Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Junos OS Release Notes for MX Series 5G Universal Routing Platforms

 

These release notes accompany Junos OS Release 17.4R3 for the MX Series. They describe new and changed features, limitations, and known and resolved problems in the hardware and software.

You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located at https://www.juniper.net/documentation/product/en_US/junos-os.

New and Changed Features

This section describes the new features and enhancements to existing features in Junos OS Release 17.4R3 for the MX Series routers.

Release 17.4R3 New and Changed Features

Subscriber Management and Services

  • Preventing validation of magic numbers in PPP peer-originated keepalive messages (MX Series)—Starting in Junos OS Release 17.4R3, you can include the ignore-magic-number-mismatch statement to disable the Packet Forwarding Engine from validating PPP magic numbers received during PPP keepalive (Echo-Request/Echo-Reply) exchanges. Because validation is not performed, the Packet Forwarding Engine does not detect whether the remote peer sends a magic number that does not match the number agreed upon during LCP negotiation. This prevents PPP from tearing down the session in the event of a mismatch. This capability is useful when the remote PPP peers include arbitrary magic numbers in the keepalive packets. Configuring this statement has no effect on LCP magic number negotiation or on the exchange of keepalives when the remote peer magic number is the expected negotiated number.

    [See Preventing the Validation of PPP Magic Number During PPP Keepalive Exchanges and Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile.]

Release 17.4R2-S2 New and Changed Features

Routing Protocols

  • Support for creating IS-IS topology independent LFA for prefix-SIDs learned from LDP mapping server —Starting in Junos OS Release 17.4R2-S2, you can configure a point of local repair to create a topology independent loop-free alternate backup path for prefix-SIDs derived from LDP mapping server advertisements in an IS-IS network. In a network configured with segment routing, IS-IS uses the LDP mapping server advertisements to derive prefix-SIDs. LDP Mapping server advertisements for IPv6 are currently not supported.

    To attach flags to LDP mapping server advertisements, include the attached statement at the [edit routing-options source-packet-routing mapping-server-entry mapping-server-name] hierarchy level.

Release 17.4R2 New and Changed Features

EVPNs

  • EVPN proxy ARP and ARP suppression without IRB interfaces (MX Series routers with MPCs, EX9200 switches)—MX Series routers and EX9200 switches that function as provider edge (PE) devices in an Ethernet VPN-MPLS (EVPN-MPLS) or Ethernet VPN-Virtual Extensible LAN (EVPN-VXLAN) environment support proxy Address Resolution Protocol (ARP) and ARP suppression. The proxy ARP and ARP suppression capabilities are enabled by default.

    Starting with Junos OS Release 17.4R2, these features no longer require the configuration of an integrated routing and bridging (IRB) interface on the PE device. Now, any interface configured on a PE device can deliver ARP requests from local remote customer edge (CE) devices. ARP proxy and ART suppression are not supported on remote CE’s.

    In addition, you can now control the following aspects of the media access control (MAC)-IP address bindings database on a PE device:

    • The maximum number of MAC-IP address entries in the database

    • The amount of time a locally learned MAC-IP address binding remains in the database

    [See EVPN Proxy ARP and ARP Suppression.]

Interfaces and Chassis

  • Enhancement to increase the threshold of corrected single-bit errors (MPC7E, MPC8E, MPC9E on MX Series)—In Junos OS Release 17.4R2, the threshold of corrected single-bit error is increased from 32 to 1024, and the alarm severity is changed from Major to Minor for those error messages. There is no operational impact upon corrected single bit errors. Also, a log message is added to display how many single-bit errors have been corrected between the reported events as follows:

    EA[0:0]: HMCIF Rx: Link0: Corrected single bit errordetected in HMC 0 - Total count 25

    EA[0:0]: HMCIF Rx: Link0: Corrected single bit errordetected in HMC 0 - Total count 26

    [See Alarm Overview.]

MPLS

  • Interoperability of segment routing with LDP (MX Series)—In an LDP network with gradual deployment of segment routing, some devices may not support segment routing, which can cause interoperability issues in the network. Starting in Junos OS Release 18.2R1, and 17.4R2, you can use OSPF or ISIS to enable segment routing devices to operate with the LDP devices that are not segment routing capable.

    To implement this feature using OSPF, an extended prefix link-state advertisement (LSA) with Range type, length, and value (TLV) for all the LDP prefixes is generated, and mapping routes corresponding to the prefix is installed in the inet.3 and mpls.0 routing tables.

    To implement this feature using ISIS, a server-client configuration is required under protocols ISIS and LDP, respectively, and routes from the inet.3 or inet.0 routing tables are used for stitching of segment routing LSP with an LDP LSP and vice-versa.

    [See LDP Mapping Server for Interoperability of Segment Routing with LDP Overview .]

Restoration Procedures and Failure Handling

  • Device recovery mode introduced in Junos OS with upgraded FreeBSD (MX Series)—In Junos OS Release 17.4R2, for devices running Junos OS with upgraded FreeBSD, provided you have saved a rescue configuration on the device, there is an automatic device recovery mode that goes into action should the system go into amnesiac mode.The new process is for the system to automatically retry to boot with the saved rescue configuration. In this circumstance, the system displays a banner "Device is in recovery mode” in the CLI (in both the operational and configuration modes). Previously, there was no automatic process to recover from amnesiac mode. A user with load and commit permission had to log in using the console and fix the issue in the configuration before the system would reboot.

    [See Saving a Rescue Configuration File.]

Software Installation and Upgrade

  • ZTP support is added for MX VM host platforms (MX Series)—In Junos OS Release 17.4R2, ZTP, which automates the provisioning of the device configuration and software image with minimal manual intervention, is supported on MX Series VM hosts. When you physically connect a supported device to the network and boot it with a factory configuration, the device attempts to upgrade the Junos OS software image automatically and autoinstall a configuration provided on the DHCP server.

    [See Understanding Zero Touch Provisioning.]

Subscriber Management and Services

  • Controlling search behavior for address allocation from linked pools (MX Series)—Starting in Junos OS Release 17.4R2, you can use the linked-pool-aggregation statement at the [edit access] hierarchy level to change how addresses are allocated from linked IP address pools. When you configure the statement, addresses can be assigned from a later pool in the chain before an earlier pool is depleted. When the statement is not configured, IP addresses are assigned contiguously, so that all addresses are allocated from the matching pool and then the first pool in the chain before addresses are assigned from a linked pool.

    [See Configuring Address-Assignment Pool Linking.]

Release 17.4R1 New and Changed Features

Hardware

  • Support for the CFP2-DCO-T-WDM-1 transceiver on the MPC5E-100G10G MPC and the MIC6-100G-CFP2 MIC (MX Series)—Starting in Junos OS Release 17.4R1, you can install the CFP2-DCO-T-WDM-1 transceiver on the MPC5E-100G10G MPC and the MIC6-100G-CFP2 MIC (installed on the MX2K-MPC6E MPC). The CFP2-DCO-T-WDM-1 transceiver is a 100-Gigabit digital pluggable CFP2 digital coherent optical module.

    The CFP2-DCO-T-WDM-1 transceiver supports the following:

    • International Telecommunication Union (ITU)-standard OTN performance monitoring and alarm management

    • 100-Gigabit quadrature phase shift keying (QPSK) with differential encoding mode and soft-decision forward error correction (SD-FEC)

    • proNX Service Manager (PSM)

    • Junos OS YANG extensions

    • Firmware upgrade

    [See 2x100GE + 4x10GE MPC5E and 100-Gigabit Ethernet MIC with CFP2.]

Authentication, Authorization, and Accounting (AAA) (RADIUS)

  • Periodic refresh of authorization profile on TACACS+ server (MX Series)—Starting with Junos OS Release 17.4R1, periodic refresh of the authorization profile that is received from the TACACS server is supported. The authorization profile that is configured for the user on the TACACS server is sent to the Junos OS device after the user is successfully authenticated. The authorization profile is stored locally on the Junos OS device. With the periodic refresh feature, the authorization profile is periodically fetched from the TACACS server to refresh the authorization profile that is stored locally. User authorization is reevaluated using the refreshed authorization profile.

    [See Configuring Periodic Refresh of the TACACS+ Authorization Profile.]

  • Enhanced TACACS+ support for the dedicated management instance (MX Series and vMX)—Starting in Junos OS Release 17.4R1, TACACS+ behavior is enhanced to support the management interface in a non-default virtual routing and forwarding (VRF) instance. For supported platforms, TACACS+ packets can now be sent to the server successfully even with the management-instance configuration statement enabled. The dedicated management instance was released in Junos OS Release 17.3R1.

    [See Management Interface in a Non-Default Instance and management-instance.]

Class of Service (CoS)

  • New criteria introduced for when to throttle logins based on CoS queues (MX Series)—Starting in Junos OS Release 17.4R1, new criteria are incorporated into the throttling decision for subscriber access. CoS resources (queues) are taken into account when deciding whether to avoid accepting new subscriber logins when there are insufficient CoS resources. To support this behavior, a new CLI configuration statement (high-cos-queue-threshold) is introduced to enable usage of CoS resource monitoring in throttling decisions and to set the threshold of CoS resource usage above which new logins are not permitted. A new show command (show system resource-monitor ifd-cos-queue-mapping fpc) is also introduced.

    [See “Throttling Subscriber Load Based on CoS Resource Capacity” in Resource Monitoring for Subscriber Management and Services Overview, high-cos-queue-threshold, and show system resource-monitor ifd-cos-queue-mapping fpc].

  • Support for static Type of Service (ToS)/Traffic Class on GRE tunnels (MX Series)—Starting in Junos OS Release 17.4R1, MPCs on MX Series routers support the setting of a static ToS/Traffic Class value in the IPv4/IPv6 header, respectively, of a GRE tunnel. You can set a traffic-class value at the interfaces gre-interface-name unit logical-unit-number tunnel hierarchy level. The value represents the entire 8-bit differentiated services (DS) field in the IP header, ranging from 0-255, and should be chosen based on the desired DSCP/IP precedence value. For example, if a DSCP value of 111000 is desired, then configure the traffic-class value to be 224 (corresponding to 111000 00).

    [See traffic-class (Tunnels).]

Dynamic Host Configuration Protocol (DHCP)

  • Support for RADIUS reauthentication of DHCPv4 and DHCPv6 clients (MX Series)—Starting in Junos OS Release 17.4R1, reissue of the RADIUS authentication request [access-request] is supported as an alternative to RADIUS Change of Authorization (CoA) to change subscriber session characteristics.

    Reauthentication is enabled by the following triggers:

    • The reauthenticate remote-id-mismatch command specifies reauthentication when there is a remote-id change in the option of the control packet (for example, RENEW, REBIND, DISCOVER, or SOLICIT) for the DHCPv4 or DHCPv6 client.

    • The reauthenticate lease-renewal command specifies reauthentication for a renew or rebind.

    • The reauthentication-on-renew command indicates to reauthentication on every renew or rebind from the DHCPv4 or DHCPv6 client.

    • If both reauthenticate lease-renewal and the Reauthentication-on-renew are specified for a given subscriber, the Junos DHCPD (DHCP daemon) requests reauthentication from the RADIUS server every time the DHCP client sends a DHCP renew request. If the reauthentication-on-renew vendor-specific attribute (VSA) is disabled, then behavior reverts to reauthenticate lease-renewal configuration.

    • If both reauthenticate lease-renewal and the reauthentication-on-renew VSA are enabled for a given subscriber

      • Junos OS DHCPD requests reauthentication from the RADIUS server every time the DHCP client sends a DHCP renew request (as reauthentication-on-renew VSA is enabled).

      • If the client sends a discover or solicit with DHCP options indicating a service plan change (different remote-id), Junos DHCPD will request reauthentication (as Junos OS DHCPD configuration reauthenticates on remote-id mismatch).

      • If the client sends a discover or solicit with DHCP options indicating No service plan change (same remote-id), Junos OS DHCPD will not request reauthentication (as the discover or solicit are not renews, and there is no remote-id mismatch).

      • If the reauthentication-on-renew VSA is disabled, then Junos OS DHCPD only reauthenticates when there is a renew, discover or solicit with a remote-id change (service plan change).

    [See RADIUS Reauthentication As an Alternative to RADIUS CoA for DHCPv4 and DHCPv6 Subscribers Overview.]

  • Support for forward-only action for DHCP relayed traffic with unknown DHCP server address (MX Series)—Starting in Junos OS Release 17.4R1, forward-only action for DHCP relayed traffic is supported with unknown DHCP server address. Administrator is able to configure for which servers (clients are binding) they need to have relay subscriber entry, apply dynamic profile, policies and more, and for whom they want to forward only. This feature also introduces configuration for processing destination address, option-54 and option-2 on DHCP relay.

    DHCP relay agent entry will be useful for authentication, authorization, accounting, applying filtering, QoS to client, processing of options specified in the packet. Customer networks can contain non-customer controlled bindings for which the customer does not want these relay agent entry functionalities. Hence relay agent subscriber entries are not created for non-customer controlled bindings.

    Prior to 17.4R1 Release, subscriber entry creation constituted of Junos OS DHCPD (DHCP daemon) memory resources, session database resources, authentication procedure, accounting, dynamic profile instantiation, dynamic interface creation, firewall, CoS association, and more. if a customer network has some non-customer controlled traffic for which a relay agent entry is created then it would be an unnecessary utilization of resources, and an incorrect association of profiles.

    [See Forward-only Action for DHCPv4 and DHCPv6 Relay Traffic with Unknown DHCP Server Address Overview.]

EVPNs

  • Support for duplicate MAC address detection and suppression (MX Series)—When a MAC address relocates, PE devices can converged on the latest location by using sequence numbers in the extended community field. Misconfigurations in the network can lead to duplicate MAC addresses. Starting in Junos OS Release 17.4R1, Juniper supports duplicate MAC address detection and suppression.

    You can modify the duplicate MAC address detection settings on the router by configuring the detection window for identifying duplicate MAC address and the number of MAC address moves detected within the detection window before duplicate MAC detection is triggered and the MAC address is suppressed. In addition, you can also configure an optional recovery time that the router waits before the duplicate MAC address is automatically unsupressed.

    To configure duplicate MAC detection parameters, use the detection-window, detection-threshold, and auto-recovery-time statements at the [edit routing instance routing-instance-name protocols evpn duplicate-mac-detection] hierarchy level.

    To clear duplicate MAC suppression manually, use the clear evpn duplicate-mac-suppression command.

    [See Overview of MAC Mobility. ]

  • Enhancements to composite next hops (MX Series)—Starting in Junos OS Release 17.4R1, you can enable dynamic list next hop. By enabling this feature, when the link fails between the CE device and a multihomed PE device in EVPN active-active multihoming, the routing process daemon (rpd) dynamically modifies the next-hop list without first removing the next-hop entry and creating a new entry. This reduces mass MAC route withdrawals and improves convergence and performance.

    To enable dynamic list next hop, include the dynamic-list-next-hop statement at the [edit routing-options forwarding-table] hierarchy level. If you perform a unified ISSU to upgrade your device from an OS release prior to Junos OS Release 17.4R1, you must upgrade both the Routing engine and the backup Routing Engine before enabling dynamic list next hop.

    [See Configuring Dynamic List Next Hop.]

  • EVPN active standby multihoming to a single PE device (MX Series)—Starting in Junos OS Release 17.4R1, Juniper supports EVPN active-standby multihoming. When you configure a protect (backup) interface for a primary interface on the same PE router, the protect interface becomes active when the primary interface fails and network traffic is switched to the protect interface.

    To configure a protect interface, include the protect-interface statement at the [edit interfaces hierarchy level for a routing instance, EVPN bridge domain, and the EVPN protocol under EVPN VPWS routing instance.

    [See Configuring EVPN Active-Standby Multihoming to a Single PE.]

  • SPRING support for EVPN (MX Series)—-Starting in Junos OS Release 17.4R1, Junos OS supports using Source Packet Routing in Networking (SPRING) as the underlay transport in EVPN. SPRING tunnels enable routers to steer a packet through a specific set of nodes and links in the network.

    To configure SPRING, use the source-packet-routing statement at the [edit protocols isis] hierarchy level.

    [See Understanding Source Packet Routing in Networking (SPRING).]

  • EVPN-MPLS interworking with MC-LAG (MX Series routers)—Starting with Junos OS Release 17.4R1, you can use Ethernet VPN (EVPN) to extend your MC-LAG network over an MPLS network. Typically, an MC-LAG network is extended to a data center network or geographically distributed campus or enterprise network.

    The EVPN-MPLS interworking feature offers the following benefits:

    • Ability to use separate virtual routing and forwarding (VRF) instances to control inter-VLAN routing.

    • VLAN translation.

    • Default Layer 3 virtual gateway support, which eliminates the need to run such protocols as Virtual Router Redundancy Protocol (VRRP).

    • Load balancing to better utilize both links when using EVPN multihoming.

    • The use of EVPN type 2 advertisement routes (MAC+IP) reduces the need for flooding domains with ARP packets.

    [See Understanding EVPN-MPLS Interworking with Junos Fusion Enterprise and MC-LAG.]

General Routing

  • Support for PTP over IPv4 and hybrid mode on 10GE, 40G, and 100GE WAN ports (MX10003, MX204)—Starting in Junos OS Release 17.4R1, the 10GE, 40G, and 100GE WAN ports support the following features:

    • PTP over IPV4 Encapsulation—In PTP over IPv4, the nodes (master and slave devices) participate in unicast negotiation in which the slave node is provisioned with the IP address of the master node and requests unicast messages to be sent to it from the master node.

    • Hybrid mode—In hybrid mode, the Synchronous Ethernet equipment clock (EEC) derives the frequency from Synchronous Ethernet and the phase and time of day from PTP.

      [See Understanding Hybrid Mode]

    • PHY timestamping support—PHY timestamping is the timestamping of the 1588 event packets at the PHY. Timestamping the packet in the PHY eliminates the noise or the Packet Delay Variation (PDV) that is introduced by the Packet Forwarding Engine (PFE).

      [See phy-timestamping]

  • Support for PTP over Ethernet, hybrid mode, and G.8275.1 profile (MPC7E-10G, MPC7E-MRATE, MPC8E, MPC9E)—Starting in Junos OS Release 17.4R1, MPC7E-10G, MPC7E-MRATE, MPC8E, and MPC9E support the following features:

    • PTP over Ethernet— PTP over Ethernet enables effective implementation of packet-based technology that enables the operator to deliver synchronization services on packet- based mobile backhaul networks. PTP over Ethernet uses multicast addresses for communication of PTP messages between the slave clock and the master clock. The IEEE 1588 standard defines two types of multicast MAC addresses 01-80-C2-00-00-0E (link local multicast) and 01-1B-19-00-00-00 (standard Ethernet multicast) for PTP over Ethernet operations.

    • Hybrid mode— In hybrid mode, the Synchronous Ethernet equipment clock (EEC) derives the frequency from Synchronous Ethernet and the phase and time of day from PTP.

      [See Understanding Hybrid Mode]

    • G.8275.1 profile— The G.8275.1 is a PTP profile for applications requiring accurate phase and time synchronization. It supports the architecture defined in ITU-T G.8275 to enable the distribution of phase and time with full timing support and is based on the second version of PTP defined in (IEEE 1588). You can configure the G.8275.1 profile by including the profile-type g.8275.1 statement at the [edit protocols ptp] hierarchy level.

      [See Precision Time Protocol Overview]

High Availability (HA) and Resiliency

  • Hardware resiliency support (MX204)—Starting in Junos OS Release 17.4R1, MX204 routers support the resiliency feature, which includes hardware failure and fault handling. Resiliency on an MX204 enhances its debugging capability in the case of hardware failure of any of its components. For example, the resiliency feature enables the router to recover from inter-integrated circuit (I2C) failure, and improves its voltage monitoring, temperature monitoring, PCI Express error handling and reporting. DRAM single-bit and multibit error checking and correction (ECC), and SSD SMART attribute monitoring capabilities.

  • L2VPN connection last uptime preserved after switchover (MX Series)—Starting in Junos OS Release 17.4R1, the show l2vpn connections command displays the last time that the L2VPN connection was in the Up condition, and this value persists after a switchover or unified ISSU.

    [See show l2vpn connections]

Interfaces and Chassis

  • Support for JNP-MIC-100G MIC with MACsec support on MPC8E and MPC9E (MX2000 line of routers)—Starting in Junos OS Release 17.4R1, the JNP-MIC-100G MIC extends Media Access Control Security (MACsec) capabilities on MPC8E and MPC9E MPCs installed in MX2010, MX2020, and MX2008 routers. Each MPC supports two JNP-MIC-100G MICs. On an MPC8E, each MIC supports 48 10-Gigabit Ethernet, 12 40-Gigabit Ethernet, or 4 100-Gigabit Ethernet MACsec-capable interfaces, or a combination. On an MPC9E, each MIC supports 48 10-Gigabit Ethernet, 12 40-Gigabit Ethernet, or 8 100-Gigabit Ethernet MACsec-capable interfaces, or a combination. Support for MACsec increases security within a data center and also provides secured connectivity between data centers.

    [See Understanding Media Access Control Security (MACsec) on MX Series Routers on basic information about MACsec.]

  • MX204 Universal Routing Platform—Starting in Junos OS Release 17.4R1, the MX204 Universal Routing Platform is added to the MX Series family of routers. The MX204 is a highly dense 1 rack unit (1 U) chassis that offers speeds of up to 400 Gbps and can be used as a preaggregation chassis and in mobile backhaul scenarios.

    The MX204 router is a fixed-configuration router, and supports one fixed Routing Engine. The MX204 has four rate-selectable ports that can be configured as 100-Gigabit Ethernet ports or 40-Gigabit Ethernet ports, or each port can be configured as four 10-Gigabit Ethernet ports (by using a breakout cable). The MX204 also has eight 10-Gigabit Ethernet ports. The four rate-selectable ports support QSFP28 and QSFP+ transceivers, whereas the eight 10-Gigabit Ethernet ports support SFP+ transceivers.

    [See MX204 Router Rate-Selectability Overview and Supported Active Physical Rate-Selectable Ports to Prevent Oversubscription on MX204 Router.]

  • MX204 router supports port LED for 4xQSFPP ports—Starting in Junos OS Release 17.4R1, port LED is supported on MX204 routers. LEDs on the interface cards display the status of the ports. In MX204 router, there are four port LEDs per port. Each port provides an individual status LED with four states signaled by the color/LED state: OFF, GREEN, AMBER, RED

    [See MX204 LED Scheme Overview.]

  • Support for power management and environmental monitoring in MX204 routers—Starting with Junos OS Release 17.4R1, Junos OS chassis management software for the MX204 routers provides enhanced environmental monitoring and power management. MX204 routers have one Routing Engine and MPC. The MPC has one Packet Forwarding Engine that supports a bandwidth up to 400 Gbps. The MPC supports two fixed Physical Interface Card (PIC) where PIC0 comprises four QFP28 ports and PIC1 comprises 8 XSFPP ports. The power supply and the fan trays are upgradable. The cooling system contains three fan assemblies with two fans in each assembly. The chassis has two redundant power supply modules (PSM): DC PSM and AC PSM. Each of these PSMs deliver 650 W of power.

  • Software feature support on MX204 routers— Starting with Junos OS Release 17.4R1, Junos OS supports the MX204 Universal Routing Platform (model number: JNP204 [MX204]). The MX204 chassis is a monolithic system containing in-built MPC with one EA ASICs (operating in 400G mode) and supports 2 fixed port PICs (4xQSFP28 PIC and 8xSFPP PIC). All the devices including Packet Forwarding Engines, WAN interfaces are managed by the CPU subsystem (8 core Broadwell CPU). There are no fabric ASICs in the MX204 router.

    The MX204 router is a 400G capable monolithic platform having a single board with 8 Core Intel Broadwell CPU with 1 EA Packet Forwarding Engine ASICs connected to each other back to back.

    The following features are supported on MX204 platform:

    • Basic Layer 2 features including Layer 2 Ethernet OAM and virtual private LAN service (VPLS)

    • Class of service (CoS)

    • Firewall filters and policers

    • Integrated routing and bridging (IRB)

    • Layer 2 protocols

    • Layer 2 VPNs, Layer 2 circuits, and Layer 3 VPNs

    • Layer 3 routing protocols and MPLS

    • Layer 3 inline services

    • Multicast forwarding

    • Port mirroring

    • Spanning-tree protocols, such as STP, MSTP, RSTP, and VSTP

    • Synchronous Ethernet and Precision Time Protocol (IEEE 1588)

    • Tunneling

  • Support for MACsec PSK keychain (MX2010, MX2020)—Starting in Junos OS Release 17.4R1, MX2020 and MX2010 supports Key Agreement Protocol Fail Open mode. The MACsec PSK chains hitless rollover feature is documented in Junos OS Release 17.4R1, but not supported.

  • Strong encryption for configuration secrets (MX2020, MX2010, and MX2008 routers)—Starting in Junos OS Release 17.4R1, the MX2020, MX2010 and MX2008 routers support strong encryption for configuration secrets. To use strong encryption for your configuration secrets, you need to configure a master password. The master password enables you to derive an encryption key that you use with the AES256-GCM standard to encrypt configuration secrets. This new encryption method uses the $8$ formatted strings.

    [See Hardening Shared Secrets in Junos OS.]

  • Support for pre-FEC BER monitoring when using the CFP2-DCO-T-WDM-1 transceiver (MX Series)—Starting in Junos OS Release 17.4R1, you can monitor the condition of an OTN link by using the pre-forward error correction (pre-FEC) bit error rate (BER) when using the CFP2-DCO-T-WDM-1 transceiver.

    [See Understanding Pre-FEC BER Monitoring and BER Thresholds.]

Junos OS XML API and Scripting

  • Automation script library additions and upgrades (MX Series)—Starting in Junos OS Release 17.4R1, devices running Junos OS include new and upgraded Python modules as well as upgraded versions of Junos PyEZ and libslax. On-box Python automation scripts can use features supported in Junos PyEZ Release 2.1.4 and earlier releases to perform operational and configuration tasks on devices running Junos OS. Python automation scripts can also leverage new on-box Python modules including ipaddress, jxmlease, pyang, serial, and six, as well as upgraded versions of existing modules. In addition, SLAX automation scripts can include features supported in libslax release 0.22.0 and earlier releases.

    [See Overview of Python Modules Available on Devices Running Junos OS and libslax Distribution Overview.]

Layer 2 Features

  • Support for new configuration statements to perform qualified MAC learning on inner VLAN tags (MX Series) —Starting with Junos OS Release 17.4R1, MX series routers support the following new configuration statements:

    • deep-vlan-qualified-learning vlan_tag_number at the [edit interfaces unit logical_unit_number] hierarchy level to enable qualified mac-learning on the third VLAN tag (innermost) of an ingress 3-tagged packet, without any kind of implicit VLAN manipulation. If the packet has two tags, MAC learning happens on the second VLAN. If the ingress packet has more than three tags, all tags beyond the third tag are treated as part of data. For bidirectional traffic flow, input-vlan-map pop has to be configured.

    • vlan-id inner-all at the [edit routing instances instance_name] to enable qualified MAC learning on the second (inner) VLAN tag of an ingress double tagged packet, without removing the first (outer) tag implicitly. For a single-tagged packet, qualified MAC learning happens on VLAN 4096. If the ingress packet has more than two tags, all tags beyond the second tag are treated as part of data.

Logical Systems

  • Storm control In logical systems (MX Series)—Starting in Junos OS Release 17.4R1, support for storm control has been added for logical systems running on MX Series devices. With storm control, you can set a traffic threshold and enable traffic monitoring so that whenever the threshold is reached, the router automatically starts dropping broadcast, unknown unicast, and/or multicast (BUM) packets in order to prevent a “storm” of packets from proliferating on the network.

    To use this feature with a given logical system, create a storm control profile at the [edit logical-systems name forwarding-options storm-control-profiles name] hierarchy level.

    [See Understanding Storm Control for Managing Traffic Levels.]

  • EVPNs on logical systems (MX Series)—Starting with Junos OS Release 17.4R1, support for Ethernet Virtual Private Network (EVPN) has been added for logical systems running on MX Series devices. Running EVPN in a logical system provides the same options and performance as running EVPN on a physical system, which adheres to the standards described in RFC 7432. Note that Graceful Restart, Graceful Routing Engine switchover (GRES), and nonstop active routing (NSR) are not supported.

    Configure EVPN on a logical system at the [edit logical-systems logical-system-name routing-instances routing-instance-name protocols evpn] level.

    [See EVPN Overview .]

Management

  • Support for IS-IS sensor for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can export data for the IS-IS routing protocol through the Junos Telemetry Interface. Only gRPC streaming is supported. To export statistics for IS-IS, include the /network-instances/network-instance[name_'instance-name']/protocols/protocol/isis/levels/level/ and /network-instances/network-instance[name_'instance-name']/protocols/protocol/isis/interfaces/interface/levels/level/ set of paths. Use the telemetrySubscribe RPC to specify telemetry parameters and provision the sensor. Streaming telemetry data through gRPC also requires you to download the OpenConfig for Junos OS module.

    [See Guidelines for gRPC Sensors (Junos Telemetry Interface).]

  • Support for Packet Forwarding Engine traffic sensor for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can export Packet Forwarding Engine traffic statistics through the Junos Telemetry Interface. Both UDP and gRPC are supported. This sensor tracks reporting of Packet Forwarding Engine statistics counters and provides visibility into Packet Forwarding Engine error and drop statistics. The resource name for the sensor is /junos/system/linecard/packet/usage/. The OpenConfig path is /components/component/subcomponents/subcomponent[name='FPC<id>:NPU<id>']/properties/property/, where NPU refers to the Packet Forwarding Engine. To provision the sensor to export data through gRPC, use the telemetrySubcribe RPC to specify telemetry parameters. For streaming through UDP, all parameters are configured at the [edit services analytics] hierarchy level.

    [See Overview of the Junos Telemetry Interface.]

  • Enhancements to LSP events sensor for Junos Telemetry Interface (MX Series) —Starting with Junos OS Release 17.4R1, telemetry data streamed through gRPC for LSP events and properties is reported separately for each routing instance. To export data for LSP events and properties, you must now include /network-instances/network-instance/[name_'instance-name']/ in front of all supported paths. For example, to export LSP events for RSVP signaling protocol attributes, use the following path: /network-instances/network-instance[name_'instance-name']/mpls/signaling-protocols/rsvp-te/. Use the telemetrySubscribe RPC to specify telemetry parameters and provision the sensor. If your device is running a version of Junos OS with an upgraded FreeBSD kernel, you must download the Junos Network Agent software package, which provides the interfaces to manage gRPC subscriptions.

    [See Guidelines for gRPC Sensors.]

  • Enhancement to BGP sensor for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can specify to export the number of BGP peers in a BGP group for telemetry data exported through gRPC. To export the number of BGP peers for a group, use the following OpenConfig path: /network-instances/network-instance[name_'instance-name']/protocols/protocol/

    bgp/peer-groups/peer-group[name_'peer-group-name]/state/peer-count/
    . The BGP peer count value exported reflects the number of peering sessions in a group. For example, for a BGP group with two devices, the peer count reported is 1 (one) because each group member has one peer. To provision the sensor to export data through gRPC, use the telemetrySubcribe RPC to specify telemetry parameters.

    [See Guidelines for gRPC Sensors.]

  • Broadband edge (BBE) telemetry sensors (MX Series routers)—In Junos OS Release 17.4R1, support is expanded for BBE telemetry sensors. These sensors are used to proactively manage a broadband network gateway (BNG) and are configured using both Junos Telemetry Interface (JTI) and gRPC streaming. The new sensors are grouped in the following functional areas:

    • Chassis and system extensions

    • Authentication, authorization, and accounting (AAA)

    • Dynamic Host Configuration Protocol (DHCP)

    • Packet Forwarding Engine resource monitoring

    Streaming telemetry data through gRPC also requires you to download the OpenConfig for Junos OS module.

    [See Guidelines for gRPC Sensors (Junos Telemetry Interface).]

  • Enhancements to MPLS sensor for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can export statistics for MPLS through the Junos Telemetry Interface in the following categories:

    • Shared Risk Link Groups (SRLGs)

    • Traffic engineering global attributes

    • Traffic engineering interface attributes

    Additional RSVP signaling protocol attributes, such as counters and interfaces, that were not previously available are also supported. Only gRPC streaming is supported.

    [See Guidelines for gRPC Sensors.]

  • Support for bidirectional authentication for gRPC for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can configure gRPC to require client authentication as well as server authentication. Previously, only the client initiating an RPC request was able to authenticate the server;, that is, a Juniper device using SSL certificates. To enable bidirectional authentication, include the mutual-authentication statement at the [edit system-services extension-service request-response grpc ssl] hierarchy level. You must also configure and reference a certificate-authority profile. Include the certificate-authority profile name statement at the [edit system services extension-service request-response grpc ssl] hierarchy level. For profile-name, include the name of certificate-authority profile configured at the [edit security pki ca-profile] hierarchy level. This profile is used to validate the certificate provided by the client.

    Note

    MX80 and M104 routers do not support gRPC.

    [See gRPC Services for Junos Telemetry Interface.]

  • Support for BGP routing table sensors for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can provision Junos Telemetry Interface sensors to export data for BGP routing tables (RIBs) for IPv4 and IPv6 routes. Each address family supports exporting data for five different tables. Only gRPC streaming is supported.

    The tables are:

    • local-rib—Main BGP routing table for the main routing instance.

    • adj-rib-in-pre—NLRI updates received from the neighbor before any local input policy filters have been applied.

    • adj-rib-in-post—Routes received from the neighbor eligible for best-path selection after local input policy filters have been applied.

    • adj-rib-out-pre—Routes eligible for advertising to the neighbor before output policy filters have been applied.

    • adj-rib-out-post—Routes eligible for advertising to the neighbor after output policy filters have been applied.

    To stream data for the main BGP routing table for IPv4 routes, include the /bgp-rib/afi-safis/afi-safi/ipv4-unicast/loc-rib/ set of paths. To stream data for the main BGP routing table for IPv6 routes, include the /bgp-rib/afi-safis/afi-safi/ipv6-unicast/loc-rib/ set of paths.

    For the neighbor BGP routing tables for IPv4 routes, include the following sets of paths:

    • /bgp-rib/afi-safis/afi-safi/ipv4-unicast/neighbors/neighbor/adj-rib-in-pre/

    • /bgp-rib/afi-safis/afi-safi/ipv4-unicast/neighbors/neighbor/adj-rib-in-post/

    • /bgp-rib/afi-safis/afi-safi/ipv4-unicast/neighbors/neighbor/adj-rib-out-pre/

    • /bgp-rib/afi-safis/afi-safi/ipv4-unicast/neighbors/neighbor/adj-rib-out-post/

    To stream data for IPv6 routes, change ipv4-unicast to ipv6-unicast in any of the paths.

    [See Guidelines for gRPC Sensors.]

  • Junos Telemetry Interface support for virtual MX Series routers (vMX)—Starting with Junos OS Release 17.4R1, the Junos Telemetry Interface is supported on vMX routers. The Junos Telemetry Interface enables you to provision sensors to stream telemetry data for network elements without involving polling. All sensors supported on MX Series routers are supported on vMX routers, except for the following: fabric statistics and high queue-scale statistics. To provision a sensor to export data through gRPC, use the telemetrySubscribe RPC to specify telemetry parameters. For UDP streaming, all parameters are configured at the [edit services analytics] hierarchy level. Streaming telemetry data through gRPC also requires you to download the OpenConfig for Junos OS module.

    [See Overview of the Junos Telemetry Interface.]

  • Multiservices MPC (MS-MPC) support for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, interfaces configured on MS-MPCs support the Junos Telemetry Interface, which enables you to provision sensors to stream telemetry data for network elements without involving polling. Only streaming through UDP is supported. gRPC streaming is not supported. To provision sensors to stream data through UDP, all parameters are configured at the [edit services analytics] hierarchy level.

    Only the following sensors are supported on MS-MPCs:

    • Firewall filters

    • CPU memory

    • NPU memory

    • NPU memory utilization

    • Physical interfaces

    [See Configuring a Junos Telemetry Interface Sensor.]

  • Junos Telemetry Interface support on MX2008 routers (MX Series)—Starting with Junos OS Release 17.4R1, the Junos Telemetry Interface, which enables you to provision sensors to stream telemetry data for network elements without involving polling, is supported on MX2008 routers. Both UDP and gRPC streaming are supported. To provision the sensor to export data through gRPC, use the telemetrySubscribe RPC to specify telemetry parameters. For streaming through UDP, all parameters are configured at the [edit services analytics] hierarchy level. Streaming telemetry data through gRPC also requires you to download the OpenConfig for Junos OS module.

    [See Overview of the Junos Telemetry Interface.]

  • Support for dynamic tunnel statistics for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can export counter statistics for Packet Forwarding Engine dynamic tunnels. Both UDP and gRPC streaming are supported. The resource string to export statistics is /junos/services/ip-tunnel/usage/. The OpenConfig path is /junos/services/ip-tunnel[name='tunnel-name']/usage/counters[name='counter-name']/. All parameters for UDP sensors are configured at the [edit services analytics] hierarchy level. To export data through gRPC, use the telemetrySubscribe RPC. To stream data through gRPC, you must also download the OpenConfig for Junos OS module. MX80 and MX104 routers only support UDP streaming. They do not support gRPC.

    [See Overview of the Junos Telemetry Interface.]

  • Support for bypass LSP statistics for Junos Telemetry Interface (MX Series)—Starting with Junos OS Release 17.4R1, you can export statistics for bypass label-switched paths (LSPs). Previously, only statistics for the primary LSP path were exported. The ability to export bypass LSP statistics helps to monitor the efficiency of global convergence when the bypass LSP is used to carry traffic during a link or node failure.

    Statistics are exported for the following:

    • Bypass LSP originating at the ingress router of the protected LSP

    • Bypass LSP originating at the transit router of the protected LSP

    • Bypass LSP protecting the transit LSP as well as the locally originated LSP

    When the bypass LSP is active, traffic is exported both on the bypass LSP and the ingress (protected) LSP. To provision the sensor to export data through gRPC, use the telemetrySubcribe RPC to specify telemetry parameters. For streaming through UDP, all parameters are configured at the [edit services analytics] hierarchy level. Streaming telemetry data through gRPC also requires you to download the OpenConfig for Junos OS module. You must also include the sensor-based-stats statement at the [edit protocols mpls] hierarchy level.

    [See sensor and Guidelines for gRPC Sensors.]

  • Support for multiple, smaller configuration YANG modules (MX Series)—Starting in Junos OS Release 17.4R1, the YANG module for the Junos OS configuration schema is split into a root configuration module that is augmented by multiple, smaller modules. The root configuration module comprises the top-level configuration node and any nodes that are not emitted as separate modules. Separate, smaller modules augment the root configuration module for the different configuration statement hierarchies. Smaller configuration modules enable YANG tools and utilities to more quickly and efficiently compile and work with the modules, because they only need to import the modules required for the current operation.

    [See Understanding the YANG Modules That Define the Junos OS Configuration.]

MPLS

  • Support for Ethernet CCC encapsulation on pseudowire subscriber transport and services logical interfaces (MX Series)—Starting in Junos OS Release 17.4R1, you can configure the same Ethernet circuit cross-connect (CCC) encapsulation (also known as VLAN-ID) on pseudowire subscriber transport and service logical interface. The primary reason for Ethernet CCC encapsulation on the pseudowire subscriber transport is for interoperability between the existing access node and aggregation node in the network.

    Prior to Release 17.4R1, Junos OS does not allow the same VLAN-ID to be configured on more than one logical interface under the same pseudowire subscriber physical interface. To establish a pseudowire connection from an access node or aggregation node to a Multi-Service Edge (MSE) node, ignore-encapsulation-mismatch configuration statement is used. This statement is a Junos OS feature and the access or aggregation device may not support this feature. To overcome this restriction, you can configure same VLAN-ID on transport and service logical interface.

    [See VLAN CCC Encapsulation on Transport Side of Pseudowire Subscriber Logical Interfaces Overview.]

  • Support for static adjacency segment identifier for IS-IS (MX Series)—Starting with Junos OS Release 17.4R1, you can configure static adjacency segment ID (SID) labels for an interface. You can configure two IPv4 adjacency SIDs (protected and unprotected), IPv6 adjacency SIDs (protected and unprotected) per level per interface. You can use the same adjacent SID for multiple interfaces by grouping a set of interfaces under an interface-group and configuring the adjacency-segment for that interface-group. For static adjacency SIDs, the labels are picked from either a static reserved label pool or from segment routing global block (SRGB).

    [See Static Adjacency Segment Identifier for ISIS.]

  • Support for static adjacency segment identifier for aggregate Ethernet member links using single-hop static LSP (MX Series)—Starting with Junos OS Release 17.4R1, you can configure a transit single-hop static label switched path (LSP) for a specific member link of an aggregated Ethernet (AE) interface. A static labeled route is added with next-hop pointing to the AE member link of an aggregate interface. Label for these routes is picked from the segment routing local block (SRLB) pool of the configured static label range. This feature is supported for AE interfaces only.

    A new member-interface CLI command is added under the next-hop configuration at the [edit protocols mpls static-label-switched-path lsp-name transit] hierarchy to configure the AE member interface name. The static LSP label is configured from a defined static label range.

    [See Configuring Static Adjacency Segment Identifier for Aggregate Ethernet Member Links Using Single-hop Static LSP.]

  • Support for segment routing statistics (MX Series Routers with MPCs and MICs)—Starting in Junos OS Release 17.4R1, the traffic statistics in a segment routing (SR) network can be recorded in an OpenConfig compliant format for Layer 3 interfaces. The statistics is recorded for the Source Packet Routing in Networking (SPRING) traffic only, excluding RSVP and LDP-signaled traffic, and the family MPLS statistics per interface is accounted for separately. The SR statistics also includes SPRING traffic statistics per link aggregation group (LAG) member, and per service identifier (SID).

    To enable recording of SR statistics, include the sensor-based-stats (per-interface-per-member-link <ingress | egress> | per-sid ingress statement at the [edit protocol isis source-packet-routing] hierarchy level.

    [See Understanding Source Packet Routing in Networking (SPRING).]

  • IPv6 next-hop support for static egress LSPs (MX Series)—Starting in Junos OS Release 17.4R1, static LSPs on the egress router can be configured with IPv6 as the next-hop address for forwarding IPv6 traffic. Previously, only IPv4 static LSPs were supported. The IPv6 static LSPs share the same transit, bypass, and static LSP features of IPv4 static LSPs.

    A commit failure occurs when the next-hop address and destination address of the static LSP do not belong to the same address family (IPv4 or IPv6).

    [See next-hop (Protocols MPLS).]

Operation, Administration, and Maintenance (OAM)

  • Support for Inline performance monitoring (MX Series Routers)—Starting in Junos OS Release 17.4R1, Junos OS supports inline mode for MEF 35 compliant service OAM performance monitoring on MX Series routers. Performance monitoring functions include measurement of Ethernet frame delay, frame delay variations, frame loss, and availability of service. By default, performance monitoring packets are handled by the CPU of a line-card, such as Modular Port Concentrator (MPC). Enabling inline mode of performance monitoring delegates the processing of the protocol data units (PDUs) to the forwarding ASIC (that is, to the hardware). By enabling inline mode of performance monitoring, the load on the CPU of the line-card is reduced and you can configure an increased number of performance monitoring sessions and achieve maximum scaling for service OAM performance monitoring sessions.

    Inline mode of performance monitoring is supported only for proactive mode of frame delay measurement (Two-way Delay Measurements) and synthetic loss measurements (SLM) sessions. Performance monitoring functions configured using the iterator profile (CFM) are referred to as proactive performance monitoring. Inline mode of performance monitoring for frame loss measurement using service frames (LM) is not supported.

    Note

    MPC3E (MX-MPC3E-3D) and MPC4E (MPC4E-3D-32XGE-SFPP and MPC4E-3D-2CGE-8XGE) do not support inline performance monitoring. User-defined Data TLV is not supported if you have configured inline mode of performance monitoring. Also, only 12 history records per PM sessions are supported.

  • Support for CFM monitoring on pseudowire services interfaces(MX Series Routers)—Starting in Junos OS Release 17.4R1, Junos OS supports IEEE 802.1ag connectivity fault management (CFM) on pseudowire service interfaces. Pseudowire service interfaces support configuring of subscriber interfaces over MPLS pseudowire termination. Termination of subscriber interfaces over PW enables network operators to extend their MPLS domain from the Access/Aggregation network to the service edge and use uniform MPLS label provisioning for a larger portion of their network. ​

    To enable support for CFM on pseudowire service interfaces, configure maintenance intermediate points (MIPs) on the pseudowire service interfaces. The CFM MIP session is supported only on the pseudowire services interface and not on the pseudowire services tunnel interface.

Routing Protocols

  • Support for timing and synchronization on MX204 Routers—Starting in Junos OS Release 17.4R1, MX204 routers support the following timing and synchronization features:

    • SyncE support with ESMC—Synchronized Ethernet with Ethernet Synchronization Message Channel (ESMC) is supported as per the ITU G.8264 specification. ESMC is a logical communication channel. It transmits synchronization status message information, which is the quality level of the transmitting Synchronous Ethernet equipment clock, by using ESMC protocol data units.

    • PTP support—Precision Time Protocol (PTP), also known as IEEE 1588v2, is a packet-based technology that enables the operator to deliver synchronization services on packet-based mobile backhaul networks. IEEE 1588 PTP (Version 2) clock synchronization standard is a highly precise protocol for time synchronization that synchronizes clocks in a distributed system. The time synchronization is achieved through packets that are transmitted and received in a session between a master clock and a slave clock. One-step clock mode operation for the master clock is supported.

    • BITS (T1/E1) Interface support—BITS support for input and output on T1/E1 framed and 2.048MHz unframed clock input.

    • GPS external clock interface and TOD support—GPS input and output support for 1 MHz/5 MHz/10 MHz and PPS signal

  • Support for importing IGP topology information into BGP-LS (MX Series)—Starting in Junos OS Release 17.4R1, you can import interior gateway protocol (IGP) topology information into BGP-Link State (BGP-LS) in addition to RSVP-traffic engineering (RSVP-TE) topology information through the lsdist.0 routing table. This allows you to monitor both IGP and traffic engineering topology information.

    To install IGP topology information into the traffic engineering database, use the set igp-topology configuration statement at the [edit protocols isis traffic-engineering] and [edit protocols ospf traffic-engineering] hierarchy levels. To import IGP topology information into BGP-LS from lsdist.0, use the set bgp-ls configuration statement at the [edit protocols mpls traffic-engineering database import igp-topology] hierarchy level.

