Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation  Back up to About Overview 

Known Behavior

This section lists known behavior for the Cloud CPE Solution Release 2.0.

  • When you use Customer Portal to activate a network service on a network link, you must configure the following settings for each VNF in the network service:
    • Hostname
    • NTP server
    • DNS name server
  • We recommend that you use the current version of the Google Chrome web browser to access Contrail Service Orchestration GUIs.
  • When a tenant object is created through Administration portal or the API, Contrail OpenStack adds a default security group for the new tenant. This default security group denies inbound traffic and you must manually update the security group in Contrail OpenStack to allow ingress traffic from different networks. Otherwise, the Junos Space Virtual Appliance may fail to discover a VNF or Contrail OpenStack may drop traffic. [CXU-1242]
  • If you do not use NAT in your network, you must set the rp_filter variable in JDM to 0 on all interfaces for NFX Series device. This action enables source routing while preventing source filtering. [CXU-1311]
  • Some data that you import in Administration Portal may not be visible in the GUI. [CXU-1580]
  • You cannot edit objects such as EMS, VIMs, or sites in Administration Portal. If you need to modify an object, you must delete it and add it again. [CXU-1756]
  • You cannot delete a VIM or an EMS independently of a POP in Administration Portal. When you delete a POP, the VIM and EMS associated with it are also deleted. [CXU-2477]
  • Administration Portal does not include logs about configuring PNEs. [CXU-2559]
  • The default action for a firewall policy rule on the NFX250 device is Deny. [CXU-2799]
  • A firewall service is always included in a service chain for a distributed deployment. You cannot remove the firewall service from an NFX250 device in Customer Portal. [CXU-2802]
  • When you inactivate an NFX250 device in Administration Portal, the endpoint of the IPSec tunnel remains on the MX Series router. [CXU-2819]

Modified: 2016-11-21