This is an old revision of the document!
EX SWITCHES
My notes in googled : External Link
Password recovery procedure for EX switches: link1 , link2
\\TFXPC0(vty)# show filter hw groups
For the mastership selection, remember higher wins External Link. the members that are not selected as master or backup function as linecard members of the Virtual Chassis configuration. A switch with a mastership priority of 0 is always in the linecard role. The default value for mastership priority is 128. Normally we assign master and backup the Same Priority.
succinctly: 1st is priority values, …. then lowest MAC address
show virtual-chassis
To log to the virtual chassis member
request session member 2
This shows the VCP ports (back and front, used for signalling the vchasss). VCPs can be aggregated to form a LAG
show virtual-chassis vc-port
To check the inserted SFPs:
show version <-- This shows me the number of fpc (devices) show chassis pic fpc-slot 2 pic-slot 1
Example of md5 junos password Junos OS 12.3 and earlier.
easy0n set system login user test authentication encrypted-password "$1$6Ub0uM5t$08QKpPT1ZO0GjwcVe6mTP1"
AGGREGATED INTERFACES 802.3ad
To assign interface to an aggegate:
set interfaces et-0/1/1 ether-options 802.3ad ae0
To see the members of a ae interface
show interfaces ae0 extensive # and check down in the section 'Bundle'
IRB - INTEGRATED ROUTING AND BRIDGING INTERFACES
See this External Link
set interfaces irb unit 0 family inet address 10.5.6.39/21 set vlans Internalmock vlan-id 400 set interfaces et-0/1/0 ether-options no-auto-negotiation set interfaces et-0/1/0 unit 0 family ethernet-switching interface-mode access set interfaces et-0/1/0 unit 0 family ethernet-switching vlan members Internalmock set vlans Internalmock l3-interface irb.0 # This binds the irb with the vlan (Internalmock)
ENABLE SFLOW
[edit protocols]
+ sflow {
+ polling-interval 20;
+ sample-rate {
+ ingress 2000;
+ egress 2000;
+ }
+ collector 185.89.204.18 {
+ udp-port 2055;
+ }
+ interfaces xe-0/0/0.0;
+ interfaces xe-0/0/1.0;
+ interfaces xe-0/0/2.0;
+ }
/var/tmp/sflowtool/sflowtool-3.22 ss2# ss2# sflowtool -p 2055 -t | tcpdump -r - -s0
https://blog.sflow.com/2011/12/sflowtool.html
ROUTED VLAN (OR RVI, Not to confuse with IRB):
To communicate outside the vlan realm (for those EX switches without ELS (Enhanced Layer 2 Software))
Create a layer 2 VLAN:
set vlans <vlan-name> vlan-id <vlan-id> (1..4094)>
Create a logical layer 3 VLAN interface:
set interfaces vlan unit <unit# (0..16385)> family inet address <ip address/mask>
Link the layer 2 VLAN to the layer 3 VLAN interface:
set vlans <vlan-name> l3-interface vlan.<unit# mentioned above>
See: [https://kb.juniper.net/InfoCenter/index?page=content&id=KB11000]
Switches normally don't accept untagged data in tagged port. If we want them to accept it we need to do something like this:
set interface ae3 native-vlan-id 99
CONFIGURE MULTIPLE ENTITIES AT ONE (SIMILAR TO CISCO RANGE COMMAND):
wildcard range set interfaces xe-[0,1]/0/[0,1] disable
CHECK SFP/INTERFACE FLAPS To see light/laser level:
show interfaces diagnostics optics show interfaces diagnostics optics xe-0/0/20:0 | except thresh | except Off # for the qsfp-404-10g is enough with this (this shows everything) show chassis pic pic-slot 0 fpc-slot 1 # for more specific transceiver type
To see location of SFP:
show chassis hardware
To find SFP information:
show chassis pic fpc-slot 0 pic-slot 0
This is what needs to be seen in the logs when an interface flaps, result of the process mib2d generating a log:
