Junos Os 104 Release Notes
Junos Os 104 Release Notes
Release 10.4R1
08 December 2010
Revision 1
These release notes accompany Release 10.4R1 of the Junos operating system (Junos
OS). They describe device documentation and known problems with the software. Junos
OS runs on all Juniper Networks M Series, MX Series, and T Series routing platforms, SRX
Series Services Gateways, J Series Services Routers, and EX Series Ethernet Switches.
You can also find these release notes on the Juniper Networks Junos OS Documentation
Web page, which is located at http://www.juniper.net/techpubs/software/junos.
Contents Junos OS Release Notes for Juniper Networks M Series Multiservice Edge Routers,
MX Series Ethernet Service Routers, and T Series Core Routers . . . . . . . . . . . . 6
New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series
Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Class of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Interfaces and Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Junos OS XML API and Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Layer 2 Ethernet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
MPLS Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Routing Policy and Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Services Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Subscriber Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
System Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M
Series, MX Series, and T Series Routers . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Class of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Forwarding and Sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Interfaces and Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Junos OS XML API and Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
MPLS Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Platform and Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Services Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Errata and Changes in Documentation for Junos OS Release 10.4 for SRX
Series Services Gateways and J Series Services Routers . . . . . . . . . . . . 166
Changes to the Junos OS Documentation Set . . . . . . . . . . . . . . . . . . . . 166
Errata for the Junos OS Documentation . . . . . . . . . . . . . . . . . . . . . . . . . 166
Errata for the Junos OS Hardware Documentation . . . . . . . . . . . . . . . . . 170
Hardware Requirements for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers . . . . . . . . . . . . . . . . . . . . . . . . . 174
Transceiver Compatibility for SRX Series and J Series Devices . . . . . . . . 174
Power and Heat Dissipation Requirements for J Series PIMs . . . . . . . . . 174
Supported Third-Party Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
J Series CompactFlash and Memory Requirements . . . . . . . . . . . . . . . . 175
Maximizing ALG Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Integrated Convergence Services Not Supported . . . . . . . . . . . . . . . . . . . . . 176
Upgrade and Downgrade Instructions for Junos OS Release 10.4 for SRX
Series Services Gateways and J Series Services Routers . . . . . . . . . . . . . 177
Upgrade Policy for Junos OS Extended End-Of-Life Releases . . . . . . . . 177
Junos Software Release Notes for EX Series Switches . . . . . . . . . . . . . . . . . . . . . 178
New Features in Junos OS Release 10.4 for EX Series Switches . . . . . . . . . . 178
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Bridging, VLANs, and Spanning Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Class of Service (CoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Fibre Channel over Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Management and RMON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Packet Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Virtual Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX
Series Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Bridging, VLANs, and Spanning Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Class of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Limitations in Junos OS Release 10.4 for EX Series Switches . . . . . . . . . . . . . 181
Access Control and Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Class of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Outstanding Issues in Junos OS Release 10.4 for EX Series Switches . . . . . . 184
Access Control and Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Bridging, VLANs, and Spanning Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Ethernet Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Spanning Tree Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Junos OS Release Notes for Juniper Networks M Series Multiservice Edge Routers, MX
Series Ethernet Service Routers, and T Series Core Routers
• New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series
Routers on page 6
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M Series, MX
Series, and T Series Routers on page 37
• Issues in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers on page 48
• Errata and Changes in Documentation for Junos OS Release 10.4 for M Series, MX
Series, and T Series Routers on page 66
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for M Series, MX Series,
and T Series Routers on page 70
New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers
The following features have been added to Junos OS Release 10.4. Following the
description is the title of the manual or manuals to consult for further information.
Class of Service
• Hierarchical policer functionality extended to Modular Interface Cards (MICs) (MX
Series routers)—Provides hierarchical policer feature parity with Enhanced Intelligent
Queuing (IQE) PICs. This is useful in provider edge applications using aggregate policing
for general traffic and when applying a separate policer for premium traffic on a logical
or physical interface.
• Ingress traffic is first classified into premium and non-premium traffic before a policer
is applied.
Premium traffic is policed by both the premium policer and the aggregate policer. While
the premium policer rate-limits premium traffic, the aggregate policer only decrements
the credits but does not drop packets. Non-premium traffic is rate-limited by the
aggregate policer only, resulting in the following behavior:
• Premium traffic is assured to have the bandwidth configured for the premium policer.
You can apply the policer at the inet, inet6, or mpls family level, as follows:
For hierarchical policing of all traffic through a logical interface, a hierarchical policer
can be made a logical-interface-policer and applied to all families in the logical interface.
Similarly, you can achieve aggregation at the physical interface level.
• DSCP classification for VPLS at the ingress PE (M320 with Enhanced Type III FPC
and M120)—Enables you to configure DSCP classification for VPLS at an ingress PE
for encapsulation types vlan-vpls (IQ2 or IQ2E PICs) or ATM II IQ PIC. To configure,
define the DSCP classifier at the [edit class-of-service classifiers dscp dscp-name]
hierarchy level and apply the DSCP classifier at the [edit interfaces at-fpc-pic-port
unit-logical-unit-number classifiers] hierarchy level. The ATM interface must be included
in the routing instance.
[Class of Service]
[Network Interfaces]
• On MX80 routers and MX Series routers, MPCs based on G.8261 and G.8262. This
feature does not work on the fixed configuration version of the MX80 routers.
• All Ethernet type ports are supported on MX80 routers and MX Series routers with
MPCs
• Enhanced container interface allows ATM children for containers—M Series and T
Series routers with ATM2 PICs automatically copy the parent container interface
configuration to the children interfaces. Container interfaces do not go down during
APS switchovers, thereby shielding upper layers. This feature allows the various ATM
features to work over the container ATM for APS.
To specify ATM children within a container interface, use the container-list cin statement
and (primary | standby) option at the [edit interface at-fpc/pic/slot container] hierarchy
level.
To configure a container interface, including its children, use the cin statement and its
options at the [edit interface ci-n] hierarchy level.
Container ATM APS does not support inter-chassis APS. MLPPP over ATM CI is also
not supported.
[Network Interfaces]
• PIO errors and voltage errors detected by the SPMB CPU to the SIBs.
• All PFEs get destination errors on all planes to all destinations, even with the SIBs
staying online.
• Complete fabric loss caused by destination timeouts, with the SIBs still online.
When chassisd detects that all fabric planes are down, the router reboots all FPCs in
the system. When the FPCs come back up, the interfaces will not be created again,
since all fabric planes are down.
Once you diagnose and fix the cause of all fabric planes going down, you must then
bring the SIBs back online. Bringing the SIBs back online brings up the interfaces.
• FPCs reboot when the control plane connection to the Routing Engine times out.
• Extends a simple approach to reboot FPCs when the dataplane blacks out.
When the router transitions from a state where SIBs are online or spare to a state where
there are no SIBs are online, then all the FPCs in the system are rebooted. An ERRMSG
indicates if all fabric planes are down, and the FPCs will reboot if any fabric planes do
not come up in 2 minutes.
An ERRMSG indicates the reason for FPC reboot on fabric connectivity loss.
The chassisd daemon traces when an FPC comes online, but a PIC attach is not done
because no fabric plane is present.
A CLI warning that the FPCs will reboot is issued when the last fabric plane is taken
offline.
You will need to bring the SIBs online after determining why the SIBs were not online.
When the first SIB goes online, and link training with the FPCs completes, the interfaces
will be created.
No new CLI commands or alarms are introduced for this feature. Alarms are already
implemented for when the SIBs are not online.
The following MIB objects are supported by JUNIPER-DOM-MIB for digital optical
monitoring:
• jnxDomCurrentTable
• jnxDomAlarmSet
• jnxDomAlarmCleared
• Transition of IPv4 traffic to IPv6 addresses using Dual Stack Lite (DS-Lite)—Adds
support for DS-Lite, a means for transitioning IPv4 traffic to IPv6 addresses. This
transition will become necessary as the supply of unique IPv4 addresses nears
exhaustion. New subscriber homes are allocated IPv6 addresses and IPv6-capable
equipment; DS-Lite provides a method for the private IPv4 addresses behind the IPv6
equipment to reach the IPv4 network. An IPv4 host communicates with a NAT endpoint
over an IPv6 network using softwires. DS-Lite creates the IPv6 softwires that terminate
on the services PIC. Packets coming out of the softwire can then have other services
such as NAT applied on them.
• IPv6 statistics from IQ2 and IQ2E PICs on M320 routers with Enhanced III FPCs and
T Series routers—Support statistical accounting for IPv6 traffic traversing the IQ2 and
IQ2E PICs on M320 routers with Enhanced III FPCs and T Series routers.
For IQ2 and IQ2E PIC interfaces, the IPv6 traffic that is reported will be the total statistics
(sum of local and transit IPv6 traffic) in the ingress and egress direction. The IPv6
traffic in the ingress direction will be accounted separately only if the IPv6 family is
configured for the logical interface.
Statistics are maintained for routed IPv6 packets in the egress direction.
Byte and packet counters are maintained in the ingress and egress direction.
Differences in IPv6 statistics for IQ2 interfaces and all other interfaces are as follows:
• IQ2 and IQ2E PIC interfaces report the total statistics for the IPv6 traffic. For other
interfaces, the transit statistics are reported.
• IQ2 and IQ2E PIC interfaces report all IPv6 traffic received on the logical interface.
For all other interfaces, only the routed traffic is accounted.
• IQ2 and IQ2E PIC interfaces report IPv6 statistics for the Layer 2 frame size. For all
other interfaces, the Layer 3 packet size is accounted.
The IPv6 statistics can be viewed by logging in to the individual IQ2 PIC or IQ2E PIC, or
by using the CLI.
To display total IPv6 statistics for IQ2 and IQ2E PICs, use the show interfaces extensive
command.
NOTE: The reported IPv6 statistics do not account for the traffic manager
drops in egress direction or the Packet Forwarding Engine/traffic manager
drops in the ingress direction. Transit statistics are not accounted separately
because the IQ2 and IQ2E PICs cannot differentiate between transit and
local statistics.
[Network Interfaces]
Two packet forwarding modes exist under the forwarding-mode statement. SA multicast
mode, for proprietary connection of two Juniper Networks 100-Gigabit Ethernet PICs,
uses the Ethernet header SA MAC address multicast bit to steer the packets to the
appropriate PFE. VLAN steering mode allows the PIC to connect to non-Juniper
Networks equipment. On ingress, the PIC compares the outer VLAN ID against a
user-defined VLAN ID and VLAN mask combination and steers the packet accordingly.
Modifying the forwarding mode config reboots the PIC.
• In VLAN steering mode, the SA multicast bit is not used for packet steering.
• In SA multicast bit steering mode, VLAN ID and VLAN mask configuration is not used
for packet steering.
• Configuration of packet forwarding mode and VLAN steering mode uses CLI
commands that result in a PIC reboot.
• Ingress packet with one VLAN–The packet forwards based on the VLAN ID.
• Ingress packet with two VLANs–The packet forwards based on the outer VLAN
ID.
• VLAN rules describe how the router forwards packets. For VLAN steering, you must
use one of the two rules available in the CLI:
• Odd-even rule–Odd number VLAN IDs go to PFE1; even number VLAN IDs go to
PFE0.
• High-low rule–1 through 2047 VLAN IDs go to PFE0; 2048 through 4096 VLAN
IDs go to PFE1.
• When configured in VLAN steering mode, the PIC can be configured in two physical
interface mode or in aggregated Ethernet (AE) mode:
• Two physical interface mode–When the PIC is in two physical interface mode, it
creates physical interfaces et-x/0/0:0 and et-x/0/0:1. Each physical interface can
configure its own logical interface and VLAN. CLI enforces the following restrictions
on commit:
• The VLAN ID configuration must comply with the selected VLAN rule.
• The previous restriction implies that the same VLAN ID cannot be configured
on both physical interfaces.
• AE mode–In AE mode, the two physical interfaces on the same PIC are aggregated
into one AE physical interface. PIC egress traffic is based on the AE internal hash
algorithm. PIC ingress traffic steering is based on the customized VLAN ID rule. CLI
enforces the following restrictions on commit:
• The PIC AE working in VLAN steering mode includes both links of this PIC, and
only the links of this PIC.
• The PIC AE working in SA multicast steering mode can include more than one
PIC to achieve more than 100-gigabit capacity.
To configure the PIC forwarding mode, include the forwarding-mode statement and
its options at the [edit chassis fpc number pic number] hierarchy level.
[Network Interfaces]
• New control queue disable feature (T Series routers with 10-Gigabit Ethernet PIC
with oversubscription)—Provides a new CLI statement for disabling the control queue
feature for the 10-Gigabit Ethernet PIC with oversubscription. To disable the control
queue, use the no-pre-classifier statement at the [chassis] hierarchy level.
When the no-pre-classifier statement is set, the control queue feature will be disabled
for all ports on that 10-Gigabit Ethernet PIC with oversubscription. Deleting this
configuration results in the control queue feature being re-enabled on all the ports of
that PIC.
[edit chassis]
fpc 2 {
pic 0 {
no-pre-classifier;
}
}
NOTE:
1. This feature is applicable in both oversubscribed and line-rate modes.
4. Enabling or disabling the control queue feature results in the PIC being
bounced (offline/online).
Once the control queue feature is disabled, then the Layer 2 and Layer 3 control packets
are subject to queue selection based on the BA classification. However, the following
control protocol packets are not classified using BA classification, as they might not
have a VLAN, MPLS, or IP header:
When the control queue feature is disabled, untagged ARP/IS-IS and other untagged
Layer 2 control packets will go to the restricted queue corresponding to the forwarding
class associated with queue 0.
[Network Interfaces]
New Junos OS XML API operational request tag elements—Table 1 on page 13 shows
the Junos OS Extensible Markup Language (XML) operational request tag elements that
are new in Junos OS Release 10.4 along with the corresponding CLI command and
response tag element for each one.
Table 1: Junos OS XML Tag Elements and CLI Command Equivalents New in Junos OS Release
10.4
Request Tag Element CLI Command Response Tag Element
Table 1: Junos OS XML Tag Elements and CLI Command Equivalents New in Junos OS Release
10.4 (continued)
Request Tag Element CLI Command Response Tag Element
Table 1: Junos OS XML Tag Elements and CLI Command Equivalents New in Junos OS Release
10.4 (continued)
Request Tag Element CLI Command Response Tag Element
[Layer 2 Configuration]
• Ethernet CFM support on Trio 3D MPCs and MICs (MX Series routers)—Enables
support for Ethernet connectivity fault management (CFM) defined by IEEE 802.1ag
for family bridge interfaces. However, MEP configuration is not supported on aggregated
Ethernet interfaces.
[Layer 2 Configuration]
MPLS Applications
• MPLS support on services PICs—Adds MPLS label pop support for services PICs on
Junos OS routers. Previously all MPLS traffic would be dropped at the services PIC. No
changes are required to CLI configurations for this enhancement. In-service software
upgrade (unified ISSU) is supported for tag next hops for MPLS on services PIC traffic,
but no support is provided for tags over IPv6 packets or labels on multiple gateways.
[MPLS]
• Adding descriptions for bypass LSP—You can now add a text describing a bypass
LSP using the description option at the [edit protocols rsvp interface interface-name
link-protection bypass bypass-lsp-name] hierarchy level. Enclose any descriptive text
that includes spaces in quotation marks (" "). Any descriptive text you include is
displayed in the output of the show rsvp session bypass command and has no effect
on the operation of the bypass LSP.
[MPLS]
Multicast
• Nonstop active routing PIM support for IPv6—Starting with Release 10.4, Junos OS
extends the nonstop active routing support for Protocol Independent Multicast (PIM),
which is already supported on IPv4, to include the IPv6 address families. The extension
of nonstop active routing PIM support to IPv6 enables IPv6 routers to maintain
self-generation IDs, multicast session states, dynamic interface states, list of neighbors,
and RPSets across Routing Engine switchovers.
The nonstop active routing support for PIM on IPv6 is similar to the nonstop active
routing PIM support on IPv4 except for the following:
• Nonstop active routing support for PIM on IPv6 supports an embedded rendezvous
point (RP) on non-RP routers.
• Nonstop active routing support for PIM on IPv6 does not support auto-RP, as auto-RP
is not supported on IPv6.
For more information about nonstop active routing PIM support on IPv4 and IPv6, see
the Junos OS High Availability Configuration Guide.
The following sample shows the new system log message (depending on your network
configuration, the type of message you see might be different):
• Support for displaying the firewall filter version information—You can display the
version number of the firewall filter installed in the Routing Engine. The initial version
number is 1 and increments by one when you modify the firewall filter settings or an
associated prefix action. To show the version number of the installed firewall filter,
use the show firewall filter version operational mode command.
Routing Protocols
• Point-to-multipoint (P2MP) LSP load balancing across aggregated Ethernet links
(M Series except M320)—Enables you to load-balance VPLS multicast and P2MP
multicast traffic over link aggregation. This feature also re-load-balances traffic after
a change in the next-hop topology. Next-hop topology changes might include but are
not limited to:
No new configuration is required to configure this feature. The load balancing over
aggregated links is automatically enabled with this release. For a sample topology and
configuration example, see Junos OS Policy Framework Configuration Guide.
[Policy]
• Support for disabling traps for passive OSPFv2 interfaces—You can now disable
interface state change traps for passive OSPF interfaces. Passive OSPF interfaces
advertise address information as an internal OSPF route, but do not run the actual
protocol. If you are only interested in receiving notifications for active OSPF interfaces,
disabling traps for passive OSPF interfaces reduces the number of notifications received
and processed by the SNMP server. This allows you to more quickly and easily scan
the logs for potential issues on active OSPF interfaces.
To disable and stop receiving notifications for state changes in a passive OSPF interface,
include the no-interface-state-traps statement at the following hierarchy levels:
[Routing Protocols]
[Routing Protocols]
• Support for disabling the attribute set messages on independent AS domains for
BGP loop detection—BGP loop detection for a specific route uses the local autonomous
system (AS) domain for the routing instance. By default, all routing instances belong
to a single primary routing instance domain. Therefore, BGP loop detection uses the
local ASs configured on all of the routing instances. Depending on your network
configuration, this default behavior can cause routes to be looped and hidden.
To limit the local ASs in the primary routing instance, configure an independent AS
domain for a routing instance. Independent domains use the transitive path attribute
128 (attribute set) messages to tunnel the independent domain’s BGP attributes
through the internal BGP (IBGP) core. If you want to configure independent domains
to maintain the independence of local ASs in the routing instance and perform BGP
loop detection only for the specified local ASs in the routing instance, disable attribute
set messages on the independent domain. To disable attribute set messages, include
the independent-domain no-attrset statement at the following hierarchy levels:
[Routing Protocols]
Services Applications
• NAT-PT with DNS ALG support (M Series and T Series routers)—You can configure
Domain Name Service (DNS) application-level gateways (ALGs) using NAT with
protocol translation (NAT-PT) for IPv6 to IPv4. The implementation is described in
RFC 2766 and RFC 2694.
When you configure NAT-PT with DNS ALG support, you must configure two NAT rules.
The first NAT rule ensures that the DNS query and response packets are translated
correctly. For this rule to work, you must configure a DNS ALG application and reference
it in the rule. The second rule is required to ensure that NAT sessions are destined to
the address mapped by the DNS ALG.
• To configure the correct translation of the DNS query and response packets, include
the dns-alg-pool dns-alg-pool or dns-alg-prefix dns-alg-prefix statement at the [edit
services nat rule rule-name term term-name then translated] hierarchy level.
• To configure destination translation with the DNS ALG address map, use the
use-dns-map-for-destination-translation statement at the [edit services nat rule
rule-name term term-name then translated] hierarchy level. This statement correlates
the DNS query or response processing done by the first rule with the actual data
sessions processed by the second rule.
You can also control the translation of IPv6 and IPv4 DNS queries in the following
ways.
To check that the flows are established properly, use the show services
stateful-firewall flows command or the show services stateful-firewall conversations
command.
[Services Interfaces]
the existing destination class usage (DCU) policy option configuration for use with this
feature.
In addition, the MPLS top label IP address is added as a new field in the existing
MPLS-IPv4 flow template. You can use this field to gather MPLS forwarding equivalence
class (FEC) -based traffic information for MPLS network capacity planning. These
ALGs that use Junos Services Framework (JSF) (M Series) is a PIC-only feature applied
on sampled traffic and collected by the services PIC or DPC. You can define it for either
global or per Packet Forwarding Engine instances for MPLS traffic.
The show services accounting aggregation template operational command has been
updated to include new output fields that reflect the additional functionality.
• Support for the RPM timestamp on the Services SDK (M Series, MX Series, and T
Series)—Real-time performance monitoring (RPM), which has been supported on the
Adaptive Services (AS) interface, is now supported by the Services SDK. RPM is
supported on all platforms and service PICs that support the Services SDK.
destination-interface ms-fpc/pic/port.logical-unit-number;
To specify the RPM client router and the RPM server router, include the rpm statement
at the [edit interfaces interface-name unit logical-unit-number] hierarchy level:
To enable RPM on the Services SDK on the AS interface, configure the object-cache-size,
policy-db-size, and package statements at the [edit chassis fpc slot-number pic
pic-number adaptive-services service-package extension-provider] hierarchy level. For
the Services SDK, package-name in the package package-name statement is
jservices-rpm.
}
}
[Services Interfaces]
• ALGs using Junos OS Services Framework (JSF) (M Series with MS PICs and MX
Series with MS DPCs)—Application-level gateways (ALGs) intercept and analyze
specified traffic, allocate resources, and define dynamic policies to permit traffic to
pass securely through a device. Beginning with Junos OS Release 10.4 on the specified
routers, you can use JSF ALGs with the following services:
• Stateful firewall
To use JSF to run ALGs, you must configure the jservices-alg package at the [edit
chassis fpc slot pic slot adaptive-services service-package extension-provider package]
hierarchy level. In addition, you must configure the ALG application at the [edit
applications application application-name] hierarchy level, and reference the application
in the stateful firewall rule or the NAT rule in those respective configurations.
[Services Interfaces]
Inline port mirroring allows you to configure instances that are not bound to the FPC
specified in the firewall filter then port-mirror-instance instance-name action. Instead,
you can define the then next-hop-group action. Inline port-mirroring aims to decouple
the port-mirror destination from the input parameters, such as rate. While the input
parameters are programmed in the Switch Interface Board (SIB), the next-hop
destination for the mirrored packet is available in the packet itself.
A port-mirroring instance can now inherit input parameters from another instance that
specifies it. To configure this option, include the input-parameters-instance
instance-name statement at the [edit forwarding-options port-mirror instance
instance-name] hierarchy level.
You can also now configure port mirroring to next-hop groups using a tunnel interface.
[Services Interfaces]
• Multiple IDP detector support (M120, M320, and MX Series routers with Enhanced
III FPCs)—The IDP detector provides information about services, contexts, and
anomalies that are supported by the associated protocol decoder.
The specified routers now support loading multiple IDP detectors simultaneously.
When a policy is loaded, it is also associated with a detector. If the new policy being
loaded has an associated detector that matches the detector already being used by
the existing policy, the new detector is not loaded and both policies use a single
associated detector. However, if the new detector does not match the current detector,
the new detector is loaded along with the new policy. In this case, each loaded policy
will then use its own associated detector for attack detection. Note that with the
specified routers, a maximum of four detectors can be loaded at any given time.
Multiple IDP detector support for the specified routers functions in a similar way to the
existing IDP detector support on J Series and SRX Series devices, except for the
maximum number of decoder binary instances that are loaded into the process space.
To view the current policy and the corresponding detector version, use the show security
idp status detail command.
[Services Interfaces]
• NAT using Junos OS Services Framework (JSF) (M Series and T Series with
Multiservices PICs and MX Series with Multiservices DPCs)—The Junos OS Services
Framework (JSF) is a unified framework for Junos OS services integration. JSF Services
integration will allow the option of running Junos OS services on services PICs or DPCs
in any M Series, MX Series, or T Series routers. Beginning with Junos OS Release 10.4,
you can use JSF to run NAT on the specified routers.
To use JSF to run NAT, you must configure the jservices-nat package at the [edit chassis
fpc slot pic slot adaptive-services service-package extension-provider package] hierarchy
level. In addition, you must configure NAT rules and a service set with a Multiservice
interface. To check the configuration, use the show configuration services nat command.
To show the run time (dynamic state) information on the interface, use the show
services sessions and show services nat pool commands.
[Services Interfaces]
• Stateful firewall using Junos OS Services Framework (JSF) (M Series with MS PICs,
MX Series with MS DPCs, and T Series routers)—The Junos OS Services Framework
(JSF) is a unified framework for Junos OS services integration. JSF Services integration
will allow the option of running Junos OS services on services PICs or DPCs in any M
Series, MX Series, or T Series routers. Beginning with Junos OS Release 10.4, you can
use JSF to run stateful firewall on the specified routers.
To use JSF to run stateful firewall, you must configure the jservices-sfw package at the
[edit chassis fpc slot pic slot adaptive-services service-package extension-provider
package] hierarchy level. In addition, you must configure stateful firewall rules and a
service set with a Multiservice interface. To check the configuration, use the show
configuration services stateful-firewall command. To show the run time (dynamic state)
information on the interface, use the show services sessions command.
[Services Interfaces]
[Subscriber Access]
• Filter support for service packet counting—You can count service packets, applying
them to a specific named counter (__junos-dyn-service-counter), for use by RADIUS.
To enable service packet accounting, specify the service-accounting action at the [edit
firewall family family-name filter filter-name term term-name then] hierarchy level.
• Support for domain maps that apply configuration options based on subscriber
domain names (MX Series and M Series routers)—You use domain maps to apply
access options and session-specific parameters to subscribers whose domain name
corresponds to the domain map name. You can also create a default domain map that
the router uses for subscribers whose username does not include a domain name or
has a non-matching domain name.
You configure domain maps at the [edit access domain] hierarchy level.
[Subscriber Access]
• L2TP LAC support for subscriber management (MX Series routers)—You can now
configure an L2TP access concentrator (LAC) on MPC-equipped MX Series routers.
As part of the new L2TP LAC support, you can configure how the router selects a tunnel
for a PPP subscriber from among a set of available tunnels. The default tunnel selection
method is to fail over between tunnel preference levels. When a PPP user tries to log
in to a domain, the router attempts to connect to a destination in that domain by means
of the associated tunnel with the highest preference level. If the destination is
unreachable, the router then moves to the next lower preference level and repeats the
process. No configuration is required for this tunnel selection method.
You can include the fail-over-within-preference statement at the [edit services l2tp]
hierarchy level to configure tunnel selection failover within a preference level. With this
method, when the router tries to connect to a destination and is unsuccessful, it selects
a new destination at the same preference level. If all destinations at a preference level
are marked as unreachable, the router does not attempt to connect to a destination
at that level. It drops to the next lower preference level to select a destination. If all
destinations at all preference levels are marked as unreachable, the router chooses
the destination that failed first and tries to make a connection. If the connection fails,
the router rejects the PPP user session without attempting to contact the remote
router.
By default, the router uses a round-robin selection process among tunnels at the same
preference level. Include the weighted-load-balancing statement at the statement at
the [edit services l2tp] hierarchy level to specify that the tunnel with the highest weight
within a preference is selected until its maximum sessions limit is reached. Then the
tunnel with the next highest weight is selected until its limit is reached, and so on. The
tunnel with the highest configured maximum sessions value has the greatest weight.
Another feature of L2TP LACs on MX Series routers is the ability to control whether
the LAC sends the Calling Number AVP 22 to the LNS. The AVP value is derived from
the Calling-Station-Id and identifies the interface that is connected to the customer
in the access network. By default, the LAC includes this AVP in ICRQ packets it sends
to the LNS. In some networks you may wish to conceal your network access information.
To prevent the LAC from sending the Calling Number AVP to the LNS, include the
disable-calling-number-avp statement at the [edit services l2tp] hierarchy level.
[Subscriber Access]
• Support for dynamic interface sets (M120, M320, and MX Series routers)—Enables
you to configure sets of subscriber interfaces in dynamic profiles. Interface sets are
used for providing hierarchical scheduling. Previously, interface sets were supported
for interfaces configured in the static hierarchies only.
Supported subscriber interfaces include static and dynamic demux, static and dynamic
PPPoE, and static and dynamic VLAN interfaces.
A new Juniper Networks VSA (attribute 26-130) is now supported for the interface set
name, and includes a predefined variable, $junos-interface-set-name. The VSA is
supported for RADIUS Access-Accept messages only; change of authorization (CoA)
requests are not supported.
[Subscriber Access]
• Support for service session accounting statistics (MX Series routers)—You can now
capture accounting statistics for subscriber service sessions. Subscriber management
supports service session accounting based on service activation and deactivation, as
well as interim accounting. Time-based accounting is supported for all service sessions.
Time and volume-based accounting is supported for classic firewall filter and fast
update firewall filter service sessions only.
The following VSAs (vendor ID 4874) are used for service accounting:
Attribute
Number Attribute Name Description Value
[Subscriber Access]
• Subscriber secure policy traffic mirroring supported for L2TP sessions on the LAC
(MX Series routers)—The L2TP access concentrator (LAC) implementation supports
RADIUS-initiated per-subscriber traffic mirroring. Both subscriber ingress traffic (from
the subscriber into the tunnel) and subscriber egress traffic (from the tunnel to the
subscriber) is mirrored at the (subscriber-facing) ingress interface on the LAC. The
ingress traffic is mirrored after PPPoE decapsulation and before L2TP encapsulation.
The egress traffic is mirrored after L2TP decapsulation. The mirrored packet includes
the complete HDLC frame sent to the LNS.
[Subscriber Access]
• Support for static and dynamic CoS on L2TP LAC subscriber interfaces (M120, M320,
and MX Series routers)—Enables you to configure static and dynamic CoS for L2TP
access concentrator (LAC) tunnels that transport PPP subscribers at Layer 2 and Layer
3 of the network.
IP and L2TP headers are added to packets arriving at the LAC from a subscriber before
being tunneled to the L2TP network server (LNS). Classifiers and rewrite-rules enable
you to properly transfer the type-of-service (ToS) value or the 802.1p value from the
inner IP header to the outer IP header of the L2TP packet.
For ingress tunnels, you configure fixed or behavior aggregate (BA) classifiers for the
PPP interface or an underlying VLAN interface at Layer 2. You can configure Layer 3
classifiers for a family of PPP interfaces. Layer 2 and Layer 3 classifiers can co-exist
for a PPP subscriber.
For example, to classify incoming packets for a PPP subscriber, include the classifier
type classifier-name statement at the [edit class-of-service interfaces pp0 unit
logical-unit-number] hierarchy level or at the [edit dynamic-profiles class-of-service
interfaces pp0 unit logical-unit-number] hierarchy level.
On egress tunnels, you configure rewrite rules to set the ToS or 802.1p value of the
outer header. For example, to configure a rewrite-rule definition for an interface with
802.1p encapsulation, include the [rewrite-rule ieee-802.1 (rewrite-name | default)
statement at the edit class-of-service interfaces interface-name unit logical-unit-number]
hierarchy level or the [edit dynamic-profiles class-of-service interfaces pp0 unit
logical-unit-number] hierarchy level.
Rewrite rules are applied accordingly to the forwarding class, packet loss priority (PLP),
and code point. The proper transfer of the inner IP header to the outer IP header of the
L2TP packet depends on the classifier and rewrite rule configurations.
The following table shows how the classifier and rewrite-rule values transfer from the
inner IP header to the outer IP header. The inner IP header (ob001) is classified with
assured-forwarding and low loss priority at the ingress interface. Based on the
assured-forwarding class and low loss priority in the rewrite rule, the outer IP header
is set to ob001 at the egress interface.
Inner IP Header Forwarding Class Loss Priority Code Point Outer IP Header
• L2TP tunnel profiles and AAA support for tunnels in subscriber management (MX
Series routers)—You can configure a set of attributes to define an L2TP tunnel for PPP
subscribers. More than one tunnel can be defined for a tunnel profile. Tunnel profiles
are applied by a domain map before RADIUS authentication. When the RADIUS
Tunnel-Group VSA [26-64] is specified in the RADIUS login, then the RADIUS tunnel
profile (group) overrides a tunnel profile specified by the domain map. The tunnel is
then configured according to RADIUS tunnel attributes and VSAs.