    [See Link-State Distribution Using BGP Overview.]

  • BGP supports segment routing policy for traffic engineering (MX Series)—Starting in Junos OS Release 17.4R1, a BGP speaker supports traffic steering based on a segment routing policy at ingress routers. The controller can specify a segment routing policy consisting of multiple paths to steer labeled or IP traffic. The segment routing policy adds an ordered list of segments to the header of a packet for traffic steering. Static policies can be configured at ingress routers to allow routing of traffic even when the link to the controller fails.

    To enable BGP IPv4 segment routing traffic engineering capability for an address family, include the segment-routing-te statement at the [edit protocols bgp family inet] hierarchy level.

    [See Understanding Ingress Peer Traffic Engineering for BGP SPRING.]

  • Support for EVPN control plane with VXLAN data plane encapsulation (MX150)—Starting in Junos OS Release 17.4R1, MX150 routers, powered with vMX, decouples an underlay network from the tenant overlay network with VXLAN. By using a Layer 3 IP-based underlay coupled with a VXLAN-EVPN overlay, you can deploy larger networks than those possible with traditional Layer 2-based networks. With overlays, end-points (servers and virtual machines) can be placed anywhere in the network and remain connected to the same logical Layer 2 network. One of the key benefits is that virtual topology can be decoupled from the physical topology.

  • Support for Layer 2 VXLAN gateway (MX150)—Starting in Junos OS Release 17.4R1, MX150 routers, powered with vMX, that support a Virtual Extensible LAN (VXLAN) can function as a hardware virtual tunnel endpoint (VTEP ). In this role, the Juniper Networks device encapsulates in VXLAN packets Layer 2 Ethernet frames received from software applications that run directly on a physical server. The VXLAN packets are tunneled over a Layer 3 fabric. Upon receipt of the VXLAN packets, software VTEPs in the virtual network de-encapsulate the packets and forward the packets to virtual machines (VMs).

  • Support for BGP advertising aggregate bandwidth across external BGP links for load balancing (MX Series)—Starting in Junos OS Release 17.4R1, BGP uses a new link bandwidth extended community, aggregate-bandwidth, to advertise aggregated bandwidth of multipath routes across external links. BGP calculates the aggregate of multipaths that have unequal bandwidth allocation and advertises the aggregated bandwidth to external BGP peers. A threshold to the aggregate bandwidth can be configured to restrict the bandwidth usage of a BGP group. In earlier Junos OS releases, a BGP speaker receiving multipaths from its internal peers advertised the link bandwidth associated with the active route. To advertise aggregated bandwidth of multipath routes and to set a maximum threshold, configure a policy with aggregate-bandwidth and limit bandwidth actions at the [edit policy-options policy-statement name then] hierarchy level.

    [See Advertising Aggregate Bandwidth Across External BGP Links for Load Balancing Overview.]

  • Topology-independent loop-free alternate for IS-IS (MX Series)—Starting in Junos OS Release 17.4R1, topology-independent loop-free alternate (TI-LFA) with segment routing provides MPLS fast reroute (FRR) backup paths corresponding to the post-convergence path for a given failure. You can enable TI-LFA for IS-IS by configuring the use-post-convergence-lfa statement at the [edit protocols isis backup-spf-options] hierarchy level. TI-LFA provides protection against link failure, node failure, and failures of fate-sharing groups.

    You can enable the creation of post-convergence backup paths for a given interface by configuring the post-convergence-lfa statement at the [edit protocols isis interface interface-name level level] hierarchy level. The post-convergence-lfa statement enables link-protection mode.

    You can enable node-protection and/or fate-sharing-protection mode for a given interface at the [edit protocols isis interface interface-name level level post-convergence-lfa] hierarchy level. To use a particular fate-sharing group as a constraint for the fate-sharing-aware post-convergence path, you need to configure the use-for-post-convergence-lfa statement at the [edit routing-options fate-sharing group group-name] hierarchy level.

    [See Understanding Topology-Independent Loop-Free Alternate with Segment Routing for IS-IS.]

  • Support for trace route through an interface through the inactive routes (MX Series)—Starting in Junos OS Release 17.4R1, you can configure traceroute to send out packets through an inactive next hop by specifying the traceroute next-hop address to a destination through an inactive next hop.

    [See Traceroute for Inactive Interface.]

  • Support for network instance based BGP configuration (MX Series)—Starting in Junos OS Release 17.4R1, you can configure BGP in a specific network instance. After the network instance is configured, you will be prompted with options for BGP configuration such as global bgp, neighbor bgp, and so on. See Mapping OpenConfig Network Instance Commands to Junos Operation.

  • Support for EBGP route server (MX Series)—Starting in Junos OS Release 17.4R1, BGP feature is enhanced to support EBGP route server functionality. A BGP route server is the external BGP (EBGP) equivalent of an internal IBGP (IBGP) route reflector that simplifies the number of direct point-to-point EBGP sessions required in a network. EBGP route server propagates unmodified BGP routing information between external BGP peers to facilitate high scale exchange of routes in peering points such as Internet Exchange Points (IXPs). When BGP is configured as a route server, EBGP routes are propagated between peers unmodified, with full attribute transparency (NEXT_HOP, AS_PATH, MULTI_EXIT_DISC, AIGP, and Communities).

    The BGP JET bgp_route_service.proto API has been enhanced to support route server functionality as follows:

    • Program the EBGP route server.

    • Inject routes to the specific route server RIB for selectively advertising it to the client groups in client-specific RIBs.

    The BGP JET bgp_route_service.proto API includes a peer-type object that identifies individual routes as either EBGP or IBGP (default).

    [See BGP Route Server Overview.]

Services Applications

  • Inline video monitoring for IPv4-over-MPLS flows on M10003 and MX204 routers—Starting in Junos OS Release 17.4R1, MX10003 and MX204 routers support the inline video monitoring of IPv4-over-MPLS flows to measure media delivery index (MDI) metrics. MDI information enables you to identify devices that are causing excessive jitter or packet loss for streaming video applications.

    [See Configuring Inline Video Monitoring]

  • Port Control Protocol support (MX Series routers with MS-MPCs and MS-MICs)—Starting in Junos OS Release 17.4R1, the Port Control Protocol (PCP) feature is supported on MS-MPCs and MS-MICs. Before Junos OS Release 17.4R1, PCP was supported only on MS-DPC service cards. PCP provides a mechanism to control the forwarding of incoming packets by upstream devices such as NAT44 and firewall devices, and a mechanism to reduce application keepalive traffic. Use PCP in the context of both carrier-grade NATs and small NATs (for example, residential NATs). PCP allows hosts to operate servers for a long time (for example, a webcam) or a short time (for example, while playing a game or on a phone call) when behind a NAT device, including when behind a carrier-grade NAT operated by their Internet service provider. PCP allows applications to create mappings from an external IP address and port to an internal IP address and port.

    PCP on the MS-MPC and MS-MIC supports only NAPT44. PCP with DS-Lite is not supported on the MS-MPC and MS-MIC.

    [See Port Control Protocol Overview, Configuring Port Control Protocol, and Example: Configuring Port Control Protocol with NAPT44.]

  • Increased sampling rate for inline Junos Traffic Vision (MX Series)—Starting in Junos OS Release 17.4R1, the sampling rate that you can configure for inline Junos Traffic Vision (inline active flow monitoring) using the rate number statement at the [edit forwarding-options sampling instance instance-name family (inet |inet6)] and [edit forwarding-options sampling input] hierarchy levels is increased from 65,535 to 16,000,000. This functionality is supported for Inline Active Flow Monitoring on MX Series and vMX routers. This feature is also supported for PIC-based flow monitoring on MX Series routers with certain MPCs. If a line card does not support a sampling rate higher than 65,535, such as an I-chip-based DPC, the maximum sampling rate is limited to 65,535.

    [See Example: Configuring Flow Monitoring on MS-MIC and MS-MPC.]

  • Support for Diffie-Hellman group15, group16, and group24 for IKE SAs and IPsec policies (MX Series)—Starting in Junos OS Release 17.4R1, Diffie-Hellman group15, group16, and group24 for IKE security associations (SAs) and IPsec policies are supported.

    [See Configuring IKE Proposals and Configuring IPsec Policies.]

  • Port forwarding (MX Series routers with MS-MPCs and MS-MICs)—Starting in Junos OS Release 17.4R1, support for port forwarding is extended to the MS-MPC and MS-MIC. Port forwarding allows the destination address and port of a packet to be changed to reach the correct host in a Network Address Translation (NAT) gateway. The translation facilitates reaching a host within a masqueraded, typically private, network based on the port number on which the packet was received from the originating host. Port forwarding allows remote computers, such as public machines on the Internet, to connect to a nonstandard port (port other than 80) of a specific computer within a private network. An example of this type of destination is the host of a public HTTP server within a private network. You can also configure port forwarding without translating a destination address.

    [See Port Forwarding Overview.]

  • Support for 100,000 simultaneous RPM probes from RPM clients for offload RPM (MX Series)—Starting in Junos OS Release 17.4R1, you can enable the application of optimized CLI configuration in the offload-RPM scale configuration and the existing legacy RPM clients supported on MS-MIC and MS-MPC by entering the rpm-scale statement at the [edit services rpm probe probe-owner] hierarchy level and at the [edit groups group-name services rpm] hierarchy level.

    [See Configuring RPM Probes.]

  • Support for CoS revert and direction awareness on services interfaces (MX Series routers with MS-MPCs and MS-MICs)—Starting in Junos OS Release 17.4R1, you can configure a services interface CoS rule to store the DSCP and forwarding class of a packet that is received in the match direction of the rule; this stored DSCP and forwarding class are then applied to packets that are received in the reverse direction of the same session. You can also configure a service set to create a CoS session when a packet is first received in the wrong match direction for a CoS rule; this results in the CoS rule values being applied as soon as a packet in the correct match direction is received.

    [See Configuring CoS Rules.]

  • DS-Lite support on MS-MPCs and MS-MICs (MX Series routers)—Starting in Junos OS Release 17.4R1, the MS-MPC and MS-MIC support dual-stack lite (DS-Lite). DS-Lite employs IPv4-over-IPv6 tunnels to cross an IPv6 access network to reach a carrier-grade IPv4-IPv4 NAT. This facilitates the phased introduction of IPv6 on the Internet by providing backward compatibility with IPv4.

    Prior to Junos OS Release 17.4R1, DS-Lite was supported on the MX Series only on MS-DPCs.

    DS-Lite running on MS-MPCs or MS-MICs does not support the following features, which are supported on MS-DPCs:

    • ALGs

    • Limitations per subnet

    • Clearing NAT mappings and flows for a specific subscriber, for a basic bridging broadband device (B4), or for a specific service set

    • Port Control Protocol

    [See Tunneling Services for IPv4-to-IPv6 Transition Overview.]

  • IPsec NAT-T Support (MX Series)—Starting in Junos OS Release 17.4R1, NAT-T is supported for IKEv1 and IKEv2. Junos OS Release 17.4R1 also supports UDP encapsulation and decapsulation for IKE and ESP packets by specifying disable-natt at the [edit services ipsec-vpn] hierarchy levels. NAT-T is enabled by default.

    [See disable-natt (Services IPsec VPN).]

  • Multiple syslog servers support (MX Series routers with MS-MPCs and MS-MICs)—Starting in Junos OS Release 17.4R1, you can commit multiple syslog hosts (up to four) under the [edit services service-set service-set-name] hierarchy level.

    [See Configuring System Logging for Service Sets.]

  • Support for inline NAT and FlowTapLite on MPC7E, MPC8E, and MPC9E (MX Series)—Starting in Junos OS Release 17.4R1, you can configure inline NAT and FlowTapLite on the following Modular Port Concentrators: MPC7E, MPC8E, and MPC9E.

    [See Inline Network Address Translation Overview for MPCs and Configuring FlowTapLite.]

  • Support for NAT64 with deterministic IP address and port mapping (MX Series routers with MS-MPCs and MS-MICs)—Starting in Junos OS Release 17.4R1, there is support for deterministic NAT64 mapping on the MS-MPC and MS-MIC. Deterministic NAT mapping ensures that a given internal IP address and port are always mapped to the same external IP address and port range, and the reverse mapping of a given translated external IP address and port are always mapped to the same internal IP address. Deterministic NAT mapping eliminates the need for logging address translations.

    [See Configuring Deterministic NAPT.]

  • Support for inline video monitoring for IPv6 flows (MX Series)—Starting in Junos OS Release 17.4R1, MX Series routers support the inline video monitoring of IPv6 flows and IPv6-over-MPLS flows to measure media delivery index (MDI) metrics. MDI information enables you to identify devices that are causing excessive jitter or packet loss for streaming video applications.

    [See Configuring Inline Video Monitoring.]

  • Support for disabling the filtering of HTTP traffic with an embedded IP address belonging to a blacklisted domain (MX Series)—Starting in Junos OS Release 17.4R1, you can disable the filtering of HTTP traffic that contains an embedded IP address (for example, http:/10.1.1.1) belonging to a blacklisted domain name in the URL filter database. To disable the filtering, include the disable-url-filtering statement at the [edit services url-filter profile profile-name template template-name] hierarchy level when you are configuring URL filtering. However, if the embedded IP address is explicitly identified in the blacklisted URL filter database, then the traffic is still filtered.

    [See Configuring URL Filtering.]

Software Defined Networking (SDN)

  • Support for YANG-based abstraction to orchestrate GNFs (MX480, MX960, MX2010, MX2020)—Starting with Junos OS Release 17.4R1, Junos supports YANG-based abstraction to orchestrate guest network functions (GNFs), using single touchpoint. In the single touchpoint method, the SDN controller (for example, OpenDaylight or ODL) communicates only with the base system (BSYS). The BSYS receives the RPC requests from the ODL controller, parses the RPC, and then forwards the adequate RPC to the JDM (based on scripts available at the BSYS). After receiving the response from the JDM, the BSYS parses and forwards the response back to the ODL.

    Note

    Junos Node Slicing also supports management of GNF life cycle using the dual touchpoint method. In this method, ODL sends RPCs to, and receive responses from, JDM and BSYS separately. To enable dual touch point, you just need to mount both BSYS and Juniper Device Manager (JDM) on ODL.

    [See Setting Up YANG-Based Abstraction to Orchestrate GNFs.]

  • Unified ISSU support for Junos Node Slicing (MX480, MX960, MX2010, MX2020)—Starting with Junos OS Release 17.4R1, Junos Node Slicing supports unified ISSU. ISSU enables you to upgrade between two different Junos OS releases with no disruption on the control plane and with minimal disruption of traffic. Now, users with administrator rights can perform unified ISSU on the BSYS, (the base system in a Junos Node Slicing setup) and the guest network functions (GNF) separately. Also, users can run unified ISSU on each GNF independently, without affecting other GNFs.

    Note

    The multi-version software support limitations (such as version difference limits) are also applicable to unified ISSU upgrade.

    [See Understanding the Unified ISSU Process.]

  • Multi-Version software support for Junos Node Slicing (MX480, MX960, MX2010, MX2020)—Starting from Junos OS Release 17.4R1, Junos Node Slicing supports multi-version software compatibility, enabling the BSYS to interoperate with a guest network function (GNF), which runs a Junos OS version that is higher than the software version on the BSYS. This feature supports a deviation of up to two versions between GNF and BSYS. That is, the GNF software can be up to two versions higher than the BSYS software. However, for this feature to work, both BSYS and GNF must meet a minimum version requirement of Junos OS Release 17.4R1.

    Note

    The multi-version software compatibility support is limited to major releases only.

    [See Understanding Multi-Version Software Compatibility.]

  • Improved debugging ability and serviceability for JDM (MX480, MX960, MX2010, MX2020)—Starting with Junos OS release 17.4R1, improved debugging ability and serviceability are provided for Juniper Device Manager (JDM). The following are the key capabilities supported:

    • JDM-JDM keepalive to monitor reachability of the peer JDM, and to provide failover in case one of the JDM instances (running on server 0 and server 1) goes down.

    • A new force option under the CLI command request virtual-network-functions to overwrite a VNF image. Example: request virtual-network-functions vnf-name add-image image-name force

    • New CLI command, show version vnf vnf-name, to show the version details of the guest network functions (GNFs).

    • Dedicated interfaces for JDM and VNF management.

    Configuring JDM on the x86 Servers

  • Abstracted Fabric interface for Junos Node Slicing (MX480, MX960, MX2010, MX2020)—Starting with Junos OS Release 17.4R1, Junos Node Slicing supports Abstracted Fabric (AF) interface, a pseudointerface that represents the behavior of a first class Ethernet interface. An AF interface is created on a GNF to enable it to communicate with the peer GNF when the two GNFs are configured to be connected to each other. The AF interface facilitates routing control and management traffic between GNFs. You can create or delete AF interface from the BSYS. AF interfaces support the following protocol families: inet, inet6, mpls, ccc, and iso.

    Note

    Most of the Layer 1 features and a few of the Layer 2 and Layer 3 features are disabled on AF interfaces.

    [See Abstracted Fabric Interface]

  • Software Support for Junos Node Slicing (MX480, MX960, MX2010, MX2020)—Starting from Junos OS Release 17.4R1, Junos Node Slicing supports the following software features:

    • BNG

    • Business PE router

    • L2VPN or EVPN PE router

    • Multicast

    • Junos Telemetry Interface—An MX Series router in the BSYS mode provides full-fledged JTI support. However, guest network functions (GNFs) provide limited support for JTI (only physical and logical interfaces statistics for FPCs owned by GNFs are available through gRPC).

  • Support for OpenDaylight (ODL) controller on MX Series routers—Starting with Junos OS Release 17.4R1, MX Series routers support OpenDaylight (ODL) controller (Carbon release). The ODL controller, or ODL platform, provides a southbound Network Configuration Protocol (NETCONF) connector API, which uses NETCONF and YANG models to interact with a network device. You can use the ODL controller to carry out configuration changes in MX Series routers, and orchestrate and provision the routers. Also, ODL controller enables you to execute Remote Procedure Calls (RPCs) to MX Series routers to get state information.

    [See Configuring Interoperability Between MX Series Routers and OpenDaylight

Software Installation and Upgrade

  • Support for unified ISSU on MX Series routers with MPC7E-MRATE, MPC7E-10G, MX2K-MPC8E, and MX2K-MPC9E (MX240, MX480, MX960, MX2010, and MX2020)—Starting with Release 17.4R1, Junos OS supports unified in-service software upgrade (ISSU) on MX Series routers with MPC7E-MRATE, MPC7E-10G, MX2K-MPC8E, and MX2K-MPC9E.

    Unified ISSU enables you to upgrade between two different Junos OS releases with no disruption on the control plane and with minimal disruption of traffic.

    [See Getting Started with Unified In-Service Software Upgrade]

  • Support for Zero Touch Provisioning (ZTP) (MX150)—Starting in Junos OS Release 17.4R1, MX150 routers, powered with vMX, support zero touch provisioning. Zero touch provisioning enables you to provision new routers in your network automatically either by executing a script file or by loading a configuration file. In either case, the information is detected in a file on the Dynamic Host Control Protocol (DHCP) server. When you physically connect the MX150 router to the network and boot it with a default configuration, it attempts to upgrade the Junos OS Software automatically using information detected on the DHCP server. If you do not configure the DHCP server to provide this information, the MX150 router boots with the pre-installed software and default configuration.

  • Support for unified ISSU on the CFP2-DCO-T-WDM-1 transceiver (MX Series)—Starting in Junos OS Release 17.4R1, unified in-service software upgrade (unified ISSU) is supported on the CFP2-DCO-T-WDM-1 transceiver when the transceiver is installed on the MPC5E-100G10G MPC or the MIC6-100G-CFP2 MIC (installed on the MX2K-MPC6E MPC).

    [See Getting Started with Unified In-Service Software Upgrade.]

Subscriber Management and Services

  • Support for static subscriber daemon gaps for Gx/Gy support (MX Series)—Starting in Junos OS Release 17.4R1, support for usage based billing are added using the Gy interface for static subscribers. The service-profile is added to the static-subscribers to apply services for all static subscribers at the hierarchy level [edit system services static-subscribers group group-name].

    [See Subscribers on Static Interfaces Overview.]

  • DHCP session liveness detection based on ARP and neighbor discovery packets (MX Series)—Starting in Junos OS Release 17.4R1, you can configure bidirectional Layer 2 liveness detection for directly connected DHCPv4 and DHCPv6 subscribers using ARP packets for v4 and neighbor discovery (ND) packets for v6. You can configure Layer 2 liveness detection for both DHCP local server and DHCP relay clients. This method of liveness detection enables the host and the broadband network gateway (BNG) separately to determine the validity and state of the DHCP client session and to clean up inactive sessions. The liveness detection send functionality enables the BNG to determine client session state based on the host response to request packets the BNG sends at a configurable interval. The liveness detection receive functionality enables the client host to determine session state based on the BNG response to ARP or ND packets sent by the client to the BNG.

    Layer 2 liveness detection (AR/ND) and Bidirectional Forwarding Detection (BFD) are mutually exclusive.

    [See DHCP Liveness Detection Overview.]

  • RADIUS-sourced DHCPv4 and DHCPv6 Options support for single and dual-stack sessions (MX Series)—Starting in Junos OS Release 17.4R1, for DHCP dual-stack session subscribers, the DHCPv4 option values are saved in the SDB_DHCP_OPTIONS session database (SDB) attribute. Likewise, for DHCPv6 subscribers, option values are saved in the SDB_DHCPV6_OPTIONS SDB attribute. However, for single-stack sessions (DHCP or DHCPv6), the DHCP option values for both IPv4 and IPv6 subscribers will be saved in SDB_DHCP_OPTIONS SDB attribute.

    For both single and dual-stack sessions, DHCPv4 header is saved in the SDB_DHCP_HEADER and DHCPv6 header in the SDB_DHCPV6_HEADER SDB attributes.

    The option values and header values received in DHCPv4 discover and DHCPv6 solicit messages are stored in respective SDBs and thus get populated in the new vendor specific attributes (VSAs). These VSAs are then sent to RADIUS server for authentication. The RADIUS server decodes the options, authenticates the client, and sends the RADIUS-sourced DHCP options back to the DHCP server. The DHCP server copies the RADIUS-sourced DHCP options, and also adds the DHCP server-sourced options to the packet and sends the response back to the client.

    [See Dedicated Session Database and Vendor-Specific Attributes for DHCPv4 and DHCPv6 Subscribers Overview.]

  • Appending subscriber information to redirect URLs (MX Series)—Starting in Junos OS Release 17.4R1, you can append information about the subscriber retrieved from the subscriber session database when the redirect URL is returned to the HTTP client. You can configure the attributes at the [edit services captive-portal-content-delivery] hierarchy. Only the following attributes are supported: subscriber IP or IPv6 address, NAS IP address, requested URL, NAS port ID, MAC address, subscriber session ID, and username.

    Note

    This feature is already supported for Routing Engine based and Multiservices Modular PIC Concentrator (MS-MPC) based converged captive-portal-content-delivery (CPCD). From 17.4R1 onward, it is supported for Routing Engine based and MS-MPC based static CPCD.

    [See HTTP Redirect Service Overview.]

  • Enhancements to share CPE parameters between broadband network gateway (BNG) and RADIUS server (MX Series)—Starting in Junos OS Release 17.4R1, the following enhancements are made to facilitate better communication between the broadband network gateway (BNG) and the RADIUS server:

    • CPE parameters such as DHCPv4 (VSA 26-208) and DHCPv6 (VSA 26-209) packet headers are shared between the broadband network gateway (BNG) and the RADIUS server.

    • A new VSA 26-207 is introduced that facilitates the exchange of DHCPv6 options with the RADIUS server, thereby ensuring that VSA 26-55 is dedicated to the exchange of DHCPv4 options.

    • A new statement, family-state-change-immediate-update. When configured at the [edit access profile] hierarchy level, the DHCP (both DHCPv4 and DHCPv6) server sends an immediate interim accounting report to the RADIUS server when the second family (IPv4 or IPv6) is activated or the first family gets deactivated.

    • A new VSA 26-210 is added to convey the reason for the accounting-request message in the start and interim accounting request packets sent to the RADIUS server. This helps the RADIUS server to determine the reason of the start and interim accounting that is being sent.

    [See Exchange of DHCPv4 and DHCPv6 Parameters with the RADIUS Server Overview.]

  • Virtual broadband network gateway support (MX150)—Starting in Junos OS Release 17.4R1, MX150 routers, powered with vMX, support most of the subscriber management features available with Junos OS Release 17.4 on vMX to provide a virtual broadband network gateway on MX150 routers. vBNG runs on vMX, so it has similar exceptions; the following subscriber management features available on vMX are not supported for vBNG:

    • High availability features such as hot-standby backup for enhanced subscriber management and MX Series Virtual Chassis.

    To deploy a vBNG instance, you must purchase the following vBNG license:

    • vBNG subscriber scale license for one of these tiers: Introductory, Preferred, or Elite.

  • Support for Broadband Edge on MX204 router—Starting in Junos OS Release 17.4R1, MX204 supports the next-generation broadband edge software architecture for wireline subscriber management. With enhanced subscriber management, you can take advantage of optimized scaling and performance for configuration and management of dynamic interfaces and services for subscriber management.

  • Improved multicast performance with distributed IGMP (MX Series)—Starting in Junos OS Release 17.4R1, both dynamic and static interfaces support distributed Internet Group Management Protocol (IGMP). Distributed IGMP moves IGMP processing from the Routing Engine and distributes it across multiple Modular Port Concentrators (MPCs) on the Packet Forwarding Engine for improved performance and decreases join and leave latency.

    To enable distributed IGMP on static interfaces, include the distributed statement at the [edit protocols igmp interface interface-name] hierarchy level.

    To enable it on dynamic interfaces, include the distributed statement at the [edit dynamic-profiles profile-name protocols igmp interface $junos-interface-name] hierarchy level.

    You must also enable enhanced IP networking services at the [edit chassis network-services enhanced-ip] hierarchy level.

    You can optionally configure specific multicast groups to join statically by including the distributed option at one of the following hierarchy levels:

    • [edit protocols pim static]

    • [edit protocols pim static group multicast-group-address]

    • [edit protocols pim static group multicast-group-address source source-address]

    [See Understanding Distributed IGMP .]

  • Support for expanded traffic rate adjustment for DSL access lines (MX Series)—Starting in Junos OS Release 17.4R1, the traffic rate adjustment feature is expanded to support PPPoE intermediate agent (PPPoE-IA) tags by processing the Vendor-Specific-Tags TLV in PADI and PADO packets received from the access node. Now both PPPoE subscriber connections (terminated and tunneled) and ANCP-triggered Layer 2 wholesale service connections are subject to the same class and quality-of-service management transformations.

    Configuration for traffic rate adjustment and reporting for both AAA and CoS is moved to the new [edit system access-line] hierarchy level. In earlier releases, DSL line traffic rate adjustment is available only for the ANCP agent and uses statements at the [edit protocols ancp] and [edit protocols ancp qos-adjust] hierarchy levels.

    [See Traffic Rate Reporting and Adjustment by the ANCP Agent and Setting a Global Adjustment Factor per DSL Subscriber Line for ANCP Agent-Reported Traffic Rates.]

  • Displaying accurate subscriber accounting statistics (MX Series)—Starting in Junos OS Release 17.4R1, you can enable the router to display accurate subscriber accounting statistics for dynamic interfaces by including the actual-transit-statistics statement in the dynamic profile that creates the interface. The aggregate statistics counters show the subscriber traffic bytes and packets arriving on and leaving from the interface; these are the same traffic values reported to RADIUS. The counters exclude overhead byte adjustments, dropped or discarded packets, and control packets. When enabled, use the show subscribers id accounting-statistics command to display counts for the specified subscriber session and the show subscribers interface accounting-statistics command to display counts for all subscriber sessions on the specified interface.

    [See Enabling the Reporting of Accurate Subscriber Accounting Statistics to the CLI.]

  • Automatic 64-bit mode and maximum configuration database size (MX Series)—Starting in Junos OS Release 17.4R1, when enhanced IP network services and enhanced subscriber management are enabled and a Routing Engine in the system has at least 32 GB of RAM, subscriber management daemons on that Routing Engine run in 64-bit mode. For consistent operation, all Routing Engines in the system must have the same amount of memory.

    [See Configuring Junos OS Enhanced Subscriber Management.]

  • DSL line attributes support for L2TP LNS (MX Series)—Starting in Junos OS Release 17.4R1, an MX Series router configured as an LNS can process subscriber access line information that it receives from the LAC. This information includes access line attributes conveyed in ICRQ messages, initial Tx/Rx connect speeds (AVP 24/38) in ICCN messages, and connect speed updates in CSUN messages. The rate information enables CoS shaping on the subscriber session to be more accurate, but updates are subject to CoS adjustment control profiles. You can configure processing for information received from all LACs, or for only LACs you specify by address.

    [See Subscriber Access Line Information Handling by the LAC and LNS Overview.]

  • Enhancement to Gx-Plus Application (MX Series)—Starting in Junos OS Release 17.4R1, the following enhancements to the Gx-Plus client application on the BNG are available:

    • When a monitored service is deactivated separate from a subscriber logout, the CCR-U indicates that the service is no longer active and includes the service’s usage data.

    • The router updates the monitoring key and threshold values when they are received in a RAR message from the PCRF.

    • A CCR-U is sent to the PCRF after the router sends an RAA message in response to an RAR message that requests service activations or deactivations.

    • When the PCRF returns threshold values that are lower than the current values, the new threshold becomes the sum of the current value and the returned value.

    • The PCEF has default minimum threshold values. If the change between the current value and the value returned by the PCRF is less than the minimum value, then the new value is adjusted to the minimum.

    • The CCR-I message includes the Diameter AVP Subscription-Id attribute (443) with the Subscription-Id-Type Diameter AVP sub-attribute (450) set to 4 (END_USER_PRIVATE) and the Subscription-Id-Data Diameter AVP sub-attribute (444) set to reserved.

    [See Understanding Gx-Plus Interactions Between the Router and the PCRF and Messages Used by Diameter Applications.]

  • RADIUS attributes added to LNS messages (MX Series)—Starting in Junos OS Release 17.4R1, the LNS includes the following RADIUS attributes when it sends an Access-Request message to the RADIUS server:

    • Tunnel-Type (64)

    • Tunnel-Medium-Type (65)

    • Tunnel-Client-Endpoint (66)

    • Tunnel-Server-Endpoint (67)

    • Acct-Tunnel-Connection (68)

    • Tunnel-Assignment-Id (82)

    • Tunnel-Client-Auth-Id (90)

    • Tunnel-Server-Auth-Id (91)

System Logging

  • Debugging firewall ukern-trace log toggle persisting across FPC reboot (MX Series)—Starting in Junos OS Release 17.4R1, you can enable or disable ukern-trace logging for the debugging firewall (DFW) on a specific FPC slot by using the set chassis fpc slot ukern-trace log app-type dfw logging (off | on) command. The new logging value of each DFW log takes effect immediately and persists if the FPC slot reboots.

    [See ukern-trace]

User interface and Configuration

  • Monitoring, detecting, and taking action on degraded physical 10-Gigabit, 40-Gigabit, and 100-Gigabit Ethernet links to minimize packet loss (MX Series routers with MPC5E, MPC6E, and 2x10GE MIC on MPC3E)—Starting with Junos OS Release 17.4R1, you can monitor physical link degradation (indicated by bit error rate (BER) threshold levels) on Ethernet interfaces, and take corrective actions if the BER threshold value drops to a value in the range of 10-13 to 10-5.

    Layer 2 and Layer 3 protocols support the monitoring of physical link degradation. An Ethernet link also supports monitoring of physical link degradation through the Link Fault Signaling (LFS) protocol. However, for both of these monitoring mechanisms, the BER threshold value range of 10-13 to 10-5 is very low. Because of the low BER threshold value, the physical link degradation goes undetected, causing disruption and packet loss on an Ethernet link.

    The following new configurations have been introduced at the [edit interfaces interface-name] hierarchy level to support the physical link degrade monitoring and recovery feature on Junos OS:

    • To monitor physical link degrade on Ethernet interfaces, configure the link-degrade-monitor statement.

    • To configure the BER threshold value at which the corrective action must be triggered on or cleared from an interface, use the link-degrade-monitor thresholds (set value | clear value) statement.

      The supported exponent range is 1 through 16, and the default value is 7 for the set configuration and 12 for the clear configuration.

    • To configure the link degrade interval value, use the link-degrade-monitor thresholds interval value statement. The configured interval value determines the number of consecutive link degrade events that are considered before any corrective action is taken.

    • To configure link degrade warning thresholds, use the link-degrade-monitor thresholds (warning-set value | warning-clear value) statement.

    • To configure the link degrade action that is taken when the configured BER threshold level is reached, use the link-degrade action media-based statement.

    • To configure the link degrade recovery options, use the link-degrade recovery (auto interval value | manual) statement. The recovery mechanism triggers the recovery of a degraded link.

    You can view the link recovery status and the BER threshold values by using the show interfaces interface-name command.

VPNs

  • Support of BGP signaling for next-hop-based dynamic tunnels (MX Series)—Starting in Junos OS Release 17.4R1, the next-hop-based dynamic GRE and UDP tunnels are signaled using BGP encapsulation extended community. BGP export policy is used to specify the tunnel types, advertise the sender side tunnel information, and parse and convey the receiver side tunnel information. A tunnel is created according to the received type tunnel community.

    Multiple tunnel encapsulations are supported by BGP. On receiving multiple capability, the next-hop-based dynamic tunnel is created based on the configured BGP policy and tunnel preference. The tunnel preference should be consistent across both the tunnel ends for the tunnel to be set up, and by default, MPLS-over-UDP (MPLSoUDP) tunnel is preferred over GRE tunnels.

    [See Example: Configuring a Next-Hop-Based Dynamic GRE Tunnels and Example: Configuring Next-Hop-Based MPLS-Over-UDP Dynamic Tunnels.]

Changes in Behavior and Syntax

This section lists the changes in behavior of Junos OS features and changes in the syntax of Junos OS statements and commands from Junos OS Release 17.4R3 for MX Series routers.

Class of Service (CoS)

  • Junos commit notification of unsupported configuration—Junos OS does not support changing the hierarchical-scheduler mode of a logical tunnel interface, or redundant logical tunnel interface, if an active pseudowire subscriber interface is attached to it. A commit error has now been added to provide the notification.

EVPNs

  • Changes in the output of show route table command—Starting in Junos OS Release 17.4R2, the output for show route table no longer displays the loopback address as the route distinguisher for MAC address virtual routing and forwarding (MAC-VRF) routing instances route entries. Instead, the output now displays the route distinguisher for the evpn and virtual switch instance type.

  • Support for LSP on EVPN-MPLS—Starting in Junos OS Release 17.4R2, Junos supports the mapping of EVPN traffic to specific label-switched paths (LSPs). Prior to this release, the traffic policies mapping extended community to specific LSPs did not work properly.

  • Changes in the show route extensive output—Starting in Junos OS Release 17.4R2, the output for show route extensive displays unknown evpn, opaque, and experimental extended communities as follows:

    • EVPN: unknown iana evpn 0xtype:0xsubtype:0xvalue

    • OPAQUE: unknown iana opaque 0xtype:0xsubtype:0xvalue

    • EXP: unknown 0xtype:0xsub-type:0xvalue

    where type, sub-type, and value are defined in RFC 4360 BGP Extended Communities Attribute, RFC7153 IANA Registries for BGP Extended Communities. Internet Assigned Numbers Authority (IANA) maintains a registry with information on the type and subtype field values at https://www.iana.org/assignments/bgp-extended-communities/bgp-extended-communities.xhtml

  • Support for an VNI of zero—Starting with Junos OS Release 17.4R3, Junos supports using a VXLAN Network Identifier (VNI)=0 when configuring a bridge domain or vlan in an EVPN-VXLAN network.

General Routing

  • User confirmation prompt for configuring the sub-options of request vmhost commands (MX Series and PTX series)—While configuring the following request vmhost commands, the CLI now prompts you to confirm a [yes,no] for the sub-options also.

    • request vmhost reboot

    • request vmhost poweroff

    • request vmhost halt

    In previous releases, the confirmation prompt was available for only the main options.

  • NTP Boot Server configuration (MX204, MX960, MX10003, MX10002, MX10016, MX10000, MX480, MX104, MX10008, MX240, MX2010, MXTSR80, MX80, MX2008, MX150, and MX2020)—Use set ntp server <address | hostname> command to set the correct time when we boot the router instead of boot-server <address | hostname>

    [See Synchronizing and Coordinating Time Distribution Using NTP.]

  • Change in the default behavior of <advertise-from-main-vpn-tables> configuration statement—BGP now advertises EVPN routes from the main bgp.evpn .0 table. You can no longer configure BGP to advertise the EVPN routes from the routing instance table. In earlier Junos OS Releases, BGP advertised EVPN routes from the routing instance table by default.

    [See advertise-from-main-vpn-tables]

High Availability (HA) and Resiliency

  • Command ‘show chassis in-service-upgrade’ not available (MX10003)—In this release, the command "show chassis in-service-upgrade" is not available for MX10003 routers. If you enter this command, the following output is shown: "error: command is not valid on the JNP10003 [MX10003]". Earlier, the output shown for this command was "error: Unrecognized command (chassis-control)".

Interfaces and Chassis

  • Deprecated maximum transmission unit configuration option for virtual tunnel interfaces—In Junos OS Release 17.4R1, you cannot configure the maximum transmission unit (MTU) size for virtual tunnel (vt) interfaces, because the mtu bytes option is deprecated for vt interfaces. Junos OS sets the MTU size for vt interfaces by default to unlimited.

  • Modified output of the request vmhost zeroize command—Starting with Junos OS Release 17.2, the command request vmhost zeroize, upon execution, prompts the user for confirmation to proceed. The following line is displayed:

  • Modified output of the show chassis ethernet-switch command—The ports 24 and 26 on the MX240, MX480, and MX960 routers with the RE-S-X6-64G Routing Engines are dedicated for external Ethernet connectivity. The show chassis ethernet-switch command on these routers displays the link status for these ports as External Ethernet. .

  • Recovery of PICs that are stuck because of prolonged flow controls (MS-MIC, MS-MPC, MS-DPC, MS-PIC 100, MS-PIC 400, and MS-PIC 500)—Starting in Junos OS Release 16.1R7, if interfaces on an MS-PIC, MS-MIC, MS-MPC, or MS-DPC are in stuck state because of prolonged flow control, Junos OS restarts the service PICs to recover them from this state. However, if you want the PICs to remain in stuck state until you manually restart the PICs, configure the new option up-on-flow-control for the flow-control-options statement at the [edit interfaces mo-fpc/pic/port multiservice-options] hierarchy level. In releases before Release 16.1R7, there is no action taken to recover service PICs from this state unless one of the options for the flow-control-options statement is configured, or service PIC is manually restarted.

  • Enhancement to the show interfaces mc-ae extensive command—You can now view additional LACP information about the LACP partner system ID when you run the show interfaces mc-ae extensive command. The output now displays the following two additional fields:

    • Local Partner System ID—LACP partner system ID as seen by the local node.

    • Peer Partner System ID—LACP partner system ID as seen by the MC-AE peer node.

    Previously, the show interfaces mc-ae extensive command did not display these additional fields.

  • New XML tag element <lacp-hold-up-state> added in show lacp interfaces XML display (MX Series)—In Junos OS Release 17.4R3, the show lacp interfaces | display xml command displays a new XML tag element <lacp-hold-up-state>. The <lacp-hold-up-state> displays the time interval an interface holds before it changes from state, down to up. In earlier Junos OS releases, the LACP hold up the information for all interfaces were in a single <lacp-hold-up-information> XML tag. Now, for each interface it is displayed in a separate <lacp-hold-up-information> XML tag.

  • No support for WAN-PHY mode on MX Series MPCs—In Junos OS Releases 17.4R2, 17.4R3, and later, on the following MPCs or routers, you cannot configure wan-phy mode at 10-Gbps, 40-Gbps, and 100-Gbps on a per-port basis:

    • MPC7E-10G, MPC7E-MRATE, MX2K-MPC8E, and MX2K-MPC9E

    • MPC10003

    • MX204 router

    • JNP10K-LC2101 MPC

  • IRB not supported on Pseudowire Subscriber (PS) Logical Interface in bridge-domain (MX Series)—In Junos OS Release 17.4R3, Integrated routing and bridging (IRB) is not supported on Pseudowire Subscriber (PS) Logical Interface. Hence you cannot add IRB to bridge domain with PS interface, that is, you cannot configure IRB and PS interface in the same bridge domain.

    Note that adding IRB to a bridge-domain having Pseudowire Subscriber (PS) Logical Interface causes kernel crash and continuous reboot of the router until the configuration is rolled back.

    Note

    IRB is not supported on PS only in bridge-domain.

    [See bridge-domain.]

Management

  • Changes to Junos OS YANG module naming conventions (MX Series)—Starting in Junos OS Release 17.4R1, the native Junos OS YANG modules use a new naming convention for the module's name, filename, and namespace. The module name and filename include the device family and the area of the configuration or command hierarchy to which the schema in the module belongs. In addition, the module filename includes a revision date. The module namespace is simplified to include the device family, the module type, and an identifier that is unique to each module and that differentiates the namespace of the module from that of other modules.

    [See Understanding Junos OS YANG Modules.]

MPLS

  • Support for adjusting the threshold of autobandwidth based on the absolute value for LSP (MX Series)—Current autobandwidth threshold adjustment is done based on the configured percentage which is hard to tune to work well for both small and large bandwidth reservations. For a given threshold percentage, when the bandwidth reservation is small there can be multiple LSP resignaling events. This is because the LSP is responsive to even minor increases or decreases in the utilization when current reservation is small. For example, a small threshold adjustment of 5 percent allows large LSPs of around 1G to respond to changes in bandwidth of the order of 50M. However, that same threshold adjustment results in too many LSP resignalling events for small LSPs of around 10M reservation. Increasing the adjust threshold percentage by for example 40 percent minimizes LSP resignaling for small LSPs. However, large LSPs do not react to bandwidth usage changes unless they are huge, for example, 400M. Starting in Junos OS Release 17.4R1, you can configure an absolute value-based threshold along with the percentage-based threshold that helps avoid the bandwidth getting triggered for LSPs of both small and large bandwidth reservations. Configure adjust-threshold-absolute value option at the [edit protocols mpls label-switched-path lsp-name auto-bandwidth] hierarchy level.

  • Support for label history for MPLS protocol (MX Series)—Starting in Junos OS Release 17.4R1, configure max-entries number option at the [edit protocols mpls label-history] hierarchy level to display label allocation, release history, and associated information such as RSVP session that helps debug label related error such as stale label route and deleted label route. You can configure the limit for the maximum number of MPLS history entries per label . By default, label history is off and there is no maximum limit for the number of entries for each label. The show mpls label history label-value command displays the label history for a given label value and the show mpls label history label-range start-label end-label command displays the history of labels between the given label range.

    The clear mpls label history command clears the label history details.

  • Support for default time out duration for self-ping on an LSP instance (MX Series)—Starting in Junos OS 17.4R1, the default time out duration for which the self-ping runs on an LSP instance is reduced from 65,535 (runs until success) to 1800 seconds. You can also configure the self-ping duration value between 1 to 65,535 (runs until success) seconds using the self-ping-duration value command at the [edit protocols mpls label-switched-path label-switched-path] hierarchy level. By default, self-ping is enabled. The LSP types like CCC, P2MP, VLAN-based , and non-default instances do not support self-ping . You can configure no-self-ping command at the [edit protocols mpls label-switched-path label-switched-path] hierarchy level to override the behavior of self-ping running by default.

  • Support for Flap and MBB counter for LSP (MX Series)—Starting in Junos OS Release 17.4R1, the show mpls lsp extensive command introduces the following two counters for LSP on the master routing engine (RE) only:

    • Flap counter–- Counts the number of times a LSP flaps down or up.

    • MBB counter— Counts the number of times a LSP incurs MBB.

    The clear mpls lsp counters command resets the flap and the MBB counter to zero.

  • Support for inet.0 and inet.3 labeled unicast BGP route for protocol LDP (MX Series)--- Starting in Junos OS Release 17.4R2, LDP egress policy is supported on both inet.0 and inet.3 routing Information bases (RIBs) also known as routing table for labeled unicast BGP routes. If a routing policy is configured with a specific (inet.0 and inet.3) RIB, the egress policy is applied on the specified RIB. If no RIB is specified and a prefix is present on both inet.0 and inet.3 RIBs for labeled unicast BGP routes, then inet.3 RIB is preferred. However, prior to Junos OS Release 12.3R1 and starting with Junos OS Release 16.1R1, LDP egress policy is always preferred on inet.0 RIB and support for inet.3 RIB egress policy for labeled unicast BGP routes was disabled. In Junos OS Release 12.3R1 and later releases up to Junos Release 16.1R1, LDP egress policy was supported in inet.3 RIBs, in addition to inet.0 RIBs, for labeled-unicast BGP routes.

  • New output fields to monitor LSP resignaling count—Starting in Junos OS Release 17.4R1, the show mpls lsp command output displays the Flap Count and MBB Count output fields, that capture the historical count of the number of times a specific LSP has been resignaled because of autobandwidth-triggered reservation change, or other changes along the path. The flap count displays the number of times an LSP flaps down and up, and the MBB count displays the number of times an LSP incurred a make before break.

  • Display of labels in received record route for unprotected LSPs by show mpls lsp extensive command (MX Series)—The show mpls lsp extensive command displays the labels in received record route (RRO) for protected LSPs. Starting in Junos OS Release 17.4R1, the command also displays the labels associated with the hops in RRO for unprotected LSPs as well. The label recording in RRO is enabled by default.

  • Starting in Junos OS Release 17.4R1, a new configuration statement - adjust-threshold-absolute - is introduced at the [edit protocols mpls] hierarchy level to specify the changes in the average label-switched path (LSP) utilization to trigger automatic bandwidth adjustment in bits per second (bps).

    Currently, this change is specified as a percentage using the adjust-threshold statement. The adjust-threshold-absolute statement (bps) can be used in conjunction with the existing adjust-threshold statement (percent).

  • Starting in Junos OS Release 17.4R1, the spring-traffic-engineering statement at the [edit protocols] hierarchy level is replaced with the source-packet-routing statement, although the support for the spring-traffic-engineering statement is provided as an alias. This replacement does not introduce any functionality change, and is intended for maintaining consistency across the terms used in Source Packet Routing in Networking (SPRING) or segment routing features.

