Re: [j-nsp] Rock-solid JUNOS for QFX5100

2019-08-13 Thread Jason Healy
On Aug 13, 2019, at 1:50 PM, Dan Římal  wrote:
> 
> Model: qfx5100-48s-6q
> Junos: 17.3R3-S4.2
> 
> Creating vlan means stop forwarding traffic for approx 3 seconds probably on 
> trunk ports with allowed all vlans, or something like this. Pretty bad for 
> bfd going through this ifaces.
> 
> Does anyone have a similar issue?

We have attempted (twice) to get to 17 from 14 on our QFX 5100.  The first time 
we got to 16 and none of the interfaces would come up.  TAC couldn't figure it 
out on the spot and we reverted.  In the post-mortem they discovered that we 
had an "unsupported" config item (a discard interface) that essentially 
prevented the box from booting and bringing up any interfaces.

Second time we tried we got to version 16, but then the subsequent move to 17 
was a disaster.  The switch ate all the DHCP traffic passing through it, 
rendering the network quite unusable.  Again TAC couldn't figure it out during 
the maintenance window so we rolled back.

So we're still on 16, but I haven't wanted to try another update.  Sounds like 
we might need to just jump to 18 and see if we can skip over some of this other 
stuff.

Jason
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Rock-solid JUNOS for QFX5100

2019-08-13 Thread Philippe Girard
I'd like to add to that, l2circuit hot standby needs 18+ to work, I had been 
waiting for some time now for 18 to be recommended to use it.

Thanks for the info much appreciated!

-phil

-Original Message-
From: Richard McGovern  
Sent: August 13, 2019 10:30 AM
To: Philippe Girard ; Ross Halliday 
; Andrey Kostin 
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] Rock-solid JUNOS for QFX5100

Just FYI for all, but 18.1R3-S6 is specifically needed for EVPN/VXLAN use cases 
with QFX5110, not so much QFX5100.  For 5100 without EVPN/VXLAN 
14.1x53-D[latest] is very stable AFAIK.  There are no real added 
features/functionality for QFX5100 outside of EVPN/VXLAN, so if this is not 
your use case, 14.1x53 should be equivalent feature/functionality wise to 18.x. 
 For both EX and QFX I [now] recommend staying away from 16.x or 17.x, as no 
added benefits.

S-Releases are the new Standard 'recommended' for almost all products.  For 
sure all EX and all QFX.  Not happy with this, but it is what it is.

Please also note that "TAC Recommended" is generic BEST (fewest cases, along 
with some deployment/downloads) from purely STABILITY point of view, and does 
not take into account specific use cases.  Your best bet is to discuss any code 
upgrades with your local Juniper account team.  Even if you just work only with 
a specific partner, that partner has a Juniper team with an SE supporting them.

I am also of the firm believe that upgrade for upgrade sake or to stay most 
current is not always a great idea - if not broken why try to fix/change?

Just FYI, Rich

Richard McGovern
Sr Sales Engineer, Juniper Networks
978-618-3342
 
I’d rather be lucky than good, as I know I am not good I don’t make the news, I 
just report it
 

On 8/12/19, 11:31 AM, "Philippe Girard"  wrote:

Hi Ross

We've recently switched our 5100s to 18.1R3-S5. 18.1 is stable with 
BGP/OSPF/LDP/RSVP/MPLS and LACP LAG in general. We don't use STP of any kind 
with the QFXs so I can't really help there.

I was hesitant to upgrade to 18.X since the 5100 was still the only QFX not 
to have and 18 version recommended on KB21476, but recently they updated the KB 
to include that model, so I'd say it's pretty safe now. They've pushed out S6 
in July, if I'd have to re-do it now I'd use that one instead of S5.

The kind of problem you're describing sounds like what we've lived through 
with 14.X and VCF when we first started using these. We'd commit a change and 
some random ports would stop passing traffic, we'd then have to delete port 
config and re provision for traffic to resume. Lots of weird stuff like that 
kept happening until we go fed up with the architecture and moved to routed 
MPLS with almost no layer2 switching.

Good luck.

-phil




-Original Message-
From: juniper-nsp  On Behalf Of Ross 
Halliday
Sent: August 12, 2019 9:20 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] Rock-solid JUNOS for QFX5100

Dear List,

I'm curious if anybody can recommend a JUNOS release for QFX5100 that is 
seriously stable. Right now we're on the previously-recommended version 
17.3R3-S1.5. Everything's been fine in testing, and suddenly out of the blue 
there will be weird issues when I make a change. I suspect maybe they are 
related to VSTP or LAG, or both.

1. Add a VLAN to a trunk port, all the access ports on that VLAN completely 
stopped moving packets. Disable/delete disable all of the broken interfaces 
restored function. This happened during the day. I opened a JTAC ticket and 
they'd never heard of an issue like this, of course we couldn't reproduce it. I 
no longer recall with confidence, but I think the trunk port may have been a 
one-member LAG (replacement of a downstream switch).

2. New trunk port (a two-port LACP LAG) not sending VSTP BPDUs for some 
VLANs. I'm not sure if it was coincidence or always broken as I had recently 
began feeding new VSTP BPDUs (thus the root bridge changed) before I even 
looked at this. Other trunk ports did not exhibit the same issue. Completely 
deleted the LAG and rolled back to fix. This was on a fresh turnup and luckily 
wasn't in a topology that could form a loop.

Features I'm using include:

- BGP
- OSPF
- PIM
- VSTP
- LACP
- VRRP
- IGMPv2 and v3
- Routing-instance
- CoS for multicast
- CoS for unicast
- CoS classification by ingress filter
- IPv4-only
- ~7k routes in FIB (total of all tables)
- ~1k multicast groups


There are no automation features, no MPLS, no MC-LAG, no EVPN, VXLAN, etc. 
These switches are L3 boxes that hand off IP to an MX core. Management is in 
the default instance/table, everything else is in a routing instance.

These boxes have us scared to touch them outside of a window as seemingly 
basic changes risk blowing the whole thing up. Is this a case where an 

Re: [j-nsp] non-split tunneling to SRX dynamic vpn with Pulse Secure client?

2019-08-13 Thread Aaron Gould
Old thread (2015)...

Is there still a problem with MacOS using Pulse Secure to connect with SRX
Dynamic/Remote Access VPN ?  Anyone know how to make it work ?

I do have Windows 10 working fine... but not MacOS Apple laptop.

Using SRX300 15.1X49-D150.2 and Pulse client from Junipers website
5.1R5.1

ps-pulse-win-5.1r5.1-b61437-64bitinstaller.msi - windows 10 working
ps-pulse-mac-5.1r5.1-b61437-installer.dmg - macos not working


-Aaron

-Original Message-
From: juniper-nsp [mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of
Aaron Dewell
Sent: Monday, March 23, 2015 7:39 PM
To: Nick Schmalenberger
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] non-split tunneling to SRX dynamic vpn with Pulse
Secure client?


Have you tried 0/1 and 128/1 instead of 0/0?

That's also required for backup-router destination as well, so might solve
this problem too.

On Mar 23, 2015, at 7:33 PM, Nick Schmalenberger 
wrote:
> On Thu, Mar 05, 2015 at 06:29:30PM -0800, Nick Schmalenberger wrote:
>> I need to have my vpn clients default route go over their tunnel
>> to my SRX. Putting 0.0.0.0/0 as the remote-protected-resource
>> works for Windows clients 5.1r1.1-b52267, but with Mac Pulse
>> Secure is never able to setup a tunnel and connect. 
>> 
>> If I put some more specific routes, such as private addresses I
>> use internally and certain public addresses, as
>> remote-protected-resources, the Mac client (5.1r1.1-b52267 again)
>> is able to connect fine and reach all those networks/hosts with
>> the vpn assigned address, or NAT out of the same SRX in the case
>> of the public destinations (what I mostly want to do).
>> 
>> Does anyone else have that problem? Is there a known bug with the
>> Mac client? I made a support case with JTAC, and they agreed it
>> was a bug but said I need to call back and make a new case for
>> the Pulse Secure Client instead of SRX.
>> 
>> Another issue I had, was how to route the vpn clients assigned
>> private addresses, and give the route to OSPF. I made an
>> aggregate route for them, but it seemed like they weren't
>> contributing to bring it up, so I made a reject route for one of
>> the addresses in the network but not the pool. It worked, but the
>> clients couldn't connect to the srx itself. Any other
>> suggestions? A better action than reject for that? Thanks!
>> -Nick Schmalenberger
>> 
>> P.S. this post was very helpful in figuring it all out:
>> http://rtoodtoo.net/2013/10/01/jncie-sec-dynamic-vpn/
> 
> Juniper finally told me they reproduced this problem with the Mac
> client, but also that the configuration did NOT work with
> Windows! They then told me, the configuration is not supported at
> all, but I should try some other vpn client such as VPN Tracker,
> which I'm planning to do. It would then not use dynamic-vpn at
> all, but could still use the same xauth access-profile.
> 
> Meanwhile, I have also setup a site-to-site tunnel for some of
> the same usage, and it allows clients to use the remote SRX's dns
> proxy where dynamic-vpn clients could not (at least the way I
> managed to get it to work). So this will have some advantages as
> well. Thanks for the helpful suggestions!
> -Nick
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] SRX dynamic vpn with Pulse Secure client - MacOS Apple laptop not working

2019-08-13 Thread Aaron Gould
Is there still a problem with MacOS using Pulse Secure to connect with SRX
Dynamic/Remote Access VPN ?  Anyone know how to make it work ?

 

I do have Windows 10 working fine... but not MacOS Apple laptop.

 

Using SRX300 15.1X49-D150.2 and Pulse client from Junipers website
5.1R5.1

 

ps-pulse-win-5.1r5.1-b61437-64bitinstaller.msi - windows 10 working

 

ps-pulse-mac-5.1r5.1-b61437-installer.dmg - macos not working

 

I tried the 0/0 cut in half suggesting someone made, didn't seem to help
Apple/Mac, but Windows still works.

 

set security dynamic-vpn clients all remote-protected-resources 0.0.0.0/1

 

set security dynamic-vpn clients all remote-protected-resources 128.0.0.0/1

 

 

-Aaron

 

Old thread (2015)... [j-nsp] non-split tunneling to SRX dynamic vpn with
Pulse Secure client?

https://puck.nether.net/pipermail/juniper-nsp/2015-March/030059.html

 

 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Rock-solid JUNOS for QFX5100

2019-08-13 Thread Richard McGovern
Just FYI for all, but 18.1R3-S6 is specifically needed for EVPN/VXLAN use cases 
with QFX5110, not so much QFX5100.  For 5100 without EVPN/VXLAN 
14.1x53-D[latest] is very stable AFAIK.  There are no real added 
features/functionality for QFX5100 outside of EVPN/VXLAN, so if this is not 
your use case, 14.1x53 should be equivalent feature/functionality wise to 18.x. 
 For both EX and QFX I [now] recommend staying away from 16.x or 17.x, as no 
added benefits.

S-Releases are the new Standard 'recommended' for almost all products.  For 
sure all EX and all QFX.  Not happy with this, but it is what it is.

Please also note that "TAC Recommended" is generic BEST (fewest cases, along 
with some deployment/downloads) from purely STABILITY point of view, and does 
not take into account specific use cases.  Your best bet is to discuss any code 
upgrades with your local Juniper account team.  Even if you just work only with 
a specific partner, that partner has a Juniper team with an SE supporting them.

I am also of the firm believe that upgrade for upgrade sake or to stay most 
current is not always a great idea - if not broken why try to fix/change?

Just FYI, Rich

Richard McGovern
Sr Sales Engineer, Juniper Networks 
978-618-3342
 
I’d rather be lucky than good, as I know I am not good
I don’t make the news, I just report it
 

On 8/12/19, 11:31 AM, "Philippe Girard"  wrote:

Hi Ross

We've recently switched our 5100s to 18.1R3-S5. 18.1 is stable with 
BGP/OSPF/LDP/RSVP/MPLS and LACP LAG in general. We don't use STP of any kind 
with the QFXs so I can't really help there.

I was hesitant to upgrade to 18.X since the 5100 was still the only QFX not 
to have and 18 version recommended on KB21476, but recently they updated the KB 
to include that model, so I'd say it's pretty safe now. They've pushed out S6 
in July, if I'd have to re-do it now I'd use that one instead of S5.

The kind of problem you're describing sounds like what we've lived through 
with 14.X and VCF when we first started using these. We'd commit a change and 
some random ports would stop passing traffic, we'd then have to delete port 
config and re provision for traffic to resume. Lots of weird stuff like that 
kept happening until we go fed up with the architecture and moved to routed 
MPLS with almost no layer2 switching.

Good luck.

-phil




-Original Message-
From: juniper-nsp  On Behalf Of Ross 
Halliday
Sent: August 12, 2019 9:20 AM
To: juniper-nsp@puck.nether.net
Subject: [j-nsp] Rock-solid JUNOS for QFX5100

Dear List,

I'm curious if anybody can recommend a JUNOS release for QFX5100 that is 
seriously stable. Right now we're on the previously-recommended version 
17.3R3-S1.5. Everything's been fine in testing, and suddenly out of the blue 
there will be weird issues when I make a change. I suspect maybe they are 
related to VSTP or LAG, or both.

1. Add a VLAN to a trunk port, all the access ports on that VLAN completely 
stopped moving packets. Disable/delete disable all of the broken interfaces 
restored function. This happened during the day. I opened a JTAC ticket and 
they'd never heard of an issue like this, of course we couldn't reproduce it. I 
no longer recall with confidence, but I think the trunk port may have been a 
one-member LAG (replacement of a downstream switch).

2. New trunk port (a two-port LACP LAG) not sending VSTP BPDUs for some 
VLANs. I'm not sure if it was coincidence or always broken as I had recently 
began feeding new VSTP BPDUs (thus the root bridge changed) before I even 
looked at this. Other trunk ports did not exhibit the same issue. Completely 
deleted the LAG and rolled back to fix. This was on a fresh turnup and luckily 
wasn't in a topology that could form a loop.

Features I'm using include:

- BGP
- OSPF
- PIM
- VSTP
- LACP
- VRRP
- IGMPv2 and v3
- Routing-instance
- CoS for multicast
- CoS for unicast
- CoS classification by ingress filter
- IPv4-only
- ~7k routes in FIB (total of all tables)
- ~1k multicast groups


There are no automation features, no MPLS, no MC-LAG, no EVPN, VXLAN, etc. 
These switches are L3 boxes that hand off IP to an MX core. Management is in 
the default instance/table, everything else is in a routing instance.

These boxes have us scared to touch them outside of a window as seemingly 
basic changes risk blowing the whole thing up. Is this a case where an ancient 
version might be a better choice or is this release a lemon? I recall that JTAC 
used to recommend two releases, one being for if you didn't require "new 
features". I find myself stuck between the adages of "If it ain't broke, don't 
fix it" and "Software doesn't age like wine". Given how poorly multicast seems 
to be understood by JTAC I'm very hesitant to upgrade to significantly newer 
releases.