Define the attributes of the tunnel at the [edit access tunnel-profile profile-name tunnel
tunnel-id] hierarchy level. You must configure a preference for the tunnel and the IP
address of the LNS tunnel endpoint; all other attributes are optional. Include the
preference number statement to configure the preference. Include the remote-gateway
address server-ip-address statement to configure the LNS address.
You can optionally configure the remaining tunnel attributes. Include the
remote-gateway name server-name statement to configure the LNS hostname. Include
the source -gateway address client-ip-address statement and the source-gateway name
client-name statements to configure the local (LAC) tunnel endpoint. Although you
can configure a medium type (medium type) and protocol type (tunnel tunnel-type)
for the tunnel, only the default values of ipv4 and l2tp are supported in this release.
Include the identification name statement to configure an assignment ID for the tunnel.
Include the max-sessions number statement to configure the maximum number of
sessions permitted for the tunnel. Include the secret password statement to configure
a cleartext password for authentication by the remote tunnel endpoint (LNS). Finally,
you can configure a logical system and routing instance for the tunnel by including the
logical-system logical-system-name and routing-instance routing-instance-name
statements.
The following table shows the RADIUS attributes that are now supported for defining
a tunnel.
Attribute
Number Attribute Name Description
64 Tunnel-Type • The tunneling protocol to use (in the case of a tunnel
initiator) or the tunneling protocol already in use (in
the case of a tunnel terminator).
• Only L2TP tunnels are currently supported.
The following table shows the RADIUS VSAs that are now supported for defining a
tunnel.
Attribute
Number Attribute Name Description Value
26-8 Tunnel-Virtual-Router Virtual router name for tunnel string:
connection. tunnel-virtual-router
Attribute
Number Attribute Name Description Value
26-9 Tunnel-Password Tunnel password in clear text. string:
tunnel-password
[Subscriber Access]
Optional statements enable you to modify default reconfiguration values: The number
of reconfiguration attempts, the interval between the first and second attempts, what
happens to the client if all reconfiguration attempts fail, what happens to the client in
the event of a RADIUS-initiated disconnect, whether to bind clients that do not support
reconfiguration, and whether to send an authentication token. Issue the request dhcpv6
server reconfigure command to initiate reconfiguration. Use the show dhcpv6 server
binding and show dhcpv6 server statistics commands to monitor client-server
interactions.
[Subscriber Access]
• Support for ascend data filters (RADIUS attribute 242) in subscriber firewall filters
(MX Series routers)—You can now configure subscriber management to use ascend
data filters (ADFs) to create and apply firewall filters to subscriber traffic. The ADF
creates a rule that specifies match conditions on the source and destination IP address,
the protocol, and the source and destination port, and also specifies the action to
perform (such as accept or discard). The ADF rule also specifies the filter direction,
and can optionally provide traffic class and policer information. The router supports
ADF rules for family types inet and inet6.
Subscriber management uses dynamic profiles to obtain the ADF rules from the RADIUS
server. You can use the new Junos OS predefined variables ($junos-adf-rule-v4 for
family inet and $junos-adf-rule-v6 for inet6) to map ADF rules to Junos OS functionality,
or you can statically create ADF rules.
To configure ADF support, use the following stanza at the [edit dynamic-profiles
profile-name interfaces interface-name unit logical-unit-number family family] hierarchy
level:
filter {
adf {
counter;
input-precedence precedence;
output-precedence precedence;
rule rule-value;
}
}
• Per-interface DHCP tracing operations (MX Series routers)—In addition to the existing
global DHCP tracing operation, you can now trace DHCP operations for a specific
interface or a range of interfaces.
• To enable tracing on an interface or interface range, use the trace statement at the
[edit system services dhcp-local-server group group-name interface interface-name]
hierarchy level for the DHCP local server, or the [edit forwarding-options dhcp-relay
group group-name interface interface-name] hierarchy level for the DHCP relay agent.
You can also enable tracing for DHCPv6 at the [edit system services dhcp-local-server
dhcpv6 group group-name interface interface-name] hierarchy level.
[Subscriber Access]
• Automatic binding of stray DHCP requests (MX Series routers)—The default behavior
has changed for handling DHCP requests that are received but which have no entry in
the database (stray requests). Beginning with Junos OS Release 10.4, automatic binding
of stray requests is enabled by default. In Junos OS Release 10.3 and earlier releases,
automatic binding of stray requests is disabled by default.
By default, DHCP relay and DHCP relay proxy now attempt to bind the requesting client
by creating a database entry and forwarding the request to the DHCP server. If the
server responds with an ACK, the client is bound and the ACK is forwarded to the client.
If the server responds with a NAK, the database entry is deleted and the NAK is
forwarded to the client. This behavior occurs regardless of whether authentication is
configured.
In Junos OS Release 10.3 and earlier releases, DHCP relay drops stray requests and
forwards a NAK to the client when authentication is configured. Otherwise, DHCP relay
attempts to bind the requesting client. In those releases, DHCP relay proxy always
drops stray requests and forwards a NAK to the client, regardless of the authentication
configuration.
You can override the new default configuration to cause DHCP relay and DHCP relay
proxy to drop all stray requests instead of attempting to bind the clients. To disable
automatic binding behavior globally, include the no-bind-on-request statement at the
[edit forwarding-options dhcp-relay overrides] hierarchy level. To disable automatic
binding behavior for a group, include the statement at the [edit forwarding-options
dhcp-relay overrides group group-name] hierarchy level. To disable automatic binding
behavior for a specific interface in a group, include the statement at the [edit
forwarding-options dhcp-relay overrides group group-name interface interface-name]
hierarchy level.
[Subscriber Access]
NOTE: In this release, Layer 2 wholesaling supports the use of only the
default logical system using multiple routing instances.
The Juniper Networks Layer 2 wholesale solution is similar to the Layer 3 wholesale
solution in many ways. However, when configuring the Juniper Networks Layer 2
wholesale solution, keep the following in mind:
• Layer 2 wholesale supports only CoA disconnect and variable modification; CoA
service activation is not supported.
• Configure a VLAN dynamic profile. See the Subscriber Access Configuration Guide
for details.
• Include the unit statement along with the $junos-interface-unit dynamic variable at
the [edit dynamic-profiles profile-name interface “$junos-interface-ifd-name”]
hierarchy level.
• Include the vlan-tags statement and define the outer VLAN tag using the
$junos-stacked-vlan-id dynamic variable and the inner VLAN tag using the
$junos-vlan-id dynamic variable at the [edit dynamic-profiles profile-name interface
“$junos-interface-ifd-name” unit $junos-interface-unit] hierarchy level.
• Specify the action that you want the input VLAN map to take. See the Network
Interfaces Configuration Guide for details on how to configure input-vlan-map
statement options.
• Include the vlan-id statement along with the $junos-vlan-map-id dynamic variable.
• Specify the unit family as vpls at the [edit dynamic-profiles profile-name interface
“$junos-interface-ifd-name” unit $junos-interface-unit family] hierarchy level.
• Include the flexible-vlan-tagging statement for any interfaces you plan to use at the
[edit interfaces interface-name] hierarchy level.
• Include the encapsulation statement for any interfaces you plan to use at the [edit
interfaces interface-name] hierarchy level and specify the encapsulation as follows:
flexible-ethernet-services.
• Use the extended-vlan-vpls option if you chose not to specify an option for the
encapsulation statement at the [edit dynamic-profiles profile-name interface
“$junos-interface-ifd-name” unit $junos-interface-unit] hierarchy level.
NOTE: This encapsulation type can support multiple TPIDs and does
not have a VLAN ID limitation.
• Specify the vpls option for the instance-type statement for any retailer routing
instances you plan to use at the [edit routing-instances instance-name] hierarchy
level.
• Specify the permanent option for the connectivity-type statement at the [edit
routing-instances instance-nameprotocols vpls] hierarchy level to ensure that the
routing instance (pseudo-wire) remains operational.
• Configure the VLAN Interfaces to use the dynamic profile. See the Subscriber Access
Configuration Guide for details.
• Define access to your RADIUS server and specify the access profile at the [edit
access] hierarchy level.
To view the logical system and routing instance for each subscriber, use the show
subscriber operational command.
[Subscriber Access]
System Logging
• New and deprecated system log tags—The following system log messages are new
in this release:
• ASP_SFW_DELETE_FLOW
• CHASSISD_FM_FABRIC_DOWN
• CHASSISD_FPC_FABRIC_DOWN_REBOOT
• CHASSISD_FRU_INTEROP_UNSUPPORTED
• CHASSISD_RE_CONSOLE_FE_STORM
• RPD_AMT_CFG_ADDR_FMLY_INVALID
• RPD_AMT_CFG_ANYCAST_INVALID
• RPD_AMT_CFG_ANYCAST_MCAST
• RPD_AMT_CFG_LOC_ADDR_INVALID
• RPD_AMT_CFG_LOC_ADDR_MCAST
• RPD_AMT_CFG_PREFIX_LEN_SHORT
• RPD_AMT_CFG_RELAY_INVALID
• RPD_BGP_CFG_ADDR_INVALID
• RPD_BGP_CFG_LOCAL_ASNUM_WARN
• RPD_CFG_TRACE_FILE_MISSING
• RPD_LDP_GR_CFG_IGNORED
• RPD_MC_CFG_FWDCACHE_CONFLICT
• RPD_MC_CFG_PREFIX_LEN_SHORT
• RPD_MSDP_CFG_SA_LIMITS_CONFLICT
• RPD_MSDP_CFG_SRC_INVALID
• RPD_MVPN_CFG_PREFIX_LEN_SHORT
• RPD_PLCY_CFG_COMMUNITY_FAIL
• RPD_PLCY_CFG_FWDCLASS_OVERRIDDEN
• RPD_PLCY_CFG_IFALL_NOMATCH
• RPD_PLCY_CFG_PARSE_GEN_FAIL
• RPD_PLCY_CFG_PREFIX_LEN_SHORT
• RPD_RSVP_COS_CFG_WARN
• RPD_RT_INST_IMPORT_PLCY_WARNING
• RPD_OSPF_IF_COST_CHANGE
• RPD_OSPF_TOPO_IF_COST_CHANGE
• RPD_VPLS_INTF_NOT_IN_SITE
[System Log]
• Added interface information to BFD session up/down system log tags—Added peer
address information for BFDD_TRAP_MHOP_STATE_DOWN and
BFDD_TRAP_MHOP_STATE_UP.
[System Log]
VPNs
• Disable TTL propagation behavior for the routes in a VRF routing instance—Enables
you to control TTL decrementing for individual VPNs. In prior releases, Junos OS enabled
control of TTL behavior only at the router level for all LDP-signaled and all
RSVP-signaled label-switched paths. With this feature, you can control the behavior
on individual VPN routes. To configure, include the vrf-propagate-ttl or
no-vrf-propagate-ttl statement at the [edit routing-instances instance-name] hierarchy
level. The instance-specific behavior overrides the router behavior configured at the
[edit protocols mpls] hierarchy level with the no-propagate-ttl statement. The show
route extensive and show route detail commands display the TTL action for each VRF
routing instance.
[VPNs]
• Support for Layer 3 VPN composite next hops and a larger number of Layer 3 VPN
labels on T Series routers—Layer 3 VPN composite next hops can now be enabled on
T Series routers with Enhanced Scaling FPCs by including the l3vpn-composite-nexthop
statement at the [edit routing options] or [edit logical-systems logical-system-name
routing options] hierarchy levels. This statement enables BGP to accept larger numbers
of Layer 3 VPN BGP updates with unique inner VPN labels. Including the
l3vpn-composite-nexthop statement in the configuration enhances scaling and
convergence performance of PE routers participating in a Layer 3 VPN in a multivendor
environment.
• route—Include this statement when you want to support larger routing tables (with
more routes) over firewall filters. For example, you can enable this option when you
want to support a large number of routes for Layer 3 VPNs implemented using MPLS.
However, we recommend enabling this option only if you do not have a very large
firewall configuration.
To allocate more memory for routing tables, include the route statement at the [edit
chassis memory-enhanced] hierarchy level:
To allocate more memory for Layer 3 VPN labels, include the vpn-label statement
at the [edit chassis memory-enhanced] hierarchy level:
NOTE:
• With Junos Release 10.4, the memory-enhanced route statement at the
• Egress protection LSPs—If there is a link or node failure in the core network, a protection
mechanism such as MPLS fast reroute can be triggered on the transport LSPs between
the PE routers to repair the connection within tens of milliseconds. An egress protection
LSP addresses the problem of when a link failure occurs at the edge of the network
(for example, a link failure between a PE router and a CE device).
To enable an egress protection LSP, you need to configure the following statements:
[VPNs]
[VPNs]
Related • Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M Series, MX
Documentation Series, and T Series Routers on page 37
• Issues in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers on page 48
• Errata and Changes in Documentation for Junos OS Software Release 10.4 for M Series,
MX Series, and T Series Routers on page 66
Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M Series, MX Series, and
T Series Routers
Class of Service
• Changes to the output of the show interfaces queue command—Previously, the output
of the show interfaces queue interface-name displayed the max-queues-per-interface
information HW supported queues, as shown below:
The first value indicates either the default or the value specified through the
max-queues-per-interface statement. Now this is changed to HW supported queues.
The first value does not change with respect to the changes to
max-queues-per-interface as before.
[Class of Service]
• High CPU utilization of the DFWD process—You might notice a high CPU utilization
by the DFWD process if the interface lo0 is configured as part of the interface group
0.
• Bridge domain naming (Layer 2 platforms)—You cannot include the slash mark (/)
in a bridge domain name at the [edit bridge-domains bridge-domain-name] hierarchy
level.
[Layer 2]
• Circuit Emulation (CE) interfaces firmware compatibility for ATM IMA on M7i, M10i,
M40e, M120, and M320 routers—Provides a Firmware mismatch syslog message and
a show interface command output message in the IMA Group state and IMA Link state
if the PIC's firmware is not compatible in Junos OS Release 10.0 and later releases.
CE PICs manufactured with the 560-028081.pbin firmware will produce the following
entry in /var/log/messages when Junos OS is upgraded to Release 10.0R1 or newer
releases:
Firmware mismatch. Need to upgrade PIC PROM Binary CPU firmware for IMA.
If you configure IMA with this combination of Junos OS and CE PIC firmware, the
following entry will be seen.
Firmware error. Need to upgrade PIC PROM Binary CPU firmware for IMA.
The show interfaces ce-fpc/pic/port command output will show the following:
The customer must contact JTAC for a PIC firmware upgrade to proceed with IMA.
• Set bandwidth value on aggregated Ethernet interfaces—You can now set the
bandwidth value by using the bandwidth value statement at the [edit interfaces
aggregate-interface unit number] hierarchy level.
Additionally, the show interfaces aggregate-inteface extensive and the show interfaces
aggregate.logical-interface commands now show the bandwidth of the aggregate when
it is configured. Also, the SNMP OID ifSpeed/ifHighSpeed of the aggregate logical
interface shows the corresponding bandwidth, when it is configured. When it is not
configured, the command shows it as the sum of the bandwidths of the member links
of the aggregate, as before.
• Network interfaces show command output (All platforms)—The output of the show
interfaces detail/extensive command now adds a table that shows complete (not
truncated) names of the forwarding classes associated with queues.
[Network Interfaces]
• Increase in unit numbering for demux0 and pp0 interfaces—The unit numbering for
demux0 and pp0 interfaces has been increased to 1,073,741,823.
• log—Write the specified message to the commit log. This is identical to the CLI
configuration mode command commit comment.
To specify commit options, include the desired options within the <commit-options>
tag. Use the := operator to create a node-set and assign it to a variable. Pass this
variable as the argument for the $commit-options parameter when you call the
jcs:load-configuration template.
For example, to commit the configuration with the synchronize and log options, use
the following syntax for the node-set:
var $options := {
<commit-options> {
<synchronize>;
<log> "synchronizing commit";
}
}
• Junos XML management protocol support for the interface-ranges attribute of the
<get-configuration> operation—By default, the Junos XML protocol operation
<get-configuration> parallels the default behavior of the CLI configuration mode show
command, which displays the [edit interfaces interface-range] hierarchy as a separate
hierarchy in the configuration. To display the inherited tag elements of each interface
range as children of the interface elements that are members of that range, a client
application combines the interface-ranges="interface-ranges" attribute with the
inherit="inherit" attribute in the <get-configuration> tag of a remote procedure call
(RPC).
MPLS Application
• Disable RSVP local revertive mode—Configure the no-local-reversion statement at
the [edit protocols rsvp] hierarchy level to disable RSVP local revertive mode (local
revertive mode as specified in RFC 4090, Fast Reroute Extensions to RSVP-TE for LSP).
RSVP local revertive mode is supported on all Juniper Networks routers running the
Junos OS software by default. If you configure the no-local-reversion statement, the
Juniper Networks router uses global revertive mode instead. You might need to disable
RSVP local revertive mode on Juniper Networks routers if your network includes
equipment that does not support this mode.
[MPLS]
• Enhancement to the show mpls lsp extensive command—In Junos OS Release 10.3
and later, the show mpls lsp extensive command displays more detailed Constrained
Shortest Path First (CSPF) messages. You can now see the reason(s) for the CSPF
path computation and rejection. The following list shows some of the enhanced CSPF
messages (depending on your network configuration, the type of messages you see
might be different):
• 17 Aug 3 13:17:33.601 CSPF: computation result ignored, new path less avail bw[3
times]
• 16 Aug 3 13:02:51.283 CSPF: computation result ignored, new path no benefit[2 times]
[MPLS]
Routing Protocols
• New community-count routing policy match condition for BGP routes—You can now
configure the number of BGP community entries required for an incoming route to
match. This allows you to accept BGP routes based on a specific number of or range
of BGP community entries. To configure the number of community entries, specify the
from statement and include the community-count value (equal | orhigher | orlower)
match condition statement at the following hierarchy levels:
[edit]
policy-options {
policy-statement import-bgp {
term community {
from {
community-count 2 orhigher;
community-count 4 orlower;
}
then {
accept;
}
}
}
}
[Routing Policy]
Services Applications
• New configuration to avoid IDP traffic loss (M120, M320, MX240, MX480, and
MX960 routers)—When the Multiservices PIC or DPC configured for a service set is
either administratively taken offline or undergoes a failure, all the traffic entering the
configured interface with an IDP service set would be dropped without notification. To
avoid this traffic loss, include the bypass-traffic-on-pic-failure statement at the [edit
services service-set service-set-name service-set-options] hierarchy level and (for TCP
traffic only) the ignore-errors tcp statement at the [edit interfaces interface-name
services-options] hierarchy level. When you configure these statements, the affected
packets are forwarded, in the event of a Multiservices PIC or DPC failure or offlining,
as though interface-style services were not configured. This issue applies only to M120,
M320, and MX Series routers.
[Services Interfaces]
The following is a sample of the section of the output showing Add commands with
emergency status:
Add 0 0 0 0
Add (emergency) 0 0 0 0
AuditValue 1 0 1 0
Modify 1 0 1 0
ServiceChange 0 0 0 0
Subtract 0 0 0 0
The following is a sample of the section of the output showing inactivity notifications
on the root termination:
ocp/mg_overloaded 0 0 0 0
it/ito 1404 0 1404 0
[Border Gateway Function (BGF), System Basics and Services Command Reference]
• Support for softwire rules—The match direction output command is now supported for
softwire rules.
[Services Interfaces]
• Command to manage the behavior for reserved ports allocation and port parity—Port
allocation in a NAT pool can now be controlled with the preserve-parity and
preserve-range commands. Preserve-parity allocates even ports for packets with even
destination ports, and odd ports for packets with odd destination ports. Preserve-range
allocates ports within a range of 0 through 1023 assuming the original packet contains
a destination port in the reserved range. This behavior is applicable to control sessions
and not to data sessions.
[Services Interfaces]
[Services Interfaces]
• Border Gateway Function (BGF) apply implicit latching on TCP gates when the gate
is created.—By default, latching of gates is done by explicit latch requests. You can
configure implicit latching of gates by entering the set implicit-tcp-latch and set
implicit-tcp-source-filter configuration statements at the [edit services pgcp gateway
gateway-name h248-options] hierarchy level.
• When either of the gates latches, latching is automatically disabled on the other
gate.
[Subscriber Access]
• Support for DSL Forum VSAs (MX Series routers)—Digital Subscriber Line (DSL)
attributes are RADIUS VSAs that are defined by the DSL Forum. The attributes transport
DSL information that is not supported by standard RADIUS attributes and which convey
information about the associated DSL subscriber and data rate. The attributes are
defined in RFC 4679, DSL Forum Vendor-Specific RADIUS Attributes. Junos OS uses the
vendor ID 3561, which is assigned by the Internet Assigned Numbers Authority (IANA),
for the DSL Forum VSAs.
[Subscriber Access]
pp0 {
unit 0 {
}
[edit interfaces]
...
pp0 {
unit 0 {
pppoe-options {
underlying-interface ge-1/0/0.0;
server;
}
...
}
}
[edit]
dynamic-profiles {
pppoe-profile {
interfaces {
pp0 {
unit "$junos-interface-unit" {
pppoe-options {
underlying-interface "$junos-underlying-interface";
server;
}
...
}
}
}
}
}
• For an IPv4-only configuration, the standard RADIUS attributes report the IPv4
statistics and the IPv6 VSA results are all reported as 0.
• For an IPv6-only configuration, the standard RADIUS attributes and the IPv6 VSA
statistics are identical, both reporting the IPv6 statistics.
• When both IPv4 and IPv6 are configured, the standard RADIUS attributes report the
combined IPv4 and IPv6 statistics. The IPv6 VSAs report IPv6 statistics.
[Subscriber Access]
[Subscriber Access]
• New configuration statement to configure retry attempts for checking the keepalive
status of a Point-to-Point (PPP) protocol session—Junos OS introduces the
keepalive-retries number-of-retries statement at the [edit access profile profile-name
client client-name ppp] hierarchy level. Include this statement in the configuration to
reduce the detection time for PPP client session timeouts or failures if you have
configured the keepalive timeout interval (using the keepalive statement).
[System Basics]
[System Basics]
• New option introduced for the show | display inheritance operational mode
command—Junos OS now provides the no-comments option for the show | display
inheritance command. This option enables you to view CLI configuration details without
inline comments marked with ##.
• Enhancement to the show chassis sibs command—The show chassis sibs command
now displays an appropriate reason when a SIB transitions to the Offline state. For
instance, if ths SIB is taken offline using the request chassis sib command, the output
of the show chassis sibs command displays --- Offlined by cli command --- in the output.
• New option for the ping mpls l2vpn and ping mpls l2circuit commands—The ping mpls
l2vpn and ping mpls l2circuit commands provide a new option reply-mode that enables
you to specify the reply mode for the ping request. The reply-mode option provides the
application-level-control-channel, ip-udp, and no-reply options.
• Enhancement to the output of the show chassis hardware detail command—The show
chassis hardware detail command now displays DIMM information for the following
Routing Engines:
• Enhancement to the show chassis fpc command—The show chassis fpc command
now displays accurate temperature readings for the FPC.
VPNs
• SCU support for VRF routing instances with vrf-table-label configured—You can
now configure source class usage (SCU) to count packets on Layer 3 VPNs configured
with the vrf-table-label statement. Include the source-class-usage statement at the
[edit routing-instances routing-instance-name vrf-table-label] hierarchy level. The
source-class-usage statement at this hierarchy level is supported only for the virtual
routing and forward (VRF) instance type. Previously, you could not enable SCU when
the vrf-table-label statement was configured. Destination class usage (DCU) is not
supported when the vrf-table-label is configured.
Related • New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers
Documentation on page 6
• Issues in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers on page 48
• Errata and Changes in Documentation for Junos OS Software Release 10.4 for M Series,
MX Series, and T Series Routers on page 66
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for M Series, MX Series,
and T Series Routers on page 70
Issues in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers
The current software release is Release 10.4R1. For information about obtaining the
software packages, see “Upgrade and Downgrade Instructions for Junos OS Release 10.4
for M Series, MX Series, and T Series Routers” on page 70.
• When a firewall filter containing the packet loss priority (PLP) rewrite references a
policer that also contains the PLP rewrite, a two time PLP rewrite occurs with the PLP
bits of the packets matching the filter condition set on the PLP set action in the policer,
and later the PLP set action is set on the firewall filter. [PR/566896]
• On a sampled traffic on a multi services PIC, the multicast convergence slows down
with the message "RPD_KRT_Q_RETRIES: Indirect Next Hop Update: No buffer space
available." [PR/554363]
• Making any circuit cross-connect (CCC) filter changes might render the Packet
Forwarding Engine busy which might cause a slow statistics response. [PR/554722]
• When a loopback filter is configured, packets sent by the ASIC to the Packet Forwarding
Engine’s CPU for generation of TTL expiry notification are dropped. [PR/555028]
• In Junos OS Release 10.2 and above, the Packet Forwarding Engine process tracing is
enabled by default. This results in the MIB2D process not being able to communicate
with the Packet Forwarding Engine process. [PR/566681]
• When a firewall filter with multiple terms references the same three color policer and
has the same count variable configured, any IP packets that match the second or later
terms might get corrupted. Use different count variables in each term to prevent this
issue. [PR/567546]
High Availability
• The SSH keys are not in sync between the master and backup Routing Engine when
SSH is enabled after a graceful Routing Engine switchover (GRES). [PR/455062]
• When a container interface (used in AE interfaces) is freed in the memory, the child
nexthop (member link) on the master Routing Engine is also freed. However, in some
cases, the child nexthop on the backup Routing Engine is not freed resulting in a crash.
[PR/562295]
• When an ATM II interface is configured as a Layer 2 circuit with cell transport mode on
a router running Junos OS Release 8.2 or lower, interoperability issues with other network
equipment and another Juniper Networks routers running Junos OS Release 8.3 or
higher might occur. [PR/255622]
• Upon a link up event, old packets from the previous link down are still dequeued. This
leads to huge latency reports. [PR/515842]
• Discrepancies exist in MAC and filter statistics between Trio MPC and I+EZ DPCs.
[PR/517926]
• The queue counter of the aggregated Ethernet is counted up after the statistics are
cleared and the FPC is restarted. [PR/528027]
• When the show interfaces command is used, no service set attachment information
is displayed. This information is visible under the interfaces hierarchy (configuration).
[PR/541574]
• On a DPCE 20x 1 Gigabit Ethernet and 2x 10 Gigabit Ethernet, the link status of the
interface goes down when the TX router towards the peer is removed. [PR/542668]
• Under certain circumstances, the ping request to a VRRP master address is not
successful even when the accept-data option is configured on a VRRP group associated
with an IRB interface. However, after the MAC aging timer expires, the ping request is
successful. [PR/565147]
• The PIM neighborship does not appear over the IRB interface after the dense port
concentrator (DPC) is restarted. [PR/559101]
Network Management
• The value of IfHighSpeed for the current bandwidth of an interface is in units of
1,000,000 bits per seconds. According to RFC 2683, the ifHighSpeed must be rounded
to the nearest whole value on both the physical interfaces and logical interfaces.
[PR/507004]
MPLS Applications
• When the no-decrement-ttl statement is included at the [edit protocols mpls] or the
[edit protocols mpls label-switched-path path-name] hierarchy level, the VPN Label
TTL action field in the output of the show route extensive command displays
vrf-propagate-ttl as the action. This is a display issue only and has no operational
impact on the forwarding behavior. This is relevant to Layer 3 VPN scenarios where
BGP routes resolve over RSVP LSPs and the no-propagate-ttl statement is not
configured at the [edit protocols mpls] hierarchy level. [PR/563505]
• On restarting with a large-scale configuration (16,000 logical interfaces per MPC), the
MPC-3D-16XGE-SFPP card may take up to 15 minutes to come up. [PR/478548]
• The dynamic auto-sensed VPLS interfaces fail after modifications are made to the
routing instance. Before making configuration changes to any routing instance, clear
any active logical interfaces that are part of the routing instance using the clear
auto-configuration interfaces operational command. Modifying a routing instance
configuration when the configuration is actively being used by subscribers can result
in an unpredictable behavior. [PR/512902]
• The GRE key tunnel performance falls by 10 percent when 4000 or more tunnels or
more are configured on the MS-PIC. [PR/520855]
• An NTP server might not reply to clients with a source address that is explicitly
configured. [PR/540430]
• The IPv6 BGP neighbors might not come back to the up state when an FPC associated
with that session is manually taken offline, removed, and re-inserted. [PR/552376]
• With the IRB and AE interfaces in a bridge-domain, the old nexthop data is not cleared
from the Packet Forwarding Engines when they are updated. This causes the Packet
Forwarding Engine to crash when that nexthop is later referenced. [PR/560813]
• On an MX960 router, when an MPC is installed and OSPF and IS-IS is activated
simultaneously, the "jtree memory free using incorrect value 8 correct 0" message is
displayed for all DPCs. [PR/562719]
• On standalone routers with graceful Routing Engine switchover (GRES) (set chassis
redundancy graceful-switchover) enabled, or on multi chassis routers (TX, TXP), when
the interfaces are moved from one aggregate bundle to another using a single commit
operation, out of order logical interface messages might be sent to the Packet
Forwarding Engine. When this occurs, the error messages similar to the following are
displayed:
When these messages are displayed, the state of the Packet Forwarding Engine can
be corrupted and might cause the FPCs to crash at a later time. Hence, it is
recommended that upon encountering these error messages, reboot the router or
reboot the FPCs under a maintenance window.
As a workaround, split the operation into two commits, that is, remove the interface
from one bundle and perform a commit, and then add it to another bundle and perform
a commit. [PR/565658]
Routing Protocols
• When aggregate interfaces are used for VPN applications, load balancing may not
occur with a Layer 2 circuit configuration. [PR/471935]
• Under certain circumstances, the BGP path selection does not follow the local
preference. This might lead to incorrect BGP path selections. [PR/513233]
• When the received next hop for a route has the same address of the EBGP peer to
which the route is readvertised, the next hop is erroneously set to the peer's address
instead of the next hop to self. [PR/533647]
• When an interface is added to a routing instance with rpf-check enabled, the routing
protocol process might crash if a route-distinguisher is also changed at the same time.
[PR/539321]
• In instances with scaled LACP configurations, the periodic packet management process
(ppmd) might experience memory leaks. [PR/547484]
• In Junos OS Release 10.0 and later, a direct route to a VRF with a rib-group is not
advertised as an inet-vpn route to the IBGP neighbor due to the error "BGP label
allocation failure: Need a nexthop address on LAN." [PR/552377]
• On an NSR LDP, an LDP database entry mismatch exists between the master and the
backup Routing Engines. The backup Routing Engine does not replicate the LDP socket
with the error "jsr_sdrl_set_data: No space dlen." [PR/552945]
• When a default route target is sent by a BGP peer, th eBGP does not track the VPN
routes covered by this route target. When the default route target goes away, the BGP
does not withdraw the VPN routes that were previously covered by that default route
target. [PR/556432]
• On a 3D MPC, the load balance might be broken when a BGP multipath is configured.
[PR/557099]
• On M Series, MX Series, and T Series routers, the Virtual Router Redundancy Protocol
(VRRP) process might become unresponsive when processing is delegated to the
Packet Forwarding Engine. As a workaround, remove the delegate-processing option
from the [protocols vrrp] hierarchy level. [PR/559033]
• When the Link Layer Discovery Protocol (LLDP) advertisement interval value is changed
from 30 seconds to 60 seconds, and the show lldp detail command is executed, the
output shows 60 seconds. However, the Routing Engine forwards the LLDP packet
every 30 seconds. When the interface is deactivated and activated again, the LLDP
packets are forwarded every 60 seconds correctly. [PR/560857]
• Under certain circumstances, the routing protocol process crashes while receiving the
IGMP SNMP GetNext request. [PR/561842]
• The multicast snooping process might crash and prevent a commit when the
apply-group statement is used at the bridge-domain <*> hierarchy level. [PR/562776]
• Communities are added in the import policy of the second VPN routing and forwarding
(VRF) table.