  • Loss of traffic over bypass MPLS LSPs—If RSVP link or node protection is enabled along with global RSVP authentication, there is loss of traffic over bypass MPLS LSPs at the time of local repair, when the point of local repair (PLR) and the merge point devices have different versions of the Junos OS software installed on them. That is, one device is running a release prior to Junos OS Release 16.1, and the other device is running a release starting with Junos OS Release 16.1R4-S12.

  • Bandwidth allocation—For a label-swtiched path (LSP) that has both bandwidth and minimum-bandwidth for autobandwidth configured under the [edit protocols mpls label-switched-path lsp-name] hierarchy level, the LSP bandwidth is adjusted differently.

    The LSP is initiated with the bandwidth value configured under the bandwidth statement at the [edit protocols mpls label-switched-path lsp-name] hierarchy level. At the expiry of the adjust-interval timer, the LSP bandwidth gets adjusted based on the traffic flow.

    If the bandwidth to be signaled is less than the value configured under the minimum-bandwidth statement at the [edit protocols mpls label-switched-path lsp-name autobandwidth] hierarchy level, then the LSP is signaled only using the minimum bandwidth.

    If the bandwidth to be signaled is greater than the value configured under the maximum-bandwidth statement at the [edit protocols mpls label-switched-path lsp-name autobandwidth] hierarchy level, then the LSP is signaled only using the maximum bandwidth.

  • Previously, when you configured zero (0) as the bandwidth of an RSVP interface, the bandwidth value was overwritten with the default interface bandwidth (raw hardware bandwidth), leading to unexpected behavior in the LSP setup. Starting with Junos OS Release 17.4R1-S5, when you configure zero as the bandwidth, 0 is applied as the RSVP bandwidth.

    [See bandwidth (Protocols RSVP).]

Multicast

  • Support for rpf-selection statement for PIM protocol at global instance level (MX Series)—Starting in Junos OS 17.4R1, the rpf-selection statement for the PIM protocol is available at global instance level. You can configure group and source statements at the [edit protocols pim rpf-selection] hierarchy level.

Network Management and Monitoring

  • Customer-visible SNMP trap name changes (MX Series)—In Junos OS Release 17.4R1, on Enhanced Switch Control Board (SCBE), name changes include the CB slot when jnxTimingFaultLOSSet and jnxTimingFaultLOSClear traps are generated in the case of BITS interfaces (T1 or E1). SNMP traps for the backup Routing Engine clock failure event have been added and the control board name is included in the SNMP trap interface name (jnxClksyncIntfName), for example, value: "external(cb-0)".

    [See SNMP MIB Explorer.]

  • SNMP syslog messages changed (MX Series)—In Junos OS Release 17.4R1, two misleading SNMP syslog messages have been rewritten to accurately describe the event:

    • OLD —AgentX master agent failed to respond to ping. Attempting to re-register

      NEW —AgentX master agent failed to respond to ping, triggering cleanup!

    • OLD —NET-SNMP version %s AgentX subagent connected

      NEW —NET-SNMP version %s AgentX subagent Open-Sent!

    [See the SNMP MIB Explorer.]

  • Change in default log level setting (MX Series)—In Junos OS Release, 17.4R1, the following changes were made in default logging levels:

    Before this change:

    • SNMP_TRAP_LINK_UP was LOG_INFO for both the physical (IFD) and logical (IFL) interfaces.

    • SNMP_TRAP_LINK_DOWN was LOG_WARNING for both the physical (IFD) and logical (IFL) interfaces.

    After this change:

    • IFD LinkUp -> LOG_NOTICE (because this is an important message but less frequent)

    • IFL LinkUp -> LOG_INFO (no change)

    • IFD and IFL LinkDown -> LOG_WARNING (no change)

    [See the MIB Explorer.]

  • New context-oid option for trap-options configuration statement to distinguish the traps which come from a non-default routing instance and non-default logical system (MX Series)—In Junos OS Release 17.4R2, a new option, context-oid, for the trap-options statement allows you to handle prefixes such as <routing-instance name>@<trap-group> or <logical-system name>/<routing-instance name>@<trap-group> as an additional varbind.

    [See trap-options.]

  • The NETCONF server omits warnings in RPC replies when the rfc-compliant statement is configured and the operation returns <ok/> (MX Series)—Starting in Junos OS Release 17.4R3, when you configure the rfc-compliant statement at the [edit system services netconf] hierarchy level to enforce certain behaviors by the NETCONF server, if the server reply after a successful operation includes both an <ok/> element and one or more <rpc-error> elements with a severity level of warning, the warnings are omitted. In earlier releases, or when the rfc-compliant statement is not configured, the NETCONF server might issue an RPC reply that includes both an <rpc-error> element with a severity level of warning and an <ok/> element.

  • A decrease in the MPLS label-switched path (LSP) statistics pauses the SNMP MIB mplsLspInfoAggrOctets count for one MPLS statistics gathering interval. In such cases, the mplsLspInfoAggrOctets value is updated only after completing one more interval of the MPLS statistics gathering.

Routing Protocols

  • Option to configure SPRING bandwidth utilization change threshold in percentage(MX Series)—Starting in Junos OS Release 17.4R1, you can specify a change threshold in percentage beyond which RSVP triggers IGP updates. To configure the change threshold percentage, configure percent percent at the [edit protocols rsvp interface update-threshold-max-reservable] hierarchy level.

  • BGP enterprise trap jnxBgpM2BackwardTransition notification for IPv4 neighbors (MX Series)—Starting in Junos OS Release 17.4R2, when an IPv4 BGP neighbor transitions from a higher state to a lower state, an enterprise trap jnxBgpM2BackwardTransition is sent in addition to an existing standard trap notification bgpM2BackwardTransition. In earlier Junos OS releases only bgpBackwardTransition trap notification was generated when a BGP IPv4 neighbor’s state transitioned to a lower state.

  • Modified output of show route forwarding-table—Starting in Junos OS Release 17.4R2, the output of show route forwarding-table command does not display the next-hop address for static routes that use point-to-point (P2P) interfaces.

    [See show route forwarding-table.]

  • MPLS configuration mandatory for indirect next-hop interfaces—Starting in Junos OS Release 17.4R1, it is mandatory for an indirect next-hop’s forwarding interface to have family MPLS configured. In a BGP network if the MPLS configuration for an indirect next-hop’s forwarding interface is deleted or when the BGP labeled unicast interface is deactivated, all routes with indirect next hop undergo a route resolution again, which might impact traffic routing until the route resolution is completed. In earlier Junos OS releases when family MPLS was deleted, the indirect next-hop route was removed from the forwarding table and could not be recovered even when MPLS was reactivated.

Security

  • Support to log the SSH key changes—Starting with Junos OS 17.4R1, the configuration statement log-key-changes is introduced at the [edit system services ssh ] hierarchy level. When the log-key-changes configuration statement is enabled and committed (with the commit command in configuration mode), Junos OS logs the changes to the set of authorized SSH keys for each user (including the keys that were added or removed). Junos OS logs the differences since the last time the log-key-changes configuration statement was enabled. If the log-key-changes configuration statement was never enabled, then Junos OS logs all the authorized SSH keys.

  • Support for SSH protocol version 2—Starting in Junos OS Release 17.4R1, SSH protocol version 1 (SSHv1) is not supported. SSH protocol version 2 (SSHv2) is the default protocol-version option available under the [edit system services ssh] hierarchy level.

    [See protocol-version]

Services Applications

  • Accurate value in exported inline flow monitoring records for MPLS-over-GRE tunnels—Starting in Junos OS Release 17.4R1, the exported flow records for inline flow monitoring of traffic entering MPLS-over-GRE tunnels (also known as next-hop-based dynamic GRE tunnels) contain the correct values in the gateway address and outgoing interface fields. Prior to Junos OS Release 17.4R1, these fields contained a value of 0.

  • New syslog message displayed during NAT port allocation error (MX Series Routers with MS MPC)—With address pooling paired (APP) enabled, an internal host is mapped to a particular NAT pool address. In case, all the ports under a NAT pool address are exhausted, further port allocation requests from the internal host results in a port allocation failure. The following new syslog message is displayed during such conditions:

    JSERVICES_NAT_OUTOF_PORTS_APP

    This syslog message is generated only once per NAT pool address.

  • Support for host generated traffic on a GRE over GRE tunnel (MX Series)—In Junos OS Release 17.4R3, you can send host generated traffic on a GRE over GRE tunnel. However, when path maximum transmission unit (PMTU) is updated for the outer GRE tunnel, MTU for inner GRE tunnel is not corrected.

  • Change in error message displayed while fragmenting or de-fragmenting IPv6 GRE tunnel interface (MX Series routers)—In Junos OS Release 17.4R3, on a IPv6 GRE tunnel interface, when you enable fragmentation using the allow-fragmentation command or disable fragmentation using the do-not-fragment command, the following error message is displayed:

    Fragmentation for V6 tunnels is not supported

    In earlier Junos OS releases, the following message was displayed:

    dcd_config_ifl_tunnel:Fragmentation for V6 tunnels is notsupported

Software Defined Networking

  • The 32-bit libstdc++ package no longer required for Junos Node Slicing setup—Starting in Junos OS Release 17.4R2, you need not install the additional 32-bit libstdc++ package for Red Hat Enterprise Linux (RHEL) or Ubuntu to set up Junos Node Slicing.

  • Installation or upgrade using remotely located installation package (MX480, MX960, MX2010, MX2020, MX2008)—While performing Junos installation or upgrade on the base system (BSYS) or guest network function, if you provide a URL to the remotely located installation package (for example, an ftp file) in the command request system software add package-file-path, the router locally copies the package, performs checks such as multi-version compatibility checks on the package, and then installs the package. The installation process is aborted if any errors are found during the checks. Previously, if you tried to perform installation or upgrade using a remotely located file, the router would skip multi-version checks and display an error message, but would not abort the installation process.

    [See Junos Node Slicing Upgrade]

  • The output of the show mpls lsp ingress locally-provisioned command is expected to display only label-switched paths (LSPs) that have been provisioned locally by the Path Computation Client (PCC). However, the locally-provisioned option was displaying all the LSPs, instead.

    Starting in Junos OS Release 17.4R2, the locally-provisioned option in the show mpls lsp ingress command is behaving as expected.

Software Installation and Upgrade

  • ZTP is supported on MX PPC platforms (MX Series)—As of Junos OS Release 17.4R2, zero touch provisioning (ZTP) is supported on MX PPC platforms (which are MX5, MX10, MX40, MX80, and MX104 routers). Before the fix, the ZTP process did not start to load image and configuration for MX PPC routers.

    [See Junos OS Installation Package Names.]

Software Licensing

  • Key generator adds one day to make the duration of license show as 365 days (MX Series)—Starting in Junos OS Release 17.4R1, the duration of subscription licenses as generated by the show system license command and shown in the output is correct to the numbers of days. Before this fix, for example, for a 1-year subscription license, the duration was generated as 364 days. After the fix, the duration of the 1-year subscription now shows as 365 days.

    [See show system license.]

Subscriber Management and Services

  • Correct SNMP index value in exported inline flow monitoring records for BNG subscribers—Starting in Junos OS Release 17.4R1, the exported flow records for inline flow monitoring report the SNMP index of the broadband network gateway (BNG) subscriber’s interface. Prior to Junos OS Release 17.4R1, the flow records reported the SNMP index of the underlying interface (PPPoE encapsulated interface), which caused incorrect values in the derived fields (mask, outgoing interface, gateway address).

    Configure nexthop-learning enable at the [edit services flow-monitoring (version-ipfix | version9) template template-name] hierarchy level to get the correct outgoing interface and gateway address values for subscriber traffic in the following situations:

    • Ingress and egress VRF are not the same.

    • Traffic is load balanced.

    • Traffic is forwarded through a composite next hop (for example, an MPLS over GRE tunnel).

    [See Understanding Inline Active Flow Monitoring.]

  • Memory mapping statement removed for Enhanced Subscriber Management (MX Series)— Starting in Junos OS Release 17.4R1, use the following command when configuring database memory for Enhanced Subscriber Management:

    set system configuration-database max-db-size

    CLI support for the set configuration-database virtual-memory-mapping process-set subscriber-management command has been removed to avoid confusion. Using the command for subscriber management now results in the following error message:

    WARNING: system configuration-database virtual-memory-mapping not supported. error: configuration check-out failed.

    [See Interface Configuring Junos OS Enhanced Subscriber Management for an example of how to use the max-db-size command.]

  • Support for IPv6 all-routers address in nondefault routing instance (MX Series)—Starting in Junos OS Release 17.4R2, the well-known IPv6 all-routers multicast address, FF02::2, is supported in nondefault routing instances. In earlier releases it is supported only for the default routing instance; consequently IPv6 router solicitation packets are dropped in nondefault routing instances.

  • Correction to CLI for L2TP tunnel keepalives (MX Series)—Starting in Junos OS Release 17.4R2, the CLI correctly limits to 3600 seconds the maximum duration that you can enter for the hello interval of an L2TP tunnel group. In earlier releases, the CLI allows you to enter a value up to 65,535, even though only 3600 is supported.

    See hello-interval (L2TP).

  • Wildcard supported for show subscribers agent-circuit-identifier command (MX Series)—Starting in Junos OS Release 17.4R2, you can specify either the complete ACI string or a substring when you issue the show subscribers agent-circuit-identifier command. To specify a substring, you must enter characters that form the beginning of the string, followed by an asterisk (*) as a wildcard to substitute for the remainder of the string. The wildcard can be used only at the end of the specified substring; for example:

    In earlier releases, starting with Junos OS Release 14.1, the command requires you to specify the complete ACI string to display the correct results. In Junos OS Release 13.3, you can successfully specify a substring of the ACI without a wildcard.

  • Changed behavior for framed routes without a subnet mask (MX Series)—Starting in Junos OS Release 17.4R2, the router connects the session but ignores a framed route when it is received from RADIUS in the Framed-Route attribute (22) without a subnet mask.

    In earlier releases, the router installs the framed route with a Class A, B, or C subnet mask depending on the value of the first octet. When the octet < 128, the mask is /8; when 128 <= octet < 192, the mask is /16; and when the octet >= 192, the mask is 24.

  • DHCPv6 lease renewal for separate IA renew requests (MX Series)—Starting in Junos OS Release 17.4R2, the jdhcpd process handles the second renew request differently in the situation where the DHCPv6 client CPE device does both of the following:

    • Initiates negotiation for both the IA_NA and IA_PD address types in a single solicit message.

    • Sends separate lease renew requests for the IA_NA and the IA_PD and the renew requests are received back-to-back.

    The new behavior is as follows:

    1. When the reply is received for the first renew request, if a renew request is pending for the second address type, the client stays in the renewing state, the lease is extended for the first IA, and the client entry is updated.

    2. When the reply is received for the second renew request, the lease is extended for the second IA and the client entry is updated again.

    In earlier releases:

    1. The client transitions to the bound state instead of staying in the renewing state. The lease is extended for the first IA and the client entry is updated.

    2. When the reply is received for the second renew request, the lease is not renewed for the second address type and the reply is forwarded to the client. Consequently, when that lease ages out, the binding for that address type is cleared, the access route is removed, and subsequent traffic is dropped for that address or address prefix.

    [See Using DHCPv6 IA_NA with DHCPv6 Prefix Delegation Overview.]

  • Bandwidth options match for inline services and tunnel services (MX Series)—Starting in Junos OS Release 17.4R2, you can configure the same bandwidth options for inline services with the bandwidth statement at the [edit chassis fpc slot-number pic number inline-services hierarchy level as you can configure for tunnel services with the bandwidth statement at the [edit chassis fpc slot-number pic number tunnel-services] hierarchy level.

    [See bandwidth (Inline Services) and bandwidth (Tunnel Services)]

  • Change to ICRQ message inclusion of the ANCP Access Line Type AVP (MX Series)—Starting in Junos OS Release 17.4R2, the ICRQ message includes the ANCP Access Line Type AVP (145) when the received ANCP Port Up message includes a DSL-type of 0 (OTHER). In earlier releases, the AVP is not sent when the value is 0.

  • Out-of-address SNMP trap requires thresholds to be configured (MX Series)—Starting in Junos OS Release 17.4R3, the behavior has changed for generating an out-of-address SNMP trap for an address pool configured at the [edit access address-assignment] or [edit routing-instance name address-assignment] hierarchy levels. You must now configure both the high-utilization and abated-utilization thresholds. When the number of assigned addresses surpasses the high-utilization threshold, a high-utilization trap is generated. If all the addresses are assigned from the pool, an out-of-address trap is generated and an out-of-address syslog message is sent.

    In earlier releases, an out-of-address trap is generated when the address pool is exhausted, regardless of whether the thresholds are configured.

    If the number of assigned addresses subsequently drops below the abated-utilization threshold, an abate-high-utilization trap is generated; this behavior is unchanged.

  • Disabling a pseudowire underlying interface (MX Series)—Starting in Junos OS Release 17.4R3, you cannot disable the underlying logical tunnel (lt) interface or redundant logical tunnel (rlt) interface when a pseudowire is anchored on that interface. If you want to disable the underlying interface, you must first deactivate the pseudowire.

    [See Configuring a Pseudowire Subscriber Logical Interface Device.]

User Interface and Configuration

  • Junos OS prohibits configuring ephemeral configuration database instances that use the name default (MX Series)—Starting in Junos OS Release 17.4R2, user-defined instances of the ephemeral configuration database, which are configured using the instance instance-name statement at the [edit system configuration-database ephemeral] hierarchy level, do not support configuring the name default.

Known Behavior

This section contains the known behavior, system maximums, and limitations in hardware and software in Junos OS Release 17.4R3 for MX Series routers.

For the most complete and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.

EVPN

  • Routing instances of type evpn configured with a vlan-id will advertise MAC (type 2) routes with the VLAN value in the Ethernet tag field of the MAC route. Advertising MAC routes with a nonzero VLAN is incompatible with the EVPN VLAN-based service type. To enable interoperability between a Junos OS routing instance of type evpn and a remote EVPN device operating in VLAN-based mode, the Junos routing instance should be configured with vlan-id none so that the Ethernet tag in advertised MAC routes is set to zero. PR945247

  • A provider edge (PE) device running EVPN IRB with an IGP configured in a VRF associated with the EVPN instance will be unable to establish an IGP adjacency with a CE device attached to a remote PE device. The IGP instance running in the VRF on the PE might be able to discover the IGP instance running on the remote CE through broadcast or multicast traffic, but will be unable to send unicast traffic directly to the remote CE device. PR977945

  • In a scaled up EVPN VPWS configurations (approximately 8000 EVPN VPWS), during Routing Engine switchover, rpd scheduler slip messages might be seen. PR1225153

  • EVPN remote MAC may not be installed in bridge-domain / ethernet switching table if load-balance per-packet is not configured in multi-homing scenario remote esi would be shown as unresolved in show evpn instance extensive output From EVPN traceoptions: evpn_mac_msg_send_to_l2ald:1172 EVPN MAC instance::vlan::mac [Flags: 0x0] Instance ESI xx:xx:xx:xx:xx:xx:xx:xx:xx:xx not yet resolvedPR1295846

  • In an EVPN network with VXLAN encapsulation configured for direct-nexthop mode ("pure type 5" mode without overlay gateway addresses), at least one type 5 route per VRF from a remote endpoint must be received and installed in the local routing table of a device, to enable the local device to forward inbound type 5 traffic received from the remote endpoint. If the local device has not installed at least one route with a next hop pointing toward a specific remote endpoint, type 5 VXLAN-encapsulated IP traffic sent by the remote endpoint toward the local device will not be forwarded correctly. PR1305068

  • When changing encapsulation from VXLAN to MPLS or vice versa, need to deactivate and reactivate the instance. PR1326430

General Routing

  • On MX Series routers with MS-MPC or MS-MIC, memory leaks can be seen with jnx_msp_jbuf_small_oc object, upon sending millions of Point-to-Point Tunneling Protocol control connections (3 through 5 million) alone at higher cells per second (cps) (greater than 150K cps). This issue is not seen with up to 50,000 control connections at 10,000 through 30,000 cps. PR1087561

  • Source-prefix filtering and protocol filtering of the CGNAT sessions are incorrect. For example, show services sessions extensive protocol udp source-prefix <0:7000::2> displays incorrect filtering of the sessions. PR1179922

  • Chef for Junos OS supports additional resources to enable easier configuration of networking devices. These are available in the form of netdev resources. The netdev resource developed for interface configuration has a limitation to configuring the XE interface. The netdev interface resource determines that speed is a configurable parameter that is supported on a GE interface but not on an XE interface. Hence, the netdev interface resource cannot be used to configure an XE interface due to this limitation. This limitation is applicable to packages chef-11.10.4_1.1.*.tgz chef-11.10.4_2.0_*.tgz in all platforms {i386/x86-32/powerpc}. PR1181475

  • In certain interface scaling scenarios, during configuration commit/rollback, you might see an fpcx error message. You can safely ignore this message because of the FPGA monitor mechanism on DPC cards for logical interface mapping (ifl_map). Between the deletion of a physical interface and the monitoring event, this mechanism checks through the stored logical interfaces. While the mechanism tries to find the family of a recently deleted logical interface that was not cleaned from the the ifl_map, harmless messages might populate the log file. PR1210877

  • There is no unified ISSU from Junos OS Release with NPU image size less than 60MB to Junos OS Release with NPU image size great than 60MB. PR1222540

  • This issue has not been addressed, and it is probably not easy to address either. The problem is, when some route/NH has been created by the app, it?s assumed that it can propagate to the rest of the system. KRT asynchronously picks up this state for propagation. There is no reverse indication to the app, if there was an error in propagating the state. The system is supposed to eventually reconcile. So, if SPRING-TE produces a <route, NH> pair that looks legal from the app standpoint, but KRT is not able to download it to the kernel, because kernel rejected the NH, the <route, NH> sort of gets stuck in RPD. In the meantime, the previous version of the route (L-ISIS in this case) that was downloaded still lingers in the kernel and Packet Forwarding Engine. PR1253778

  • On a Junos-based platform, sometimes it might occur that FPC is stuck in offline state with the reason Restarted by cli command after restarting the FPC immediately after restarting chassisd. This occurs due to the fact that it takes sometime for the system to stabilize after chassisd restarts. Though chassisd would provide the FPC status and be able to accept the commands but in the back end it would be doing many initializations. So wait until all the PIC status are also available before issuing any command that makes fpc online, offline, and restart. PR1275530

  • CFM is not supported for L2-over-GRE tunnel. CCM can pass through as transit traffic via GRE interfaces transparently using data path. Link trace functionality uses mac-learning and re-injecting LTM on GRE interface in case the bridge is configured with CFM. This is not a supported feature. PR1275833

  • On MX104 JTASK_SCHED_SLIP is seen on commit randomly. PR1281016

  • With Junos Os Releases 16.2R1, 16.1R4 releases or above, the error message about jlaunchd, "jlaunchd: %AUTH-1: commit-batch is thrashing, not restarted, might be seen after system reboot or Routing Engine switchover. PR1284271

  • At reboot RHEL 7.3 servers report libvirtd[6282]: segfault at 10 ip 00007f87eab09bd0. No core file is left and no operational impact is known. PR1287808

  • When LLDP is configured on multihomed extended ports, the peer might have duplicate entries for a duration of the hold timer (default: 120 seconds) during catastrophic configuration events such as redundancy group ID change and redundancy group name change. The duplicate entry would be deleted after the LLDP hold timer expired on the peer. PR1291519

  • Race condition where on Ubuntu based external servers G-ARP may not be sent from jmgmt0 interface, resulting in loss of connectivity to management IP of JDM. PR1291836

  • This is a limitation or expected behavior for smart SFPs. When you insert a smart SFP, the link remains up for some time; for example, during smart SFP firmware initialization, the green LED on the transceiver glows green. PR1293522

  • The af interface bandwidth that is shown is based on the peer GNF's Packet Forwarding Engine type. The local FPC on the GNF could have a higher capacity for throughput than the af interfaces statically configured bandwidth. Also, the fabric capacity of the Packet Forwarding Engine is slightly higher than that of the WAN interface of same bandwidth. Because the fabric can accept more traffic, the af interface shows higher throughput rate than what the Packet Forwarding Engine is capable of. This is the expected behavior until the CoS shaping is supported on the interface. PR1295050

  • RPD sends a KStat request to the kernel, every time the show dynamic-tunnels database command is processed. Because Kstat is an asynchronous call and the CLI is not blocked until RPD receives a response from the kernel, there might be a mismatch in statistics between Packet Forwarding Engine and kernel for sometime. Eventually the statistics will be updated in rpd, whenever the response for the last statistics request is received. These statistics will be reflected in the output for next show dynamic-tunnels database command. PR1297913

  • For CFP2-DCO-T-WDM-1 pluggable, Rx payload type shown incorrectly (shown 0 vs 7). PR1300423

  • We do see the underflow error during FPC cold boot and initial traffic start cases. But these error are limited and should not appear once traffic is stabilized. PR1306280

  • UDP Setup rate for DetNat64 is aprox. 10% less than setup rate of stateful-nat64 for 15M sessions on single NPU. DetNat64 needs extra processing while creating sessions and hence it's setup rate is 10% less than setup rate of stateful-nat64. PR1307451

  • Support for enterprise profile is only provided for 10-Gigabit Ethernet interfaces. Use of 40-Gigabit Ethernet and 100-Gigabit Ethernet interfaces might result in a phase alignment issue. PR1310048

  • A mobiled core will occur in systems where one RE is running Junos version 16.2R1 or 17.1R1 and the other RE is running version 16.1 or 17.2 or later.The core happens on the 16.2R1 or 17.1R1 slot when it is operating as the system's master RE. The cause is a message that is sent from the backup to the master that the master fails to understand. This situation can happen at various times during ISSU or when the system has GRES enabled with mixed Junos versions. This issue has been fixed starting with 16.1R2 and 17.1R2. PR1322904

  • Parametrized (aka converged) HTTP redirect/rewrite services (CPCD) are not supported on Mx104 platform with MS-MIC. please note that other flavors of CPCD continue to work fine with this combination, Mx104 platform with MS-MIC. PR1330340

  • When a new instance of Virtual Route Reflector - vRR - is launched, the factory default configuration has dhcp client and auto image turned on. Even after DHCP config is removed, access-internal default routes installed by DHCP client may persist and cause reachability problem. This typically happens during initial installation, and restart routing immediately can clear the problem. PR1335925

  • Forward filter with log for Inline NAT is not supported. PR1385843

  • Newer B0 DCO modules(740-087314) HGFEC implementation is different and standardized vs. A0 (740-072229) which has different implementation causing link not to come up for interop between B0 and A0. PR1394134

  • IDS aggregate config knob will not be considered for the installation of the IDS dynamic filter. PR1395316

  • On vMX platforms, the link flapping for the ixgbe interface might trigger PF (Physical Function) to reset for ixgbe, but the VF (Virtual Function) reset will not be done. The issue results in traffic drop for the interface. PR1424626

  • HQoS configuration on ps interface anchored to logical-tunnel will fail to commit with the following error: [edit class-of-service interfaces ps0 unit 10]'output-traffic-control-profile'cannot configure traffic control profile (pic has no CoS queuing) error: configuration check-out failed. PR1429927

Infrastructure

  • Junos boots from OAM volume after shutdown. The root cause is the file system super block is corrupted, but what caused the super block corruption is unknown. PR1296861

Interfaces and Chassis

  • The same IP address could be configured on different logical interfaces from different physical interfaces in the same routing instance (including master routing instance), but only one logical interface was assigned with the identical address after commit. There was no warning during the commit, only syslog messages indicating incorrect configuration. PR1221993

  • Configuration not validated after interface is renamed or replaced (MX Series)—On MX Series routers, after an existing interface in a configuration is renamed or replaced, the configuration is not validated during commit operation. The same configuration with the modified interface name, which might or might not be supported, is saved to the database without any commit errors. If the saved configuration is unsupported, then when an operation is later performed on it, the behavior or response is unknown.

    For example, suppose the ge-1/0/0 interface supports the speed value to be configured (say, 1 Gbps) but the ae0 interface does not. You commit the following configuration on the ge- interface:

    user@host# set interfaces ge-1/0/0 speed 1g

    Later, you rename ge-1/0/0 to ae0 and commit the configuration, as shown below:

    user@host# rename interfaces ge-1/0/0 to ae0

    No validation is performed for the renamed interface ae0, and there are no commit errors. Although unsupported, the configuration is saved to the database.

    This is a known issue.

  • In a node slicing context, issuing the command set chassis fpc slot-number power off on the base system (BSYS) powers off even those FPCs that are assigned to guest network functions (GNFs) in which unified in-service software upgrade (ISSU) is in progress.

    Learn more about Junos Node Slicing.

  • At JDM install time, each JDM instance generates pseudo random MAC addresses to be used for JDM's own management interface and for the associated GNFs' management interfaces. At GNF creation time, each GNF instance generates pseudo random MAC addresses to be used as the chassis MAC address pool for the forwarding interfaces of that GNF. Once generated, JDM and GNF MAC addresses are persistent, and will only be deleted when the JDM or GNF instance itself is deleted.

    At a GNF, the Junos OS CLI command show chassis mac-addresses can be used to examine its chassis MAC address pool, and the Junos OS CLI command show interfaces fxp0 can be used to examine the MAC address of its management interface.

    At JDM, the CLI command show interfaces jmgmt0 can be used to examine the MAC address of its management interface.

    In case of MAC address duplication across JDM or GNF instances, you must delete and then reinstall the respective JDM or GNF instance and check again for duplication.

Junos Fusion Provider Edge

  • The FPCs were not online after an image upgrade due to lack of space in /var/tmp directory. After ensuring enough space in /var/tmp , this issue was never seen. PR1296082

Layer 2 Ethernet Services

  • Junos Fusion device supports aggregated Ethernet (ae) Interface with 16 member links. PR1300504

Multiprotocol Label Switching (MPLS)

  • When Flow-Label (FL) is enabled for PW, the OAM packets are not sent with Flow-Label because RPD is not aware of the Flow-Label values assigned by PFE software. Hence the packets are getting dropped by PFE at the tail-end PE. The remote PE is expecting the packet with FL and PW label. PR1217566

  • An SR-TE path with "0" explicit NULL as inner most label, SR-TE path does not get installed with label "0". PR1287354

Platform and Infrastructure

  • On all Junos OS platforms, execution of Python scripts through enhanced automation does not work on veriexec images. PR1334425

Routing Protocols

  • This is not a functionality impacting BUG, Issue here is BGP NSR replication starts after some delay in certain cases. PR1256965

  • RPD-Packet Forwarding Engine out-of-sync during MoFRR convergence. PR1284463

  • The mcsnoopd process might crash when all the core-facing interfaces that are part of the Layer 2 domain have flapped and the mcsnoopd is attempting to flood a packet received over a CE interface, over the core-facing interfaces. PR1329694

Services Applications

  • Session counters for cleartext traffic are not updated after decryption. Decrypted packet count can, however, be obtained by running the following command. show security group-vpn member ipsec statistics. PR1068094

  • Hide ha detail if its not configured on a particular interface. PR1383898

  • Broadband-edge platforms do not support service-set integration with dynamic profiles when the service set is representing a carrier-grade NAT configuration. As a workaround, you can use next-hop service set configurations and routing options to steer traffic to a multiservices (ms) interface where NAT functionality can be exercised. The following configuration snippet shows the basics of statically configuring the multiservices interface next hop and a next-hop service set. Traffic on which the service is applied is forced to the interface inside the network by configuring that interface as the next hop. This configuration does not show other routing-options or NAT configurations relevant to your network.

    [See Configuring Service Sets to be Applied to Services Interfaces.]

Software Defined Networking (SDN)

  • JDM restart failure in the first attempt—In some cases, after the Juniper Device Manager (JDM) is stopped, attempts to restart it may fail and result in the following error message: Job for jdm.service failed because the control process exited with error code. See "systemctl status jdm.service" and "journalctl -xe" for details. The message may further contain the following: error: Cannot set interface flags on 'macvlan8': Device or resource busy. Note that the actual mac vlan value may vary. As a workaround, you can reboot the server. Before initiating the reboot, ensure that the mastership is switched to the guest network functions (GNFs) on the other server to minimize disruption on the affected server.

Software Installation and Upgrade

  • Unified ISSU with active BBE subscribers using advanced services supported only to 17.4R2 and later 17.4 releases—If you have active broadband edge subscribers that are using advanced services, you cannot perform a successful unified in-service software upgrade (ISSU) to a Junos OS 17.4 release earlier than 17.4R2. If you perform an ISSU to a 17.4 release earlier than 17.4R2, the advanced services PCC rules are not attached to subscribers.

  • Unified ISSU not supported with an active RPM configuration—If you have an active real-time performance monitoring (RPM) configuration, you cannot perform a successful unified in-service software upgrade (ISSU) to a Junos OS 17.4 release. The warning ISSU is not supported for RPM configuration appears.

Subscriber Management and Services

  • The all option is not intended to be used as a means to perform a bulk logout of L2TP subscribers. We recommend that you do not use the all option with the clear services l2tp destination, clear services l2tp session, or clear services l2tp tunnel statements in a production environment. Instead of clearing all subscribers at once, consider clearing subscribers in smaller group, based on interface, tunnel, or destination end point.

  • Before you make any changes to the underlying interface for a demux0 interface, you must ensure that no subscribers are currently present on that underlying interface. If any subscribers are present, you must remove them before you make changes.

  • For dual-stacked clients over the same PPP over L2TP LNS session, enhanced subscriber management does not support configurations where both of the following are true:

    • The CPE sends separate DHCPv6 solicit messages for the IA_NA and the IA_PD.

    • The solicit messages specify a type 2 or type 3 DUID (link-layer address).

    As a workaround, you must configure the CPE to send a single solicit message for both IA_NA and IA_PD when the other configuration elements are present.

Known Issues

This section lists the known issues in hardware and software in Junos OS Release 17.4R3 for MX Series routers.

For the most complete and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.

Class of Service (CoS)

  • A CoS scheduler update might fail when all of the following conditions are met:

    • Dynamic subscribers exist on an aggregated Ethernet bundle.

    • CoS traffic-control-profile or scheduler-map (or both) applied to these dynamic subscribers is from a static configuration.

    • The relevant static CoS is modified in the same configuration commit as a modification to the aggregated Ethernet bundle (either a leg add or leg remove) containing the subscribers.

    • The leg add or leg remove in the commit is the first or last leg to be added or removed from a line card.

    To avoid this issue, do not commit a bundle change in the same commit as a static CoS change. In this event, one of the following logs is displayed in the message system log:

    subscriber cos update not applied to interface <interface-name>status <id> or subscriber cos update not applied to interface-set <interface-set-name> status <id>. These messages indicate that the last update to the subscriber or interface set was not applied.

    As a workaround:

    • (1) Remove the last class-of-service update.

    • (2) Commit the configuration.

    • (3) Re-apply the class-of-service update.

    • (4) Commit the configuration. PR1276459

  • Configuration of hidden statement rate-limit-burst in the class-of-service hierarchy. The commit needs to push an update for CoS code handling on all the Packet Forwarding Engines and during this time, if an interface settings ( Internal attributes for an interface) was found to be NULL. The Interface settings are usually stored in a memory location and the pointer to it became NULL because CoSd did not check for the NULL values and resulted in segmentation fault. Channelized interface setting was found to be NULL for channelized interfaces, but the CoS code handling the configuration rate-limit-burst in Packet Forwarding Engine de-referenced the setting without doing NULL check, resulting in generating core files. PR1425667

EVPN

  • The Layer 2 address learning process (l2-ald) might generate a core file in a scaled Layer 2 setup, including bridge domain, VPLS, EVPN, and so on. The l2-ald core file usually follows a kernel page fault that recovers on its own. In some cases, a manual restart of the process is needed to recover logs: /kernel: %KERN-3-BAD_PAGE_FAULT: pid 69719 (l2ald), uid 0: pc 0x88beb5ce got a read fault at 0x6ca, x86 fault flags = 0x4 /kernel: %KERN-6: pid 69719 (l2ald), uid 0: exited on signal 11 (core dumped) init: %AUTH-3: l2-learning (PID 69719) terminated by signal number 11. A core file is generated. PR1142719

  • In an EVPN scenario with static MAC configured in the EVPN instance, the remote EVPN instance can see the MAC route information. However, after deactivating and activating the static MAC in the EVPN instance, and then checking the MAC route information in the remote EVPN instance, no such MAC route is found in the EVPN route table. PR1193754

  • In an EVPN network with VXLAN encapsulation configured for direct-nexthop mode ("pure type 5" mode without overlay gateway addresses), at least one type 5 route per VRF from a remote endpoint must be received and installed in the local routing table of a device, to enable the local device to forward inbound type 5 traffic received from the remote endpoint. If the local device has not installed at least one route with a next hop pointing toward a specific remote endpoint, type 5 VXLAN-encapsulated IP traffic sent by the remote endpoint toward the local device will not be forwarded correctly. PR1305068

  • The issue is applicable to mac-in-mac PNN-EVPN and does not affect any other scenario. When PBB EVPN configuration is reloaded on MX Series routers, error logs are seen while deleting interfaces related to backbone bridge component. These errors does not result in any functional issues. PR1323275

  • PBB EVPN cannot flood traffic towards a core layer. Traffic recovers by performing restart l2-learning. In addition to this, there is a limitation in PBB EVPN active/active (A/A) unicast traffic forwarding. If entropy in the traffic is not sufficient, then uneven load balancing causes a problem on MH peer A/A routers. This causes a drop for return traffic. These issues are applicable to mac-in-mac private network-to-network (PNN)-EVPN and does not affect any other scenario. PR1323503

  • In an EVPN-VXLAN deployment, the rpd process might crash on the new master Routing Engine after performing a GRES. PR1333754

  • In Junos OS platforms, the l2ald daemon might crash during MAC address processing. The MAC learning process will be impacted during the period of l2ald crash. The l2ald recovers itself. PR1347606

  • Bidirection Layer 2 traffic floods for around 5 seconds for streams from SH to MH, when the clear mac table command is executed on the MX Series router because MAC addressing takes time to develop in the system. The clear mac table is a disruptive command that deletes all dynamic MAC addresses in the system. PR1360348

  • In the scenario of EVPN Type-5 Route with MPLS encapsulation for EVPN-MPLS on MX platforms, if statement chained-composite-next-hop ingress no-evpn is configured, the EVPN type-5 route might be lost in the EVPN routing table. PR1362222

  • Type 2 EVPN routes are missing after deactivating/activating protocol EVPN. PR1362598

  • When EVPN is configured with class-of-service-based forwarding (CBF), traffic might be lost for the CBF services. PR1374211

  • On EVPN-VXLAN scenario, during BGP flapping, the next-hop towards a VTEP (Virtual Tunnel End Point) might not be programmed properly, so if the traffic (especially inter-VNI traffic) destination is hashed through this Leaf/VTEP node, traffic loss might be seen. The reason is that due to BGP flap, the route delete and route add request to rpd might get compressed, which results in VXLAN database not getting updated with right unicast next hop to stitch it with VXLAN Encapsulation nexthop (VENH). Hence, VENH will not have unicast next hop to forward the traffic. PR1415450

  • On an MX104 router, the chained-composite-next-hop ingress evpnis missing in junos-defaults group, this configuration statement has to be configured to make EVPN work Junos OS Releases prior to 18.3R1-S1/18.3R2, otherwise EVPN does not work as expected. PR1415466

  • When DHCP is used with EVPN, Layer 2 learning daemon adds a destination route to kernel with a "permanent remote" flag while dhcp daemon adds a destination route with "permanent" flag. There could be a race condition where the layer 2 learning destination route gets overwritten by dhcp route, causing the remote flag to get deleted. This subsequently leads to the ARP route to age out in kernel. To ensure that dhcp routes are not added to kernel, forward-only statement must be configured under forwarding-options dhcp-relay. PR1439568

Forwarding and Sampling

  • In some stress test conditions, the sampled process crashes and generates a core file when connecting to L2BSA and EVPN subscribers aggressively. PR1293237

  • Heap memory leaks occur on DPC when the flow specification route is changed. PR1305977

  • Fusion: Firewall filter not applied as input filter to extended port when used for Layer 2VPN. PR1311013

  • This PR should fix some hints for the CLI commands to avoid confusion.With the fix, it will be like this:

    {master}[edit] user@router# set firewall flexible-match source-ipv6-match bit-length

    Possible completions: Length of integer input (1..32 bits), Optional length of string input (1..128 bits) <<<< added information that for integer the limit is 32bit {master}[edit] labroot@beltway-re1# set firewall flexible-match source-ipv6-match bit-length 120

    {master}[edit] user@router# commit check re1: commit-check failedcommit-check failed error: configuration check-out failed

    for range, added the syntax check that no "," "or" is supported.

    {master}[edit] user@router# set firewall family inet6 filter flex-match-v6 term source-ipv6 from flexible-match-range range 0x00000001-0x00010001, 0x00010001-0x00010070^ syntax error.

