Resolved Issues
Learn about the issues fixed in this release for EX Series switches.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.
EVPN
-
Error messages are observed after performing a VLAN name change with EVPN configuration PR1806660
Forwarding and Sampling
-
The fxpc process crashes on Junos OS platforms when VLANs are deleted and configured. PR1831770
General Routing
-
A few line cards will be stuck in the 'Present' state and later go 'Offline'. PR1631579
-
When TISSU upgrade is done from Junos OS 22.4 release and later, the box come up as backup Routing Engine.PR1703229
-
The port class is not captured in cint trace output for individual ports. PR1786399
-
Master FPC taking 20 sec time to shut backup FPC's network port after backup FPC reboot in a VC set-up PR1788328
-
[EX3400] LX/FX SFP Swap leads to traffic drop. PR1794986
-
ARP won't be forwarded in VLAN associated VNI in VxLAN Fabric. PR1801237
-
The default port behaviour is not working as expected after deleting VOIP (Voice over IP) configuration on an access interface PR1802455
-
On EX4300-MP platforms in non-mixed VC mode, when the VC connection is established between the platforms, the ports don't pass traffic, which leads to minimum traffic loss.PR1805100
-
Interfaces remain down on EX4400-48F platform after replacing a 100MB SFP with 1GB SFP. PR1805370
-
When VC-mode is set to HGOE and converting port type from vc-port to network port, traffic loss is observed PR1806262
-
Hot swapping 1G SFPT optics ports are not coming up. PR1810482
-
Breakage in the CLI
show forwarding-options load-balance source-address X destination-address X source-port X destination-port X
on VMX/MX480/MX960. PR1810653 -
Persistent MAC getting stuck in the SRP state results in traffic loss in the EVPN-VxLAN scenario PR1812482
-
The output of
show chassis routing-engine
does not show the standard documented outputs after a reboot event or a GRES event. PR1812514 -
When frames above 9080 bytes are sent across interfaces with 10m/100m speed between EX4300-MP, then we start seeing traffic loss even at 6M to 8Mbps rate. PR1812891
-
Multi-rate Gigabit Ethernet (mge) port on EX4100 and EX4400 platforms does not receive or forward traffic. PR1814093
-
Wrong PSU state is updating in the mist. PR1814463
-
When power devices (PDs) are connected to all the power over ethernet (PoE) ports with LLDP enabled, the last port is not powered up. PR1814715
-
DHCP snooping issue is observed on access ports with IRB and VXLAN configuration. PR1816445
-
For Junos OS platforms, the OSPF neighborship gets stuck in EXSTART state after performing NSSU. PR1817034
-
The l2ald crash is observed when adding scaled EVPN-VXLAN configuration on Junos OS platforms. PR1817705
-
Switch port status is changed to unauthorized, when a supplicant client attempts to authenticate using 802.1X standard with EAP-TLS certificate. PR1819462
-
L2TP processing issue on EX Series and QFX Series platforms with tagged CDP VTP and UDLD frames. PR1821012
-
All Junos and Junos Evolved platforms the RAIDUS (Remote Authentication Dial-In User Service) attribute NAS-Port-Type which specifies the type of physical port that the network access server (NAS) uses to authenticate the subscriber is missing in the authentication attempt.PR1822101
-
Intermittent alarms related to fan overspeed value can be observed on EX4100 platform. PR1822363
-
MAC address learning fails when Flexible Ethernet Services Encapsulation is enabled on Junos QFX5K and EX4K platforms after a reboot. PR1822608
-
dfw ERROR is seen whenever collecting RSI. PR1823280
-
EX4400-48MXP/48XP CPU hog by thread CMQFX and task ACQUIRE_FP_LOCK during PIC offline and online. PR1823394
-
While performing a 4x25g channelization configuration on the 1x100GE PIC, certain error logs are printed multiple times. PR1823743
-
In virtual-chassis after routing-engine switchover traffic of type 5 routes of EVPN-VXLAN are not getting forwarded PR1823764
-
Restricted proxy ARP feature does not work as expected. PR1824023
-
Rebooting one linecard or FPC will cause the virtual-chassis on the EX4K and QFX5K devices to forward traffic in backup RTG interface PR1824750
-
EX4400 series: Offline and then an online of PIC 2 installed with a 1x100GE Uplink module configured for virtual-chassis link causes the link to remain down PR1826147
-