[PR/563231]
• On M10i and M7i routers, the distributed PPMD process is disabled by default. However,
it should be enabled by default since it is supported by the Enhanced CFEB (CFEB-E).
[PR/565957]
• IS-IS might not use the MPLS label-switched paths (LSPs) if the names of the
label-switched paths are similar in the first 32 characters. [PR/568093]
• Under certain circumstances, processing of links with maximum metric set by IS-IS
shortest path first (SPF) computation algorithm might lead to suboptimal routing
decisions. [PR/569649]
Services Applications
• The output of the show services ids destination-table command might not display any
flow and related statistics in the IDS anomaly table for a certain period of time after
the flows are activated. [PR/490584]
• In scaled environments, the thread in the Multiservices PIC or DPC for cflow might run
too long. This causes the PIC or DPC to crash. [PR/494457]
• The data channel applications for protocols such as FTP, TFTP, RTSP, and SIP are not
in the same application group as their control channel applications. For example,
control channel application junos:ftp is in the group junos:file-server, but the
corresponding data application junos:system:ftp-data is not in any group. [PR/507865]
• On M Series and MX Series routers, after a hot-standby RMS, all existing flows are
dropped and it takes some time for new flows to appear with the state. This is due to
the limitation of the RMS. All existing traffic is dropped, and RPC is most impacted as
it has a long retry timer and takes a long time to recover. [PR/535597]
• When unit 0 of the Multiservices PIC interface is not specified, the monitor interface
traffic command does not display the input packet’s number properly for that particular
ms-I/F interface. [PR/544318]
• On Multiservices 500 PICs with graceful Routing Engine switchover, wrong record
values are seen for the IPv4 netflow export packets. This error occurs when the route
records does not get installed. [PR/545422]
• The MS400 PIC crashes due to a memory allocation failure when the PIC tries to
respond to a Routing Engine CLI request. [PR/558237]
• Selecting the monitor port for any port in the Chassis Viewer page displays the common
Port Monitoring page instead of the corresponding Monitoring page of the selected
port. [PR/446890]
• On MX Series routers, J-Web does not display the USB-related information under
Monitor>SystemView>System Information>Storage. [PR/465147]
• When a new-line character (\n) is used within the op script argument descriptions, the
help output might display incorrectly, and could result in extra output being displayed
when the op script executes. [PR/485253]
• In the J-Web interface, the options Access Concentrator, Idle Timeout, and Service Name
for PPPoE logical interfaces are not supported on MX Series routers. [PR/493451]
• The J-Web interface does not display the drop-profile-map, excess-priority, excess-rate,
and rate-limit (transmit rate) parameters which are supported for the schedulers
configuration. Use these parameters using the CLI. [PR/495947]
• Warning messages related to pending commits are not triggered when the following
operations are performed:
• Software->Upload
• Software->Install Package
• Maintain->Reboot
As a workaround, commit all pending commits before performing the operations listed
above. [PR/514853]
• The annotate option does not appear when it is used with the edit private command
for class of service. [PR/535574]
• When a HTTPS connection is used for the J-Web interface in the Internet Explorer to
save a report from the View Events page (Monitor->Events and Alarms->View events),
the following error message is displayed “Internet Explorer was not able to open the
Internet site.”
This issue also appears in the following places on the J-Web interface:
• maintain->config management->history
• maintain->files
[PR/542887]
• The J-Web pages loads inconsistently when Add IPv4 or IPv6 filters are used in the
Internet Explorer and Firefox Web browsers. [PR/543607]
• After the "delete:" action is performed, the "replace" actions do not take effect in the
"load replace terminal" operation. [PR/556971]
• The javascript error, "Object Expected" occurs when J-Web pages are navigated before
the page loads completely. [PR/567756]
VPNs
• On a router configured for nonstop active routing (NSR) (the nonstop-routing statement
is included at the [edit routing-options] hierarchy level), if a nonstop active routing
switchover occurs after the configuration for routing instances changes in certain ways,
the BGP sessions between PE and CE routers might not be established after the
switchover. [PR/399275]
• The routing protocol process crashes when the rd value of an old instance is different
from the rd value of a new instance in the VLAN ID. [PR/512499]
Previous Releases
Release 10.3R2
The following issues have been resolved since Junos OS Release 10.3R2. The identifier
following the description is the tracking number in our bug database.
Class of Service
• When a VLAN ID is changed, the following message appears in the messages log:
"COSD_GENCFG_WRITE_FAILED: GENCFG write failed for Classifier to IFL 74. Reason:
File exists.” This log message appears when the configuration is committed with VPLS
configured on the Gigabit Ethernet interface, and a class-of-service classifier or rewrite
rules that contain IEEE 802.1P on the interface are used. [PR/408552: This issue has
been resolved.]
• When a logical interface set has a shaping-rate less than the sum of transmit-rates of
its queues and when the configuration is corrected so that the logical interface set gets
the correct shaping-rate, ADPC might crash. [PR/523507: This issue has been resolved.]
• During a graceful Routing Engine switchover, the traffic control profile might not be
applied on the interfaces. As a workaround, deactivate and reactivate class of service.
[PR/533862: This issue has been resolved.]
• When per-unit-scheduler is applied under the interfaces hierarchy level, and shaping
rate is applied under the class-of-service interface hierarchy level in the same commit
operation, port shaping rate does not work and the total logical interface transmitted
byte rate exceeds the physical interface shaping rate. As a workaround, configure
shaping-rate within a traffic-control-profile and apply that to an interface, or deactivate
and activate shaping-rate using the class-of-service interface interface-name shaping-rate
command. [PR/539590: This issue has been resolved.]
• Under certain conditions, the class of service configuration might not take effect on
an IQ2 PIC. [PR/541814: This issue has been resolved.]
• When the rate-limit option is configured on a physical interface on IQ2 PICs, the show
interface queue command might not display the RL-dropped counters. [PR/547218:
This issue has been resolved.]
• The egress rate limit over a logical interface may drop large packets. [PR/547506: This
issue has been resolved.]
• In Junos OS Release 10.2 and later, the cosd process might crash while a configured
commit is processed, as this process accesses a memory location that has already
been freed. However, this issue is encountered rarely. [PR/548367: This issue has been
resolved.]
• The policer counter might be missing in the SNMP walk. Reboot the router to solve this
problem. [PR/535715: This issue has been resolved.]
• When logical systems are configured, the show bridge-domains command might time
out and return the following error message: “error: timeout communicating with
l2-learning daemon.” [PR/536604: This issue has been resolved.]
• In Junos OS Release 10.2, the Routing Engine-based sampling might not work if the
routing table inet.0 has a route for 128.0.0.1. The issue occurs when this route points
to an external interface. [PR/540891: This issue has been resolved.]
• A GRE interface might experience an incoming packet loss if a firewall filter is configured
on the forwarding table. [PR/541901: This issue has been resolved.]
High Availability
• On M120 routers, the message: "stream blocked detected message" displays when an
FEB is switched from the backup to the primary. [PR/540644: This issue has been
resolved.]
• An OAM trace displays an incorrect next-hop MAC value. [PR/494588: This issue has
been resolved.]
• When traffic flows into the MPC on which a bridge-domain configuration is being
changed or the card is booting up, the forwarding software tries to access uninitialized
memory for a short duration. This is a cosmetic issue and does not have any functional
impact. [PR/506344: This issue has been resolved.]
• On M7i routers with Junos OS Release 8.5 or later, the output of the show interfaces
fxp0 command shows the fxp0 interface to be in the link up state even when the
interface is disabled with no cables connected. [PR/508261: This issue has been
resolved.]
• When the VRRP6 master changes, there is no log output for VRRP IPv6. [PR/514821:
This issue has been resolved.]
• When a SIB is taken offline via a CLI command, the output of the show chassis sibs
command does not display the message “Offlined by cli command.” However, this
message is correctly displayed for the FPCs. [PR/519842: This issue has been resolved.]
• The statistics get for LSQ interfaces fails in a scaled LSQ configuration when the show
interfaces queue lsq-w/x/y:z command is executed. [PR/523260: This issue has been
resolved.]
• When MLPPP interfaces of an MS-PIC are taken offline, the following syslog message
displays: “RT: itable unset idx 372 to proto MLPPP iftable failed (Invalid arguments)
on FE -1.” [PR/528649: This issue has been resolved.]
• In Junos OS Release 10.0 and later, a significantly large number of the following
messages appear on the MX960 and SRX5800 routers:
These messages are not an indication of a fan failure. They are cosmetic and can be
ignored. [PR/531253: This issue has been resolved.]
• On MX960 routers, the link status stays in the "Link ok" state when the SCB is removed
without taking it offline using the CLI or switch. [PR/536860: This issue has been
resolved.]
• The SCB displays an incorrect state when it is removed without taking it offline using
the CLI or buttons. This is not a cosmetic error and might impact the traffic.
[PR/536866: This issue has been resolved.]
• On MX Series routers with 10.x Power Budget, after a “Power Budget: Chassis
experiencing power shortage” alarm occurs, the alarm does not clear even after the
power budget problem is cleared. [PR/540522: This issue has been resolved.]
• The MX-MPC1-3D-Q accepts VLAN tagged packets even when the interface is not
configured with VLAN tagging. [PR/540620: This issue has been resolved.]
• The link-up time on a 16x 10-Gigabit Ethernet MPC is not less than the other platforms
(ADPC and other MPCs) due to the emission dispersion compensation (EDC)
functionality of the PHY device on the MPC. This causes a delay of 50 mS to 150 mS
and cannot be changed. [PR/540694: This issue has been resolved.]
• The sonet-options raise-rdi-on-rei and trigger options do not work well together. Turning
the raise-rdi-on-rei option on and off again requires the trigger option to flap in order
to assert or clear the RDI-L alarm. As a workaround, when both sonet-options
raise-rdi-on-rei and trigger options are configured, flap the sonet-options trigger as well.
[PR/540745: This issue has been resolved.]
• With Junos OS Release 10.2 and later, when a logical interface on an ATM-II IQ PIC is
disabled, the FPC is taken offline and brought back online, and the PIC is reenabled,
the logical interface stays down with atm_maker_check_indq error messages.
[PR/541688: This issue has been resolved.]
• When a Gigabit Ethernet or an XE interface on IQ2 PICs is disabled, and the link status
is up, the traffic received from the interface might still be forwarded. [PR/543388: This
issue has been resolved.]
• When logical interfaces are created, the NPC crashes and the FPC goes down.
[PR/545314: This issue has been resolved.]
• Chassisd crashes when the show chassis clocks command is executed. [PR/545510:
This issue has been resolved.]
• When configuration changes are made that are unrelated to the interfaces, interface
sets, or PICs, a commit failure occurs with the following error message: "error: iflset
xxxx configured for nonexisting ifd ge-x/x/x." [PR/546184: This issue has been resolved.]
• On a 10-Gigabit Ethernet PIC, a log is generated when the SFP is plugged in. However,
no log is generated when the SFP is not plugged in. [PR/548251: This issue has been
resolved.]
• A CFM ping command fails when the maintenance domain or maintenance association
is longer than 32 characters. [PR/550014: This issue has been resolved.]
• If a bridge-domain contains more than one Aggregated Ethernet, and the IRB interfaces
experiences the right sequence of MAC moves, the FPC might restart. [PR/550824:
This issue has been resolved.]
• If the number of VPLS connection exceeds 31, frequent FPC and NPC crashes might
occur. [PR/552099]
• The EOA family configurations over a container ATM interface might be deleted and
added again upon every commit (including unrelated commits). [PR/553077: This
issue has been resolved.]
• When a remote PE's address is configured on a local loopback interface, the MVPN
PIM neighborship to that PE in a different VRF might be affected. [PR/558584]
• The AE interface does not show the system identifier for the attached interfaces in
actor role. Because of this, the AE interface gets stuck in the detached state after it is
rebooted from both ends. Additionally, the AE interface flaps when the backup Routing
Engine is rebooted and a graceful Routing Engine switchover (GRES) is performed.
[PR/547739: This issue has been resolved.]
• The DHCP relay bindings remain in a release state with a negative lease time.
[PR/549520: This issue has been resolved.]
• The L2CPD might have a memory leak when LLDP is enabled. [PR/549531: This issue
has been resolved.]
MPLS Applications
• With BFD enabled over IGP and an RSVP session built across it, when the RSVP peer
does not support RSVP Hello (or is disabled), the BFD session down event triggers
only the IGP neighbor to go down. The RSVP session remains up until a session timeout
occurs. [PR/302921: This issue has been resolved.]
• The rlist entry corresponding to the previously existing rlist is not removed, which causes
the routing protocol process to crash. [PR/513160: This issue has been resolved.]
• When a protected link flaps, certain RSVP routes do not lose association with the
p2mp_nh. [PR/530750: This issue has been resolved.]
• Under NGEN-MVPN with vrf-table-label configured on the provider edge, the provider
router connecting to that provider edge might keep an old P2MP MPLS label entry
upon label-switched path optimization or reroute. There is no workaround. [PR/538144:
This issue has been resolved.]
• An LSP with auto-bw might stay down for approximately 30 minutes after a Routing
Engine switchover or a Routing Engine restart when graceful restart fails. As a
workaround, disable and reenable the MPLS or OSPF stanza. [PR/539524: This issue
has been resolved.]
• On a P2MP LSP setup, the routing protocol process of the transit router might core
when the topology changes with respect to the ingress sub-LSP router. There is no
workaround. [PR/549778: This issue has been resolved.]
• In Junos OS Release 10.2, when the clear mpls lsp autobandwidth command is executed
at the ingress router, the updated Maximum AvgBW Utilization field displays a value
that is much higher than the actual bandwidth. [PR/550289: This issue has been
resolved.]
• On MX80 routers, the MPLS LSP statistics do not record the transit traffic on a
single-hop LSP with an implicit NULL label. [PR/551124: This issue has been resolved.]
• When a large number of P2MP LSPs exist during periods of high network instability
with many links flapping, and MBB re-routing of a P2MP LSP occurs, an MPLS route
can become stale. This can cause a routing protocol process assertion failure on a
transit router. [PR/555219: This issue has been resolved.]
Network Management
• The SNMP process might restart when a core dump is generated. [PR/517230: This
issue has been resolved.]
• In Junos OS Release 10.2 and later, the size of the MIB2D process might increase as a
result of memory leaks. This causes the MIB2D process to crash as it reaches its
maximum permitted size. [PR/546872: This issue has been resolved.]
• In Junos OS Release 9.2 and later, a memory leak occurs in the subagent in a scenario
where the snmpd process is not running, or there are issues in communication with a
subagent and traps are being generated by the subagent. [PR/547003: This issue has
been resolved.]
• When the firewall filter policer configuration is changed, the SNMP MIBs might not
update correctly. As a result, the counters are inaccessible. [PR/555719: This issue has
been resolved.]
• After an 8216 Routing Engine upgrade to Junos OS Release 9.6 with "chassis"
deactivated, the backup Routing Engine starts to reboot with the panic message "panic:
filter_idx_alloc: invalid filter index," and crashes when the chassis configuration is
enabled and committed. After the Routing Engine finally comes online, the CLI response
is slow and the Routing Engine reboots again after approximately three minutes. To
stop these reboots, deactivate the chassis on the backup Routing Engine. [PR/489029:
This issue has been resolved.]
• On T Series routers, the FPC might continuously reboot upon installation. [PR/510414:
This issue has been resolved.]
• When the system default-router a.b.c.d command is used, the default route is not
installed in the Packet Forwarding Engine. [PR/523663: This issue has been resolved.]
• In an MPLS environment, the source NAT or PAT for traffic between two remote VPNs
does not work when the vrf-table-label option is removed from the VRF where the
inside-service interfaces are located. [PR/524294: This issue has been resolved.]
• When VPLS is configured on the router, the following log messages will appear when
the interface goes down:
These messages can be ignored. [PR/524548: This issue has been resolved.]
• After the MS-PIC’s homing PE interfaces used for MVPN are taken offline and brought
back online, the following message may be logged: “flip-re0 fpc3 SLCHIP(0): %PFE-3:
Channel 8189 (iif=701) on stream 32 already exists.” [PR/527813: This issue has been
resolved.]
• The Packet Forwarding Engine incorrectly imposes a rate limit function for the
host-bound virtual LAN tagged packets with IEEE 802.1p value of 1. There is no
workaround. [PR/529862: This issue has been resolved.]
• A router might send raw IPv6 host-generated packets over the Ethernet towards its
BGP IPv6 peers. [PR/536336: This issue has been resolved.]
• BGP authentication does not work with the 64-bit Junos OS BGP route reflector on a
JCS platform. BGP sessions fail to establish, and the following error message is
observed: "... /kernel: tck_auth_ok Packet from XXX.XXX.XXX.XXX:XXXXX wrong MD5
digest." [PR/538076: This issue has been resolved.]
• On M10i routers, an upgrade to Junos OS Release 10.2 fails and aborts when the PIC
combinations are verified. As a workaround, first verify the PIC combinations manually
against PSN-2010-06-777, then use the force option to override the warnings and force
the upgrade. [PR/540468: This issue has been resolved.]
• In Junos OS Release 10.3, the following messages may be seen in the syslog: “/kernel:
sysctl_nd6_mmaxtries: 3, max solicit testing setting of paramsysctl_nd6_mmaxtries:
3, max solicit testing setting of paramsysctl_nd6_mmaxtries: 3, max solicit testing
setting of paramsysctl_nd6_mmaxtries: 3, max solicit testing setting of
paramsysctl_nd6_mmaxtries: 3, max solicit testing setting of param /kernel:
sysctl_nd6_prune: 1, retrans timer testing setting of paramsysctl_nd6_prune: 1, retrans
timer testing setting of paramsysctl_nd6_prune: 1, retrans timer testing setting of
paramsysctl_nd6_prune: 1, retrans timer testing setting of paramsysctl_nd6_prune: 1,
retrans timer testing setting of param.” These messages are cosmetic. [PR/540808:
This issue has been resolved.]
• During SNMP queries in Junos OS Release 10.2 and later, the size of the MIB2D process
might increase as a result of memory leaks in a statistics-associated library routine
(libstats). This causes the MIB2D process to crash as it reaches its maximum permitted
size. [PR/541251: This issue has been resolved.]
• During router bootup, the error messages: "can't re-use a leaf (nd6_prune)!" and "can't
re-use a leaf (nd6_mmaxtries)!" display. [PR/543422: This issue has been resolved.]
• The backup Routing Engine might cause the kernel to crash when a configuration
change occurs on the AE bundle during a next-hop index allocation. [PR/544092: This
issue has been resolved.]
• On TX Matrix routers with T640-FPC3 FPCs and a large number of routes, when an
AE interface in an ECMP path is taken down, small packet drops might occur in the
traffic on the other ECMP link. This issue does not occur when an indirect next hop is
used. [PR/545166: This issue has been resolved.]
• In Junos OS Release 10.0 and later, the FPCs in M320 and T Series routers might crash
when the error “PFE: Detected error next-hop” (corrupted next-hop) is encountered.
[PR/546606: This issue has been resolved.]
• On M120 routers, multicast packet drops occur when both the Fast Ethernet and the
SFP Gigabit Ethernet PICs are located on the same Packet Forwarding Engine.
[PR/546835: This issue has been resolved.]
• In Junos OS Release 9.3 and later, when routers using Enhanced FPCs (T640-FPCx-ES
or T1600-FPC4-ES FPCs) have a configuration involving CBF LSPs and aggregate
interfaces, a jtree corruption might occur when a flap from a member link in the
aggregate occurs on the remote end, or the FPC of the remote router is rebooted. To
avoid this issue, use the indirect-next-hop option (routing-options forwarding-table
indirect-next-hop). The error message “PFE: Detected error nexthop:" indicates a jtree
corruption. [PR/548436: This issue has been resolved.]
Routing Protocols
• The output of the show ospf statistics command does not display the hello packet
statistics. [PR/427725: This issue has been resolved.]
• The mirror receive task variable may not be cleared when the routing protocol process
is heavily scaled. Hence, the NSR replication for RIP status stays in the "InProgress"
state indefinitely. [PR/516003: This issue has been resolved.]
• Under rare circumstances, multiple commits might crash both Routing Engines. The
routing protocol process dumps core and restarts only on the master Routing Engine.
This issue occurs when commits are executed within one minute. [PR/516479: This
issue has been resolved.]
• Upon an NSR mastership switch or ISSU upgrade, the multicast resolve route for IPv4
224/4 or inet6 ff00::/8 might be missing within the forwarding-table. To recover from
this condition, deactivate and activate the protocol pim stanza, or restart the routing
protocol process. [PR/522605: This issue has been resolved.]
• For Junos OS Release 9.5 and above, the BGP parse community begins with “0” as the
octal value. This behavior is different in earlier releases. [PR/530086: This issue has
been resolved.]
• The overload bit in the ISIS LSP MT-TLV may trigger the IS-IS to install a default route
to the overload bit advertiser. And the output of the show isis database extensive
command displays an unknown TLV. [PR/533680: This issue has been resolved.]
• The routing protocol process might crash due to an invalid prefix-length value in one
of the flow-spec routes. [PR/534757: This issue has been resolved.]
• If there is enough join state associated with a neighbor and that neighbor goes down
and comes back up quickly, then that join state may be stranded in an unresolved state
until the clear pim join command is issued. [PR/539962: This issue has been resolved.]
• On Type 2 Trio MPC, multiple changes to a single term in quick succession can cause
an incorrect filter state in the Packet Forwarding Engine. This causes the MPC to crash.
[PR/540674: This issue has been resolved.]
• The routing protocol process might crash when a BGP connection attempt meets with
an RST from the peer. This is due to an unlikely race condition. [PR/540895: This issue
has been resolved.]
• Under certain timing conditions, an interior gateway protocol topology change can
result in the BGP routes referencing an incorrect egress interface. This problem can
occur when active and inactive BGP routes are learned from the same peer and the
inactive BGP routes are deleted at the time of the topology change. [PR/543911: This
issue has been resolved.]
• In instances with scaled LACP configurations, the periodic packet management process
(ppmd) might experience memory leaks. [PR/547484: This issue has been resolved.]
• When two identical local interface addresses are shared between two VRFs via
auto-export, the routing protocol process might cause a high CPU utilization.
[PR/547897: This issue has been resolved.]
• When the primary loopback address changes, the routing protocol process might crash
when a new data mdt is created. [PR/549483: This issue has been resolved.]
• If a PIM <S, G> join arrives when there is no route to the source, PIM RPF checking is
disabled, and a matching multicast route is present, the output interfaces associated
with the PIM <S, G> join are not added to the multicast route. [PR/550703: This issue
has been resolved.]
• The IPv6 entries are removed from the output of the show pim interfaces command
when the corresponding interface is in the down state. This is a cosmetic issue.
[PR/550799: This issue has been resolved.]
• On MX80 routers, even when static routes are configured, the management port does
not forward traffic to the user ports. [PR/552952: This issue has been resolved.]
• When an interface-based IPv6 BGP session with a 2-byte AS format is used, the system
might crash. [PR/553772: This issue has been resolved.]
• An IS-IS adjacency flap at a precise interval can cause the routing protocol process to
restart on a neighbor, as it is in the process of purging the LSAs of the previously down
node from the local database. [PR/554233: This issue has been resolved.]
Services Applications
• In Junos OS Release 10.0 and later, the routing instance name is restricted to 63
characters. [PR/533882: This issue has been resolved.]
• The BGP_IPV4_NEXT_HOP field on the jflow v9 record matches the originator ID instead
of the BGP next hop. [PR/534598: This issue has been resolved.]
• When traffic is forwarded in an L2TP session and a teardown request is received, the
ASPIC crashes with a memory access violation in mlppp_output. [PR/537225: This
issue has been resolved.]
• On M Series routers configured for L2TP tunneling with several thousands of PPP
connections, when all the PPP sessions expire at the same time, the MS-PIC might
hang and become unusable. To recover the service, restart the PIC. [PR/541793: This
issue has been resolved.]
• On SG3 PICs (Multiservices 500) with graceful Routing Engine switchover (GRES),
wrong record values are seen for the IPv4 netflow export packets. This error occurs
when the route records are not installed. [PR/545422: This issue has been resolved.]
• The IPv6 and MPLS route counts are not reflected in the output of the show service
accounting status command. [PR/550793: This issue has been resolved.]
• While a configuration with a long as-path is displayed in XML format using the show
configuration | display xml | no-more command, the closing tag for the as-path <path>
is wrongly displayed as </path instead of </path>. [PR/525772: This issue has been
resolved.]
• The xnm service currently does not support logging of remote-host addresses in system
accounting. [PR/535534: This issue has been resolved.]
• It is possible to login to J-Web from a web browser having a cipher strength of 40 and
56 bits. This could create a security issue. As a workaround, use a web browser that
supports 128 bit of cipher strength. [PR/539477: This issue has been resolved.]
• The system continues to use the TACACS server configuration even after it is removed.
As a workaround, deactivate and reactivate the accounting configuration. [PR/544770:
This issue has been resolved.]
• When the load set command is used to refresh a script file, the script does not refresh,
and exits from the CLI after displaying the rpc-related errors. [PR/555316: This issue
has been resolved.]
VPNs
• When two MVPN routing instances and at least one L2VPN routing instance are
configured, the commit fails with the following message: “RPD_RT_DUPLICATE_RD:
routing-instance xxx has duplicate route-distinguisher." As a workaround, configure
the route-distinguisher-id for each instance manually. [PR/511514: This issue has been
resolved.]
• If a VPN routing and forwarding (VRF) instance contains a static route that is resolved
via a route that is auto-exported from another routing instance, the static route may
not be removed when the physical interface goes down. [PR/531540: This issue has
been resolved.]
• Under certain circumstances, the container interfaces might not send the proper martini
modes to the routing protocol process. This results in incorrect control-word-related
information sent to the Packet Forwarding Engine. [PR/541998: This issue has been
resolved.]
• In a Live/Standby MVPN extranet setup, with the primary provider on PE1, the backup
provider on PE2, and a receiver on PE3 and receivers also on PE1 and PE2, traffic drops
occur for 25 seconds after every 35 seconds. [PR/542984: This issue has been resolved.]
Related • New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers
Documentation on page 6
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M Series, MX
Series, and T Series Routers on page 37
• Errata and Changes in Documentation for Junos OS Software Release 10.4 for M Series,
MX Series, and T Series Routers on page 66
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for M Series, MX Series,
and T Series Routers on page 70
Errata and Changes in Documentation for Junos OS Release 10.4 for M Series, MX Series, and
T Series Routers
The following are the changes made to the Junos OS documentation set:
• The term “Multiplay” has been replaced with “Session Border Control” in the Junos OS
Release Notes.
• The Integrated Multi-Service Gateway (IMSG) pathway page now includes three
complete configuration examples:
• IMSG—Basic Configuration
• IMSG—Dual BGFs
• IMSG—Server Clusters
The configuration examples are applicable to Junos OS Release 10.2 and later.
• The Junos OS Layer 2 Configuration Guide provides an overview of the Layer 2 functions
supported on Juniper Networks routers, including configuring bridge domains, MAC
addresses and VLAN learning and forwarding, and spanning-tree protocols. It also
details the routing instance types used by Layer 2 applications. This material was
formerly covered in the Junos OS MX Series Ethernet Services Routers Layer 2
Configuration Guide.
• The title of the Junos OS Hierarchy and RFC Reference is now Junos OS Hierarchy and
Standards Reference.
• Documentation for the extended DHCP relay agent feature is no longer included in the
Policy Framework Configuration Guide. For DHCP relay agent documentation, see the
Subscriber Access Configuration Guide or the documentation for subscriber access
management.
• In Junos OS Release 10.3R1 and later, PDF files are not available for individual HTML
pages in the Junos OS documentation set. PDF files are available for the complete
Junos OS Release 10.3 configuration guides at
http://www.juniper.net/techpubs/software/junos/junos103/index.html. PDF files for the
complete hardware guides are accessible at the following URLs:
In addition, individual HTML pages have a Print link in the upper left corner of the text
area on the page.
Errata
High Availability
• TX Matrix Plus routers and T1600 routers that are configured as part of a routing matrix
do not currently support nonstop active routing. [High Availability]
• The Configuring Layer 2 Circuit Transport Mode chapter in the Network Interfaces
Configuration Guide states the following:
• For Layer 2 circuit cell relay and Layer 2 trunk modes, include the atm-l2circuit-mode
cell statement at the [edit chassis fpc slot pic slot] hierarchy level and the
encapsulation atm-ccc-cell-relay statement at the [edit interfaces interface-name]
hierarchy level.
This configuration is correct and interoperates with routers running all versions of Junos
OS.
However, the chapter does not mention that you can also include the encapsulation
atm-ccc-cell-relay statement at the [edit interfaces interface-name unit
logical-unit-number] hierarchy level. when you include the statement at the [edit
interfaces interface-name unit logical-unit-number]] hierarchy level, keep the following
points in mind:
• This configuration does not interoperate with other network equipment, including a
Juniper Networks router running Junos OS Release 8.3 or later, unless it is also
configured with the same use-null-cw statement.
• For a Juniper Networks router running Junos OS Release 8.3 or later to interoperate
with another Juniper Networks router running Junos OS Release 8.2 or earlier, on the
router running Junos OS Release 8.3 or later, include the use-null-cw statement at
the [edit interfaces interface-name atm-options] hierarchy level.
• The use-null-cw statement inserts (for sending traffic) or strips (for receiving traffic)
an extra null control word in the MPLS packet.
[Network Interfaces]
• With Junos OS Release 10.1 and later, you need not include the tunnel option or the
clear-dont-fragment-bit statement when configuring allow-fragmentation on a tunnel.
[Services Interfaces]
J-Web Interface
• To access the J-Web interface, your management device requires the following
software:
• For a complete list of available features on MX80 routers please contact your sales
engineer or the Juniper Technical Assistance Center.
• The Configuring a Dynamic Profile for Client Access topic erroneously uses the
$junos-underlying-interface variable when a IGMP interface is configured in the client
access dynamic profile. The following example provides the appropriate use of the
$junos-interface-name variable:
In addition, the Subscriber Access Configuration Guide erroneously specifies the use of
a colon (:) when you configure the dynamic profile to define the IGMP version for client
interfaces. The following example provides the appropriate syntax for setting the IGMP
interface to obtain the IGMP version from RADIUS:
• The Subscriber Access Configuration Guide and the System Basics Configuration Guide
contain information about the override-nas-information statement. This statement
does not appear in the CLI and is not supported.
• When you modify dynamic CoS parameters with a RADIUS change of authorization
(CoA) message, the Junos OS accepts invalid configurations. For example, if you specify
that a transmit rate that exceeds the allowed 100 percent, the system does not reject
the configuration and returns unexpected shaping behavior.
[Subscriber Access]
• We do not support multicast RIF mapping and ANCP when configured simultaneously
on the same logical interface. For example, we do not support when a multicast VLAN
and ANCP are configured on the same logical interface, and the subscriber VLANs are
the same for both ANCP and multicast.
[Subscriber Access]
• The Guidelines for Configuring Dynamic CoS for Subscriber Access topic in the Subscriber
Access Configuration Guide erroneously states that dynamic CoS is supported for
dynamic VLANs on the Trio MPC/MIC family of products. In the current release, dynamic
CoS is supported only on static VLANs on Trio MPC/MIC interfaces.
[Subscriber Access]
[Subscriber Access]
VPNs
• In Chapter 19, Configuring VPLS of the VPNs Configuration Guide, an incorrect statement
that caused contradictory information about which platforms support LDP BGP
interworking has been removed. The M7i router was also omitted from the list of
supported platforms. The M7i router does support LDP BGP interworking.
[VPNs]
Related • New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers
Documentation on page 6
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M Series, MX
Series, and T Series Routers on page 37
• Issues in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers on page 48
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for M Series, MX Series,
and T Series Routers on page 70
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for M Series, MX Series,
and T Series Routers on page 70
Upgrade and Downgrade Instructions for Junos OS Release 10.4 for M Series, MX Series, and T
Series Routers
This section discusses the following topics:
In order to upgrade to Junos OS 10.0 or later, you must be running Junos OS 9.0S2, 9.1S1,
9.2R4, 9.3R3, 9.4R3, 9.5R1, or later minor versions, or you must specify the no-validate
option on the request system software install command.