    {master}[edit] user@router# set firewall family inet6 filter flex-match-v6 term source-ipv6 from flexible-match-range range 0x00000001-0x00010001

    Possible completions:<[Enter]> Execute this command + apply-groups Groups from which to inherit configuration data + apply-groups-except Don't inherit configuration data from these groupsbit-length Length of the data to be matched in bits (1..32)bit-offset Bit offset after the (match-start + byte) offset (0..7)byte-offset Byte offset after the match start pointflexible-range-name Select a flexible match from predefined template fieldmatch-start Start point to match in packet| Pipe through a command {master}[edit] user@router# set firewall family inet6 filter flex-match-v6 term source-ipv6 from flexible-match-range range 0x00000001-0x00010001 or^ syntax error. PR1389103

  • The error of traffic not getting policied as expected is seen after local switching for VLAN 100 AND 10. While verifying Selective Local-Switching functionality with 4000 VLANs. PR1436343

  • ARP packets are getting dropped by the Packet Forwarding Engine after chassis-control is restarted. PR1450928

  • Commit failure with error might be seen and the dfwd crashes when applying a firewall filter with action then traffic-class or then dscp to an interface. PR1452435

  • On MX platforms, for an aggregated Ethernet bundle of at least two members hosted at two different FPCs, if the aggregated Etherne interface is with CoS output-traffic-control-profile of shaping-rate and with the output filter of policer with logical-bandwidth-policer and bandwidth-percent, the aggregated Etherne interface might have incorrect effective output policing rate. PR1466698

  • On the MX platform with MPC line card (except DPC line card) used, if an input firewall filter is configured at the ingress VPLS interface, the packet with a VLAN priority of five, with three or more VLAN tags might be forwarded into the wrong queue. When this occurs, it might cause traffic loss due to congestion as all traffic is forwarded into the default queue. PR1473093

  • If the policy-map xx option is configured under family mpls for filters, then the filters might not take effect after committing. PR1478964

General Routing

  • If a Layer 3 interface is receiving a GRE encapsulated packet and interface has two filters attached in ingress as follows:

    a. Family any with action as mirror

    b. Family inet with action as decapsulate gre

    then the expected behavior is that mirrored copy must have the GRE headers as well. However, that is not working as expected (and a bug) due to presence of filter (b). If the customer is interested in mirroring entire packet that came on the interface (that includes GRE header as well), then the workaround is to deactivate/disable the "decapsulate gre action of filter (b). PR1090854

  • An intermittent issue occurs when an aggregated Ethernet interface is configured with the bypass-queuing-chip configuration statement. The follow-up configuration changes are such that, removing a child link from an aggregated Ethernet bundle and configuring per-unit-scheduler on the removed child link in a single commit causes intermittent issues with the per-unit-scheduler configuration updates to cosd and the Packet Forwarding Engine. Hence, dedicated scheduler nodes might not be created for all units or logical interfaces. PR1162006

  • While upgrading from Junos OS Release 15.1F based images to Junos OS 16.x and later releases or downgrading from Junos OS Release 16.x to Junos OS Release 15.1F images, if the validate option is enabled, chassisd might crash and upgrade or downgrade will fail. This issue should not be seen if both base and target images are from Junos OS Release 15.1F or Junos OS Release 16.x and later. PR1171652

  • When same UID objects are used in both inet and inet6 services of the same subscriber session, deactivation the first session cause conditions which avoid releasing UID entry after deactivation second service session. This leads to having stale UID entry and can cause subscriber's connection problem in the future when UID pool would be completely exhausted. The probability of hitting the issue increases if amount subscriber to amount of unique services ratio is aproaching 1 (that is, when almost every subscriber has a service with unique service objects). PR1188434

  • After loading CoS-related configuration on MPC5E/MPC6E/MPC2E-NG/MPC3E-NG line cards, the following error messages might be seen: trinity_insert_ifl_channel:6449 ifl 495 chan_index 495 NOENT and jnh_ifl_topo_handler_pfe(11591): ifl=495 err=1 updating channel table nexthop. PR1186645

  • Source-address based Filter Based Forwarding is used under forwarding-options to steer the packets towards AMS bundle in the Vodafone configuration. When you remove the from source-address condition from the filter, the reverse traffic gets looped back into the AMS bundle. Under this condition, Prolonged Flow Control generates core files are seen. We do have from source-address configured in the SFW rule, which should have dropped the packets, which are getting looped back into the AMS bundle, but, this is not happening, even though SFW functionality works as expected for other packets. PR1192184

  • With MPC8/9 MRATE MIC and plug-in optics module(QSFP28-100GBASE-LR4), bit errors might be seen. PR1200010

  • Upgrading using unified ISSU might trigger a flap in the interfaces on MX Series routers. The following message might be seen: SFP: pointer Null, sfp_set_present. PR1200045

  • After system boot up or after PSM reset, you might see the PSM INP1 or INP0 circuit Failure error message. PR1203005

  • SMID daemon has stopped responding to the management requests after a jl2tpd (L2TP daemon) crash on an MX960 BNG. PR1205546

  • When virtual switch type is changed from IRB type to regular bridge, interfaces under the OpenFlow protocol are removed. The openflow process (daemon) fails to program any flows. PR1234141

  • After configuring PCEP following log seen - pccd: [89798] Could not decode message from rpd. This might impact in growth of memory of pccd process over time, which can be cleared by restarting the process. PR1235692

  • Aggregated Ethernet interface link remains down when it is configured with link-speed mixed mode. The issue was seen depending on the order of configuration. Creating aggregated Ethernet interface first, then add child interface to the aggregated Ethernet, aggregated Ethernet never becomes up. PR1241275

  • Continuous logging as PEM power status has changed, run power budget again at chassisd logs is noticed. PR1242847

  • When gRPC subscription for telemetry data with 2 seconds frequency, the jsd process might crash. PR1247254

  • Load Balancing is uneven across Aggregate Ethernet member links when the AE bundle is part of an Equal Cost Multi-Path (ECMP) path. The AE member-links needs to span Virtual Chassis members. PR1255542

  • On MX Series routers with XM chipset (for example, MPC3E, MPC4E, MPC5E, MPC6E, MPC2E-NG, and MPC3E-NG), the MPC might reboot when the unified ISSU completes. PR1256145

  • The following cosmetic error is observed as the output: mspmand[190]: msvcs_session_send: Plugin id 3 is not present in the svc chain for session. Please open a JTAC case to confirm. PR1258970

  • After router reboot or JSD (JET service process) process crash, sometimes the listening socket for JSD (JET service process) is not operational. PR1263748

  • The issue occurs when an interface comes online and both the OAM protocol and the MKA protocol try to establish their respective sessions. Because of contention between these two protocols, OAM takes down the interface and MKA fails to establish connection (because the interface is down, it cannot send out MKA packets). PR1265352

  • On an MX Series Virtual Chassis system in a scaled subscriber management scenario, if a unified ISSU is performed while the BGP protocol sessions are active and such BGP sessions are clients of BFD, then these BGP sessions might go down and come back up again, causing traffic loss. PR1265407

  • This very specific issue occurs when the Packet Forwarding Engine is oversubscribed with unknown unicast flood with no MAC learning, which is not a common configuration. During unified ISSU, only the Packet Forwarding Engine gets wedged. However, this issue is not seen when the Packet Forwarding Engine is oversubscribed with L3 traffic or with L2 traffic with MAC learning. PR1265898

  • GNFs in a node-slicing setup currently do not support Junos snapshot/recovery mechanisms. PR1268943

  • DEP does not support dh group group19, encryption algorithm aes-256-cbc and hash sha-384 in its list of default proposals. These must be configured explicitly in the configuration. PR1269160

  • Sometimes l2cpd core files are generated when LLDP neighbors are cleared. PR1270180

  • Incorrect counters for output packets on child links ae0 interface when configured with new feature 'revertive'. PR1273983

  • For inline jflow when configured template-referesh-rate and option-refresh-rate with both packets and seconds interval configuration options, the packets interval configuration is not working. PR1274206

  • On vMX platform, performance of the Intel X710 NIC is lower compared to the performance of Intel 82599 NIC. Because, 10G line rate can be achieved at 512 byte packet size for X710 NICs where as same can be achieved at 256 bytes for 82599 NICs. PR1281366

  • A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious exploitation of this issue might lead to a denial-of-service (kernel panic) or be leveraged as a privilege escalation through local code execution. The routines are only accessible through programs running on the device itself, and veriexec restricts arbitrary programs from running on Junos OS. There are no known exploit vectors utilizing signed binaries shipped with Junos OS itself. Refer to JSA10792 for more information. PR1282562

  • MX Series Virtual Chassis only: When using a channelized configuration on MPC7, MPC8, or MCP9 MRATE PIC QSFP interfaces for VCP connections between members, a VCP interface needs to be configured on channel 0 of each QSFP to activate the port. PR1283283

  • Due to vendor code limitation, ungraceful removing of summit MACsec TIC from chassis might cause a crash or unpredictable result. PR1284040

  • This is in an internal change as Syslog usage is deprecated. Applications have migrated to tracing for engineering debug messages or ERRMSG for customer useful/relevant messages. PR1284625

  • This is in an internal change as Syslog usage is deprecated, however, there may be customer impact due to syslog usage in automation. Applications have migrated to tracing for engineering debug messages or ERRMSG for customer useful/relevant messages. The customer is advised to migrate to new ERRMSG definitions as appropriate. PR1284643

  • TVP platforms do not support chassisd hard restart command due to infra limitation. FPC power off does not happen cleanly as the old chassisd process initiates FPC power off command and exits. restart chassisd hard with GRES on MX10003 causes new chassisd process to open reconnect window and wait for connection. RE and FPC goes out of sync and FPC reconnect is not handled which causes FPC to be restarted multiple times. Finally, FPC comes online. PR1293314

  • Junos OS releases with a fix committed in Junos OS Releases 15.1R5-S4, 16.1R4-S3, 16.1R5, and 17.3R1 with XM-based linecards (MPC3E, MPC4E, MPC5E, MPC6E, MPC2E-NG, or 3E-NG) might report DDR3 TEMP ALARM chassisd's error log message. PR1293543

  • In some Junos MX deployments, random syslog messages are observed as below for FPC cards fpcx ppe_img_ucode_redistribute Failed to evict needed instr to GUMEM - xxx left. These messages are not an issue and would not cause any service impact. These messages will addressed as "INFO" level messages. On Junos Packet Forwarding Engine there are dedicated UMEM and shared GUMEM memory blocks. This informational message indicates some evicting events between UMEN and GUMEN and can be safely ignored. PR1298161

  • When a GRES or NSR is performed on a BSYS the master Routing Engine on the GNFs (virtual nodes/network slices) will detect the BSYS chassisd restart and enter a NSR hold down delay. During this time CLI commands to evoke a switchover on the master Routing Engine will indicate the system is not NSR ready. This is similar to a stand alone MX if chassisd is restarted on the master Routing Engine. Note that a CLI command on the BU RE will succeed. This too is in keeping with standalone MX behavior. PR1298571

  • iLatency (calculated by differing producer timestamp and gRPC server timestamp) can sometimes be negative for Packet Forwarding Engine related telemetry packets due to drift in Routing Engine and Packet Forwarding Engine NTP servers. PR1303376

  • Support for enterprise profile is only provided for 10-Gigabit Ethernet interfaces. Use of 40-Gigabit Ethernet and 100-Gigabit Ethernet interfaces might result in a phase alignment issue. PR1310048

  • Alarm is raised if Mixed AC PEMs are present. Changed the criteria to check whether mixed AC is present. If the PEM is AC(HIGH) first bit of pem_voltage is set and if it is AC(LOW) second bit of pem_voltage is set. So if both first and second bit is set then MIXED AC is present. PR1315577

  • Making changes in services traffic-load-balance instance for one instance, can lead to refresh of existing instances. PR1318184

  • In JDM, (running on secondary server) jdmd daemon might generate core files if GNF add-image is aborted by pressing CTRL+C. PR1321803

  • With regards fpc restarts/Virtual Chassis splits, the design of MX Series Virtual Chassis infra relies on the integrity of the TCP connections and the reactions to failure situation might not handle in graceful way : tcp connection timeout because of jlock hog crossing boundary value (5 seconds) causing bad consequences in MX Series Virtual Chassis currently no other easy solutions that would be able to reduce this jlock hog besides enable marker infra in MX Series Virtual Chassis setup. PR1332765

  • USB is not pass through, hence you cannot access USB in Junos VM. PR1333201

  • The output of the CLI command show class-of-service fabric statistics now calculates traffic that was dropped because of internal errors in the fabric forwarding path. PR1338647

  • In Multiprotocol Label Switching (MPLS)/Resource Reservation Protocol (RSVP) environment, when the label-switched path (LSP) flapping cause RSVP LSP reroute, LSP might stick in Dn state with Record route: <self>...incomplete. PR1343289

  • On MX platform with 100M SFP used on MIC-3D-20GE-SFP-E/MIC-3D-20GE-SFP-EH, SFP might not work if it is not from Fiberxon or Avago. PR1344208

  • There is a possibility of MACSEC sessions not establishing if FPCs go through continuous cycles of offline/online ( more than 10 times) followed by restarting dot1xd. PR1344358

  • On Next Generation Routing-Engine (NG-RE), a failure of the Hardware Random Number Generator (HWRNG) will leave the system in a state where there is not enough entropy available to operate. PR1349373

  • In some cases, Online insertion and removal (OIR) of a MIC on an FPC can lead to black-holing of traffic destined to the FPC. The only way to recover from this is to restart the FPC. The issue will not be seen if use the corresponding CLI commands to offline and then online the MIC. PR1350103

  • On all Junos platforms, licenses might not take effect after successfully committing a license key configuration. PR1350302

  • During stress conditions error log messages regarding route add, change, or delete might be incorrect. PR1350713

  • When ephemeral DB instance is configured, if committing changes which are unrelated to IGMP/MLD (such as set interfaces ge-0/0/1.0 description), and the number of ephemeral commits reaches to ephemeral DB maximum size, the ephemeral DB purge might happen. Then it would purge all the commits and rollover. On this purge the mgd gives all the applications a FULL COMMIT view. And on this FULL COMMIT view IGMP/MLD deletes all configurations and adds it back again. This might cause PIM to prune the groups on those interfaces and send join messages again. Finally, the multicast traffic flapping and drop might be seen. PR1352499

  • On MX platform with the subscriber-management feature enabled, if the combination of an Ascend-Data-Filter (ADF) and a redirect filter is applied to the subscribers, it may cause a leak in the Broadband Edge (BBE) filter index. The index is not released when the subscriber logs out. Due to this issue, new subscribers are not able to connect when all the indexes are used up. PR1353672

  • The log of SMART ATA Error Log Structure error: invalid SMART checksum. might be seen on FPC with WINTEC mSata SSD. PR1354070

  • BGP IPv4 PIC: Packet Forwarding Engine Selector stuck in a rerouted state on the Unilist NH after Primary aggregated Ethernet link deactivate or activate. PR1354786

  • If the packets are destined to specific MAC address (such as last two octets are 0x1101, 0x1102, 0x1103, 0x1104, 0x1106, 0x1108, 0x1109, 0x110a, and so on), they might be dropped on the remote-end device when going through MX104 built-in xe(10GE) ports. PR1356657

  • The bbe-smgd process may restart unexpectedly. This issue is found while performing subscriber service's GRES test suite under heavy load. PR1359290

  • Craftd messages are generated on Summit MX 3RU (mx10003) and Summit MX 1RU (mx204) platforms. Summit platforms do not have Craft Interface. Hence these errors are expected, and can safely be ignored. When Craftd daemon tries to open the device, it fails with a junk char in the fatal error message because the error no is not mapped to a string in the kernel code. Feb 20 01:49:38 MX craftd[xxxx]: craftd detected platform mx10002 Feb 20 01:49:38 MX craftd[xxxx]: LIBJSNMP_SA_IPC_REG_ROWS: ns_subagent_register_mibs: registering 1 rows Feb 20 01:49:38 MX craftd[xxxx]: fatal error, failed to open smb device: ,JÎÈ. PR1359929

  • With MPC5E, MPC2E-NG, and 3E-NG and large-scale configurations along with large amount of traffic causing non-zero stats on multiple queues, when executing unified ISSU, the ISSU prepare stage might take longer time than usual because PR 1283850 introduced a bug which could cause the stats disable to take longer. As a result, the chassisd triggers restart/crash of the MPC and the ISSU completes after the crash. PR1369635

  • After successfully delegating a locally configured LSP to a PCE, the router still displays 0 as the "Delegated" counter value under the output of CLI command show path-computation-client status. PR1369929

  • The voltage high alarm might not be cleared when voltage level comes back to normal for MIC on MPC5E. PR1370337

  • On MX platform enabled with enhanced subscriber management, if the subscriber profile initiates a filter service for each subscriber, and there are large scale of Broadband Edge (BBE) subscribers (for example, 10000) logging in and out repeatedly, the filter service might fail to get installed for the subscriber due to this issue. In some rare condition, it might also lead to the Flexible PIC Concentrator (FPC) crash. PR1374248

  • I/O session used for communicating between threads is freed due to FSM state transition. After freeing the memory, the fields of the I/O session are used for tracing causing RPD core files. PR1374759

  • In subscriber scenario, if the"service-accounting-deferred" is configured on dynamic-profile, and there is multicast to a large number of destinations on the same physical port, the FPC Errors might be seen. PR1380566

  • set vmhost <> configuration command needs to be available user who have system-control permission (in order to be in line with set system <>command). But set vmhost <> is available user who has system-control permission corrected the same. PR1383706

  • It is possible to configure the purge timeout of programmable RPD clients to ’never’. This will mean that the routes added by PRPD clients will not be deleted when client disconnects. They will stay until routing daemon restarts or it is deleted by the client that added the route. This can be configured using following CLI command. Note the programmable API for setting purge timeout does not support this feature yet. Set routing-options programmable-rpd purge-timeout never. PR1384303

  • Due to transient Hardware condition single-bit error (SBE) event are corrected and have no operational impact. Reporting of those events had been disabled to prevent alarms and possibly unnecessary Hardware replacements. PR1384435

  • On MX platform enabled with subscriber scenario, if large scale of subscribers (for example, more than 1000 subscribers) set up connections simultaneously, the setup rate might be 30 percent lower than expected. PR1384722

  • MPC2E NG/MPC3E NG card will go in error with error id XM Chip Error code: 0x701ca PR1384830

  • When traceoptions are enabled with a lot of trace flags or 'flag all', the rpd might crash due to buffer overflow issue. This is a timing issue. PR1387050

  • In low end 32-bit systems, rpd has a lower level of available memory. It is desired to have a log message to alert customer when the average memory usage or transient memory usage exceeds thresholds. PR1387465

  • During Zero Touch Provisioning (ZTP) process, default route is being cleaned up by code. Due to this if a static default route is configured in the initial configuration (configuration file downloaded from the file server for ZTP), the route will fail to work. This might lead to ZTP failure or device access issue after ZTP. PR1387724

  • Bbe-smgd core files when MTU configuration is changed with subscribers are still logged in on the ifd. MTU configuration change should only be done when there are no subscribers logged in on the ifd. Catastrophic configuration changes should be done only in maintenance mode, when no subscribers are on the ifd. PR1389611

  • If the statement persist-groups-inheritance is configured, when trying to add additional sites to existing group and routing-instance configuration, error might be observed and it leads to fail to commit after issuing "commit check". PR1391668

  • On MX2008 platform with MPC9E, in line rate traffic with a redundant SFB2 scenario, if offline one redundant SFB2, there might be tail or sometimes WRED drops in MPC9E, resulting in partial traffic loss. Under normal circumstances, the SFBs should be auto fail-over if one of them fails, and there should be only a little packet dropped momentarily. PR1395591

  • MPC 7, MPC 8, and MPC9 cards have a local disk which they keep a copy of the software image. The cards boot from the disk when an image is there, and boot from the chassis network ( through BOOTP) when an image is not there. Presumably, new MPC 7, MPC 8, and MPC9 cards do not have an image on the disk and would require a network boot. On single chassis, there is no problem. But on MX Series Virtual Chassis, the network boot does not work. PR1396268

  • On MX Series platforms, if Channelized OC MIC (such as 1xCOC12/4xCOC3 CH-CE) is used, the MPC card/AFEB/TFEB (Forwarding Engine Board) might crash with core files. This is not easily reproducible. The traffic through the MIC would be impacted. PR1396538

  • The Junos RPD daemon has facilities to attempt to trap certain classes of non-fatal bugs by continuing to run, but leaving a "soft" core file. Leaving a soft core is intended to be non-disruptive to routing and forwarding. This PR implements a mechanism by which users may disable soft core files being generated. PR1396935

  • Router is advertising the ESMC QL of PRC even though the Current clock status is holdover. This behavior is addressed in this PR and will be applicable to all platforms. PR1398129

  • In MPLS over UDP or MPLS over GRE scenario, if the next hop type of the MPLSoUDP/MPLSoGRE tunnel is interface route, the tunnel may not come up. PR1398362

  • The authentication module for JET RPCs and Telemetry fails in authenticating usernames or passwords of certain lengths. Hence the users will be unable to execute JET APIs or Junos Streaming Telemetry. PR1401854

  • After upgrading Junos to Junos OS Release 17.2 or later, the statement chained-composite-next-hop ingress l3vpn extended-space cannot be configured any longer on a Logical system. PR1402390

  • On MX Series platform with MS-MPC card used, in race condition, if the MS-MPC is used on HA (High Availability) scenario ( the set interfaces ms-x/x/x redundancy-options redundancy-peer/redundancy-local knob and GRES is configured), the FPC might crash due to the bus error (segmentation fault). The reason is that when two CPUs simultaneously access the same session-extension memory in the session structure, one for writing, the other for reading. A reading CPU gets an incorrect value and uses that as the memory address. This causes the bus error (segmentation fault). PR1405917

  • The process rpd might crash after a non-forwarding route (that is, a route to an indirect next-hop association is non-forwarding indirect next-hop) which is received from multiple protocols is resolved again by using the non-forwarding path. PR1407408

  • On MX platforms using MPC7E, MPC8E, MPC9E, MX10k-LC2101 or MX10003, when inline-jflow application is used, Fatal error on Hybrid Memory Cube (HMC) will perform disable-pfe action. Since Jflow records are hosted on the HMC memory partition, reading and writing to the HMC memory might trigger FPC crash and high FPC CPU utilization, causing slow convergence (adding/deleting routes or nexthops) for other Packet Forwarding Engines on the same FPC carrier. PR1407506

  • Configuration database can remain locked after the ssh session is halted. PR1410322

  • On MX2020 and MX2010 platform, traffic traversing MPC8E or MPC9E may be discarded after one of SFB2s goes offline and it is requested online. This is a timing issue as it is not reproducible all the time. PR1410813

  • In MPC8 line card, enabling both bandwidth knob along with flex-flow-sizing knob may result in Jflow service getting disabled due to not able to allocate the memory requested by flex-flow-sizing knob. PR1413513

  • PCE initiated LSPs get deleted from PCC if PCEP session goes down and gets re-established within delegation-cleanup-timeout period. PR1415224

  • In Virtual Private LAN Service (VPLS) multihoming with Label-switched Interface (LSI ) interfaces used scenario, if the IPv6 neighbor is established via the VPLS, the IPv6 neighbor might become unreachable after the primary link of the VPLS multihoming goes down. The issue results in traffic loss for the IPv6 neighbor. PR1417209

  • With Netconf the xmlns attribute is printed twice for rpc <get-arp-table-information> to the router. PR1417269

  • Certain JNP10008-SF and JNP10016-SF manufactured between July 2018 to March 2019 may have incorrect core voltage setting. The issue can be corrected by re-programmed the core voltage and updated the setting in nvram memory. PR1420864

  • If HyperText Transfer Protocol (HTTP) Header Enrichment function is used, the traffic throughput decreases when traffic passes through Header Enrichment. PR1420894

  • On MX platform, with 1xCOC12 or 4XCOC3 used, if channelized interfaces are configured, FPC CPU overuse might be seen. PR1420983

  • On all Junos platforms, when the file system gets into full state and there is no enough spare disk space, it might get into a problematic system condition in some corner case while doing configuration commit. After that, if consecutive commits are still done in such a problematic status, commit-check failure logs might be seen eventually. Due to this issue, some process might be not running even if its configuration is present. PR1423500

  • Even though disk-failure-action reboot or disk-failure-action halt is configured, the system does not reboot or halt as expected when it encounters the disk error. PR1424187

  • The issue is limited to DB related to MAC-MOVE scenario. When dhcp-security is configured, if multiple IPv4 and IPv6 client's MAC-MOVE happens, the jdhcpd might consume 100% CPU and jdhcpd will crash afterwards. PR1425206

  • On all junos platforms running 64-bit mode rpd, the rpd will crash continuously if MD5 authentication on any protocols (like MD5 authentication for BGP/ISIS/OSPF) is used along with master-password. PR1425231

  • On some fixed MPCs with builtin PICs, the ENTITY MIB has incorrect contained in values for PICs when doing snmp mib walk for oid .1.3.6.1.2.1.47 .PR1427305

  • On MX platforms with ppp configured, when something abnormal happens such as the user's dialup router is abnormally powered off, or the keepalive packet is dropped due to network problem, the ppp session will ageout, while in a rare case, the ppp session is not getting deleted accordingly, which make the new session cannot be created. So new session is not able to log in. The ppp traffic might be dropped since duplicate-protection feature on the interface. And the IP address of the ppp interface cannot be pingable. PR1428212

  • MX is discarding the traffic coming from framed-route hosts even if IPoE subscriber installed with valid IPv4 framed routes. In Customer scenario, demux-source is configured with variable $junos-subscriber-ip-address. PR1429743

  • On MX platforms, in a subscriber management configuration, if VPLS encapsulation is only configured under user-facing interface while it is not configured under the core-facing interface, when incorrect configuration checks is being performed, this configuration is prevented from being applied. PR1430360

  • Multiple delete of a non existing config statements produces errors via rpc load-configuration. PR1431198

  • Dual Stack Subscriber Accounting Statistics are not baselined when one stack logs out. PR1432163

  • When SSH keys are generated during downgrade or upgrade of an image (usually on the first boot), <output> XML tags are visible in the messages. Taking out the xml tags will cause issues in netconf session. This is a minor cosmetic issue, hence does not have impact on the functionality. PR1432464

  • Digital Optical Monitoring MIB (jnxDomMib) currently not supported on MX150 and VMX platform. PR1432982

  • On MX platform with Trio based FPCs, if sa-multicast ' is in the configuration, all traffic will be dropped. PR1433306

  • URI portion in URL will become case-sensitive through a hidden configuration statement url-case-sensitive under url-filter-template. Existing behavior is the default that is, URL is case-insensitive including URL. url-filter[web-filter] {profile <name> {????????url-case-sensitive;????????}} }. PR1434004

  • On MX series routers with MPC7E, MPC8E, or MPC9E installed, if optics QSFPP-4X10GE-LR (Part number 740-054050) is used, the link might flap. PR1436275

  • The CPU utilization on mib2d daemon might keep at high level in race conditions (it may get hit or triggered at times by some churn in the system, no specific trigger). PR1437762

  • On all Junos platforms, if hash-key is enabled, packets might be dropped due to chassisd crash, even packets on other FPCs which the hash-key is disabled. PR1437855

  • In VSTP scenario, if flexible vlan tagging is configured on the interface and multiple IFLs are configured for the interface, if vlan all interface all is configured under VSTP, not all interfaces are enabled for this protocol. PR1439583

  • Egress stream flush failure and traffic blackhole could occur on a rare occasion for a repeatedly flapping link on MPC7, MPC8, and MPC9E cards. PR1441816

  • When MX configured with route-modify-same-preference statement, if the RADIUS returned framed-route is incorrect, such as "192.168.1.4/24", it will leave that route in the bbe-smgd and rpd not cleared. PR1445155

  • The multiservices PIC manager daemon (mspmand) runs on service PIC (MS-MPC/MS-MIC) and is responsible for managing URL Filtering service if URL filtering feature is configured. The mspmand process might crash if URL filtering is configured and one blacklisted domain name is a sub-string of another blacklisted domain name in URL filter database file. This would be continuous crashes until all the sub-string entries are removed from the system. PR1445751

  • On the platforms that do not support Router Advertisement Guard (RA Guard), such as PTX, after issuing the command show access-security router-advertisement-guard ??, the process jdhcpd may crash. PR1446034

  • On MX platform, when switchover a service interface that has NAT and GR configuration, the static route for NAT might never come up. PR1446267

  • Currently ISIS is sending system host-name instead of system-id in OC paths in lsdb or Adjacency xpaths in periodic streaming and on-change notification. PR1449837

  • In subscriber scenario, when a new burst-size of traffic-control-profiles (TCP) is configured under dynamic-profile, the new burst-size can not take effect, instead, the old burst-size is still activated actually. In the corner case, this will cause packets to drop. PR1451033

  • On the MX10003 platform, the alarmd wont write the alarm messages to the syslog. PR1453533

  • IPV6 accounting stop attributes are not correct for MLPPP subscribers. PR1455175

  • In the previous Junos version, the CLI command combination of "invoke-on" and "display xml rpc" may give incorrect RPC command, because this combination is not supported in Junos. E.g., issuing the command "show version invoke-on all-routing-engines | display xml rpc". PR1456578

  • MX-flexible-vlan-tagging change in MTU behavior from 15.1R PR1456809

  • When VRRP (virtual router redundancy protocol) is configured on MC-LAG (multichassis link aggregation groups), traffic destined to VRRP virtual MAC address might get dropped because the virtual MAC is not correctly programmed in PFE (packet forwarding engine). PR1459692

  • When labeled-IPv6 and non-labeled IPV6 prefixes are received with the same protocol nexthop and the outgoing interface does not have MPLS family enabled, the IPv6 non-labeled route will be in inactive state and remains in hidden state. PR1460786

  • Fabric hardening (FH) is the process of controlling bandwidth degradation to prevent traffic black hole. When FH is processing, if SFB/SCB get failure, FH process will be stuck, which will get traffic lost. PR1461356

  • With 17.4R2/17.4R2-S2+ release, if any MX10003 FPC restart or is set to be offline after GRES, the other FPC might coredump and all PICs might get stuck at offline state. Release in 18.x and above are not affected. PR1462686

  • The DFE tuning enabled interfaces on certain MX platform might get stuck in down state, if the remote interface sends invalid code to the local interface. Link might not come up even after the remote peer has begun sending a good signal. PR1463015

  • If any MIC of MIC-3D-2XGE-XFP / MIC-3D-4XGE-XFP / MIC-3D-20GE-SFP-E / MIC-3D-20GE-SFP-EH / MIC-MACSEC-20GE is installed in MPC2E-NG/MPC3E-NG card, the Microkernel (uKern) might hog for CPU on Packet Forwarding Engine (PFE) when there is a high rate of interface flaps (~30/40 flaps per second). This will eventually trigger the MPC2E-NG/MPC3E-NG card crash with an NGMPC core file. Normally the excessive interface flapping won't happen frequently in real world and it may be caused due to external environment. This fix will reduce the impact and prevent the uKern hog when having such conditions. PR1463859

  • On MX platforms with MS-MIC/MS-MPC, when stateful firewall is configured with "application junos-dce-rpc-portmap" and RPC ALG is enabled (both Sun RPC and MS-RPC), the mspmand might crash continuously (about every 15 or 20 minutes). PR1464020

  • If a netconf session is initiated over inband connection, the CPU utilization on mgd daemon might be stuck at 100% after the netconf session which is executing an RPC call for some commands gets interrupted by flapping interface. There is no impact observed to control-plane or forwarding-plane, the subsequent netconf session will continue to function. PR1464439

  • Traceroute generates ICMP error message like Destination Host unreachable, Time exceeded etc which actually helps in identifying the intermediate hops. Code Logic for handling ICMP errors was not there as part of asymmetric processing. PR1466135

  • In the PPPoE subscriber management environment, due to the PPPoE inline keepalives timeout events may get dropped by the RE (routing engine), the PPPoE subscribers get stuck. This issue may cause the PPPoE subscribers are unable to reconnect. PR1467125

  • Crypto library shim memory utilization performance improvement by using data shim instead of control shim. PR1467874

  • On Junos from 16.2R1 onwards, if "commit" is executed after "commit check", the daemon (e.g. dhcpd, sampled) might not be started even the related configuration is successfully committed. PR1468119

  • When tunnel-services are configured on a PIC, the optics measurements that subscribed via gRPC might not be streamed. PR1468435

  • On all Junos platforms with l2cpd (Layer-2 control protocols) daemon, committing configuration changes which are processed by l2cpd (e.g., flexible-vlan-tagging, stacked-vlan-tagging, vlan-tagging, family ethernet-switching) might cause marginally memory leak. Committing the l2cpd processed configuration changes in a successive manner might cause the memory resource exhaustion (Some operations have the same effect as the committing action, e.g., bouncing a vlan-tagged interface in a successive way). Eventually, it could result in the l2cpd process crash. PR1469635

  • VMCORE-/../src/junos/bsd/sys/netjsr/jsr_prl.c:2128 PR1472519

High Availability (HA) and Resiliency

  • The following error is seen during early unified ISSU validation phase: error: not enough space in /var on re1. As a workaround, make sure that the space available in /var is twice the size of the target image. This is the basic requirement for unified ISSU to proceed. PR1354069

Infrastructure

  • The /var/run is in storage file system but it should be in memory file system. PR1198395

  • The configuration statement set system ports console log-out-on-disconnect, logs the user out from the console and closes the console connection. If the configuration statement set system syslog console any warning is used with the earlier configuration and when there is no active telnet connection to the console, the process tries to open the console and hangs as it waits for a "serial connect" that is received only by doing a telnet to the console. As a workaround, remove the later configuration by using set system syslog console any warning, which solves the issue. PR1230657

  • On MX Series, if GRES is not configured, while "master-only" IP is configured on fxp0.0, the IP address might not be applied to the interface after reboot. PR1341325

  • If you pulled out a USB from the system while files are being copied, the kernel will panic and the system will restart. PR1425608

  • On all Junos platforms that are upgraded to Junos OS Release 15.1 onward, when the duplex setting is changed on the management interface (for example, fxp0/em0), the duplex status of the management interface might not be updated in the output of the "show interface <>". PR1427233

  • The service utility "cron" runs in the background and regularly checks /etc/crontab for tasks to execute and searches /var/cron/tabs for custom crontab files. These files are used to schedule tasks which "cron" runs at the specified times. "cron" daemon is started during boot. If for some reason, the "cron" process exits, the scheduled tasks will not be executed. "cron" was not restarted automatically and had to be started manually. PR1463802

Interfaces and Chassis

  • Junos now checks IFL information under the ae interface and prints only if it is part of it. PR1114110

  • In Junos BNG solutions, after commit event, when configuration contains duplicate vlan-id configured on agregate and demux interfaces, Junos MX Series routers may go into db prompt mode and kernel core files asserted. PR1274038

  • Upgrading Junos OS Release 14.2R5 and later maintenance releases and Junos OS Release 16.1 and later mainline releases with CFM configuration might cause the cfmd process to crash after upgrade. This is because of the old version of /var/db/cfm.db. PR1281073

  • LAG member links running LACP in slow mode might get disassociated from the LAG bundle with a combination of restart interface-control and FPC offline/online trigger. The issue was seen with scale configuration on DUT. The scale details are: 2800 CFM sessions 2800 BFD sessions 2043 BGP peers 3400 VRF instances. PR1298985

  • Y.1731 Dwlay measurement is not supported on MPC6. PR1303672

  • In MX Virtual chassis, flooding of the error message ?CHASSISD_CONFIG_ACCESS_ERROR: pic_parse_ifname: Check fpc rnage failed can be seen with LACP enabled aggregated Ethernet interfaces on MPC7, MPC8, and MPC9 cards. The errors will only have impact for DWDM pics, which does not effect on the MPC7, MPC8, and MPC9 cards. Hence this syslog message can be safely suppressed. PR1349277

  • In L2VPN (Layer 2 Virtual Private Network) scenario with sonet interface which is used for PE-CE link, that sonet interface might go down after enabling "keep-address-and-control" knob on it. PR1354713

  • With ppp-service traceoptions configured as: user@router> show configuration protocols ppp-service traceoptions file jtac-jpppd.log size 1g files 10; level all; flag all; filter {user {"subscriber@domain.com";} }. It is expected to see only PPP negotiation events belong to subscriber defined in filter section. However in releases affected by this issue several stings of logs related to other (non interested) subscriber may be seen. PR1370994

  • In large scale subscriber environment, changing ae member link configuration may cause two REs coredump. PR1375638

  • Static demux0 logical interfaces do not come up after configuration change if underlying interface is et ( 100 GE ). After the configuration change et interface gets flushed in order to reparse the configuration. During this DCD miss to create the dependency between demux0 logical interfaces and underlying et interface which results in flushing off the demux0 logical interfaces. This issue will be seen only if underlying interface is et. For all other interfaces this has been already taken care. This is day one issue. As a workaround, restart DCD (or the entire RE reboot) to clears the problem or else use 'commit full' instead of commit while committing new configuration. PR1401026

  • On MX Series platforms, EX-SFP-1FE-LX SFP does not initialize with MIC-3D-20GE-SFP-E(EH). PR1405271

  • On all Junos platforms, if this is any protocol running upon aggregated Ethernet interfaces, while committing any configuration changes related to aggregated Ethernet interfaces, unrelated aggregated Ethernet interfaces might go down. PR1409535

  • When an unnumbered interface is binding to an interface which has more than one IP address and one of the IPs is deleted, the family inet of the unnumbered interface might be getting deleted. The issue results in traffic loss for all the services that rely on the family inet of the unnumbered interface. Configure preferred-source-address on the unnumbered interface will prevent deletion of the IP hence avoiding the deletion of the family inet of the unnumbered interface. PR1412534

  • If aggregated interface(ae) has vrrp configuration, in following use cases, member IFLs will not be created after member IFD comes up and ae will be in down state.

    1. fpc restart (request chassis fpc restart slot <>)

    2. chassis-control restart (restart chassis-control)

    3. reboot both RE (request system reboot both-routing-engines). So before performing above operations, it is advisable to remove vrrp configuration from aggregated interface(ae). PR1429045

  • Customer need two knobs for EOAM CFM interoperability between MX10003 and Ciena CPE Two knobs: 1. primary-vid - this allows interop with Ciena CPE - which is used at evert tower site to est. EOAM CFM session 2. enhanced-cfm-mode - provides required scale needed for EOAM for CBH and METROE services PR1465608

  • When EVPN setup in MPLS Active/Active (A/A) or VxLAN A/A enviroment, if Ethernet Segment Identifier (ESI) is configured on a physical interface (IFD) of multi-homed PE, Designated Forwarder (DF) election will not happen when the logical interface (IFL) under the IFD disabled. At a result, this issue will cause traffic drop. PR1467855

  • When dynamic DHCP sessions are existing in the device, if multiple commits in parallel are performed, the commit might hang up. PR1470622

Layer 2 Features

  • For router equipped with following line cards:

    T4000-FPC5-3DMX-MPC3E-3DMPC5E-40G10GMPC5EQ-40G10GMPC6E MX2K-MPC6E.

    If the router is working as VPLS PE, due to MAC aging every 5 minutes, the VPLS unicast traffic is flooded as unknown unicast every 5 minutes. PR1148971

  • With VPLS being configured, after upgrade to 15.1/16.1/17.x releases, in some circumstances VPLS LSI interface are not correctly created, causing remote MACs not being learnt and L2 VPLS outage. The issue is not reproduced and the code change is not a fix but add a instrumentation using a hidden command 'show vpls ipc-history', which should be captured right away when the issue is seen on latest releases. show vpls ipc-history <<<<< show vpls connections show krt queue show route forwarding-table extensive /var/log/messages PR1295664

  • On all Junos platforms with NSR enabled, under EVPN-VPLS scenario, the VPLS neighbors might stay in down state after configuration changes in vlan-id. PR1428862

Layer 2 Ethernet Services

  • This is in an internal change as syslog usage is deprecated, however, there may be customer impact due to syslog usage in automation. Applications have migrated to tracing for engineering debug messages or ERRMSG for customer useful or relevant messages. The customer is advised to migrate to new ERRMSG definitions as appropriate. PR1284592

  • In MC-LAG with force-up scenario, the LACP PDU loop might be seen when both MC-LAG nodes and access device using same admin key. PR1379022

  • In DHCP relay scenario, if the device (DHCP relay) receives a request packet with option 50 where the requested IP address matches the IP address of an existing subscriber session, such request packet would be dropped. In such a case the subscriber may need more time to get IP address assigned. The subscriber may remain in this state until it's lease expires if it has previously bound with the address in the option 50. PR1435039

  • When DHCP is configured, if subscribers are moved from one routing-instance to another or if the subscribe is deleted and re-added, the jdhcpd process might go into infinite loop and cause 100% CPU usage. PR1442222

  • There are two options to configure DHCP relay, one is using dhcp-relay knob, the other is using helper bootp. On MX10000 platform, neither of DHCP-Relay nor helper bootp function can work. PR1447323

MPLS

  • When using mpls traffic-engineering bgp-igp-both-ribs with LDP and RSVP both enabled, CSPF for interdomain RSVP LSPs cannot find the exit area border router (ABR) when there are two or more such area border routers (ABRs). This causes interdomain RSVP LSPs to break. RSVP LSPs within the same area are not affected. As a workaround, you can either run only RSVP on OSPF ABR or IS-IS L1/L2 routers and switch RSVP off on other OSPF area 0/IS-IS L2 routers, or avoid LDP completely and use only RSVP. PR1048560

  • The issue occurs when graceful Routing Engine switchover (GRES) is done between the master and backup Routing Engines of different memory capabilities. For example, one Routing Engine has only enough memory to run routing protocol process (rpd) in 32-bit mode while the other is capable of 64-bit mode. The situation could be caused by using Junos OS Release 13.3 or later with the configuration statement auto-64-bit configured, or, by using Junos OS Release 15.1 or later even without the configuration statement. Under these conditions, the rpd might crash on the new master Routing Engine. As a workaround, this issue can be avoided by using the CLI command set system processes routing force-32-bit. PR1141728

  • The routing protocol process (rpd) might crash in the backup Routing Engine when LSP tunnels are present with an NSR configuration. PR1186292

  • In a CE-CE setup, traffic loss might be observed over the secondary LSP on primary failover. PR1240892

  • If the primary link goes down immediately after bypass (for example, FPC containing both primary and bypass or, both primary and bypass FPCs go down simultaneously) such that primary link goes down even before the PLR sends out any Path message after bypass down, then the nodes downstream of the PLR along the LSP path will be left with stale LSP state until refresh timeout. This condition will not result in any traffic loss. PR1242558

  • Because of the current way of calculating bandwidth, you see a minimal discrepancy between MPLS statistics and adjusted bandwidth reported. The algorithm will be enhanced so that both values match 100 percent. PR1259500

  • It takes longer to set-up Layer 3 VPN egress protection starting from Junos version 16.1R1. PR1278535

  • In case of CSPF-disabled LSPs, if the primary path ERO is changed to an unreachable strict hop, sometimes the primary path stays up with the old ERO. The LSP does not switch to standby secondary. PR1284138

  • An SR-TE path with "0" explicit NULL as inner most label, SR-TE path does not get installed with label "0". PR1287354

  • Swapping the binding SID between colored and non colored static SR LSPs might cause rpd to generate a core file. PR1310018

  • The Packet Forwarding Engine on Trio platform or PTX/QFX10000 follows a certain conversion logic to convert MPLS-VPN labels to certain channel values, and then back to MPLS-VPN labels. VPN labels having values 0x7FFFF and above ( 524287 and above) are affected by this conversion logic. PR1323496

  • If inet address is not configured for the gr- interface, the gr- interface will borrow address from loopback interface. From 16.1R1, the RSVP creates a node-neighbor by default. There are duplicate neighbors with the same IP address since the gr- interface is borrowing address from loopback interface. The RSVP path lookup will fail because it gets confused with the node neighbor presence. So the RSVP LSP will not come up when it goes through the gr- interface which is borrowing address from the loopback interface. PR1340950

  • Executing a restart chassisd in a router with scaled configuration might result in rpd core files. PR1352227

  • When 'tunnel-services' is configured under 'chassis fpc <> pic <>', the vt-x/y/z physical interface (IFD) is created for the corresponding FPC. If 'protocols rsvp' is configured, RSVP will create a default vt-x/y/z.u logical interface (IFL) under the corresponding vt-x/y/z IFD. After applying a configuration change that will remove RSVP and trigger FPC restart, the vt-x/y/z.u IFL is not cleaned up due to a code issue. Hence the corresponding vt-x/y/z IFD cannot be cleaned up during the corresponding FPC coming up. The IFD cleaning keeps retrying which cause the corresponding FPC to be stuck in 'Ready' state. PR1359087

  • When traceroute to a remote host for an MPLS LSP using the command traceroute mpls bgp, in very rare cases, it is possible that mplsoam daemon is holding the stale BGP instance handle in the query to the rpd process to get the information for the Forwarding Equivalence Class (FEC), hence rpd crash might occur because of the invalid instance. It may cause traffic impact till rpd comes back up. PR1399484

  • On Junos platforms with scaled MPLS labels used, when the system is already running with high load, inefficient labels allocation might cause even higher CPU utilization at 100 percentfor hours. The issue might affect traffic. PR1405033

  • The LDP transit egress route for a BGP route has an indirect nexthop. In NSR and GRES scenario, after Routing Engine switchover, in some cases, LDP might fail to receive route flash for a BGP route from inet.0 and would not update the inet.3 route for the BGP route. As a result, the nexthop for LDP transit egress route will become unusable and the LDP transit egress route will get deleted. It could cause BGP sessions to go down and cause traffic drop. PR1420103

  • Dynamically configured RSVP LSPs for LDP link protection may not come up after disabling/enabling protocol mpls. PR1432138

  • In inter-domain RSVP (Resource Reservation Protocol) LSP (Label-switched Path) scenario, the rpd memory leak might be seen when the CSPF (Constrained Shortest Path First) tries to recompute the path for the "down" LSP which is due to no route or ERO is incorrectly configured. The issue might lead to rpd crash when the rpd is out of memory and results in traffic loss. PR1445024

  • In RSVP environment with link or node protection deployed, if two consecutive PLRs (point of local repair) along the LSP perform local repair simultaneously and if backup LSP signaling between the downstream PLR & MP (merge point) pair fails due to any reason, then the backup LSP signaling between the upstream PLR & MP pair also does not succeed. Then due to a software defect the upstream PLR does not correctly clean up the LSP state and continues to send traffic into the backup LSP, resulting in traffic blackhole at the downstream PLR. PR1445994

  • In Link Aggregation Control Protocol (LACP) with Unilist next-hop scenario, when Resource Reservation Protocol (RSVP) protection or BGP Prefix-Independent Convergence (PIC)is used, if the LACP interface flapping happens fast enough, which might cause traffic blackhole. Due to a delay which causes the first "link down message" arriving at Packet Forwarding Engine (PFE) after the "link up message" already being received. So that PFE marks both of the primary and backup next-hop as unusable. (This is a timing issue) PR1452866

  • On all platforms with BGP PIC configured, if doing some commit operations where RSVP ingress routes are affected, the rpd crash might be seen. PR1471281

  • In a corner case on Junos platform, where the family ccc is configured along with any other existing family within the same interface, like inet, inet6, etc. (basically, Junos never allows to do so, but somehow a customer did it ). And if the family ccc is deleted from the interface, which might cause kernel crash and the device reboot automatically, so all the traffic will be interrupted. PR1478806

Network Management and Monitoring

  • Issue: snmpd daemon leaks memory in snmpv3 query path and crashes. Cause: The issue is caused by a memory leak when the request PDU is dropped by snmp when the configuration - snmp filter-duplicates is enabled. Each request PDU has a structure pointer for the SNMPv3 security details. This is allocated when the pdu is created or cloned. But while dropping the duplicate requests the corresponding free for this structure is not done, which causes the memory leak. PR1392616

Platform and Infrastructure

  • In configurations with IRB interfaces, during times of interface deletion (for example, FPC reboot), the Packet Forwarding Engine might log the error as nh_ucast_change:291Referenced l2ifl not found. This condition should be transient, with the system reconverging on the expected state. PR1054798

  • The login_getclass: unknown class 'j-idle-timeout error is getting displayed when the user has not configured timeout value for root user. If the user has not configured timeout value, j-idle-timeout entry is not present in login.conf file and error message is displayed because j-idle-timeout class is not found. Steps to Reproduce:

    1) Login to router as root.

    2) Clear log messages.