LINK
UPGRADE JUNOS
- Standalone procedure:
Remember before the upgrade
Checks1:
request support information | no-more # have this in a file case thorough checks are needed show interface terse | no-more # REVIEW ALL BONDS STAY UP AFTER UPGRADE show virtual-chassis | no-more show chassis hardware | no-more show ethernet-switching table | no-more show system alarms # request system configuration rescue save # if rescue configuration not set yet
Checks2:
show route advertising-protocol bgp 206.126.236.37 show route 0.0.0.0 detail
Below some helpful commands:
set date YYYYMMDDHHMM.ss show system uptime show task replication request session member <member-id> show system switchover # from the backup re request chassis routing-engine master switch # case we need to force switchover , run this in the fpc that WANTS to become master (backup)
Now the proper upgrade:
And here the list of EEOL: External Link
SINGLE DEVICE UPGRADE:
request system software add /var/tmp/jinstall-host-qfx-5-17.2R1.n-signed.tgz force-host # Then reboot or, if we want to rollback 'request system software rollback'
“You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 10.0, 10.4, and 11.4 are EEOL releases. You can upgrade from Junos OS Release 10.0 to Release 10.4 or even from Junos OS Release 10.0 to Release 11.4.”. See External Link
UPGRADE EX MIXED/NOT MIXED VC WITH NSSU
BEFORE STARTING, DO THIS:
# 1st thing verify console access is OK # Check rancid config backup is up to date # log the output of your ssh session and collect the info from the commands below: set cli timestamp delete system services ssh root-login deny # and copy the image show system alarms # request system configuration rescue save request support information | no-more show chassis hardware | no-more show ethernet-switching table | no-more show interface terse | except down | no-more show interfaces descriptions | no-more show virtual-chassis | no-more show virtual-chassis vc-port file checksum md5 /var/tmp/jinstall-host-ex-4600-16.1R6-S6-signed.tgz
CHECK THIS:
show system uptime # date time needs to be correct show task replication # needs to be enabled ONLY IF THIS IS A TWO MEMBER VIRTUAL CHASSIS!! show configuration | display set | match split set virtual-chassis no-split-detection # << ONLY IF TWO MEMBER VC!: show configuration | display set | match nonstop set protocols layer2-control nonstop-bridging set routing-options nonstop-routing show configuration | display set | match switchover set chassis redundancy graceful-switchover show virtual-chassis vc-port # verify all members are connected to each other (daily chain). For each of the fpcx sections, check Status (Up) and neighbour (needs be two and contiguous). This is important, otherwise upgrade will fail and VC with break
UPGRADE COMMAND for mixed VC
request system software nonstop-upgrade set [/var/tmp/package-name.tgz /var/tmp/package-name.tgz] force-host # MIXED virtual chassis # Then reboot or, if we want to rollback 'request system software rollback'
UPGRADE COMMAND for NON-MIXED VC:
request system software nonstop-upgrade /var/tmp/package-name.tgz force-host # Then reboot or, if we want to rollback 'request system software rollback'
AFTER:
set system services ssh root-login deny
Useful commands
set date YYYYMMDDHHMM.ss request session member <member-id> request chassis routing-engine master switch
UPGRADE EX4600 OR QFX WITH NSSU
for minimal downtime see External Link *«< BE VERY PATIENT, IT ENDS UP DOING ALL MEMBERS BUT TAKES TIME!!
