Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Known Behavior

 

This section lists known behavior, system maximums, and limitations in hardware and software in Juniper Networks CSO Release 5.2.0.

Device Management

  • CSO does not support cluster-level Return Material Authorization (RMA) for SRX dual CPE devices. Only cluster node-level RMA is supported.

  • The SRX4100 and SRX4200 devices support all existing SD-WAN features, except the following:

    • Phone-home client (PHC)—The devices must be manually activated by copying the stage-1 configuration from the CSO portal, pasting it to the console of the SRX4100 and SRX4200 devices, and then committing the stage-1 configuration.

    • LTE and xDSL interfaces.

  • In a dual SRX Series cluster, the devices must be manually activated by copying the stage-1 configuration from the CSO portal, pasting it to the console of the SRX Series device, and then committing the configuration.

  • LTE Mini-PIM is not supported for dual CPE devices.

  • You cannot remotely access a cloud spoke device and edit the configuration.

  • You can intall and use only an external LTE Vodafone K5160 dongle to the NFX250 device.

Dynamic VPN (DVPN)

  • Creation and deletion of DVPN tunnels based on the DVPN create and delete thresholds are governed by the MAX_DVPN_TUNNELS and MIN_TUNNELS_TO_START_DVPN_DEACTIVATE parameters, respectively. However, MAX_DVPN_TUNNELS and MIN_TUNNELS_TO_START_DVPN_DEACTIVATE are not honored when DVPNs are created or deleted from the CSO UI. This might cause the total active DVPN tunnels count on the Site > WAN tab to show a greater value than the MAX_DVPN_TUNNELS value configured for that site.

  • DVPN create and delete thresholds are based on the APPTRACK_SESSION_CLOSE messages. When APPTRACK_SESSION_CLOSE messages reach the specified threshold, an alarm is generated for creating or deleting a DVPN tunnel. However, the alarms are not cleared until the APPTRACK_SESSION_CLOSE message count goes below the threshold (for create alarms) or above the threshold (for delete alarms) to trigger a fresh cycle. This causes the create and delete alarms to remain active and prevent further alarms and to, thus, slow down the creation or deletion of tunnels.

  • Passive probes created by an SD-WAN policy time out because of inactivity in 60 seconds. This causes CSO to close the corresponding sessions and trigger APPTRACK_SESSION_CLOSE messages. The APPTRACK_SESSION_CLOSE messages are tracked and added to the number of sessions closed. The sessions closed count is used to calculate the DVPN delete threshold.

  • DVPN is not supported for cloud spoke sites.

Policy Deployment

  • An SD-WAN policy deployment is successful even if there is no matching WAN link meeting the SLA. This is expected behavior and it ensures that when a WAN link matching the SLA becomes available, traffic is routed through that link.

  • The policy intents defined for a firewall or an SD-WAN policy must not have conflicts with other policy intents in that policy because such conflicts lead to inconsistent behavior. For example:

    • You cannot define an SD-WAN policy with one policy intent for application X and SLA profile S-1 and another policy intent for application X and SLA profile S-2.

    • You cannot define two firewall policy intents with the same source and destination endpoints but one with action Allow and another with action Deny.

  • You must not start the Custom Application Signature name or Custom Application Signature Group name with the keyword Junos. This keyword is reserved for only predefined applications.

SD-WAN

  • If WAN link endpoints are not of similar type but overlay tunnels are created based on matching mesh tags, the static policy for site-to-site or central Internet breakout traffic gives preference to the remote link type.

  • Advanced SLA configurations, such as CoS rate limiting, are not supported during local breakout if no specific application is selected; that is, if Application is set to ANY. Choose specific applications if you want to enable advanced SLA configurations, such as CoS rate limiting.

  • If two or more SD-WAN policy rules are configured for the same application with different levels of granularity, such as all, sites, and departments, then CSO applies the CoS rate limiter in the same order in which you have created the intents.

  • On the WAN tab of the Site-Name page, the link metrics graph displays aggregated data. Therefore, in cases where the aggregation interval overlaps between source and destination link data, the link metrics graph displays incorrect data.