When upgrading or downgrading the Junos OS, always use the jinstall package. Use other
packages (such as the jbundle package) only when so instructed by a Juniper Networks
support representative. For information about the contents of the jinstall package and
details of the installation process, see the Junos OS Installation and Upgrade Guide.
NOTE: You cannot upgrade by more than three releases at a time. For
example, if your routing platform is running Junos OS Release 10.0 you can
upgrade to Junos OS Release 10.3 but not to Junos OS Release 10.4 As a
workaround, first upgrade to Junos OS Release 10.3 and then upgrade to
Junos OS Release 10.4.
NOTE: With Junos OS Release 9.0 and later, the compact flash disk memory
requirement for Junos OS is 1 GB. For M7i and M10i routers with only 256 MB
memory, see the Customer Support Center JTAC Technical Bulletin
PSN-2007-10-001 at
https://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2007-10-001&actionBtn=Search.
NOTE: Before upgrading, back up the file system and the currently active
Junos configuration so that you can recover to a known, stable environment
in case the upgrade is unsuccessful. Issue the following command:
The installation process rebuilds the file system and completely reinstalls
the Junos OS. Configuration information from the previous software
installation is retained, but the contents of log files might be erased. Stored
files on the routing platform, such as configuration templates and shell scripts
(the only exceptions are the juniper.conf and ssh files) might be removed. To
preserve the stored files, copy them to another system before upgrading or
downgrading the routing platform. For more information, see the Junos OS
System Basics Configuration Guide.
The download and installation process for Junos OS Release 10.4 is the same as for
previous Junos OS releases.
If you are not familiar with the download and installation process, follow these steps:
1. Using a Web browser, follow the links to the download URL on the Juniper Networks
Web page. Choose either Canada and U.S. Version or Worldwide Version:
2. Log in to the Juniper Networks authentication system using the username (generally
your e-mail address) and password supplied by Juniper Networks representatives.
4. Copy the software to the routing platform or to your internal software distribution
site.
Customers in the United States and Canada use the following command:
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
• http://hostname/pathname
The validate option validates the software package against the current configuration
as a prerequisite to adding the software package to ensure that the router reboots
successfully. This is the default behavior when the software package being added is
a different release.
Adding the reboot command reboots the router after the upgrade is validated and
installed. When the reboot is complete, the router displays the login prompt. The
loading process can take 5 to 10 minutes.
NOTE: After you install a Junos OS Release 10.4 jinstall package, you cannot
issue the request system software rollback command to return to the previously
installed software. Instead you must issue the request system software add
validate command and specify the jinstall package that corresponds to the
previously installed software.
NOTE: Before you upgrade a router that you are using for voice traffic, you
should monitor call traffic on each virtual BGF. Confirm that no emergency
calls are active. When you have determined that no emergency calls are
active, you can wait for nonemergency call traffic to drain as a result of
graceful shutdown, or you can force a shutdown. For detailed information
on how to monitor call traffic before upgrading, see the Junos OS Multiplay
Solutions Guide.
If the router has two Routing Engines, perform a Junos OS installation on each Routing
Engine separately to avoid disrupting network operation as follows:
1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine
and save the configuration change to both Routing Engines.
2. Install the new Junos OS release on the backup Routing Engine while keeping the
currently running software version on the master Routing Engine.
3. After making sure that the new software version is running correctly on the backup
Routing Engine, switch over to the backup Routing Engine to activate the new software.
4. Install the new software on the original master Routing Engine that is now active as
the backup Routing Engine.
For the detailed procedure, see the Junos OS Installation and Upgrade Guide.
In releases prior to Junos OS Release 10.1, the draft-rosen multicast VPN feature
implements the unicast lo0.x address configured within that instance as the source
address used to establish PIM neighbors and create the multicast tunnel. In this mode,
the multicast VPN loopback address is used for reverse path forwarding (RPF) route
resolution to create the reverse path tree (RPT), or multicast tunnel. The multicast VPN
loopback address is also used as the source address in outgoing PIM control messages.
In Junos OS Release 10.1 and later, you can use the router’s main instance loopback
(lo0.0) address (rather than the multicast VPN loopback address) to establish the PIM
state for the multicast VPN. We strongly recommend that you perform the following
procedure when upgrading to Junos OS Release 10.1 if your draft-rosen multicast VPN
network includes both Juniper Network routers and other vendors’ routers functioning
as provider edge (PE) routers. Doing so preserves multicast VPN connectivity throughout
the upgrade process.
Because Junos OS Release 10.1 supports using the router’s main instance loopback (lo0.0)
address, it is no longer necessary for the multicast VPN loopback address to match the
main instance loopback adddress lo0.0 to maintain interoperability.
NOTE: You might want to maintain a multicast VPN instance lo0.x address
to use for protocol peering (such as IBGP sessions), or as a stable router
identifier, or to support the PIM bootstrap server function within the VPN
instance.
Complete the following steps when upgrading routers in your draft-rosen multicast VPN
network to Junos OS Release 10.1 if you want to configure the routers’s main instance
loopback address for draft-rosen multicast VPN:
1. Upgrade all M7i and M10i routers to Junos OS Release 10.1 before you configure the
loopback address for draft-rosen Multicast VPN.
NOTE: Do not configure the new feature until all the M7i and M10i routers
in the network have been upgraded to Junos OS Release 10.1.
2. After you have upgraded all routers, configure each router’s main instance loopback
address as the source address for multicast interfaces. Include the default-vpn-source
interface-name loopback-interface-name] statement at the [edit protocols pim]
hierarchy level.
3. After you have configured the router’s main loopback address on each PE router,
delete the multicast VPN loopback address (lo0.x) from all routers.
We also recommend that you remove the multicast VPN loopback address from all
PE routers from other vendors. In Junos OS releases prior to 10.1, to ensure
interoperability with other vendors’ routers in a draft-rosen multicast VPN network,
you had to perform additional configuration. Remove that configuration from both
the Juniper Networks routers and the other vendors’ routers. This configuration should
be on Juniper Networks routers and on the other vendors’ routers where you configured
the lo0.mvpn address in each VRF instance as the same address as the main loopback
(lo0.0) address.
This configuration is not required when you upgrade to Junos OS Release 10.1 and use
the main loopback address as the source address for multicast interfaces.
For more information about configuring the draft-rosen Multicast VPN feature, see the
Junos OS Multicast Configuration Guide.
A routing matrix can use either a TX Matrix router as the switch-card chassis (SCC) or a
TX Matrix Plus router as the switch-fabric chassis (SFC). By default, when you upgrade
software for a TX Matrix router or a TX Matrix Plus router, the new image is loaded onto
the TX Matrix or TX Matrix Plus router (specified in the Junos OS CLI by using the scc or
sfc option) and distributed to all T640 routers or T1600 routers in the routing matrix
(specified in the Junos OS CLI by using the lcc option). To avoid network disruption during
the upgrade, ensure the following conditions before beginning the upgrade process:
• A minimum of free disk space and DRAM on each Routing Engine. The software upgrade
will fail on any Routing Engine without the required amount of free disk space and
DRAM. To determine the amount of disk space currently available on all Routing Engines
of the routing matrix, use the CLI show system storage command. To determine the
amount of DRAM currently available on all the Routing Engines in the routing matrix,
use the CLI show chassis routing-engine command.
• The master Routing Engines of the TX Matrix or TX Matrix Plus router (SCC or SFC)
and T640 routers or T1600 routers (LCC) are all re0 or are all re1.
• The backup Routing Engines of the TX Matrix or TX Matrix Plus router (SCC or SFC)
and T640 routers or T1600 routers (LCC) are all re1 or are all re0.
• All master Routing Engines in all routers run the same version of software. This is
necessary for the routing matrix to operate.
• All master and backup Routing Engines run the same version of software before
beginning the upgrade procedure. Different versions of the Junos OS can have
incompatible message formats especially if you turn on GRES. Because the steps in
the process include changing mastership, running the same version of software is
recommended.
• For a routing matrix with a TX Matrix router, the same Routing Engine model is used
within a TX Matrix router (SCC) and within a T640 router (LCC) of a routing matrix.
For example, a routing matrix with an SCC using two RE-A-2000s and an LCC using
two RE-1600s is supported. However, an SCC or an LCC with two different Routing
Engine models is not supported. We suggest that all Routing Engines be the same
model throughout all routers in the routing matrix. To determine the Routing Engine
type, use the CLI show chassis hardware | match routing command.
• For a routing matrix with a TX Matrix Plus router, the SFC contains two model
RE-DUO-C2600-16G Routing Engines, and each LCC contains two model
RE-DUO-C1800-8G Routing Engines.
NOTE: It is considered best practice to make sure that all master Routing
Engines are re0 and all backup Routing Engines are re1 (or vice versa). For
the purposes of this document, the master Routing Engine is re0 and the
backup Routing Engine is re1.
To upgrade the software for a routing matrix, perform the following steps:
1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine
(re0) and save the configuration change to both Routing Engines.
2. Install the new Junos OS release on the backup Routing Engine (re1) while keeping
the currently running software version on the master Routing Engine (re0).
3. Load the new Junos OS on the backup Routing Engine. After making sure that the new
software version is running correctly on the backup Routing Engine (re1), switch
mastership back to the original master Routing Engine (re0) to activate the new
software.
4. Install the new software on the new backup Routing Engine (re0).
For the detailed procedure, see the Routing Matrix with a TX Matrix Feature Guide or the
Routing Matrix with a TX Matrix Plus Feature Guide.
Unified in-service software upgrade (ISSU) enables you to upgrade between two different
Junos OS releases with no disruption on the control plane and with minimal disruption
of traffic. Unified in-service software upgrade is only supported by dual Routing Engine
platforms. In addition, graceful Routing Engine switchover (GRES) and nonstop active
routing (NSR) must be enabled. For additional information about using unified in-service
software upgrade, see the Junos High Availability Configuration Guide.
Upgrading from Junos OS Release 9.2 or Earlier on a Router Enabled for Both PIM
and NSR
Junos OS Release 9.3 introduced NSR support for PIM for IPv4 traffic. However, the
following PIM features are not currently supported with NSR. The commit operation fails
if the configuration includes both NSR and one or more of these features:
• Anycast RP
• Local RP
Junos OS 9.3 Release introduced a new configuration statement that disables NSR for
PIM only, so that you can activate incompatible PIM features and continue to use NSR
for the other protocols on the router: the nonstop-routing disable statement at the [edit
protocols pim] hierarchy level. (Note that this statement disables NSR for all PIM features,
not only incompatible features.)
If neither NSR nor PIM is enabled on the router to be upgraded or if one of the unsupported
PIM features is enabled but NSR is not enabled, no additional steps are necessary and
you can use the standard upgrade procedure described in other sections of these
instructions. If NSR is enabled and no NSR-incompatible PIM features are enabled, use
the standard reboot or ISSU procedures described in the other sections of these
instructions.
Because the nonstop-routing disable statement was not available in Junos OS Release
9.2 and earlier, if both NSR and an incompatible PIM feature are enabled on a router to
be upgraded from Junos OS Release 9.2 or earlier to a later release, you must disable
PIM before the upgrade and reenable it after the router is running the upgraded Junos
OS and you have entered the nonstop-routing disable statement. If your router is running
Junos OS Release 9.3 or later, you can upgrade to a later release without disabling NSR
or PIM–simply use the standard reboot or ISSU procedures described in the other sections
of these instructions.
1. On the router running Junos OS Release 9.2 or earlier, enter configuration mode and
disable PIM:
[edit]
user@host# commit
2. Upgrade to Junos OS Release 9.3 or later software using the instructions appropriate
for the router type. You can either use the standard procedure with reboot or use ISSU.
3. After the router reboots and is running the upgraded Junos OS, enter configuration
mode, disable PIM NSR with the nonstop-routing disable statement, and then reenable
PIM:
[edit]
user@host# commit
An expanded upgrade and downgrade path is now available for the Junos OS Extended
End-of-Life (EEOL) releases. You can upgrade directly from one EEOL release to one of
two adjacent later EEOL releases. You can also downgrade directly from one EEOL release
to one of two adjacent earlier EEOL releases.
For example, Junos OS Releases 9.3, 10.0, and 10.4 are all EEOL releases. You can upgrade
from Junos OS Release 8.5 directly to either 9.3 or 10.0. To upgrade from Release 8.5 to
10.4, you first need to upgrade to Junos OS release 9.3 or 10.0, and then upgrade a second
time to 10.4. Similarly, you can downgrade directly from Junos OS Release 10.4 to either
10.0 or 9.3. To downgrade from release 10.4 to 8.5, you first need to downgrade to 10.0
or 9.3, and then perform a second downgrade to Release 8.5.
For upgrades and downgrades to or from a non-EEOL release, the current policy is that
you can upgrade and downgrade by no more than three releases at a time. This policy
remains unchanged.
For more information on EEOL releases and to review a list of EEOL releases, see
http://www.juniper.net/support/eol/junos.html.
To downgrade from Release 10.4 to another supported release, follow the procedure for
upgrading, but replace the 10.4 jinstall package with one that corresponds to the
appropriate release.
NOTE: You cannot downgrade more than three releases. For example, if your
routing platform is running Junos OS Release 9.3, you can downgrade the
software to Release 9.0 directly, but not to Release 8.5 or earlier; as a
workaround, you can first downgrade to Release 9.0 and then downgrade to
Release 8.5.
For more information, see the Junos OS Installation and Upgrade Guide.
Related • New Features in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers
Documentation on page 6
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for M Series, MX
Series, and T Series Routers on page 37
• Issues in Junos OS Release 10.4 for M Series, MX Series, and T Series Routers on page 48
• Errata and Changes in Documentation for Junos OS Software Release 10.4 for M Series,
MX Series, and T Series Routers on page 66
Junos OS Release Notes for Juniper Networks SRX Series Services Gateways and J
Series Services Routers
Powered by Junos OS, Juniper Networks SRX Series Services Gateways provide robust
networking and security services. SRX Series Services Gateways range from lower-end
devices designed to secure small distributed enterprise locations to high-end devices
designed to secure enterprise infrastructure, data centers, and server farms. The SRX
Series Services Gateways include the SRX100, SRX210, SRX220, SRX240, SRX650,
SRX1400, SRX3400, SRX3600, SRX5600, and SRX5800 devices.
Juniper Networks J Series Services Routers running Junos OS provide stable, reliable, and
efficient IP routing, WAN and LAN connectivity, and management services for small to
medium-sized enterprise networks. These routers also provide network security features,
including a stateful firewall with access control policies and screens to protect against
attacks and intrusions, and IPsec VPNs. The J Series Services Routers include the J2320,
J2350, J4350, and J6350 devices.
• New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Services Routers on page 79
• Advertising Bandwidth for Neighbors on a Broadcast Link Support on page 108
• Group VPN Interoperability with Cisco’s GET VPN on page 108
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for SRX Series
Services Gateways and J Series Services Routers on page 109
• Unsupported CLI on page 124
• Known Limitations in Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers on page 133
• Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers on page 143
• Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 166
• Hardware Requirements for Junos OS Release 10.4 for SRX Series Services Gateways
and J Series Services Routers on page 174
• Maximizing ALG Sessions on page 176
• Integrated Convergence Services Not Supported on page 176
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 177
New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers
The following features have been added to Junos OS Release 10.4. Following the
description is the title of the manual or manuals to consult for further information.
• Hardware Features—SRX220 Services Gateway with Power Over Ethernet on page 101
• Hardware Features—SRX1400 Services Gateway on page 104
• Hardware Features—SRX3400 and SRX3600 Services Gateways on page 107
Software Features
Application Layer Gateways (ALGs)
• Rewrite rule for DSCP at VoIP ALGs—This feature is supported on all SRX Series and
J Series devices.
A rewrite rule modifies the appropriate CoS bits in an outgoing packet to meet the
requirements of the targeted peer. Each rewrite rule reads the current CosS value that
is configured at the voice over IP (VoIP) Application Layer Gateway (ALG) level. Every
packet that hits the VoIP ALG is marked by this CoS value.
You can configure a rewrite rule for a DSCP Differentiated Services (DiffServ) marker
at the VoIP ALG level to address VoIP signaling and its respective Real-Time Transport
Protocol (RTP) streams. You can configure the rewrite rule such that all VoIP traffic
hitting the ALG gets a rewrite marker while its respective RTP/Real-Time Control
Protocol (RTP/RTCP) traffic gets a different rewrite marker.
Chassis Cluster
Increasing the number of zones and virtual routers—This feature is supported on
SRX5600 and SRX5800 devices.
The maximum number of zones, virtual routers, and IFLs (IFLs only for chassis cluster
mode) that can be configured on an SRX5800 device has been increased to 2000.
Configuration Wizards
This feature is supported on SRX100, SRX210, SRX240, and SRX650 devices.
The J-Web interface now has a set of wizards that simplify the basic configuration of the
SRX Series devices. The Setup wizard automatically appears when you first start the
device or when it is in factory default mode and you point to the Web management URL.
Three other wizards in the J-Web interface enable you to configure basic firewall policies,
basic IPsec VPN settings, and basic NAT settings.
NetFlow Services Export Version 9 (NetFlow V9) provides an extensible and flexible
method for using templates to observe packets on a router. Each template indicates
the format in which the device exports data.
[Junos OS CLI User Guide, Junos OS Interfaces Configuration Guide for Security Devices]
• Screen logs—Screen log enhancement is supported on all SRX Series and J Series
devices.
The new log format captures all required information in the screen log. This allows you
to view all log information for a device instead of having to search through
device-specific logs.
You can use the accounting feature for calls made when the SRX Series media gateway
(SRX Series MGW) is in control or when the SRX Series survivable call server (SRX
Series SCS) is in control.
• Call park—The call park feature allows users to park an active call and pick up their
call or that of another user later. To use the call park feature, you configure a primary
logical extension, which you can think of as a parking lot. You must also configure a
range of logical extensions following the primary one that are used to park individual
calls.
When you handle a call, you can transfer it to the parking lot without the caller hearing
the transfer process. When you park the call, you are told the logical extension number
of the parking slot before your connection to the call is dropped. You or another user
can pick up the call and resume the conversation from any phone by calling the
extension number of the parking slot.
This feature is supported when the SRX Series SCS is in control. Under normal conditions
when it is reachable, the peer call server provides this service if it is supported.
• Defining a SIP registrar address separate from the peer call server—By default, the
SIP registrar and the peer call server (SIP server) are handled by the same service and
therefore have the same address. Under these circumstances, the SRX Series MGW
sends SIP REGISTRAR and INVITE messages to the IP address configured for the peer
call server.
• Direct inward dialing lists—You can associate a list of direct inward dialing (DID)
numbers with a trunk to be used for assignment to stations. You do not need to assign
these DIDs to stations directly. The software assigns a DID number to a single station
exclusively. If an incoming call is made to an unassigned DID number, it is directed to
and handled by auto-attendant.
• Disabling SIP registration to the peer call server—The SRX Series MGW sends
registration messages to the peer call server. For some network environments in which
all media gateways are known to the peer call server, the SRX Series MGW is not
required to register to it. To do so could cause complications. For example, the peer
call server could drop the registration message “silently,” that is, without informing the
SRX Series MGW. In this case, the SRX Series MGW might retransmit the message,
incurring unnecessary processing and adding to the network load.
When you configure peer call server information, you can disable transmission of the
registration message to the peer call server to avoid these problems.
• DSCP marking for RTP packets generated by SRX Series Integrated Convergence
Services—Configure DSCP marking to set the desired DSCP bits for Real-Time Transport
Protocol (RTP) packets generated by SRX Series Integrated Convergence Services.
Differentiated Services code point (DSCP) bits are the 6-bit bitmap in the IP header
used by devices to decide the forwarding priority of packet routing. When the DSCP
bits of RTP packets generated by Integrated Convergence Services are configured, the
downstream device can then classify the RTP packets and direct them to a higher
priority queue in order to achieve better voice quality when packet traffic is congested.
Juniper Networks devices provide classification, priority queuing, and other kinds of
class-of-service (CoS) configuration under the CoS configuration hierarchy.
Note that the Integrated Convergence Services DSCP marking feature marks only RTP
packets of calls that it terminates, which include calls to peer call servers and to peer
proxy servers that provide SIP trunks. If a call is not terminated by Integrated
Convergence Services, then DSCP marking does not apply.
To configure the DSCP marking bitmap for calls terminated by Integrated Convergence
Services and the address of the peer call server or peer proxy server to which these
calls are routed, use the media-policy statement at the [edit services converged-services]
hierarchy level.
set services convergence-service service-class < name > dscp < bitmap >
set services convergence-service service-class media-policy < name > term < term-name
> from peer-address [< addresses >]
set services convergence-service service-class media-policy < name > term then
service-class < name >
• Hunt group—A hunt group enables a group of users to handle calls collectively. A hunt
group specifies a logical extension that outside parties can call. Member stations
belonging to the hunt group are specified in a preconfigured station group. When a call
comes in on the logical extension, the call is directed to the phone whose station is
specified first in the preconfigured station group, and that phone rings. The next
incoming call is directed to the second station specified in the station group and its
phone rings, and so on.
To connect the call, the system hunts through the configured stations in order one at
a time. It rings a phone up to the time limit that you specify before it tries the next phone
in the configured order
This feature is supported when the SRX Series SCS is in control. Under normal conditions
when it is reachable, the peer call server provides this service if it is supported.
• Interoperability with Microsoft and Cisco call servers and IP phones—This feature
addresses SRX Series media gateway (SRX Series MGW) interoperability with Microsoft
and Cisco call servers and IP phones, in addition to the current support for Avaya call
servers and IP phones. This feature helps to provide a comprehensive joint enterprise
communications offering.
The pickup group feature rings only one phone at a time. If the first phone tried is busy,
the next one is tried, and so on. A pickup group can include up to 20 members, whose
phones can be either analog or SIP, but not a mix of both.
This feature is supported when the SRX Series survivable call server (SRX Series SCS)
is in control. Under normal conditions when it is reachable, the peer call server provides
this service if it is supported.
• Ring group—A ring group can include up to five members. A ring group allows incoming
calls to be handled by any member of the group. You configure a ring group with a
logical extension that outside parties can call. Calls coming into the logical extension
are forwarded to all phones simultaneously. The first member to answer the call takes
it, and the phones of other members of the group stop ringing. A ring group can include
both SIP and analog stations.
This feature is supported when the SRX Series SCS is in control. Under normal conditions
when it is reachable, the peer call server provides this service if it is supported.
The 1-Port Gigabit Ethernet SFP Mini-PIM interfaces a single Gigabit Ethernet device
or a network. It supports a variety of transceivers with data speeds of
10 Mbps/100 Mbps/1 Gbps with extended LAN or WAN connectivity.
The 1-Port SFP Gigabit Ethernet mini-PIM supports the following features:
• Half-duplex/full-duplex support
• Autonegotiation
• Encapsulations
• MTU size of 1514 bytes (default) and 9010 bytes (jumbo frames)
• Loopback
IPsec
• Virtual router support for route-based VPNs—This feature is supported on all SRX
Series and J Series devices.
This feature includes routing-instance support for route-based VPNs. You can now
configure different subunits of the st0 interface in different routing instances. The
following functions are supported for nondefault routing instances:
NOTE: IKE is not supported in a custom VR (virtual router). The IKE gateway
external interface must reside in the default virtual router (inet.0).
• Transit traffic
• Self-traffic
• VPN monitoring
• Hub-and-spoke VPNs
[Junos OS Administration Guide for Security Devices, Junos OS CLI Reference, Junos OS
Security Configuration Guide]
IPv6 Support
• Active/active chassis cluster—This feature is supported on all SRX Series and J Series
devices.
In Junos OS Release 10.4, SRX Series and J Series devices running IP version 6 (IPv6)
can be deployed in active/active (failover) chassis cluster configurations in addition
to the existing support of active/passive (failover) chassis cluster configurations. [Junos
OS Security Configuration Guide]
SRX Series and J Series devices running IP version 6 (IPv6) deployed in active/active
(failover) chassis cluster configurations, the address book entries can include any
combination of IPv4 addresses, IPv6 addresses, and Domain Name System (DNS)
names.
To configure IPv6 address entries, specify an IPv6 address when you use the address
statement at the [edit security zones security-zone name address-book] hierarchy level.
The address set configuration considers names of the address book entries, and not
the IP addresses, so there are no additional considerations related to IPv6 traffic. [Junos
OS Security Configuration Guide]
• Advanced flow—This feature is supported on all SRX Series and J Series devices.
IPv6 advanced flow adds IPv6 support for firewall, NAT, NAT-PT, multicast (local link
and transit), IPsec, IDP, Junos framework, TCP proxy, and session manager on SRX
Series and J Series devices. MIBs are not used in the IPv6 flow.
IPv6 security is available to avoid impact on the existing IPv4 system. If IPv6 security
is enabled, extended sessions and gates are allocated. The existing address fields and
gates are used to store the index of extended sessions or gates. If IPv6 security is
disabled, the IPv6 security related resources are not allocated.
New logs are used for IPv6 flow traffic to prevent impact on performance in the existing
IPv4 system.
The behavior and implementation of the IPv6 advanced flow are the same as those
of the IPv4 flow.
• Header parse—IPv6 advanced flow stops parsing the headers and interprets the
packet as the corresponding protocol packet if it encounters the following extension
headers:
• TCP/UDP
• ESP/AH
• ICMPv6
IPv6 advanced flow continues parsing headers if it encounters the following extension
headers:
• Hop-by-Hop
• TCP Length
• UDP Length
• Hop-by-Hop
• ICMPv6 packets—In IPv6 advanced flow, the ICMPv6 packets share the same
behavior as normal IPv6 traffic with the following exceptions:
• Host inbound and outbound traffic—IPv6 advanced flow supports all route and
management protocols running on the Routing Engine, including OSPF v3, RIPng,
Telnet, and SSH. Note that flow label is not used in the flow.
• IPv4 IPIP
• IPv4 GRE
• IPv4 IPsec
• Dual-stack lite
• DNS ALG for routing, NAT, and NAT-PT—This feature is supported on all SRX Series
and J Series devices.
Domain Name System (DNS) is the part of the ALG that handles DNS traffic. The DNS
ALG module has been working as expected for IPv4. In Junos OS Release 10.4, this
feature implements IPv6 support on DNS ALG for routing, NAT, and NAT-PT.
When the DNS ALG receives a DNS query from the DNS client, a security check is done
on the DNS packet. When the DNS ALG receives a DNS reply from the DNS server, a
similar security check is done, and then the session for the DNS traffic closes.
When the DNS traffic works in NAT mode, the DNS ALG translates the public address
in a DNS reply to a private address when the DNS client is on a private network, and
similarly translates a private address to a public address when the DNS client is on a
public network. When DNS traffic works in NAT-PT mode, the DNS ALG translates the
IP address in a DNS reply packet between the IPv4 address and the IPv6 address when
the DNS client is in an IPv6 network and the server is in an IPv4 network, and vice versa.
To support NAT-PT mode in a DNS ALG, the NAT module should support NAT-PT.
[Junos OS Security Configuration Guide]
DS-Lite allows IPv4 customers to continue accessing IPv4 internet content with
minimum disruption to their home networks, while enabling IPv6 customers to access
IPv6 content.
• Softwire Initiator (SI) in the DS-Lite home router (SI is not available in Junos release
10.4)
The matching criteria for security policy rules is based on zones, address objects, and
applications. To support security policy rules for IPv6 traffic, you have to configure
zone and address objects with IPv6 values. You can also select IPv6 applications.
Note that in security policy rules, the meaning of the wildcard any has changed. When
flow support is enabled for IPv6 traffic, the wildcard any matches any IPv4 or IPv6
address. In Junos OS Release 10.4, new wildcards are introduced to match any IPv4 or
any IPv6 address: any-ipv4 and any-ipv6 in active/active chassis cluster. When flow
support is not enabled for IPv6 traffic, any matches IPv4 addresses.
IPv6 support for IDP and UTM are not included in Junos OS Release 10.4. If your current
security policy uses rules with any IP address wildcards and IDP and UTM features
enabled, you will encounter configuration commit errors because IDP and UTM features
do not support IPv6 addresses. To resolve these errors, modify the rule returning the
error so that it uses the any-ipv4 wildcard, and create separate rules for IPv6 traffic
that do not include IDP or UTM features. [Junos OS Security Configuration Guide]
IPv6 flow support enables processing of IPv6 traffic by the security features of SRX
Series and J Series devices. IPv6 flow support is disabled by default, and IPv6 packets
are dropped.
To enable flow-based processing for IPv6 traffic, modify the mode statement at the
[edit security forwarding-options family inet6] hierarchy level.
The [show security flow session source-prefix] and [show security flow session
destination-prefix] commands you use to monitor session statistics now take IPv6
address arguments. In addition, the [show security flow session family (inet|inet6)]
option is added to filter session statistics by protocol family.
[Junos OS CLI Reference, Junos OS Interfaces Configuration Guide for Security Devices,
Junos OS Security Configuration Guide]
• FTP ALG for routing—This feature is supported on all SRX Series and J Series devices.
File Transfer Protocol (FTP) is the part of the ALG that handles FTP traffic. The
PORT/PASV requests and corresponding 200/227 responses in FTP are used to
announce the TCP port, which the host listens to for the FTP data connection.
EPRT/EPSV/229 commands are used for these requests and responses. FTP ALG
supports EPRT/EPSV/229 already, but only for IPv4 addresses.
• ICMP ALG for routing, NAT, and NAT-PT — This feature is supported on all SRX Series
and J Series devices. ALGs support Internet Control Message Protocol version 6
(ICMPv6) an integral part of IPv6 that must be fully implemented by every IPv6 node.
The ICMP ALG handles ICMP traffic by monitoring all ICMP messages and then
performing the following actions:
In routing mode, the ICMP ALG closes a session if it receives one of the following
message types:
In Network Address Translation (NAT mode), the ICMP ALG performs the following
actions:
• Closes the session if it receives an echo reply (type 129) message or a destination
unreachable (type 1) error message
• Retains the original identifier and sequence number for the echo reply
• Translates the embedded IPv6 packet for the ICMPv6 error message
• Closes the session if it receives an echo reply (type 129) message or a destination
unreachable (type 1) error message
• Translates an ICMPv4 error message to an ICMPv6 error message and translates its
embedded IPv4 packet to an IPv6 packet
• Translates an ICMPv6 error message to an ICMPv4 error message and translates its
embedded IPv6 packet to an IPv4 packet
ICMP ALG drops ICMP traffic when translation from IPv4 and IPv6 is not possible. Note
that ICMP ALG is always enabled and cannot be disabled by means of the
command-line interface (CLI).
A logical interface can be configured with an IPv4 address, IPv6 address, or both in
active/active chassis cluster configurations in addition to the existing support of
active/passive chassis cluster configurations.
To configure an IPv6 address for a logical interface, use the inet6 statement at the
[edit interfaces interface-name unit logical-unit family] hierarchy level. [Junos OS
Interfaces Configuration Guide for Security Devices]
• Multicast flow—This feature is supported on all SRX Series and J Series devices.
• Fragment handling
• Packet reordering
The structure and processing of IPv6 multicast data session are the same as that of
IPv4. Each data session has the following:
• Several sessions
The reverse path forwarding (RPF) check behavior for IPv6 is the same as that of IPv4.
Incoming multicast data is accepted only if RPF check succeeds. In IPv6 multicast
flow, incoming Multicast Listener Discovery (MLD) protocol packets are accepted only
if MLD or PIM is enabled in the security zone for the incoming interface. Sessions for
multicast protocol packets have a default timeout value of 300 seconds. This value
cannot be configured. The null register packet is sent to the rendezvous point.
In IPv6 multicast flow, a mulitcast router has the following three roles:
• Designated router
• Intermediate router
• Rendezvous point
IPv6 Network Address Translation (IPv6 NAT) provides address translation between
IPv6 hosts. NAT between IPv6 hosts is done in a similar manner and for similar purposes
as IPv4 NAT. IPv6 NAT in Junos OS provides the following NAT types:
• Source NAT
• Destination NAT
• Static NAT
The packet-filtering options for IPv6 addresses and IPv6 style source prefix, destination
prefix, and interface is supported in addition to the existing functionality of IPv4
datapath-debug.
