Re: [j-nsp] IPv6 firewall filter for Route-Engine protection

2012-08-17 Thread Georgios Vlachos
Hello Harry and all,

Is there any update on how we can possibly match the second next-header?
As far as I know this affects all Junos products, currently only the first
header can be checked, correct?

Thank you,
George




-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Harry Reynolds
Sent: Tuesday, January 24, 2012 12:26 AM
To: Alex D.; Juniper-Nsp
Subject: Re: [j-nsp] IPv6 firewall filter for Route-Engine protection

You want to use next-header keyword matches for v6. Note, you can opnly
match on one/the first next-header.

From:
http://tools.ietf.org/html/rfc6192#appendix-A.2


family inet6 {
   filter protect-router-control-plane-v6 {
   term fragv6 {
   from {
   next-header fragment;
   }
   then {
   count frag-v6-discards;
   log;
   discard;
   }
   }








Dugal, et al. Informational[Page 21]

 
RFC 6192  Protect Router Control PlaneMarch 2011


   term icmpv6 {
   from {
   next-header icmpv6;
   }
   then {
   policer 500kbps;
   accept;
   }
   }
   term ospfv3 {
   from {
   source-address {
   FE80::/10;
   }
   next-header ospf;
   }
   then accept;
   }
   term ibgpv6-connect {
   from {
   source-prefix-list {
   IBGPv6-NEIGHBORS;
   }
   next-header tcp;
   destination-port bgp;
   }
   then accept;
   }
   term ibgpv6-reply {
   from {
   source-prefix-list {
   IBGPv6-NEIGHBORS;
   }
   next-header tcp;
   port bgp;
   }
   then accept;
   }
   term ebgpv6-connect {
   from {
   source-prefix-list {
   EBGPv6-NEIGHBORS;
   }
   next-header tcp;
   destination-port bgp;
   }
   then accept;
   }


HTHs




-Original Message-
From: juniper-nsp-boun...@puck.nether.net
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Alex D.
Sent: Monday, January 23, 2012 2:22 PM
To: Juniper-Nsp
Subject: [j-nsp] IPv6 firewall filter for Route-Engine protection

Hello guys,

i try to build a basic inet6 firewall filter for Route-Engine protection 
on Juniper MX80 running JUNOS 10.4R8.5.
It seems that there is no support for protocol match in from statement.
Is there actually no possibility for protocol match (e.g. tcp, udp, 
ospf3) or do i forget something ?

Can someone give me a hint for a basic filter ?

Regards,
Alex
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

[j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Clarke Morledge
We have had the unfortunate experience of having users plug in small 
mini-switches into our network that have the capability of filtering out 
(by-default) BPDUs while allowing other traffic through.  The nightmare 
situation is when a user plugs in such a switch accidentally into two of 
our EX switches.  Traffic will loop through the miscreant switch between 
the two EXs and without BPDUs it just looks like MAC addresses keep moving 
between the real source and the two EXs.


In an MX environment running VPLS, this problem can happen easily as there 
are no BPDUs even to protect against loops in VPLS, particularly when your 
VPLS domain ties into a Spanning Tree domain downstream where your 
potential miscreant switch may appear.


I am curious to know if anyone has come up with strategies to kill these 
loops for EXs running Spanning Tree and/or MXs running VPLS. 
Rate-limiting may help, but it doesn't kill loops completely.  I am 
looking for ways to detect lots of MAC address moves (without polling for 
them) and blocking those interfaces involved when those MAC moves exceed a 
certain threshold via some trigger mechanism.


Assume Junos 10.4R10 or more recent.

Clarke Morledge
College of William and Mary
Information Technology - Network Engineering
Jones Hall (Room 18)
Williamsburg VA 23187
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Clarke Morledge

On Fri, 17 Aug 2012, Jensen Tyler wrote:


Quick google for VPLS Multihoming found me this:

http://www.juniper.net/techpubs/en_US/junos9.6/information-products/topic-collections/feature-guide/vpls-multihoming-bgp-signaling-solutions.html

Jensen Tyler
Sr Engineering Manager
Fiberutilities Group, LLC


Jensen,

VPLS multihoming assumes you are intentionally building out a loop-free 
VPLS domain.  My situation is when you have a downstream customer who 
unintentionally introduces a loop in their Layer2 domain that causes MAC 
learning table thrashing back inside your VPLS instance.


