This section lists known behavior, system maximums, and limitations in hardware and software in Juniper Networks CSO Release 5.1.2.
After you upgrade CSO from Release 4.1.2 to Release 5.1.2, the new functionality for the site is available only after you upgrade the site.
While you upgrade from CSO Release 4.1.2 to CSO Release 5.1.2, MariaDB might fail to restore at the first attempt. MariaDB is restored successfully in the next attempt.
The SRX4100 and SRX4200 devices support all existing SD-WAN features, except the following:
Phone-home client (PHC)—The devices must be manually activated by copying the stage-1 configuration from the CSO portal, pasting it to the console of the SRX4100 and SRX4200 devices, and then committing the stage-1 configuration.
LTE and xDSL interfaces.
In a dual SRX Series cluster, the devices must be manually activated by copying the stage-1 configuration from the CSO portal, pasting it to the console of the SRX Series device, and then committing the configuration.
LTE and xDSL interfaces are not supported for dual CPE devices.
xDSL interfaces are not supported for an NFX250 device with Junos OS Release 18.4R3.3.
You cannot remotely access a cloud spoke device and edit the configuration.
You can install and use only an external LTE Vodafone K5160 dongle to the NFX250 device.
DVPN is not supported for cloud spoke sites.
NFX150 is not supported in cluster mode.
PHC is supported for EX2300, EX3400, and EX4300 switches (except EX4300-MP) with Junos OS Release 18.4R2 and later. The CSO release is qualified for Junos OS Release 18.3R1, and the PHC capability is currently not supported for EX Series switches that are onboarded with Junos OS Release 18.3R1.
If the PHC capability is not supported for EX Series switches, you must manually copy the stage-1 configuration from the CSO portal and paste it to the device console to commit the stage-1 configuration when you create a LAN site or activate an EX Series switch.
Performance of SSL proxy may not be as expected on SRX300 and SRX320 devices.
Class-of-service (CoS) configuration on Layer 2 interfaces (ge-0/0/port number) is not supported on NFX150 CPE devices.
Do not zeroize EX2300 and EX3400 devices as doing so might result in unexpected behavior.
Service chaining is not supported for an NFX150 device with Junos OS Release 19.3R2-S3.
Creation and deletion of DVPN tunnels based on the DVPN create and delete thresholds are governed by the MAX_DVPN_TUNNELS and MIN_TUNNELS_TO_START_DVPN_DEACTIVATE parameters, respectively. However, MAX_DVPN_TUNNELS and MIN_TUNNELS_TO_START_DVPN_DEACTIVATE are not honored when DVPNs are created or deleted from the CSO UI. This might cause the total active DVPN tunnels count on the Site > WAN tab to show a greater value than the MAX_DVPN_TUNNELS value configured for that site.
DVPN create and delete thresholds are based on the APPTRACK_SESSION_CLOSE messages. When APPTRACK_SESSION_CLOSE messages reach the specified threshold, an alarm is generated for creating or deleting a DVPN tunnel. However, the alarms are not cleared until the APPTRACK_SESSION_CLOSE message count goes below the threshold (for create alarms) or above the threshold (for delete alarms) to trigger a fresh cycle. This causes the create and delete alarms to remain active and prevent further alarms and to, thus, slow down the creation or deletion of tunnels.
Passive probes created by an SD-WAN policy time out because of inactivity in 60 seconds. This causes CSO to close the corresponding sessions and trigger APPTRACK_SESSION_CLOSE messages. The APPTRACK_SESSION_CLOSE messages are tracked and added to the number of sessions closed. The sessions closed count is used to calculate the DVPN delete threshold.
An SD-WAN policy deployment is successful even if there is no matching WAN link meeting the SLA. This is expected behavior and it ensures that when a WAN link matching the SLA becomes available, traffic is routed through that link.
The policy intents defined for a firewall or an SD-WAN policy must not have conflicts with other policy intents in that policy because such conflicts lead to inconsistent behavior. For example:
You cannot define an SD-WAN policy with one policy intent for application X and SLA profile S-1 and another policy intent for application X and SLA profile S-2.
