This shows you the differences between two versions of the page.
| network_stuff:juniper:ex [2021/02/15 12:41] – jotasandoku | network_stuff:juniper:ex [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 24: | Line 24: | ||
| ---- | ---- | ||
| - | AGGREGATED INTERFACES 802.3ad | + | AGGREGATED INTERFACES 802.3ad |
| To assign interface to an aggegate: | To assign interface to an aggegate: | ||
| Line 199: | Line 199: | ||
| request system software nonstop-upgrade set [/ | request system software nonstop-upgrade set [/ | ||
| - | chassis | + | chassis # this will start the whole process, no manual reboot |
| - | | + | |
| UPGRADE COMMAND for NON-MIXED VC:\\ | UPGRADE COMMAND for NON-MIXED VC:\\ | ||
| To see what hapens during the nssu see this [[https:// | To see what hapens during the nssu see this [[https:// | ||
| - | request system software nonstop-upgrade | + | request system software nonstop-upgrade |
| - | | + | |
| AFTER: | AFTER: | ||
| Line 286: | Line 284: | ||
| request virtual-chassis vc-port set interface vcp-0 member 1 disable | request virtual-chassis vc-port set interface vcp-0 member 1 disable | ||
| - | request system software add / | + | request system software add / |
| # Then reboot or, if we want to rollback ' | # Then reboot or, if we want to rollback ' | ||
| \\ | \\ | ||
| - | ** TODO ** | + | TSHOOT ISSUES AFTER UPGRADE: |
| + | |||
| + | - If error like : " | ||
| + | |||
| + | rm -rf / | ||
| + | mgd -I | ||
| + | |||
| Line 344: | Line 349: | ||
| * Test ftp/ | * Test ftp/ | ||
| - | Go: https:// | + | Go: https:// |
| ssh ftp01 and write in mount | ssh ftp01 and write in mount | ||
| * Check internet reachability from any cc 1:1 outbound | * Check internet reachability from any cc 1:1 outbound | ||
| - | [root@cc05.dc.grapeshot.co.uk ~]# ping google.com | + | [root@cc05.dc.mycompany1.co.uk ~]# ping google.com |
| * Check reachability from internet to internal hosts 1:1 inbound | * Check reachability from internet to internal hosts 1:1 inbound | ||
| - | telnet clarify.grapeshot.co.uk 443 # this is in asci pool | + | telnet clarify.mycompany1.co.uk 443 # this is in asci pool |
| * check crawling : **curl ipecho.net/ | * check crawling : **curl ipecho.net/ | ||
| TO check that nat44 is happening in eacg different CC | TO check that nat44 is happening in eacg different CC | ||
| Line 371: | Line 376: | ||
| * Check napt-44 | * Check napt-44 | ||
| - | [root@titan26.dc.grapeshot.co.uk ~]# telnet google.com 80 | + | [root@titan26.dc.mycompany1.co.uk ~]# telnet google.com 80 |
| (fw)# sh nat translated 89.145.95.2 detail # there should be transalated hits | (fw)# sh nat translated 89.145.95.2 detail # there should be transalated hits | ||
| # testing the below translation | # testing the below translation | ||
| Line 386: | Line 391: | ||
| set protocols rstp interface xe-0/0/13.0 mode point-to-point | set protocols rstp interface xe-0/0/13.0 mode point-to-point | ||
| set protocols rstp interface ge-0/0/3.0 mode edge | set protocols rstp interface ge-0/0/3.0 mode edge | ||
| + | |||
| + | To **quickly** add rstp to a port: | ||
| + | del interfaces et-0/ | ||
| + | set protocols rstp interface et-0/0/26 | ||
| + | set interfaces et-0/0/26.0 family ethernet-switching | ||
| ---- | ---- | ||
| Line 638: | Line 648: | ||
| - | ---- | + | --- |
| - | __**FORWARDING CONSOLE TROUBLESHOOT | + | __**PFE TROUBLESHOOTING |
| - | INTERNAL FRAME PATH" | + | **INTERNAL FRAME PATH**:\\ |
| Check this session: {{ : | Check this session: {{ : | ||
| run start shell | run start shell | ||
| Line 652: | Line 662: | ||
| request pfe execute command "show nhdb type unicast" | request pfe execute command "show nhdb type unicast" | ||
| | | ||
| - | CPU USAGE: Don't use sh chassis routing engine (deceiving as everything under 'CPU utilization' | + | **PFE TROUBLESHOOTING / CPU USAGE**: Don't use sh chassis routing engine (deceiving as everything under 'CPU utilization' |
| Do **this** instead: | Do **this** instead: | ||
| show system processes extensive | except 0.0 | refresh 1 | show system processes extensive | except 0.0 | refresh 1 | ||
| + | start shell | ||
| + | vty fpc0 | ||
| + | show syslog messages | ||
| + | show threads | ||
| + | show threads cpu | ||
| + | show threads verbose | ||
| \\ | \\ | ||
| - | CAPTURE PACKETS DESTINED TO THE ROUTING ENGINE:\\ | + | ** PFE TROUBLESHOOTING/ |
| To capture packets going to the routing engine: | To capture packets going to the routing engine: | ||
| rtsockmon -t # If it shows a lot of add/delete routes there might be an issue with exception traffic | rtsockmon -t # If it shows a lot of add/delete routes there might be an issue with exception traffic | ||
| - | rtsockmon : to view the actual route replication process \\ | + | |
| \\ | \\ | ||
| + | |||
| + | ** PFE TROUBLESHOOTING / MC-LAG** | ||
| + | |||
| + | For the full troubleshooting check here {{ : | ||
| + | |||
| + | request pfe execute target fpc0 command "set dcbcm bcmshell \"l3 l3table show\"" | ||
| + | Entry VRF IP address | ||
| + | 99 1 185.89.206.27 | ||
| + | # internal interface for .27 destination is 100154 | ||
| + | request pfe execute target fpc0 command "set dcbcm bcmshell \"l3 egress show 100154\"" | ||
| + | HW (unit 0) | ||
| + | Entry Mac Vlan INTF PORT MOD MPLS_LABEL ToCpu Drop RefCount L3MC | ||
| + | 100154 | ||
| + | # no drop. Uses internal vlan 7 | ||
| + | request pfe execute target fpc0 command "show bridge-dom" | ||
| + | SENT: Ukern command: show bridge-dom | ||
| + | Bridging Domain | ||
| + | server-hosting+1 | ||
| + | [..] | ||
| + | # for vlan 7 | ||
| + | request pfe execute target fpc0 command "set dcbcm bcmshell \"vlan show\"" | ||
| + | vlan 7 ports xe6-xe13, | ||
| + | # to show all ifd | ||
| + | request pfe execute target fpc0 command "show dcbcm ifd all" | ||
| + | ifd name | ||
| + | | ||
| + | | ||
| + | [...] | ||
| + | # this is cef information | ||
| + | show route forwarding-table destination 185.89.206.27 | ||
| + | Routing table: default.inet | ||
| + | Internet: | ||
| + | Enabled protocols: Bridging, | ||
| + | Destination | ||
| + | 185.89.206.27/ | ||
| + | # this bounces the port physically (completely): | ||
| + | request pfe execute target fpc0 command "set cmqfx xcvr remove/ | ||
| + | # mclag filter creation seems to fail | ||
| + | show log messages | last 20 | ||
| + | Jun 15 14: | ||
| + | request pfe execute target fpc0 command "show filter hw all drop non_zero_only 0 | ||
| + | # THIS SHOWS THE FILTERS IN ACTION: | ||
| + | F 9 U: 0 Pi: 0 G:33 E: 9216 A:IDR stat (id 7243 val 0x0000000000006A75) P:7FFFFD3F I7: protect-RE (IRACL) | ||
| + | F 71 U: 0 Pi: 0 G:17 E: 127 H:0 A:CCD stat (id 127 val 0x000000000000004F) P:00000001 I5: CPU Code 69 -ipv6_linklocal | ||
| + | F 131 U: 0 Pi: 0 G:17 E: 170 H:0 A:CCD stat (id 170 val 0x00000000002EB5DB) P:7FFFFFFB I5: COSQ 16 -ipv6-ns-na | ||
| + | F 131 U: 0 Pi: 0 G:17 E: 172 H:0 A:CCD stat (id 172 val 0x000000000014014E) P:7FFFFFFB I5: COSQ 16 -ipv6-ns-na | ||
| + | |||
| + | |||
| + | |||
| INVESTIGATE QUEUE DEPTH FOR ARPs:\\ | INVESTIGATE QUEUE DEPTH FOR ARPs:\\ | ||
| on 12.3R12.4 ARP is assigned to DSAIdx 5 and it goes to queue 2a which has 300pps bandwidth: | on 12.3R12.4 ARP is assigned to DSAIdx 5 and it goes to queue 2a which has 300pps bandwidth: | ||
| Line 725: | Line 790: | ||
| * D45 << RELEASE | * D45 << RELEASE | ||
| + | * JSA: Juniper Security Advisories | ||