Thanks for the pointer though.

Clarke Morledge
College of William and Mary
Information Technology - Network Engineering
Jones Hall (Room 18)
Williamsburg VA 23187
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Jensen Tyler
Quick google for VPLS Multihoming found me this:

http://www.juniper.net/techpubs/en_US/junos9.6/information-products/topic-collections/feature-guide/vpls-multihoming-bgp-signaling-solutions.html

Jensen Tyler
Sr Engineering Manager
Fiberutilities Group, LLC

-Original Message-
From: juniper-nsp-boun...@puck.nether.net 
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Clarke Morledge
Sent: Friday, August 17, 2012 10:09 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less 
situations?

We have had the unfortunate experience of having users plug in small 
mini-switches into our network that have the capability of filtering out
(by-default) BPDUs while allowing other traffic through.  The nightmare 
situation is when a user plugs in such a switch accidentally into two of our EX 
switches.  Traffic will loop through the miscreant switch between the two EXs 
and without BPDUs it just looks like MAC addresses keep moving between the real 
source and the two EXs.

In an MX environment running VPLS, this problem can happen easily as there are 
no BPDUs even to protect against loops in VPLS, particularly when your VPLS 
domain ties into a Spanning Tree domain downstream where your potential 
miscreant switch may appear.

I am curious to know if anyone has come up with strategies to kill these loops 
for EXs running Spanning Tree and/or MXs running VPLS. 
Rate-limiting may help, but it doesn't kill loops completely.  I am looking for 
ways to detect lots of MAC address moves (without polling for
them) and blocking those interfaces involved when those MAC moves exceed a 
certain threshold via some trigger mechanism.

Assume Junos 10.4R10 or more recent.

Clarke Morledge
College of William and Mary
Information Technology - Network Engineering Jones Hall (Room 18) Williamsburg 
VA 23187 ___
juniper-nsp mailing list juniper-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Wayne Tucker
On Fri, Aug 17, 2012 at 8:08 AM, Clarke Morledge chm...@wm.edu wrote:
 We have had the unfortunate experience of having users plug in small
 mini-switches into our network that have the capability of filtering out
 (by-default) BPDUs while allowing other traffic through.  The nightmare
 situation is when a user plugs in such a switch accidentally into two of our
 EX switches.  Traffic will loop through the miscreant switch between the two
 EXs and without BPDUs it just looks like MAC addresses keep moving between
 the real source and the two EXs.

This is probably not the answer you're looking for, but the best
solution is to not bridge to your access switches.  Everything in the
EX series is capable of routing, so why not take advantage of that
functionality?

Barring that, your options are: storm control, MAC limiting, and MAC
move limiting.

I've never found storm control to be that useful.  It reduces the
volume of frames but usually not enough to cancel out all of the
negative effects.

MAC limiting with a reasonable MAC limit on a port can cause the port
to be disabled if too many addresses are seen coming from said port.

MAC move limiting is configured per VLAN.  It can detect a layer 2
loop with a smaller number of MAC addresses than MAC limiting would,
but my concern has always been that (as far as I can tell) there's no
way to determine which interface would end up being disabled - it
would be bad to have it pick a trunk between your core switches
instead of the trunk to the IDF.

None of these will ever be as effective as routing.


 In an MX environment running VPLS, this problem can happen easily as there
 are no BPDUs even to protect against loops in VPLS, particularly when your
 VPLS domain ties into a Spanning Tree domain downstream where your potential
 miscreant switch may appear.

I believe there was a thread on here within the last month about an
event script for the MX platform that would do just that.  Going back
to the first section, though, you should think thrice before doing
VPLS - Ivan PepeInjak has some good articles about the hazards of L2
across your wan on his blog.

