan Fouant
On Feb 20, 2008 12:03 PM, wang dong bei [EMAIL PROTECTED] wrote:
Hi talented minds,
I want to do some testing with BGP and I need to inject a lots of
There are several products that can generate routes for testing depending
on your budget. IXIA devices for example will do this and more. I wanted
to the same thing a few months ago and I ended ip logging into a few route
servers and outputting a sh route/sh ip route to a text file. Then I
IMHO' In these modern times explicitly set ip mtu at all times. Will save a lot
of trouble in the long run. I suggest this in view of PWE3, QinQ, etc.
- original message -
Subject:Re: [j-nsp] Help with OSPF config
From: Scott Morris [EMAIL PROTECTED]
Date: 19/02/2008 15:15
Sleep time improves the reliability of all hard drives
in use, including those rated for extended duty.
Paul Goyette
Juniper Networks Customer Service
JTAC Senior Escalation Engineer
PGP Key ID 0x53BA7731 Fingerprint:
FA29 0E3B 35AF E8AE 6651
0786 F758 55DE 53BA 7731
-Original
does anybody here know what kind of packet sampling does j-flow implement?
- deterministic: 1 packet out of N
- random: 1 packet with probability 1/N
- stratified random: 1 random packet out of every consecutive N.
thanks!
Fernando Silveira
___
They were actually three different groups of a few thousand routes each. I
had routers peered with different ISP AS numbers so that the origins would
be realistic. Even then the whole screen goes blank for about 30 seconds
or so, but it makes it to the end eventually... Besides this is just
Hi dong bei
If your main problem is in loading the configuration inside the router
be sure to do it with a load merge terminal with several routes like
this:
static {
route 1.2.3.4/24 discard;
}
Instead of loading the set commands like this:
set routing-options static route
Hello, all,
On our Juniper router, we constantly see people trying to connect through SSH.
I've tried everything I can find to eliminate it. The following is what I've
done so far. Just wondering if there is a better way to stop it on the router
(we do block port ssh on every link). Thanks in
You could apply a filter on your loopback interface (RE filter) that
only allows SSH from specific destinations.
Ken
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ying Zhang
Sent: Wednesday, February 20, 2008 1:15 PM
To: juniper-nsp@puck.nether.net
On Wed, Feb 20, 2008 at 04:15:04PM -0400, Ying Zhang wrote:
Hello, all,
On our Juniper router, we constantly see people trying to connect through
SSH. I've tried everything I can find to eliminate it. The following is what
I've done so far. Just wondering if there is a better way to stop
On Wed, Feb 20, 2008 at 04:15:04PM -0400, Ying Zhang wrote:
Hello, all,
On our Juniper router, we constantly see people trying to connect
through SSH. I've tried everything I can find to eliminate it. The
following is what I've done so far. Just wondering if there is a
better way to stop
You should also include other common services in the filter such as SNMP,
BGP, telnet, or use a default deny and permit as needed.
Dan Goscomb [EMAIL PROTECTED]
Sent by: [EMAIL PROTECTED]
02/20/08 06:20 PM
To
Ying Zhang [EMAIL PROTECTED]
cc
juniper-nsp@puck.nether.net
Subject
Re: [j-nsp]
I recommend reading this:
http://www.cymru.com/gillsr/documents/junos-template.htm
There are lots of other useful templates at http://www.cymru.com/.
Stephen
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
Is there a way to convert Juniper MD5 secrets to Cisco format?
Thanks,
Joe
Joe McGuckin
ViaNet Communications
[EMAIL PROTECTED]
650-207-0372 cell
650-213-1302 office
650-969-2124 fax
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
On Thursday 21 February 2008, Chuck Anderson wrote:
Instead of blocking SSH on every link, block it on lo0.
Firewall filters applied to the lo0 interface are applied
to the Routing Engine itself. Be careful if you apply
filters here--be sure to allow any routing protocols into
the Routing
On (2008-02-20 17:58 -0800), joe mcguckin wrote:
Is there a way to convert Juniper MD5 secrets to Cisco format?
Well by definition MD5 can't be converted back to anything meaningful
However, JNPR does have two-way encryption, which I know has been cracked
(most likely by many parties
22 matches
Mail list logo