    3) Exit and go to CLI mode and type show log messages. The login error should be logged in the messages. PR1097799

  • The error messages about LUCHIP(5) GUMEM1[77a0] mismatch might be seen after MX Series MPC card with LU chipset goes offline or online. PR1221195

  • With unified ISSU, momentary traffic loss is expected. In EVPN E-Tree, in addition to traffic loss, the known unicast frames can be flooded for around 30 seconds during ISSU before all forwarding states are restored. This issue does not affect BUM traffic. As a workaround, nonstop bridging (NSB) can be configured at [set protocols layer2-control nonstop-bridging]. This reduces traffic flood to around 10 seconds in a moderate setup. PR1275621

  • Due to a transient hardware error condition the CPQ Sram parity error and CPQ RLDRAM double bit ECC error syslog errors on MQCHIP raise a major CM alarm. PR1276132

  • An accuracy issue occurs with three-color policers of both type single rate and two rate in which the policer rate and burst-size combination of the policer accuracy vary. This issue is present starting in Junos OS Release 11.4 on all platforms that use MX Series ASIC. PR1307882

  • Traffic statistics may not match on PS after clearing interface statistics. PR1328252

  • On all JunOS platforms, execution of Python scripts through enhanced automation does not work on veriexec images. PR1334425

  • Provides ability to configure host rsyslog from Junos guest. HOST side: The facility is one of the following keywords: auth, authpriv, cron,daemon, kern, lpr, mail, mark, news, security (same as auth), syslog, user, uucp and local0 through local7. The keyword security should notbe used anymore and mark is only for internal use and thereforeshould not be used in applications. Anyway, you may want to specify and redirect these messages here. The facility specifies thesubsystem that produced the message, that is, all mail programs log withthe mail facility (LOG_MAIL) if they log using syslog. The priority is one of the following keywords, in ascending order: debug, info, notice, warning, warn (same as warning), err, error(same as err), crit, alert, emerg, panic (same as emerg). The keywords error, warn and panic are deprecated and should not be used anymore. The priority defines the severity of the message. Guest side: https://www.juniper.net/documentation/en_US/junos/topics/reference/general/ syslog-facilities-severity-levels.html

    remote : sync syslog server config from Junos to Linux & modify rsyslog.conf

    set vmhost/app-engine syslog host <ip/ip6>any any

    set vmhost/app-engine syslog host <ip/ip6>match xxx PR1341549

  • In filter list (input-list/output-list) scenario, when the filters in the same filter list refer to a same nested filter, the FPC might crash continuously. The issue results in traffic loss during FPC crash and reboot. PR1357531

  • In a Layer 3 VPN topology, traceroute to a remote PE device for a CE-facing network results in an ICMP TTL expired reply with a source address of only one of the many CE-facing networks. In Junos OS Releases 15.1R5, 16.1R3, and 16.2R1 and later releases, there is a kernel sysctl value, icmp.traceroute_l3vpn. Setting this to 1 will change the behavior to select an address-based on the destination specified in the traceroute command. This PR adds the option to the configuration. PR1358376

  • Sometimes OSPF flapping during unified ISSU from Junos OS Release 16.2R2 to Release 17.2R3. PR1371879

  • One single port with Dual stack subscribers pppoe/dhcpv6 drop all the connections and no subscribers seen now. PR1382288

  • In Junos Fusion provider edge setup, if CoS (class-of-service) is configured in the cascade port, when doing some CoS configurations changes, such as deactivating or activating CoS configurations on the cascade port, the traffic on this port would be silently dropped due to Packet Forwarding Engines mis programming for CoS queue of the cascade port. PR1408159

  • On MX Series routers with MS-MPC cards, when FPC restart or routing-instance type is changed (for example, virtual-router to vrf), or RD is changed, traffic from a Group virtual private network (GVPN) tunnel to MPLS over UDP tunnel may fail to get decrypted on the MS-MPC, this will cause complete service loss. PR1422242

  • On all Junos platforms with NSR enabled, the BGP session with hold-time 6 seconds or smaller flaps after the backup RE is pulled out ungracefully. PR1428518

  • For the bridge-domains configured under an EVPN instance, the ARP suppression is enabled by default. This enables the EVPN to proxy the ARP, and reduces the flooding of ARP in the EVPN networks. Because of that, the storm-control is not taking effect to the ARP packets on the ports under such bridge-domain. PR1438326

  • When executed over Junos CLI, Python op script is started as a separate process with the same user as the user which started the script.However, when the python op script is started from NETCONF session, the script started as a process from user "nobody". If the script is using PyEZ session to connect to the device and execute RPC commands, it will return the following error from Pyez: ConnectError(host: None, msg: user "nobody" does not have access privileges.). This is fixed by executing with the python op script with the same user as the user from the NETCONF session which invoked op script. This means that the behavior from CLI and NETCONF sessions are the same. PR1445917

  • In NTP with the boot-server scenario, when the router or switch boots, the NTP daemon will send a ntpdate request to poll the configured NTP boot-server to determine the local date and time. If the ntpdate is not be activated correctly while the device booting, the ntpdate might not work successfully. Then some cosmetic error messages of time synchronization might be seen, but there is no impact with time update since ntp daemon will update the time eventually. PR1463622

  • On MX-VC setup with bridge-domains configured, if ae interface is used within bridge-domain, and if the ingress ae and egress ae interface host in different VC members, the Layer-2 traffic over ae sent from one member to another is getting corrupted. PR1467764

Routing Policy and Firewall Filters

  • The rpd might crash during the policy configuration changes. PR1357802

  • If a policy-option with only conditions from route-distinguisher and then next-hop a.b.c.d is applied to BGP, the next-hop for routes in the inet.0 might be set to this next-hop a.b.c.d, even though these routes do not carry any route-distinguisher value (l3vpn.inet.0 is unaffected). PR1433615

Routing Protocols

  • When you configure damping globally and use the import policy to prevent damping for specific routes, and a peer sends a new route that has the local interface address as the next hop, the route is added to the routing table with default damping parameters, even though the import policy has a non-default setting. As a result, damping settings do not change appropriately when the route attributes change. PR51975

  • When only default routing-instance is present, the Junos command show bgp summary does not show the BGP ESTABLISH state. If the BGP state is not an ESTABLISHED state, then it shows the states as design (that is, Active, Idle, Connect). If there is a routing-instance configured (apart from master routing-instance inet.0), the BGP ESTABLISH state is showed properly. Issue happens for IPv4 BGP sessions only, on IPV6 we always see all the BGP states as default. PR600308

  • Continuous soft core files might be generated due to bgp-path-selection code. The routing protocol process (rpd) forks a child and the child asserts to produce a core file. The problem is with route-ordering and it is auto-corrected after collecting the soft-assert-core file, without any impact to the traffic or service. PR815146

  • In rare cases, rpd might generate a core file with error rt_notbest_sanity: Path selection failure on .... The core is 'soft', which means there should be no impact to traffic or routing protocols. PR946415

  • For single-hop eBGP session, upon interface down event, do not do GR helper logic. In problem state Peer: 8.3.0.2 AS 100 Local: 8.3.0.1 AS 101Group: EBGP Routing-Instance: masterForwarding routing-instance: masterType: External State: Active Flags: <>Last State: Idle Last Event: StartLast Error: CeaseImport: [ reject ]Options: Holdtime: 90 Preference: 170 Local AS: 101 Local System AS: 0Number of flaps: 2Last flap event: StopError: 'Cease' Sent: 1 Recv: 0NLRI we are holding stale routes for: inet-unicastTime until stale routes are deleted or become long-lived stale: 00:01:54 >>>>>>>>>>Time until end-of-rib is assumed for stale routes: 00:04:54Table inet.0RIB State: BGP restart is completeSend state: not advertisingActive prefixes: 14Received prefixes: 21Accepted prefixes: 15Suppressed due to damping: 0Stale prefixes: 21 PR1129271

  • JTASK_SCHED_SLIP for rpd may be seen on doing restart routing or ospf protocol disable with scaled bgp routes in MX104 router. PR1203979

  • Certain BGP traceoption flags (for example, "open", "update", and "keepalive") might result in (trace) logging of debugging messages that do not fall within the specified traceoption category, which results in some unwanted BGP debug messages being logged to the BGP traceoption file. PR1252294

  • LDP OSPF are 'in sync' state and the reason observed for this is "IGP interface down" with ldp-synchronization enabled for OSPF. user@host> show ospf interface ae100.0 extensive Interface State Area DR ID BDR ID Nbrs ae100.0 PtToPt 0.0.0.0 0.0.0.0 0.0.0.01Type: P2P, Address: 10.0.60.93, Mask: 255.255.255.252, MTU: 9100, Cost: 1050Adj count: 1Hello: 10, Dead: 40, ReXmit: 2, Not StubAuth type: MD5, Active key ID: 1, Start time: 1970 Jan 1 00:00:00 UTCProtection type: NoneTopology default (ID 0) -> Cost: 1050LDP sync state: in sync, for: 00:04:03, reason: IGP interface downconfig holdtime: infinity As per the current analysis, IGP interface down is observed as the reason because although LDP notified OSPF that LDP synchronization was achieved, OSPF was not able to take note of the LDP synchronization notification, because the OSPF neighbor was not up yet. The issue is under investigation. PR1256434

  • When generating SNMP traps/notifications for BGP events from the jnxBgpM2 MIB, Junos was not properly emitting OBJECTS of type InetAddress with the expected length field. This will cause compliant SNMP tools to be able to parse the contents of those OBJECTS properly. In particular, the length field for the InetAddress OBJECT-TYPE was omitted. Using the set protocols bgp snmp-options emit-inet-address-length-in-oid command will cause these OBJECTS to be emitted in a compliant fashion. Given the length of time that this error has been in place, it was decided to leave the existing non-compliant behavior in place to avoid breaking tools that had accommodated the existing behavior as the default. PR1265504

  • Two multicast tunnel (mt) interfaces are seen for each of the PIM neighbors after VPN-Tunnel-Source activation or deactivation. However, ideally, the same tunnel source should be used for both IPv4 and IPv6 address families, if both are using the same PIM tunnel. PR1281481

  • This is in an internal change as Syslog usage is deprecated, however, there may be customer impact due to syslog usage in automation. Applications have migrated to tracing for engineering debug messages or ERRMSG for customer useful/relevant messages. The customer is advised to migrate to new ERRMSG definitions as appropriate PR1284621

  • In rare cases RIP replication may fail as a result of performing NSR Routing Engine switch overs when the system is not NSR ready. PR1310149

  • Rpd core file is observed at 0x094680ac in task_reconfigure_complete (ctx=0x9dfe940 <task_args>, seqnum=570) at ../../../../../../../src/junos/lib/libjtask/mgmtlib/../module/task_reconfig ure.c:172. As a workaround, avoid doing additions and deletions in a single commit. Instead, first do the fwdclass deletion, wait for a while, and then do the fwdclass addition. PR1319930

  • When route target filtering (RTF) is configured for Virtual Private Network (VPN) routes and multiple BGP session flap, there is a slight chance that some of the peers might not receive the VPN routes after the flapped sessions come up. PR1325481

  • In a large-scale OSPF network (for example, there are more than 500 devices in an area), OSPF remote loop free alternate (rLFA) default PQ node selection algorithm does not provide proper protection paths. PR1335570

  • In JunOS 16.1 or higher, during BGP convergence, the input/output thread constructing the outgoing BGP PDU and manipulating the path attributes before hand-off the data to the socket. If this PDU length is zero, it will trigger an assertion and routing-protocol demon is restarting. PR1351639

  • When clear validation database was issued back to back multiple times, we ended up with partial validation database (some validation entries were missing). This eventually recovered after up to 30 minutes (half of the Record Lifetime) when we did periodical full updates. PR1326256

  • In a large-scale OSPF network (for example,there are more than 500 devices in an area), OSPF remote loop free alternate (rLFA) default PQ node selection algorithm does not provide proper protection paths. PR1335570

  • When a BGP import policy changes IPv6 routes to have IPv4 nexthop, rpd might crash during route resolution. With the fix, changing route to have nexthop with different address family will not be allowed, if the route table does not have that resolution family configured. PR1389557

  • In BGP scenario with multipath enabled, if applying import/export policy of IPv6 routes with IPv4 next hop to a BGP neighbor, the rpd might crash continuously. PR1390428

  • If an import policy is applied to a BGP neighbor and the policy has indirect IPv4 next hop for IPv4 and IPv6 routes (IPv6 routes resolved over IPv4), when BGP unresolved route is withdrawn, rpd crash might be seen. PR1391568

  • When 'as-path-group' is configured under BGP, if a configuration with a large scale as-path regex is committed, the route protocols flap might be seen. PR1396344

  • When NSR (nonstop-routing) is enabled in local device and BGP GR (Graceful-Restart) is enabled in peer device, if the peer triggers a GR restart (it is usually caused by some failure in peer or the peer restarts rpd, etc), some BGP sessions might stuck in Idle state. The reason is that when the GR restart happens, the device is still doing the initial sync to the backup RE of the previous sessions, so some BGP sessions might stuck in Idle state because the router does not complete the process (the initial sync of the data set to the backup). PR1412538

  • Change in route selection process. To select the better route between a non-BGP and BGP route, if you are at Step 7 of the route selection process (https://www.juniper.net/documentation/en_US/junos/topics/reference/general /routing-protocols-address-representation.html), then the BGP route is always the better one. PR1415468

  • If IGMP v2 is used and proxy mode is used for igmp-snooping, multicast traffic might be dropped because by default proxy sends queries/reports in IGMP v3 version, until the device receives new IGMP v2 query or report. PR1425621

  • In a scenario with IS-IS running single spf (shortest-path-first) for IPv4 and IPv6, that is, multi-topology is not enabled, when a new IS-IS link comes up, IFA (interface address) for IPv4 comes up quickly and the route is installed, but IFA for IPv6 is not up quickly because DAD (Duplicate Address Detection) is enabled by default. Therefore, after spf calculation, the next-hop list for IPv6 remains empty for about 11 seconds, and IS-IS ends up deleting the route. PR1430581

  • By default, BGP multipath is for load balance with BGP neighbors in the same AS. For load balance with BGP neighbors in a different AS, the statement "multiple-as" is further needed. However if the statement "multiple-as" is only configured in some BGP groups but not in all BGP groups, the expected load balance will not work. PR1430899

  • On all Junos platforms working as the source node (e.g. node S) where Per-Prefix Loop Free Alternate (PP-LFA) is configured for Open Shortest Path First (OSPF) routing protocol, if the destination prefix is learned from two originator nodes (e.g. node E and node F) with different costs, and both originator nodes E and F are directly connected with the source node S, PP-LFA might not work as expected in such scenario where the last hop needs to be protected on the penultimate hop. Due to this issue, an improper backup nexthop might be selected which couldn't handle node failure case and micro-loop might be seen. PR1432615

  • In BGP segment routing traffic engineering (SRTE) scenario, process rpd might crash when knob "extended-nexthop-color" is added or removed from the BGP configuration. PR1442952

  • When configuring an alternate incoming interface for a PIM RPF check using rpf-selection, you might find that additional groups outside the configured range switch to the alternate incoming interface. PR1443056

  • On Junos platforms with BGP-PIC (protect core) and "add-path" enabled scenario, the rpd CPU utilization gets 100% due to incorrect path-selection. This issue may impact route update convergence or even cause routing protocols to flap. PR1446861

  • If multipath is enabled, in some certain conditions, the rpd core might be seen while secondary route resolution. PR1454951

  • With IS-IS configured and in a very rare case, memory corruption may occur, this may cause rpd crash continuously. PR1455432

  • The rpd crash might be observed due to modification of router-id in OSPF NSSA with area-range configured. PR1459080

  • On all Junos platforms running with Border Gateway Protocol (BGP), if both BGP multipath and BGP damping are configured, it might happen that, when the active route, for example r1, is withdrawn but it is not really deleted due to damping, then BGP might be unable to find its original gateway when the route r1 is relearned and becomes the best route again. It will lead to the rpd process crash. PR1472671

Services Applications

  • It is not recommended to configure ms- interface when ams bundle in one-to-one mode has the same member interface. PR1209660

  • Calling station was getting truncated after 64 bytes. As part of fix we are supporting calling-station till 128 bytes. PR1462689

  • On MX platforms with MS-MPC/MS-MIC, after the IPsec VPN tunnel is up, if the NATTed remote peer's IP address has been changed (e.g. NAT pool changed on peer), IKE SA might establish with an incorrect gateway, and kmd might crash frequently during this IKE SA IP migration. PR1477181

Subscriber Access Management

  • Sometimes, when PPPoE subscribers login and logout from Junos OS 16.1 releases, the following messages are generated: user@devcie> show log messages | match authd authd[5208]: sdb_app_access_line_entry_read_by_uifl: uifl key 'demux0.xxxxxxxx': snapshot failed (-7) authd[5208]: sdb_app_access_line_entry_read: uifl key 'demux0.xxxxxxxx': read failed These messages indicate that authd daemon for subscriber authentication is attempting to read private data for an underlying interface which no longer exists (-7 = SDB_DATA_NOT_FOUND). These messages have no impact and can be safely ignored, where authd daemon is asking sdb for record that no longer exists. PR1236211

  • authd re-use address too quickly before jdhcpd completely cleanup the old subscriber which flooding error log . The log such as jdhcpd: %USER-3-DH_SVC_DUPLICATE_IPADDR_ERR: Failed to add 10.1.128.3 as it is already used by 1815. PR1402653

  • Subscriber filtering for General Authentication Services traceoptions will report debug messages for other users. PR1431614

  • The output of "test aaa ppp" is missing "<radius-server-data>" tag. PR1444438

  • In Gx-Plus for Provisioning Subscribers scenario, when the PCRF (Policy and Charging Rules Function) server is unreachable or the diameter protocol is down, the subscriber login might fail to successfully establish a session or the subscribers might fail to bind a service policy by Gx-Plus after the PCRF Server connectivity is restored. PR1449064

User Interface and Configuration

  • Junos Fusion show chassis hardware satellite command is not available on Junos OS Release 17.3. root@mx104> show chassis satellite detail Satellite Alias: fusion FPC Slot: 101 Operational State: Online <...> Below, you can see no "show chassis hardware satellite" option: root@MX104> show chassis hardware ? Possible completions:<[Enter]> Execute this command clei-models Display CLEI barcode and model number for orderable FRUsdetail Include RAM and disk information in outputextensive Display ID EEPROM informationmodels Display serial number and model number for orderable FRUs| Pipe through a command. PR1388252

  • Changing nested apply groups does not take affect. PR1427962

VPNs

  • When switching from l2ckt to evpn vpws, deactivate and activate the instance. PR1312043

  • JDI-RCT:Summit:Rpd core@ rtbit_reset, rte_tgtexport_rth PR1379621

  • On all Junos platforms, if there are multiple interfaces configured under a single l2circuit/local-switching, and each of these interfaces has a description field configured under them, when l2circuit/local-switching connections flapping continuously, memory usage increment might happen, eventually, it will result in rpd crash because of running out of memory. PR1418870

  • In MVPN scenario with ingress replication selective provider tunnel used, if the knob "link-protection" is added/deleted from the LSP for MVPN, rpd crash might be seen. The reason is that when link-protection is deleted, the ingress tunnel is not deleted, and when link link-protection is added back, it tries to add same tunnel, hence the rpd asserts as same tunnel exists. Finally the rpd core might be seen. PR1469028

Resolved Issues

This section lists the issues fixed in the Junos OS main release and the maintenance releases.

For the most complete and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.

Resolved Issues: 17.4R3

Application Layer Gateways (ALGs)

  • DNS requests with EDNS options might be dropped by DNS ALG. PR1379433

Authentication and Access Control

  • MAC move might occur in DHCP security scenario. PR1369785

  • Push-to-JIMS now supports push auth entry to all online jims servers. PR1407371

Class of Service (CoS)

  • CoS is incorrectly applied on Packet Forwarding Engine, leading to egress traffic drop. PR1329141

  • Configuring host-outbound-traffic under class-of-service may cause certain devices to crash. PR1359767

  • The 802.1P rewrite may not work on inner VLAN. PR1375189

  • FPC card might reboot when changing CoS mode from hierarchical-scheduler to per-unit-scheduler. PR1387987

  • The cosd process might crash during committing configuration change through netconf. PR1403147

  • Traffic drop occurs when deleting MPLS family or disabling interface which has non-default EXP rewrite-rules. PR1408817

  • The host-inbound packets might be dropped if configuring host-outbound FC. PR1428144

  • Firewall process crash might be seen with Multifield Classifier configuration. PR1436894

EVPN

  • EVPN/VXLAN: MAC entry incorrectly programmed in Packet Forwarding Engine, leading to some traffic getting silently dropped or discarded. PR1231402

  • L2ALD restarts when changing "protocols" related configuration. PR1357911

  • EVPN: Last designated forwarder update time is not in sync with system time PR1362997

  • Packet drop in EVPN stitching with IRB configured. PR1363935

  • The EVPN implementation does not follow RFC-7432. PR1367766

  • Small rpd memory leak when configuring EVPN. PR1369705

  • EVPN active/active multihomed PE device occasionally prefers to route to a directly connected prefix using LSPs towards the multihomed peer instead of going directly out the IRB interface (which is up). PR1376784

  • MAC addresses might disappear if the interface MTU of EVPN PE is changed. PR1382966

  • The RA packets might be sent out without using the configured virtual gateway address. PR1384574

  • EVPN-VXLAN: VTEP tunnel does not get deleted when EVPN peer goes down. PR1390965

  • A few minutes of traffic loss might be observed during recovery from link failure PR1396597

  • The BUM traffic might not be flooded in EVPN-MPLS scenario. PR1397325

  • IPv6 link-local address for virtual-gateway address is marked as duplicate in EVPN. PR1397925

  • EVPN Type 2 MAC+IP route is stuck when the route advertisement has two MPLS labels and withdrawal has one label. PR1399726

  • ARP refresh functionality may fail in an EVPN scenario. PR1399873

  • RPD core files are seen upon Routing Engine switchover with scaled EVPN configuration. PR1401669

  • The rpd crashes due to memory corruption in EVPN. PR1404351

  • EVPN database and bridge mac-table are out of sync due to the interface's flap PR1404857

  • The rpd might crash on a leaf node when handling the withdrawal of remote or local MAC address in an EVPN-VXLAN scenario. PR1405681

  • Local L2ALD proxy MAC+IP advertisements accidentally delete MAC+IP EVPN database state from remotely learned type 2 routes PR1415277

  • The device may proxy the ARP Probe packets in an EVPN environment PR1427109

  • Incorrect MAC count with "show evpn/bridge statistics". PR1432293

  • Stale MAC addresses are present in the bridge mac-table in EVPN/MPLS scenario PR1432702

  • Restarting l2-learning might cause some remote MAC addresses to move into forwarding 'dead' state PR1441565

  • Traffic drop might be seen at EVPN Layer3 Gateway scenario PR1442319

  • The bridge mac-table age timer does not expire for rbeb interfaces PR1453203

  • ARP request/NS might be sent back to the local segment by DF router PR1459830

Forwarding and Sampling

  • The kernel crash might be observed when there is a firewall filter modification. PR1365265

  • In EVPN A-A scenario with MX acting as PE device, flood NHs to handle BUM traffic might not get created or miss certain branches when the configuration is performed in a particular sequence. PR1377749

  • LTS Subscriber statistics reporting to RADIUS. PR1383354

  • The lsi binding for the IPv6 neighbor is missing. PR1388454

  • The filter counter is not written to the accounting file when accounting is enabled on the bridge firewall filter. PR1392550

  • The srrd process might stuck at 100 percent usage when Jflow is used. PR1393696

  • Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored (CVE-2019-0036). PR1394922

  • In some newer releases firewall filter action "decapsulate gre" cannot decapsulate ip-over-ip and ipv6-over-ip traffic. PR1398888

  • The SRRD might crash when memory corruption occurs PR1414568

  • The firewall filter configuration change might not be applied after software upgrade to Junos release 16.1R1 or later PR1419438

  • EVPN enhancement for MAC flush mechanism in JUNOS PR1421018

  • The device is in Amnesiac mode after ISSU with "mgd: error: configuration check-out failed" generate PR1432664

  • High CPU utilization of l2ald is seen after replacing EVPN configuration. PR1446568

  • [MX204] Input/Output counters of AE bundle/member links configured on non-default logical systems are not updated PR1446762

  • The pfed might crash and not be able to come up on the PTX or TVP platforms PR1452363

  • The l2ald process might observe memory leak on Junos platforms PR1455034

General Routing

  • The command "show configuration | compare" shows unchanged configuration after deleting part of the configuration under the firewall section. PR1042512

  • TACACS access does not work after upgrade. PR1220671

  • Routing Engine-Packet Forwarding Engine out-of-sync errors might be seen in syslog PR1232178

  • Mspmand core observed while sending TFO packets with high rate using tcpreplay tool PR1253862

  • Error messages might be seen if the aggregated Ethernet interface hosted on MPC-3D-16XGE card flaps. PR1279607

  • Migrate from syslog API to Errmsg API;/src/junos/usr.sbin/mspsmd. PR1284654

  • The fault "PCI Device missing" alarm might be observed during upgrade PR1301191

  • The rpd might crash by executing the command "show route extensive" during deletion of IS-IS configuration. PR1301849

  • The mgd might crash when Ephemeral DB is used PR1305424

  • The "LIBJNX_REPLICATE_RCP_ERROR" error message might be seen when the backup Routing Engine is not present in the dual Routing Engine scenario. PR1305660

  • Incorrect packet statistics are reported in the ifHCInUcastPkts OID. PR1306656

  • MACSEC causes dot1xd JTASK_SCHED_SLIP or FPC disconnect PR1322302

  • Potential heap leak at tcp_conn_create under UKERN TCP stack. PR1326746

  • GRE interface might not come up after deactivating or activating the routing instances. PR1327099

  • AI-script does not get automatic upgrade unless it is manually done after a Junos OS upgrade. PR1337028

  • The rpd might crash when high-priority routes flap PR1338895

  • fpc temperature mismatch for mpc8/9 on mx2k platform PR1339077

  • Error message "RE does not have MAC map for mac type 7" might be seen on Summit platforms PR1345637

  • Linux-based FPC should close chassis TCP control connection immediately when J-UKERN is crashing. PR1347536

  • JSA10914 Junos OS: QFX10K and PTX Series: FPC process crashes after J-Flow processes a malformed packet (CVE-2019-0014) PR1348417

  • The MPC might crash when the MIC is removed. PR1350098

  • Large-scale users' login and logout may cause mgd memory leak. PR1352504

  • Traffic loss might be seen on new master Routing Engine after the interface flaps followed by Routing Engine switchover in VRRP scenario PR1353583

  • Trinity JNH memory leak when adding and removing unicast NH PR1354225

  • Traffic drop might be seen after GRES if uRPF is configured. PR1354285

  • Traffic might be blocked on MX with MS-MPC/MS-MIC PR1358019

  • MPC/FPC might be unable to reply request messages to Routing Engine in a high subscriber scale scenario. PR1358405

  • The "show chassis fpc" might show "Bad Voltage" for FPC powered off by configuration or CLI command after the command "show chassis environment fpc" is executed PR1358874

  • FPC core files might be observed after GRES switchover PR1361015

  • IP over VPLS traffic is affected by EXP rewrite rule on the core-facing MPLS interface. PR1361429

  • MX Series router functioning as a BNG does not generate ESMC/SSM Quality Level failed SNMP trap. PR1361430

  • The MS-MPC might reset continuously on MX Series platform. PR1362271

  • JDI-RCT:M/Mx: Traffic loss of 1% is seen during GRES phase of ISSU from 17.3-20180527.0 to17.3-20180527.0 PR1362324

  • Executing "show route prefix proto ip detail" during route churn in a route scale scenario may lead to FPC crash. PR1362578

  • The inline J-Flow sampling configuration might cause FPC crash on MX Series platforms. PR1362887

  • Streaming telemetry data might not be received by one client when two clients subscribe to the same path with same frequency at the same time. PR1363199

  • MX Series Virtual Chassis: Request to record VCCP heartbeat state change in syslog by default. PR1363565

  • FPM board status is missing in SNMP MIB walk result. PR1364246

  • The kernel might crash after repeatedly deactivating/activating interfaces/filter/class-of-services configurations due to accessing stale memory entry PR1364477

  • Configuration commit might be delayed by 30 seconds. PR1364621

  • The rpc command about interface unit might fail. PR1365151

  • Extended traffic loss when performing ISSU/GRES with aggregated Ethernet interface configured with LACP. PR1365316

  • MS-MPC/MS-PIC might be crash in NAT scenario. PR1366259

  • JDI-RCT:M/Mx: Syslog errors seen " LOG : Err] Failed to allocate 2 jnh-dwords for encap-ptr(ether-da)!,LOG: Err] gen_encap_common: jnh-alloc failed! 8" PR1366811

  • I2C error logs are seen when configuring wavelength on tunable SFP+. PR1367224

  • The bbe-smgd process might crash during the authentication phase for L2BSA subscriber. PR1367472

  • RTG interface status will be shown as incorrect status with show interface. PR1368006

  • Junos OS:set system ports console insecure allows root password recovery on OAM volumes (CVE-2019-0035) PR1368998

  • Error messages about mic_sfp_phy_mdio_sgmii_lnk_op might be seen after FPC is booting up on MX Series or EX9200 platform. PR1369382

  • when you configure vrrp delegate-processing with tomcat enabled, the Packet Forwarding Engine dropped VRRP packets and count sw error. PR1369503

  • SNMP mib walk causes KMD errors. PR1369938

  • The rpd might crash after Routing Engine switchover is performed or the rpd is restarted if interface-based dynamic GRE tunnel is configured. PR1370174

  • The bbe-smgd might crash when FPC is restarted. PR1371926

  • The IPv6 routed packet might be transmitted through an interface whose VRRP state is in non-master. PR1372163

  • The dot1xd might crash when dot1xd receives incorrect reply length from the authd. PR1372421

  • Image installation on SD fails with the error " Unable to read reply from software add command to re1; error 1". PR1372877

  • The Routing Engine might crash after non-GRES switchover PR1373079

  • URL filtering might not work when the data interfaces move from one VRF to another. PR1373582

  • LDP convergence delay might be seen after IGP metric change with the statement bgp-igp-both-ribs configured. PR1373855

  • Cosmetic log "warning: [---] is protected, '---' cannot be deleted" is seen after commit using "configure private" in a configuration with "protect" flag present PR1374244

  • FPC might be unable to work properly if one child interface is removed from an aggregated Ethernet bundle in dynamic VLAN subscriber scenario. PR1374478

  • The bbe-smgd might crash continuously in centralized IGMP scenario. PR1374530

  • The rpd process might crash when route flap and LSP flap occur with CBF enabled. PR1374558

  • PCE initiated LSPs remain "Control status became local" after removing PCE configuration. PR1374596

  • Few L2BSA subscribers might be stuck in init/terminating/terminated status after previous logout. PR1375070

  • SFB and PDM/PSU related information is missing in jnxBoxAnatomy MIB on high end MX Series routers (MX2010/2020). PR1375242

  • The bbe-smgd core files might be seen after doing GRES. PR1376045

  • MS-MPC might have performance degradation under scaled fragmented packets. PR1376060

  • PFE wedge may be observed if there are interfaces going to down state PR1376366

  • Interface optic output power is not zero when the port has been disabled PR1376574

  • MX Series BNG Node Slicing - DHCP Relay - AF Interfaces snoop and drop DHCP replies from DHCP server. PR1377358

  • Packets might be dropped on data plane in the inline J-Flow scenario. PR1377500

  • bbe-smgd cores trying to scale to 2000 BGP peers with 2000 dynamic PPPoE clients enabled w/routing-services. PR1378542

  • After NAT64 router (with MS-MPC) translates an IPv6 fragment to IPv4 fragment, the router is not inserting the right value in the identification field of IPv4 Header. PR1378818

  • ICMPv6 packets larger than 1024 might be dropped if "icmp-large-packet-check" is configured on IDS service. PR1378852

  • ARP request packets might be sent out with 802.1Q VLAN tag PR1379138

  • Traffic might get silently dropped or discarded when CoS configuration is changed on a PS interface. PR1379530

  • Protocol adjacency might flap and FPC might reboot if jlock hog happens. PR1379657

  • Remove the chassisd alarms for FPCs exceeding 90 percent of power budget and exeeding 100 percent of power budget PR1380056

  • MQSS errors might cause FPC restart. PR1380183

  • The Routing Engines might crash with various core files due to the deadlock issue on the SDB STS. PR1380231

  • The rpd might crash on the new master Routing Engine when performing GRES. PR1380298

  • IPv6 ping might fail for spine node in EVPN scenario. PR1380590

  • The routes learned over an interface will be marked as "dead" next hop after changing the prefix length of an IPv6 address on that interface PR1380600

  • Layer 3 VPN traffic might be dropped because one core-facing interface goes down. PR1380783

  • Daemon dfwd might crash with DFWD_TRASHED_RED_ZONE log messages. PR1380798

  • FPC might crash on PTX or QFX10000 after lo0 filter change PR1380917

  • IRB interface does not turn down when master of Virtual Chassis is rebooted or halted. PR1381272

  • Traffic is silently dropped or discarded when FPC is taken offline in an MC-LAG scenario. PR1381446

  • Memory leak observed in MS-MPC card. PR1381469

  • Constant memory leak might lead to FPC memory exhaustion. PR1381527

  • The unicast traffic from IRB interface towards LSI might be dropped due to Packet Forwarding Engine mismatching at egress processing. PR1381580

  • SSD lifetime might be shortened in OVSDB environment. PR1381888

  • All type of subscribers might not be able to log in after double GRES operations. PR1382050

  • The MPC6E might crash while fetching PMC device states. PR1382182

  • Flows are getting exported before the expiry of the configured active timeout value. PR1382531

  • The chassisd might crash due to HW-DB errors on TVP based platforms PR1383246

  • Domain name is not reported as part of the LLDP system name in "show lldp neighbor" command. PR1383295

  • The configuration performed through NETCONF session might fail. PR1383567

  • Adjusting mac-table-size configuration might cause l2ald crash. PR1383665

  • The VC could not come up after upgrading to QFX5E platforms (TVP-based platforms for QFX5100 or QFX5200 switches) PR1383876

  • The kmd crashes with core file after bringing up IPSec connection. PR1384205

  • CoS attachment might be mistakenly removed for DHCPv4 stack when DHCPv6 stack fails to be brought up for a single session dual stack subscriber. PR1384289

  • Missing statement "interface-description" for static subscribers. PR1384421

  • MBFD flaps because clksync congests the scheduler for 100ms. PR1384473

  • Multiple bbe-smgd core files with reference to bbe_mcast_vbf_dist_policy_service_encoder( ). PR1384491

  • BFD sessions might flap consistently PR1384601

  • SNMP MIB walk returns unexpected data. PR1384807

  • ARP and ethernet-table entry is pointing to an aggregated Ethernet interface whose state is down if MTU is changed. PR1385199

  • On vMX systems, when you configure large number of interfaces, the vFPC CPU utilization might go very high periodically because of interface statistics collection running repeatedly. PR1385853

  • The device with more than five IP addresses configured in the DHCP server group goes into amnesiac mode after reboot PR1385902

  • IPSec VPN traffic might fail when passing through MS-MPC of MX Series routers with CGNAT enabled. PR1386011

  • ALB-ECMP may not work as expected for LDP tunnels PR1386061

  • The rpd process might end up with stuck krt queue entries in a VRF scenario PR1386475

  • In subscriber management environment, DHCP subscriber might get stuck in terminated state. PR1386662

  • In case an LSP is locally configured without an explicit path, ERO object remains empty in the PCRpt generated by PCC. PR1386935

  • Uninitialized EDMEM[0x400094] Read (0x6db6db6d6db6db6d) logs are seen with sampling applied to a subscriber with routing-service applied. PR1386948

  • On MX2000 platforms, backup CB's chassis environment status keeps 'Testing' after backup CB becomes online by removal/insert operation PR1387130

  • The pccd might crash when changing delegation-priority PR1387419

  • The bbe-smgd process might crash when two subscribers log in with the same framed-route prefix and preference values. PR1387690

  • Output of the "show class-of-service interface" command incorrectly shows adjusting application as PPPoE IA tags for DHCP subscribers. PR1387712

  • Some SFBs might go down when one of the PSMs in the chassis generates a bad output voltage which is out-of-range PR1387737

  • IPsec IKE keys are not cleared when delete/clear notification is received PR1388290

  • The bbe-smgd might not respond to the NS message for the SLAAC client on dynamic VLAN. PR1388595

  • Fabric drops might be seen if using a newer generation of MPC with SFB2 PR1388780

  • Incorrect value for flow packets/octets fields might be seen in inline J-Flow scenario. PR1389145

  • IGMP group threshold exceed log message prints a wrong demux logical interface. PR1389457

  • BFD flaps are seen on PTX or QFX10K platforms with inline BFD PR1389569

  • MX204 - Excluding "speed" CLI option under the interface level PR1389918

  • The jnxFruState might show incorrect PIC state after replacing an MPC with another MPC having less PICs PR1390016

  • Class of service adjustment-control-profile configuration for application DHCP tags does not get applied. PR1390101

  • Traffic destined to VRRP VIP gets dropped as filter is not updated to related logical interface PR1390367

  • The vmcore might be seen when routing changes are made on the peer spine in an EVPN-VXLAN scenario. PR1390573

  • The statement routing-engine-power-off-button-disable does not work on MX204 and MX10003. PR1391548

  • The bbe-smgd process might crash after commiting configuration changes. PR1391562

  • The bbe-smgd process might crash in a corner case if family inet6 is used in dynamic profile PR1391845

  • The Packet Forwarding Engine might not respond with ICMP time exceeded error when packet arrives from the subscriber. PR1391932

  • On ACX-Series platforms the 'forwarding-option dhcp-relay forward-only' knob stops working and the DHCP packets are dropped. PR1392261

  • third-generation FPC reboot loop because of having internal intf issues PR1393643

  • JUNOS enhancement configuration knob to modify mcontrol watchdog timeout PR1393716

  • IPV6 Next-Hop programming issue might be observed on QFX10K/PTX1K/PTX10K devices PR1393937

  • WITHDRAWN: Junos OS: gRPC hardcoded credentials may allow unauthorized access to systems with Junos Network Agent installed (REJECTED) PR1394927

  • The l2ald process might crash when doing "commit check" for some specific configurations PR1395368

  • The minor alarm of "Bottom Fan Tray Pred Fail" might be wrongly raised when the fan speed is at high speed on MX960 PR1395539

  • The subscriber bindings might not be successful on QFX/EX platforms PR1396470

  • Adding IRB to bridge domain with PS interface causes kernel crash. PR1396772

  • The MS-MPC might core when mspmand receives a non-syn packet of TCP PR1396785

  • Subscriber flapping might cause SMID resident memory leak. PR1396886

  • The PPPoE subscribers are unable to reconnect after FPC reboot PR1397628

  • Confirmation message is missing when issuing " request vmhost reboot re* " PR1397912

  • The CLI command "show system firmware" gets hidden on MX platforms PR1398022

  • On vMX platform, kernel core files are generated when the kernel state (ifstates) exceptions occur. PR1398320

  • Junos OS: NFX150 Series, QFX10K Series, EX9200 Series, MX Series, PTX Series: Path traversal vulnerability in NFX150 and NG-RE leads to information disclosure (CVE-2019-0074) PR1398333

  • IPSEC tunnel can not be established because the tunnel SA and rule are not installed in the PIC. PR1398849

  • The bbe-smgd process might crash when executing "show pppoe lockout" PR1398873

  • CPU hog may be observed on PTX/QFX10000 Series platform PR1399369

  • The unexpected alarm might be shown on NG-RE PR1399654

  • Only one Packet Forwarding Engine could be disabled on FPC with multiple Packet Forwarding Engines in error/wedge condition. PR1400716

  • The authd might stop when issuing show network-access requests pending command during the authd restart PR1401249

  • Command "show | compare" output on global group changes lose the diff context after a rollback or 'load update' is performed PR1401505

  • The subscriber route installation failed because some interfaces states are not properly installed. PR1401506

  • The TCP connection for external or internal might be dropped due to a kernel issue PR1401507

  • FPC core files due to a corner case scenario (race condition between RPF, IP flow). PR1401808

  • The na-grpcd log file is not rotated and keeps growing until Routing Engine is out of disk space. PR1401817

  • The mspmand process might crash with lots of error logs seen in high scaled MX platforms with MS-MPC/MS-MIC PR1402260

  • The MPC might crash due to CPU overuse by dfw thread. PR1402345

  • Some error logs might be seen on FPC when reading is attempted from Uninitialized memory location. PR1402484

  • FPC might crash after offline/online MIC-3D-16CHE1-T1-CE-H. PR1402563

  • DHCP subscriber cannot reconnect over dynamic VLAN demux interfaces due to RPF check failure PR1402674

  • Host outbound traffic might be dropped on MPC7, MPC8, and MPC9. PR1402834

  • Smg-service could become unresponsive when doing some GRE-related CLI operations. PR1403480

  • The time synchronization through PTPoE might not work when Enhanced Subscriber Management is enabled on MX Series routers. PR1404002

  • Continuous kernel crashes might be observed in backup Routing Engine or VC-BM. PR1404038

  • With MS-MPC and MS-MIC service cards, SYSLOG messages for port block interim might show 0.0.0.0 for the private IP address and PBA release messages might show the NAT'd IP address as the private IP address. PR1404089

  • The FPC might crash in a CoS scenario PR1404325

  • repd continue core on VC-Bm when there are too many IPv6 address on one session (hit PR1384889) PR1404358

  • Incorrect display of assigned prefixes to a subscriber in the output of 'show interface < dynamic demux interface>' PR1404369

  • In a very rare situation Router can crash with VMCore when there is a IFL deletion PR1404507

  • Configuration load override or load replace resets ANCP neighbors. PR1405318

  • MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC (CVE-2019-0065) PR1405423

  • FPC crash might be seen when adding or deleting a leg to an AE bundle or FPC restarts in subscriber scenario PR1405876

  • NAT64 translation issues of ICMPv6 Packet Too Big message with MS-MPC/MS-PIC PR1405882

  • The FPC crash might be observed in MS-MPC HA environment PR1405917

  • Fabric performance drop on MPC7, MPC8, or MPC9E and SFB2 based MX2000 platform. PR1406030

  • The rpd might crash due to a race condition with the combination of community actions done at both a BGP import policy and a forwarding-table policy PR1406357

  • Traffic impact might be seen if auto-bandwidth is configured for RSVP LSPs PR1406822

  • FPC might crash during the subscriber related stress tests. PR1407285

  • Layer 2 VPN might flap repeatedly after the link up between PE and CE devices. PR1407345

  • The rpd might crash when a commit check is executed on LDP trace options filtering PR1407367

  • The PFE might get disabled unexpectedly due to a auto correctable non-fatal hardware error on PTX or QFX10002/QFX10008/QFX10016 PR1408012

  • Traffic forwarding failed when crossing VCF members PR1408058

  • The ToS/DSCP and TTL fields might not be copied into the outer IP header in group VPN scenario. PR1408168

  • The alarm 'Mismatch in total memory detected' is observed after issuing "request reboot vmhost routing-engine both". PR1408480

  • The MPC line cards might crash when performing ISSU to Junos OS Release 19.1R1 or later PR1408558

  • Syslog flooded with "Limit check for pppoe subscriber failed" messages PR1408833

  • The misconfiguration of dynamic profile might cause the login issues of the subsequent subscribers PR1409398

  • MX-MPC2-3D-EQ and MPC-3D-16XGE-SFPP will now show "Exhaust A" temperature, rather than Intake temperature. PR1409406

  • Indirect-next-hop pointing to unknown unilist stuck with weight 65535 may occur after a link flap PR1409632

  • The non-existent subscribers might appear in the 'show system resource-monitor subscribers-limit chassis extensive' output. PR1409767

  • FPC might crash during next-hop change when using MPLS inline J-Flow PR1409807

  • On MX10003 platform, after removing the FPC from a slot, when a new FPC is plugged in, chassis was showing old serial for this new FPC. PR1409930

  • ACX drops DNS responses which contain an underscore PR1410062

  • When using SFP+, the interface optic output might be non-zero even when the interface has been disabled. PR1410465

  • Packets might be dropped if the traffic is forwarded through an LT interface PR1410970

  • Kernel replication failure might be seen if an IPv6 route next-hop points to an ether-over-atm-llc ATM interface. PR1411376

  • A steady increase of the PFE heap memory utilization may happen when PPPoE subscribers are flapping PR1411389

  • Parity error might cause FPC alarm PR1411610

  • JTASK_SCHED_SLIP error might be observed on VRR platform during NTP synchronization PR1411679

  • GRE over GRE might not work for host-generated traffic PR1411874

  • MX10003: The rpd crash with switchover-on-routing-crash does not trigger Routing Engine switchover and the rpd on master Routing Engine goes into STOP state. PR1412322

  • Junos PCC might reject PCUpdate/PCCreate message if the metric type is other than type 2 PR1412659

  • PPPoE subscribers might not be able to log in after ISSU. PR1413004

  • The rpd memory leak might be seen due to an incorrect processing of a transient event. PR1413224

  • During ISSU or merge virtual-chassis member back to the VC, CoS GENCFG writes failures may be observed PR1413297

  • JFLOW: To Reduce max flow table Size when using Flex-flow-sizing PR1413513

  • The support of inet6 filter attribute for ATM interface is broken in Junos OS Release 17.2R1 onwards. PR1413663

  • The services load balance might not be effective for AMS if the hash key under the forwarding-options hierarchy is configured PR1414109

  • FPC crash might be observed if it reaches heap utilization limit. PR1414145

  • The PTX1000/PTX10002/QFX10002 may stop forwarding packets after the "chassis-control" process restarts PR1414434

  • NPC might not apply configured resource-monitor thresholds after NPC restart PR1414650

  • Firewall filters are not getting programmed into Packet Forwarding Engine. PR1414706

  • The user might not enter configure mode due to mgd is in lockf status PR1415042

  • ICMP MTU exceeded error generated from Packet Forwarding Engine does not reach the expected source. PR1415130

  • The IRB interface might flap after committing configuration change on any interface PR1415284

  • The bbe-smgd process might have memory leak while running "show system subscriber-management route route-type <> routing-instance <>" PR1415922

  • Some IPsec tunnels might fail to pass traffic after GRES on MX platform PR1417170

  • The ECMP fast reroute protection feature might not work on MX5, MX10, MX40, MX80, and MX104. PR1417186

  • The IPv6 neighbor might become unreachable after the primary link goes down in VPLS multihoming scenario PR1417209

  • An IPv4 packet with a zero checksum might not be translated to IPv6 packet properly under NAT64 scenario. PR1417215

  • Some subscribers might be offline when doing GRES or daemon restart PR1417574

  • No message indicates the failure when subscribers request NAT port failure happens under CGNAT with MS-MPC PR1418128

  • The rpd core might be seen after changing the OSPF/OSPF3 interface cost PR1418152

  • there is no SNMP Trap message generated for jnxHardDiskMissing/jnxHardDiskFailed on Summit MX PR1418461

  • MX-GX+ Services are not synced up to the BACKUP RE with GRES/NSR enabled PR1418594

  • Adding two or more ps interface may cause traffic drop in l2circuit scenario PR1418610

  • lsp-cleanup-timer is not being honored when lsp-cleanup-timer is configured to be greater than 2147483647 PR1418937

  • The PPPoE negotiation of subscriber connection might fail when 65535 is assigned as session ID. PR1418960

  • RX alarms are not set as according to the threshold value configured for the DCO Tunable Optics. PR1419204

  • A PPP session under negotiation might be terminated if another PPPoE client bears the same session ID. PR1419500

  • CPU usage on Service PIC might spike while forming an IPsec tunnel under DEP/NAT-T scenario. PR1419541

  • A new tunnel could not be established after changing the NAT mapping IP address until the IPEC SA Clear command is run PR1419542

  • rtsock_peer_unconsumed_obj_free_int: unable to remove node from list logged extensively PR1419647

  • The IPsec tunnel might get down when the Junos platforms and the peer both act as the initiator and try to bring an IPsec tunnel up at the same time PR1420293

  • The bbe-smgd process might crash and might not recover in a rare scenario PR1420376

  • MX: PTP phase aligned but TE/cTE is not good. PR1420809

  • An interface may go to downstate on QFX10000/PTX10000 platform PR1421075

  • MX LNS might fail to forward the traffic on the subscriber access route. PR1421314

  • Failed to reload keyadmin database for /var/etc/keyadmin.conf. PR1421539

  • MX Series Virtual Chassis: VCP port reports MTU value 9152 in the ICMP MTU exceeded message while the VCP port MTU is set to 9148. PR1421629

  • After control plane event few ipsec tunnels failed to send traffic through the tunnel PR1421843

  • The changed value of "remote-gateway" does not take effect when the router acts as an initiator of IPsec-VPN tunnel. PR1421977

  • The CoS IEEE-802.1 classifier might not get applied when it is configured with service activation on underlying interface. PR1422542

  • While commiting huge configuration, customer is seeing the error "error: mustd trace init failed" PR1423229

  • "set forwarding-options enhanced-hash-key symmetric" is not effective on MX10003 PR1423288

  • Traffic is dropped after FPC reboot with aggregated Ethernet member links deactivated by remote device PR1423707

  • The bbe-smgd process might crash after executing the command "show system subscriber-management route prefix <>" PR1424054

  • The system does not reboot or halt as configuration when encountering the disk error PR1424187

  • Interface with FEC disabled might flap after Routing Engine mastership switchover. PR1425211

  • Soft GRE tunnel route lost after reboot/GRES or upgrade in WAG scenario. PR1425237

  • The mspmand process might crash and restart with a mspmand core file created after doing a commit change to deactivate and activate service-set PR1425405

  • All interfaces creation failed after NSSU PR1425716

  • MPC reboot or RE mastership switchover might occur on MX204/MX10003 PR1426120

  • IFL Targeting: 18k phantom distributed interfaces are displayed for AE interface with the targeted distribution enabled on it, when there are no active subscribers PR1426157

  • Some CFM and BFD sessions might flap while collecting MPLS statistics PR1426727