HTH

:w
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Alexander Bochmann
Hi,

...on Fri, Aug 17, 2012 at 11:08:53AM -0400, Clarke Morledge wrote:
  switch accidentally into two of our EX switches.  Traffic will loop
  through the miscreant switch between the two EXs and without BPDUs
  it just looks like MAC addresses keep moving between the real
  source and the two EXs.

Not that I've used it myself yet, but the aptly named MAC Move Limiting 
might help here, though usefulness might depend on the actual topology::

http://www.juniper.net/techpubs/en_US/junos10.4/topics/concept/port-security-mac-limiting-and-mac-move-limiting.html

Alex.

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Ge Moua

What about TRILL? Not sure if Juniper has jumped on the TRILL bandwagon yet.


--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 08/17/2012 11:06 AM, Wayne Tucker wrote:

On Fri, Aug 17, 2012 at 8:08 AM, Clarke Morledgechm...@wm.edu  wrote:

We have had the unfortunate experience of having users plug in small
mini-switches into our network that have the capability of filtering out
(by-default) BPDUs while allowing other traffic through.  The nightmare
situation is when a user plugs in such a switch accidentally into two of our
EX switches.  Traffic will loop through the miscreant switch between the two
EXs and without BPDUs it just looks like MAC addresses keep moving between
the real source and the two EXs.

This is probably not the answer you're looking for, but the best
solution is to not bridge to your access switches.  Everything in the
EX series is capable of routing, so why not take advantage of that
functionality?

Barring that, your options are: storm control, MAC limiting, and MAC
move limiting.

I've never found storm control to be that useful.  It reduces the
volume of frames but usually not enough to cancel out all of the
negative effects.

MAC limiting with a reasonable MAC limit on a port can cause the port
to be disabled if too many addresses are seen coming from said port.

MAC move limiting is configured per VLAN.  It can detect a layer 2
loop with a smaller number of MAC addresses than MAC limiting would,
but my concern has always been that (as far as I can tell) there's no
way to determine which interface would end up being disabled - it
would be bad to have it pick a trunk between your core switches
instead of the trunk to the IDF.

None of these will ever be as effective as routing.



In an MX environment running VPLS, this problem can happen easily as there
are no BPDUs even to protect against loops in VPLS, particularly when your
VPLS domain ties into a Spanning Tree domain downstream where your potential
miscreant switch may appear.

I believe there was a thread on here within the last month about an
event script for the MX platform that would do just that.  Going back
to the first section, though, you should think thrice before doing
VPLS - Ivan PepeInjak has some good articles about the hazards of L2
across your wan on his blog.

HTH

:w
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Tricks for killing L2 loops in VPLS and STP BPDU-less situations?

2012-08-17 Thread Chris Kawchuk
Hi Clarke,

We pass through BPDUs through VPLS the MX'es- but yes, miscreant users / 
switches will always be a problem.

We do the following to every customer-facing VPLS instance, but only #3 would 
help you here:

1. Mac Limiting per VPLS Interface (100) (i.e per 'site')
2. Mac Limiting per VPLS (500)
3. Limit Broadcast/Unknown Unicast/Multicast Traffic (5 Mbit) into the VPLS

You can put on an input firewall filter which calls a 5 Mbit policer at 
[routing instances vpls-name forwarding-options family vpls ] to start 
limiting this type of traffic into the 'bridge domain' at any time.

- CK.


On 18/08/2012, at 1:08 AM, Clarke Morledge chm...@wm.edu wrote:

 We have had the unfortunate experience of having users plug in small 
 mini-switches into our network that have the capability of filtering out 
 (by-default) BPDUs while allowing other traffic through.  The nightmare 
 situation is when a user plugs in such a switch accidentally into two of our 
 EX switches.  Traffic will loop through the miscreant switch between the two 
 EXs and without BPDUs it just looks like MAC addresses keep moving between 
 the real source and the two EXs.
 
