This shows you the differences between two versions of the page.
| network_stuff:juniper:ex [2020/10/12 10:32] – jotasandoku | network_stuff:juniper:ex [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| \\ | \\ | ||
| - | \\ | + | \\TFXPC0(vty)# |
| For the mastership selection, remember higher wins [[https:// | For the mastership selection, remember higher wins [[https:// | ||
| \\ | \\ | ||
| Line 24: | Line 24: | ||
| ---- | ---- | ||
| - | AGGREGATED INTERFACES 802.3ad | + | AGGREGATED INTERFACES 802.3ad |
| To assign interface to an aggegate: | To assign interface to an aggegate: | ||
| Line 196: | Line 196: | ||
| | | ||
| - | UPGRADE COMMAND for mixed VC | + | UPGRADE COMMAND for mixed VC: |
| request system software nonstop-upgrade set [/ | request system software nonstop-upgrade set [/ | ||
| - | chassis | + | chassis # this will start the whole process, no manual reboot |
| - | | + | UPGRADE COMMAND for NON-MIXED VC:\\ |
| - | UPGRADE COMMAND for NON-MIXED VC: | + | To see what hapens during the nssu see this [[https:// |
| - | request system software nonstop-upgrade | + | request system software nonstop-upgrade |
| - | | + | |
| AFTER: | AFTER: | ||
| Line 284: | Line 284: | ||
| request virtual-chassis vc-port set interface vcp-0 member 1 disable | request virtual-chassis vc-port set interface vcp-0 member 1 disable | ||
| - | request system software add / | + | request system software add / |
| # Then reboot or, if we want to rollback ' | # Then reboot or, if we want to rollback ' | ||
| \\ | \\ | ||
| - | ** TODO ** | + | TSHOOT ISSUES AFTER UPGRADE: |
| + | |||
| + | - If error like : " | ||
| + | |||
| + | rm -rf / | ||
| + | mgd -I | ||
| + | |||
| Line 342: | Line 349: | ||
| * Test ftp/ | * Test ftp/ | ||
| - | Go: https:// | + | Go: https:// |
| ssh ftp01 and write in mount | ssh ftp01 and write in mount | ||
| * Check internet reachability from any cc 1:1 outbound | * Check internet reachability from any cc 1:1 outbound | ||
| - | [root@cc05.dc.grapeshot.co.uk ~]# ping google.com | + | [root@cc05.dc.mycompany1.co.uk ~]# ping google.com |
| * Check reachability from internet to internal hosts 1:1 inbound | * Check reachability from internet to internal hosts 1:1 inbound | ||
| - | telnet clarify.grapeshot.co.uk 443 # this is in asci pool | + | telnet clarify.mycompany1.co.uk 443 # this is in asci pool |
| * check crawling : **curl ipecho.net/ | * check crawling : **curl ipecho.net/ | ||
| TO check that nat44 is happening in eacg different CC | TO check that nat44 is happening in eacg different CC | ||
| Line 369: | Line 376: | ||
| * Check napt-44 | * Check napt-44 | ||
| - | [root@titan26.dc.grapeshot.co.uk ~]# telnet google.com 80 | + | [root@titan26.dc.mycompany1.co.uk ~]# telnet google.com 80 |
| (fw)# sh nat translated 89.145.95.2 detail # there should be transalated hits | (fw)# sh nat translated 89.145.95.2 detail # there should be transalated hits | ||
| # testing the below translation | # testing the below translation | ||
| Line 384: | Line 391: | ||
| set protocols rstp interface xe-0/0/13.0 mode point-to-point | set protocols rstp interface xe-0/0/13.0 mode point-to-point | ||
| set protocols rstp interface ge-0/0/3.0 mode edge | set protocols rstp interface ge-0/0/3.0 mode edge | ||
| + | |||
| + | To **quickly** add rstp to a port: | ||
| + | del interfaces et-0/ | ||
| + | set protocols rstp interface et-0/0/26 | ||