  • Traffic loss might be seen when multiple IPsec tunnels are established with the remote peer PR1426975

  • Traffic might not flow through MACsec interface even after an unsupported cipher-suite is removed. PR1427294

  • ENTITY MIB has incorrect containedIn values for some fixed MPCs with builtin PICs PR1427305

  • Rebooting or halting Virtual Chassis member might cause traffic on RTG link to be down for about 30 seconds. PR1427500

  • The subscriber IP route might get stuck in bbe-smgd if the subscriber IP address is the same as local IP address. PR1428428

  • Incorrect IGMP interface counter for dynamic PPP interfaces. PR1429018

  • L2TP subscriber and MPLS pseudowire subscriber volume accounting statistics value remains unchanged post ISSU. PR1429692

  • The AE interface does not come up after rebooting the FPC/device though the physical member link is up PR1429917

  • Configuration is prevented from being applied on MX in subscriber scenario PR1430360

  • Inline LSQ might not work when it is configured on the same FPC where MIC-3D-16CHE1-T1 is slotted PR1431069

  • Error might be observed when using a script to load configuration. PR1431198

  • The l2cpd process might crash and generate a core dump when interfaces are flapping PR1431355

  • During the stress tests, bbe-smgd process might crash on backup Routing Engine when performing GRES. PR1431455

  • The bbe-smgd might crash if subscribers are trying to log in or log out and a configuration commit activity happens at the same time. PR1431459

  • Subscribers coming from new IFDs might not login in due to 512 entries limit in the subscriber-limit table PR1431566

  • Allow installation of three identical framed-routes in the same routing-instance. PR1431891

  • MX10003 - PEM not present alarm raised when minimum required PEM exists in the system. PR1431926

  • Traffic might be sent on the standby link of aggregated Ethernet bundle and be lost with LACP fast-failover enabled. PR1432449

  • Change to in-use parameterized filter prefix-list could result in bbe-smgd core on backup Routing Engine. PR1432655

  • Traffic will be dropped if 'sa-multicast' is in the configuration PR1433306

  • RSI and RSI brief should not include "show route forwarding-table" when tomcat enabled. PR1433440

  • MX URLF: URL case sensitivity support PR1434004

  • The repd process might crash after booting first time with a newly installed Junos release PR1434363

  • PFE memory leak might be seen if MLPPP links are flapped PR1434980

  • MPC7/8/9/MX10003 MPC/EX9200-12QS/EX9200-40XS line card might crash in a scaling setup PR1435744

  • The mc-ae interface may get stuck in waiting state in dual mc-ae scenario PR1435874

  • The static PPP/PPPoE subscribers stuck in "init" state permanently and error message "Failed to create client session, err=SDB data corrupted" might be seen PR1436350

  • LNS router might send the router-advertisement packet with NULL source link-layer option field PR1437847

  • Subscriber flows might not be synchronized between AE members on MX-VC platforms PR1438621

  • FPC on Virtual Chassis backup router might reboot in MX Series Virtual Chassis scenario. PR1439170

  • The "vlan all interface all" combination not working as expected under VSTP PR1439583

  • The bbe-smgd core dumps is seen after restarted PR1439905

  • CoS related errors are seen and subscribers could not get service PR1440381

  • DHCP offer packets towards IRB over LT interface getting dropped in DHCP relay enviroment PR1440696

  • The layer2 dynamic VLAN might be missed when an interface is added or removed for an AE interface PR1440872

  • For a route received via EBGP the AIGP value may not be considered as expected PR1441438

  • The rpd may crash or consume 100% of CPU after flapping routes PR1441550

  • On PTX/QFX AE outgoing traffic might be dropped after changes are made to AE PR1441772

  • Egress stream flush failure and traffic blackhole might occur PR1441816

  • The packets originating from the IRB interface might be dropped in VPLS scenario PR1442121

  • The chassisd is unable to power off a faulty FPC after RE switchover which leading to chassisd restart loop PR1442138

  • In "enhanced-ip" or "enhanced-ethernet" mode with DCU (destination-class-usage) accounting enabled, MS-DPC may drop all traffic that should egress via ae interface PR1442527

  • The kmd process might crash and restart with a kmd core file created if IP of NAT mapping address for IPsec-VPN remote peer is changed. PR1444183

  • Inline-keepalive might stop working for LNS subscribers if the knob "routing-services" is enabled PR1444696

  • access route might stuck in bbe-smgd and RPD not cleared PR1445155

  • Detached LACP member link gets LACP state as enabled in Packet Forwarding Engine during switchover because of device reboot PR1445428

  • The mspmand process might crash if URL filtering is configured and one blacklisted domain name is a sub-string of another blacklisted domain name in URL filter database file PR1445751

  • NAT service-set in certain scale might fail to get programmed PR1446931

  • The J-Flow version 5 stops working after changing input rate value. PR1446996

  • Interface attributes might cause high CPU usage of dcd PR1448858

  • Interfaces might flap forever after deleting the interface disable configuration PR1450263

  • VLAN config change with l2ald restart might cause Kernel sync issues and impact forwarding PR1450832

  • IPSec[SNMP]: Snmp query for IPSec Decrypted/Encrypted packets doest not fetch right values; observing KMD_SNMP_FATAL_ERROR PR1451324

  • [MX] Error dropped packets seen on MQ/XM based MPC cards though there is no traffic flowing through the system PR1451958

  • There is high temperature from "show chassis environment" output after MPC4E insert to slot 5 PR1456457

  • The subscriber routes are not cleared from backup RE when session is aborted PR1458369

  • The correct VoIP VLAN information in LLDP-MED packets might not be sent after commit if dynamic VoIP VLAN assignment is used PR1458559

  • The traffic might be stuck on MS-MPC/MS-MIC with sessions receiving huge number of affinity packets PR1459306

  • The PPTP doesn't work with destination NAT PR1460027

  • In EVPN scenario memory Leak might be observed when proxy-macip-advertisement is configured PR1461677

  • The subscribers might not pass traffic after doing some changes to the dynamic-profiles filter PR1463420

  • SMGD generated core files after essmd restart with reference to mmf_ensure_mapped (mmf=0xe8f0200, offset=4294967295, len=108) at ../src/junos/lib/libmmf/mmf.c:1972. PR1372223

  • The subinfo process might crash with core file if flapping all the subscribers PR1379482

  • Error messages "shmlog: argcnt 309 not enough memory" are generated every hour. PR1384371

  • The bbe-smgd process generates repeated core files and stops running as a result of long-term session database shared memory corruption. PR1388867

  • Delay in CLI output with second or more "show subscriber <> extensive" queries when first session is sitting at -(more)- prompt displaying "show subscribers extensive". PR1390762

  • The framed route beyond the first might not be installed in a DHCP subscriber management environment. PR1401148

  • Traffic loss seen in IGMP subscribers after GRES. PR1402342

  • Change the default parameters for resource-monitor rtt-parameters PR1407021

  • bbemg_smgd_lock_cli_instance_db should not log as error messages PR1421589

  • A stuck lock in shared memory might prevent subscribers from logging in again after deamon crash PR1424607

  • The jdhcpd might consume 100% CPU and crash if dhcp-security is configured PR1425206

  • Show subscriber extensive incorrectly displays DNS (domain-name-server) address provided to DHCP clients PR1457949

High Availability (HA) and Resiliency

  • FPCs rebooted although the MXVC ISSU output looks like successful PR1376774

  • If FPGA on the new master CB has a specific hardware failure, the chassid might keep crashing after GRES switchover. PR1393884

Infrastructure

  • Cleanup at thread exit in FreeBSD kernel causing memory leaks. PR1328273

  • The command show system virtual-memory | display xml validate displays errors. PR1356423

  • The error jlaunchd: disk-monitoring is thrashing, not restarted might be seen. PR1380032

  • The alarm might be seen if the PEM's serial number starts with "1F1" PR1398128

  • SNMP OID IFOutDiscards not updated when drops increasing. PR1411303

  • The traffic to the NLB server may not be forwarded if the NLB cluster works on multicast mode. PR1411549

Interfaces and Chassis

  • Subscribers might fail to access the device after deleting the needless aggregated Ethernet configuration. PR1322678

  • Momentary traffic loss might happen when a GRES is performed. PR1336455

  • Native-vlan-id support on ps-interface PR1352933

  • Error messages like "ifname [ds-5/0/2:4:1] is chan ci candidate" are seen during a commit operation PR1363536

  • In case of MPLS ,DMR packets are sent with different mpls exp bits if MX receives CFM DMM packets with varying exp values on MPLS header PR1365709

  • In rare case, there might be L2TP subscribers stuck in terminated state. PR1368650

  • Constant dcpfe process crash might be seen if using an unsupported GRE interface configuration PR1369757

  • Unified ISSU could be aborted at "Timed out Waiting for protocol backup chassis master switch to complete" with MX Series Virtual Chassis configuration. PR1371297

  • JDI-RCT: QFX5200 MCLAG: parse_remove_ifl_from_routing_inst() ERROR : No route inst on et-0/0/16.16386, errors seen after restart l2cpd daemon PR1373927

  • The dcd process might go down when 'vlan-id none' is configured for the interface. PR1374933

  • "PE Chip:pe0[0]: IPW: oversize_drop error" causes Major error on FPC PR1375030

  • PPP Chap Challenge-Length Is Not Initialized With Default Value PR1375145

  • Race condition during Routing Engine mastership transition might cause improper deletion/recreation of logical interface em0.0 Interface family address. PR1376216

  • Duplicate IP cannot be configured on both SONET (so-) interface and other interfaces PR1377690

  • Some error logs (Tx unknown LCP packet) might be reported by the bbe-smgd daemon on MX-Series platforms PR1378912

  • The pfe_disable action does not disable the logical tunnel interfaces belonging to the affected Packet Forwarding Engine PR1380784

  • Higher level OAM CFM between CE might not work in VPLS scenario PR1380799

  • The dcd restarted unexpectedly after committing a configuration with static demux interface stacking over PS interface. PR1382857

  • The jpppd process might crash if the EPD value contains a format specifier PR1384137

  • Changing the value of mac-table-size to default might lead all FPC to reboot. PR1386768

  • DCD core files can be seen after FPC restart if channelized interfaces are configured. PR1387962

  • All DPCs might crash while adding or deleting a logical interface from the aggregated Ethernet bundle. PR1389206

  • The interface-control process thrashes and dcd does not restart after adding an invalid demux interface to the configuration PR1389461

  • Interim accounting updates might not be sent for subscribers after Junos OS selective update PR1391011

  • The dcd memory leak might be seen when committing configuration change on static route tag PR1391323

  • The dcd crash might be seen after deleting the subinterface from VPLS routing-instance and mesh-group. PR1395620

  • "MIC Error code: 0x1b0002" alarm might not be cleared for MIC on MPC6 when the voltage has returned to normal PR1398301

  • The backup Routing Engine might get stuck in amnesiac mode after reboot. PR1398445

  • The transportd might consume 100% CPU for a prolonged period PR1398967

  • All dcd operations might be blocked if profile-db is corrupt PR1399184

  • [Cordoba] incorrect Lane chromatic dispersion values and false positive RX power high alarm PR1400190

  • Certain otn-options cause interface flapping during commit. PR1402122

  • The configuration "targeted-broadcast" does not work on IRB interface PR1404442

  • The subscriber might not be able to access the device due to the conflicted assigned address. PR1405055

  • The cfmd might fail to start after it is restarted PR1406165

  • Inline periodic packet management (PPM) adjacency (rx) session might be programmed with the incorrect packet template. PR1417707

  • The monitor ethernet loss-measurement command returns invalid ETH-LM request for unsupported outgoing logical interface. PR1420514

  • Invalid speed value on an interface might cause other interface configuration loss PR1421857

  • The syslog message "/kernel: %KERN-3: pointchange for flag 04000000 not supported on IFD aex" upon LFM related configuration commit on aggregated Ethernet interfaces PR1423586

  • The logical interfaces in EVPN routing instances might flap after committing configurations. PR1425339

  • The configuration statement "flexible-queuing-mode" is not working on FPCs of Virtual Chassis member 1. PR1425414

  • CFM message is flooding. PR1427868

  • The vrrpd process might crash after deleting VRRP sessions for several times PR1429906

  • The NCP session might be brought down after IPCP Configure-Reject is sent PR1431038

  • Mixed link-speed AE bundle could not add new sub-interface successfully PR1437929

  • Targeted-distribution for static demux interface over aggregate Ethernet interface does not take correct LACP link status into consideration when choosing primary and backup links. PR1439257

  • The cfmd process might crash after a restart on Junos 17.1R1 and above PR1443353

  • Enhancement of add/delete a single vlan in vlan-id-list under interface family bridge PR1443536

  • The ifinfo daemon might crash on the execution of "show interface extensive" command PR1448090

  • Mismatched MTU value causes the RLT interface to flap PR1457460

J-Web

  • Junos OS: J-Web Denial of Service due to multiple vulnerabilities in Embedthis Appweb Server. PR1345330

  • Junos OS: Persistent XSS vulnerability in J-Web (CVE-2019-0047) PR1410400

  • Junos OS: Session fixation vulnerability in J-Web (CVE-2019-0062) PR1410401

Layer 2 Features

  • The backup VPLS router might still have MAC addresses after the primary router is rebooted and recovered in VPLS environment. PR1356726

  • The traffic might not be transmitted correctly in a large scale of VPLS scenario. PR1371994

  • Flow label is still used by ingress PE though the Egress PE is not configured/supporting for Flow label in a vpls multihomed Scenario. PR1393447

  • The rpd crashes after iw0 interface is configured under a VPLS instance. PR1406472

  • In a Layer 2 domain, there might be unexpected flooding of unicast traffic at every 32-40 seconds interval towards all local CE-facing interface. PR1406807

  • Broadcast traffics may be discarded in a VPLS local-switching scenario. PR1416228

  • Commit error will be seen but the commit is processed if adding more than o. PR1420082

  • In VC scenario traffic drop might be seen when one VC member reboots and rejoins the VC PR1453430

Layer 2 Ethernet Services

  • Junos core file jdhcpd.core.0 found in dhcpv6_packet_handle is seen. PR1329390

  • ZTP infra scripts are not included for MX PPC routers. PR1349249

  • BOOTP packets might be dropped if BOOTP-support is not enabled at the global level. PR1373807

  • RADIUS accounting statistics are not cleared after subscriber logout. PR1383265

  • The subscriber's authentication might fail when the link-layer address encoded in the DHCPv6 DUID is different from the actual link-layer hardware address. PR1390422

  • The SNMP query on LACP interface might lead to lacpd crash. PR1391545

  • Junos OS: jdhcpd crash upon receipt of crafted DHCPv6 solicit message (CVE-2019-0037). PR1391983

  • On EVPN setups, incorrect wrong destination MAC addresses starting with 45 might show up when using the show arp hostname command. PR1392575

  • After GRES switchover, LACP will be down on peer device and never been recovered automatically. PR1395943

  • Log messages dot1xd[]: task_connect: task ESP CLIENT:...: Connection refused might be reported in Junos OS Release 17.4 or later. PR1407775

  • jdhcpd becomes aware about some of the existing configuration only after 'commit full' or jdhcpd restart. PR1419437

  • The jdhcpd process might consistently run at 100% CPU and not provide service if the delay-offer is configured for DHCP local server. PR1419816

  • jdhcpd daemon might crash during continuous stress test. PR1421569

  • The jdhcpd memory leak might happen on MX5, MX10, MX40/MX80, and MX104 when testing DHCP subscribers log-in and out. PR1432162

MPLS

  • The command of "ping mpls l2circuit" might fail if the flow-label is enabled for l2circuit PR1217566

  • MPLS routes might be dead if MPLS is disabled or deleted from the interface and enabled/added back to the same interface or the maximum number of labels is changed in quick succession without a delay PR1355878

  • The LSP might remain UP even if no path is acceptable due to CSPF failure PR1365653

  • RPD might restart after an MPLS LSP flap if "no-cspf" and "fast-reroute" are configured in an LSR ingress router. PR1368177

  • RSVP authentication might fail between some Junos releases and cause traffic loss during local repair. PR1370182

  • DSCP bit marking of LSP self-ping is not compliant with RFC7746 PR1371486

  • The next hop of static LSP for MPLS might get stuck in dead state after changing the network mask of the outgoing interface. PR1372630

  • The traceroute MPLS might fail when traceroute is executed from a Juniper device to another device not supporting RFC6424. PR1372924

  • The rpd might crash when executing Routing Engine switchover under BGP environment and route churn occurs PR1373313

  • The traffic might not be load-balanced equally across LSPs with ldp-tunneling configured PR1373575

  • LSP with auto-bandwidth enabled goes down during HMC error condition PR1374102

  • The rpd process might crash continuously if nsr-synchronization or all flag is used in RSVP traceoptions PR1376354

  • JSA10883: Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash (CVE-2018-0049) PR1380862

  • The rpd might crash on backup Routing Engine after switchover PR1382249

  • An RSVP-signaled LSP might stay in down state after a link in the path flaps. PR1384929

  • Ingress LSPs down due to CSPF failure PR1385204

  • Configured bandwidth 0 does not get applied on RSVP interface PR1387277

  • The bypass LSP might pass through unexpected path that includes the same SRLG as the down protected TE link PR1387497

  • The rpd process might keep crashing repeatedly if the LSP destination address is set to be 0.0.0.0 PR1397018

  • The rpd might crash when LDP route with indirect next hop is deleted. PR1398876

  • A single-hop bypass LSP might not be used for traffic when both transit chaining mode and sensor-based-stats are used. PR1401152

  • MPLS LSP traffic loss might be seen under rare conditions if CSPF is enabled PR1402382

  • The L2circuit information is not advertised over the LDP session if "ldp dual-transport inet-lsr-id" is different from the router-id PR1405359

  • The rpd might crash when RSVP bypass path flaps PR1406400

  • LDP tunneling config triggers huge scheduler slips causing IGP flapping PR1410827

  • Resources might be reserved for stale RSVP LSP when RSVP is disabled on the interface PR1410972

  • The rpd might crash if longest-match is configured for LDP. PR1413231

  • LDP route is not present in inet6.3 if IPv6 interface address is not configured PR1414965

  • LDP routes might flap if committing any configuration changes. PR1416032

  • Traffic might be silently dropped or discarded due to a long LSP switchover duration in RSVP-signaled LSP scenario PR1416487

  • LDP route might be missing in inet.3 when enabling sr-mapping-client on LDP-SR stitching node PR1416516

  • RSVP LSP might get stuck in down state in OSPF multiarea topology. PR1417931

  • LDP might not update the LDP ingress route metric when inet.3 route flash happens before inet.0 PR1422645

  • MPLS LSP auto-bandwidth statistics miscalculations might lead to high bandwidth reservation. PR1427414

  • Traffic loss might be observed after changing configuration under "protocols mpls" in ldp-tunneling scenario PR1428081

  • The LDP might withdraw a label for an FEC once the IGP route is inactive in inet.0 PR1428843

  • When MBB for P2MP LSP fails, it is stuck in old path PR1429114

  • SRLG entry shows Uknown after removing it from configuration in show mpls lsp extensive output or show mpls srlg. Shows Unknown-0xXX (XX will vary) PR1433287

  • The P2MP LSP branch traffic might be dropped for a while when the Sender PE is doing switchover PR1435014

  • The rpd will crash continuously if RSVP LSP link/node protection is configured PR1435019

  • Traffic loss might be seen after LDP session flaps rapidly PR1436119

  • The flow label is not pushed when "chained-composite-next-hop ingress l2ckt/l2vpn" is enabled PR1439453

  • The LDP route and LDP output label are not showing in the inet.3 table and LDP database respectively if enable OSPF rib-group PR1442135

  • RSVP Path message with long refresh interval is dropped between Junos pre-16.1 and 16.1+ nodes PR1443811

  • The transit packets might be dropped if an LSP is added or changed on MX/PTX device PR1447170

  • The LDP route timer is reset when committing unrelated configuration changes PR1451157

  • High CPU usage and rpd coredump might be observed if "ldp track-igp-metric" is configured and IGP metric is changed PR1460292

  • The device may use the local-computed path for the PCE-controlled LSPs after link/node failure PR1465902

Network Address Translation (NAT)

  • The nsd process might crash during SNMP query for deterministic NAT pool information. PR1436775

Network Management and Monitoring

  • The backup routing engine sends syslog messages to the syslog server with master fxp0 instead of lo0. PR1341938

  • Child link missed from mib id dot3adAggPortAttachedAggID (OID - 1.2.840.10006.300.43.1.2.1.1.13). PR1410439

  • The AGENTX session timeout between master (snmpd) and subagent triggers some daemon crash PR1396967

  • The snmp query may not get data in scaled Layer 2 circuits environment. PR1413352

  • Syslog match filtering does not work if single line of /etc/syslog.conf is over 2048 bytes. PR1418705

Platform and Infrastructure

  • MAC addresses might not be learnt on bridge-domains after XE/GE interface flap PR1275544

  • Distributed multicast might not be forwarded to a subscriber interface. PR1277744

  • Junos OS: Login credentials are vulnerable to brute force attacks through the REST API (CVE-2019-0039) PR1289313

  • The "show igmp statistics" command not including any statistics under interface aggregate for distributed multicast interfaces. PR1289415

  • The dcd Micro BFD seems to be failing in dcd_commit_check log file even when BFD is not configured PR1300796

  • The "Platform failed to bind rewrite" message can be seen when chassis control restart is done with the COS rewrite rule configured on aggregated Ethernet interface PR1315437

  • Inline keepalive session might be down due to lcp-keepalive-failure on MPC5E/MPC6E PIC0 interfaces PR1343687

  • The rpd might crash when doing Routing Engine switchover with NSR and logical-system configurations. PR1345720

  • Packet drop might be seen on the logical tunnel interfaces lt-x/2/x or lt-x/3/x PR1345727

  • RLT subinterfaces not reporting statistics. PR1346403

  • lt- interface gets deleted with tunnel-services configuration still present. PR1350733

  • Some line cards might crash in subscriber scenario enabled with distributed IGMP. PR1355334

  • When forwarding-class-accounting statement is enabled on an interface, inside of a routing-instance of instance-type vrf, aggregate input forwarding-class statistics do not increment (egress statistics work fine). PR1357965

  • Traffic might drop on new added interfaces on MX Series after unified ISSU PR1371373

  • The logical tunnel interface might be unable to send out control packets generated by Routing Engine. PR1372738

  • kernel and ksyncd core files are generated after dual CB flap at rt_nhfind_params: rt_nhfind() found an nh different from that onmaster 30326. PR1372875

  • JNH memory leaks in multicast scenario with MoFRR enabled PR1373631

  • The traffic traversing an IRB interface might not be tagged with a VLAN if the packets go through an additional routing-instance PR1377526

  • FPC crash might be seen after FPC restarts PR1380527

  • Packet drops on interface if the statement "gigether-options loopback" is configured. PR1380746

  • Traffic loss seen in Layer 2 VPN with GRE tunnel. PR1381740

  • MAC learning might get stuck on MX Series router with DPC and MPC PR1383233

  • Jlock hog might be reported at restart routing PR1389809

  • Individual command authorization might cause mgd crash. PR1389944

  • Traffic is dropped when passing through MS-DPC to MPC. PR1390541

  • The command "commit synchronize" might fail because several internal connections are stuck. PR1394370

  • When using ifconfig utility to bring down the PS logical interface, its Admin status is not going down as expected. PR1396335

  • The packet might drop in tunnel interface with a checksum error PR1396372

  • All FPC cards might restart after Layer 3 VPN routes churn. PR1398502

  • RVT interface might get flapping PR1399102

  • Syslog error message: [LOG: Err] COS_HALP(cos_halp_get_fabric_stats_per_pfe:3211): pfe_id 0 cchip 0[LOG: Err] COS_HALP(cos_halp_get_fabric_stats_per_pfe:3272): No PFE found for pfe_id_start 0 is seen. PR1402377

  • Some files are missing during log archiving PR1405903

  • Abnormal queue-depth counters in "show interface queue" output on interfaces which associated to XM2 and 3 PR1406848

  • IPv6 traffic might be dropped between VXLAN bridge-domain and IP/MPLS network PR1407200

  • Traffic is getting dropped when there is a combination of DPC/MX-FPC card and MPC card on egress PE router in Layer 3 VPN PR1409523

  • Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053) PR1409847

  • FPC crash may be observed with scaled subscribers login attempts PR1409879

  • The VLAN tag is incorrectly inserted on the access interface if the packet is sent from an IRB interface. PR1411456

  • The MPC might crash when one MIC is pulled out during this MIC is booting up PR1414816

  • Some applications might not be installed during upgrade from an earlier version that does not support FreeBSD 10 to FreeBSD 10 (based system). PR1417321

  • The op url command cannot run a script with libs from /config/scripts. PR1420976

  • The ARP request might not be replied although "proxy-arp" is configured PR1422148

  • show jnh trap-info with incorrect LU instance caused a crash and core files on FPC. PR1423508

  • The policer bandwidth might be incorrect for the aggregate interface after activating the command 'shared-bandwidth-policer'. PR1427936

  • The FPC might crash when the firewalls filter manager deals with the firewall filters PR1433034

  • The device might not be accessible after the upgrade PR1435173

  • The BGP session might flap after performing RE switchover simultaneously on both end of BGP peers PR1437257

  • The next-hop MAC address in the output from "show route forwarding-table" command might be wrong PR1437302

  • The multicast traffic is dropped while multicast ingress replication is configured with "local-latency-fairness" PR1438180

  • The RPM udp-ping probe does not work in a multiple routing instance scenario. PR1442157

  • Packets drop due to misssing destination MAC in the Packet Forwarding Engine. PR1445191

  • Some hosts behind unnumbered interface are unreachable after the router/FPC restarts PR1449615

  • The RE originated IPv6 packets might be dropped when interface-group rule is configured under IPv6 filter PR1453649

Routing Policy and Firewall Filters

  • set metric multiplier offset may overflow/underflow. PR1349462

  • MX Series Router: CLI statement as-path-expand last-as commit failure. PR1388159

  • The rpd process might crash when routing-options flow configuration is removed. PR1409672

  • Policy matching RD changes next-hop of the routes which do not carry RD PR1433615

  • Routes resolution might be inconsistent if any route resolving over the multipath route PR1453439

Routing Protocols

  • BGP might not advertise routes on the existing BGP peer after adding Layer 3 VPN instance PR1237006

  • Multihop eBGP peering session exchanging EVPN routes can result in rpd core files when BGP updates are sent. PR1304639

  • With Resource Certification (RPKI) enabled, RPD successive crashes during route validation DB processing PR1309944

  • The BGP session might be stuck with high BGP OutQ value after GRES on both sides PR1323306

  • Junos OS: RPD process crashes when BGP peer restarts (CVE-2019-0049) PR1337304

  • The VRF static route might not be exported when route-distinguisher-id is used on RR in BGP Layer 3 VPN scenario. PR1341720

  • The bfd process memory leak might be observed if enabling multi-hop BFD session for a static route with multiple qualified-next-hop PR1345041

  • vFPC may continuously crash on vMX platform. PR1364624

  • Ukern memory leak and core crash in BGP environment PR1366823

  • Qualified next hop of static route might not be withdrawn when BFD is down PR1367424

  • About 10 minutes traffic loss is caused by BGP flap during unified ISSU. PR1368805

  • RE-based micro BFD packets do not go out with configured source IP when the interface is in logical-system PR1370463

  • TCP sessions might be taken down during RE switchover PR1371045

  • Route entry might be missing when IS-IS shortcut is enabled and MPLS link flaps. PR1372937

  • static route age is the same as last commit. PR1377279

  • The rpd process might crash after executing commit the configuration related to mapping-server-entry PR1379558

  • 2019-01 Security Bulletin: Junos OS: OpenSSL Security Advisories [16 Apr 2018] and [12 June 2018] PR1380686

  • The sshd authentication logs includes one syslog in UTC time PR1382786

  • The rpd might crash under a rare condition if GR helper mode is triggered PR1382892

  • Polling interface statistic and status becomes very slow when MPC CPU goes to 100% PR1383373

  • The static route might persist even after its BFD session goes down PR1385380

  • The rpd might crash after issuing operational command "show route detail" for RIP route PR1386873

  • BGP sessions might keep flapping on backup Routing Engine if proxy-macip-advertisement is configured on IRB interface for EVPN-VXLAN. PR1387720

  • Penultimate-hop router does not install BGP LU label causing traffic to be silently dropped or discarded. PR1387746

  • IGMPv3/MLD membership requests could not work normally PR1389119

  • Unexpected packet loss might be seen for some multicast groups during failure recovery with both MoFRR and PIM automatic MBB join load-balancing features enabled PR1389120

  • In rare cases rpd might crash after Routing Engine switchover when BGP multipath and Layer 3 VPN vrf-table-label are configured PR1389337

  • FPC might crash when BGP multipath is configured with protection PR1389379

  • Race condition causes all the BGP sessions to flap after NSR switchover PR1391084

  • Non-BGP protocol route with an AS PATH might cause inappropriate route selection PR1391767

  • The ppmd on the Routing Engine might run with high CPU utilization after Routing Engine switchover. PR1392704

  • RPD core files on backup Routing Engine during neighborship flap when using authentication-key with size larger than 20 character. PR1394082

  • Multicast traffic might be interrupted in H-VPLS scenario PR1394213

  • The rpd process might crash when rp-register-policy is configured with more than 511 terms PR1394259

  • The best and the second-best routes might have the same weight value if BGP PIC is enabled PR1395098

  • BGP DMZ LINK BANDWIDTH - not able to aggregate bandwidth, when applying the policy. PR1398000

  • The rpd soft core files and inappropriate route selection might be seen when Layer 2 VPN is used PR1398685

  • The process rpd might crash in BGP setup with NSR enabled. PR1398700

  • Junos OS: BGP packets can trigger rpd crash when BGP tracing is enabled. (CVE-2019-0019) PR1399141

  • The UHP behavior is not supported for LDP to SR stitching scenario PR1401214

  • There might be unexpected packets drop in MoFRR scenario if active RPF path is disabled PR1401802

  • The rpd might be stuck at 100% when auto-export and BGP add-path are configured PR1402140

  • On the multi-access/broadcast network, third party BGP router might unexpectedly select RR router as next-hop to forward the IPv6 traffic. PR1402255

  • M/Mx/QFX:mcsnoopd core generated immediately after the commit change related to VXLAN-EVPN configuration PR1408812

  • The L3VPN link protection doesn't work after flapping the CE facing interface PR1412667

  • The unexpected AS prepending action for AS path might be seen after the no-attrset statemnt is configured or deleted with vrf-import/vrf-export configuration. PR1413686

  • The rpd gets stuck in a loop while doing the multipath calculation which leads to the high CPU usage PR1414021

  • Dynamic routing protocol flapping with VM host Routing Engine switchover on NG-RE. PR1415077

  • Junos OS: OpenSSL Security Advisory [26 Feb 2019] PR1419533

  • A memory leak in rpd might be seen if source packet routing is enabled for IS-IS protocol PR1419800

  • The bfdd process might crash on old master RE during GRES PR1420694

  • IPv6 IS-IS routes might be deleted and not be reinstalled when MTU is changed under the logical interface level for family inet6 PR1420776

  • Route churn might be seen after changing maximum-prefixes configuration from value A to vlaue B PR1423647

  • The rpd might crash if no-propagate-ttl is configured in BGP multipath scenario PR1425173

  • The rpd might crash in PIM scenario with auto-rp enabled PR1426711

  • The rpd might crash while removing multicast routes that do not have an associated (S,G) state or activating the "accept-remote-source" knob on PIM upstream interface PR1426921

  • The rpd might crash while handling the withdrawal of an imported VRF route PR1427147

  • The rpd generates core file due to improper handling of graceful restart stale routes. PR1427987

  • IPv6 aggregate routes are hidden PR1431227

  • PIM-SM join message might be delayed with MSDP enabled PR1433625

  • Removing SSH Protocol version 1 from configuration PR1440476

  • RIP routes might be discarded by Juniper device over a /31 subnet interface PR1441452

  • The rpd process might crash in inter-AS option B Layer 3 VPN scenario if CNHs is used PR1442291

  • The rpd crash might be seen after configuring OSPF nssa area-range and summaries PR1444728

  • The rpd might crash in OSPF scenario due to invalid memory access PR1445078

  • JUNOS BFD sessions with authentication flaps after a certain time PR1448649

  • The connection between ppmd(RE) and ppman(FPC) might get lost due to session timeout PR1448670

  • The rpd scheduler slip for BGP GR might be up to 120s after the peer goes down PR1454198

  • Prefix SID conflict might be observed in ISIS PR1455994

  • The rpd scheduler slips might be seen on RPKI route validation enabled BGP peering router in a scaled setup PR1461602

  • Install all possible next-hops for OSPF network LSAs PR1463535

  • BGP peers might flap if the parameter of hold-time sets small PR1466709

Services Applications

  • IPsec-VPN IKE security-associations might get stuck in "Not Matured" state. PR1369340

  • Inline Service interface may not UP when bandwidth is configured. PR1370405

  • NAT64 does not translate ICMPv6 Type 2 packet (packet is too big) correctly when MS-DPC is used for NAT64. PR1374255

  • Twice NAT not supported on FTP ALG causes MS-PIC crash. PR1383964

  • L2TP subscribers might be stuck in init state in a corner case. PR1391847

  • The spd might crash when any-ip is configured in the 'from' clause of the NAT rule with the static translation type. PR1391928

  • IP ToS bits are not copied to outer IPSec header. PR1398242

  • Invalid Layer 4 checksum might be observed on IPv4 packets generated by NAT64 with MS-DPC after translating fragmented IPv6 UDP/TCP packets. PR1398542

  • The ICMPv6 packet with embedded IPv6 fragment might not be translated correctly to IPv4 ICMP packet in a NAT64 with MS-DPC deployment. PR1402450

  • The stale si- IFL might be seen when L2TP subscribers with duplicated prefixes or framed-route login. PR1406179

  • The kmd process might crash on MX/ACX platforms when IKEv2 is used. PR1408974

  • jpppd core files on LNS. PR1414092

  • L2TP LAC might fail to tunnel static pp0 subscriber to the desired LNS. PR1416016

  • IPsec SA may not come up when the Local gateway address is a VIP for a VRRP configured interface. PR1422171

  • In subscriber with L2TP scenario, subscribers are stuck in INIT state forever. PR1425919

  • The kmd process may crash when DPD timeout for some IKEv2 SAs happens. PR1434521

  • Traffic might be dropped in IPsec VPN scenario when the VPN peer is behind a NAT device. PR1435182

Software Installation and Upgrade

  • JSU might be deactivated from FPC in case of power cycle. PR1429392

Subscriber Access Management

  • The authd process might not be started after executing RE switchover on backup Routing Engine or without GRES enabled. PR1368067

  • Address pool does not correctly cycle to the beginning of the pool when linked-pool-aggregation parameter is defined. PR1374295

  • The subscribers might be stuck in terminating state if radius redirect is used. PR1376265

  • Radius VSA's, Actual-Data-Rate-Downstream and Actual-Data-Rate-Upstream values are not complaint with RFC 4679. PR1379129

  • CoA updates subscriber with original dynamic-profile if radius has returned different dynamic-profile name. PR1381230

  • Some subscribers fail to get SRL service as provided in Radius accept message even though the Radius messages can be sent and received. PR1381383

  • The value of 'predefined-variable-defaults routing-instances' overrides the RADIUS-supplied VSA (26-1 Virtual-Router). PR1382074

  • The RAA message may consist of additional AVP "Destination-Host" even it is not configured for Gx-Plus session. PR1384011

  • Log Message: authd: gx-plus: logout: wrong state for request session-id <xyz>.PR1384599

  • Multiple IPv6 IANA addresses assigned for one session in IPv6 PD binding failure scenarios. PR1384889

  • Usage-Monitoring-Information AVP maybe activate service accounting. PR1391411

  • The DHCPv6-PD client connection might be terminated after commit when RADIUS assigned address is not defined within the range of a local pool. PR1401839

  • The authd crash might be seen due to a memory corruption issue. PR1402012

  • JSRC used Radius Service accounting protocol instead of JSRC for SRC installed service. PR1403835

  • Some continuous log messages could be seen. PR1407923

  • Subscribers might not be able to re-login in Gx-plus provisioning scenario. PR1418579

  • Address allocation issue with linked pools when using linked-pool-aggregation. PR1426244

  • RADIUS authentication server might always be marked with DEAD. PR1429528

  • On MX platforms a false error might be received for SAE policy activation/deactivation failure PR1447632

User Interface and Configuration

  • The show configuration and rollback compare commands causing high CPU usage. PR1407848

VPNs

  • Non-optimal route to source might be selected for NG-MVPN with unicast-umh-election enabled. PR1315011

  • The process rpd may crash after configuration change in an Layer 2 VPN scenario. PR1351386

  • In dual-homed NG-MVPN the receipt of type 5 withdrawal removes downstream join states for some routes. PR1368788

  • The receivers belonging to a routing instance may not receive multicast traffic in an Extranet next-generation MVPN scenario. PR1372613

  • The accept-remote-source knob configured on the core interface might cause traffic outage. PR1375716

  • High rpd CPU utilization on the backup Routing Engine might be observed in MVPN+NSR scenario. PR1392792

  • The rpd process crashes when LSP template for a provider tunnel is changed PR1395353

  • Downstream interface is not removed from multicast route after getting PIM prune. PR1398458

  • Dvaita JDI-RCT: NGMVPN Traffic drops seen for multicast groups with "selective" provider tunnels PR1406757

  • The multicast traffic drop might be seen when static-umh is configured in NGMVPN scenario. PR1414418

  • The deletion of (S,G) entry might be skipped after the PIM join timeout. PR1417344

  • The rpd process might crash in rare conditions when Extranet NG-MVPN is configured. PR1419891

  • MPLS LSP ping over l2circuit might not work when flow-label is enabled PR1421609

  • The resumed multicast traffic for certain groups might be stopped in overlapping MVPN scenario PR1441099

  • Memory leak might happen if PIM messages received over an MDT (mt- interface) in Draft-Rosen MVPN scenario PR1442054

  • The rpd process might crash due to memory leak in "MVPN RPF Src PE" block PR1460625

  • The l2circuit connections might be stuck in OL state after changing the l2circuit community and flapping the primary LSP path PR1464194

Resolved Issues: 17.4R2

Application Layer Gateways (ALGs)

  • IKEv2 negotiation might fail with IKE ESP ALG enabled in an IKEv2 redirection scenario. PR1329611

Authentication and Access Control

  • The client moves back to connecting state when VSTP is enabled along with dynamic vlan assigned once port get authenticated by dot1x PR1304397

Class of Service (CoS)

  • CoS wildcard configuration is applied incorrectly after a router restart. PR1325708

  • Remove CoS IDL from the jet IDL package. PR1347175

  • The Routing Engine might get into amnesiac mode after restarting if excess-bandwidth-share is configured. PR1348698

  • The aggregated Ethernet link-protection feature is not supported. PR1355498

EVPN

  • EVPN traffic mapping to specific LSPs is not working. PR1281415

  • The rpd might crash on platform using junos with evpn and nsr enabled after restarting the rpd process in EVPN environment PR1320408

  • An EVPN discard route is installed on the local provider edge (PE) device after connection flaps on a remote PE device in a multihome EVPN topology. PR1321125

  • If host is multihomed then all PEs should install the /32 host IP address pointing to its local IRB interface as long as its local multihomed ES interface is up. PR1321187

  • The rpd crash might happen during EVPN/VXLAN configuration changes. PR1321839

  • RPD crash on backup Routing Engine if NSR and IS-IS SR enabled. PR1323980

  • The FPC might crash after deleting the VPLS configuration. PR1324830

  • A core link flap might result in an inconsistent global MAC count. PR1328956

  • On a deactivated end system identifier (ESI) for PS at a physical interface level, the rpd process generates core files for EVPN VPWS PWHT. PR1332652

  • On doing restart routing, the rpd process might generate core files on a PE router that has a EVPN-VXLAN configuration. PR1333331

  • MPLS label leak leads to label exhaustion and the rpd process crash PR1333944

  • In an EVPN scenario with nonstop active routing (NSR) enabled, the rpd crashes and generates core files on the backup Routing Engine while any configuration changes on the master Routing Engine. PR1336881

  • The rpd process might crash when executing CLI command "show route evpn-ethernet-tag-id" PR1337506

  • In an EVPN-VXLAN environment, the BFD flap causes the VTEP to flap, causing the Packet Forwarding Engine to crash. PR1339084

  • Traffic loss might be observed in an EVPN-VPWS scenario if the remote PE's interface comes down. PR1339217

  • On EVPN-VXLAN scenarios, the traffic might get black-holed to interfaces that are down, but LACP is up. PR1343515

  • The rpd might crash if the IRB interface and routing instance are deleted together in the same commit. PR1345519

  • Traffic might be lost on a Layer 2 and Layer 3 spine node in a multihome EVPN scenario. PR1355165

  • EVPN IRB configured with no-gratuitous-arp-request is still sending gratuitous ARP. PR1356360

  • The rpd might crash if the EVPN instance refers to a vrf-export policy which doesn't have 'then community. PR1360437

  • Proxy ARP may not work as expected in an EVPN environment. PR1368911

Forwarding and Sampling

  • The pfed prcoess generates a core file in pfed_process_session_state_notification_msg, pfed_timer_manager_c::remove_serv_id,pfed_delete_timer_id_by_serv_sid (serv_sid=0, serv_info=0x0) at ../../../../../../src/junos/usr.sbin/pfed/pfed_timer.cc:16. PR1296969

  • Remote CE1 MAC address might take more time to clear after clearing MAC. PR1304866

  • The dfwd process might crash during execution of show firewall templates-in-use command. PR1305284

  • The second archive site in the accounting-file configuration is not used when the first one uses SFTP and is not reachable. PR1311749

  • Accounting files with no records might be unexpectedly uploaded to the archive site. PR1313895

  • The FPC CPU might reach 100 percent constantly if shared bandwidth policer is configured. PR1320349

  • The error messages about dfw_gencfg_handler might be seen during a unified ISSU. PR1323795

  • Ukernel leaks 6x40 bytes heap nodes upon each IPC path when handshaking or establishment occurs between l2alm and l2ald. PR1326921

  • DHCP service crashes after the device is set to factory default by zeroize. PR1329682

  • Some firewall filter counters might not be created in SNMP. PR1335828

  • The error logical interface under VPLS might be blocked after MAC moving if the logical interfaces are on the same physical interface. PR1335880

  • In EVPN-VXLAN clear ethernet-switching table might not work correctly. PR1341328

  • Junos allows firewall filters with the same name under edit firewall and edit firewall family inet hierarchy levels PR1344506

  • Commit failed when attempting to delete any demux0 unit numbers that are greater or equal to 1000000000. PR1348587

  • The remote MAC might not be added in the forwarding table, which will cause a traffic drop in an EVPN scenario with RSVP and CBF configured. PR1353555

  • The backup Routing Engine is writing dummy interface accounting records. PR1361403

General Routing

  • In timing hybrid mode, MX Series MPC2 cards are not working with ACX with VLAN (native-vlan-id). PR1076666

  • An rpd memory leak is caused by repeated RSVP reservation state block (RSB) deletes. PR1115686

  • No warning is raised when the bridge family is configured with interface-mode trunk but without vlan-tagging or flexible-vlan-tagging. PR1154024

  • An unexpected MobileNext Gateway Activation license alarm is observed when TDF gateway is configured. PR1162518

  • The replacement PIC might bounce when PIC PB-4OC3-4OC12-SON-SFP (4x OC-12-3 SFP) is replaced with PB-4OC3-1OC12-SON2-SFP (4x OC-3 1x OC-12 SFP) and a CLI commit is made. PR1190569

  • Agentd process crashes with core-dump PR1197608

  • The Unable to deregister sub error (131072) for error(0x1b0001) for module MIC error messages are seen on the MPC5E card. PR1221337

  • The error log cc_mic_irq_status: CC_MIC(5/2) irq_status(0x1d) does not match irq_mask(0x20), enable(0x20), latch(0x1d) is seen continuously for MIC-3D-4OC3OC12-1OC48. PR1231084

  • The chassisd[9132]: LIBJSNMP_NS_LOG_NOTICE: NOTICE: netsnmp_ipc_client_connection: unix connection error: socket(-1) main_session(0x9812f80) error messages are seen after a chassis-control restart. PR1243364

  • The GNF sometimes resets its MPC type 9 at NSR at a high scale. PR1259910

  • On a vMX FPC, the software FPC might restart unexpectedly with the following message: panic (format_string=format_string@entry=0x9e509c4 "Thread %s attempted to %s with irq priority at %d\n"). PR1263117

  • The show chassis FPC command does not show temperature. PR1263315

  • The load-based throttling functionality is not enabled by default. PR1271739

  • Flexible PIC concentrator (FPC) crash/reboot is observed when bringing up about 12K Layer 2 Bit Stream Access(L2BSA) subscribers simultaneously. PR1273353

  • Error messages observed on vty session while running script for IGMP Snooping over EVPN-VXLAN. PR1276947

  • On an MX104 platform with GRES enabled, the chassis network-services might not get set as "Enhanced-IP”. PR1279339

  • BSYS logs messages are reporting that GNF owned PICs do not support power off configuration at commit when no such configuration is present. PR1281604

  • The kernel might crash when an NSR enabled device has BGP peer flapping. PR1282573

  • The enhancement of reporting total SBE errors when the corrected single-bit errors threshold of 32 is exceeded for MPC7E/MPC8E/MPC9E. PR1285315

  • The LC, PFH, and Packet Forwarding Engine interfaces do not come up on Routing Engine 1. PR1285606

  • The missing statement Shared bandwidth policer not supported for interface ge-x/x/x is seen during a failed commit in Junos OS Release 16.1R3. PR1286330

  • The oneset or leaf-list configuration might not get deleted with the delete operation through JSON. PR1287342

  • PPPoE cannot dial in due to all padi dropped as "unknown iif" when deactivated/activated AE configuration. PR1291515

  • During PPPoE subscriber login errors like vbf_flow_src_lookup_enabled and Failed to find iff structure, ifl were seen on FPC. PR1294710

  • The KRT queue might be stuck with the RPD_KRT_Q_RETRIES: chain nexthop add: Unknown error: 0 error.PR1295756

  • Some random number of ports on a 10-Gigabit MPC7E card might not come up after the remote system or line card restarts or interface flaps. PR1298115

  • The log message about the shutdown time is incorrect when the system exceeds chassis over the temperature limit. PR1298414

  • When the subscriber limit feature is configured, any new login request after the maximum number of subscribers is denied. PR1298924