 In an MX environment running VPLS, this problem can happen easily as there 
 are no BPDUs even to protect against loops in VPLS, particularly when your 
 VPLS domain ties into a Spanning Tree domain downstream where your potential 
 miscreant switch may appear.
 
 I am curious to know if anyone has come up with strategies to kill these 
 loops for EXs running Spanning Tree and/or MXs running VPLS. Rate-limiting 
 may help, but it doesn't kill loops completely.  I am looking for ways to 
 detect lots of MAC address moves (without polling for them) and blocking 
 those interfaces involved when those MAC moves exceed a certain threshold via 
 some trigger mechanism.
 
 Assume Junos 10.4R10 or more recent.
 
 Clarke Morledge
 College of William and Mary
 Information Technology - Network Engineering
 Jones Hall (Room 18)
 Williamsburg VA 23187
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] QFX3500 LLDP service crash

2012-08-17 Thread Sergey T

Hi!

(platform:QFX3500, junos:12.2X50-D10.3)

Have a problem with LLDP service on QFX3500
Service never starts on boot without any log-lines.
When i try to restart it manually have that crash-report:

serj@qfx3500-p2a restart lldpd-service
error: Link Layer Discovery Protocol is not running
Link Layer Discovery Protocol started, pid 90798

serj@qfx3500-p2a show log messages
Aug 18 03:50:04  qfx3500-p2a mgd[41086]: UI_RESTART_EVENT: User 'serj' 
restarting daemon 'Link Layer Discovery Protocol'

Aug 18 03:50:04  qfx3500-p2a init: lldpd-service (PID 90798) started
Aug 18 03:50:04  qfx3500-p2a /kernel: cpuid = 0
Aug 18 03:50:04  qfx3500-p2a /kernel: BAD_PAGE_FAULT: pid 90798 (lldpd), 
uid 0: pc 0x57bca4 got a read fault at 0x4

Aug 18 03:50:04  qfx3500-p2a /kernel: Trapframe Register Dump:
Aug 18 03:50:04  qfx3500-p2a /kernel:   zero:   at: 0001 
v0: 0004v1: 0189
Aug 18 03:50:04  qfx3500-p2a /kernel:   a0: 0004a1: 0005 
a2: 00a22190a3: 0001
Aug 18 03:50:04  qfx3500-p2a /kernel:   t0: 002bt1: 77feb62d 
t2: 77feb62dt3: 
Aug 18 03:50:04  qfx3500-p2a /kernel:   t4: ff00t5:  
t6: t7: 001c
Aug 18 03:50:04  qfx3500-p2a /kernel:   t8: 00fft9: 0057bc50 
s0: 0004s1: 0001
Aug 18 03:50:04  qfx3500-p2a /kernel:   s2: 0001s3:  
s4: 00a09c00s5: 
Aug 18 03:50:04  qfx3500-p2a /kernel:   s6: 00a0c000s7: 0001 
k0: k1: 
Aug 18 03:50:04  qfx3500-p2a /kernel:   gp: 00979120sp: 77feaf00 
s8: 77feaf00ra: 0057bc34

Aug 18 03:50:04  qfx3500-p2a /kernel:   sr: 50809813badvaddr: 0004
Aug 18 03:50:04  qfx3500-p2a /kernel:   mullo: 000c mulhi: 
Aug 18 03:50:04  qfx3500-p2a /kernel:   cause: 0008 pc: 0057bca4
Aug 18 03:50:04  qfx3500-p2a /kernel: Page table info for pc address 
0x57bca4: pde = 0x87d6b000, pte = 0x4109271a
Aug 18 03:50:04  qfx3500-p2a /kernel: Dumping 4 words starting at pc 
address 0x57bca4:

Aug 18 03:50:04  qfx3500-p2a /kernel: 8c42 afc20020 8fc20020 1444
Aug 18 03:50:05  qfx3500-p2a init: lldpd-service (PID 90798) terminated 
by signal number 11. Core dumped!

Aug 18 03:50:22  qfx3500-p2a init: lldpd-service is thrashing, not restarted

Somebody have any ideas?