You cannot define two firewall policy intents with the same source and destination endpoints but one with action Allow and another with action Deny.
If WAN link endpoints are not of similar type but overlay tunnels are created based on matching mesh tags, the static policy for site-to-site or central Internet breakout traffic gives preference to the remote link type.
Advanced SLA configurations, such as CoS rate limiting, are not supported during local breakout if no specific application is selected; that is, if Application is set to ANY. Choose specific applications if you want to enable advanced SLA configurations, such as CoS rate limiting.
If two or more SD-WAN policy rules are configured for the same application with different levels of granularity, such as all, sites, and departments, then CSO applies the CoS rate limiter in the same order in which you have created the intents.
When a Virtual Chassis member goes down, the chassis view shows the last known status of the Virtual Chassis member ports until the member is up again.
UTM Web filtering is not supported in an active-active SRX Series cluster device.
CSO uses RSA-key-based authentication when establishing an SSH connection to a managed CPE device. The authentication process requires that the device has a configured root password, and you can use Administration Portal to specify the root password in the device template.
To specify a root password for the device:
When you try to deploy a LAN segment on an SRX Series spoke device, the CSO GUI allows you to select more than one port for a LAN segment. However, for SRX Series devices, only one port for a LAN segment can be deployed; multiple ports in a LAN segment can be deployed only on NFX Series devices.
On a site with an NFX Series device, if you deploy a LAN segment without the VLAN ID specified, CSO uses an internal VLAN ID meant for internal operations and this VLAN ID is displayed in the LAN section of the Site Detail View page. There is no impact on the functionality.
Do not create departments that have names starting with default, default-reverse, mpls, internet, or default-hub because CSO uses the following departments for internal use:
Default-vpn_name
Default-reverse-vpn_name
mpls-vpn_name
internet-vpn_name
Default-hub-vpn_name
The time take to upgrade a site or an image is dependant on the time taken to copy the image to a device. To reduce the time, ensure that you stage the image before you upgrade a site or an image.
When you use Mozilla Firefox to access the CSO GUIs, a few pages do not work as expected. We recommend that you use Google Chrome version 60 or later to access the CSO GUIs.
When you copy and paste a stage–1 configuration from Chrome version 71.0.3578.98, insert a new line, as shown in the following example, in the private key text:
-----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,1F6A1336016A8239 ADD A NEW LINE HERE 2C638z/Lgr/g4Kw7r9lys9XWnUGbGnPpT1cc5jGq1Qbb8Nu286QsVGfrUy7Qh9sU FJkIQI9bOMNadLL7wklsnwBCVAoAYjX+haizSaZzDphT6XBzph35BN9M0Zmb+Kpn fH5i5FZx8FJixbnonCmaVrWFgWcwUi+ijUKp/h9NfE5c2W5m2VBdmRjBfjWo9jcH HV5gkkoG0Gdx7Kv60HKOMDl2YkjL4zfAzBS8J8BMmk5x6sY+GqNQOdgs7m4oXYCH 1loOYS6n9l0WDZcxXYWWeINlu6zOSIlZYVIdwaE0OMDvoA82tzTHFmMy2kA48FHJ
If you do not insert the new line, the private key fails.
On an NFX Series device:
To activate a virtualized network function (VNF), perform the following steps:
To retry the activation of a VNF that failed, perform the following steps:
Class-of-service (CoS) configuration on Layer 2 interfaces (ge-0/0/port number) is not supported on NFX150 CPE devices.
Enterprise hub is not supported for cloud spoke sites.
CSO internally uses IP addresses starting from 100.112.0.0 through 100.127.255.255. You must avoid using these IP addresses in LAN subnets.
NFX250 uses some IP addresses in the 192.0.2.0/24 subnet for VNF management. You must avoid using these IP addresses in LAN. For more information on the usage of this subnet, see the NFX250 documentation.