  • The error messages about PEM might be seen in the MX Series platform with AC PEM. PR1299284

  • A chassisd core file is seen after the insertion of REMX2K-X8-64 in MX2000 line routers with the older RE-S-1800x4. PR1300083

  • The ICMP/ICMPv6 error messages might be discarded while forwarding through an AMS interface. PR1301188

  • Reported same IFD KV by two different sensors. PR1301858

  • The rpd might crash when NSR is enabled and routing-instance specific configurations are committed. PR1301986

  • Continuous interface flapping might lead to an unwanted MIC reset. PR1302246

  • The multicast resolve-rate value might go back to default after system upgrade or reboot. PR1303134

  • Internal latency is high during the initial subscription of sensors. PR1303393

  • Fan speed changes frequently on MX Series after an upgrade to Junos OS software. PR1303459

  • The fabric planes might go into "check" state after restarting the line cards with SFB2 used on the MX2010 or the MX2020. PR1304095

  • The start shell pfe network fpc command is not working on the MX960. PR1306236

  • /Frame: messages might be seen with Telemetry enabled. PR1308513

  • FPC syslog errors with pfeman_inline_ka_steering_gencfg_handler: nh not found could mean that steering rules are not installed correctly. PR1308884

  • After a smooth upgrade from SFB to SFB2, if one plane/SFB is restarted, link training fails between those planes and MPC6 cards. PR1309309

  • First access-request is failing for L2BSA subscribers when changing the MTU of LACP aggregate Ethernet A10NSP interface. PR1309599

  • Subscribers might not be able to access the device if dynamic VLAN is used. PR1309770

  • Ninety percent of subscribers might go down after a unified ISSU from Junos OS Release 16.1 to Junos OS Release 17.3. PR1309983

  • Local IPv6 interface address from the NDRA prefix is not removed from the service interface when the subscriber dual-stack session is removed. PR1310752

  • The utilization of "commit check" just after setting the master-password can trigger an improper decoding of configuration secrets. PR1310764

  • After guest network functions (GNFs) Routing Engine switches mastership as expected, the rpd might be unresponsive. PR1310765

  • The incorrect error number might be reported for syslog messages with a prefix of %DAEMON-3-RPD_KRT_Q_RETRIES. PR1310812

  • Fragmented UDP packet might be incorrectly parsed as a uBFD packet and dropped. PR1311134

  • Suppress chassis alarm for switched off PEMs. PR1311574

  • The FPC memory might be exhausted with SHEAF leak messages seen in the syslog. PR1311949

  • The rpd process generates a core file after multiple session flaps on a scale setup. PR1312169

  • The PEM alarms and I2C failures are observed on MX240, MX480, MX960, EX92, and SRX5K. PR1312336

  • A false over temperature SNMP trap could be seen when using MPC5/6/7/8/9 on an MX2020. PR1313391

  • The IPv6 router-solicit (RS) packets are dropped in nondefault RI, but for default RI it is working. PR1313722

  • The show version detail command gives severity error log traffic-dird[20126]: main: swversion pkg: 'traffic-dird' name: 'traffic-dird' ret: 0. PR1313866

  • The jdmd subsystem is not responding after an upgrade. PR1313964

  • The mspmand process generates a core file because of a flow-control seen while clearing CGNAT+SFW sessions. PR1314070

  • When ccc is configured on a umic interface, ARP is not resolving and observing traffic loss. PR1314149

  • The JDM link is incorrectly shown to be up when the underlying physical link is down. PR1314180

  • The show version detail | no-more command hangs for more than 120 seconds in the master Routing Engine and more than 60 seconds in the backup Routing Engine. PR1314242

  • The smgd process generates a core file with reference to bbe_cos_ifl_publish() bbe_cos_if.c:6543. PR1314651

  • The rpd process might crash in a MoFRR scenario. PR1314711

  • For MPC7E, there is an IR-mode commit failure. PR1314755

  • The L2TP LAC might drop packets that have an incorrect payload length while sending packets to the LNS. PR1315009

  • Continuous logs from vhclient are seen for all the commands executed. PR1315128

  • FPC crash is observed when a route has unilist next-hops in a RSVP scenario. PR1315228

  • The show version detail command gives severity error log mobiled: main Neither BNG LIC nor JMOBILE package is present,exit mobiled. PR1315430

  • The show version detail command might generate severity error log main: name: SRD ret: 0. PR1315436

  • Sensors belong to the same producer with identical reporting interval are not streamed in parallel PR1315517

  • The rpd process generates a core file when a show route inetcolor.0 command is executed from the CLI. PR1316078

  • The fan speed might frequently keep changing between normal and full for the MX Series platform. PR1316192

  • The demux interface sends a neighbor solicitation with source link-address of all zeros 00:00:00:00:00:00 MAC. PR1316767

  • The show configuration <> | display json command might not be properly enclosed in double quotes. PR1317223

  • Linux-based microkernel might panic due to a concurrent update on mutable objects. PR1317961

  • CoA shaping rate is not applied successfully after a unified ISSU from Junos OS Release 15.1R6.7 to Release 16.1R6.2. PR1318319

  • The rpd process might crash when the link flaps on an adjacent router. PR1318476

  • The bbe-smgd process might crash after performing GRES. PR1318528

  • The FPC crashes on a configuration change for the Packet Forwarding Engine sensors. PR1318677

  • Changed text reported in the show chassis hardware output for CFP2-DCO optical transceivers. PR1318901

  • MS-MPC and MS-MIC might crash after a new IPsec tunnel is added. PR1318932

  • The MPC with specific failure hardware might impact other MPCs in the same chassis. PR1319560

  • The kernel might generate a core file if the number of routing instances created are more than 256. PR1319781

  • The task replication might not be complete to certain network protocols after multiple GRES. PR1319784

  • The error log message of MIB2D_COUNTER_DECREASING: pfes_stats_delta: counter might be seen on VMX. PR1319996

  • Loading xmlproxy YANG files cause telemetry session and some daemons to restart. PR1320211

  • The chassis MIB SNMP OIDs for VC-B member chassis are not available after an MX Series Virtual Chassis unified ISSU. PR1320370

  • The show subscriber summary command displays an incorrect terminated subscriber count. PR1320717

  • The PPP inline keepalive does not work as expected when CPE aborts the subscriber session. PR1320880

  • The rpd process crashes during the BGP configuration change and telemetry streaming with OpenConfig. PR1320900

  • MX Series routers send the IPv6 router advertisements and the DHCPv6 advertisements before sending IPCPv6 ACK from CPE. PR1321064

  • CoS is not applied to the Packet Forwarding Engine when the VCP link is added. PR1321184

  • The bbe-smgd process generates core files after massive clients log out and log in, in a PPPoE dual stack subscriber scenario. PR1321468

  • A CoA-NAK with "Error-Cause = Invalid-Request" is sent back to the RADIUS server when a drop policy is applied under radius-flow-tap in an L2TP subscriber scenario. PR1321492

  • The show system schema module hierarchy command is broken in the CLI. PR1321682

  • In commit fast-synchronize mode, the commit operation might get stuck after the commit check is performed. PR1322431

  • The rpd process might crash when two next hops are installed with the same next-hop index. PR1322535

  • The rpd process might crash when the OpenConfig package is upgraded with JTI streaming data in the background. PR1322553

  • MS-MIC interface IFLs remain down after many iterations of offline/online. PR1322854

  • An incorrect output is observed while verifying the command show subscribers client-type vlan subscriber-state active logical-system default routing-instance default. PR1322907

  • NCP Conf-Ack/Conf-Req packets might be dropped constantly from the MLPPP client. PR1323265

  • CLI commands in show system subscriber-management route routing-instance <XXX> hierarchy show unexpected outputs. PR1323279

  • JDM Management is unreachable after flapping physical JDM and GNF/VNF management interfaces. PR1323519

  • The request vmhost halt routing-engine other command does not halt the backup Routing Engine. PR1323546

  • Memory leaks in the MGD-API process during Get API Requests and Error Handling during Set API Request. PR1324321

  • Subscribers might fail to log in after the interface is deactivated or activated. PR1324446

  • A memory leakage is seen in the mosquitto-nossl process.PR1324531

  • The SNMP interface filter does not work when "interface-mib" is part of the dynamic-profile. PR1324573

  • KRTQ entries are waiting in an async queue. PR1324669

  • The VLAN rewrite function might put the wrong VLAN ID when an Ethernet OAM is configured on DPCE cards. PR1325070

  • The SNMP values might not be increased monolithically. PR1325128

  • The MPC cards might drop traffic under a high temperature. PR1325271

  • Non-MACsec interfaces are impacted when first time MACsec is configured on one of the interfaces or respective FPC is rebooted. PR1325282

  • IS-IS adjacency fails to establish because packets drop on Packet Forwarding Engine. PR1325311

  • MACsec session might fail to establish on MX10003.PR1325331

  • The VLAN demux interface does not respond to the ARP request in a subscriber scenario with an MX Series router after Junos OS Release 15.1 with subscriber-management enabled. PR1326450

  • MACsec MKA transmit Interval is changed to the upper limit. PR1326526

  • In an MX Series BNG, the CoS service object is not deleted properly for TCP and scheduler. PR1326853

  • Some show commands were issued twice when a request support information is executed . PR1327165

  • With auto-installation USB configured, interface related commits might not take effect due to a dcd error. PR1327384

  • Minor alarm LCM Peer Connection un-stable is observed on an MX150 after the chassisd process startup or restart. PR1328119

  • Only 5.5M TCP sessions can be established for a NAPT44_SFW_APP_EIM/EIF configuration on an MS-MIC. PR1328510

  • The following message is constantly logged: fm_feacap_sys_feature_get:Attribute DB init not yet done, reading from pvid (id: 18). PR1328868

  • For the show class-of-service interface demux0 <demux interface> command, the Adjustment overhead-accounting mode does not provide the expected output. PR1329212

  • When an AMS bundle has a single MAMs added to it, the subinterfaces do not recover after the subinterface has been disabled. PR1329498

  • Host-outbound traffic is not rewriting IEEE-801.pbits for a dynamic subscriber IFL over a PS interface. PR1329555

  • SNMP walks of Interfaces related MIB objects are slower than expected in a scaled configuration. PR1329931

  • The show services nat mappings address-pooling-paired command times out and fails. PR1330207

  • The Too many supplies missing in Lower/Upper zone alarm flaps (set/clear) every 20 seconds if a zone does not have the minimum required PSMs. PR1330720

  • The packets might be dropped if one route is adverted by BGP, where the session is established through the subscriber interface. PR1330737

  • The rpd process generates core files on the new backup Routing Engine at task_quit,task_terminate_timer_callback,task_timer_dispatch,task_scheduler after disabling NSR+GRES PR1330750

  • The FPC might be wedged when the LSQ interface receives fragmented packets. PR1330998

  • Under very high scale, replication is not started for BGP and is stuck in progress for RIP and LDP after a NSR. PR1331145

  • Chassis FPC temperature with non-NEBS optics is higher after a software upgrade. PR1331186

  • The bbe-smgd process might crash after executing the clear ancp access-loop circuit-id <circuit id of interface set> command.PR1332096

  • Inaccurate Jflow records might be seen for an output interface and a next hop. PR1332666

  • On an MX150 platform, the set chassis alarm management-ethernet link-down ignore command is not ignoring the alarm for the FPC Mgt 0 interface. PR1332799

  • The subinfo process might crash and it might cause the PPPoE subscribers to get disconnected. PR1333265

  • JDID thrashes continuously and continuous log messages are observed in syslog. PR1333632

  • Active/active (A/A) Multihoming EVPN VXLAN in some race conditions can trigger constant high CPU usage on the backup Routing Engine. PR1334235

  • Two subscribers cannot reach the online state at the same time if they have an identical Frame-Route attribute value. PR1334311

  • MPC8E or MPC9E reports high temperature alarms and fan speed changing continuously through full and normal speed iterations. PR1334750

  • The rpd process crashes when performing the BGP configuration change. PR1334846

  • The UID limit is reached in a large-scale subscriber scenario. PR1334886

  • When using the show subscribers command and when the FPC number has two digits, the interface and IPv6 address get connected together for DHCPv6 PD. PR1334904

  • The IPsec rule might not work if both IPv4 ANY-ANY term and IPv6 ANY-ANY term are configured for it. PR1334966

  • Traffic drops on the MX Series LNS because of software error/unknown family exception when traffic goes to or comes from an MLPPP subscriber if 'routing-services' is presented in the dynamic-profile used by this subscriber. PR1335276

  • The master LED glows on the master and the backup RCB, while performing the image upgrade on the master with GRES/NSR enabled. PR1335514

  • There are hitless key chain rollover feature limitations on MIC-MACSEC-MRATE. PR1335644

  • The RIP route updates might be partially dropped when NSR is enabled. PR1335646

  • The MAC_STUCK might be seen on the MS-MPC or the MS-MIC. PR1335956

  • JET application might not respawn after a normal exit. PR1336107

  • Subscriber might experience SDB DOWN event and drop the clients' connections when issuing the show subscribers commands. PR1336388

  • On an MX2000 with an SFB card installed, high traffic volume on an MPC7E, MPC8E or MPC9E might cause traffic drops with cell underflow messages. PR1336446

  • The bbe-smgd might crash when doing a CoS configure of the interface set. PR1336852

  • The set protocols lldp neighbour-port-info-display port-id command might not take effect. PR1336946

  • The error log message sdb_db_interface_remove: del ifl:si-<index> with licnese cnt non zero on can be seen on LTS during a subscriber logout. PR1337000

  • AI-script does not get an auto reinstall upon a Junos OS upgrade on a next-generation Routing Engine. PR1337028

  • DDoS counters for OSPF might not increase. PR1339364

  • The MX10003 MPC offline button is not effective. PR1340264

  • The CLI shows CB states online after pressing RCB offline button for 4 seconds or more. PR1340431

  • Upon a reboot from a cold state (or after a Junos OS software upgrade), MX150 might not forward multicast traffic, including VRRP packets, from the Packet Forwarding Engine to the Routing Engine. PR1341044

  • There might be traffic loss on some subscriber sessions when more than 32,000 L2TP subscriber sessions are anchored in the ASI interface. PR1341659

  • The reboot of the Routing Engine might occur if the PPPoE interface is configured over an aggregated Ethernet or RETH interface. PR1341968

  • With discard Interfaces (configured with IGMPv3), the KRT queue gets stuck while deleting a multicast next hop (MCNH) with the error EPERM -- Jtree walk in progress. PR1342032

  • An SNMP walk might fail for LLDP-related OIDs. PR1342741

  • The vFPC might get absent resulting in the total loss of traffic. PR1343170

  • Support required for the show system resource-monitor subscribers-limit chassis extensive command on Summit.PR1343853

  • An MX Series router is sending IPv6 RA and the DHCPv6 advertisements before IPCPv6 ACK from CPE. PR1344472

  • Unable to route over an RLT interface after upgrading from Junos OS Release 15.1 to Release 17.3. PR1344503

  • The ancpd process might generate a core file when clearing ancp subscribers in a scaled scenario when enhanced-ip is configured. PR1344805

  • The Framed-Route "0.0.0.0/0" will not be installed on an MX Series platform with Junos OS enhanced subscriber management releases. PR1344988

  • The ARP packet uses the VRRP/virtual-gateway MAC address in the Ethernet header instead of the IRB MAC address. PR1344990

  • A dot1x re-authentication issue. PR1345365

  • The rpd process crash might be seen if no-propagate-ttl is set in a routing instance that has a specific route. PR1345477

  • The MAC address of multiple interfaces are found to be duplicates. PR1345882

  • The Routing Engine model changed from JNP10003-RE1 to RE-S-1600x8. PR1346054

  • New PPPoE users might fail to log in. PR1346226

  • The AC system error counter in the show pppoe statistics command is not working. PR1346231

  • The VCCP-ADJDOWN detection is delayed on the Virtual Chassis backup router (VC-Bm) when deleting one VCP link on Virtual Chassis master router (VC-Mm). PR1346328

  • Statistics daemon PFED might generate a core file on an upgrade between certain releases. PR1346925

  • The twice-napt-44 sessions are not syncing to the backup SDG with stateful sync configured. PR1347086

  • IPv6 MAC resolve will fail if the DHCPv6 client uses a non-EUI64 link-local address. PR1347173

  • Remove libstdc++ dependency on the hypervisor to install the JDM rpm/deb package. PR1347921

  • There is an issue with handling the community_action ("add") in a RPC call. PR1348082

  • The FPC might crash due to a MIC error interrupt hogging. PR1348107

  • Packet loop is detected when virtual routing and forwarding (VRF) multipath is enabled with equal-external-internal under an Layer 3 VPN instance and install-nexthop is enabled in a forwarding-table export policy regarding that Layer 3 VPN route. PR1348175

  • A chassisd memory leak is observed on an MX10003 and an MX204 platform and it would eventually cause a Routing Engine switchover and crash. PR1348753

  • The DHCPv6 solicit packet might be dropped on an MX Series Virtual Chassis with L2TP LNS when the packet is received over a VCP port and the anchor si- interfaces exist on the same Packet Forwarding Engine as the VCP port. PR1348846

  • The Major PEM 0 Input Failure major alarm might be observed for a DC PEM. PR1349179

  • The mspmand process might crash when executing the show services nat deterministic-nat nat-port-block command. PR1349228

  • The mgd process generates a core file because of an issue in the nsindb infra. PR1349288

  • The pccd might crash after a delegated LSP is removed in PCEP scenario. PR1350240

  • The MTU value for subscriber's interface might be programmed incorrectly if routing-services or protocol pim is configured in dynamic-profile. PR1350535

  • The subinfo process might crash when executing the show subscribers address <> extensive command for a DHCP IPv6 address. PR1350883

  • The VCP port might not come back up after removing and adding it again. PR1350845

  • The PPE Errors async xtxn error is observed when FPC is restarted or removed. PR1350909

  • The pfed process might consume high CPU if subscriber or interface statistics are used at large scale. PR1351203

  • A high CPU usage for the bbe-smgd process might be seen when L2BSA subscribers get stuck. PR1351696

  • After GRES, the BGP neighbors at the master Routing Engine might reset and the BGP neighbors at the backup Routing Engine might take a long time to establish. PR1351705

  • The bbe-smgd process might restart in a subscriber environment. PR1352546

  • The DHCP relay-reply packets are dropped in the DHCPv6 relay scenario. PR1352613

  • The offlining of MIC6-100G-CFP2 MIC through the CLI command might trigger the FPC card to crash. PR1352921

  • The rpd process is permanently overusing CPU due to a logical system configuration commit. PR1353548

  • Traffic interruption is observed after multiple Routing Engine switchover. PR1354002

  • The dfw_bbe_filter_bind:1125 BBE filter bind type 0x84 index 167806251 returned 1. PR1354435

  • The rpd might generate core files when adding an inter-region template in routing-instances. PR1354629

  • Aggregated Ethernet operational state goes up even though some of the member interfaces configured under the Aggregated Ethernet are down. PR1354686

  • The ifinfo process might crash in an MX BNG running an L2BSA service. PR1354712

  • JSSCD static-subscribers do not properly update firewall information on the Packet Forwarding Engine when dynamic configuration changes are made to active subscribers. PR1354774

  • A memory leak is found in agentd while running valgrind. PR1354922

  • Some of the inline service interfaces cannot send out packets with the default bandwidth value (100Gbps). PR1355168

  • Packets destined to Routing Engine might be dropped in the kernel when LACP is configured. PR1355299

  • The fabric chip failure alarms are observed in a GRES scenario. PR1355463

  • Syslog messages : ui_client_connect_to_kmd_instance: KMD-SHOW connect to kmd-instance failed kmd-instance RE, fpc slot 0, pic slot 0. PR1355547

  • The flex-flow-sizing is not working on an MX204. PR1356072

  • The rpd process will crash when issuing the show dynamic-tunnels database terse command for RSVP automatic mesh tunnels. PR1356254

  • The L2C messages from PEM/PSM are reported if SNMP is enabled. PR1356259

  • The show pppoe underlying-interfaces command in a scaled environment might cause a bbe-smgd memory leak. PR1356428

  • The bbe-smgd generates core files in recursive loop between functions bbe_autoconf_if_l2_input and bbe_if_l3_input. PR1356474

  • DHCP subscribers fail after a reconfiguration of the port from tagged to un-tagged mode. PR1356980

  • Upgrading from Junos OS Release 15.1F2-S20 to Junos OS Release 15.1X12 using validate throws a Fabric Mixed Mode error. PR1357423

  • A Routing Engine switchover during backup Routing Engine being not GRES ready might cause linecard restart, which causes the Routing Engine kernel to crash and multiple chassisd crashes. PR1357427

  • Traffic might be sent to a wrong RLT member interface after RLT switchover. PR1358320

  • An incorrect traffic load balance might be seen even if locality-bias is configured on MX Series Virtual Chassis. PR1358635

  • FPC was offline with the Disconnected after ISSU and before switchover message during a unified ISSU from Junos OS Release 17.4 to Junos OS Release 18.2. PR1359282

  • The FRU-model-number is not displayed for a few FRUs in the component sensor for an MX10008 and an MX10003. PR1359300

  • The IPv6 subscriber might fail to access network. PR1359520

  • The rpd cores at Assertion failed rpd[10169]: file "../../../../../../../../src/junos/usr.sbin/rpd/lib/rt/rt_attrib.c, line 3329: rt_template_get_rtn_ngw(nhp) <= 1 on doing Routing Engine switchover with SRTE routes. PR1360354

  • The rpd scheduler slip might be seen when frequently deleting, modifying, and adding groups which are applied on top level. PR1361304

  • Spontaneous bbe-smgd core file might be seen on the backup Routing Engine. PR1362188

  • The route stuck might be seen after BGP neighbor and route flapping. PR1362560

  • Unexpected DCD_PARSE_ERROR_SCHEDULER messages are logged when MS-MPC/MS-MIC is brought offline or online. PR1362734

  • A quick memory leak in bbe-smgd is observed if the dynamic profile variable name and the default associated value are configured to be the same. PR1362810

  • The non-default routing-instance is not supported correctly for NTP packet in subscriber scenario. PR1363034

  • Traffic destined to the MAC or IP address of VRRP VIP gets dropped on the platforms which have common TFEB terminals such as MX5/10/40/80/104. PR1363492

  • A pmbus_read_volt: sfb-07 - MAX20751-PF1-0.9v: pmbus read failed for cmd 0x8b. PR1363587

  • The xmlproxyd for internal interfaces is reporting uint32 instead of uint64. PR1363766

  • The l2circuit on MPC7E/8E/9E with asynchronous-notification and ccc configured might keep flapping when the circuit is going up. PR1363773

  • A traffic loop might occur even though that port is blocked by RSTP in a ring topology. PR1364406

  • The traffic is still forwarded through the member link of an Aggregated Ethernet bundle interface even with Link-Layer-Down flag set. PR1365263

  • Midplane attributes are not getting exported. PR1365303

  • The next-hop of MPLS path might be stuck in hold state which might cause traffic loss. PR1366562

  • Snmp mib walk for udp flood gives different output statistics than CLI. PR1366768

  • The show system resource-monitor fpc might show non-existing Packet Forwarding Engine. PR1367534

  • The commit or commit check might fail due to the error of cannot have lsp-cleanup-timer without lsp-provisioning. PR1368992

  • Subscriber filter not removed from the Packet Forwarding Engine when routing-services are enabled in the dynamic profile on an L2TP LNS. PR1369968

  • Kernel crash might be seen after committing DEMUX related configuration. PR1370015

  • The packet which size exceeds 8000 might be dropped by MS-MPC in ALG scenario. PR1370582

  • FPC high CPU utilization or crash during hot-banking condition. PR1372193

  • PCE initiated LSPs remain Control status became local after removing PCE configuration. PR1374596

High Availability (HA) and Resiliency

  • After server links flap, the GNFs associated with the ports on the Control Board show the status message: Switchover Status: Not Ready message. PR1306395

  • The ksyncd process might crash continuously on the new backup Routing Engine after performing GRES. PR1329276

  • There is insufficient available space on the hard disk lead by the crashinfo files that are generated by the ksyncd process when GRES is configured in a large-scale configuration scenario. PR1332791

  • VC-Bm cannot sync with VC-Mm when the the Virtual Chassis splits then reforms. PR1361617

Infrastructure

  • The syscalltrace.sh might create a huge output file, which might cause the router to run out of storage space. PR1306986

  • A cleanup at the thread exit is causing memory leaks. PR1328273

  • On all Junos OS platforms, on a port configured with both dot1x static mac by-pass and normal authentication, the hosts configured for static mac by-pass may not be able to send traffic. PR1335125

  • The kernel might crash and the system might reboot in an SNMP query reply scenario. PR1351568

  • Junos OS is no longer going to database prompt at ~ +Ctrl+b. PR1352217

Interfaces and Chassis

  • RL-dropped packets are not displayed by show interfaces <ifl> detail/extensive commands. PR1249164

  • Out of sequence packets seen with LSQ interface. PR1258258

  • L2TP subscribers might not be cleared if the access-internal routes fail to install. PR1298160

  • Some CFM sessions do not come up after a DUT with MPC9 line cards is rebooted with scale configuration. PR1300515

  • The MPC CPU might reach 100 percent when optical transport network (OTP) ultra forward error correction (UFEC) is configured. PR1311154

  • Observing jpppd core telemetry_start_timer,mosquitto_handle_connack,telemetry_mqtt_publisher PR1311396

  • The jpppd process generates a core file at telemetry_start_timer,mosquitto_handle_connack,telemetry_mqtt_publisher. PR1311396

  • The ifinfo process might crash and generate core files when executing the show interfaces name command with a name greater than 128 characters. PR1313827

  • The MX Series Virtual Chassis unified ISSU emits a benign error message if unsupported FRUs are present. PR1316374

  • There is no route to an IP address from the directly connected route. PR1318282

  • The show interfaces interface-set command is displaying wrong logical interface. PR1319682

  • The IPv6 framed Interface ID field (from the show subscribers extensive command output) is not properly matching the negotiated one. PR1321392

  • IPCP negotiation might fail for dual stack PPPoE subscribers. PR1321513

  • Unexpected log messages might be seen if a BGP session flaps in a dynamic-tunnels GRE scenario. PR1326983

  • Unexpected log messages might be seen on a router for a subscriber management scenario. PR1328251

  • Traffic loss might be seen after deleting aggregated Ethernet bundle unit 1. PR1329294

  • The cfmd process generates core files.PR1329779

  • The interface might not work properly after the FPC restarts. PR1329896

  • The dcd process might crash due to a memory leak and cause a commit failure. PR1331185

  • The last IFL digit is sometimes truncated in jpppd trace logs. PR1332483

  • The transportd process might crash when you run an snmp query on the jnxoptIfOChSinkCurrentExtTable with an unsupported interface index. PR1335438

  • The MX Series router might occasionally drop the first LCP configure request packet when operating in PPPoE subscriber management configuration. PR1338516

  • The 100G DWDM interface might be going down for 15 seconds after a loss of signal event. PR1343535

  • When eth-oam is deactivated with a scale PM configuration (under hardware-assited-pm-mode), the FPC might become unstable and generate core files. PR1347250

  • Suppressing cfmd logs : jnxSoamLmDmCfgTable_next_lookup: md 0 ma 0 md_cfg 0x0. PR1347650

  • The jpppd process generates core files spontaneously on the backup Routing Engine in a longevity test at ../../../../../../src/junos/usr.sbin/jpppd/pppMain.cc:400. PR1350563

  • The VRRP VIP becomes unreachable after deleting one of the logical interfaces. PR1352741

  • The FPC might be stuck at 100 percent for a long time when MC-AE with enhanced-convergence is configured with large-scale logical interfaces. PR1353397

  • The FPC generates a core file related to cfmman. PR1358192

  • Clients might not get an IPv4 address in a PPPoE dual-stack scenario. PR1360846

  • Approximately 50 percent of PPPoE subscribers (PTA and L2TP) and all ESSM sub lost after post unified ISSU during DT CST stress test. PR1360870

  • On all Junos OS products, the CLI allows to configure more than 2048 sub-interfaces on LAG interface from 17.2R1. PR1361689

  • The EOAM LTM messages might not get forwarded after system reboot in CFM scenario configured with CCC interface. PR1369085

  • Subscriber cannot negotiate MLPPP session with MX LNS when dynamic-profile name contains more than 30 characters. PR1370610

Layer 2 Features

  • The rpd process memory leak is observed upon any changes in a VPLS configuration such as deleting or re-adding VPLS interfaces. PR1335914

  • The VPLS instance stays in NP state after the LDP session flaps. PR1354784

  • The Routing Engine kernel might crash when OSPFv3 is configured with an IPsec key authentication over an IRB interface. PR1357430

Layer 2 Ethernet Services

  • The MAC address might not be learnt due to spanning-tree state discarding in kernel table after a Routing Engine switchover. PR1205373

  • The MX Series platforms might display a false positive CB alarm PMBus Device Fail. PR1298612

  • DHCP IPv6 traffic might be dropped in a subscriber scenario. PR1316274

  • The jdhcpd process generates core files after making DHCP configuration changes. PR1324800

  • The on-demand-address-allocation under dual-stack-group does not work for IPv6. PR1327681

  • The snmpget for OID: dot3adInterfaceName might not work. PR1329725

  • A memory leak might happen in l2cpd if the l2-learning process is disabled. PR1336720

  • The DHCPv6 second Solicit message might not be processed when IA_NA and IA_PD are sent in a separate Solicit message. PR1340614

  • DHCP client is not able to connect if VLAN is modified on the aggregate Ethernet interface associated with the IRB. PR1347115

  • ZTP infra scripts are not included for MX PPC routers. PR1349249

  • When DHCP subscribers are in an bound (LOCAL_SERVER_STATE_WAIT_GRACE_PERIOD) state if dhcp-service is restarted then the subscribers in this state are logged out. PR1350710

  • The DHCP relay agent will discard a DHCP request message silently if the requested IP address has been allocated to the other client. PR1353471

  • Restarting an FPC that hosts the micro-BFD link might cause LACP to generate a core file. PR1353597

  • DHCPv6 relay ignores replies from server when renewing. PR1354212

  • The DHCP lease query message is replied with incorrect source address. PR1367485

  • DHCP Relay Binding state - rebinding state counter added to dhcpv4 and dhcpv6 binding sensors. PR1368392

MPLS

  • When minimum-bandwidth and bandwidth commands are present in the configuration, the bandwidth selection of the lsp is inconsistent. PR1142443

  • Ingress RSVP LSP fails to come up after issuing the clear rsvp lsp all command on the egress router. PR1275563

  • The rpd might crash in an LDP Layer 2 circuit scenario. PR1275766

  • LDP egress policy not advertising label for inet.3 BGP labeled-unicast route. PR1289860

  • Traffic drop is observed during an NSR switchover for RSVP P2MP provider tunnels used by MVPN. PR1293014

  • The traffic in P2MP tunnel might be lost when NG-MVPN uses RSVP-TE. PR1299580

  • The rpd process might crash in rare conditions where traffic-engineering is configured. PR1303239

  • The RSVP node-hello packet might not work correctly after the next hop for a remote destination is changed. PR1306930

  • The kysncd process might crash after removing and inserting backup RE in analytics and "mpls sensor" scenario. PR1303491

  • The RSVP node-hello packet might not work correctly after the next-hop for remote destination is changed. PR1306930

  • The rpd process might crash if LDP updates the label for a BGP route. PR1312117

  • The output of the show mpls container-lsp command is delayed.PR1314960

  • An RSVP node-neighbor is found even when node-hello has been disabled. PR1317241

  • The IPv4/IPv6 multicast traffic might get dropped in an MX Series Virtual Chassis scenario when the traffic comes in through an Layer 2 circuit and goes out through an aggregated Ethernet member interface across Virtual Chassis members. PR1320742

  • The rpd might crash when LDP P2MP recursive is configured. PR1321626

  • The rpd might crash due to a memory leak in an RSVP scenario. PR1321952

  • Receipt of specially crafted UDP packets over MPLS may bypass stateless IP firewall rules. PR1326402

  • SNMP OID counters for mplsLspInfoAggrOctets show constant value for some LSPs even though traffic is constantly increasing in show mpls lsp statistics. PR1327350

  • In Junos OS Release 17.2X75-D40, a new feature related to "per AE member OAM" introduced additional processing on pfeman thread during link flaps. PR1327988

  • Packet loss might be observed when auto-bandwidth is enabled for CCC connections. PR1328129

  • The rpd might crash on the backup Routing Engine due to memory exhaustion. PR1328974

  • Fate-sharing group cost does not re-set to the default value after a CLI change, removing explicit cost configuration. PR1330161

  • After a MPLS LSP link flap and local repair, a new LSP instance is tried to be signaled but it may get stuck. PR1338559

  • Whenever there is a decrease in the stats value across an LSP, the mplsLspInfoAggrOctets value takes two intervals to get updated. PR1342486

  • An LDP label is generated for a serial interface subnet route unexpectedly. PR1346541

  • The MPLS LSP does not come up after changing admin-group mapping. PR1348208

  • The rpd crash might happen in an RSVP setup-protection scenario. PR1349036

  • In a very rare scenario, the rpd might crash when LDP failed to allocate a self-ID for the P2MP FEC. PR1349224

  • Packets destined to the master Routing Engine might be dropped in the kernel when LDP traffic statistics are polled through SNMP. PR1359956

  • Layer 2 Circuit might flap after an interface goes down even if the LDP session stays up when l2-smart-policy is configured. PR1360255

  • The process rpd might crash during P2MP LSPs churn. PR1363408

  • The rpd process might crash after RSVP is deactivated and then re-activated globally for multi times. PR1366243

  • The rpd might crash in BGP LU and LDP scenario. PR1366920

Multicast

  • DHCP6 Relay is not working unless DHCP is restarted. PR1316210

  • Multicast traffic is not forwarded on the newly added P2MP branch or receiver. PR1317542

  • Some IGMP groups might have wrong upstream interface due to discard route is installed in PIM. PR1337591

Network Management and Monitoring

  • The syslog might generate duplicate entries of hostname and timestamp. PR1304160

  • The mib2d might crash when SNMP polling occurs on interface mibs and while the FPC restarts or the interface flaps. PR1318302

  • SNMP stops or becomes very slow after a very long period of time. PR1328455

  • With interface-mib, the MX Series router is responding with type : NoSuchInstance for OIDs when multiple OIDs are polled in one SNMPGET request. PR1329749

  • The eventd process fails to start up with the syslog configuration. PR1353364

  • The jnxDcuStatsEntry and jnxScuStatsEntry OIDs are missing in a post interface configuration change. PR1354060

  • The SNMP process crashes during polling the CFM stats. PR1364001

Platform and Infrastructure

  • On MX Series routers, if a large number of routes are processed, then the Packet Forwarding Engine of the MS-MPC might crash. PR1277264

  • Executing the show services inline ip-reassembly statistics command might cause a ukern sheaf memory leak. PR1285833

  • The apply-path prefix is not inherited under policy after modifying the interface address. PR1286987

  • The output values of command show system resource-monitor are not accurate. PR1287592

  • The interface-mac-limit might fail for an aggregated Ethernet interface. PR1303293

  • The source MACs might leak (or not learn) between different VPLS instances at the receiving end of VPLS PE devices. PR1306293

  • An rpm probe with a probe interval of 1 second fails on MX Series routers. PR1308952

  • Error messages are not observed during telnet with a username longer than an acceptable limit. PR1312265

  • The mgd process might crash and a session gets terminated after the load override from netconf. PR1313158

  • The issue addresses the ICMP error messages in the Packet Forwarding Engine and is forwarded to the correct pic in the AMS bundle. PR1313668

  • VPLS instance fails to learn MAC addresses upon pseudowire switchover. PR1316459

  • Rate-limit configured with a small temporal buffer size might cause packet loss. PR1317385

  • Multicast traffic might get duplicated when MoFRR is configured. PR1318129

  • The GNF FPC hangs at reboot during a unified ISSU. PR1318394

  • The default severity of the correctable ECC errors on MX Series routers with MPC2E NG Q, MPC3E NG Q, or MPC5E has been changed from fatal to major. PR1320585

  • Errors might be observed when the fabric-header-crc-enable feature is enabled. PR1320874

  • The traffic with more than 2 VLAN tags might be incorrectly rewritten and sent out. PR1321122

  • The RPM probes delegated to MS-MIC get stuck when any change is made to the BGP group statement. PR1322097

  • The no-propagate-ttl option might not take effect if chained-composite-next-hop ingress l3vpn extended-space is configured. PR1323160

  • The MAC might not be learned on MX Series routers with MPCs or MIC-based line cards due to the negative value of the bridge MAC table limit counter. PR1327723

  • The packet might get dropped in an LSR if MPLS pseudowire payload does not have a control word and its destination MAC starts with '4'. PR1327724

  • Traffic loss might be observed on the LT interface. PR1328371

  • Directories and files under /var/db/scripts lose execution permission or directory 'jet' is missing under /var/db/scripts causing an error: Invalid directory: No such file or directory error during commit. PR1328570

  • The tcpdump filter might not work in the egress direction on PS and LT logical interfaces. PR1329665

  • The router hits the database prompt at netisr_process_workstream_proto. PR1332153

  • RPM MIB’s pingResultsMinRtt, pingResultsMaxRtt, and pingResultsAverageRtt response is "1" while target address is unreachable, it should be "0". PR1333320

  • Traffic loss might be seen for some flows due to network churn. PR1335302

  • Commit might fail with error reading from commit script handler error: commit script failure. PR1335349

  • The MPC might crash after setting max-queues to a very large number. PR1338845

  • Route corruption occurs in the Packet Forwarding Engine with CFM enabled on the aggregated Ethernet interface. PR1338854

  • Configuring the same DHCP server in different routing instances is not supported in a DHCP relay scenario. PR1342019

  • Commit error is observed when configuring the same VLAN ID on different logical interfaces of the same LT physical interface and the ethernet-bridge encapsulation is configured. PR1342229

  • Route corruption in the Packet Forwarding Engine with connectivity-fault-management is enabled for l2ckt. PR1342881

  • ZTP is not supported for vmhost images on next-generation Routing Engines on the MX Series platforms. PR1343338

  • The IPv4 GPRS traffic over the aggregated Ethernet interface might be dropped if gtp-tunnel-endpoint-identifier is configured. PR1347435

  • Output policing action does not work on IRB interfaces for VNIs. PR1348089

  • FPC CPU utilization with LT interfaces is pegged continuously at 100 percent. PR1348840

  • Running RSI through the console port might cause a system crash and reboot. PR1349332

  • The ICMP error messages are not generated if 'don't fragment' packets exceed the MTU of the multiservice interface. PR1349503

  • When viewing IPv6 addresses, display rfc5952 does not work when combined with display set. PR1349949

  • The chassisd process memory leak is observed.PR1353111

  • The kernel crashes because the initialization of the logical Interface MAC filter function is missing for Packet Forwarding Engine extended port devices. PR1353498

  • The FPC might crash due to the memory leak caused by the VTEP traffic. PR1356279

  • Traffic is discarded silently along with JPRDS_NH:jprds_nh_alloc(),651: JNH[0] failed to grab new region for NH messages. PR1357707

  • When forwarding-class-accounting knob is enabled, on an interface, inside of a routing-instance of instance-type vrf, aggregate input forwarding-class statistics do not increment (egress statistics work fine). PR1357965

  • Select CLI functions are not triggering properly (set security ssh-known-hosts load-key-file, set system master-password). PR1363475

  • Same vlan-id not allowed on multiple IFLs of the same GR interface. PR1365640

  • Subscribers over AE interface might have tail drops which will affect the fragmented packets due to QXCHIP buffer getting filled up. PR1368414

  • The logical tunnel interface might be unable to send out control packets generated by RE. PR1372738

Routing Policy and Firewall Filters

  • Condition based policy fails to take action even though condition is matched PR1300989

  • The policy configuration might not be evaluated if the policy expression is changed. PR1317132

  • Access-internal route might fail to be leaked between routing instances when from instance is configured in the policy. PR1339689

  • The policy might not clean up after deleting configuration and cause the rpd to generate a core file. PR1357724

Routing Protocols

  • The show bgp summary results are incorrect while assisting GR. PR1045151

  • BGP extended communities with sub-type 4 erroneously displayed at LINK_BANDWIDTH. PR1216696

  • The rpd generates core files in the ASBR when BGP is deactivated in the ASBR before all stale labels have been cleaned up. PR1233893

  • The rpd might crash after deactivating or activating BGP. PR1272202

  • After a bfdd restart, the issue is seen with a next-generation MVPN and Layer 2 VPN route exchange causing MVPN and VPLS traffic drop. PR1278153

  • Routing loops might be seen after configuring BGP Prefix Independent Convergence (BGP PIC). PR1282520

  • Few adj-sid details are not updated in an IS-IS database with a LAN + adjset scenario. PR1288331

  • Multihop BFD sessions flap continuously. PR1291340

  • The lmpd crashes repeatedly when a logical system is configured on the same device. PR1294166

  • The rpd process might crash because of the AS PATH check error that occurs when RIB groups are added first and later the routing instances are added. PR1298262

  • MSDP sessions might flap when NSR or GRES is enabled. PR1298609

  • While the device is booting up with the Junos OS Release 17.4R1 image, error: channel 0: chan_shutdown_read: shutdown() failed for fd 10 [i0 o3]: Socket is not connected messages might show up. PR1300409

  • IBGP route damping is not taking effect on an IBGP inet-vpn address family. PR1301519

  • Observed mcsnoopd core file at __raise,abort,__task_quit__,task_quit,task_terminate_timer_callback,task_timer_dispatch,task_scheduler_internal (enable_slip_detector=true, no_exit=true) at ../../../../../../src/junos/lib/libjtask/base/task_scheduler.c:275 . PR1305239

  • BGP traceoption logs are still written when it is deactivated. PR1307690

  • The rpd might generate a core file in bgp_rt_send_message at ../../../../../../../../../src/junos/usr.sbin/rpd/bgp/bgp_io.c:1460. PR1310751

  • The BGP session might flap when the connection between the master Routing Engine and the backup Routing Engine keeps flapping with NSR configured. PR1311224

  • The rpd might crash when the neighbor IS-ISv6 router is restarted, causing a route churn. PR1312325

  • Unexpected route age refresh might be observed if BGP PIC is configured. PR1312538

  • The IS-IS SPF might be triggered by LSP updates containing changes only in reservable bandwidth in a TE extension.PR1313147

  • The rpd might crash and generate a core file with distributed IGMP. PR1314679

  • The rpd might constantly consume a high percentage of CPU in a BGP setup. PR1315066

  • On a chassis with BMP configured, the rpd might crash when the rpd process is gracefully terminated. PR1315798

  • The primary path of an MPLS LSP might switch to another address. PR1316861

  • If a loop free alternative is configured, an lsdb entry cleanup might cause the rpd to crash. PR1317023

  • The inactive route cannot be installed in a multipath next hop after disabling and enabling the next hop interface in an Layer 3 VPN scenario. PR1317623

  • A BGP-LU update oscillates with a BGP-PIC. PR1318093

  • IS-IS might choose a suboptimal path after the metric change in ECMP links. PR1319338

  • Traffic might get discarded temporarily when BGP GR is triggered and the direct interface flaps. PR1319631

  • There os an issue with tracing of the BGP Layer 2 VPN DF election community. PR1323596

  • The rpd crash is seen when deactivating the static route if the next-hop interface is type P2P. PR1323601

  • When the prefix limit is reached, increasing maximum-prefixes does not take effect. PR1323765

  • The rpd process might crash continuously on both Routing Engines when backup-spf-options remote-backup-calculation is configured in the IS-IS protocol. PR1326899

  • Multiple next hops might not be installed for an IBGP multipath route after an IGP route update. PR1327904

  • With BGP/LDP/IS-IS configurations, deleted IS-IS routes might still be visible in the RIB. PR1329013

  • The rpd might crash on the backup Routing Engine after BGP peer is deleted. PR1329932

  • Manual GRES with an MX Series Virtual Chassis results in some packet loss on core facing interfaces. PR1329986

  • The conditional route policy cannot withdraw all routes in a BGP add-path scenario. PR1331615

  • LDP route in inet.3 is missing when both OSPF rLFA and LFA protections are available and rejected by the backup selection policy. PR1333198

  • Discard next hop being installed when the primary LSP interface drops. When primary interface returns, discard next hop remains until BGP LU neighbor is cleared. This only impacts the cloned route (S=0). PR1333570

  • For Junos OS Release 15.1 and later, IGMP joins are not processed with the passive allow-receive command configured on the IGMP interface. PR1334913

  • BGP sessions get stuck in an active state after the remote end restarts the device. PR1335319

  • The rpd crash might occur when receiving BGP updates. PR1341336

  • Changes to the displayed value of AIGP in the show route ... extensive command. PR1342139

  • Traffic black hole might be seen if a local device is receiving BFD-down. PR1342328

  • The rpd might crash when BGP flaps. PR1342481

  • The rpd generates a core file while running streaming telemetry test. PR1347431

  • The rpd might crash if a route for RPF uses a qualified-next-hop. PR1348550

  • The rpd might crash while restart routing or deactivate IS-IS. PR1348607

  • The rpd might crash when the BGP route damping and the BGP multipath feature are configured. PR1350941

  • Source-as community is not appended to the rendezvous point. The display issue is in the show route detail output. PR1353210

  • Static Route flaps on commit when configured with resolve statement. PR1366940

Services Applications

  • PCP mappings cannot be manually cleared when a NAT pool is shared between PCP and standard NAT. PR1284261

  • The L2TP subscribers might get stuck in a terminating state during login. PR1298175

  • LTS clients experience packet drop for large packets due to fragmentation in LTS. PR1312691

  • AVP 145 is not present in IRQ when ANCP DSL-type = 0. PR1313093

  • L2TP tunnel Tx and Rx byte count sometimes decrease when subscriber sessions are reduced within the tunne.l PR1318133

  • SNMP MIBs are not yielding data related to sp-interfaces. PR1318339

  • The MRU might be changed to 1492 instead of the default 1500 in an L2TP scenario. PR1319252

  • IPCP active mode is not getting enabled for MLPPP on LNS. PR1319580

  • Long route remains in forwarding table after subscriber session goes down. PR1322197

  • The L2TP LTS might drop the first CHAP success packet from LNS due to delayed programming of /136 route on the Packet Forwarding Engine. PR1325528

  • The jl2tpd might crash if the RADIUS server returns 32 tunnel-server-endpoints. PR1328792

  • A few CSURQ messages might not respond when the number of sessions addressed in CSURQ is more than 107. PR1330150