• Screens—This feature is now supported on all SRX Series and J Series devices.
• Syn-flood/syn-proxy/syn-cookie
• Syn-ack-ack-proxy
• Ip-spoofing
In Junos OS Release 10.4, SRX Series and J Series devices running IP version 6 (IPv6)
can be deployed in active/active chassis cluster configurations with security zone
configuration in addition to the existing support of active/passive chassis cluster
configurations.
The security zone configuration considers names of the interfaces, and not the IP
addresses, hence there are no additional considerations related to the zone interface
configuration.
You can also use the zone configuration to explictly permit inbound traffic from network
system services and system protocols. Note that you can now use the host inbound
traffic configuration to permit traffic from the following IPv6-related services and
protocols: DHCPv6, neighbor discovery (ND) protocol, OSPF3, and RIPng. [Junos OS
Security Configuration Guide]
J-Web
• IPv6 addressing support for J-Web—This feature is supported on SRX100, SRX210,
SRX220, SRX240, SRX650, and all J Series devices.
J-Web now supports IPv6 addressing configuring security features such as policies,
zones, screens, address books, host inbound system services, protocols, and
flow-forwarding options.
• J-Web Chassis View—The changes and enhancements to the J-Web Chassis View
apply to SRX1400 devices.
The following enhancements have been made to the J-Web Chassis View on the
Dashboard:
• Displays the front or rear panel view of the device and shows which slots are occupied.
When you insert or remove a card, the Chassis View reflects the change immediately.
• Port colors change to indicate the port link status. For example, the ge port lights
steadily green when the port is up and red when the port is down.
• Displays Help tips when your hover the mouse over a port.
Junos OS Release 10.4 supports the Network Centric Waveform (NCW) radio-specific
radio-to-router control protocol (R2CP), which is similar to the PPPoE radio-to-router
protocol. Both of these protocols exchange dynamic metric changes in the network
that the routers use to update the OSPF topologies.
In radio-router topologies, the router connects to the radio over a Gigabit Ethernet link
and the radio transmits packets over the radio frequency (RF) link. The radio periodically
sends metrics to the router, which uses RF link characteristics and other data to inform
the router on the shaping and OSPF link capacity. The router uses this information to
shape the data traffic and provide the OSPF link cost for its SPF calculations. The radio
functions like a Layer 2 switch and can only identify remote radio-router pairs using
Layer 2 MAC addresses. With R2CP the router receives metrics for each neighboring
router, identified by the MAC address of the remote router. The R2CP daemon translates
the MAC addresses to link the local IPv6 addresses and sends the metrics for each
neighbor to OSPF. Processing these metrics is similar to the handling of PPPoE PADQ
metrics. Unlike PPPoE, which is a point-to-point link, these R2CP neighbors are treated
as nodes in a broadcast LAN.
You must configure each neighbor node with a per-unit scheduler for CoS. The scheduler
context defines the attributes of Junos class-of-service(CoS). To define CoS for each
radio, you can configure virtual channels to limit traffic. You need to configure virtual
channels for as many remote radio-router pairs as there are in the network. You
configure virtual channels on a logical interface. You can configure each virtual channel
to have a set of eight queues with a scheduler and an optional shaper. When the radio
initiates the session with a peer radio-router pair, a new session is created with the
remote MAC address of the router and the VLAN over which the traffic flows. Junos
OS chooses from the list of free virtual channels and assigns the remote MAC and the
eight CoS queues and the scheduler to this remote MAC address. All traffic destined
to this remote MAC address is subjected to the CoS that is defined in the virtual channel.
A virtual channel group is a collection of virtual channels. Each radio can have only one
virtual channel group assigned uniquely. If you have more than one radio connected
to the router, you must have one virtual channel group for each local radio-to-router
pair.
Security
• Display multiple policy matches—This feature is supported on all SRX Series and J
Series devices.
The addition of the result-count option in Junos OS Release 10.4 extends the
functionality of the show security match-policies command and lets you display up to
16 policy matches for the given set of criteria. The first policy in the list is the policy
applied to all matching traffic. All policies after the first one are shadow policies
(shadowed by the first one) and are not encountered. [Junos OS Security Configuration
Guide]
• DHCPv6 server—This feature is supported on all SRX Series and J Series devices.
Dynamic Host Configuration Protocol version 6 (DHCPv6) local server is now supported
on all SRX Series and J Series devices to provide addressing for IPv6 clients.
To configure DHCPv6 local server on a device, you include the DHCPv6 statement at
the [edit system services dhcp-local-server] hierarchy level. The DHCPv6 address pool
is configured in the [edit access address-assignment pool] hierarchy level using the
family inet6 statement.
J-Web reports provide summary graphics of current security events, Web traffic, and
resource utilization. When event activity occurs, you can quickly drill down to detailed
information about the specific item.
The session capacity for the central point (CP) for fully configured SRX3400, SRX3600,
and SRX5800 devices can be expanded as shown in the following list.
SNMP
• SNMP enterprise-specific MIBs—This feature is supported on all SRX Series and J
Series devices.
Junos OS Release 10.4 adds support for enterprise-specific MIBs for the SRX1400
device.
The SRX Series Image Upgrade using a USB device feature simplifies the upgrading of
Junos OS images in cases where there is no console access to an SRX Series device
located at a remote site. This feature allows you to upgrade the Junos OS image with
minimum configuration effort by simply inserting a USB flash drive into the USB port
of the SRX Series device and performing a few simple steps.
Before you begin the installation, ensure the following prerequisites are met:
• Junos OS upgrade image and autoinstall.conf file are copied to the USB device.
• Adequate space is available on the SRX Series device to install the software image.
To use a USB flash drive to install the Junos OS image on an SRX Series device:
1. Insert the USB flash drive into the USB port of the SRX Series device and wait for
the LEDs to blink amber, then steadily light amber, indicating that the SRX Series
device detects the Junos OS image.
If the LEDs do not turn amber, press the Power button or power-cycle the device
and wait for the LEDs to steadily light amber.
2. Press the Reset Config button on the SRX Series device and wait for the LEDs to
turn green, indicating that the Junos OS upgrade image has successfully installed.
If the USB device is plugged in, the Reset Config button always performs as an
image upgrade button. Any other functionality of this button is overridden until you
remove the USB flash drive.
3. Remove the USB flash drive. The SRX Series device restarts automatically and
loads the new Junos OS version.
NOTE: If an installation error occurs, the LEDs light red, which might indicate
that the Junos OS image on the USB flash drive is corrupted. An installation
error can also occur if the current configuration on the SRX Series device
is not compatible with the new Junos OS version on the USB. You must
have console access to the SRX Series device to troubleshoot an installation
error.
VPNs
• IKE and IPsec predefined proposals for dynamic VPN—This feature is supported on
SRX100, SRX210, SRX220, SRX240, and SRX650 devices.
In earlier releases, the administrators had to configure individual Internet Key Exchange
(IKE) and IP Security (IPsec) proposals for all IKE and IPsec policy configurations. This
procedure was tedious and time consuming when the administrators had to configure
many VPN policies because they had to configure custom proposals for all IKE and
IPsec configurations.
Junos OS Release 10.4 supports proposal-set configuration in IKE and IPsec; the
administrator can select basic, compatible, or standard proposal sets for dynamic VPN
clients. Each proposal set consists of two or more predefined proposals. The server
selects one predefined proposal from the set configured and pushes it to the client in
the client configuration. The client uses this proposal in negotiations with the server
to establish the connection.
The default values for IKE and IPsec security association (SA) rekey timeout are as
follows:
The server selects a predefined proposal from the proposal set and sends it to the
client, along with the default rekey timeout value.
The server sends a predefined IKE proposal from the configured IKE proposal set to
the client, along with the default rekey timeout value. For IPsec, the server sends the
setting that is configured in the IPsec proposal.
The server sends a predefined IPsec proposal from the configured IPsec proposal
set to the client, along with the default rekey timeout value. For IKE, the server sends
the setting that is configured in the IKE proposal.
NOTE: If IPsec uses the standard proposal set and perfect forward secrecy
(PFS) is not configured, then the default PFS is set as group2. For other
proposal sets, PFS will not be set because it is not configured.
• Assigns the address from the predefined (or statically assigned) address pools if
the address matches the criteria specified by the client application.
Note: For client applications that rely on a RADIUS or other external server for
authentication, AUTHD might not assign IP addresses.
• Provide a mechanism in AUTHD for linking an address pool to a client profile and
assigning an IP address to the client from the pool.
When you configure extended authentication (XAuth), you must enter the username
and password, after the Internet Key Exchange (IKE) phase 1 security association (SA)
is established. AUTHD verifies the credentials received from you.
• IP address
The IP address can be drawn from a locally configured IP address pool. AUTHD requires
IKE or XAuth to release the IP address when it is no longer in use.
• Support group Internet Key Exchange (IKE) IDs for dynamic VPN configuration —This
feature is supported on SRX100, SRX210, SRX220, SRX240, and SRX650 devices.
The existing design of the dynamic virtual private network (VPN) uses unique Internet
Key Exchange (IKE) ID for each user connection. For each user, VPN needs to be
configured with an individual IKE gateway, an IPsec VPN, and a security policy using
the IPsec VPN. This is cumbersome when there are a large number of users. The design
is modified to allow a number of users to share a set of IKE or IPsec VPN (or policy
configuration) using shared-ike-id or group-ike-id. This reduces the number of times
the VPN needs to be configured.
The shared-ike-id and group-ike-id allow you to configure VPN once for multiple users.
All users connecting through a shared-ike-id configuration use the same IKE ID and
preshared key. The user credentials are verified in the extended authentication (XAuth)
phase of AUTHD. The credential of a user is configured either in Radius or in the access
database of AUTHD.
For group-ike-id, a part of the configuration for a user IKE ID is common to the group.
The IKE ID is the concatenation of an individual part and the common part of IKE ID.
For example, a user can use a group-ike-id configuration with a common part
".juniper.net" and the individual part “X”. The IKE ID can be "X.juniper.net". Httpd-gk
generates the individual part of the IKE ID.
The group-ike-id does not require extended authentication (XAuth). However, for
dynamic VPN, XAuth is needed to retrieve the network attributes such as IP address
for the client. Therefore, if XAuth is not configured for group-ike-id and the administrator
uses the IKE gateway in a dynamic VPN client, a warning message appears.
This feature introduces new commands for ike sa and dynamic-vpn and new options
in the IKE Gateway Add/Edit page of J-Web.
This Mini-PIM can be used in copper and optical environments to provide maximum
flexibility when upgrading from an existing infrastructure to Metro Ethernet. This Mini-PIM
is supported on the following devices:
The following key features are supported on the 1-Port SFP Gigabit Ethernet Mini-PIM:
• Autonegotiation
For more information on the 1-Port SFP Gigabit Ethernet Mini-PIM, see the SRX Series
Services Gateways for the Branch Physical Interface Modules Hardware Guide.
For information on configuring the 1-Port SFP Gigabit Ethernet Mini-PIM, see the Junos
OS Interfaces Configuration Guide for Security Devices.
The device provides Internet Protocol Security (IPsec), virtual private network (VPN),
and firewall services for small-sized and medium-sized companies and enterprise branch
and remote offices.
• J-Web interface: Web-based graphical interface that allows you to operate a services
gateway without commands. The J-Web interface provides access to all Junos OS
functionality and features.
• Junos OS command-line interface (CLI): Juniper Networks command shell that runs
on top of a UNIX-based operating system kernel. The CLI is a straightforward command
interface. On a single line, you type commands that are executed when you press the
Enter key. The CLI provides command Help and command completion.
Hardware Features
Table 3 on page 101 lists the hardware features supported on the SRX220 Services
Gateway.
DDR memory 1 GB 1 GB
Power supply adapter 100 to 240 VAC input 100 to 240 VAC input
Console port 1 1
USB ports 2 2
Mini-PIM slots 2 2
LEDs Status, Alarm, HA, Power, Mini-PIMs, Port Status, Alarm, HA, Power,
(TX/RX) Mini-PIMs, Port (TX/RX and PoE)
NOTE: The PoE LED is enabled only on the SRX220H-POE model of the
SRX220 Services Gateway. For the SRX220H model, the PoE LED remains
off.
For more details on the SRX220 Services Gateway software features and licenses, see
the Junos OS Administration Guide for Security Devices.
Hardware Interfaces
Table 4 on page 103 summarizes the interface ports supported on the SRX220 Services
Gateway.
Gigabit Ethernet Eight ports that: The Gigabit Ethernet ports can be used
as follows:
• Are labeled 0/0 through 0/7 on the
front panel • To function as front-end network
• Use RJ-45 connectors ports
• To provide LAN and WAN connectivity
• Provide link speeds of 10/100/1000
Mbps to hubs, switches, local servers, and
workstations
• Operate in full-duplex and half-duplex
• To forward incoming data packets to
modes
the device
• Support flow control
• To receive outgoing data packets from
• Support autonegotiation and
the device
autosensing
• To connect power devices to receive
All Gigabit Ethernet ports support Power network connectivity and electric
over Ethernet on the PoE and media power (PoE functionality) (For the
gateway model of the SRX220 Services PoE and media gateway model of the
Gateway. SRX220 Services Gateway)
Universal Serial Bus (USB) Two ports that: The USB ports can be used as follows:
• Function in full speed and high speed • To support a USB storage device that
• Comply with USB revision 2.0 functions as a secondary boot device
in case of CompactFlash failure on
startup (if the USB storage device is
installed and configured).
Console One port that: The console port can be used as follows:
Mini-Physical Interface Module Two slots for Mini-PIMs The Mini-PIM slots can be used to
(Mini-PIM) provide LAN and WAN functionality
along with connectivity to various media
types.
Introduction
This release supports the SRX1400 Services Gateway.
Juniper Networks SRX1400 Services Gateway expands the SRX Series family of
next-generation security platforms, delivering market-leading performance and extensive
service integration to 10 gigabits per second (10 Gbps) environments that require the
features without the massive scalability and aggregated throughput provided by Juniper
Networks SRX3000 line and SRX5000 line. The SRX1400 Services Gateway provides
firewall support with key features such as IP Security (IPsec), virtual private network
(VPN), and high-speed deep packet inspection features such as intrusion detection and
prevention (IDP).
The SRX1400 is ideally suited for small to medium-size data centers, enterprise, and
service provider network security deployments where consolidation of security
functionality, uncompromised 10 Gbps performance, compact environmental footprint,
and affordability are key requirements.
The SRX1400 Services Gateway is three rack units (U) tall. Sixteen devices can be stacked
in a single floor-to-ceiling rack, for increased port density per unit of floor space. The
device provides common form-factor module (CFM) slots that can be populated with
Network and Services Processing Card (NSPC), and I/O cards (IOCs). The device also
has one dedicated slot for System I/O card (SYSIOC), one dedicated slot for the Routing
Engine, two slots for power supplies, and one slot for the fan tray and air filter.
The SRX1400 Services Gateway runs Junos OS. You can use the Junos OS command-line
interface (CLI) or J-Web (Web-based graphical interface) to monitor, configure,
troubleshoot, and manage the SRX1400 Services Gateway.
Supported Models
The SRX1400 Services Gateway is available in four models, which are listed in Table 5
on page 105.
Hardware Features
Table 6 on page 105 lists the hardware features supported on the SRX1400 Services
Gateway.
Power supplies 2
Console port 1
Auxiliary port 1
Fans 2
Fan tray 1
Air filter 1
Physical Specifications
Table 7 on page 106 summarizes the physical specifications of the SRX1400 Services
Gateway chassis.
Chassis weight (base chassis [Chassis with Routing 29.3 lb (13.3 kg)
Engine, SYSIOC, and power supply] )
• GR-63-CORE
• ETSI 300019-2-1
• ETSI 300019-2-2
• ETSI 300019-2-3
• GR-1089-CORE
Each enhanced DC power supply provides up to 1200 watts of power. In the SRX3400
Services Gateway, the enhanced DC power supply lets you configure your device with
more Services Processing Cards (SPCs), Network Processing Cards (NPCs), or I/O cards
(IOCs) than is possible with the standard 850-watt DC power supply.
NOTE: Mixing of standard and enhanced DC power supplies within the same
chassis is not supported. All installed DC power supplies must be either of
standard or enhanced types.
Table 8 on page 107 shows the different SPC, NPC, and IOC configurations applicable to
the standard and enhanced DC power supplies in the SRX3400 Services Gateway.
Table 8: Supported Combinations of SPCs, NPCs, and IOCs for Standard and Enhanced
DC Power Supplies
1 2 1 2
In the SRX3600 Services Gateway, the supported SPC, NPC, and IOC configurations are
the same for both the standard and the enhanced DC power supply.
See the SRX3400 Services Gateway Hardware Guide or the SRX3600 Services Gateway
Hardware Guide for detailed information about the enhanced DC power supply and
additional requirements for NEBS and ETSI compliance.
Related • Known Limitations in Junos OS Release 10.4 for SRX Series Services Gateways and J
Documentation Series Services Routers on page 133
• Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers on page 143
• Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 166
You can now advertise bandwidth for neighbors on a broadcast link. The network link is
a point-to-multipoint (P2MP) link in the OSPFv3 link state database. This feature uses
existing OSPF neighbor discovery to provide automatic discovery without configuration.
It allows each node to advertise a different metric to every other node in the network to
accurately represent the cost of communication. To support this feature, a new
interface-type under the OSPFv3 interface configuration has been added to configure
the interface as p2mp-over-lan. OSPFv3 then uses LAN procedures for neighbor discovery
and flooding, but represents the interface as P2MP in the link state database.
The interface type and router LSA are available under the following hierarchies:
Group servers and group members on Juniper Networks security devices cannot
interoperate with Cisco GET VPN members. Group members on Juniper Networks security
devices can interoperate with Cisco GET VPN servers, with the following caveats:
The group VPN in Release 10.4 of Junos OS has been tested with Cisco GET VPN servers
running Version 12.4(22)T and Version 12.4(24)T.
To avoid traffic disruption, do not enable rekey on a Cisco server when the VPN group
includes a Juniper Networks security device. The Cisco GET VPN server implements a
proprietary ACK for unicast rekey messages. If a group member does not respond to the
unicast rekey messages, the group member is removed from the group and is not able
to receive rekeys. An out-of-date key causes the remote peer to treat IPsec packets as
bad SPIs. The Juniper Networks security device can recover from this situation by
reregistering with the server to download the new key.
Antireplay must be disabled on the Cisco server when a VPN group of more than two
members includes a Juniper security device. The Cisco server supports time-based
antireplay by default. A Juniper Networks security device will not be able to interoperate
with a Cisco group member if time-based antireplay is used since the timestamp in the
IPsec packet is proprietary. Juniper Networks security devices are not able to synchronize
time with the Cisco GET VPN server and Cisco GET VPN members as the sync payload
is also proprietary. Counter-based antireplay can be enabled if there are only two group
members.
According to Cisco documentation, the Cisco GET VPN server triggers rekeys 90 seconds
before a key expires and the Cisco GET VPN member triggers rekeys 60 seconds before
a key expires. When interacting with a Cisco GET VPN server, a Juniper Networks security
device member would match Cisco behavior.
A Cisco GET VPN member accepts all keys downloaded from the GET VPN server. Policies
associated with the keys are dynamically installed. A policy does not have to be configured
on a Cisco GET VPN member locally, but a deny policy can optionally be configured to
prevent certain traffic from passing through the security policies set by the server. For
example, the server can set a policy to have traffic between subnet A and subnet B be
encrypted by key 1. The member can set a deny policy to allow OSPF traffic between
subnet A and subnet B not be encrypted by key 1. However, the member cannot set a
permit policy to allow more traffic to be protected by the key. The centralized security
policy configuration does not apply to the Juniper Networks security device.
Logical key hierarchy (LKH), a method for adding and removing group members, is not
supported with group VPN on Juniper Networks security devices.
GET VPN members can be configured for cooperative key servers (COOP KSs), an ordered
list of servers with which the member can register or reregister. Multiple group servers
cannot be configured on group VPN members.
Changes in Default Behavior and Syntax in Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers
The following current system behavior, configuration statement usage, and operational
mode command usage might not yet be documented in the Junos OS documentation:
Application Identification
• Improved uninstall options for predefined and custom application objects—This
feature is supported on SRX1400, SRX3400, SRX3600, SRX5600, and SRX5800
devices.
The following options have been added to the request services applciation-identificaiton
uninstall command to uninstall the predefined application definition package, all
custom application definitions, or both at one time.
all—Uninstall from your configuration both the predefined application definition package
and all custom application definitions that you have created.
AppSecure
• On SRX1400, SRX3400, SRX3600, SRX5600, and SRX5800 devices, when you create
custom application or nested application signatures for Junos OS application
identification, the order value must be unique among all predefined and custom
application signatures. The order value determines the application-matching priority
of the application signature.
NOTE: The order value range for predefined signatures is 1 through 32,767.
We recommend that you use an order range higher than 32,767 for custom
signatures.
The order value is set with the set services application-identification application
application-name signature order command. You can also view all signature order
values by entering the show services application-identification | display set | match order
command. You will need to change the order number of the custom signature if it
conflicts with another application signature.
Example 1:
user@host# set wlan access-point ap6 radio 1 radio-options channel number ? Possible
completions:
36 Channel 36
40 Channel 40
44 Channel 44
48 Channel 48
52 Channel 52
56 Channel 56
60 Channel 60
64 Channel 64
100 Channel 100
108 Channel 108
112 Channel 112
116 Channel 116
120 Channel 120
124 Channel 124
128 Channel 128
132 Channel 132
136 Channel 136
140 Channel 140
149 Channel 149
153 Channel 153
157 Channel 157
161 Channel 161
165 Channel 165
auto Automatically selected
Example 2:
user@host# set wlan access-point ap6 radio 2 radio-options channel number ?
1 Channel 1
2 Channel 2
3 Channel 3
4 Channel 4
5 Channel 5
6 Channel 6
7 Channel 7
8 Channel 8
9 Channel 9
10 Channel 10
11 Channel 11
12 Channel 12
13 Channel 13
14 Channel 14
auto Automatically selected
• On SRX210 devices, packet drop might be seen while prioritizing multiple data streams
configured with the same multilink class on single-member-link ML bundles that are
configured between SRX Series and J Series devices and other types of devices. As a
workaround, ensure that each forwarding class is configured with one multilink class
on multilink bundles on SRX Series and J Series devices. This will avoid out-of-order
transmission of multilink fragments for a given multilink class. This is not applicable
to LFI traffic; also, when Q is marked for LFI, do not change the Q configuration.
• On SRX5600 and SRX5800 devices, the set security end-to-end-debug CLI hierarchy
command has been changed to set security datapath-debug
• On AX411 Access Points, the possible completions available for the CLI command set
wlan access-point mav0 radio 1 radio-options mode? have changed from previous
implementations.
• Example 1:
user@host# set wlan access-point mav0 radio 1 radio-options mode ?
Possible completions:
5GHz Radio Frequency -5GHz-n
a Radio Frequency -a
an Radio Frequency -an
[edit]
• Example 2:
user@host# set wlan access-point mav0 radio 2 radio-options mode ?
Possible completions:
2.4GHz Radio Frequency --2.4GHz-n
bg Radio Frequency -bg
bgn Radio Frequency -bgn
• On SRX Series devices, the show system storage partitions command now displays the
partitioning scheme details on SRX Series devices.
• Example 1:
show system storage partitions (dual root partitioning)
user@host# show system storage partitions
Boot Media: internal (da0)
Active Partition: da0s2a
Backup Partition: da0s1a
Currently booted from: active (da0s2a)
Partitions Information:
Partition Size Mountpoint
s1a 293M altroot
s2a 293M /
s3e 24M /config
s3f 342M /var
s4a 30M recovery
• Example 2:
show system storage partitions (single root partitioning)
user@host# show system storage partitions
Boot Media: internal (da0)
Partitions Information:
Partition Size Mountpoint
s1a 898M /
s1e 24M /config
s1f 61M /var
show system storage
partitions (USB)
• Example 3:
show system storage partitions (usb)
user@host# show system storage partitions
Boot Media: usb (da1)
Active Partition: da1s1a
Backup Partition: da1s2a
Currently booted from: active (da1s1a)
Partitions Information:
Partition Size Mountpoint
s1a 293M /
s2a 293M altroot
s3e 24M /config
s3f 342M /var
s4a 30M recovery
Configuration
• J Series devices no longer allow a configuration in which a tunnel's source or destination
address falls under the subnet of the same logical interface’s address.
• On SRX100, SRX210, SRX240, and SRX650 devices, the current Junos OS default
configuration is inconsistent with the one in Secure Services Gateways, thus causing
problems when users migrate to SRX Series devices. As a workaround, users should
ensure the following steps are taken:
• The ge-0/0/0 interface should be configured as the Untrust port (with the DHCP
client enabled).
• The rest of the on-board ports should be bridged together, with a VLAN IFL and
DHCP server enabled (where applicable).
• Default NAT rules should apply interface-nat for all trust->untrust traffic.
• DNS/Wins parameters should be passed from server to client and, if not available,
users should preconfigure a DNS server (required for download of security packages).
Dynamic VPN
• Working with the Pulse client —Junos Pulse enables secure authenticated network
connections to protected resources and services over LANs and WANs. Junos Pulse is
a remote access client developed to replace the earlier access client called Juniper
Networks Access Manager. You must uninstall Access Manager before you install the
Junos Pulse client.
For SRX100, SRX210, SRX220, SRX240, and SRX650 devices running Junos OS Release
10.2 and later, Junos Pulse is supported but must be deployed separately. Users can
download and install the pulse client manually from Juniper support site.
Policy configuration—To configure the policy for the session for which you want to
log matches as log session-init or session-close and to record sessions in syslog:
• set security policies from-zone untrustZone to-zone trustZone policy policy13 match
source-address extHost1
• set security policies from-zone untrustZone to-zone trustZone policy policy13 match
destination-address intHost1
• set security policies from-zone untrustZone to-zone trustZone policy policy13 match
application junos-ping
• set security policies from-zone untrustZone to-zone trustZone policy policy13 then
permit
• set security policies from-zone untrustZone to-zone trustZone policy policy13 then log
session-init
• set security policies from-zone untrustZone to-zone trustZone policy policy13 then log
session-close
flow match policy13 will record the following information in the log:
• On SRX Series devices, the factory default for the maximum number of backup
configurations allowed is five. Therefore, you can have one active configuration and a
maximum of five rollback configurations. Increasing this backup configuration number
will result in increased memory usage on disk and increased commit time.
• On J Series devices, the following configuration changes must be done after rollback
or upgrade from Junos OS Release 10.4 to 9.6 and earlier releases.
If the aforementioned instructions are not followed, the bundle will be incorrectly
processed.
• On SRX Series devices, as per the new behavior, on configuring identical IPs on a single
interface users no longer see a warning message; instead, a syslog message appears.
Installation
• On SRX100, SRX210, SRX220, SRX240, and SRX650 devices, support for USB
auto-installation is added. This feature simplifies the upgrading of Junos OS images
in cases where there is no console access to an SRX Series device located at a remote
site. This feature allows you to upgrade the Junos OS image with minimum configuration
effort by simply inserting a USB flash drive into the USB port of the SRX Series device
and performing a few simple steps. This feature can also be used for reformatting boot
devices and recovering SRX Series devices after a boot media corruption.
• On SRX Series devices, to minimize the size of system logs, the default logging level
in the factory configuration has been changed from any any to any critical.
• On SRX3000 and SRX5000 line devices, the set protocols bgp family inet flow and set
routing-options flow CLI statements are no longer available, because BGP flow spec
functionality is not supported on these devices.
• On J4350 devices, ping does not go through even if the ISDN call is connected and the
dialer watch is configured. This issue occurs only when media MTU on Cisco devices
is bigger than the MTU configured on J Series devices. As a workaround, keep MTU
configured on the J Series device equal to or greater than the one set on the Cisco
device.
• On SRX and J Series devices, the help description for the set <int> interface arp-resp
command incorrectly states the default value as unrestricted. The default value is
actually restricted.
• On SRX Series and J Series devices, for brute force and time-binding-related attacks,
the logging is to be done only when the match count is equal to the threshold. That is,
only one log is generated within the 60-second period in which the threshold is
measured. This process prevents repetitive logs from being generated and ensures
consistency with other IDP platforms like IDP-standalone.
When no attack is seen within the 60-second period and the BFQ entry is flushed out,
the match count starts afresh, and the new attack match shows up in the attack table,
and the log is generated as explained above.
J-Web
• On SRX100, SRX210, SRX220, and SRX240 devices, the commit fails when you configure
an interface under security zone - junos-global. In Junos OS Release 10.4, the junos-global
CLI option is deprecated and is therefore not supported.
NOTE: Junos OS Release 10.3 and earlier releases still support the
junos-global CLI option.
• The J-Web login page has been updated with the new Juniper Logo and Trademark.
• URL separation for J-Web and dynamic VPN—This feature prevents the dynamic VPN
users from accessing J-Web accidentally or intentionally. Unique URLs for J-Web and
dynamic VPN add support to the webserver for parsing all the HTTP requests it receives.
The webserver also provides access permission based on the interfaces enabled for
J-Web and dynamic VPN.
web-management {
traceoptions {
level all;
flag dynamic-vpn;
flag all;
}
management-url my-jweb;
http;
https {
system-generated-certificate;
}
limits {
debug-level 9;
}
session {
session-limit 7;
}
}
• Enabling only Dynamic VPN: Dynamic VPN must have the configured HTTPS
certificate and the webserver to communicate with the client. Therefore, the
configuration at the [edit system services web-management] hierarchy level required
to start the appweb webserver cannot be deleted or deactivated. To disable J-Web,
the administrator must configure a loopback interface of lo0 for HTTP or HTTPS.
This ensures that the webserver rejects all J-Web access requests.
web-management {
traceoptions {
level all;
flag dynamic-vpn;
flag all;
}
management-url my-jweb;
http {
interface lo0.0;
}
https {
system-generated-certificate;
}
limits {
debug-level 9;
}
session {
session-limit 7;
}
}
• Changes in the Web access behavior: The following section illustrates the changes
in the Web access behavior when J-Web and dynamic VPN do not share and do
share the same interface.
Case 1: J-Web and dynamic VPN do not share the same interface.
J-Web is enabled, Navigates to the J-Web Navigates to the J-Web Navigates to the
and dynamic VPN login page on the login page if the J-Web dynamic VPN login
is configured. J-Web enabled attribute is configured; page
interface or to the otherwise, navigates to
dynamic VPN login the Page Not Found page
page on the dynamic
VPN enabled interface
depending on the
server host chosen
J-Web is not Navigates to the Page Navigates to the Page Navigates to the
enabled, and Not Found page Not Found page Page Not Found page
dynamic VPN is
not configured.
J-Web is enabled, Navigates to the J-Web Navigates to the J-Web Navigates to the
and dynamic VPN login page login page if the J-Web Page Not Found page
is not configured. attribute is configured;
otherwise, navigates to
the Page Not Found page
J-Web is not Navigates to the Navigates to the Page Not Navigates to the
enabled, and Page Not Found Found page Page Not Found page
dynamic VPN is not page
configured.
J-Web is not Navigates to the Navigates to the Page Not Navigates to the
enabled, and dynamic VPN Found page dynamic VPN login
dynamic VPN is login page page
configured.
• The options to configure the Custom Attacks, Custom Attack Groups, and Dynamic
Attack Groups are disabled because they cannot be configured from J-Web.
• The chassis contains an internal CompactFlash used to store the operating system.
By default, only the internal CompactFlash is enabled, and an option to take a snapshot
of the configuration from the internal CompactFlash to the external compact flash is
not supported. This can be done only by using a USB storage device.
1. Take a snapshot from the internal CompactFlash to the USB storage device by
using the request system snapshot media usb CLI command.
2. Reboot the device from the USB storage device by using the request system reboot
media usb command.
3. Go to the U-boot prompt. For more information, see the Accessing the U-Boot
Prompt section in the Junos OS Administration guide.