  • On the SD-WAN Events page, when you hover the mouse over the Reason field of link switch events, sometimes Above Target is displayed instead of the absolute SLA metric value for very large values (for example, for an SLA metric value that is 100 times the target value).

  • When an SD-WAN policy is deployed and a high rate of traffic flows through the CPE device, this might lead to network congestion and introduce delays or cause traffic loss. However, even though an SLA violation is reported, the traffic does not switch to a different link.

  • In device redundancy mode, when you reboot a node, the device fails to generate a few system logs. Because a few system logs are not generated, the link switch event in CSO displays the same interface as the source interface and the destination interface.

  • Sometimes duplicate link switch events are displayed on the Link Switch Events page.

  • If any spoke site in a tenant doesn’t use the Internet breakout WAN link of the provider hub to provision the overlay tunnel, then the site-to-Internet traffic is dropped.

  • You cannot use an NFX150 dual CPE device for deploying SD-WAN services.

  • Active-active mode is not supported with cloud breakout for GRE tunnels.

  • ADSL and VDSL links may not work when the NFX250 image is upgraded to Junos OS Release 18.4R3.3.

SD-LAN

  • In a tenant that has network segmentation enabled across multiple departments, overlapping LAN segments are not supported.

  • This CSO release is qualified and recommended for ZTP with PHC on EX2300, EX3400, and EX4300 switches running Junos OS Release 18.4R2 and later. CSO does not recommend ZTP with PHC on Junos OS Release 18.3R1 for EX2300, EX3400, and EX4300 switches.

    EX2300-MP, EX4300-MP, EX4600, and EX4650 switches do not support PHC. For these devices, you must manually copy the stage-1 configuration from the CSO GUI and paste it on the device console to commit the stage-1 configuration when you create a LAN site or activate an EX Series switch.

    Table 3 shows the EX Series switches and the Junos OS release in which CSO supports PHC.

    Table 3: EX Series Switches and Junos OS Releases and CSO Releases That Support PHC

    EX Series Switches That Support PHC

    Junos OS Support Version

    CSO Qualified Junos OS Support Version

    EX2300/EX3400

    18.2R1

    18.4R2 and later

    EX4300

    18.3R1

    18.4R2 and later

    EX2300-MP

    19.1R1

    Manually copy stage-1 configuration

    EX4300-MP

    19.1R1

    Manually copy stage-1 configuration

    EX4600

    19.1R1

    Manually copy stage-1 configuration

    EX4650

    Not Supported

    Manually copy stage-1 configuration

  • Do not zeroize EX2300 and EX3400 devices as doing so might result in unexpected behavior.

  • When a Virtual Chassis member goes down, the chassis view shows the last known status of the Virtual Chassis member ports until the member is up again.

Security Management

  • SSL proxy is supported on SRX300 and SRX320 devices running Junos OS Release 18.4R3 or later. However, the performance of SSL proxy may not be as expected.

Site and Tenant Workflow

  • When tenants are created, ensure that the tenant name is unique across the CSO instance; that is, the same tenant name should not be there in any of the OpCo networks on the CSO instance.

  • In the Add Site workflow, use IP addresses instead of hostnames for the NTP server configuration. If you are using hostnames instead of IP addresses, ensure that the hostname is DNS-resolvable; if the hostname is not DNS-resolvable, ZTP for the device fails.

  • CSO uses RSA-key-based authentication when establishing an SSH connection to a managed CPE device. The authentication process requires that the device has a configured root password, and you can use Administration Portal to specify the root password in the device template.

    To specify a root password for the device:

    1. Log in to Administration Portal.
    2. Select Resources > Device Templates.
    3. Select the device template and click Edit.
    4. Specify the plain text root password in the ENC_ROOT_PASSWORD field.
    5. Click Save.
  • When you try to deploy a LAN segment on an SRX Series spoke device, the CSO GUI allows you to select more than one port for a LAN segment. However, for SRX Series devices, only one port for a LAN segment can be deployed; multiple ports in a LAN segment can be deployed only on NFX Series devices.