| + | set interfaces et-0/0/26.0 family ethernet-switching | ||
| ---- | ---- | ||
| Line 465: | Line 477: | ||
| | | ||
| | | ||
| + | |||
| + | |||
| + | ---- | ||
| + | NEW MIXED VIRTUAL CHASSIS FROM EXISTING EX4200 (ADD EX4550):\\ | ||
| + | Any of the members can be Master in this kind of mixed VC, in this case we will have the 4200 keeping their master role.\\ | ||
| + | [[https:// | ||
| + | \\ | ||
| + | In the EX4550:\\ | ||
| + | |||
| + | * Do not connect the VC cables yet | ||
| + | * Power ON the new EX4550 and enable CON | ||
| + | * Zeroize the devices to avoid issues | ||
| + | * Note down the RE serial numbers (chassis_s-n). | ||
| + | |||
| + | set system root-authentication plain-text-password # then the usual root password | ||
| + | set system host-name sw-Xyy | ||
| + | |||
| + | * Connect them to mgmt to the laptop and upgarde the firmware in the new members. to 15.1R7.9 | ||
| + | * Verify the PIC mode setting: | ||
| + | |||
| + | show chassis pic-mode # If the PIC mode was not set to Virtual Chassis mod, set the PIC mode to Virtual Chassis mode: | ||
| + | request chassis pic-mode virtual-chassis | ||
| + | |||
| + | * Reboot each future member | ||
| + | * shut them down | ||
| + | * Interconnect the VC cables for the 4 members, daisy chain. | ||
| + | |||
| + | In the EX4200:\\ | ||
| + | |||
| + | set virtual-chassis preprovisioned | ||
| + | del virtual-chassis no-split-detection | ||
| + | set virtual-chassis member 0 role routing-engine | ||
| + | set virtual-chassis member 0 serial-number BP0208369580 | ||
| + | set virtual-chassis member 1 role routing-engine | ||
| + | set virtual-chassis member 1 serial-number BP0211193901 | ||
| + | set virtual-chassis member 2 role line-card | ||
| + | set virtual-chassis member 2 serial-number XXXXXXXXXXXX # new SNs | ||
| + | set virtual-chassis member 3 role line-card | ||
| + | set virtual-chassis member 3 serial-number XXXXXXXXXXXX | ||
| + | | ||
| + | Power ON the new EX4200, now connected to the VC lot | ||
| + | |||
| + | show virtual-chassis # Verify VC is healthy, output similar to this | ||
| + | Preprovisioned Virtual Chassis | ||
| + | Virtual Chassis ID: 5ca4.23ce.6939 | ||
| + | Virtual Chassis Mode: Mixed | ||
| + | Mstr Mixed Route Neighbor List | ||
| + | Member ID Status | ||
| + | 0 (FPC 0) Prsnt XXXXXXXXXXXX ex4200-48t | ||
| + | | ||
| + | 1 (FPC 1) Prsnt XXXXXXXXXXXX ex4200-48t | ||
| + | | ||
| + | 2 (FPC 2) Prsnt XXXXXXXXXXXX ex4550-32f | ||
| + | | ||
| + | | ||
| + | 3 (FPC 3) Prsnt XXXXXXXXXXXX ex4550-32f | ||
| + | | ||
| + | | ||
| + | show virtual-chassis vc-port | ||
| + | |||
| ---- | ---- | ||
| Line 576: | Line 648: | ||
| - | ---- | + | --- |
| - | __**FORWARDING CONSOLE TROUBLESHOOT**__\\ | + | __**PFE TROUBLESHOOTING / DEBUGGING " |
| - | INTERNAL FRAME PATH" | + | **INTERNAL FRAME PATH**:\\ |
| Check this session: {{ : | Check this session: {{ : | ||
| run start shell | run start shell | ||
| Line 590: | Line 662: | ||
| request pfe execute command "show nhdb type unicast" | request pfe execute command "show nhdb type unicast" | ||
| | | ||
| - | CPU USAGE: Don't use sh chassis routing engine (deceiving as everything under 'CPU utilization' | + | **PFE TROUBLESHOOTING / CPU USAGE**: Don't use sh chassis routing engine (deceiving as everything under 'CPU utilization' |
| Do **this** instead: | Do **this** instead: | ||