  • The l2tpd might crash when multiple l2tp related commands are executed together. PR1337406

  • The show services stateful-firewall flows count command shows an incorrect flow count after a services configuration change. PR1338704

  • Output of show interfaces si-x/y/z.xxxxx extensive CLI command shows an incorrect inet/inet6 MTU value for an MLPPP subscriber on MX Series L2TP LNSs. PR1346049

  • The bbe-smgd process might crash if there are 65,535 L2TP sessions in a single L2TP tunnel. PR1346715

  • Session limit per tunnel on LAC does not work as expected. PR1348589

  • After performing an SNMP walk on the IKE SA that is deleted, IPsec tunnels might go down and an infinite loop scenario might be seen. PR1348797

  • The UDP checksum inserted by an MS-DPC after a NAT64 is not valid when an incoming IPv4 packet has UDP checksum set to 0. PR1350375

  • The show services stateful-firewall flows counter command shows high numbers. PR1351295

  • The Jl2tpd process might crash shortly after one of the L2TP destinations becomes unavailable. PR1352716

  • L2TP tunnel-switch clients in subscriber session database reference the wrong routing instance. PR1355396

  • In some corner cases, a few tunneled PPPoE subscribers might get stuck in a terminating state. PR1363194

  • The L2TP subscribers might not be able to log in successfully due to the jl2tpd memory leak. PR1364774

  • Actual Data Rate Downstream value not included in the L2TP ICRQ message from the LAC. PR1370699

Software Installation and Upgrade

  • New versions of Junos OS do not have the tool for accessing an aux port - /usr/libexec/interposer. PR1329843

  • Commit might fail in single-user mode PR1368986

Subscriber Access Management

  • A memory leak might happen after clearing a subscriber either with a script or manually. PR1312517

  • Service interim is missing for random users in a JSRC scenario. PR1315207

  • The PPPoE subscribers might encounter a connection failure during login. PR1317019

  • The unified ISSU is allowed to proceed when the account is suspended. PR1320038

  • IP addresses are assigned discontinuously from the linked IP pools. PR1323829

  • Authd considers RADIUS attribute Framed-IPv6-Prefix = ::/64 or Delegated-IPv6-Prefix = ::/56 as valid parameters. PR1325576

  • An MX204 does not send a RADIUS Accounting-Off message. PR1327822

  • Multiple RADIUS servers having a different dynamic-request-port is not supported. PR1330802

  • Subscriber might get stuck in a terminated state when JSRC synchronization state is stuck in a FULL-SYNC in progress state. PR1337729

  • In dual stack subscribers scenario with NDRA pool configured, the linked pools are not used when the first NDRA pool is exhausted. PR1351765

  • When attempting to scale clients saw sdbsts_lock_holder.bbe-smgd.pid10686.core core files. PR1358339

User Interface and Configuration

  • There is an increase in commit times. PR1029477

  • The CLI session might die while issuing the show configuration | compare rollback 1 command. PR1331716

  • The max-db-size configuration might not work on some MX platforms. PR1363048

VPNs

  • In a specific CE device environment in which asynchronous-notification is used, after the link between the PE and CE devices goes up, the Layer 2 circuit flaps repeatedly. PR1282875

  • Un-hide set protocols pim mvpn family inet6 disable configuration to allow users to disable inet6 on MVPN. PR1317767

  • The rpd might crash after a unified ISSU in a large scale scenario with a PIM configuration. PR1322530

  • Moving MC-LAG from LDP based pseudowire to BGP based pseudowire might cause the rpd to crash. PR1325867

  • The multicast might be rejected when Junos OS PE devices received a C-Mcast route from other vendor PE devices. PR1327439

  • MVPN sender-site configuration is not allowed with S-PMSI. PR1328052

  • The rpd generates a core file on the backup Routing Engine with an next-generation MPVPN and NSR configuration. PR1328246

  • The rpd might crash after committing interface related parameters (for example, MTU change, VRF RD or RT, QOS) on the PS interface with vlan-ccc encapsulation and no vlan-id. PR1329880

  • The rpd might continuously crash on the backup Routing Engine and some protocols might flap on the master Routing Engine if hot-standby is configured for Layer 2 circuit or VPLS backup-neighbor. PR1340474

  • The rpd might crash on the backup Routing Engine when changing the Layer 2 circuit virtual-circuit-id in an NSR scenario. PR1345949

Resolved Issues: 17.4R1

Class of Service (CoS)

  • The Routing Engine level scheduler-hierarchy command misses a forwarding class when the "per-unit-scheduler" mode is configured. PR1281523

Forwarding and Sampling

  • The Sampled process stops collecting data on Routing Engine based sampling supported platforms. PR1270723

  • Firewall filter might not be matched when wildcard (*.*) is specified as the matching condition. PR1274507

  • The sampled route reflector process (srrd) might crash in a large routes churn situation. PR1284918

  • The mib2d process generated a core file @fw_counter_key2components. PR1286448

  • The sampled process might crash and generate a core file if traceoptions are enabled. PR1289530

  • Some accounting files might be missed if the remote archive site is unreachable. PR1300764

  • There is memory leak on mib2d when polling firewall MIBs. PR1302553

  • ACCT_FORK_LIMIT_EXCEEDED log level is ERROR even when backup-on-failure feature is enabled for accounting files. PR1306846

  • The commit might fail if enabling nexthop-learning knob for J-Flow v9. PR1316349

General Routing

  • Enhanced IP/enhanced Ethernet and MS-DPC compatibility. PR1035484

  • Ksyncd might crash due to transient replication errors between Routing Engines. PR1161487

  • On MX240/480/960 platforms, due to a I2C bus hardware issue, error messages might appear. PR1174001

  • SNMP trap sent for PEM Input failure alarm. PR1189641

  • Stale VBF states occur without SDB sessions. PR1204369

  • The rpd might crash on the backup Routing Engine after a Routing Engine switchover in MX Series subscriber environment. PR1206804

  • The rpd might crash on platforms with 64-bit X86 RE if IPv6 is configured. PR1224376

  • MPC2E-NG/MPC3E-NG generates a core file with specific MIC due to tight loop of PCI Express critical exceptions. PR1231167

  • The MS-MPC card might crash when OSPFv3 IPv6 traffic goes through it. PR1233459

  • FPCs on MX960 platform might be stuck in offline state with FPC Incompatible with SCB due to delayed PEM startup. PR1235132

  • With vLNS (vBNG), a commit generates the message warning: requires 'l2tp-inline-lns' license even if a valid license is installed. PR1235697

  • The "multicast-replication" setting cannot be reflected in the redundancy environment after rebooting both Routing Engines. PR1240524

  • In a BGP/MPLS scenario, if the next-hop type of label route is indirect, disabling and enabling the "family mpls" of the next-hop interface might cause the route to go into a dead state. PR1242589

  • XM chip-based line card might drop traffic under high temperature. PR1244375

  • On MX2000 with MPC6E, EOAM LFM adjacency flaps when an unrelated MIC accommodated in the same MPC6E slot is brought online by configuring OAM pdu-interval 100 ms and pdu-threshold 3. PR1253102

  • The "validation-state:unverified" routing entry might not be shown with proper location in show route output. PR1254675

  • The rpd might crash during the next-hop change, if unicast reverse-path- forwarding (uRPF) is used. PR1258472

  • Status LED for the ge-0/0/0 interface does not glow. PR1259112

  • MPC might report a parity error with the fast-lookup-filter command configured. PR1266879

  • When ISSU is performed under scaled scenarios where the Packet Forwarding Engine next-hop memory uses more that 4 Million Dwords, PPE traps and traffic loss might be observed during software-sync phase until the end of hardware-sync. PR1267680

  • On MX Series routers, the show chassis led command should not be displayed in possible completions of the show chassis command. PR1268848

  • A low memory condition putting the Service PIC into the red zone on the MS-MIC or MS-MPC card might cause the SIP ALG to generate a core file. PR1268891

  • The FPC might go offline and the ABB fan might crash after enabling MACsec. PR1270121

  • The mspmand log incorrectly generates messages about memory zone level.This occurs every 49.7 days and will recover by itself. This is a display issue and will not affect traffic. PR1273901

  • CLI commands fail to execute for show subscribers detail, show subscribers extensive,show subscribers count client-type <> and other commands because the subscriber management database is unavailable. PR1274464

  • Link stays down after a flap on MPC next-generation cards with QSFP+-40G direct attach copper (DAC) cable. PR1275446

  • The Packet Forwarding Engine of service DPC might crash with large scale of routes for MX Virtual Chassis. PR1277264

  • Layer 2 control BUS stuck causes SFP+ thread hogging and restarting of MPC. PR1277467

  • Multicast traffic when using iflsets in universal call admission control policy mode does not flow as expected in certain use cases, and bbe-smgd might generate a core file. PR1278543

  • VLAN out-of-band subscriber session fails in autoconfigured mode. The physical interface goes down even if it is physically up. PR1279612

  • After a MS-MPC-PIC is turned offline or online or bounced(because of an AMS configuration change), sometimes the PIC can take approximately 400 seconds to come up. PR1280336

  • MIC Error code: 0x1b0001 alarm might not be cleared for MIC on MPC7/8/9 when the voltage has returned to normal. PR1280558

  • Authenticated subscriber dynamic VLAN interface might get disconnected immediately after a successful connection. PR1280990

  • jfirmware upgrade support is not available for Routing Engine BIOS. PR1281050

  • The ingress service-accounting-deferred command is not providing the correct IP traffic statistics for for L2BSA subscribers. PR1281201

  • Establishment of IPsec SAs for link-type tunnels might fail under certain conditions. PR1281223

  • Subscribers might not be able to connect to MX BNG in certain scenarios. PR1281896

  • DHCP/PPPoE subscribers fail to bind after FPC restart and smgd restart with BBE_RTSOCK_GET_RTSOCK_IFL_FAIL_TERMINATED counter going up. PR1281930

  • Inline J-Flow unrelated configuration changes related to a routing instance result in invalid or incomplete J-Flow data packets. The commit full command resumes proper functionality. PR1282580

  • In a specific CE device environment in which asynchronous-notification is used, after the link between the PE and CE devices goes up, the L2 circuit flaps repeatedly. PR1282875

  • Error messages related to "IFRT: 'IFL", "IFRT: 'Aggregate interface" and "IFRT: 'IFD" are seen on configuration change. PR1282938

  • VBF flows are not programmed correctly on aggregated Ethernet interfaces. PR1282999

  • The MX: show interfaces command should display the cause for Intf down when the Packet Forwarding Engine disabled. PR1283323

  • GRE OAM fails to come up when GRE tunnel source and family inet address are the same. PR1283646

  • PPTP session could not be established on MS-MPC when both stateful firewall and NAT were enabled. Also, the address could not be translated. PR1285207

  • The J-Flow data template sequence number is zero for MPLS flows. PR1285975

  • With CoS-based forwarding, when the primary path of one of the next-hop LSPs flaps, traffic carried by the other next-hop LSP could get load-balanced across the primary and secondary path. PR1285979

  • Internal latency increases the overtime for Packet Forwarding Engine sensors with streaming telemetry. PR1286286

  • Unified ISSU is not supported from Junos OS Release 15.1 or later, because the source release includes one or more BBE features such as logical interface (IFL) options, CoS fragmentation map, MLPPP, advisory options, advanced services, and multicast distribution. PR1286507

  • DDS culprit flows are not reported by CLI or logs during login to a MX Series router with a single Packet Forwarding Engine. PR1286521

  • The routing protocol process (rpd) crashes during subscriber login or logout with multicast service enabled while performing GRES switchover. PR1286653

  • Framed routes might get struck in KRT queue. PR1286849

  • A10NSP interface is not getting attached to the L2 routing instance after the routing instance name is renamed. PR1287070

  • The rpd might generate a core file when the routing-options dynamic-tunnels configuration is changed. PR1287109

  • Host 0 RTC Battery failure error messages are seen on PTX1000 and QFX10000-line after upgrading to Junos OS Release 16.1. PR1287128

  • LTS functionality is not working on Junos OS 16.1R4-S2 if the rewrite-rule statement is applied to the dynamic profile. PR1287788

  • SNMP query for IF-MIB::ifOutQLen reports Wrong Type should be Gauge32 or Unsigned32 for a dynamic VLAN DEMUX0 interface. PR1287852

  • The services-oids-ev-policy.slax and services-oids.slax files built in the Junos OS image are not the latest versions. PR1287894

  • After offlining and onlining back fabric planes, a few planes are stuck in offline state in MX480. PR1287973

  • The bbe-smgd process might crash and generate a core file on the standby Routing Engine during a reboot upgrade with active locally terminated PPPoE subscribers. PR1288121

  • During unified ISSU upgrade micro BFD flap is observed. PR1288433

  • The smg-service process (daemon) might generate core files in the backup Routing Engine with a distributed IGMP configuration. PR1288465

  • Performance issues can be seen when nontranslated traffic is introduced to a service-set using a large number of NAT terms. PR1288510

  • After GRES smid was thrashing and was not restarted after a fatal SDB error. PR1288871

  • Kernel "rtdata" memory leak is found on an MX Series Virtual Chassis with the heartbeat command enabled. PR1289363

  • FPC memory leak might happen in a BBE subscriber environment. PR1289365

  • The interfaces might got to a down state after performing GRES. PR1289493

  • The request system zeroize command deletes the /var/db/scripts directory, which does not get re-created until the next USB/Netboot recovery. PR1289692

  • The jnxContainersType MIB is not displayed for PIC and MIC as correctly as it is displayed on other Juniper platforms. PR1289778

  • If the vmhost application is not running, then the alarm string will have "Application" name embedded in it. PR1290150

  • NAT-T and DPD functionality do not work for aggressive mode. PR1290689

  • Incorrect temperature is displayed for MPCP5/MPC7 in show chassis fpc output. PR1290771

  • When IGMP protocol is enabled, there can be a leak of 56 bytes in the bbe-smgd process (daemon) during logout for every subscriber who had joined any multicast group during the session. PR1290918

  • Rpd core file might be generated when restarting the process via CLI. PR1291110

  • JDI-RCT-RPD: Device going to the DB prompt "db@jsr_jsm_send_ka_after_merge,send_proto_keepalive" was observed on master Routing Engine. PR1291247

  • l2tp iccn fast retransmission occurs after tunnels go down. PR1291557

  • The bbe-smgd process might crash and subscribers might get stuck when a large group of different types of subscribers login/logout. PR1291969

  • The local preference cannot work correctly for EVPN type 5 route in multipath scenario. PR1292234

  • An error in vbf_filter_add_orphan_check might be seen when the subscribers using filters log out or log in. PR1292582

  • Error message might be seen while bringing up the subscriber in a subscriber management environment. PR1293057

  • CPCDD might generate core files while using Routing Engine based http-redirect. PR1293553

  • The show extensible-subscriber-services sessions command is displaying incorrect timestamp after a unified ISSU. PR1293800

  • Loss of DHCP/PPPoE subscribers is observed during unified ISSU from Junos OS Release 16.1-20170718_161_r4_s5.0 to Release 16.1-20170718_161_r4_s5.0. PR1294709

  • The krt queue might be stuck with the error of "RPD_KRT_Q_RETRIES: chain nexthop add: Unknown error: 0". PR1295756

  • Unable to edit dynamic profiles after scaling up to 400 dynamic profiles. PR1295446

  • The bbe-smgd process might generate a core file at bbe_mcast_ifl_vbf_encoder on service activation or deactivation along with smg-service process (daemon) restart. PR1295938

  • The service-profile's CoS might be overrode by the client-profile's CoS when second family DHCP session added in dual-stack subscriber scenario. PR1296002

  • TACACS remote user is unable to run JET applications because of a bad stored heap. PR1296237

  • The mspmand process might crash if you use SCG services on MS-MPC/MS-MIC. PR1296422

  • The continuous kernel might crash when a lot of terms are configured for firewall filters. PR1296884

  • In ECMP fast reroute scenario, traffic might get silently dropped or discarded because of a next hop in "hold" state. PR1297251

  • A memory leak is seen when set protocols mld XXX is changed and committed. PR1297454

  • Multiple bbe-smgd core files are seen during a subscriber binding configuration with DT CST with as little as 200-300 subscribers and continual core files while scaling. Maximum scale cannot be achieved with multicast- enabled subscribers (related to IPTV profile). PR1297612

  • During InFlight Daemon Kill test, rpd core files are seen with PPPoE and L2BSA flapping.

    PR1298587

  • Commit error is thrown when trying to commit a configuration with apply groups. PR1298649

  • The bbe-smgd process might crash when traceoption is enabled due to an invalid username character. PR1298667

  • The bbe-smgd process constantly generates core files while ESSM+PPPoE stress test with concurrent GRES is running. PR1298742

  • MX Series BNG does not respond to PADI after GRES on some ports/VLANs. PR1298890

  • Junos Telemetry Interface: DREND errors are seen for components "mpcs-software-rev", "rom-software-rev", "software-rev", and "firmware-rev". PR1299470

  • The "asynchronous-notification" feature cannot be implemented properly in a circuit that has MIC-3D-20GE-SFP-E/Tri Rate Copper SFP(740-013111). PR1299574

  • Flat accounting files are not generated according to the configured timers. PR1299597

  • Subscriber database is stuck in not-ready state after GRES. PR1299940

  • After IS-IS-TE routes and BGP routes attribute change, traffic loss might be seen because BGP routes point to some stale labels. PR1300425

  • Junos Telemetry Interface: The error error: the SDN-Telemetry subsystem is not responding to management requests is seen on issuing the CLI command show agent sensors if traceoptions is enabled for services analytics. PR1300829

  • Configured logical interface might not be created correctly after commit. PR1301823

  • The rpd might crash when toggling the vrf-propagate-ttl and no-vrf-propagate-ttl configuration statement. PR1302504

  • The log message jam_cache_get.636 ERR:entity 0x997 not found, get cache failed is continuously seen in jam_chassisd log file. PR1302975

  • chassisd.core-tarball.0.tgz found during ISSU is aborted in FRU upgrade phase. PR1303086

  • Incorrect MTU might be seen on PPP interfaces when PPP MTU is not defined in the dynamic profile. PR1303175

  • The list of available routing instances is no longer provided for output of show subscribers routing-instance ?command. PR1303199

  • Blocking PPPoE/DHCP to initiate VLAN auto-sensing if VLAN-OOB connected is in pending state. PR1303338

  • MX Series MIB polling returns a value that has "sdg". Polling result should include “svc” generic value. PR1303848

  • Truncated output appears for the show pppoe lockout CLI command. PR1304016

  • Effective rate of E3 in framed mode is limited to 30 Mbps on certain channelized MICs. PR1304344

  • RPF check strict mode is causing traffic drop in next-generation subscriber management release. PR1304696

  • On MX2000 platform with MPC9E and SFB2 installed, certain high amount traffic volume might cause traffic drops with cell underflow messages. PR1304801

  • Commit fails with error: ffp_intf_ifd_hier_tagging_config_verify: Modified IFD "si-1/1/0" is in use by BBE subscriber, active L2TP LNS client. PR1304951

  • Inline J-Flow VMX: OIF field of VPLS data records sometimes reports the SNMP index value of the LSI interface instead of the egress physical interface. PR1305411

  • MX Series router is sending immediate-interim for the services pushed by SRC. PR1305425

  • Customers running 32-bit Junos OS might generate rpd core file when traceoptions are enabled. PR1305440

  • Going forward, JET daemonize applications will not get respawned on a normal exit, which should be the ideal behavior of any App. PR1305615

  • L2BSA subscriber connection attempts failed with vlan profile-request-error. PR1305962

  • L2BSA subscribers came up, but no new ANCP session got established during the RADIUS disaster backup procedure. PR1306872

  • Smihelperd generates core files when SNMP is polling for JUNIPER-SUBSCRIBER-MIB::jnxSubscriberGeneral.7.0. PR1306966

  • Split horizon label is not allocated after switching a configuration of ESI from single-active to all-active. PR1307056

  • The kmd process error UI_DBASE_OPEN_FAILED is seen because of too many open files. PR1308380

  • License lost during Routing Engine switchover in scale-subscriber scenario. PR1308620

  • CoS applied to a subscriber demux logical interface (IFL) is not working. PR1308671

  • All the MICs on FPC, with ps interfaces configured, went offline during the restart of FPC in another slot. PR1308995

  • Error message: %PFE-3: fpc0 vbf_var_iflset_add:633: vbf container 11 not found in the msg for ifl .demux.6514 is often seen after MPC restart. PR1309013

  • Incorrect values are found in the event-timestamp of RADIUS Accounting-Stop packets for L2BSA subscribers. PR1309212

  • RPT BBE REGRESSIONS: DHCP client is stuck in selecting state while verifying untagged DHCP subscribers after modifying router configuration. PR1309730

  • In next-generation subscriber-management release, bbe-smgd process memory leak is seen after deleting or adding the address pool. PR1310038

  • The MS-MIC/MS-MPC memory utilization might stay at high level in the subscriber management scenario. PR1310064

  • SPD_CONN_OPEN_FAILURE and SPC_CONN_FAILURE log messages are seen in the log for SI interfaces when running SNMP walk on Service PIC NAT OIDs. PR1310081

  • The krt_junos_sanity_check_ctrl_resp: rtsock request finally succeeded after error 16' syslog message in the Junos OS Release 17.1R1.8. PR1310678

  • After bsys reboot sometimes rpd is unresponsive on one or more GNFs. PR1310765

  • In streaming telemetry, when a user logs in and logs out quickly from TACACS, the following message is displayed: bad stored heap: heap-ptr=0x0 data-ptr=0x1481cbf8. PR1311482

  • The FPC memory might be exhausted with SHEAF leak messages seen in the syslog. PR1311949

  • Counter at PPPoE session logical interface (IFL) incremented wrongly cause accounting packet contains wrong Acct-input-packets value and wrong Acct-input-octets value. PR1312998

  • Rpd core is seen when any show route inetcolor.0 command is executed from CLI. PR1316078

  • show auto-configuration out-of-band CLI command with different configuration statements shows the same output. PR1316661

  • After NSR to re1, switch back to RE0 has replication stuck for BGP and LDP. PR1319784

  • Rpd core seen during configuration changes with BGP neighbors. PR1320900

  • Commit operation gets stuck when commit check is performed with fast-synchronize option is enabled. PR1322431

  • JDM Management is unreachable after flapping physical JDM and GNF/VNF management interfaces. PR1323519

High Availability (HA) and Resiliency

  • Line Card reboots after GRES. PR1286393

  • After flapping server CB ports GNFs shows "Switchover Status: Not Ready". PR1306395

Infrastructure

  • "Last flapped " time stamp is not getting updated for fxp0 interface as it should be. PR1244502

  • The show system users CLI command output displays users that are not using the router. PR1247546

  • When set system ports console log-out-on-disconnect is enabled, system reboot or switchover can result in processes remaining in the wait state and failure of the syslog feature. PR1253544

  • The device might fail to upgrade. PR1298749

  • The syscalltrace.sh might create huge output file which could cause the router to run out of storage space. PR1306986

Interfaces and Chassis

  • The output value is incorrect when querying the optical power of OTN interfaces in the router. PR1216153

  • EX Series Packet Forwarding Engine and MX Series MPC7E/8E/9E PFE crash when fetching interface statistics with extended-statistics enabled (CVE-2017-10611). PR1247026

  • At a high logical interface scale, an ifinfo process (daemon) generates a core file on executing the command show interfaces extensive | no-more. PR1254189

  • The MRU of ae interface might reset to default value. PR1261423

  • The MTU configuration option for vt interfaces should be removed because the MTU on this interface is already set to unlimited. PR1277600

  • Monitor interface on aggregated Ethernet logical interfaces displays incorrect bps value compared to show interface output. PR1283831

  • Interface flap while executing Routing Engine switchover if the member links of an ae interface are configured with framing settings. PR1287547

  • No L2TP sessions come up on some si interfaces after an MPC restart followed by a Routing Engine switchover. PR1290562

  • PPPoE/PPP subscriber might not be brought up with reject-unathorized-ipv6cp configured. PR1291181

  • Change in history records supported per EOAM performance-monitoring session. PR1294123

  • Family inet shows as not-configured after adding or deleting the loopback address. PR1294267

  • A VRRP track interface down does not trigger a mastership election immediately. PR1294417

  • IRB interface shows incorrect bandwidth value. PR1302202

  • AFEB might not come up if LFM is deactivated. PR1306707

  • After executing the request system reboot both CLI command, the Juniper PPP daemon might become unresponsive. PR1310909

  • The PPPoE subscriber might not login correctly after authentication failure in subscriber scenario. PR1311113

  • MX Series Virtual Chassis unified ISSU emits benign error message if unsupported FRUs are present. PR1316374

Layer 2 Ethernet Services

  • DHCP is not using the configured IRB MAC as the source MAC in DHCP offer unicast replies. PR1272618

  • DHCPV6 client bound to IA_PD prefix on reception of DHCV6 Request for IA_NA, MX deletes the existing binding. PR1286359

  • ARP requests not generated for IRB configured in VPLS over GRE tunnel. PR1295519

  • PPPoE/DHCP clients cannot login to PPPoE/DHCP dual-stack subscriber scenario. PR1298976

  • Multiple jdhcpd core files are observed in jdhcpd_update_groups at ../../../../../../src/junos/usr.sbin/jdhcpd/jdhcpd_config.c:2290. PR1311569

Layer 2 Features

  • A misconfiguration that adds an aggregated Ethernet bundle and its member link to a VPLS instance might cause 100 percent routing protocol process (rpd) utilization. PR1280979

  • On MX Series routers with MPCs or MICs based platforms, packets received on the IRB interface in VPLS will get double-tagged. PR1295991

MPLS

  • RSVP p2mp sub-LSPs having more than one sub-LSP in down state might not get re optimized after transit path goes down. PR1174679

  • The rpd might crash when moving static LSP from one routing instance to another PR1238698

  • Created time value in show mpls lsp extensive drifts by a second when the show command is issued multiple times. PR1274612

  • Next generation MVPN mLDP at the receivers' PE device does not join to P2MP LSP on changing the root PE device route from IGP/LDP to LBGP. PR1277911

  • MPLS l2ckt ping packet incorrectly parsed by the output loopback filter. PR1288829

  • The routing protocol process (rpd) crashes due to LDP defect during NSR-enabled Routing Engine switchover. PR1290789

  • Received MTU might not get updated in RSVP MTU signaling. PR1291533

  • Stale RSVP LSP entry after NSR switchover and session is not refreshed. PR1292526

  • The rpd might crash if the MPLS LSP path change occurs. PR1295817

  • The rpd process might crash when performing MPLS traceroute. PR1299026

  • When using IS-IS traffic engineering database, if an LSP's state changes, the routing protocol process might loose track of memory. PR1303239

  • BGP multipath might not work if interface flaps. PR1305228

  • Feature explicit-null might block host-bound traffic incoming from LSP. PR1305523

  • The rpd process might crash during interface-down when UHP-based LSPs are configured. PR1309397

Network Management and Monitoring

  • Command Esc-Q does not work when the syslog is disabled. The syslog message is still seen even if it is disabled by Esc-Q. PR1269274

  • MIB2D-related syslog message MIB2D_RTSLIB_READ_FAILURE: rtslib_iflm_snmp_pointchange is seen when configurations are removed or restored. PR1279488

  • MIB2D logs RLIMIT curr 1048576000 max 1048576000 every time a commit is done. PR1286025

  • The mib2d process might crash when polling the OID ifStackStatus.0 after a logical interface (IFL) of lo0 is deleted. PR1286351

  • An alarm-mgmtd core file is seen after upgrade due to an old version of the alarm.db file. PR1296597

  • Implement prefix compression for subinterfaces from mib2d. PR1297447

  • The show arp no-resolve interface X output for inexistent interface X is showing all unrelated static ARP entries. PR1299619

  • After SNMP configuration activation the snmpd process started to consume a lot of CPU time. PR1300016

Platform and Infrastructure

  • Traffic drop might occur under a large-scale firewall filter configuration. PR1093275

  • The traffic might not be transmitted correctly from MPC/FPC in rare condition. PR1170527

  • FPC crashes with the MAC accounting feature enabled. PR1173530

  • The "forwarding-class-accounting enhanced" feature is not supported in combination with "forwarding-options hyper-mode". Using both features together results in traffic being silently discarded or dropped. PR1198021

  • Packet Process Engine UCODE rebalancing getting enabled by default. PR1207532

  • With a commit script configured, the mgd process might crash when configure anything in private configuration mode. PR1244015

  • The RPM loss percentage values for "over all tests" via SNMP might be incorrect. PR1272566

  • EVPN-VXLAN traffic gets dropped as Incorrect vxlan fw path executed due to a sampling configuration on the core interface. PR1280539

  • The request routing-engine login other-routing-engine command might require password. PR1283430

  • The traffic might be classified into the wrong queue when aggregated Ethernet interfaces with child legs are anchored on an MQ-based MPC without a queuing chip. PR1284264

  • The dexp process might crash after committing set system commit delta-export. PR1284788

  • Administratively disabling an interface might cause high FPC CPU usage. PR1285673

  • Transit traffic that has the second LSB set in the first octet of destination MAC will be punted to the Routing Engine when mac-learn-enable is configured. PR1285874

  • Generate-event time-interval usage now triggers the event only on the actual expiry of the time internal. PR1286803

  • Incorrect load-balancing on the aggregated Ethernet interface might occur if traffic goes from MS-DPC to MPC in enhanced-ip mode. PR1287086

  • Packet Forwarding Engine heap memory leak is found in three routers with PPPoE subscribers. PR1287870

  • mgd: error: Couldn't open library: /usr/lib/render/libvccpd-render.tlv. PR1289158

  • Syslog error appears: not a proper library: /usr/lib/render/libdcd-render.so: Cannot open "/usr/lib/render/libdcd-render.so". PR1289974

  • The source MAC learned from Packet Forwarding Engines across ae interface might bounce between ae member Packet Forwarding Engines for a long time and might cause MLP-ADD storm. PR1290516

  • Dynamic MAC learning might fail on GRE tunnel interface. PR1291015

  • RMOPD might get stuck at sbwait upon receiving a specific response from the HTTP agent. PR1292151

  • Transient flow control asserted by XLP MAC after upgrading the MX Series router to Junos OS Release 16.1.PR1293232

  • The scale-subscriber license might leak on the backup Routing Engine during bulk subscriber logout. PR1294104

  • The mgd process generates a core file after GRES in a subscriber environment. PR1298205

  • RMOPD_HW_TIMESTAMP_INVALID is reported two to four times a day which raises an alarm when polled via jnxRpmResSumPercentLost MIB. PR1300049

  • MPC might reset in firewall filter scenario during loading configuration on MX Series platform. PR1300990

  • All traffic can be Tail/RED-dropped on some interfaces when chassis fpc max-queues is configured. PR1301717

  • Classifier does not get applied on the aggregated Ethernet member links on DPC (I-chip) based platforms with CoS configured. PR1301723

  • MX Series FPC wedges when creating more than 4000 logical tunnel interfaces per Packet Forwarding Engine. PR1302075

  • When you execute the mk destroy-all command, it gives the error Could not find jnx.wrlsb.mk. PR1302974

  • The interface-mac-limit might fail for aggregated Ethernet interface. PR1303293

  • The Two-Way Active Measurement Protocol (TWAMP) Request-TW-Session message's Type-P Descriptor format is not RFC-compliant. PR1305752

  • On MX Series routers with MPCs or MICs, the resource monitor (RSMON) thread might be stuck in a loop consuming 100 percent of FPC CPU. PR1305994

Routing Protocols

  • No multicast forwarding in ASM mode occurs after unified ISSU. PR1146621

  • RLFA computation might still consider a PQ-node not reachable via LDP, when LDP is deactivated. PR1202392

  • The routing protocol process (rpd) on the backup Routing Engine might restart unexpectedly upon the addition of a new L2VPN routing instance. PR1233514

  • When the advertise-from-main-vpn-tables configuration statement is used under BGP and the route reflector functionality is added, a refresh message is not sent, resulting in some missing routes. PR1254066

  • MPLS over UDP tunnel creation fails in the absence of a VRF table. PR1270955

  • A few BFD sessions are flapping while coming up after FPC restart/reboot. PR1274941

  • Error messages might be seen when receiving BGP update messages with UNREACH NLRI. PR1276758

  • After Routing Engine switchover (GRES+GR), default mdt failed to come up and core-facing interface flap was seen. PR1279459

  • BGP updates might not be advertised to peers completely in certain condition. PR1282531

  • The rpd process might crash due to a certain chain of events in a BGP-LU protection scenario. PR1282672

  • The second multicast packet might be discarded on the rendezvous point router. PR1282848

  • The rpd process might crash while deactivating the routing instance of pim static. PR1284760

  • Some BGP-related traceoptions flag settings will not be effective immediately after the configuration commit, until the BGP sessions are flapped. PR1285890

  • The rpd will run into a loop if bootstrap messages exceed the interface MTU size. PR1287467

  • The rpd might crash if the dynamic rendezvous point goes down in ECMP topology and also PIM join-load-balance automatic is configured. PR1288316

  • The rpd might crash after loading merge and rollbacking configuration with BGP traceoption. PR1288558

  • Multicast flow reset might occur on OIF for RPT joined branch when PIM prune comes on another interface. PR1293900

  • The rpd might crash if BGP flap happens. PR1295062

  • ISSU might take more time to complete and the MPC card might go offline during ISSU reboot. PR1298259

  • Inline BFD on IRB will be broken after GRES/NSR switchover, and the anchor FPC subsequent goes offline. PR1298369

  • BGP might send an incorrect AS path when the alias is enabled and multiple peers are under the BGP group. PR1300333

  • The rpd process might crash with a core file while deleting a multipath route. PR1302395

  • Junos OS Release 16.2 and later releases might give the following error: Request failed: OID not increasing: ospfIfIpAddress.0.0.0.0.0. PR1307753

  • Qualified next-hop resolution fails in some scenarios when there is a next-hop interface specified. PR1308800

  • BGP labeled-unicast protection might break multicast Reverse Path Forwarding (RPF). PR1310036

  • An rpd core file is observed while importing IS-IS routes. PR1312325

  • BGP prefixes with three levels of recursion for resolution will get stuck with a stale next-hop at the first level after a link-down event. PR1314882

Services Applications

  • Business service fails to get deactivated after Routing Engine switchover. PR1280074

  • Backup Routing Engine goes to the database prompt with a vmcore if the configuration for the ASI interface that has gone down is deleted. PR1281882

  • TLVs in ICRQ for actual-rate-downstream/actual-data-rate-upstream do not reflect PPPoE-IA value. PR1286583

  • mspmand cored "@_arena_mALLOc" seen in Backup SDG's MS70. PR1291664

  • L2TP subscribers are down after a GRES while verifying framed IPv6 route support for L2TP network server (LNS) at a higher scale with a maximum number of framed IPv6 routes. PR1293783

  • Each subscriber session gets its own L2TP tunnel without "Tunnel-Client-Endpoint" from RADIUS. PR1293927

  • The jl2tpd process might crash shortly after a GRES switchover. PR1295248

  • [OC/ST] Continuous generation of *jl2tpd_era_lns* log files occurs even though l2tp is not configured. PR1302270

Software Installation and Upgrade

  • Junos Selective Upgrade (JSU) package is not activated after a reboot. PR1298935

Subscriber Access Management

  • The DHCP subscriber might not get an IP address if the address pool utilization is tight. PR1274870

  • Some RADIUS attributes might not be filtered out of the accounting-on/accounting-off message on an MX Series. platform. PR1279533

  • IP assigned by RADIUS is incorrectly counted by the local pool after a Virtual Chassis switchover. PR1286609

  • The authd process generates a core file at DynamicRequestEntry::addHistory authd_aaa_dyn_req. PR1289215

  • Service interim for DHCP subscriber is not working in JSRC scenario. PR1303553

  • The show network-access aaa accounting command might display additional entries. PR1304594

  • Incorrect Acct-Delay-Time in Radius Accounting-On message is seen after rebooting the MX Series router acting as a BNG. PR1308966

  • The delegated prefix from RADIUS is incorrectly parsed when the prefix is fewer than 20 bytes long. PR1315557

User Interface and Configuration

  • Increasing commit times are seen. PR1029477

  • The commitd process might generate a core file when removal of certain configuration is followed by a commit operation. PR1267433

  • The commit might fail with the error of "Could not open configuration database" and "foreign file propagation (ffp) failed". PR1287539

VPNs

  • Next generation MVPN SG entry and MVPN route persist after data stop. PR1236733

  • Rpd memory leak is observed in a next generation MVPN environment. PR1259579

  • Next generation MVPN IPv6 RP bootstrap type 3 S-PMSI AD route prefix ff02::d persist after BSR data stop. PR1269234

  • L2circuits stitched via lt peer interfaces might be stuck in "LD" (local site signaled down) status. PR1305873

Documentation Updates

This section lists the errata and changes in Junos OS Release 17.4R3 documentation for MX Series.

Subscriber Management Access Network Guide

  • The guide failed to include a feature that enables you to override the information that the LAC sends to the LNS in L2TP Calling Number AVP 22 when the LAC is configured to use the Calling-Station-ID format. You can configure the access profile to override that value for AVP 22 with any combination of the agent circuit identifier and the agent remote identifier received by the LAC in the PADR packet.

    [See Override the Calling-Station-ID Format for the Calling Number AVP].

  • The guide incorrectly stated that the linked-pool-aggregation statement is located at the [edit access address-assignment pool pool-name] hierarchy level. In fact, this statement is located at the [edit access] hierarchy level.

    See Configuring Address-Assignment Pool Linking.

Subscriber Management Provisioning guide

  • The Broadband Subscriber Sessions User Guide did not report that you can suspend AAA accounting, establish a baseline of accounting statistics, and resume accounting. This feature was introduced in Junos OS Release 15.1R4.

  • Starting in Junos OS Release 15.1, the Broadband Subscriber Sessions User Guide and the CLI Explorer incorrectly included information about the show extensible-subscriber-services accounting command. This command is not present in the CLI. Instead, you can use accounting profiles to collect statistics from the Packet Forwarding Engine for Extensible Subscriber Services Manager (ESSM) subscribers. See Flat-File Accounting Overview for information about accounting for ESSM subscribers.

Subscriber Management VLANs Interfaces Guide

  • The Broadband Subscriber VLANs and Interfaces User Guide did not clearly indicate that only demux0 is supported for demux interfaces. If you configure a different demux interface, such as demux1, the configuration commit fails.

Migration, Upgrade, and Downgrade Instructions

This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for Junos OS for the MX Series. Upgrading or downgrading Junos OS might take several minutes, depending on the size and configuration of the network.

Starting in Junos OS 17.4R1 release, FreeBSD 11.x is the underlying OS for all Junos OS platforms that were previously running on FreeBSD 10.x-based Junos OS. FreeBSD 11.x does not introduce any new features or modifications but is the latest version of FreeBSD.

The following table shows detailed information about which Junos OS can be used on which products:

Platform

FreeBSD 6.x-based Junos OS

FreeBSD 11.x-based Junos OS

MX5,MX10, MX40,MX80, MX104

YES

NO

MX240, MX480, MX960,

MX2010, MX2020

NO

YES

Basic Procedure for Upgrading to Release 17.4

Note

Before upgrading, back up the file system and the currently active Junos OS configuration so that you can recover to a known, stable environment in case the upgrade is unsuccessful. Issue the following command:

The installation process rebuilds the file system and completely reinstalls Junos OS. Configuration information from the previous software installation is retained, but the contents of log files might be erased. Stored files on the routing platform, such as configuration templates and shell scripts (the only exceptions are the juniper.conf and ssh files) might be removed. To preserve the stored files, copy them to another system before upgrading or downgrading the routing platform. For more information, see the Junos OS Administration Library.

For more information about the installation process, see Installation and Upgrade Guide and Upgrading Junos OS with Upgraded FreeBSD.

Procedure to Upgrade to FreeBSD 11.x-Based Junos OS

Products impacted: MX240, MX480, MX960, MX2010, and MX2020.

To download and install FreeBSD 11.x-based Junos OS:

  1. Using a Web browser, navigate to the All Junos Platforms software download URL on the Juniper Networks webpage:

    https://www.juniper.net/support/downloads/

  2. Select the name of the Junos OS platform for the software that you want to download.
  3. Select the release number (the number of the software version that you want to download) from the Release drop-down list to the right of the Download Software page.
  4. Select the Software tab.
  5. In the Install Package section of the Software tab, select the software package for the release.
  6. Log in to the Juniper Networks authentication system using the username (generally your e-mail address) and password supplied by a Juniper Networks representative.
  7. Review and accept the End User License Agreement.
  8. Download the software to a local host.
  9. Copy the software to the routing platform or to your internal software distribution site.
  10. Install the new jinstall package on the routing platform.Note

    We recommend that you upgrade all software packages out of band using the console because in-band connections are lost during the upgrade process.

    All customers except the customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package:

    • For 32-bit Routing Engine version:

      user@host> request system software add no-validate reboot source/junos-install-mx-x86-32-17.4R3.9-signed.tgz
    • For 64-bit Routing Engine version:

      user@host> request system software add no-validate reboot source/junos-install-mx-x86-64-17.4R3.9-signed.tgz

    Customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package (Limited encryption Junos package):

    • For 32-bit Routing Engine version:

      user@host> request system software add no-validate reboot source/junos-install-mx-x86-32-17.4R3.x-limited.tgz
    • For 64-bit Routing Engine version:

      user@host> request system software add no-validate reboot source/junos-install-mx-x86-64-17.4R3.9-limited.tgz

    Replace source with one of the following values:

    • /pathname—For a software package that is installed from a local directory on the router.

    • For software packages that are downloaded and installed from a remote location:

      • ftp://hostname/pathname

      • http://hostname/pathname

      • scp://hostname/pathname

    Do not use the validate option while upgrading from Junos OS (FreeBSD 6.x) to Junos OS (FreeBSD 11.x). This is because programs in the junos-upgrade-x package are built based on FreeBSD 11.x, and Junos OS (FreeBSD 6.x) would not be able to run these programs. You must run the no-validate option. The no-validate statement disables the validation procedure and allows you to use an import policy instead.

    Use the reboot command to reboot the router after the upgrade is validated and installed. When the reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.

    Rebooting occurs only if the upgrade is successful.

Note

You need to install the Junos OS software package and host software package on the routers with the RE-MX-X6 and RE-MX-X8 Routing Engines. For upgrading the host OS on these routers with VM Host support, use the junos-vmhost-install-x.tgz image and specify the name of the regular package in the request vmhost software add command. For more information, see the VM Host Installation topic in the Installation and Upgrade Guide.

Note

After you install a Junos OS Release 17.4 jinstall package, you cannot return to the previously installed Junos OS (FreeBSD 6.x) software by issuing the request system software rollback command. Instead, you must issue the request system software add no-validate command and specify the jinstall package that corresponds to the previously installed software.

Note

Most of the existing request system commands are not supported on routers with the RE-MX-X6 and RE-MX-X8 Routing Engines. See the VM Host software administrative commands in the Installation and Upgrade Guide.

Procedure to Upgrade to FreeBSD 6.x-Based Junos OS

Products impacted: MX5, MX10, MX40, MX80, MX104.

To download and install FreeBSD 6.x-based Junos OS:

  1. Using a Web browser, navigate to the All Junos Platforms software download URL on the Juniper Networks webpage:

    https://www.juniper.net/support/downloads/

  2. Select the name of the Junos OS platform for the software that you want to download.
  3. Select the release number (the number of the software version that you want to download) from the Release drop-down list to the right of the Download Software page.
  4. Select the Software tab.
  5. In the Install Package section of the Software tab, select the software package for the release.
  6. Log in to the Juniper Networks authentication system using the username (generally your e-mail address) and password supplied by a Juniper Networks representative.
  7. Review and accept the End User License Agreement.
  8. Download the software to a local host.
  9. Copy the software to the routing platform or to your internal software distribution site.
  10. Install the new jinstall package on the routing platform.Note

    We recommend that you upgrade all software packages out of band using the console because in-band connections are lost during the upgrade process.

    • All customers except the customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package:

      user@host> request system software add validate reboot source/jinstall-ppc-17.4R3.9-signed.tgz
    • Customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package (Limited encryption Junos OS package):

      user@host> request system software add validate reboot source/jinstall-ppc-17.4R3.9-limited-signed.tgz

    Replace source with one of the following values:

    • /pathname—For a software package that is installed from a local directory on the router.

    • For software packages that are downloaded and installed from a remote location:

      • ftp://hostname/pathname

      • http://hostname/pathname

      • scp://hostname/pathname

    The validate option validates the software package against the current configuration as a prerequisite to adding the software package to ensure that the router reboots successfully. This is the default behavior when the software package being added is a different release.

    Use the reboot command to reboot the router after the upgrade is validated and installed. When the reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.

    Rebooting occurs only if the upgrade is successful.

Note

After you install a Junos OS Release 17.4 jinstall package, you cannot return to the previously installed software by issuing the request system software rollback command. Instead, you must issue the request system software add validate command and specify the jinstall package that corresponds to the previously installed software.

Upgrade and Downgrade Support Policy for Junos OS Releases

Support for upgrades and downgrades that span more than three Junos OS releases at a time is not provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the next EEOL release even though EEOL releases generally occur in increments beyond three releases.

You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 17.1, 17.2, and 17.3 are EEOL releases. You can upgrade from Junos OS Release 17.1 to Release 17.2 or from Junos OS Release 17.1 to Release 17.3. However, you cannot upgrade directly from a non-EEOL release that is more than three releases ahead or behind.

To upgrade or downgrade from a non-EEOL release to a release more than three releases before or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release to your target release.

For more information about EEOL releases and to review a list of EEOL releases, see https://www.juniper.net/support/eol/junos.html.

Upgrading a Router with Redundant Routing Engines

If the router has two Routing Engines, perform the following Junos OS installation on each Routing Engine separately to avoid disrupting network operation:

  1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine, and save the configuration change to both Routing Engines.

  2. Install the new Junos OS release on the backup Routing Engine while keeping the currently running software version on the master Routing Engine.

  3. After making sure that the new software version is running correctly on the backup Routing Engine, switch over to the backup Routing Engine to activate the new software.

  4. Install the new software on the original master Routing Engine that is now active as the backup Routing Engine.

For the detailed procedure, see the Installation and Upgrade Guide.

Downgrading from Release 17.4

To downgrade from Release 17.4 to another supported release, follow the procedure for upgrading, but replace the 17.4 jinstall package with one that corresponds to the appropriate release.

Note

You cannot downgrade more than three releases.

For more information, see the Installation and Upgrade Guide.