5. Once the system is booted from the USB storage device, take a snapshot on the
external CompactFlash by using the request system snapshot media external
command.
NOTE: Once the snapshot has been taken on the external CompactFlash,
we recommend you set the ext.cf.pref to 0 at the U-boot prompt.
Multilink
• When data and LFI streams are present, we recommend the following configuration
to get less latency for LFI traffic and to avoid out-of-range transmission of data traffic:
Even after this configuration, if out-of-range sequence number drops are observed on
reassembly side, increase the drop-timeout of the bundle to 200 ms
Security
• J Series devices do not support the authentication order password radius or password
ldap in the edit access profile profile-name authentication-order command. Instead, use
the order radius password or ldap password.
• Any change in the Unified Access Control’s (UAC) contact interval and timeout values
in the SRX Series or J Series device will be effective only after the next reconnection
of the SRX Series or J Series device with the Infranet Controller.
• The maximum size of a redirect payload is 1450 bytes. The size of the redirect URL is
restricted to 1407 bytes (excluding a few HTTP headers). If a user accesses a destination
URL that is larger than 1407 bytes, the Infranet Controller authenticates the payload,
the exact length of the redirect URL is calculated, and the destination URL is trimmed
such that it can fit into the redirect URL. The destination URL can be fewer than 1407
bytes based on what else is present in the redirect URL, for example, policy ID. The
destination URL in the default redirect URL is trimmed such that the redirect packet
payload size is limited to 1450 bytes, and if the length of the payload is larger than
1450 bytes, the excess length is trimmed and the user is directed to the destination
URL that has been resized to 1450 bytes.
• On SRX100, SRX210, SRX220, SRX240, and SRX650 devices, the following VLAN IDs
are reserved for internal use and cannot be used on customer-facing interfaces:
This default TAG reservation can be configured to use an alternative tag number or
not to use VLAN tagging at all
NOTE:
• Without wlan config option enabled, the AX411 Access Points will be
• The SRX Series devices that are not using the AX411 Access Point can
optionally delete the wlan config option.
• Accessing the AX411 Access Point through SSH is disabled by default. You can enable
the SSH access using the set wlan access-point < name > external system services
enable-ssh command.
Unsupported CLI
This section lists unsupported CLI statements and commands.
Accounting-Options Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the accounting,
source-class, and destination-class statements in the [accounting-options] hierarchy
level are not supported.
Chassis Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the following
chassis hierarchy CLI commands are not supported. However, if you enter these
commands in the CLI editor, they appear to succeed and do not display an error
message.
set chassis craft-lockout
Class-of-Service Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and J Series devices, the following
class-of-service hierarchy CLI commands are not supported. However, if you enter
these commands in the CLI editor, they appear to succeed and do not display an error
message.
set class-of-service classifiers ieee-802.1ad
Ethernet-Switching Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the following
ethernet-switching hierarchy CLI commands are not supported. However, if you enter
these commands in the CLI editor, they appear to succeed and do not display an error
message.
set ethernet-switching-options bpdu-block disable-timeout
Firewall Hierarchy
• On SRX100, SRX210, SRX220, SRX240 SRX650, and all J Series devices, the following
Firewall hierarchy CLI commands are not supported. However, if you enter these
commands in the CLI editor, they appear to succeed and do not display an error
message.
set firewall family vpls filter
On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the following
interface hierarchy CLI commands are not supported. However, if you enter these
commands in the CLI editor, they appear to succeed and do not display an error message.
Ethernet Interfaces
• The following CLI commands are not supported. However, if you enter these commands
in the CLI editor, they appear to succeed and do not display an error message.
set interfaces ge-0/0/1 gigether-options ignore-l3-incompletes
IP Interface CLI
• The following CLI commands are not supported. However, if you enter these commands
in the CLI editor, they appear to succeed and do not display an error message.
set interfaces ip-0/0/0 unit 0 layer2-policer
PT Interface CLI
• The following CLI commands are not supported. However, if you enter these commands
in the CLI editor, they appear to succeed and do not display an error message.
set interfaces pt-1/0/0 gratuitous-arp-reply
T1 Interface CLI
• The following CLI commands are not supported. However, if you enter these commands
in the CLI editor, they appear to succeed and do not display an error message.
set interfaces t1-1/0/0 receive-bucket
Protocols Hierarchy
• On SRX100, SRX210, SRX220, SRX240, and SRX650 devices, the following CLI
commands are not supported. However, if you enter these commands in the CLI editor,
they will appear to succeed and will not display an error message.
set protocols bfd no-issu-timer-negotiation
Routing Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the following
routing hierarchy CLI commands are not supported. However, if you enter these
commands in the CLI editor, they appear to succeed and do not display an error
message.
set routing-instances p1 services
Services Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the following
services hierarchy CLI commands are not supported. However, if you enter these
commands in the CLI editor, they appear to succeed and do not display an error
message.
set services service-interface-pools
SNMP Hierarchy
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the following
SNMP hierarchy CLI commands are not supported. However, if you enter these
commands in the CLI editor, they appear to succeed and do not display an error
message.
set snmp community 90 logical-system
System Hierarchy
• On all SRX100, SRX210, SRX220, SRX240, and SRX650 devices, the following system
hierarchy CLI commands are not supported. However, if you enter these commands
in the CLI editor, they appear to succeed and do not display an error message.
set system diag-port-authentication
• set protocols pim apply-groups group apply-groups-except group disable family inet6
Related • New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Documentation Services Routers on page 79
• Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers on page 143
• Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 166
Known Limitations in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Services Routers
AppSecure
• Junos OS application identification—When you create custom application or nested
application signatures for Junos OS application identification, the order value must be
unique among all predefined and custom application signatures. The order value
determines the application matching priority of the application signature.
The order value is set with the set services application-identification application
application-name signature order command. You can also view all signature order
values by entering the show services application-identification | display set | match order
command. You will need to change the order number of the custom signature if it
conflicts with another application signature.
Chassis Cluster
• On SRX650 devices in a chassis cluster, ping packets sent from the forward node to
the active node are dropped intermittently.
• On SRX650 devices in a chassis cluster, the T1/E1 PIC goes offline and does not come
online.
The product of the heartbeat-threshold and heartbeat-interval values defines the time
before failover. The default values (heartbeat-threshold of 3 beats and
heartbeat-interval of 1000 milliseconds) produce a wait time of 3 seconds.
To change the wait time, modify the option values so that the product equals the
desired setting. For example, setting the heartbeat-threshold to 8 and maintaining the
default value for the heartbeat-interval (1000 milliseconds) yields a wait time of 8
seconds. Similarly, setting the heartbeat-threshold to 4 and the heartbeat-interval to
2000 milliseconds also yields a wait time of 8 seconds.
• SRX100, SRX210, SRX240, and SRX650 devices have the following chassis cluster
limitations:
• On SRX Series device failover, access points on the Layer 2 switch reboot and all
wireless clients lose connectivity for 4-6 minutes.
• Sampling features like J-FLow, packet capture, and port mirror on the reth interface
are not supported.
• IDP is not supported for active/active chassis cluster. IDP is supported for
active/backup chassis cluster in Junos OS Release 10.2R2 and later.
• Any packet-based services like MPLS and CLNS are not supported.
• On SRX100, SRX210, SRX220, SRX240, and SRX650 devices, UTM is supported only
for active/backup chassis cluster configuration with both RG0 and RG1 active on the
same node. It is not supported for active/active chassis cluster configuration.
For other limitations in chassis cluster, see “Limitations of Chassis Clustering” in the Junos
OS Security Configuration Guide.
• For SRX210 devices: four CLI users and three J-Web users
• For SRX240 devices: six CLI users and five J-Web users
Dynamic VPN
• The IKE configuration for the dynamic VPN client does not support the hexadecimal
preshared key.
• The dynamic VPN client IPsec does not support the Authentication Header (AH)
protocol and the Encapsulating Security Payload (ESP) protocol with NULL
authentication.
• When you log in through the Web browser (instead of logging in through the dynamic
VPN client) and a new client is available, you are prompted for a client upgrade even
if the force-upgrade option is configured. Conversely, if you log in using the dynamic
VPN client with the force-upgrade option configured, the client upgrade occurs
automatically (without a prompt).
• The service-point zone parameter for the SRX Series MGW configuration is not
supported in Junos OS Release 10.4.
• You cannot configure route policies and route patterns in the same dial plan.
• You can configure no more than four members in a station group. Station groups are
used for hunt groups and ring groups.
• On J Series devices, even when forwarding options are set to drop packets for the ISO
protocol family, the device forms End System-to-Intermediate System (ES-IS)
adjacencies and transmits packets because ES-IS packets are Layer 2 terminating
packets.
• On SRX Series and J Series devices, high CPU utilization triggered due to various reasons
like CPU intensive commands, SNMP Walks etc causes the BFD to flap while processing
large BGP updates.
For other limitations in flow and processing, see “Limitations of Flow and Processing” in
the Junos OS Security Configuration Guide.
Hardware
• On SRX1400, SRX3400 and SRX3600 devices, the following feature is not supported
by a simple filter:
• On SRX1400, SRX3400 and SRX3600 devices, the following features are not supported
by a policer or a three-color-policer:
• Filter-specific policer
• Policer action
• Egress FBF
• FTF
• SRX1400, SRX3400, and SRX3600 devices have the following limitations of a simple
filter:
• In the packet processor on an IOC, up to 100 logical interfaces can be applied with
simple filters.
• In the packet processor on an IOC, the maximum number of terms of all simple filters
is 4000.
• 16-port GPIM
• 24-port GPIMs
• On SRX650 devices, the T1/E1 GPIMs (2 or 4 port version) do not work in Junos OS
release 9.6R1. This issue is resolved in Junos OS Release 9.6R2 and later releases, but
if you roll back to the 9.6R1 image, this issue is still seen.
• The SRX220 Services Gateway does not support the 1-port SFP Mini-PIM.
• On SRX240 High Memory devices, traffic might stop between SRX240 device and
CISCO switch due to link mode mismatch. As a workaround, Juniper Networks
recommends setting auto-negotiation parameters on both ends to the same value.
• On SRX100 devices, the link goes down when you upgrade FPGA on 1xGE SFP. As a
workaround, run the restart fpc command and restart the FPC.
• On SRX210 devices with VDLS2, ATM COS VBR-related functionality cannot be tested
because of lack of support from the vendor.
• On SRX210 High Memory devices, IGMP v2 JOINS messages are dropped on an IRB
interface. As a workaround, enable IGMP snooping to use IGMP over IRB interfaces.
• On SRX210, SRX220 and SRX240 devices, every time the VDSL2 PIM is restarted in
the ADSL mode, the first packet passing through the PIM is dropped.
• On SRX240 Low Memory devices and SRX240 High Memory devices, the RPM server
operation does not work when the probe is configured with the option
destination-interface.
• Link Layer Discovery Protocol (LLDP)—The following are the LLDP limitations:
• On SRX Series and J Series devices, LLDP over ae interfaces is not supported.
• On SRX Series and J Series devices, LLDP is supported only on interface unit 0.
• In J Series xDSL PIMs, mapping between IP CoS and ATM CoS is not supported. If the
user configures IP CoS in conjunction with ATM CoS, the logical interface level shaper
matching the ATM CoS rate must be configured to avoid congestion drops in SAR.
Example:
set interfaces at-5/0/0 unit 0 vci 1.110
set interfaces at-5/0/0 unit 0 shaping cbr 62400 ATM COS
set class-of-service interfaces at-5/0/0 unit 0 scheduler-map sche_map IP COS
set class-of-service interfaces at-5/0/0 unit 0 shaping-rate 62400 ADD IFL SHAPER
• On SRX210, SRX220, and SRX240 devices, 1-port Gigabit Ethernet SFP mini-PIM does
not support switching in Junos OS Release 10.4.
• On SRX650 devices, MAC pause frame and FCS error frame counters are not supported
for the interfaces ge-0/0/0 through ge-0/0/3.
• On SRX240 and SRX650 devices, the VLAN range from 3967 to 4094 falls under the
reserved VLAN address range, and the user is not allowed any configured VLANs from
this range.
• On SRX650 devices, the last 4 ports of a 24-Gigabit Ethernet switch GPIM can be used
either as RJ-45 or SFP ports. If both are present and providing power, the SFP media
is preferred. If the SFP media is removed or the link is brought down, then the interface
will switch to the RJ-45 medium. This can take up to 15 seconds, during which the LED
for the RJ-45 port might go up and down intermittently. Similarly when the RJ-45
medium is active and an SFP link is brought up, the interface will transition to the SFP
medium, and this transition could also take a few seconds.
• On SRX210 devices, the USB modem interface can handle bidirectional traffic of up
to 19 Kbps. On oversubscription of this amount (that is, bidirectional traffic of 20 Kbps
or above), keepalives do not get exchanged, and the interface goes down.
• On SRX3400 and SRX3600 devices, BGP based VPLS over aggregated ethernet (ae)
interfaces does not work because it is not supported. It works on child ports and physical
interfaces.
• On SRX100, SRX210, SRX240 and SRX650 devices, on the Level 3 ae interface, the
following features are not supported:
• Encapsulations (such as CCC, VLAN CCC, VPLS, and PPPOE) on Level 3 ae interfaces
• J-Web
Administrators must update the detector by using the request security idp
security-package download full-update command followed by request security idp
security-package install command.
• On SRX100, SRX210, SRX240, and SRX650 devices, policy compilation takes a long
time because:
For all other limitations in IDP, see “Limitations of IDP” in the Junos OS Security
Configuration Guide.
IPv6 support
For limitations in IPv6, see “Limitations of IPv6” in the Junos OS Security Configuration
Guide.
J-Web
• J-Web browser support for Dell PowerConnect SRX Series and J Series devices—To
access J-Web for all platforms, your device requires the following supported browsers
and OS:
• Browser: Microsoft Internet Explorer version 6.0, 7.0, and Mozilla Firefox version
above 3.0 and below 3.5.
NOTE: Other browser versions might not provide access to J-Web and
only English-version browsers are supported.
• If the device is running the worldwide version of the Junos OS and you are using the
Microsoft Internet Explorer Web browser, you must disable the Use SSL 3.0 option
in the Web browser to access the device.
• To use the Chassis View, a recent version of Adobe Flash that supports ActionScript
and AJAX (Version 9) must be installed. Also note that the Chassis View is displayed
by default on the Dashboard page. You can enable or disable it using options in the
Dashboard Preference dialog box, but clearing cookies in Internet Explorer also
causes the Chassis View to be displayed.
• On SRX Series devices, in the J-Web interface, there is no support to change the T1
interface to an E1 interface or vice versa. As a workaround, use the CLI to convert from
T1 to E1 and vice versa.
• On SRX Series and J Series devices, users cannot differentiate between Active and
Inactive configurations on the System Identity, Management Access, User Management,
and Date & Time pages.
• On SRX210, SRX240, and SRX650 devices, the complete contents of the ToolTips are
not displayed in the J-Web Chassis View. As a workaround, drag the Chassis View
image down to see the complete ToolTip.
• On SRX210 devices, there is no maximum length when the user commits the hostname
in CLI mode; however, only 58 characters maximum are displayed in the J-Web System
Identification panel.
• On J Series devices, some J-Web pages for new features (for example, the Quick
Configuration page for the switching features on J Series devices) display content in
one or more modal pop-up windows. In the modal pop-up windows, you can interact
only with the content in the window and not with the rest of the J-Web page. As a
result, online Help is not available when modal pop-up windows are displayed. You
can access the online Help for a feature only by clicking the Help button on a J-Web
page.
• On SRX Series devices, you cannot use J-Web to configure a VLAN interface for an IKE
gateway. VLAN interfaces are not currently supported to be used as IKE
external-interfaces.
NetScreen-Remote
• On SRX Series devices, NetScreen-Remote is not supported in Junos OS Release 10.4.
The number of destination and static NAT rules has been incremented as shown in
Table 10 on page 140. The limitation on the number of destination-rule-set and
static-rule-set has been increased.
Table 10 on page 140 provides the requirements per device to increase the configuration
limitation as well as scale the capacity for each device.
Table 10: Number of Rules on SRX Series and J Series Devices (continued)
NAT Rule SRX3400 SRX5600
Type SRX100 SRX210 SRX240 SRX650 SRX3600 SRX5800 J Series
The restriction on the number of rules per rule set has been increased so that there is
only a device-wide limitation on how many rules a device can support. This restriction
is provided to help you better plan and configure the NAT rules for the device.
Security
• J Series devices do not support the authentication order password radius or password
ldap in the edit access profile profile-name authentication-order command. Instead, use
order radius password or ldap password.
For all other limitations in security, see “Addresses and Address Sets” in the Junos OS
Security Configuration Guide.
SNMP
• On J Series devices, the SNMP NAT-related MIB is not supported in Junos OS Release
10.4.
Switching
• On SRX100, SRX210, SRX240, and SRX650 devices, CoA is not supported with 802.1x.
• On SRX100, SRX210, SRX240 and SRX650 devices, on the routed VLAN interface, the
following features are not supported:
• Class-of-service
• Encapsulations (Ether CCC, VLAN CCC, VPLS, PPPOE etc) on VLAN interfaces
• CLNS
• PIM
• DVMRP
• Gratuitous ARP
VPNs
• On SRX1400, SRX3400, SRX3600, SRX5600, and SRX5800 devices, the IPsec NAT-T
tunnels scaling and sustaining issues are as follows:
• For a given private IP address, the NAT device should translate both 500 and 4500
private ports to the same public IP address.
• The total number of tunnels from a given public translated IP cannot exceed 1000
tunnels.
• On SRX100, SRX210, SRX240, and SRX650 devices, while configuring dynamic VPN
using PULSE client, when you select the authentication-algorithm as sha-256 in IKE
proposal, IPsec session might not get established.
NOTE: The number of licensed access points can exceed the maximum
number of supported access points. However, you can only configure and
manage the maximum number of access points.
Related • New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Documentation Services Routers on page 79
• Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers on page 143
• Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 166
Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services Routers
• Outstanding Issues In Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers on page 143
• Resolved Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers on page 161
Outstanding Issues In Junos OS Release 10.4 for SRX Series Services Gateways
and J Series Services Routers
The following problems currently exist in SRX Series and J Series devices. The identifier
following the description is the tracking number in our bug database.
• On SRX Series devices, SIP server protection does not work. The set security alg sip
application-screen protect deny command does not work. [PR/512202]
Authentication
• On J Series devices, after the user is authenticated, if the webauth-policy is deleted or
changed and an entry exists in the firewall authentication table, then an authentication
entry created as a result of webauth will be deleted only if a traffic flow session exists
for that entry. Otherwise, the webauth entry will not get deleted and will only age out.
This behavior will not cause a security breach. [PR/309534]
• On SRX650 devices, when an access point is part of the default cluster and you change
the default cluster after the access point is connected to it, the changes might not be
reflected. As a workaround, restart the wireless LAN service. [PR/497752]
Chassis Cluster
• On J Series devices in a chassis cluster, a high load of SIP ALG traffic might result in
some call leaks in active resource manager groups and gates on the backup router.
[PR/268613]
• On an SRX210 device in a chassis cluster, sometimes the reth interface MAC address
might not make it to the switch filter table. This results in the dropping of traffic sent
to the reth interface. As a workaround, restart the Packet Forwarding Engine.
[PR/401139]
• On SRX5800 devices, SNMP traps might not be generated for the ineligible-primary
state. [PR/434144]
• On SRX240 Low Memory and High Memory devices, binding the same IKE policy to a
dynamic gateway and a site-to-site gateway is not allowed. [PR/440833]
• On SRX650 devices, the following message appears on the new primary node after a
reboot or an RG0 failover:
WARNING: cli has been replaced by an updated version:
CLI release 9.6B1.5 built by builder on 2009-04-29 08:24:20 UTC
Restart cli using the new version ? [yes,no] (yes) yes
[PR/444470]
• On SRX240 devices, the cluster might become destabilized when the file system is
full and logging is configured on JSRPD and chassisd. The log file size for the various
modules should be appropriately set to prevent the file system from getting full.
[PR/454926]
• On SRX3600 devices, track IPs on the secondary node remain unreachable after you
disable and enable the corresponding reth’s primary and secondary child interfaces
[PR/488890
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, LACP does not work in
Layer 2 transparent mode. [PR/503171]
• During a manual failover, a system crash might occur if the nodes have not completely
recovered from a previous failover. To determine if a device is ready for repeated
failovers, perform these recommended best-practice steps before doing a manual
failover.
• Use the show chassis cluster status command to verify the following for all
redundancy groups:
• Both nodes have nonzero priority values unless a monitored interface is down.
• Use the show chassis fpc pic-status command to verify that the PIC status is Online.
• Use the show pfe terse command to verify that the Packet Forwarding Engine status
is Ready and to verify the following:
• All slots on the RG0 primary node have the status Online.
• All slots on the RG0 secondary node, except the Routing Engine slots, have the
status Valid.
[PR/503389, PR/520093]
• On SRX650 devices, when the primary node is synchronizing heavy routes to the
secondary node and the secondary node is rebooted, FPCs on the secondary node
come up very slowly. PICs will not come up until all the routes are synchronized to the
secondary node. [PR/545429]
• On J Series devices with a CoS configuration, when you try to delete all the flow sessions
using the clear security flow session command, the WXC application acceleration
platform might fail over with heavy traffic. [PR/273843]
• On SRX5600 devices, with heavy DS-Lite traffic, flowd might stop responding with
flow table corruption because of a function related to flow table operation (for example,
flow_table_find_flow_v6). [PR/548790]
As a workaround, remove the static route discard, retain, and no-advertise options
from the configuration. [PR/454189]
Enhanced Switching
• On J Series devices, if the access port is tagged with the same VLAN that is configured
at the port, the access port accepts tagged packets and determines the MAC.
[PR/302635]
• On J Series devices, outbound filters will be applied twice for host-generated IPv4
traffic. [PR/301199]
• On SRX Series devices, configuring the flow filter with the all flag might result in traces
that are not related to the configured filter. As a workaround, use the flow trace flag
basic with the command set security flow traceoptions flag.
[PR/304083]
• On SRX240 devices, traffic flooding occurs when multiple multicast (MC) IP group
addresses are mapped to the same MAC address because multicast switching is based
on the Layer 2 address. [PR/418519]
• On SRX650 devices, the input DA errors are not updated when packets are dropped
because of MAC filtering on the following:
• SRX240 device
• SRX210 device
[PR/423777]
• On SRX5600 and SRX5800 devices, the network processing bundle configuration CLI
does not check whether PICs in the bundle are valid. [PR/429780]
• On SRX650 devices, packet loss is observed when the device interoperates with an
SSG20 with AMI line encoding. [PR/430475]
• On SRX3400 and SRX3600 devices, the ramp rate of session creation is slow at times
for fragmented UDP traffic. [PR/434508]
• On SRX5800 devices, when there are nonexistent PICs in the network processing
bundle, the traffic is sent out to the PICs and is lost. [PR/434976]
• The SRX5600 and SRX5800 devices create more than the expected number of flow
sessions with NAT traffic. [PR/437481]
• On J Series devices, NAT traffic that goes to the WXC ISM 200 and returns clear (that
is, not accelerated by the WXC ISM 200) does not work. [PR/438152]
• On SRX5800 devices, for any network processing bundle configuration change to take
effect, a reboot is needed. Currently there is no message displayed after a bundle
configuration change. [PR/441546]
• On SRX5800 devices, the IOC hot swap is not supported with network processing
bundling. If an IOC configured with network processing bundling is unplugged, all traffic
to that network processor bundle will be lost. [PR/441961]
• On SRX5800 devices with interfaces in a network processing bundle, the ICMP flood
or UDP flood cannot be detected at the threshold rate. However, it can be detected
at a higher rate when the per-network processor rate reaches the threshold.
[PR/442376]
• On an SRX3400 device in combo mode with two SPCs and one NPC, not all sessions
are created under the stress test. [PR/450482]
• On J Series devices, there is a drop in throughput on the 64-byte packet size T3 link
when bidirectional traffic is directed. [PR/452652]
• On SRX240 PoE and J4350 devices, the first packet on each multilink class is dropped
on reassembly. [PR/455023]
• On SRX5600 and SRX5800 devices, system log messages are not generated when
CPU utilization returns to normal. [PR/456304]
• On SRX210, SRX240, and J6350 devices, the serial interface goes down for
long-duration traffic when FPGA version 2.3 is loaded in the device. As a result, the
multilink goes down. This issue is not seen when downgrading the FPGA version from
2.3 to 1.14. [PR/461471]
• On J Series devices, interfaces with different bandwidths (even if they are of same
interface type, for example, serial interfaces with different clock rates or channelized
T1/E1 interfaces with different time slots) should not be bundled under one multilink
bundle. [PR/464410]
• SRX3400 and SRX3600 devices with one Services Processing Card and two Network
Processing Cards operating under heavy traffic produce fewer flow sessions.
[PR/478939]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the input packets and
bytes counter shows random values both in traffic statistics and IPv6 transit statistics,
when VLAN tagging is added or removed from the IPv6 address configured interface.
[PR/489171]
• On SRX Series devices, the software upload and install package does not show a
warning message when there are pending changes to be committed. [PR/514853]
• On SRX240 Low Memory devices, the LSQ interface transmitting both LLQ and non-LLQ
traffic drops out-of-profile packets of the LLQ traffic faster than it was dropping out
earlier. [PR/536588]
• On SRX5800 devices, address overlapping is not supported when dual-stack lite works
with the source NAT and enables any of the following options:
• persistent-nat
• port no-translation
[PR/540816]
• On SRX3600 devices, if the interface address is changed to a new address that is also
the dual-stack lite concentrator address with the background traffic target to the
address, the user should manually clear the ipip cleartext sessions with the concentrator
address. The dual-stack lite concentrator will affect the traffic flow. [PR/541747]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices under high traffic load,
some part of FTP and TFTP control sessions might not get timed out even after two
hours of stopping the traffic. [PR/548250]
• On SRX5800 devices, in NAT mode, when SIP traffic is sent from the device packet
drop is seen at the beginning and later processing of traffic stops. [554685]
• On SRX3400 and SRX3600 devices, when external radius server is down or terminated,
the mass of authentication requests could cause authd to generate a core file.
[PR/568659]
Hardware
• On SRX210 devices, the MTU size is limited to 1518 bytes for the 1-port SFP Mini-PIM.
[PR/296498]
• On SRX240 devices, the Mini-PIM LEDs glow red for a short duration (1 second) when
the device is powered on. [PR/429942]
• On SRX240 devices, the file installation fails on the right USB slot when both of the
USB slots have USB storage devices installed. [PR/437563]
Infrastructure
• On J Series devices, you cannot use a USB device that provides U3 features (such as
the U3 Titanium device from SanDisk Corporation) as the media device during system
boot. You must remove the U3 support before using the device as a boot medium. For
the U3 Titanium device, you can use the U3 Launchpad Removal Tool on a
Windows-based system to remove the U3 features. The tool is available for download
at http://www.sandisk.com/Retail/Default.aspx?CatID=1415 . (To restore the U3 features,
use the U3 Launchpad Installer Tool accessible at
http://www.sandisk.com/Retail/Default.aspx?CatID=1411). [PR/102645]
• On J Series devices, if the device does not have an ARP entry for an IP address, the
device drops the first packet from itself to that IP address. [PR/233867]
• On J Series devices, when you press the F10 key to save and exit from BIOS configuration
mode, the operation might not work as expected. As a workaround, use the Save and
Exit option from the Exit menu. This issue can be seen on the J4350 and J6350 devices
with BIOS Version 080011 and on the J2320 and J2350 devices with BIOS Version
080012. [PR/237721]
• On J Series devices, the Clear NVRAM option in the BIOS configuration mode does not
work as expected. This issue can be seen on the J4350 and J6350 routers with BIOS
Version 080011 and on the J2320 and J2350 routers with BIOS Version 080012. To
help mitigate this issue, note any changes you make to the BIOS configuration so that
you can revert to the default BIOS configuration as needed. [PR/237722]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the SNMP set for the MIB
object usmUserPrivKeyChange does not work. [PR/482475]
Installation
• On SRX100, SRX210, SRX240, or SRX650 devices with 1-GB storage flash, when you
use the file copy command to copy the Junos OS package from ftp://<path> to a local
directory, you might get a message saying that the file system is full. Do not use the
file copy command to get the Junos OS package for software upgrade.
The file copy command copies the Junos OS package as a temporary file in/cf/var/tmp
and then copies the file with a package name in a local directory under the /cf/var
partition. This means that a Junos OS package of size X needs 2X space in the /cf/var
partition. For example, a Junos OS package of 197 MB will need 394 MB, whereas the
/cf/var partition is less than 350 MB on a 1-GB storage flash. Thus, the file copy
command will fail. [PR/526030]
• SNMP does not provide support for survivable call server (SRX Series SCS) statistics.
[PR/456454]
• On SRX210 devices with voice capability, SIP trunking or FXS trunking calls do not work
if the called party supports only the G729AB/G711-Mu-law codec. [PR/504135]
• On SRX210 and SRX240 devices with Integrated Convergence Services, if the transport
method for the peer call server is TCP, the SRX Series devices do not support SIP
messages of more than 2048 bytes. [PR/510291]
• On SRX210 and SRX240 devices with voice capability, the T1PRI calls do not work
when multiple trunk-groups or trunks are created. [PR/514784]
• On SRX210 and SRX240 devices with voice capability, the caller ID of the calling party
is displayed as a four-digit local extension number instead of a 7-or 10-digit local or
international number for outgoing calls from PRI. [PR/516021]
• On SRX210 and SRX240 devices with Integrated Convergence Services, if you have
the accounting feature configured (Services>Convergence services>Features), you
cannot configure the account code on a per-station basis. [PR/516681]
• On SRX240 devices with voice capability, the restart rtdm command is required after
changing the Max-concurrent-value from x to 0, to allow unlimited calls through SIP
trunk or PCS. [PR/536849]
• On SRX240 devices with voice capability, the restart rtdm command is required to
make PRI calls successful when both PRI and T1CAS lines are active. [PR/537551]
• Line
• FDL payload
• In-band line
• In-band payload
[PR/425040]
• On SRX650 devices, configuring dual and quad T1/E1 framing at the chassis level has
no effect. [PR/432071]
• On SRX Series devices, incorrect Layer 2 circuit replication on the backup Routing
Engine might occur when you:
• Configure nonstop active routing (NSR) and Layer 2 circuit standby simultaneously
and commit them
• Delete the NSR configuration and then add the configuration back when both the
NSR and the Layer 2 circuits are up
As a workaround:
[PR/440743]
• On SRX210 Low Memory devices, the E1 interface flaps and traffic does not pass through
the interface if you restart forwarding while traffic is passing through the interface.
[PR/441312]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, when you configure the
SAP listen option using the protocol sap listen command in the CLI, listening fails in
both sparse and sparse-dense modes. [PR/441833]
• On J Series devices, one member link goes down in a Multilink (ML) bundle during
bidirectional traffic with Multilink Frame Relay (MFR). [PR/445679]
• On SRX210 devices, the modem moves to the dial-out pending state while connecting
or disconnecting the call. [PR/454996]
• On SRX100, SRX210, and J Series devices, out-of-band dial-in access using a serial
modem does not work. [PR/458114]
• On SRX100 and SRX200 devices with VDLS2, multiple carrier transitions (three to
four) are seen during long-duration traffic testing with the ALU 7302 DSLAM. There is
no impact on traffic except for the packet loss after long-duration traffic testing, which
is also seen in the vendor CPE. [PR/467912]
• On SRX210 devices with VDLS2, the remote end ping operation fails to go above the
packet size of 1480 because the packets are dropped for the default MTU, which is
1496 on an interface, and because the default MTU of the remote host Ethernet
interface is 1514. [PR/469651]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, when you change the
multicast scoping to a different multicast address, traffic other than which is configured
for multicast scoping is not received. [PR/482957]
• On all SRX Series devices, the destination and destination-profile options for address
and unnumbered-address within family inet and inet6 are allowed to be specified
within a dynamic profile but are not supported. [PR/493279]
• On SRX210 High Memory devices, the physical interface module (PIM) shows time in
ADSL2+ ANNEX-M, even though it is configured for ANNEX-M ADSL2. [PR/497129]
• On SRX5600 and SRX5800 devices, load balance does not happen within the
aggregated Ethernet (ae) interface when you prefix the length with /24 while
incrementing the dst ip. [PR/505840]
• On SRX100, SRX210, SRX240, and SRX650 devices, egress queues do not function
on VLAN or IRB interfaces. [PR/510568]
• On SRX650 devices, in the 2-port 10G XPIM, when the interface is linked with fiber, the
activity LED does not blink when traffic enters the interface. However, the activity LED
blinks properly when traffic goes out of the interface. [PR/513961]
• On SRX240 and SRX650 devices, IGMP reports are flooded on all ports that are part
of the same multicast group instead of being sent on only the router interface.