On all EX4400 platform, all time sensitive protocols are getting flapped due to process call getting stuck in System Management Bus (SMBus).PR1826615
-
Even though installed the license to both primary and secondary, alarm LED might be lit with yellow on backup. PR1827641
-
EX4400-48MP ping rapid count with high values stops when phone-home is configured. PR1828735
-
The dot1x client does not get authenticated and gets stuck in the connecting state when a new dot1x profile is assigned along with a newly created VLAN PR1830067
-
Commit error on using more than 31 characters authentication-key-chain-name. PR1830395
-
On an EX4400 device with 4x25G Uplink module configured in 1GE or 25G speed, peer side of an interface with 10GBASE-T transceiver may remain up even when the IFD(xe-x/2/y) is not created. PR1831409
-
On Junos EX platforms, the PFE's (Packet Forwarding Engine) handling of NEWSYSLOGD signals during UKERN file archiving is inefficient, leading to repeated memory allocations and subsequent memory leaks.PR1831813
-
On Junos EX4100 and EX4400 platforms, switch core dump when user commits a command to ignore a "power entry module" alarm. PR1833698
-
On EX Series platforms with AP45 connected to MGE interfaces, the interfaces are not working after upgrading to 23.4 R2-S2.1. PR1836616
-
On Junos EX4100, EX4400, EX4650 and QFX5120 platforms, in an Ethernet VPN Virtual Extensible LAN (EVPN-VXLAN) setup, when GBP (Group Based Policy) is configured with 'ingress-enforcement' a delay is observed in GBP installation after device reboot or link with ESI (Ethernet Segment Identifier) flaps. This leads to traffic disruption until the policy is installed.PR1839916
-
PFE process crash is observed when web-management is not configured in a CWA setup. PR1840988
-
On Junos EX4400-48F platform, specific to the EX4400-48F (ports 0-35) SKU, not applicable to any other SKU (Stock Keeping Unit) , where SFP-100BASE-BX10 optics are used between two EX4400-48F ports, traffic blockage occurs. The link comes up, but no traffic (e.g., ping) passes through.PR1843585
-
On EX4100 platforms,When deactivating/activating IRB interfaces on vlans with vni enabled, error message will be observed.PR1846286
-
On Junos platforms, specifically on EX and QFX series aggregated interfaces configured without address-family results in reachability issues.PR1847159
-
Since 1G is also a default speed for 10G uplink modules after the mix speed mode commit, this change was needed.PR1848338
-
In EX4100-H-12MP/EX4100-H-24MP: PoE ports will go down when below operations are performed 1. PSU removal with any PSU (AC or DC) combination from slot 0 or 2. Insert only PSU (AC/DC) in slot 1 and slot 0 to be emptyPR1855409
-
On Junos OS EX4000 and QFX5120 platforms, the system fails to retrieve the necessary analyzer details. This prevents the port mirroring action from being applied in the filter entry. Consequently, the system defaults to the reject action, causing the traffic to be dropped, and packet captures do not appear.PR1856361
J-Web
-
Reload or refresh the Jweb page showing the "Empty reply from server" error. PR1832731
Layer 2 Ethernet Services
-
Switch provisioned via ZTP going unreachable due to DHCP misbehaviour on upgrading to Junos OS Release 21.4R3-S6. PR1808289
-
DHCP relay option "allow-server-change" does not work as expected in trusted server group PR1833148
-
Unable to assign an IP address on management interface with DHCP configuration even if DHCP is bound after a power cycle. PR1854827
Platform and Infrastructure
-
RADIUS protocol susceptible to forgery attacks (Blast-RADIUS) (CVE-2024-3596). PR1802329
-
Console login fails when authentication-order is configured under 'system services' hierarchy on all Junos OS platforms PR1826666
-
An Authentication Bypass by Spoofing vulnerability in the RADIUS protocol of cRPD platforms allows an on-path attacker between a RADIUS server and a RADIUS client to bypass authentication when RADIUS authentication is in use. Refer to JSA88210 for more information.PR1826678
-
[EX4000] user root is shown as incorrect after powercycle of the device. PR1855393
Routing Protocols
-
Multiple vulnerabilities resolved in OpenSSL (CVE-2024-4741, CVE-2024-2511). PR1815253
Subscriber Access Management
-
authd process crashes when radius-server-name is configured. PR1818321
User Interface and Configuration
-
The mgd process crashes while using an FQDN in conjunction with the ephemeral configuration database. PR1825728