--
Sergey Tkachenko
+38-050-3266737
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] QFX3500 LLDP service crash

2012-08-17 Thread Brent Jones
On Fri, Aug 17, 2012 at 5:56 PM, Sergey T pu...@puhis.net wrote:

 Hi!

 (platform:QFX3500, junos:12.2X50-D10.3)

 Have a problem with LLDP service on QFX3500
 Service never starts on boot without any log-lines.
 When i try to restart it manually have that crash-report:

 serj@qfx3500-p2a restart lldpd-service
 error: Link Layer Discovery Protocol is not running
 Link Layer Discovery Protocol started, pid 90798

 serj@qfx3500-p2a show log messages
 Aug 18 03:50:04  qfx3500-p2a mgd[41086]: UI_RESTART_EVENT: User 'serj'
 restarting daemon 'Link Layer Discovery Protocol'
 Aug 18 03:50:04  qfx3500-p2a init: lldpd-service (PID 90798) started
 Aug 18 03:50:04  qfx3500-p2a /kernel: cpuid = 0
 Aug 18 03:50:04  qfx3500-p2a /kernel: BAD_PAGE_FAULT: pid 90798 (lldpd),
 uid 0: pc 0x57bca4 got a read fault at 0x4
 Aug 18 03:50:04  qfx3500-p2a /kernel: Trapframe Register Dump:
 Aug 18 03:50:04  qfx3500-p2a /kernel:   zero:   at: 0001 v0:
 0004v1: 0189
 Aug 18 03:50:04  qfx3500-p2a /kernel:   a0: 0004a1: 0005 a2:
 00a22190a3: 0001
 Aug 18 03:50:04  qfx3500-p2a /kernel:   t0: 002bt1: 77feb62d t2:
 77feb62dt3: 
 Aug 18 03:50:04  qfx3500-p2a /kernel:   t4: ff00t5:  t6:
 t7: 001c
 Aug 18 03:50:04  qfx3500-p2a /kernel:   t8: 00fft9: 0057bc50 s0:
 0004s1: 0001
 Aug 18 03:50:04  qfx3500-p2a /kernel:   s2: 0001s3:  s4:
 00a09c00s5: 
 Aug 18 03:50:04  qfx3500-p2a /kernel:   s6: 00a0c000s7: 0001 k0:
 k1: 
 Aug 18 03:50:04  qfx3500-p2a /kernel:   gp: 00979120sp: 77feaf00 s8:
 77feaf00ra: 0057bc34
 Aug 18 03:50:04  qfx3500-p2a /kernel:   sr: 50809813badvaddr: 0004
 Aug 18 03:50:04  qfx3500-p2a /kernel:   mullo: 000c mulhi: 
 Aug 18 03:50:04  qfx3500-p2a /kernel:   cause: 0008 pc: 0057bca4
 Aug 18 03:50:04  qfx3500-p2a /kernel: Page table info for pc address
 0x57bca4: pde = 0x87d6b000, pte = 0x4109271a
 Aug 18 03:50:04  qfx3500-p2a /kernel: Dumping 4 words starting at pc
 address 0x57bca4:
 Aug 18 03:50:04  qfx3500-p2a /kernel: 8c42 afc20020 8fc20020 1444
 Aug 18 03:50:05  qfx3500-p2a init: lldpd-service (PID 90798) terminated by
 signal number 11. Core dumped!
 Aug 18 03:50:22  qfx3500-p2a init: lldpd-service is thrashing, not
 restarted

 Somebody have any ideas?

 --
 Sergey Tkachenko
 +38-050-3266737
 __**_
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/**mailman/listinfo/juniper-nsphttps://puck.nether.net/mailman/listinfo/juniper-nsp


I would stick with recommended releases (11.3R5.5 afaik).
I run 11.3R5.3 right now without any problems (besides some 3rd party
optics still locked out by Juniper).
If you follow every release, you will be hurting.

-- 
Brent Jones
br...@brentrjones.com
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp