Hi
Thanks for the tip, I'll set it up here.
Em seg., 19 de jul. de 2021 às 14:36, Nitzan Tzelniker via juniper-nsp
escreveu:
>
> Take a look on this KB
> https://kb.juniper.net/InfoCenter/index?page=content=KB35676=EX9208=LIST
>
> The default duplicate-mac-detection settings are far to high
>
>
Take a look on this KB
https://kb.juniper.net/InfoCenter/index?page=content=KB35676=EX9208=LIST
The default duplicate-mac-detection settings are far to high
Nitzan
On Mon, Jul 19, 2021 at 4:50 PM Cathal Mooney via juniper-nsp <
juniper-nsp@puck.nether.net> wrote:
> In theory when the VRRP
In theory when the VRRP falls over, the promoted MX80 should send a
frame with the VRRP virtual MAC as source, causing it to be learnt on a
different switch. That switch should then send an EVPN type-2 UPDATE
for the MAC and the remaining switches will update their local MAC
tables with
I had several problems using the virtual gateway via EVPN on the
switches, even the function of being switches and not routers. In my
scenario it is important to have a minimal firewall on the interfaces,
and in the models I have here, this is not possible.
My idea of using VRRP on the routers
Hi,
> On 20/07/2021, at 12:23 AM, Cristian Cardoso via juniper-nsp
> wrote:
>
> I have a scenario here where I use EVPN-VXLAN with qfx5120 switches
> and until then I was using the gateways on the switches, but as the
> switch does not have the possibility to use any kind of firewall on
> the
I have a scenario here where I use EVPN-VXLAN with qfx5120 switches
and until then I was using the gateways on the switches, but as the
switch does not have the possibility to use any kind of firewall on
the irb interfaces, I had the idea to migrate the networks to two
routers MX80.
But I caught a
6 matches
Mail list logo