[PR/546444]
• On SRX650 devices, the speed for the ae interface shows the interface speed and not
the negotiated speed. [PR/553339]
• On SRX650 devices, IGMP snooping does not work in q-in-q mode on a trunk port
when the Ethernet type is set to any value other than 0x8100. [PR/554992]
• On SRX650 devices, sometimes quad T1/E1 generates a core file while the user is
configuring it in T1 mode with the traffic sent continuously over the quad T1/E1.
[PR/556716]
• On SRX220 devices, when oversubscribed traffic is sent through the gr interface (after
tunnel queuing has been enabled and the shaper has been configured), there is an
increase in tail-dropped packets at the egress of the gr interface. As a result of this,
the output packet rate at the egress of the gr interface is much lower compared to that
of the shaper. [PR/559378]
• On SRX1400 devices, the alarm indication is not available if a power supply is not
functioning normally. The system creates log messages in /var/log/chassisd to indicate
the power supply failure conditions. [PR/566210]
• On SRX210 devices, when the IDP policy contains rules that have the match criteria
for the same attacks, multiple attacks will be reported when the attacks are detected.
No errors or warnings appear during policy compilation. [PR/414416]
• On SRX Series devices, the maximum supported sessions count is not displayed when
you run the show security flow session idp summary command. [PR/503721]
• On SRX5600 devices, when using a 4096-bit SSL private key for IDP HTTPS traffic
processing, the watchdog aborts the flowd process and reboots the SPC. This is
primarily because of the watchdog timer expiration. The IDP function takes a long time
to decrypt the session when you use a 4096-bit key.
The SSL function is known to take an exponentially large amount of time when the
key size is increased. Key sizes of 1024 bits and 2096 bits are OK to process because
their processing time is below the watchdog threshold, but the key size of 4096 bits
should not be used when sending stress traffic. Also, IDP uses SSL hardware for <=
1024-bit keys. The throughput is much higher for the traffic using <= 1024-bit SSL
private keys. [PR/524452 ]
• On SRX210 High Memory and SRX240 High Memory devices, IDP scaling drop occurs.
[PR/525732]
• On SRX240 High Memory devices, with IDP policy template, policy load fails while
changing the active policy from the recommended option to the IDP_Default policy.
This is because there is not enough memory for IDP to load the IDP_Default policy.
[PR/539486]
• On SRX100, SRX210, SRX220, SRX240, and SRX650 devices, IDP policies greater than
19 MB do not get loaded. [PR/540856]
• On SRX100 and SRX240 High Memory devices, whenever the folder /var/db/idpd is
deleted or any folder /var/db/idpd/db that is under the folder var/db/idpd is deleted,
the system must be rebooted for proper functioning of idpd. [PR/551412]
IPv6
• Proxy-ndp does not work in IPv6. Hence, the following issues exist:
• publish MAC for specific IPv6 addresses will not work under Interfaces>set interfaces
[PR/549969]
ISSU
• In-service software upgrade (ISSU) is not supported for upgrading VPN, NAT, IPv6,
FTP ALG, TFTP ALG, or IDP functionality. If ISSU is used while the noted functionality
is enabled, SRX Series devices might be left in an invalid state. The upgrade options
are either to disable unsupported ISSU features prior to the upgrade or to use a standard
upgrade procedure with a reboot. [PR/558566, PR/530035].
J-Flow
• SRX3400, SRX3600, SRX5600, and SRX5800 devices support the 4-byte autonomous
system (AS) for BGP configuration. However, J-Flow template versions 5 and 8 do not
support 4-byte AS because these J-Flow templates have 2 bytes for the SRC/DST AS
field. [PR/416497]
J-Web
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the LEDs on the Routing
Engine and PICs are not shown as green when they are up and online on the J-Web
Chassis View. [PR/297693]
• On SRX100, SRX210, SRX240, and SRX650 devices, the LED status in the Chassis View
is not in sync with the LED status on the device. [PR/397392]
• On SRX210 Low Memory devices, in the rear view of the Chassis View image, the image
of the ExpressCard remains the same whether a 3G card is present or not. [PR/407916]
• On SRX Series devices, the CLI Terminal feature does not work in J-Web over IPv6.
[PR/409939]
• On SRX100 devices, in J-Web users can configure the scheduler without entering any
stop date. The device submits the scheduler successfully, but the submitted value is
not displayed on the screen or saved in the device. [PR/439636]
• On SRX100, SRX210, SRX240, SRX650, and all J Series devices, in J-Web, the options
Input filter and Output filter are displayed in the VLAN configuration page. These options
are not supported, and the user cannot obtain or configure any value under these filter
options. [PR/460244]
• On SRX100, SRX210, SRX240, SRX650, and all J Series devices, when you have a large
number of static routes configured, and if you have navigated to pages other than to
page 1 in the Route Information table in the J-Web interface (Monitor>Routing>Route
Information), changing the Route Table to query other routes refreshes the page but
does not return you to page 1. For example, if you run the query from page 3 and the
new query returns very few results, the Route Information table continues to display
page 3 with no results. To view the results, navigate to page 1 manually. [PR/476338]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the entry registered into
RIB is not shown in J-Web. [PR/483885]
• On SRX210 Low Memory, SRX210 High Memory, and SRX210 PoE devices, in the J-Web
interface, Configuration>Routing>Static Routing does not display the IPv4 static route
configured in rib inet.0. [PR/487597]
• On SRX100 (Low Memory and High Memory), SRX210 (Low Memory, High Memory,
and PoE), SRX240 (Low Memory and High Memory), SRX650, J2350, J4350, and J6350
devices, CoS feature commits occur without validation messages, even if you have not
made any changes. [PR/495603]
• On J2350 and SRX210 High Memory devices, you cannot use the Move down button
for moving the IPS rule in IDP policy page. You must use the Move down button in the
landing page. [PR/499499]
• On SRX Series and J Series devices, in the J-Web interface, the move/edit button does
not work for the exempt rulebase on the IDP Policy configuration page. As a workaround,
• On SRX220 devices, you cannot edit the physical properties of a LAN interface in J-Web
without entering the MAC address. As a workaround, edit the properties in the CLI.
[PR/519818]
• On SRX100, SRX210, SRX220, and SRX240 devices, in J-Web, after a session expires,
a relogin page appears in the wizard window. As a workaround, close the wizard window
when the session expires and log in again. [PR/537475]
• On SRX100, SRX210, SRX220, and SRX240 devices, wizards take more time to commit
the configuration setup and to load the page. [PR/548530]
• On SRX100, SRX210, SRX220, and SRX240 devices, in J-Web, policies configured under
group global cannot be edited or deleted in the NAT and firewall wizards. [PR/552519]
• On SRX5600 devices, when the system is in an unstable state (for example SPU
reboot), NFS might generate residual.nfs files under the /var/tmp directory, which can
occupy the disk space for a very long time. As a workaround, run the request sys storage
cleanup command to clean up when the system has low disk space. [PR/420553]
• On SRX650 devices, the kernel crashes when the link goes down during TFTP
installation of the srxsme image. [PR/425419]
• On SRX650 devices, continuous messages are displayed from syslogd when ports are
in switching mode. [PR/426815]
• On SRX240 devices, if a timeout occurs during the TFTP installation, booting the
existing kernel using the boot command might crash the kernel. As a workaround, use
the reboot command from the loader prompt. [PR/431955]
• On SRX240 devices, when you configure the system log hostname as 1 or 2, the device
goes to the shell prompt. [PR/435570]
• On SRX240 devices, the Scheduler Oinker messages are seen on the console at various
instances with various Mini-PIM combinations. These messages are seen during bootup,
while restarting fwdd, while restarting chassisd, and during configuration commits.
[PR/437553]
• On SRX5600 and SRX5800 devices, data path debug trace messages are dropped
at above 1000 packets per second (pps). [PR/446098]
• On J2350, J4350, and J6350 devices, extended bit error rate test (BERT) takes an
additional 3 hours to complete even though a BERT period of 24 hours is set.
[PR/447636]
• On SRX5600 devices, only network addresses are allowed in IPv6 NAT configuration
from Junos OS Release 10.3 onward. This is enforced in commit check. [PR/545330]
• Under certain stress conditions, SRX1400 will not be able to reach max supported NAT
sessions. [PR/568660]
• On SRX210 PoE devices managing AX411 Access Points, the device might not be able
to synchronize time with the configured NTP server. [PR/460111]
• On SRX210 devices, the fourth access point connected to the services gateway fails
to boot with the default PoE configuration. As a workaround, configure all the PoE
ports to a maximum power of 12.4 watts. Use the following command to configure the
ports:
root# set poe interface all maximum-power 12.4
[PR/465307]
• On SRX210, SRX220, SRX240, and SRX650 devices with factory default configurations,
the device is not able to manage the AX411 Access Point. This might be because of the
DHCP default gateway is not set. [PR/468090]
• On SRX210 PoE devices managing AX411 Access Points, traffic of 64 bytes at a speed
of more than 45 megabits per second (Mbps), might result in loss of keepalives and
reboot of the AX411 Access Point. [PR/471357]
• On SRX210 PoE devices, high latencies might be observed for the Internet Control
Message Protocol (ICMP) pings between two wireless clients when 32 virtual access
points (VAPs) are configured. [PR/472131]
• On SRX210 PoE devices, when AX411 Access Points managed by the SRX Series devices
reboot, the configuration might not be reflected onto the AX411 Access Points. As a
result, the AX411 Access Points retain the factory default configuration. [PR/476850]
• On SRX240 PoE devices, during failover, on the secondary node the ADSL Mini-PIM
restarts and takes about 3 to 4 minutes to come up. [PR/528949]
Security
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the egress filter-based
forwarding (FBF) feature is not supported. [PR/396849]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, you should not configure
rulebase-DDoS rules that have two different application-DDoS objects to run on one
destination service because the traffic destined to one application server can encounter
more than one rule. Essentially, for each protected application server, you have to
configure a single application-level DDoS rule. [PR/467326]
• On SRX210 High Memory devices, when the content filtering message type is set to
protocol-only, customized messages appear in the log file. [PR/403602]
• On SRX210 High Memory devices, the express antivirus feature does not send a
replacement block message for HTTP upload (POST) transactions if the current
antivirus status is engine-not-ready and the fallback setting for this state is block. An
empty file is generated on the HTTP server that contains no block message.
[PR/412632]
• On SRX240, SRX650, and J Series devices, Eudora 7 (through DUT) and Outlook
Express (directly, not through DUT) downloads infected mail (with an EICAR test file)
to the mail server because of which the mail retrieval is slow. [PR/424797]
• On SRX650 devices operating under stress conditions, the UTM subsystem file partition
might fill up faster than UTM can process and clean up existing temporary files. In that
case, the user might see error messages. As a workaround, reboot the system.
[PR/435124]
• On SRX240 High Memory devices, FTP download for large files (> 4 MB) does not
work in a two-device topology. [PR/435366]
• On SRX210, SRX240, and SRX650 devices, the Websense server stops taking new
connections after HTTP stress. All new sessions get blocked. As a workaround, reboot
the Websense server. [PR/435425]
• On SRX240 devices, if the device is under UTM stress traffic for several hours, users
might see the following error while using a UTM command:
• On SRX100 High Memory, SRX210 High Memory, SRX240 High Memory, and SRX650
devices, more than 1500 antispam requests are not supported because of system
limitation. [PR/451329]
• On SRX240 High Memory devices, during UTM web traffic stress test, some leak of AV
scanner contexts is observed in some error pages. [PR/538470]
Upgrade
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, if you are running a previous
Junos OS Release and are already using more than 70 percent of the memory on your
device, we recommended you do not upgrade to Junos OS Release 10.4. New
functionality in Junos OS release 10.4 might use more memory, meaning that you might
run out of memory with a configuration that worked on a previous release. [PR/546069]
USB Modem
• On SRX210 High Memory devices and J6350 devices, packet loss is seen during rapid
ping operations between the dialer interfaces when packet size is more than 512 Kbps.
[PR/484507]
• On SRX210 High Memory devices, the modem interface can handle bidirectional traffic
of up to 19 Kbps. During oversubscription of 20 Kbps or higher traffic, the keepalive
packets are not exchanged and the interface goes down. [PR/487258]
• On SRX210 High Memory devices, IPv6 is not supported on dialer interfaces with a USB
modem. [PR/489960]
• On SRX210 High Memory devices, HTTP traffic is very slow through the umd0 interface.
[PR/489961]
• On SRX210 High Memory devices and J6350 devices, the D10 link flaps during
long-duration traffic of 15 Kbps and also when the packet size is 256 Kbps or more.
[PR/493943]
• On SRX100, SRX210, and SRX240 devices, the packets are not sent out of the physical
interface when the VLAN ID associated with the VLAN interface is changed. As a
workaround, you need to clear the ARP. [PR/438151]
• On SRX100 Low Memory, SRX100 High Memory, SRX210 Low Memory, SRX210 High
Memory, SRX240 High Memory, and SRX650 devices, the Link Layer Discovery Protocol
(LLDP) organization-specific Type Length Value (TLV), medium attachment unit
(MAU) information always propagates as Unknown. [PR/480361]
• On SRX100 High Memory devices and SRX210 Low Memory devices, dot1x
unauthenticated ports accept Link Layer Discovery Protocol (LLDP) Protocol Data
Units (PDUs) from neighbors. [PR/485845]
• For SRX210 High Memory devices, during configuration of access and trunk ports, the
individual VLANs from the vlan-range are not listed. [PR/489872]
• On SRX100, SRX210, SRX220, SRX240, SRX650, and all J Series devices, the IRB
(VLAN) interface cannot be used as the underlying interface for Point-to-Point Protocol
over Ethernet (PPPoE). [PR/528624]
VPNs
• On SRX210 and SRX240 devices, concurrent login to the device from different
management systems (for example, laptop or desktop computers) is not supported.
The first user session is diconnected when a second user session is started from a
different management system. Also, the status for the first user system is displayed
incorrectly as Connected. [PR/434447]
• On SRX Series and J Series devices, the site-to-site policy-based VPNs in a 3 or more
zone scenario will not work if the policies match the address “any” instead of specific
addresses, and all cross-zone traffic policies point to the single site-to-site VPN tunnel.
As a workaround, configure address books in different zones to match the source and
destination, and use the address book name in the policy to match the source and
destination. [PR/441967]
• On SRX100, SRX210, SRX240, and SRX650 devices, Routing Engine level redundancy
for dynamic VPN fails because the tunnels need to renegotiate after RG0 failover.
[PR/513884]
• On SRX100, SRX210, SRX240, and SRX650 devices, the dynamic VPN server always
pushes the last configured dynamic client configuration to the client. If the VPN
configuration bound to this dynamic VPN client is not bound to a policy, IKE negotiation
fails when you try to connect to the server. [PR/514033]
• On SRX100, SRX210, SRX240, and SRX650 devices, the dynamic VPN client is not
downloaded if there is not enough space in the /jail/var directory in the dynamic VPN
server. [PR/515261]
• On SRX100, SRX210, SRX240, and SRX650 devices, the IRB (VLAN) interface cannot
be used as the underlying interface for Point-to-Point Protocol over Ethernet (PPPoE).
[PR/528624]
• On SRX3400 and SRX3600 devices, the VPN monitor status in the DEP server side
stays down for some time after RG0 and RG1 failover because there is no active state
sync up for VPN monitoring. [PR/532952]
WLAN
• On SRX210, SRX240, and SRX650 devices, J-Web online Help displays the list of all
the countries and is not based on the regulatory domain within which the access point
is deployed. [PR/469941]
• On J6350 devices, Junos OS does not support policy-based VPN with WXC Integrated
Services Modules (WXC ISM 200s). [PR/281822]
Resolved Issues in Junos OS Release 10.4 for SRX Series Services Gateways and
J Series Services Routers
The following are the issues that have been resolved since Junos OS Release 10.3 for
Juniper Networks SRX Series Services Gateways and J Series Services Routers. The
identifier following the descriptions is the tracking number in the Juniper Networks Problem
Report (PR) tracking system.
• On SRX650 devices, the SQL ALG did not function properly when data was transmitted
over the control session. [PR/524444: This issue has been resolved.]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the SIP ALG was not
supported in Junos Release 10.4 (the SIP ALG was not supported in previous versions
either and, by default, was disabled). If enabled, the configuration was accepted, but
it would not work properly. [PR/527446: This issue has been resolved.]
• On SRX5800 devices in specific scenarios, sessions with the FTP ALG applied got stuck
at a timeout value of 2 seconds, resulting in an inability to form new sessions or a
reduced session capacity. [PR/550815: This issue has been resolved.]
AppSecure
• When you downloaded the predefined application identification signature database
on SRX3400, SRX3600, SRX5600, and SRX5800 devices, the new database merged
with the existing database instead of replacing it. If duplicate entries in the order and
port-mapping signature fields existed, there might be issues in detecting applications
defined by those signatures. If a duplicate port-mapping value existed, new signature
database downloads would fail with the status output: “AI installation failed! Attack
DB update failed”. The /var/log/appidd log will showed: “port xxx is specified more
than once” (xxx will equal the port-mapping value that is duplicated).
Chassis Cluster
• On an SRX210 device in a chassis cluster, there might be a loss of about 5 packets with
20 Mbps of UDP traffic on an RG0 failover. [PR/413642: This issue has been resolved.]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices configured for Layer 2 and
chassis cluster, when there was too much DNS traffic through the device, a core file
was generated. [PR/512888: This issue has been resolved.]
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, under certain traffic loads,
traffic was affected when a backup device rebooted and rejoined the cluster.
[PR/520757: This issue has been resolved.]
• On SRX240 PoE and J Series devices, packet drops were seen on the lsq interface when
transit traffic with a frame length of 128 bytes was sent. [PR/455714: This issue has
been resolved.]
• On SRX240 High Memory devices, when UTM FAV was enabled in the policy (for SMTP
traffic only), Kaspersky AV stopped working after some time and SMTP traffic was
dropped. [PR/491795: This issue has been resolved.]
• On SRX Series and J Series devices, when there were more than 200 IGMP/MLD
source-specific multicast groups (232.0.0.0/8) configured statically on an interface,
and when an unrelated configuration was committed, some groups were removed and
added immediately, causing packet drops on those groups. [PR/509013: This issue
has been resolved.]
• On SRX Series and J Series devices, system log messages about interactive commands
to the system log server did not work. [PR/511110: This issue has been resolved.]
• On SRX Series devices, because of a memory leak, flow processing failed unexpectedly
when security policies were added, deleted, or updated, impacting the traffic.
[PR/522657: This issue has been resolved.]
• On SRX3600 devices, transit traffic to the VRRP MAC address was not policed by
simple-filter policing on the IOC. [PR/528402: This issue has been resolved.]
• On SRX3600 devices, under certain conditions TCP window information was not
updating properly, causing TCP sequence check errors. [PR/530399: This issue has
been resolved.]
• On SRX650 devices, Dot1p bits of Level 2 packet traffic across XPIMs changed.
[PR/534064: This issue has been resolved.]
• On J2320 devices, a PFE core heap memory leak caused by a MAC move led to high
flowd CPU utilization. [PR/541185: This issue has been resolved.]
• On SRX240 High Memory devices, when users committed a configuration change that
added a security policy containing a DNS address object, the device generated a core
file if the DNS address object was unresolved to an IP address. [PR/542175: This issue
has been resolved.]
• On SRX5800 devices, a core file was generated as a result of IKE IPsec passthrough.
[PR/551631: This issue has been resolved.]
Hardware
• On SRX650 devices, when the 2-Port 10-Gigabit Ethernet XPIM was operating in fiber
mode and the link speed was set to 1000 megabits (Mb), the data transmission did
not take place properly. [PR/498016: This issue has been resolved.]
Infrastructure
• On SRX650 devices, the SNMP walk to the device timed out randomly. [PR/524629:
This issue has been resolved.]
• On SRX Series devices, changing the firewall filter policer configuration resulted in the
SNMP MIBs not being updated correctly and therefore the counters not being accessible.
[PR/555719: This issue has been resolved.]
• On SRX240 devices with Integrated Convergence Services, when you call the Sip2
phone from the Sip1 phone and then press the Transfer button on the Sip2 phone and
call the e911 number, the calls are sent successfully. When you press the Complete
button on the Sip2 phone, the Sip2-e911 calls were disconnected, but the Sip1 phone
call remaind active. [PR/489227: This issue has been resolved.]
• On SRX210 devices with Integrated Convergence Services, if you had a call established
between two SIP stations and you made a call transfer from either of the SIP stations
to an analog FXS station, the call goes through but there could be no voice.
[PR/504269: This issue has been resolved.]
• On SRX240 devices with Integrated Convergence Services, when all lines were busy
in a hunt group, you might receive a busy signal and the call might not be forwarded
to a voice-mail server. [PR/516691: This issue has been resolved.]
• On SRX240 devices with voice capability and Avaya ASM set up, the DTMF tone was
not heard when the last added party in a 3-way conference call hangs up. [PR/529115:
This issue has been resolved.]
• On SRX210, SRX220, and SRX240 devices with voice capability, when a call came to
an SRX Foreign Exchange Office (FXO) and was forwarded to a PCS, the caller ID was
not preserved. [PR/535540: This issue has been resolved.]
• On SRX240 devices with voice capability, the voice prompts did not play for all E911
pre-emption calls. [PR/537554: This issue has been resolved.]
• On SRX210 and SRX240 devices with voice capability, E911 pre-emption did not happen
when the PSTN line was busy in the ringing state. [PR/538277: This issue has been
resolved.]
• On SRX5800 devices, where there were a large number of zones using the same screen,
you could see some zones not passing traffic across. [PR/526082: This issue has been
resolved.]
• On SRX240 and J4350 devices, MAC address changes for the VLAN interface were
not supported. [PR/518934: This issue has been resolved.]
• On J4350 devices, PIM RPT to PIM SPT switchover did not occur when downstream
interfaces were configured with IGMP and MLD. [PR/524950: This issue has been
resolved.]
• On SRX650 Series devices, IDP detector and/or IDP attack database update caused
chassis cluster instability and the secondary node could go to disabled state.
[PR/523494: This issue has been resolved.]
J-Web
• On SRX Series devices, the J-Web application screen listing was not sorted correctly
for the port column. [PR/521962: This issue has been resolved.]
• On SRX100, SRX210, SRX220, SRX240, and SRX650 devices, configuring NAT traversal
(NAT-T) for IKE Gateway in J-Web did not reflect properly. [PR/527151: This issue has
been resolved.]
• On SRX100, SRX210, SRX220, and SRX240 devices, the J-Web setup wizard did not
work in IE. [PR/536027: This issue has been resolved.]
• On SRX210 High Memory devices, J-Web did not work with IE8 (Japanese version) as
the behavior of J-Web was undefined when launched from any browsers based on
languages other than English. [PR/544801: This issue has been resolved.]
• On SRX100, SRX210, SRX240, and SRX650 devices, J-Web login and page navigation
were slow. [PR/546502: This issue has been resolved.]
• On SRX5800 NAT enabled devices, show security nat source pool command output
displayed negative value in translation hits counter. [PR/509329: This issue has been
resolved.]
• On SRX3400 and SRX3600 devices, if you changed the configuration from source
pool NAT to static NAT when there were entries in the incoming table, those entries
would contain unrecognized characters. [PR/517500: This issue has been resolved.]
• in source NAT mode, RTSP control session was not closed in time (route mode under
Ixload rtsp testing) and IP mistranslated in RTSP header. [PR/521555: This issue has
been resolved.]
• On SRX3400 and SRX3600 devices, if a SIP proxy with a nonstandard SIP source port
(5060) was located outside the firewall, the inbound call might experience a delay of
several seconds in all source NAT modes. [PR/526808: This issue has been resolved.]
• On SRX650 devices, source-address option for J-Flow did not stay persistent.
[PR/530620: This issue has been resolved.]
Screens
• On SRX3400, SRX3600, SRX5600, and SRX5800 devices, screen names with 24
characters were not functioning properly. [PR/520299: This issue has been resolved.]
SNMP
• On SRX650 devices, the SNMP MIB walk to the jnxFru table displayed only one fan.
[PR/533112: This issue has been resolved.]
VPNs
• On SRX240 High Memory devices, IPsec VPNs went down if the /var/log/ partition
was 100 percent full and trace options were enabled. [PR/513567: This issue has been
resolved.]
• On SRX650 devices, KMD did not respond to management requests, which prevented
the administrator from determining SA status. [PR/519274: This issue has been
resolved.]
• On SRX210 High Memory devices, when using an IKE preshared key of more than 41
ASCII characters for dynamic VPN, the IKE phase 1 connection failed to establish.
[PR/523231: This issue has been resolved.]
• On SRX3600 devices in a route-based VPN, VPN traffic failed to pass when the remote
peer IP address changed. [PR/529018: This issue has been resolved.]
• On SRX100, SRX210, SRX240, SRX650, and all J Series devices, a Layer 2 VPN did not
come up between provider edge (PE) devices if the devices had different endianess.
For example, if PE1 was little endian and PE2 was big endian, the Layer 2 VPN would
return an error of MM (MTU mismatch). [PR/547769: This issue has been resolved.]
Related • New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Documentation Services Routers on page 79
• Known Limitations in Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers on page 133
• Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 166
Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers
SRX5600 and SRX5800 Services Gateways MIB Reference incorrectly state the
downloadable version of the Real-Time Media (RTM) and SIP Common MIBs.
• RTM MIB—http://www.juniper.net/techpubs/en_US/junos10.4/topics/
reference/mibs/mib-jnx-rtm.txt
• The Junos OS CLI Reference incorrectly shows the show security idp status and clear
security idp status logs. The logs should be as follows:
• The Junos OS CLI Reference states that the maximum timeout range for IDP policy is
0 through 65,535 seconds, whereas the ip-action timeout range has been modified to
0 through 64,800 seconds.
• The Junos OS CLI Reference has missing information about the new CLI option
download-timeout, which has been introduced to set security idp security-package
automatic download-timeout value to configure the download timeout in minutes. The
default value for download-timeout is one minute. If download is completed before
the download times out, the signature is automatically updated after the download.
If the download takes longer than the configured period, the automatic signature
update is aborted.
J-Web
• J-Web security package update Help page—The J-Web Security Package Update
Help page does not contain information about download status.
• There is no documentation describing the J-Web pages for media gateways. To find
these pages in J-Web, go to Monitor>Media Gateway.
• The Junos OS Security Configuration Guide does not state that custom attacks and
custom attack groups in IDP policies can now be configured and installed even when
a valid license and signature database are not installed on the device.
• The “Verifying the Policy Compilation and Load Status” section of the Junos OS Security
Configuration Guide has a missing empty/new line before the IDPD Trace file heading,
in the second sample output.
• The Junos OS Security Configuration Guide states that the following aggressive aging
statements are supported on all SRX Series devices when in fact they are not supported
on SRX3400, SRX3600, SRX5600, and SRX5800 devices:
• The Junos OS Security Configuration Guide states that the maximum acceptable timeout
range for an IDP policy is 0 through 65,535 seconds, whereas the ipaction timeout
range has been modified to 0 through 64,800 seconds.
• The Junos OS Security Configuration Guide is missing information about the new CLI
option download-timeout, which has been introduced to set security idp security-package
automatic download-timeout < value > to configure the download timeout in minutes.
The default value for download-timeout is one minute. If download is completed before
the download times out, the signature is automatically updated after the download.
If the download takes longer than the configured period, the auto signature update is
aborted.
• The Junos OS Security Configuration Guide states the following limitations in the
“Limitations of IDP” section:
On SRX Series and J Series devices, IP actions do not work when you select a timeout
value greater than 65,535 in the IDP policy.
• The Junos OS Security Configuration Guide incorrectly states the following limitations
in the “Limtations of IDP” section:
On SRX210, SRX240, and SRX650 devices, the maximum number of IDP sessions
supported is 16,000.
The maximum number of IDP sessions supported is 1600 on SRX210 devices, 32,000
on SRX240 devices, and 128,000 on SRX650 devices.
• When specifying a forwarding target after authentication on a captive portal, use the
?target= option followed by either the %dest-url% variable or a specific URL. The
%dest-url% variable forwards authenticated users to the protected resource they
originally specified. A URL forwards authenticated users to a specific site.
Note that when entering a URL with the ?target= option, you must substitute escape
characters for any special characters in the URL. Use the following escape characters
for these common special characters:
In the section “Example: Configuring a Redirect URL for Captive Portal (CLI)” in the
Junos OS Security Configuration Guide, the procedure description states that, after
authentication, users will be forwarded to the specified URL. Step 2 of the configuration
procedure, however, is incorrect. This command would forward users to
my-website.com before authentication, not after.
• The ?target= option and URL to distinguish a forwarding address to be used after
authentication
• Escape characters substituted for any special characters in the URL name
All DRAM modules installed in the router must be the same size (in megabytes), type,
and manufacturer. The router might not work properly when DRAM modules of different
sizes, types, or manufacturer are installed.
SRX Series Services Gateways for the Branch Physical Interface Modules Hardware
Guide
• In the “SRX Series Services Gateway Interfaces Power and Heat requirements” section,
the PIM Power Consumption Values table contains the power consumption value for
the 1-port Gigabit Ethernet Small Form-Factor Pluggable (SFP) Mini-PIM value as: 3:18
W
The correct power consumption value for the 1-port Gigabit Ethernet Small Form-Factor
Pluggable (SFP) Mini-PIM is 4:4 W
• The SRX1400 Services Gateway Hardware Guide includes information about the
following DC-powered SRX1400 Services Gateways:
• SRX1400BASE-XGE-DC
• SRX1400BASE-GE-DC
These models are not available in Junos OS Release 10.4. Contact your Juniper Networks
customer service representative for information on these models.
• Fan tray LED table in the “Replacing the Fan Tray on the SRX1400 Services Gateway”
section of the SRX1400 Services Gateway Hardware Guide erroneously documents
that:
The Amber (On Steadily): Fan tray LED cannot detect fan failure.
The correct information for this section is as follows: Amber LED (on steadily): Fan
tray LED does not indicate fan failure .
• Some of the graphics in the SRX1400 Services Gateway Hardware Guide show the
grounding lug attached to the front panel of the device. However, the SRX1400 Services
Gateway is not shipped with grounding lug attached to it.
• In the SRX1400 Services Gateway Hardware Guide, the following topics erroneously
document "RE ETHERNET" port as "ETHERNET" port.
• The SRX1400 Services Gateway Hardware Guide and the SRX1400 Services Gateway
Getting Started Guide are missing the following note:
NOTE: AC and DC power supply units are not interoperable between the
SRX1400 Services Gateway and the SRX3000 and SRX5000 lines.
• SRX1400BASE-GE-DC
• SRX1400BASE-XGE-DC
These models are not available in Junos OS Release 10.4. Contact your Juniper Networks
customer service representative for information on these models.
• In the SRX1400 Services Gateway Getting Started Guide, some of the graphics are shown
with grounding lug attached on the front panel of the device. However, the SRX1400
Services Gateway is not shipped with grounding lug attached to it.
• Some of the graphics in the SRX1400 Services Gateway Getting Started Guide show
graphics with the grounding lug attached to the device front panel. The grounding lug
is not attached to the device at the time of shipment.