set chassis redundancy graceful-switchover set protocols layer2-control nonstop-bridging set chassis redundancy graceful-switchover set routing-options nonstop-routing request system software nonstop-upgrade force-host /var/tmp/jinstall-ex-4200–12.1R5.5–domestic-signed.tgz # issu, chassis same type request system software nonstop-upgrade reboot <package> request system software nonstop-upgrade set [/var/tmp/package-name.tgz /var/tmp/package-name.tgz] # MIXED virtual chassis # Then reboot or, if we want to rollback 'request system software rollback'
POST UPGRADE CHECKS
show interface terse # REVIEW ALL BONDS STAY UP AFTER UPGRADE show virtual-chassis show system alarms
If we stop the upgrade (power failure or similar)
UPGRADE VC MANUALLY (NON-NSSU)
BEFORE STARTING, DO THIS:
# 1st thing verify console access is OK # log the output of your ssh session and collect the info from the commands below: delete system services ssh root-login deny # and copy the image request support information | no-more show chassis hardware | no-more show ethernet-switching table | no-more show interface terse | except down | no-more show interfaces descriptions | no-more show virtual-chassis | no-more show system alarms # request system configuration rescue save
CHECK THIS:
show system uptime # date time needs to be correct show task replication # needs to be enabled ONLY IF THIS IS A TWO MEMBER VIRTUAL CHASSIS!! show configuration | display set | match split set virtual-chassis no-split-detection # << ONLY IF TWO MEMBER VC!: show configuration | display set | match nonstop set protocols layer2-control nonstop-bridging set routing-options nonstop-routing show configuration | display set | match switchover set chassis redundancy graceful-switchover show virtual-chassis vc-port # verify all members are connected to each other (daily chain). For each of the fpcx sections, check Status (Up) and neighbour (needs be two and contiguous). This is important, otherwise upgrade will fail and VC with break
Now the proper manual upgrade:
file copy /tmp/jinstall-ex-4200-13.2X51-D35.3-domestic-signed.tgz fpc1:/tmp/ # push packet to member to be upgraded (fpc1) request session member fpc1
wildcard range set xe-1/0/[0-23] disable wildcard range set et-1/0/[24-27] disable
request virtual-chassis vc-port set interface vcp-0 member 1 disable # << example. disabled the VCP on the member 1 and member 0 and then console onto member 1
request system software add /tmp/jinstall-ex-4200-13.2X51-D35.3-domestic-signed.tgz reboot validate reboot # before check servers are fine. From console in the the isolated fpc, trigger the upgrade. # Then reboot or, if we want to rollback 'request system software rollback'
TODO
UPGRADE JUNOS WITH ANSIBLE:
http://anastarsha.com/install-and-upgrade-junos-software-packages-using-ansible/
VIRTUAL SWITCH MANAGEMENT:
Move roles in a running virtual chassis:
#1 initial configuration:
set virtual-chassis preprovisioned set virtual-chassis member 1 role routing-engine set virtual-chassis member 1 serial-number BP0208369135 set virtual-chassis member 0 role routing-engine set virtual-chassis member 0 serial-number BP0208369174 << currently master set virtual-chassis member 2 role line-card set virtual-chassis member 2 serial-number LX0213502924 set virtual-chassis member 3 role line-card set virtual-chassis member 3 serial-number LX0213502917
#2 apply this config. takes 2-3 minutes to make effect.
set virtual-chassis preprovisioned set virtual-chassis member 1 role line-card << becomes line-card set virtual-chassis member 1 serial-number BP0208369135 set virtual-chassis member 0 role routing-engine set virtual-chassis member 0 serial-number BP0208369174 set virtual-chassis member 2 role routing-engine << becomes re backup!! set virtual-chassis member 2 serial-number LX0213502924 set virtual-chassis member 3 role line-card set virtual-chassis member 3 serial-number LX0213502917
#3 apply this config. takes 2-3 minutes to make effect