  • On a site with an NFX Series device, if you deploy a LAN segment without the VLAN ID specified, CSO uses an internal VLAN ID meant for internal operations and this VLAN ID is displayed in the LAN section of the Site Detail View page. There is no impact on the functionality.

  • Do not create departments that have names starting with default, default-reverse, mpls, internet, or default-hub because CSO uses the following departments for internal use:

    • Default-vpn_name

    • Default-reverse-vpn_name

    • mpls-vpn_name

    • internet-vpn_name

    • Default-hub-vpn_name

Topology

  • DHCP configuration on WAN links on a SD-WAN hub is not supported.

User Interface

  • When you use Mozilla Firefox to access the CSO GUIs, a few pages do not work as expected. We recommend that you use Google Chrome version 60 or later to access the CSO GUIs.

  • When you copy and paste a stage–1 configuration from Chrome version 71.0.3578.98, insert a new line, as shown in the following example, in the private key text:

    If you do not insert the new line, the private key fails.

General

  • If you choose to purge the audit log with the Archive and Store in Local Location option selected, you need to contact Juniper Networks for accessing the locally archived audit logs. We recommend that you use the Archive and Store in Remote Location option for easy access to archived logs. When you run an audit log purge with the Archive and Store in a Remote Location option selected, ensure that the remote server where you want to archive the purged audit logs is reachable from CSO.

  • A LAN segment deploy job is handled in two parts in the following sequence:

    1. LAN segment-related policies are deployed.

    2. Firewall policies are deployed.

    However, the deploy job status is updated as soon as the first part is completed. Because of this, a deploy job for a LAN segment is shown as a success even though the associated firewall policy deployment is still in progress.

  • On an NFX Series device:

    • To activate a virtualized network function (VNF), perform the following steps:

      1. Add the VNF to the device.
      2. Initiate the activation workflow and ensure that the job is 100% completed.
    • To retry the activation of a VNF that failed, perform the following steps:

      1. Deactivate the VNF.
      2. Remove the VNF.
      3. Add the VNF to the device.
      4. Initiate the activation workflow and ensure that the job is 100% completed.
  • Class-of-service (CoS) configuration on Layer 2 interfaces (ge-0/0/port number) is not supported on NFX150 CPE devices.

  • Enterprise hub is not supported for cloud spoke sites.

  • Table 4 lists the reserved IP address pool range used by CSO and, therefore, should not be used for production:

    Table 4: Reserved IP Address Pool

    IP Address Range

    Reserved for

    To Be Avoided in

    Comments

    172.31.31.0/24

    Internal use by CSO, and LT interfaces of NFX250, NFX150, and SRX Series devices

    LAN subnets and WAN

    CSO uses some IP addresses (172.31.31.16, 172.31.31.18, 172.31.31.20) in this subnet; using this subnet may interfere with traffic path.

    172.31.32.0/24

    Internal use by CSO

    LAN subnets

    CSO uses some IP addresses in this subnet; using this subnet may interfere with traffic path.

    192.168.2.0/24

    NFX150 phone-home client and NFX250

    WAN

    LAN when used as a tenant public pool and advertised to underlay as part of multi access shared bearer (MASB).

    Routes in this subnet are active in the inet.0 routing table.

    192.0.2.0/24

    NFX250 (for OAM)

    WAN

    LAN when used as a tenant public pool and advertised to underlay as part of MASB.

    Configured on fxp0 interface; routes present in inet.0 routing table

    100.124.0.0/14

    Loopback range in NFX250, NFX150, and SRX Series devices

    WAN

    LAN when used as a tenant public pool and advertised to underlay as part of Multi access Shared Bearer (MASB).

    Used in on-premises installation; routes present in inet.0 routing table

    Note

    The IP address 192.168.0.1 is used for internal operations. However, you can use the 192.168.0.1 IP address in your LAN and WAN subnetworks without affecting traffic.