> Indeed, when I check the session table on the SRX. I do get an entry for
> the
> BGP session, but it dissapears after only a few seconds. That seems wrong
> to
> me.
>

You mean a firewall session in "show security flow session"? If so, let me
express my doubts, an MTU related issue could make it close immediately. If
Harry's quick test with decreasing MSS doesn't help, you'd rather unpack
your sniffer and check if someone sends a TCP RST.

We ran into a similar issue when a broken switch (BTW, an EX3200) flooded
the frames carrying BGP packets instead of switching them. In addition it
was not a P2P VLAN, other routers existed in the broadcast domain of the BGP
peering subnet. As as result BGP peers received several copies of each
packet. After a few attempts to sort out what happens, one of the peers sent
a TCP RST, closing the FW session, but (I don't really remember why) not
closing the BGP session on the peer itself. Which in turn led to "Hold down
timer expired". Then the BGP session reestablished and the whole thing
repeated again.

In my case it was iBGP, so at the SRX side traffic passed from ingress IFL
to loopback, falling under security policy with "log on close" option
enabled. This is how we discovered the TCP RST.
_______________________________________________
juniper-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to