set virtual-chassis preprovisioned set virtual-chassis member 1 role line-card set virtual-chassis member 1 serial-number BP0208369135 set virtual-chassis member 0 role line-card << becomes line-card set virtual-chassis member 0 serial-number BP0208369174 set virtual-chassis member 2 role routing-engine << moves to re master!! set virtual-chassis member 2 serial-number LX0213502924 set virtual-chassis member 3 role routing-engine << becomes re backup!! set virtual-chassis member 3 serial-number LX0213502917
SANITY CHECKS IN GS
Go: https://filer01-mgt.dc.grapeshot.co.uk/sysmgr/SysMgr.html#
ssh ftp01 and write in mount
[root@cc05.dc.grapeshot.co.uk ~]# ping google.com
telnet clarify.grapeshot.co.uk 443 # this is in asci pool
TO check that nat44 is happening in eacg different CC
show services inline nat pool _jinpool_0/18/src_r2_cc01 show services inline nat pool _jinpool_0/19/src_r2_cc02 show services inline nat pool _jinpool_0/20/src_r2_cc03 show services inline nat pool _jinpool_0/21/src_r2_cc04 show services inline nat pool _jinpool_0/22/src_r2_cc05 show services inline nat pool _jinpool_0/23/src_r2_cc06 show services inline nat pool _jinpool_0/24/src_r2_cc07 show services inline nat pool _jinpool_0/25/src_r2_cc08 show services inline nat pool _jinpool_0/26/src_r2_cc09 show services inline nat pool _jinpool_0/27/src_r2_cc10 show services inline nat pool _jinpool_0/28/src_r2_cc11 show services inline nat pool _jinpool_0/29/src_r2_cc12 show services inline nat pool _jinpool_0/30/src_r2_cc13 show services inline nat pool _jinpool_0/31/src_r2_cc14 show services inline nat pool _jinpool_0/32/src_r2_cc15 show services inline nat pool _jinpool_0/33/src_r2_cc16
[root@titan26.dc.grapeshot.co.uk ~]# telnet google.com 80
(fw)# sh nat translated 89.145.95.2 detail # there should be transalated hits # testing the below translation object network obj-10.8.11.0 nat (management,outside) dynamic 89.145.95.38
IMPLEMENTING RSTP:
RSTP is configured on an interfaces basis:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/spanning-tree-configuring-rstp.html
set protocols rstp bridge-priority 16k set protocols rstp interface xe-0/0/13.0 mode point-to-point set protocols rstp interface ge-0/0/3.0 mode edge
Upgrade phases/milestones:
until this point, the master still runs the old junos version, it is the last one to jump to the new version
UPGRADE EX4600 OR QFX
QFX
request system software add /var/tmp/jinstall-host-qfx-5-17.2R1.n-signed.tgz # Then reboot or, if we want to rollback 'request system software rollback'
HOW TO CREATE A NEW VIRTUAL CHASSIS MADE OF 4600
set system root-authentication plain-text-password # then the usual root password set system host-name sw-Xyy commit @log out and verify hostname and root access OK set virtual-chassis preprovisioned set virtual-chassis member 0 serial-number <chassis_s-n-0> role routing-engine set virtual-chassis member 1 serial-number <chassis_s-n-1> role routing-engine # if 2 member chassis set virtual-chassis no-split-detection commit
request virtual-chassis vc-port set pic-slot 0 port 24 local request virtual-chassis vc-port set pic-slot 0 port 25 local request virtual-chassis vc-port set pic-slot 0 port 26 local request virtual-chassis vc-port set pic-slot 0 port 27 local
NOTE: if we want to remove a vc-port, we use the above but with 'delete'. WARNING Before converting a vc port to a normal port, best to have it disconnected/shutdown, otherwise, in absence of STP, we can create a nasty layer 2 loop!
- Verify VC is healthy, output similar to this
jaime_santos@sw-d09> show virtual-chassis
Preprovisioned Virtual Chassis
Virtual Chassis ID: XXXX.XXXX.XXXX
Virtual Chassis Mode: Enabled
Mstr Mixed Route Neighbor List
Member ID Status Serial No Model prio Role Mode Mode ID Interface
0 (FPC 0) Prsnt <chassis_s-n-0> ex4600-40f 129 Backup N VC 1 vcp-255/0/24
1 vcp-255/0/25
1 vcp-255/0/26
1 vcp-255/0/27
1 (FPC 1) Prsnt <chassis_s-n-1> ex4600-40f 129 Master* N VC 0 vcp-255/0/24
0 vcp-255/0/25
0 vcp-255/0/26
0 vcp-255/0/27
NEW MIXED VIRTUAL CHASSIS FROM EXISTING EX4200 (ADD EX4550):
Any of the members can be Master in this kind of mixed VC, in this case we will have the 4200 keeping their master role.
