Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Alexander Arseniev via juniper-nsp
Hello, On 25/01/2019 16:50, Luis Balbinot wrote: Please let me know if you find some other approach. The overload bit helps but in the absence of another path the RSVP FRR mechanism will setup a bypass LSP through a node with the overload bit set. And link coloring does not help, at least in my

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Luis Balbinot
I've tried that before but those settings under RSVP don't seem to affect FRR LSPs. I tried that at the node I don't want to allow transit LSPs and at the previous node to that. Am I missing something? There has to be a way to avoid it. I have around 5000 tunnels in my production network and I don

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Tom Beecher
So I missed your specific comment about being concerned about the bypass LSPs. I think (although I haven't tested this in forever) if you enable no-node-protection under RSVP , that will prevent those interfaces from being available for any node or link bypass LSP to use. On Fri, Jan 25, 2019 at

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Luis Balbinot
Please let me know if you find some other approach. The overload bit helps but in the absence of another path the RSVP FRR mechanism will setup a bypass LSP through a node with the overload bit set. And link coloring does not help, at least in my case. Luis On Fri, Jan 25, 2019 at 11:20 AM Jason

Re: [j-nsp] DNS Flag Day

2019-01-25 Thread Sander Steffann
Hi Melchior, > Thanks for pointing this out. Please have a look at > https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1379433 and > let me know your ideas. Yep, that sounds exactly like what's happening! "Resolved In 15.1X49-D160 17.4R3 18.1R3 18.2R2 18.3R1 18.4R1" sounds hope

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Jason Lixfeld
I’m testing a similar approach (except using the ISIS overload bit) that aims to prevent the path between a pair of LSRs via the links to and through my RRs from being considered as a possible transit path. Seems to work just fine in the lab. > On Jan 24, 2019, at 3:24 PM, Luis Balbinot wrote

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Mark Tinka
On 25/Jan/19 14:53, Luis Balbinot wrote: > It works. The only drawback is that all metrics on the local routing > table (not only for advertised LSAs) were increased by 65535. That's a > bit annoying but works just fine. The increase is relative to the > actual metric so we'll see values above

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Luis Balbinot
It works. The only drawback is that all metrics on the local routing table (not only for advertised LSAs) were increased by 65535. That's a bit annoying but works just fine. The increase is relative to the actual metric so we'll see values above 65535. Not sure if I'm moving to this approach or ju

Re: [j-nsp] DNS Flag Day

2019-01-25 Thread Niall Donaghy
One of our SRXes was blocking EDNSv1, and so we disabled the DNS ALG to resolve our issue; this might be a prudent approach depending on your environment. Not sure this will help the OP as the device(s) in question are outside their administrative domain. :) HTH, Niall -Original Message-

Re: [j-nsp] DNS Flag Day

2019-01-25 Thread Havard Eidnes
> What they told you sounds like bullshit to me. From 10.2 on > there are no special settings required. Maybe they don't know > how to do it? > > So I guess they are just very lazy or don't know better and > blame the firewall... I pray for you that they don't run Code > below 10.2... > > https://

Re: [j-nsp] DNS Flag Day

2019-01-25 Thread Olivier Benghozi
It would mean that they run something older than 10.2 JunOS, that is a prehistoric release, which would be criminal in term of security. Anyway, putting stateful firewalls in front of DNS servers is a nonsense from the beginning. > Le 25 janv. 2019 à 13:06, Christian Scholz a écrit : > > What

Re: [j-nsp] DNS Flag Day

2019-01-25 Thread Christian Scholz
What they told you sounds like bullshit to me. From 10.2 on there are no special settings required. Maybe they don’t know how to do it? So I guess they are just very lazy or don’t know better and blame the firewall... I pray for you that they don’t run Code below 10.2... https://kb.juniper.net/

Re: [j-nsp] DNS Flag Day

2019-01-25 Thread sthaug
> When doing some investigation for the upcoming DNS Flag Day > (https://dnsflagday.net: February 1st 2019) I got some bad news from one of > the service providers: they use Juniper SRX firewalls, and claim that they > can't properly support EDNS because of a bug in their SRX firewalls. This >

[j-nsp] DNS Flag Day

2019-01-25 Thread Sander Steffann
Hi, When doing some investigation for the upcoming DNS Flag Day (https://dnsflagday.net: February 1st 2019) I got some bad news from one of the service providers: they use Juniper SRX firewalls, and claim that they can't properly support EDNS because of a bug in their SRX firewalls. This seems

Re: [j-nsp] Junos and single IPv6 link-local address per IFL

2019-01-25 Thread Martin T
Hi Charles, > fe80:0001::::/64 is not valid as a link-local address and I've run > into vendors that have issues with such addresses. Oh, ok. I understand now what you meant. Good to know. Martin ___ juniper-nsp mailing list juniper-nsp@puck.

Re: [j-nsp] Avoid transit LSPs

2019-01-25 Thread Mark Tinka
On 24/Jan/19 22:24, Luis Balbinot wrote: > That’s a good idea. I’m not 100% sure that this will prevent the creation > of bypass LSPs but I’ll give it a try. In theory, that should work, as the node will, effectively, be taken out of the IS-IS path (and all ensuing support services). Would be