• The SRX1400 Services Gateway Getting Started Guide should document the following
statement:
You can replace the Network and Services Processing Card (NSPC) with the SRX3000
line Services Gateway Network Processing Card (NPC) and Services Processing Card
(SPC). To install the NPC and SPC on the SRX1400 Services Gateway, you must order
the Twin CFM holder tray (SRX1K3K-2CFM-TRAY) to hold two single-wide CFMs (NPC
and SPC) separately. Contact your Juniper Networks customer service representative
for more information.
• In the SRX1400 Services Gateway Getting Started Guide, the following sections
erroneously documents "RE ETHERNET" port as "ETHERNET" port.
• Step 5: Connect the External Devices and IOC Cables to the SRX1400 Services
Gateway
• Step 7: Perform the Initial Software Configuration on the SRX1400 Services Gateway
These models are not available in Junos OS Release 10.4. Contact your Juniper Networks
customer service representative for information on these models.
• The SRX210 Services Gateway Quick Start and the SRX240 Services Gateway Quick
Start are missing the following warning in the “Powering Off the Device” section:
WARNING: Use the graceful shutdown method to halt, power off, or reboot
the services gateway. Use the forced shutdown method as a last resort to
recover the services gateway if the services gateway operating system is
not responding to the graceful shutdown method.
• In the SRX210 Services Gateway 3G ExpressCard Quick Start, several tasks are listed in
the wrong order. “Task 6: Connect the External Antenna” should appear before “Task
3: Check the 3G ExpressCard Status,” because the user needs to connect the antenna
before checking the status of the 3G ExpressCard. The correct order of the tasks is as
follows:
• In the SRX210 Services Gateway 3G ExpressCard Quick Start, in “Task 6: Connect the
External Antenna,” the following sentence is incorrect and redundant:
"The antenna has a magnetic mount, so it must be placed far away from radio frequency
noise sources including network components."
• In the SRX210 Services Gateway 3G ExpressCard Quick Start, in the “Frequently Asked
Questions” section, the answer to the following question contains an inaccurate and
redundant statement:
A: The required antenna is packaged with the ExpressCard in the SRX210 Services
Gateway 3G ExpressCard kit at no additional charge. The antenna will have a magnetic
mount with ceiling and wall mount kits within the package.
In the answer, the sentence "The antenna will have a magnetic mount with ceiling and
wall mount kits within the package" is incorrect and redundant.
Related • New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Documentation Services Routers on page 79
• Known Limitations in Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers on page 133
• Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers on page 143
Hardware Requirements for Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers
• Transceiver Compatibility for SRX Series and J Series Devices on page 174
• Power and Heat Dissipation Requirements for J Series PIMs on page 174
• Supported Third-Party Hardware on page 174
• J Series CompactFlash and Memory Requirements on page 175
Please contact Juniper Networks for the correct transceiver part number for your device.
On J Series Services Routers, the system monitors the PIMs and verifies that the PIMs
fall within the power and heat dissipation capacity of the chassis. If power management
is enabled and the capacity is exceeded, the system prevents one or more of the PIMs
from becoming active.
You can also use CLI commands to choose which PIMs are disabled. For details about
calculating the power and heat dissipation capacity of each PIM and troubleshooting
procedures, see the J Series Services Routers Hardware Guide.
The following third-party hardware is supported for use with J Series Services Routers
running Junos OS.
USB Modem We recommend using a U.S. Robotics USB 56K V.92 Modem, model number USR 5637.
Storage Devices The USB slots on J Series Services Routers accept a USB storage device or USB storage
device adapter with a CompactFlash card installed, as defined in the CompactFlash
Specification published by the CompactFlash Association. When the USB device is
installed and configured, it automatically acts as a secondary boot device if the primary
CompactFlash card fails on startup. Depending on the size of the USB storage device,
you can also configure it to receive any core files generated during a router failure. The
USB device must have a storage capacity of at least 256 MB.
Table 11 on page 175 lists the USB and CompactFlash card devices supported for use with
the J Series Services Routers.
Table 12 on page 175 lists the CompactFlash card and DRAM requirements for J Series
Services Routers.
J6350 512 MB 1 GB 2 GB
Related • New Features in Junos OS Release 10.4 for SRX Series Services Gateways and J Series
Documentation Services Routers on page 79
• Known Limitations in Junos OS Release 10.4 for SRX Series Services Gateways and J
Series Services Routers on page 133
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for SRX Series
Services Gateways and J Series Services Routers on page 109
• Issues in Junos OS Release 10.4 for SRX Series Services Gateways and J Series Services
Routers on page 143
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 177
• Errata and Changes in Documentation for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers on page 166
• RTSP, FTP, and TFTP ALG session capacity: 25,000 sessions per flow SPU
NOTE: Flow session capacity will be reduced to half per flow SPU and the
above capacity numbers will not change on the central point SPU.
security {
forwarding-process {
application-services {
maximize-alg-sessions;
}
}
}
You must reboot the device (and its peer in the chassis cluster) for the configuration to
take effect.
Upgrade and Downgrade Instructions for Junos OS Release 10.4 for SRX Series Services
Gateways and J Series Services Routers
In order to upgrade to Junos OS Release 10.4 or later, your device must be running one
of the following Junos OS Releases:
• 9.1S1
• 9.2R4
• 9.3R3
• 9.4R3
• 9.5R1 or later
If your device is running an earlier release, upgrade to one of these releases and then to
the 10.4 release. For example, to upgrade from Release 9.2R1, first upgrade to Release
9.2R4 and then to Release 10.4.
For additional upgrade and download information, see the Junos OS Administration Guide
for Security Devices and the Junos OS Migration Guide.
An expanded upgrade and downgrade path is now available for the Junos OS Extended
End-of-Life (EEOL) releases. You can upgrade directly from one EEOL release to one of
two adjacent later EEOL releases. You can also downgrade directly from one EEOL release
to one of two adjacent earlier EEOL releases.
For example, Junos OS Releases 9.3, 10.0, and 10.4 are all EEOL releases. You can upgrade
from Junos OS Release 8.5 directly to either 9.3 or 10.0. To upgrade from Release 8.5 to
10.4, you first need to upgrade to Junos OS Release 9.3 or 10.0, and then upgrade a second
time to 10.4. Similarly, you can downgrade directly from Junos OS Release 10.4 to either
10.0 or 9.3. To downgrade from Release 10.4 to 8.5, you first need to downgrade to 10.0
or 9.3, and then perform a second downgrade to Release 8.5.
For upgrades and downgrades to or from a non-EEOL release, the current policy is that
you can upgrade and downgrade by no more than three releases at a time. This policy
remains unchanged.
For more information on EEOL releases and to review a list of EEOL releases, see
http://www.juniper.net/support/eol/junos.html.
• New Features in Junos OS Release 10.4 for EX Series Switches on page 178
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series
Switches on page 180
• Limitations in Junos OS Release 10.4 for EX Series Switches on page 181
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series
Switches on page 191
Not all EX Series software features are supported on all EX Series switches in the current
release. For a list of all EX Series software features and their platform support, see EX
Series Switch Software Features Overview.
Hardware
• XRE200 External Routing Engine—The XRE200 External Routing Engine is used to
create a Virtual Chassis composed of Juniper Networks EX8200 Ethernet Switches. A
Virtual Chassis is multiple switches connected together that operate as a single network
entity. The advantages of connecting multiple EX8200 switches into a Virtual Chassis
include better-managed bandwidth at a network layer, simplified configuration and
maintenance because multiple devices can be managed as a single device, and a
simplified Layer 2 network topology that minimizes or eliminates the need for
loop-prevention protocols such as Spanning Tree Protocol (STP).
• New optical transceiver support—The SFP+ uplink module in EX4500 switches now
supports one new optical transceiver: EX-SFP-10GE-LRM (10GBase-LRM, 220 m).
High Availability
• Nonstop active routing (NSR)—Nonstop active routing (NSR) is now supported on
EX8200 switches that have multiple Routing Engines installed. You can configure
nonstop active routing to enable the transparent switchover of the Routing Engines
without restart of supported routing protocols. In this Junos OS release, NSR supports
only the OSPFv2 protocol. Other protocols might also work but are not supported.
Infrastructure
• IPv6 support on EX4500 switches—EX4500 switches support IPv6 addresses for
in-band management on the management interface and on network interfaces.
Packet Filters
• Firewall filters on a management interface—You can now configure a firewall filter on
a management interface on an EX Series switch to filter ingress or egress traffic on the
interface.
• Support for VLAN and router (Layer 3) firewall filters on EX4500 switches—On EX4500
switches, VLAN and router (Layer 3) firewall filters are supported for IPv4 traffic.
Virtual Chassis
• EX8200 Virtual Chassis—EX8200 switches can now be connected to form a Virtual
Chassis. The EX8200 Virtual Chassis is formed by connecting EX8200 switches to an
XRE200 External Routing Engine. An EX8200 Virtual Chassis is multiple EX8200
switches connected together that operate as a single network entity. The advantages
of connecting multiple EX8200 switches into a Virtual Chassis include better-managed
bandwidth at a network layer, simplified configuration and maintenance because
multiple devices can be managed as a single device, and a simplified Layer 2 network
topology that minimizes or eliminates the need for loop-prevention protocols such as
Spanning Tree Protocol (STP).
Related • Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
Documentation on page 180
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 191
Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
The following changes in system behavior, configuration statement usage, or operational
mode command usage have occurred since the previous release and might not yet be
documented in the JUNOS OS for EX Series switches documentation:
Layer 2 protocol tunneling (L2PT) on EX Series switches now supports the Unidirectional
Link Detection (UDLD) protocol.
Class of Service
Beginning in Junos OS Release 10.2, you can configure multiple class-of-service (CoS)
rewrite rules for DSCP, IP precedence, and IEEE 802.1p. Rewrite rules are not assigned
to interfaces by default, and for rewrites to occur, you must assign a user-defined rewrite
rule or system-defined rewrite rule to an interface. For releases earlier than Junos OS
Release 10.2, EX8200 switches supported a single global rewrite rule assigned to all
Layer 2 interfaces and routed VLAN interfaces (RVIs).
When you upgrade from Junos OS releases earlier than Release 10.2 to Junos OS Release
10.2 or later, you must configure custom rewrite rules and assign them to an interface or
assign the system-defined rewrite rules to an interface for rewrites to occur.
Related • New Features in Junos OS Release 10.4 for EX Series Switches on page 178
Documentation
• Limitations in Junos OS Release 10.4 for EX Series Switches on page 181
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 191
• When an external RADIUS server goes offline and comes back online after some time,
subsequent captive portal authentication requests might fail until the authd daemon
is restarted. As a workaround, configure the revert interval—the time after which to
revert to the primary server—and restart the authd daemon.
Class of Service
• On EX8200 switches, classification of packets using ingress firewall filter rules with
forwarding-class and loss-priority configurations does not rewrite the DSCP or 802.1p
bits. Rewriting of packets is determined by the forwarding-class and loss-priority values
set in the DSCP classifier applied on the interface.
• On EX4200 switches, the traffic is shaped at rates above 500 Kbps, even when the
shaping rate configured is less than 500 Kbps.
Firewall Filters
• On EX3200 and EX4200 switches, when interface ranges or VLAN ranges are used in
configuring firewall filters, egress firewall filter rules take more than five minutes to
install.
• On EX3200 and EX4200 switches, IGMP packets are not matched by user-configured
firewall filters.
Hardware
• On 40-port SFP+ line cards for EX8200 switches, the LEDs on the left of the network
ports blink to indicate that there is link activity. If you set the speed of the network ports
to 10/100/1000 Mbps, the LEDs do not blink. However, if you set the speed to 10 Gbps,
the LEDs blink.
• If you press the reset button on the Switch Fabric and Routing Engine (SRE) module
in an EX8208 switch without taking the module offline first (by using the CLI), the
fabric planes in the module might not come back online.
• On 40-port SFP+ line cards installed in EX8200 switches, it takes about 10 seconds
for the network ports to come up after you reboot the switch or restart the line card.
High Availability
• On EX8216 switches on which nonstop active routing (NSR) is configured, after a
graceful Routing Engine switchover (GRES), the routing protocol process (rpd) might
be delayed while state replication finishes. The length of delay depends on the scale
of the setup. During this delay, operational mode commands for the rpd process do
not provide current information.
Infrastructure
• If you configure interface parameters on an EX3200 or EX4200 switch running Junos
OS Release 9.2 or Release 9.3 for EX Series switches and then attempt to upgrade to
a later release or a later version of Release 9.3 than the one that is currently installed,
the switch might display the following error message: “init: interface-control is thrashing
, not restarted”. As a workaround, on the interfaces you had previously configured,
configure no-auto-negotiation and set the link mode to full-duplex, then commit the
revised configuration.
• On EX Series switches, an SNMP query fails when the SNMP index size of a table is
greater than 128 bytes, because the Net SNMP tool does not support SNMP index sizes
greater than 128 bytes.
• On EX Series switches, the show snmp mib walk etherMIB command does not display
any output, even though the etherMIB is supported. This occurs because the values
are not populated at the module level—they are populated at the table level only. You
can issue show snmp mib walk dot3StatsTable, show snmp mib walk dot3PauseTable,
and show snmp mib walk dot3ControlTable commands to display the output at the
table level.
• When you issue the request system power-off command, the switch halts instead of
turning off power.
• In the J-Web interface, the Ethernet Switching monitoring page might not display
monitoring details if there are more than 13,000 MAC entries on the switch.
• In the J-Web interface, changing the port role from Desktop, Desktop and Phone, or
Layer 2 Uplink to another port role might not remove the configurations for enabling
dynamic ARP inspection and DHCP snooping.
• If you install a large configuration (more than 5 MB)—for example, if you install more
than four 40-port SFP+ line cards—in an EX8200 switch, the error message
“Configuration on the Switch is too large for JWeb to handle. Please use the CLI to
manipulate the configuration" is displayed in the Support Information page (Maintain
> Customer Support > Support Information) in the J-Web interface.
• Momentary loss of an inter-Routing Engine IPC message might trigger the alarm that
displays the message “Loss of communication with Backup RE”. There is no functionality
affected.
Interfaces
• EX Series switches do not support queued packet counters. Therefore, the queued
packet counter in the output of the show interfaces interface-name extensive command
always displays a count of 0 and is never updated.
• On EX3200 and EX4200 switches, when port mirroring is configured on any interface,
the mirrored packets leaving a tagged interface might contain an incorrect VLAN ID.
• On EX8200 switches, when an egress VLAN that belongs to a routed VLAN interface
(RVI) is configured as the input for a port mirroring analyzer, the analyzer incorrectly
appends a dot1q (802.1Q) header to the mirrored packets or does not mirror any packets
at all. As a workaround, configure a port mirroring analyzer with each port of the VLAN
as egress input.
• The following interface counters are not supported on routed VLAN interfaces (RVIs):
local statistics, traffic statistics, and transit statistics.
• EX Series switches do not support IPv6 interface statistics. Therefore, all values in the
output of the show snmp mib walk ipv6IfStatsTable command always display a count
of 0.
• On EX Series switches, when a firewall filter is applied on the loopback (lo0) interface,
the switch stops generating local ARP requests for transit traffic.
• The show interfaces interface-name detail | extensive command might display double
counting of packets or bytes for the transit statistics and traffic statistics counters.
You can use the counter information displayed under the Physical interface section of
the output.
Related • New Features in Junos OS Release 10.4 for EX Series Switches on page 178
Documentation
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
on page 180
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 191
NOTE: Other software issues that are common to both EX Series switches
and M, MX, and T Series routers are listed in “Issues in Junos OS Release 10.4
for M Series, MX Series, and T Series Routers” on page 48.
• If the RADIUS server fails to authenticate a routed VLAN interface (RVI) configured
with 802.1X authentication in single supplicant mode and server fail fallback, the
interface is not authenticated with server fail fallback. [PR/566537]
• When the primary redundant trunk group (RTG) interface is disabled, causing an RTG
switchover, MAC entries on the upstream switches are refreshed. However, when the
primary RTG link is enabled, the MAC entries are not refreshed on the upstream switches.
[PR/555158]
• If you enable all VRRP sessions simultaneously on a switch with a large number (on
the order of 200 or more) of VRRP configurations, RSTP convergence might not occur.
As a workaround, do not enable all VRRP sessions simultaneously if the switch’s VRRP
configuration is large. [PR/556114]
• When a switch is running Virtual Routing Redundancy Protocol (VRRP) and you enable
or disable a large number (on the order of 50 or more) of routed VLAN interfaces (RVIs),
in some cases, the STP topology might change for a short period of time during the
commit process. [PR/564689]
Ethernet Switching
• If you perform graceful Routing Engine switchover (GRES) on an EX4200 or EX8200
switch, the Ethernet switching table might not refresh because the Packet Forwarding
Engine retains the forwarding database (FDB) entries. The result is that traffic is flooded
to the affected MAC addresses. As a workaround, refresh the Ethernet switching table
by issuing the clear ethernet-switching table command.[PR/541311]
Firewall Filters
• On EX4200 switches, if you configure a firewall filter with the match condition
tcp-established, the error message "not supported" is displayed. There is no known
workaround. [PR/543316]
• When you enable the filter-id attribute on the RADIUS server for a particular client, one
of the required 802.1X authentication rules is not inserted in the IPv6 database. IPv6
traffic on the authenticated interface is not filtered; only IPv4 traffic is filtered on that
interface. [PR/560381]
• On EX8200 switches and the XRE200 External Routing Engine, if you apply different
firewall filters to different VLANs, only the filter applied to the first VLAN is applied
correctly. For example, if you issue commands to apply filter f1 to VLAN1, filter f2 to
VLAN2, and filter f3 to VLAN3, filter f1 applies correctly, but filters f2 and f3 are not
applied to any VLANs. As a workaround, merge all the VLAN filters into one single filter
and apply that filter to all the VLANs. You can use the vlan match condition in the
firewall filter terms to differentiate the rules for each of the VLANs. [PR/568721]
Infrastructure
• On EX8200 switches, when IGMP snooping is enabled on an interface, the IPv6
multicast Layer 2 control frame is not forwarded to other interfaces in the same VLAN.
The result is that IPv6 and VRRP for IPv6 neighbor solicitation fails. [PR/456700]
• On EX3200 and EX4200 switches that are configured with the factory default
configuration, if you use the command set date to change the date, the switches accept
the date but display the following error message: “date: connect: Can't assign requested
address”. [PR/499641]
• On EX8200 switches, a temporary traffic loop occurs in the network after a graceful
Routing Engine switchover (GRES) or after a restart of the Ethernet switching process
(eswd). [PR/516611]
• On EX8200 switches, the LACP process (lacpd) might start and stop repeatedly when
traffic to the Routing Engine is heavy. There is no known workaround. [PR/542897]
• On EX8208 switches, when a line card that has no interface configurations and is not
connected to any device is taken offline using the command request chassis fpc-slot
slot-number offline, the Bidirectional Forwarding Detection process (bfd) starts and
stops repeatedly. The same bfd process behavior occurs on a line card that is connected
to a Layer 3 domain when another line card that is on the same switch and is connected
to a Layer 2 domain is taken offline. [PR/548225]
• On EX4500 switches running IPv6, when you quickly send a large number of pings to
the switch, packet loss might occur because of low values configured for rate limiting.
[PR/568160]
Interfaces
• When MVRP is configured on a trunk interface, you cannot configure connectivity fault
management (CFM) on that interface. [PR/540218]
• On EX Series switches, if you clear LAG interface statistics while the LAG is down, then
bring up the LAG and pass traffic without checking for statistics, and finally bring the
LAG interface down and check interface statistics again, the statistics might be
inaccurate. As a workaround, use the show interfaces interface-name command to
check LAG interface statistics before bringing down the interface. [PR/542018]
• On EX4500 switches, when you are configuring Gigabit Ethernet interfaces from the
command-line interface (CLI), automatic command completion does not work.
[PR/561565]
• When you are editing an interface-range configuration in the private mode, if you change
the end of the range of the member-range statement, the configuration might fail. As
a workaround, edit the end of the range of the member-range statement in the
configuration mode. [PR/565620]
J-Web Interface
• In the J-Web interface, you cannot commit some configuration changes in the Port
Configuration page and the VLAN Configuration page because of the following
limitations for port mirroring ports and port mirroring VLANs:
• A port configured as the output port for an analyzer cannot be a member of any
VLAN other than the default VLAN.
• A VLAN configured to receive analyzer output can be associated with only one port.
[PR/400814]
• When you use the Microsoft Internet Explorer browser to open a report from the
following pages in the J-Web interface, the report opens in the same browser session:
• Support Information page (Maintain > Customer Support > Support Information)
• View Events page (Monitor > Events and Alarms > View Events)
[PR/433883]
• In the J-Web interface, in the Port Security Configuration page, you are required to
configure action when you configure MAC limit even though configuring an action value
is not mandatory in the CLI. [PR/434836]
• In the J-Web interface, in the OSPF Global Settings table in the OSPF Configuration
page, the Global Information table in the BGP Configuration page, or the Add Interface
window in the LACP Configuration page, if you try to change the position of columns
using the drag-and-drop method, only the column header moves to the new position
instead of the entire column. [PR/465030]
• If a large number of static routes are configured and if you have navigated to pages
other than page 1 in the Route Information table in the J-Web interface (Monitor >
Routing > Route Information), changing the Route Table to query other routes refreshes
the page but does not return to page 1. For example, if you run a query from page 3 and
the new query returns very few results, the Results table continues to display page 3
and shows no results. To view the results, navigate to page 1 manually. [PR/476338]
• In the J-Web interface, the dashboard does not display the uplink ports or uplink module
ports unless transceivers are plugged into the ports. [PR/477549]
• The J-Web interface Static Routing page might not display details on entries registered
in the routing table. [PR/483885]
• If you try to commit a candidate configuration in the CLI using the Point and Click CLI
in the J-Web interface, an error is displayed on the configuration page. [PR/514771]
• In the J-Web interface, the Software Upload and Install Package option might not display
a warning message when there are pending changes to be committed. [PR/514853]
• On EX4500 switches, the J-Web interface might display the following as valid options
although these options are not supported on EX4500 switches:
• DHCP snooping in the Edit Port Role window in the Ports Configuration page
[PR/525671]
• When you use an https connection in the Microsoft Internet Explorer browser to save
a report from the following pages in the J-Web interface, the error message “Internet
Explorer was not able to open the Internet site” is displayed:
• Support Information page (Maintain > Customer Support > Support Information)
• View Events page (Monitor > Events and Alarms > View Events)
[PR/542887]
• On EX4500 switches and on EX4200-24F switches, the total number of ports displayed
in the dashboard (Dashboard > Capacity Utilization > Total number of ports) in the
J-Web interface increases with the automatic refresh every two seconds. [PR/543913]
• When you use an https connection, opening the Dashboard page (Log In > Dashboard)
in the J-Web interface takes a long time. [PR/549934]
• If you insert Gigibit Ethernet transceivers in 40-port SFP+ line cards installed in EX8200
switches, the transceivers are incorrectly shown as copper transceivers in the image
of the switch in the Dashboard page in the J-Web interface. [PR/561695]
• Navigate to the Port Monitoring page (Monitor > Interfaces) in the J-Web interface,
a pop-up window with the error message “'gridData.0' is null or not an object” is
displayed.
• Select the displayed interface and click on the Show Graph button, a pop-up window
with the error message “'selected FpcName' is undefined” is displayed.
[PR/562454]
• If you navigate to a new page before all the components of a page in the J-Web interface
are loaded, a pop-up window with the error message “Object Expected” is displayed.
[PR/567756]
Related • New Features in Junos OS Release 10.4 for EX Series Switches on page 178
Documentation
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
on page 180
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 191
NOTE: Other software issues that are common to both EX Series switches
and M, MX, and T Series routers are listed in “Issues in Junos OS Release 10.4
for M Series, MX Series, and T Series Routers” on page 48.
Firewall Filters
• On EX4500 switches, if you activate or deactivate a firewall filter configuration, VSTP
convergence might not occur properly. As a workaround, restart the Ethernet switching
process (eswd). [PR/548446: This issue has been resolved.]
Infrastructure
• On EX Series switches, MAC addresses not present in the forwarding database (FDB)
because of hash collision are not removed from the Ethernet switching process (eswd).
These MAC addresses do not age out of the Ethernet switching table even if traffic is
stopped completely and are never relearned when traffic is sent to these MAC
addresses, even when there is no hash collision. As a workaround, clear those MAC
addresses from the Ethernet switching table. [PR/451431: This issue has been resolved.]
• On EX8200 switches, packets with unregistered Layer 2 multicast MAC addresses are
not dropped on interfaces in the STP blocked state, resulting in some traffic loops that
might impact network performance. [PR/541123: This issue has been resolved.]
• On EX2200, EX3200, EX4200, and EX4500 switches, if you configure a large number
of VLANS and aggregated Ethernet interfaces and commit the configuration, the
forwarding process (pfem) utilization stays at 80 percent for more than 60 minutes.
As a result, the aggregated Ethernet interfaces cannot be used until the pfem usage
reduces to normal limits. [PR/544433: This issue has been resolved.]
• When the configured DNS server is not reachable, name resolution for localhost takes
a long time and the output of the show ntp association command takes a long time to
appear. [PR/551739: This issue has been resolved.]
Interfaces
• In an EX4200 Virtual Chassis, on consecutive reboots of the master switch, the peer
device connected to the EX4200 switch over Link Aggregation Control Protocol (LACP)
might not recognize the LACP messages sent by the EX4200 switch and the links
therefore become standalone links. [PR/505069: This issue has been resolved.]
• On a 40-port SFP+ line card in an EX8200 switch, if you assign different shaping rates
to different ports in a port group, you do not receive an error message when you commit
the configuration, and no error is logged in the system log. As a workaround, configure
the same shaping rate on all ports in a port group. [PR/524073: This issue has been
resolved.]
J-Web Interface
• In the J-Web interface, the automatic command-completion feature might not be
disabled in the password field. As a workaround, you can disable the automatic
command-completion feature in the browser. [PR/508425: This issue has been
resolved.]
• In the J-Web interface, when you select the Ethernet Switching Monitor page (Monitor
> Switching > Ethernet Switching), the MAC learning log might not display information.
[PR/535200: This issue has been resolved.]
• In the LACP (Link Aggregation Control Protocol) Configuration page in the J-Web
interface (Configure > Interfaces > Link Aggregation), the Delete button is disabled
even when you select an aggregated Ethernet interface configured with a physical
interface, VLAN, and IP option. As a workaround, delete the physical interface, VLAN,
and IP option from the aggregated Ethernet interface using the CLI. [PR/546411]
• In the J-Web interface, when you use an https connection in the Microsoft Internet
Explorer browser, you cannot upload (Maintain > Config Management > Upload) or
download (Maintain > Config Management > History > Configuration History) a
configuration file. As a workaround, use an http connection. [PR/5512000: This issue
has been resolved.]
Related • New Features in Junos OS Release 10.4 for EX Series Switches on page 178
Documentation
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
on page 180
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 191
J-Web Interface
• To access the J-Web interface, your management device requires the following
software:
Related • New Features in Junos OS Release 10.4 for EX Series Switches on page 178
Documentation
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
on page 180
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 191
Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
The following pages list the issues in Junos OS Release 10.4R1 for EX Series switches
regarding software upgrade or downgrade:
Upgrading Software
You can use this procedure to upgrade Junos OS on an EX Series switch with a single
Routing Engine, including an individual member of an EX4200 Virtual Chassis or all
members of an EX4200 Virtual Chassis or an EX8200 switch using a single Routing
Engine. To upgrade software on an EX8200 switch running two Routing Engines, see
Installing Software on an EX8200 Switch with Redundant Routing Engines (CLI Procedure)
or Upgrading Software Using Nonstop Software Upgrade (CLI Procedure).
3. (Optional) Copy the software package to the switch. We recommend that you use
FTP to copy the file to the /var/tmp directory.
This step is optional because Junos OS can also be upgraded when the software
image is stored at a remote location.
• ftp://hostname/pathname/package.tgz
• http://hostname/pathname/package.tgz
Include the optional member option to install the software package on only one
member of an EX4200 Virtual Chassis:
Other members of the Virtual Chassis are not affected. To install the software on all
members of the Virtual Chassis, do not include the member option.
NOTE: To abort the installation, do not reboot your device; instead, finish
the installation and then issue the request system software delete
package.tgz command, where package.tgz is, for example,
jinstall-ex-8200-10.2R1.8-domestic-signed.tgz. This is your last chance to
stop the installation.
6. After the reboot has completed, log in and verify that the new version of the software
is properly installed:
An expanded upgrade and downgrade path is now available for the Junos OS Extended
End-of-Life (EEOL) releases. You can upgrade directly from one EEOL release to one of
two adjacent later EEOL releases. You can also downgrade directly from one EEOL release
to one of two adjacent earlier EEOL releases.
For example, Junos OS Releases 9.3, 10.0, and 10.4 are all EEOL releases. You can upgrade
from Junos OS Release 8.5 directly to either 9.3 or 10.0. To upgrade from Release 8.5 to
10.4, you first need to upgrade to Junos OS Release 9.3 or 10.0, and then upgrade a second
time to 10.4. Similarly, you can downgrade directly from Junos OS Release 10.4 to either
10.0 or 9.3. To downgrade from Release 10.4 to 8.5, you first need to downgrade to 10.0
or 9.3, and then perform a second downgrade to Release 8.5.
For upgrades and downgrades to or from a non-EEOL release, the current policy is that
you can upgrade and downgrade by no more than three releases at a time. This policy
remains unchanged.
For more information on EEOL releases and to review a list of EEOL releases, see
http://www.juniper.net/support/eol/junos.html.
The ARP aging time configuration in the system configuration stanza in Junos OS Release
9.4R1 is incompatible with the ARP aging time configuration in Junos OS Release 9.3R1
or earlier and Junos OS Release 9.4R2 or later. If you have configured system arp
aging-timer aging-time on EX Series switches running Junos OS Release 9.4R1 and upgrade
to Junos OS Release 9.4R2 or later or downgrade to Junos OS Release 9.3R1 or earlier,
the switch will display configuration errors on booting up after the upgrade or downgrade.
As a workaround, delete the arp aging-timer aging-time configuration in the system
configuration stanza and reapply the configuration after you complete the upgrade or
downgrade.
The format of the file in which the EX4200 Virtual Chassis topology information is stored
was changed in Junos OS Release 9.4. When you downgrade Junos OS Release 9.4 or
later running on EX4200 switches in a Virtual Chassis to Junos OS Release 9.3 or earlier,
make topology changes, and then upgrade to Junos OS Release 9.4 or later, the topology
changes you have made using Junos OS Release 9.3 or earlier are not retained. The switch
restores the last topology change you have made using Junos OS Release 9.4.
Upgrading from Junos OS Release 9.3R1 to Release 10.4 for EX Series Switches
If you are upgrading from Junos OS Release 9.3R1 and have voice over IP (VoIP) enabled
on a private VLAN (PVLAN), you must remove this configuration before upgrading, to
prevent upgrade problems. VoIP on PVLAN interfaces is not supported in releases later
than Junos OS Release 9.3R1.
Related • New Features in Junos OS Release 10.4 for EX Series Switches on page 178
Documentation
• Changes in Default Behavior and Syntax in Junos OS Release 10.4 for EX Series Switches
on page 180
• Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 184
• Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 189
• Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 191
If the information in the latest release notes differs from the information in the
documentation, follow the Junos OS Release Notes.
®
To obtain the most current version of all Juniper Networks technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
Juniper Networks supports a technical book program to publish books by Juniper Networks
engineers and subject matter experts with book publishers around the world. These
books go beyond the technical documentation to explore the nuances of network
architecture, deployment, and administration using the Junos operating system (Junos
OS) and Juniper Networks devices. In addition, the Juniper Networks Technical Library,
published in conjunction with O'Reilly Media, explores improving network security,
reliability, and availability using Junos OS configuration techniques. All the books are for
sale at technical bookstores and book outlets around the world. The current list can be
viewed at http://www.juniper.net/books .
Documentation Feedback
• Document name
• Page number
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need postsales technical support, you can access
our tools and resources online or open a case with JTAC.
• JTAC Hours of Operation —The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool located at https://tools.juniper.net/SerialNumberEntitlementSearch/.
If you are reporting a hardware or software problem, issue the following command from
the CLI before contacting support:
Revision History
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.