https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/virtual-chassis-ex4200-ex4500-cli.html
In the EX4550:
set system root-authentication plain-text-password # then the usual root password set system host-name sw-Xyy
show chassis pic-mode # If the PIC mode was not set to Virtual Chassis mod, set the PIC mode to Virtual Chassis mode: request chassis pic-mode virtual-chassis
In the EX4200:
set virtual-chassis preprovisioned del virtual-chassis no-split-detection set virtual-chassis member 0 role routing-engine set virtual-chassis member 0 serial-number BP0208369580 set virtual-chassis member 1 role routing-engine set virtual-chassis member 1 serial-number BP0211193901 set virtual-chassis member 2 role line-card set virtual-chassis member 2 serial-number XXXXXXXXXXXX # new SNs set virtual-chassis member 3 role line-card set virtual-chassis member 3 serial-number XXXXXXXXXXXX
Power ON the new EX4200, now connected to the VC lot
show virtual-chassis # Verify VC is healthy, output similar to this
Preprovisioned Virtual Chassis
Virtual Chassis ID: 5ca4.23ce.6939
Virtual Chassis Mode: Mixed
Mstr Mixed Route Neighbor List
Member ID Status Serial No Model prio Role Mode Mode ID Interface
0 (FPC 0) Prsnt XXXXXXXXXXXX ex4200-48t 129 Backup Y VC 1 vcp-0
2 vcp-1
1 (FPC 1) Prsnt XXXXXXXXXXXX ex4200-48t 129 Master* Y VC 3 vcp-0
0 vcp-1
2 (FPC 2) Prsnt XXXXXXXXXXXX ex4550-32f 0 Linecard Y VC 3 vcp-255/2/0
3 vcp-255/2/1
0 vcp-255/2/3
3 (FPC 3) Prsnt XXXXXXXXXXXX ex4550-32f 0 Linecard Y VC 1 vcp-255/2/0
2 vcp-255/2/2
2 vcp-255/2/3
show virtual-chassis vc-port
TROUBLESHOOT BROKEN VC ( VIRTUAL CHASSIS ):
show chassis pic pic-slot 2 fpc-slot 4 # To check the statuc of a vc module request virtual-chassis device-reachability test-name member3-to-member4 source-fpc 3 destination-fpc 4 request virtual-chassis reactivate <ENTER> # You need to console to the member in question. You can use this command to reactivate a device that was previously part of the Virtual Chassis or VCF but whose status is no longer Prsnt.
DUPLEX SETTINGS IN JUNIPER:
Note that is NOT ENOUGH with set the interface to full 100 (for instance). We need to expicitely disable auto negotiation:
set interfaces ge-0/0/4 ether-options link-mode full-duplex set interfaces ge-0/0/4 ether-options speed 100m set interfaces ge-0/0/4 ether-options no-auto-negotiation <<<<<<<<<<<
Result:
jaime_santos@cpe1.singapore> show interfaces ge-0/0/4 | match MTU Link-level type: Ethernet, MTU: 1514, LAN-PHY mode, Speed: 100mbps, Duplex: Full-Duplex,
RPM PROBES AND EVENT POLICIES (~ SLA AND EMM IN IOS)
# RPM below generates an event:
set services rpm probe icmp-ping-probe test ping-probe-test probe-type icmp-ping test-interval 2 set services rpm probe icmp-ping-probe test ping-probe-test probe-type icmp-ping target address 10.2.2.1 set services rpm probe icmp-ping-probe test ping-probe-test thresholds successive-loss 1 set system syslog file syslog-event-daemon-info daemon info
Event logs location:
show log syslog-event-daemon-info
Event (config change in response to the rpm):
set event-options policy disable-on-ping-failure events ping_test_failed set event-options policy disable-on-ping-failure within 5 trigger on set event-options policy disable-on-ping-failure within 5 trigger 1 set event-options policy disable-on-ping-failure attributes-match ping_test_failed.test-owner matches icmp-ping-probe set event-options policy disable-on-ping-failure attributes-match ping_test_failed.test-name matches ping-probe-test set event-options policy disable-on-ping-failure then change-configuration retry count 5 set event-options policy disable-on-ping-failure then change-configuration retry interval 4 set event-options policy disable-on-ping-failure then change-configuration commands "set interfaces ge-0/0/1 description "BBBBBB" set event-options policy disable-on-ping-failure then change-configuration commit-options log "updating configuration from event policy disable-on-ping-failure" set event-options policy enable-on-ping-completed events ping_test_completed set event-options policy enable-on-ping-completed within 5 trigger on set event-options policy enable-on-ping-completed within 5 trigger 1 set event-options policy enable-on-ping-completed attributes-match ping_test_completed.test-owner matches icmp-ping-probe set event-options policy enable-on-ping-completed attributes-match ping_test_completed.test-name matches ping-probe-test set event-options policy enable-on-ping-completed then change-configuration retry count 5 set event-options policy enable-on-ping-completed then change-configuration retry interval 4 set event-options policy enable-on-ping-completed then change-configuration commands "set interfaces ge-0/0/1 description "AAAAAA" set event-options policy enable-on-ping-completed then change-configuration commit-options log "updating configuration from event policy enable-on-ping"