| show system processes extensive | except 0.0 | refresh 1 | show system processes extensive | except 0.0 | refresh 1 | ||
| + | start shell | ||
| + | vty fpc0 | ||
| + | show syslog messages | ||
| + | show threads | ||
| + | show threads cpu | ||
| + | show threads verbose | ||
| \\ | \\ | ||
| - | CAPTURE PACKETS DESTINED TO THE ROUTING ENGINE:\\ | + | ** PFE TROUBLESHOOTING/ |
| To capture packets going to the routing engine: | To capture packets going to the routing engine: | ||
| rtsockmon -t # If it shows a lot of add/delete routes there might be an issue with exception traffic | rtsockmon -t # If it shows a lot of add/delete routes there might be an issue with exception traffic | ||
| - | rtsockmon : to view the actual route replication process \\ | + | |
| \\ | \\ | ||
| + | |||
| + | ** PFE TROUBLESHOOTING / MC-LAG** | ||
| + | |||
| + | For the full troubleshooting check here {{ : | ||
| + | |||
| + | request pfe execute target fpc0 command "set dcbcm bcmshell \"l3 l3table show\"" | ||
| + | Entry VRF IP address | ||
| + | 99 1 185.89.206.27 | ||
| + | # internal interface for .27 destination is 100154 | ||
| + | request pfe execute target fpc0 command "set dcbcm bcmshell \"l3 egress show 100154\"" | ||
| + | HW (unit 0) | ||
| + | Entry Mac Vlan INTF PORT MOD MPLS_LABEL ToCpu Drop RefCount L3MC | ||
| + | 100154 | ||
| + | # no drop. Uses internal vlan 7 | ||
| + | request pfe execute target fpc0 command "show bridge-dom" | ||
| + | SENT: Ukern command: show bridge-dom | ||
| + | Bridging Domain | ||
| + | server-hosting+1 | ||
| + | [..] | ||
| + | # for vlan 7 | ||
| + | request pfe execute target fpc0 command "set dcbcm bcmshell \"vlan show\"" | ||
| + | vlan 7 ports xe6-xe13, | ||
| + | # to show all ifd | ||
| + | request pfe execute target fpc0 command "show dcbcm ifd all" | ||
| + | ifd name | ||
| + | | ||
| + | | ||
| + | [...] | ||
| + | # this is cef information | ||
| + | show route forwarding-table destination 185.89.206.27 | ||
| + | Routing table: default.inet | ||
| + | Internet: | ||
| + | Enabled protocols: Bridging, | ||
| + | Destination | ||
| + | 185.89.206.27/ | ||
| + | # this bounces the port physically (completely): | ||
| + | request pfe execute target fpc0 command "set cmqfx xcvr remove/ | ||
| + | # mclag filter creation seems to fail | ||
| + | show log messages | last 20 | ||
| + | Jun 15 14: | ||
| + | request pfe execute target fpc0 command "show filter hw all drop non_zero_only 0 | ||
| + | # THIS SHOWS THE FILTERS IN ACTION: | ||
| + | F 9 U: 0 Pi: 0 G:33 E: 9216 A:IDR stat (id 7243 val 0x0000000000006A75) P:7FFFFD3F I7: protect-RE (IRACL) | ||
| + | F 71 U: 0 Pi: 0 G:17 E: 127 H:0 A:CCD stat (id 127 val 0x000000000000004F) P:00000001 I5: CPU Code 69 -ipv6_linklocal | ||
| + | F 131 U: 0 Pi: 0 G:17 E: 170 H:0 A:CCD stat (id 170 val 0x00000000002EB5DB) P:7FFFFFFB I5: COSQ 16 -ipv6-ns-na | ||
| + | F 131 U: 0 Pi: 0 G:17 E: 172 H:0 A:CCD stat (id 172 val 0x000000000014014E) P:7FFFFFFB I5: COSQ 16 -ipv6-ns-na | ||
| + | |||
| + | |||
| + | |||
| INVESTIGATE QUEUE DEPTH FOR ARPs:\\ | INVESTIGATE QUEUE DEPTH FOR ARPs:\\ | ||
| on 12.3R12.4 ARP is assigned to DSAIdx 5 and it goes to queue 2a which has 300pps bandwidth: | on 12.3R12.4 ARP is assigned to DSAIdx 5 and it goes to queue 2a which has 300pps bandwidth: | ||
| Line 663: | Line 790: | ||
| * D45 << RELEASE | * D45 << RELEASE | ||
| + | * JSA: Juniper Security Advisories | ||