POLICY TROUBLESHOOTING:
To see the policy hits:
show services rpm probe-result
> show policy statistics Default>>>OSPF
Policy Default>>>OSPF:
[705] Term Inject:
from [13 0] proto BGP
[13 0] route filter:
0.0.0.0/0 exact
then [13 0] ospf-external-type 1 [13 0] accept
[692] Term Reject:
then [692 0] reject
To test a policy BEFORE APPLYING IT:
> show policy statistics eBGP_OUT
Policy eBGP_OUT:
[647] Term AdvertiseOut:
from
[5 0] route filter:
148.64.56.0/24 exact
then [5 0] accept
[642] Term Reject:
then [642 0] reject
CoS:
show interfaces queue xe-5/1/0 show interfaces queue xe-5/1/0 forwarding-class <name>
TROUBLESHOOTING:
set cli timestamp show snmp statistics extensive show system statistics [upd/arp/bridge/icmp] [extended] # Note this is for **switch bound packets!** show system buffers # route engine's packet memory (mbuf). To diagnose fragmentation in the re show pfe statistics traffic
FORWARDING CONSOLE TROUBLESHOOT / DEBUGGING
INTERNAL FRAME PATH“VTY”
Check this session: vty_fpc.txt ; https://packetpushers.net/junos-useful-show-commands-capture-data-verification-troubleshooting-part-2/
run start shell vty fpc5 show nhdb id <index> # to see what the forwarding table actually does with that route show shim halp-analyser
request pfe execute command "show nhdb type unicast" target fpc3 | match xe
CPU USAGE: Don't use sh chassis routing engine (deceiving as everything under 'CPU utilization' is time, not load based (eg kernel 15 means kernel has been doing things 15% of the last 10 seconds)
Do this instead:
show system processes extensive | except 0.0 | refresh 1
CAPTURE PACKETS DESTINED TO THE ROUTING ENGINE:
To capture packets going to the routing engine:
rtsockmon -t # If it shows a lot of add/delete routes there might be an issue with exception traffic
rtsockmon : to view the actual route replication process
INVESTIGATE QUEUE DEPTH FOR ARPs:
on 12.3R12.4 ARP is assigned to DSAIdx 5 and it goes to queue 2a which has 300pps bandwidth:
lcdd , link card daemon:connects you to various other parts of the switch (including the software forwarding infrastructure (sfid), chassis manager (chassism),
and the virtual chassis system (vccpd).
More info here and here:
>start shell %lcdd 0 sfid [ 0 means fpc 0 ] # Connects to the software forwarding infrastructure (sfid) process in fpc0 sfid<1>#show stats ge-1/0/28 cpucodes Counter Type Rx Tx [...]\ ARP 1027 0 # 1027 ARP packets get received on interface ge-1/0/28 sfid<1>#show stats ge-1/0/28 hw-cpucodes DsaCode Rx Tx 2 326657 0 5 1027 0 # This dsacode hit with same number of packets (ARP is assigned to DSAIdx 5 and it goes to queue 2a. This queue has 300ppp bw [...]
PFEM1(vty)# show shim ddos cpu-code 5 Dev DSAIdx CpuCode Client State Q DP Trunc TgtCPU RLMode StatRLIdx RLIdx Rate 0 005 00032 any notcare 2 green 0 0 1 0 20 Q2a 300 # from PFE you can check rate-limit for Dsacode/idx 5. (300)
FACTORY RESET 4200:
https://www.juniper.net/documentation/en_US/release-independent/junos/topics/task/configuration/ex-series-switch-default-factory-configuration-reverting.html
request system zeroize
SNAPSHOTING PARITION IN EX2200 (NO EXTERNAL MEDIA):
show system storage partitions show system snapshot media internal request system snapshot slice alternate << if all good, snapshot from the current (healthy) to the other one)
If it doesn't work, it could be that the altroot is still mounted. see this: https://www.b00z.nl/blog/2016/04/juniper-srx-error-could-not-format-alternate-root-solution/
TROUBLESHOOT MAC TABLE ISSUES:
show ethernet-switching table show ethernet-switching flood show ethernet-switching statistics mac-learning interface xe-3/0/3 detail monitor interface ge-0/0/1
MAC-CHURNING (issue these commands every 5secs and compare):
show ethernet-switching mac-learning-log show ethernet swithching table
JUNOS NAMING CONVENTION: