Junos Release Notes 20.2R3
Junos Release Notes 20.2R3
Junos Release Notes 20.2R3
Notes Published
2022-07-29
®
Junos OS 20.2R3 Release Notes
SUPPORTED ON
• ACX Series, cSRX, EX Series, JRR Series, fusion for enterprise, fusion for provider edge,
MX Series, NFX Series, PTX Series, QFX Series, SRX Series, vMX, vRR, and vSRX.
1
®
Release Notes: Junos OS Release 20.2R3 for
the ACX Series, cSRX, EX Series, JRR Series,
Junos Fusion, MX Series, NFX Series, PTX
Series, QFX Series, SRX Series, vMX, vRR, and
vSRX
29 July 2022
Contents Introduction | 12
What's New | 13
What's Changed | 22
Known Limitations | 27
General Routing | 28
Open Issues | 32
General Routing | 32
Virtual Chassis | 35
2
Resolved Issues | 35
Documentation Updates | 41
What’s New | 44
What's Changed | 44
Known Limitations | 45
Open Issues | 45
Resolved Issues | 45
What's New | 46
What's Changed | 55
Known Limitations | 59
EVPN | 59
General Routing | 59
Infrastructure | 59
Open Issues | 60
General Routing | 61
Infrastructure | 62
Layer 2 Features | 63
Routing Protocols | 64
Resolved Issues | 64
Documentation Updates | 71
What's New | 74
What's Changed | 75
Known Limitations | 75
Open Issues | 75
Resolved Issues | 76
Documentation Updates | 77
What’s New | 80
What's Changed | 80
Known Limitations | 81
4
Open Issues | 81
Resolved Issues | 82
Documentation Updates | 83
Downgrading Junos OS | 88
What's New | 89
What's Changed | 91
Known Limitations | 91
Open Issues | 92
Resolved Issues | 92
Documentation Updates | 93
Infrastructure | 140
MPLS | 140
EVPN | 142
Infrastructure | 147
MPLS | 148
VPNs | 151
Interfaces | 200
MPLS | 219
Infrastructure | 223
MPLS | 223
EVPN | 268
Infrastructure | 268
J-Web | 321
VPNs | 321
J-Web | 323
VPNs | 323
Upgrade and Downgrade Support Policy for Junos OS Releases and Extended End-Of-Life
Releases | 334
Licensing | 338
J-Web | 345
J-Web | 346
Licensing | 355
Introduction
®
Junos OS runs on the following Juniper Networks hardware: ACX Series, cSRX, EX Series, JRR Series,
Junos fusion for enterprise, Junos Fusion for provider edge, MX Series, NFX Series, PTX Series, QFX Series,
SRX Series, vMX, vRR, and vSRX.
These release notes accompany Junos OS Release 20.2R3 for the ACX Series, cSRX, EX Series, JRR Series,
Junos fusion for enterprise, Junos fusion for provider edge, MX Series, NFX Series, PTX Series, QFX Series,
SRX Series, vMX, vRR, and vSRX. They describe new and changed features, limitations, and known and
resolved problems in the hardware and software.
• In Focus guide—We have a document called In Focus that provides details on the most important features
for the release in one place. We hope this document will quickly get you to the latest information about
Junos OS features. Let us know if you find this information useful by sending an e-mail to
[email protected].
• Important Information:
IN THIS SECTION
What's New | 13
What's Changed | 22
Known Limitations | 27
Open Issues | 32
Resolved Issues | 35
13
Documentation Updates | 41
These release notes accompany Junos OS Release 20.2R3 for the ACX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What's New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for ACX Series
routers.
There are no new features or enhancements to existing features for ACX Series routers in Junos OS Release
20.2R3.
There are no new features or enhancements to existing features for ACX Series routers in Junos OS Release
20.2R2.
14
Hardware
• New ACX710 Universal Metro Routers (ACX Series)—In Junos OS Release 20.2R1, we introduce the
ACX710 router. The ACX710 is a compact 1-U router that provides system throughput of up to 320
Gbps through the following port configurations:
• Twenty-four 10GbE or 1GbE ports (ports 0 through 23) that operate at 10-Gbps speed when you use
small form-factor pluggable plus (SFP+) transceivers or at 1-Gbps speed when you use small form-factor
pluggable (SFP) optics. Ports 0 through 15 also support 1000 Mbps speeds when you use tri-rate SFP
optics. Ports 16 through 23 support 100 Mbps and 1000 Mbps speeds when you use tri-rate SFP
optics.
• Four 100GbE ports (ports 0 through 3) that support quad small form-factor pluggable 28 (QSFP28)
transceivers. You can channelize these ports into four 25-Gbps interfaces using breakout cables and
channelization configuration. These ports also support 40-Gbps speed when you use quad small
form-factor pluggable plus (QSFP+) optics. You can channelize these 40-Gbps ports into four 10-Gbps
interfaces using breakout cables and channelization configuration. [See Channelize Interfaces on
ACX710 Routers.]
The ACX710 router is a DC-powered device that is cooled using a fan tray with five high-performance
fans to cool the chassis.
To install the ACX710 router hardware and perform initial software configuration, routine maintenance,
and troubleshooting, see the ACX710 Universal Metro Router Hardware Guide.
Table 1 on page 14 summarizes the ACX710 features supported in Junos OS Release 20.2R1.
Feature Description
Class of service (CoS) • Standard CoS feature support, including configuring classification,
rewrite, shaping, buffering, and scheduling parameters for traffic
management. [See CoS on ACX Series Routers Features Overview.]
DHCP • DHCP server, DHCP client, and DHCP relay configuration for IPv4
and IPv6 services. [See Understanding DHCP Client Operation on ACX
Series.]
Feature Description
Firewalls and policers • Configure firewall filters on packets (families such as bridge domain,
IPv4, IPv6, CCC, and MPLS) based on packet match conditions. Along
with the match conditions, actions such as count, discard, log, syslog,
policer are performed on the packets that match the filter. You can
configure policers and attach them to a firewall term. [See Standard
Firewall Filter Match Conditions and Actions on ACX Series Routers
Overview.]
High availability (HA) and resiliency • VRRP protocol support with Broadcom’s DNX chipset. [See
Understanding VRRP Overview.]
• Configure alarm input and output, manage FRUs, and monitor
environment. The router also supports field-replaceable unit (FRU)
management and environmental monitoring. [See alarm-port.]
• Platform resiliency to handle failures and faults of the components
such as fan trays, temperature sensors, and power supplies. The router
also supports firmware upgrade for FPGA and U-boot. [See show
chassis alarms and show system firmware.]
Layer 2 features • Layer 2 support: bridging, bridge domain with no vlan-id, with vlan-id
none, or with single vlan-id, single learning domain support,.Q-in-Q
service for bridging, MAC limit feature support, no local switching
support for bridge domain, and E-LINE from a bridge with no MAC
learning. [See Layer 2 Bridge Domains on ACX Series Overview.]
• Layer 2 support for bridge interfaces for vlan-map push operation,
swap operation, pop operation, and swap-swap operation. [See Layer
2 Bridging Interfaces Overview.]
• Layer 2 support for control protocols (L2CP): RSTP, MSTP, LLDP,
BPDU guard/protection, loop protection, root protection, Layer 2
protocol tunneling, storm control, IRB interface, LAG support with
corresponding hashing algorithm, E-LINE, E-LAN, E-ACCESS, and
E-Transit service over L2/Bridge with the following AC interface types:
Port, VLAN, Q-in-Q, VLAN range and VLAN list. [See Layer 2 Control
Protocols on ACX Series Routers.]
• Layer 2 circuit cross-connect (L2CCC) support for Layer 2 switching
cross-connects. You can leverage the hardware support available for
cross-connects on the ACX710 device with the Layer 2 local switching
functionality using certain models. With this support, you can provide
the EVP and EVPL services. [See Configuring MPLS for Switching
Cross-Connects.]
• Reflector function support in RFC 2544. [See RFC 2544-Based
Benchmarking Tests Overview.]
16
Feature Description
Layer 3 features • Layer 3 VPN and Layer 3 IPv6 VPN Provider Edge router (6VPE)
support over MPLS. The router uses MPLS as a transport mechanism
with support for label-switching router (LSR), label edge routers (LERs),
and pseudowire services. These protocols are also supported: ECMP,
OSPF, IS-IS, and BGP. [See Understanding Layer 3 VPNs.]
• Basic Layer 3 services over segment routing infrastructure. The
segment routing features supported are: segment routing with OSPF
through MPLS, segment routing with IS-IS through MPLS, segment
routing traffic engineering (SR-TE), segment routing global block (SRGB)
range label used by source packet routing in networking (SPRING),
anycast segment identifiers (SIDs) and prefix SIDs in SPRING, and
segment routing with topology independent (TI)-loop-free alternate
(LFA) provides fast reroute (FRR) backup paths corresponding to the
post-convergence path for a given failure. [See Segment Routing LSP
Configuration.]
• Enhanced timing and synchronization support using Synchronous
Ethernet with ESMC and BITS-Out. [See Synchronous Ethernet
Overview and synchronization (ACX Series).]
• Supports full-mesh VPLS domain deployment. The router supports
interworking of both BGP as well as LDP-based VPLS. BGP can be
used only for auto-discovery of the VPLS PEs, while LDP signaling for
VPLS connectivity. [See Introduction to VPLS.]
MPLS • Supports the Path Computation Element Protocol (PCEP). You can
configure the PCEP implementation for both RSVP-TE and segment
routing label-switched paths (LSPs). [See PCEP Configuration.]
• Support for MPLS fast reroute (FRR) and unicast reverse-path
forwarding (uRPF). [See fast-reroute (Protocols MPLS) and Guidelines
for Configuring Unicast RPF on ACX Series Routers.]
• Provides MPLS ping and traceroute support. [See MPLS Connectivity
Verification and Troubleshooting Methods.]
Multicast • Multicast support for IPv4 and IPv6 PIM-SM, SSM, IGMP snooping
and proxy support, IGMP, IGMPv1/v2/v3 snooping, IGMP snooping
support for LAG, global multicast support, MLD, and multicast support
on IRB. [See Multicast Overview.]
17
Feature Description
Network management and monitoring • TWAMP support. [See Two-Way Active Measurement Protocol on
ACX Series.]
• NETCONF sessions over TLS. [See NETCONF Sessions over Transport
Layer Security (TLS).]
• Support for adding custom YANG data models to the Junos OS schema
[See Understanding the Management of Non-Native YANG Modules
on Devices Running Junos OS.]
• Secure boot support in U-boot phase to authenticate and verify the
loaded software image while also preventing software-based attack.
[See Software Installation and Upgrade Guide.]
System management • Zero-touch provisioning (ZTP) can automate the provisioning of the
device configuration and software image. [See Software Installation
and Upgrade Guide.]
18
Feature Description
To view the hardware compatibility matrix for optical interfaces, transceivers, and DACs supported across all platforms,
see the Hardware Compatibility Tool.
To enable LDAPS support, you can configure the ldaps-server option at the [edit system
authentication-order] hierarchy level. LDAPS ensures the secure transmission of data between a client
and a server with better privacy, confidentiality, data integrity and higher scalability.
EVPN
• Noncolored SR-TE LSPs with EVPN-MPLS (ACX5448, EX9200, MX Series, and vMX)—Starting in Junos
OS Release 20.2R1, ACX5448, EX9200, MX Series, and vMX routers support noncolored static segment
routing-traffic engineered (SR-TE) label-switched paths (LSPs) with an EVPN-MPLS core network and
the following Layer 2 services running at the edges of the network:
• E-LAN
• EVPN-ETREE
Without color, all LSPs resolve using a BGP next hop only.
The Juniper Networks routers support noncolored SR-TE LSPs in an EVPN-MPLS core network with
the following configurations:
The Juniper Networks routers also support noncolored SR-TE LSPs when functioning as a Data Center
Interconnect (DCI) device that handles EVPN Type 5 routes.
• Ports 0 through 23 on PIC 0 support 1-Gbps speed (with SFP transceivers) and 10-Gbps speed (with
SFP+ transceivers).
• Ports 0 through 3 on PIC 1 support the default 100-Gbps speed (with QSFP28 transceivers) or the
configured 40-Gbps speed (with QSFP+ transceivers). You can use the set chassis fpc slot-number pic
pic-number port port-number speed speed CLI command and breakout cables to channelize each:
• Ethernet OAM and BFD support (ACX710)—Starting in Junos OS Release 20.2R1, the ACX710 routers
support IEEE 802.3ah standard for Operation, Administration, and Maintenance (OAM) connectivity
fault management (CFM), BFD, and the ITU-T Y.1731 standard for Ethernet service OAM.
• Alarm port configuration, FRU management, and environmental monitoring (ACX710)—Starting in Junos
OS Release 20.2R1, you can configure the alarm port on the ACX710 router. You can use the alarm
input to connect the router to external alarm sources such as security sensors so that the router receives
alarms from these sources and displays those alarms. You can use the alarm output to connect the router
to an external alarm device that gives audible or visual alarm signals based on the configuration. You
can configure three alarm inputs and one alarm output by using the alarm-port statement at the [edit
chassis] hierarchy level. You can view the alarm port details by using the show chassis craft-interface
command.
[See alarm-port.]
MC-LAG enables a client device to form a logical LAG interface using two switches. MC-LAG provides
redundancy and load balancing between the two switches, multihoming support, and a loop-free Layer
2 network without running spanning-tree protocols (STPs).
20
• Python 3 support for JET (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS can use Python 3 to execute JET scripts. To
enable unsigned JET Python applications that support Python 3 to run on devices running Junos OS,
use the set system scripts language python3 command.
[See language (Scripts), Develop Off-Device JET Applications, and Develop On-Device JET Applications.]
[See Mapping OpenConfig Routing Policy Commands to Junos Configuration and Mapping OpenConfig
Network Instance Commands to Junos Operation.]
MPLS
• Support for MPLS ping and traceroute for segment routing (ACX Series, MX Series, and PTX
Series)—Starting in Junos OS Release 20.2R1, we extend the MPLS ping and traceroute support for all
types segment routing--traffic engineering (SR-TE) tunnels, including static segment routing tunnels,
BGP-SR-TE tunnels, and PCEP tunnels.
• FEC validation support, as defined in RFC 8287, for paths consisting of IGP segments. Target FEC
stack contains single or multiple segment ID sub-TLVs. This involves validating IPv4 IGP-Prefix Segment
and IGP-Adjacency Segment ID FEC-stack TLVs.
• BFD
[See traceroute mpls segment-routing spring-te and ping mpls segment routing spring-te.]
Multicast
• Support for IPv6 multicast using MLD (ACX5448)—Starting with Junos OS Release 20.2R1, ACX5448
routers support Multicast Listener Discovery (MLD) snooping with MLDv1 and MLDv2 for both any
source multicast and SSM. Support for MLD snooping in EVPN was introduced in Junos OS Release
19.4R2.
MLD snooping for IPv6 is used to optimize Layer 2 multicast forwarding. It works by checking the MLD
messages sent between hosts and multicast routers to identify which hosts are interested in receiving
IPv6 multicast traffic, and then forwarding the multicast streams to only those VLAN interfaces that are
connected to the interested hosts (rather than flooding the traffic to all interfaces). You can enable or
disable MLD snooping per VLAN at the [edit protocols mld-snooping vlan vlan-ID] hierarchy level. Note,
however, that you cannot use ACX Series routers to connect to a multicast source.
[See Understanding MLD Snooping, Understanding MLD, and Overview of Multicast Forwarding with
IGMP or MLD Snooping in an EVPN-MPLS Environment.]
• Python 3 support for YANG scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS uses Python 3 to execute YANG action and
translation scripts that are written in Python. Junos OS does not support using Python 2.7 to execute
YANG Python scripts as of this release.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
• Support for port mirroring (ACX5448)—Starting in Junos OS Release 20.2R1, you can use analyzers to
mirror copies of packets to a configured destination. Mirroring helps in debugging network problems
and also in defending the network against attacks. You can mirror all ingress traffic to a configured port
(or port list), using a protocol analyzer application that passes the input to mirror through a list of ports
configured through the logical interface. You configure the analyzer at the [edit forwarding-options
analyzer] hierarchy level.
• Not supported:
• Egress mirroring
• Nondefault analyzers
[See Standard Firewall Filter Match Conditions and Actions on ACX Series Routers Overview.]
SEE ALSO
What's Changed | 22
Known Limitations | 27
Open Issues | 32
Resolved Issues | 35
Documentation Updates | 41
Migration, Upgrade, and Downgrade Instructions | 42
What's Changed
IN THIS SECTION
Learn about what changed in Junos OS main and maintenance releases for ACX Series routers.
[See inet(interfaces).]
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX commit scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX commit scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX event scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX event scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the [edit system services netconf]
hierarchy level, the NETCONF server suppresses any <commit-results> XML subtree in the response
and emits only an <ok> or <rpc-error> element.
• Changes to <commit> RPC responses in RFC-compliant NETCONF sessions (ACX Series, EX Series,
MX Series, PTX Series, QFX Series, and SRX Series)—When you configure the rfc-compliant statement
at the edit system services netconf hierarchy level, the NETCONF server's response for <commit>
operations includes the following changes:
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the edit system services netconf hierarchy
level, the NETCONF server suppresses any <commit-results> XML subtree in the response and only
emits an <ok> or <rpc-error> element.
[See export-format.]
General Routing
• IPv6 address in the prefix TIEs displayed correctly—The IPv6 address in the prefix TIEs are displayed
correctly in the show rift tie output.
• Loading of the default configurations in a RIFT package causes the following changes:
1. Output of the show rift node status command displays the node ID in hexadecimal number even
though the node ID is configured in decimal, hexadecimal, or octal number.
2. Some of the DDoS default configurations change because of the DDoS protection interferes with the
RIFT BFD operation.
Routing Protocols
• Advertising 32 secondary loopback addresses to traffic engineering database as prefixes (ACX Series,
EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—We've made changes to export multiple
loopback addresses to the lsdist.0 and lsdist.1 routing tables as prefixes. This eliminates the issue of
advertising secondary loopback addresses as router IDs instead of prefixes. In earlier releases, multiple
secondary loopback addresses in the traffic engineering database were added to the lsdist.0 and lsdist.1
routing tables as part of node characteristics and advertised them as the router ID.
General Routing
• Support for full inheritance paths of configuration groups to be built into the database by default (ACX
Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—Starting with Junos OS Release
20.2R1, the persist-groups-inheritance option at the [edit system commit] hierarchy level is enabled by
default. To disable this option, use no-persist-groups-inheritance.
• New major alarms (ACX-710) —We have introduced the following major alarms:
• PTP No Foreign Master—Indicates that the external Precision Time Protocol (PTP) master is not sending
announce packets.
• PTP Sync Fail—Indicates that the PTP lock-status is not in Phase Aligned state.
• Chassis Loss of all Equipment Clock Synch References—Indicates that both the primary and secondary
SyncE references have failed and the chassis PLL is in holdover.
• Chassis Loss of Equipment Clock Synch Reference 1—Indicates that the primary SyncE reference has
failed, and no secondary SyncE reference is configured or present.
• Chassis Loss of Equipment Clock Synch Reference 2—Indicates that you have configured at least two
or more SyncE sources and the secondary SyncE source has failed.
NOTE: These alarms get cleared when the system recovers from the error condition.
• Install or activate the RIFT package to include the request rift package activate-as-top-of-fabric
option—Install or activate the RIFT package to include the request rift package activate-as-top-of-fabric
option. This option is same as the activate option but it adds additional configuration to act as a
top-of-fabric node.
[See Develop Off-Device JET Applications and Develop On-Device JET Applications.]
• Updates to IDL for RIB service API bandwidth field (ACX Series, EX Series, MX Series, PTX Series, QFX
Series, and SRX Series)—The IDL for the RouteGateway RIB service API has been updated to document
additional rules for the bandwidth field. You must set bandwidth only if a next hop has more than one
gateway, and if you set it for one gateway on a next hop, you must set it for all gateways. If you set
bandwidth when there is only a single usable gateway, it is ignored. If you set bandwidth for one or
more gateways but not all gateways on a next hop, you see the error code
BANDWIDTH_USAGE_INVALID.
27
• Set the trace log to only show error messages (ACX Series, EX Series, MX Series, PTX Series, QFX
Series, SRX Series)—You can set the verbosity of the trace log to only show error messages using the
error option at the edit system services extension-service traceoptions level hierarchy.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
SEE ALSO
What's New | 13
Known Limitations | 27
Open Issues | 32
Resolved Issues | 35
Documentation Updates | 41
Migration, Upgrade, and Downgrade Instructions | 42
Known Limitations
IN THIS SECTION
General Routing | 28
Learn about known limitations in this release for ACX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
28
General Routing
• If Layer 2 VPN sessions have the OAM control-channel option set to router-alert-label, the
no-control-word option in the Layer 2 VPN should not be used for BFD sessions to come up. PR1432854
• In case of Dot1P, CFI rewrite based on TC or DP classification is not possible on the ACX5448 and
ACX710 routers. As a workaround to preserve or control the incoming packet CFI bit at egress side
(rewrite), configure 802.1ad, which has the control over the CFI rewrite as well. PR1435966
• The time consumed on 1-Gigabit performance is not equal to that on 10-Gigabit performance.
Compensation is done to bring the mean value under class A but the peak-to-peak variations are high
and can go beyond 100 ns. It has a latency variation with peak-to-peak variations of around 125–250
ns without any traffic (for example, 5–10 percent of the mean latency introduced by each phy which is
of around 2.5us). PR1437175
• With an asymmetric network connection, EX: 10G MACsec port connected to a 10-Gigabit Ethernet
channelized port, high and asymmetric T1 and T4 time errors introduce a high two-way time error. This
introduces different CF updates in forward and reverse paths. PR1440140
• With the MACsec feature enabled and introduction of traffic, the peak-to-peak value varies with the
percentage of traffic introduced. Find the maximum and mean values of the time errors with different
traffic rates (for example, two router scenario). The maximum value can jump as high as 1054 ns with
95 percent traffic, 640 ns with 90 percent traffic, and 137 ns with no traffic. PR1441388
• On the ACX710 router, a variable amount of time is taken to reflect the TWAMP packets. Because of
this, the packet latency is not uniform. PR1477329
• On the ACX710 router, as per current design and BCOM input, load balancing does not work on any
packet which is injected from host path. PR1477797
• On the ACX710 router, OSPF neighbors are not learned via VPLS connections because the vlan-tags
outer vlan-id1 inner vlan-id2 statement is not supported in VPLS routing instance. PR1477957
• On the ACX710 router, sequential increment of both SRC and DST MAC do not provide better load
balance as per HASH result. PR1477964
• On the ACX710 router, load balancing does not happen based on inner IP address when MPLS labelled
traffic is received on NNI interface. PR1478945
• On the ACX710 router, for TCP protocol as well as for non-TCP protocol, loss-priority medium-low is
not supported. PR1479164
• For ethernet-vpls encapsulation, if both DST IP and SRC IP are identically varied at the same octet, then
hashing might not happen and leads to undefined behavior in load balancing on the ACX710 router.
PR1479767
• For bridge LB with vlan-bridge encapsulation, if both SRC IP and DST IP are incremented or decremented
by the same order (such as DIP = 10.1.1.1 (increment by 1 up to 100) and SIP = 20.2.3.1 (increment by
1 upto 100), then hashing does not happen on the ACX710 router. PR1479986
29
• For vlan-ccc encapsulation, if both SRC IP and DST IP are incremented or decremented by the same
order (such as DIP = 10.1.1.1 (increment by 1 upto 100) and SIP = 20.2.3.1 (increment by 1 upto 100),
then hashing does not happen on the ACX710 router. PR1480228
• On the ACX710 router, the input packet statistics for the show interfaces command represents the
input packets at the MAC. The error packets which get dropped by MAC and that do not reach PHY will
not be accounted. PR1480413
• The accounting-profile statement is not supported on any of the ACX platforms. Therefore, the cli
configuration for accounting-profile is hidden. PR1480546
• On ACX710 routers, temperature threshold of fire shutdown and high fan speed are same. PR1481248
• MRU field is not shown in the show interface output command, The behavior is same across all the ACX
platforms. Configuration commit does not show any error as no platform checks exist at that CLI level.
PR1481585
• Fragmentation or reassembly is not supported on ACX710 platforms due to the lack of hardware support.
PR1481867
• On ACX5448 and ACX710 routers, each traffic stream is measured independently per port. Storm control
is initiated only if one of the streams exceeds the storm control level. For example, if you set a storm
control level of 100 Megabits and the broadcast and unknown unicast streams on the port are each
flowing at 80 Mbps, storm control is not triggered. PR1482005
• System lands in loader prompt when power cycle is done with faulty USB plugged in. PR1482658
• VLAN MAP operations for VPLS/L2circuit/EVPN will support only with TPID 8100. PR1483023
• On the ACX710 router, RFC2544 reports high latency and throughput loss when the packet size is 64
bytes at 100 percent line rate on the ASIC. The ASIC has low threshold value due to which packets are
moved to DRAM from SRAM. When packets are moved to DRAM, high latency and packet drop are
observed. PR1483370
• On the Packet Forwarding Engine shell, diagnostics are displayed for 100 G DAC cable under show
diagnostics info command. This is because the DAC cable has its diags page populated which is all zeroes.
The diagnostics under CLI are displayed correctly as N/A. PR1483416
• ACX710 supports the maximum term/match up to 4000 ingress and 3000 egress entries. Scaling is
unidimensional between ingress and egress as TCAM banks are shared. PR1483560
• On the ACX710 router, VRRP over aggregated Ethernet interface is not supported. PR1483594
• On the ACX710 router, traffic loss is seen for segment routing, if protection (FRR) is enabled for 128
IPv6 prefix route. PR1484234
• Counters for PCS bit errors are not supported because of hardware limitations. Hence "Bit errors" and
"Errored blocks" are not supported on an ACX710. PR1484766
• If any queue is configured with high priority, it is expected that accuracy of traffic distribution might
vary for normal queues because of chip limitation. PR1485405
30
• Tagged LACP packets are not terminated by the device but flooded in the bridge domain. This is because
tagged LACP packets are considered data packets as LACP is supposed to be untagged. PR1486274
• For Layer 3 VPN configuration, sequential increment of both SRC IP and DST IP address would not
provide better load balance as per hash result on the ACX710 router. PR1486406
• On the ACX710 router, double tagged interfaces implicit normalization to VLAN ID none is not supported.
PR1486515
• On the ACX710 router, double tagged interfaces implicit normalization to VLAN ID none, ingress VLAN
map operation, and pop-pop are not supported. PR1486520
• On the ACX710 router, packet priority at egress is derived from the internal priority. This internal priority
is derived from the outer VLAN priority at ingress. Thus, the exiting packet retains the same priority as
the ingress outer VLAN priority. PR1486571
• When you add or delete a configuration or a LAG member link flaps, configuration updates happen for
all other members of the LAG too. This results in transient traffic drop on the ACX710 devices. PR1486997
• On the ACX710 router, double tagged ELMI and LLDP PDUs are dropped when L2PT is enabled for
these protocols on the ingress interface. These PDUs are supposed to be untagged/native VLAN tagged
and hence the drop. PR1487931
• On the ACX710 router, VLAN map operations like swap/swap does not work because the vlan-tags
outer vlan-id1 inner vlan-id2 statement is not supported in VPLS routing instance. PR1488084
• On the ACX710 router, whenever the 100-Gigabit Ethernet interface is disabled, the alarm is not shown
in the jnxDomMib jnxDomCurrentLaneWarnings and jnxDomCurrentLaneAlarms. PR1489940
• On the ACX710 router, in case of Layer 2 circuit, load balancing does not occur based on inner MAC
address when MPLS labelled traffic is received on an NNI interface. PR1490441
• EVPN-VPWS, L3VPN, and L2VPN FRR convergence time with aggregated Ethernet as the Active core
interface is not meeting <50 ms and might be 100 ms to 150 ms. PR1492730
• On the ACX710 router, unable to scale 1000 CFM sessions at 3 ms intervals; an error message is observed.
PR1495753
• On ACX5448 routers, aggregated Ethernet LACP toggles with host path traffic with MAC rewrite
configuration enabled. PR1495768
• The traceroute mpls ldp command does not work in case explicit-null is configured. It does not affect
data path traffic. PR1498339
• On the ACX710 router, the convergence time for the traffic to switch over from the primary to the
secondary link during link flap could be expected to be around 60 to 200 ms with the basic link aggregation
configuration. PR1499965
• The MAC learning rate in ACX710 is measured as 2621 entries per second in software when there is
no intervention of polling the MAC table entry from CLI periodically. When there is periodic polling in
retrieving the MAC table entries through show command output CLI command or through script, during
MAC learning in progress, the number of MAC entries learnt is around 1730 per second. Because this
31
will take the CPU time and have an impact in the number of MAC learnt entries in software table.
PR1500523
• On ACX710 routers, the PTP clock recovery is re-started when the clksyncd process is restared. This
results in the PTP lock state moving to freerun on the clksyncd process restart. PR1502162
• On the ACX710 router, not able to scale BFD to 1024 sessions with IPv4 and IPv6. PR1502170
• On the ACX710 router, GPS satellites do not track intermittently with GPS-only constellation. PR1505325
• On ACX710 routers, PTP does not work with vlan-map operations. PR1507809
• On ACX710 routers, unexpected delay counter values are seen in the output for show ptp statistics
detail when upstream master stops sending the PTP packets. PR1508031
• On ACX710 routers, if the ukern is restarted with the chassis-control restart command, the state of the
PTP lock status on the Routing Engine will transition among holdover/acquiring/phase locked. The clock
data is displayed accordingly. Once the Packet Forwarding Engine is up and running after restart, clock
data is stable and correct. During the time the Packet Forwarding Engine is not up, the clock display is
inconsistent but eventually it becomes valid once the Packet Forwarding Engine is up and the clock is
created and announce packets are being generated. PR1508385
• Whenever we switch from one server to other server, HOLD-OVER-IN state expected for sometime
with current implementation until it switches to other server(using warm reset API provided). This state
cannot be avoided and it does not impact any functionality. HOLD-OVER-IN state some intermediate
state expected from servo, since this is state comes from hardware while switch to other reference.
PR1513659
• On ACX710 routers, local repair can be in seconds (>50 ms) during FRR convergence. If explicit NULL
is configured on the PHP node and on the PHP node of the backup path, the link failure is observed at
PHP node. Global repair resumes the traffic flow. PR1515512
• The maximum FIB route scale supported in an ACX710 router are as below:
If routes are added above this scale, an error indicating lpm route add failure is reported. PR1515545
• PTP to 1PPS noise transfer test fails for frequency 1.985 Hz. PR1522666
• SyncE to 1PPS transient test results do not meet G.8273.2 SyncE to 1PPS transient metric. PR1522796
• On the ACX5048 router, queue-counters-trans-bytes-rate are more than expected while configuring
the physical interface and logical interface shaping with the transmit rate and scheduler-map. PR1538934
32
SEE ALSO
What's New | 13
What's Changed | 22
Open Issues | 32
Resolved Issues | 35
Documentation Updates | 41
Migration, Upgrade, and Downgrade Instructions | 42
Open Issues
IN THIS SECTION
General Routing | 32
Virtual Chassis | 35
Learn about open issues in this release for ACX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• Loopback status is not shown for OT interfaces on CLI (available from vty only). PR1358017
• The SD (Signal Degrade) threshold is normally lower than the SF threshold (that is, so that as errors
increase, SD condition is encountered first). For the ACX6360 optical links there is no guard code to
prevent the user from setting the SD threshold above the SF threshold, which would cause increasing
errors to trigger the SF alarm before the SD alarm. This will not cause any issues on systems with correctly
provisioned SD/SF thresholds. PR1376869
• On the ACX6360-OR router, enhancement is needed for the FRR BER threshold SNMP support.
PR1383303
• The switchover time observed was more than 50 ms under certain soak test conditions with an increased
scale with a multiprotocol multirouter topology. PR1387858
• The em2 interface configuration causes FPC to crash during initialization and FPC does not come online.
After deleting the em2 configuration and restarting the router, FPC comes online. PR1429212
• Protocols get forwarded when using a non-existing SSM map source address in IGMPv3 instead of
pruning. PR1435648
• Drop profile maximum threshold might not be reached when the packet size is other than 1000 bytes.
This is due to the current design limitation. PR1448418
• The IPv6 BFD sessions flap when configured below 100 ms. PR1456237
• The CFM remote MEP does not come up after configuration or remains in start state. PR1460555
• On ACX710 routers, packet drop is observed after changing ALT port cost for RSTP. PR1482566
• On ACX710 routers, VRRP over dual tagged interface is not supported. PR1483759
• On ACX710 routers, FEC of channel 0 in a channelized 25-Gigabit Ethernet interface is set to None
while channels 1, 2, and 3 have FEC74 as the default value for 100-Gigabit Etherne LR4 optics. The
desired FEC value can be set through the CLI command set interfaces et-x/y/z: channel no
gigether-options fec fec value. PR1488040
• Commit check error might be found when members of different speed added to aggregated bundle
when mixed mode is not set. PR1490373
• On ACX6360 platforms, port mirroring does not work when the port mirroring is configured with the
firewall filter. PR1491789
• On ACX710 routers, the ping mpls l2ckt/l2vpn command does not work if the no-control-word statement
is configured. PR1492963
• On ACX710 routers, the ping mpls l2circuit command does not work if the explicit-null is configured.
It does not affect the data path traffic. PR1494152
• On ACX710 routers, the PTP clock recovery is re-started when the clksyncd process is restarted. This
results in the PTP lock state moving to freerun on the clksyncd process restart. PR1502162
• On ACX710 routers, if we configure DHCP option 012 host-name in DHCP server and the actual base
configuration file also has the host-name in it, then overwriting of the base configuration file's host-name
with the DHCP option 012 host-name is happening. PR1503958
• On the ACX6360 platform, the core file core-ripsaw-node-aftd-expr is generated and you are unable
to back trace the file. PR1504717
• On ACX710 routers, when the following steps are done for PTP, chassis does not lock:
1. Use one or two ports as source for chassis synchronization and lock both PTP and SyncE locked.
34
3. Restart clksyncd.
4. Rollback 1.
As a workaround, you can avoid this issue by deleting the PTP configuration, restarting clksyncd, and
then reconfiguring PTP. PR1505405
• MPLS LSP check fails while verifying basic LSP retry limit. Reset the src-address of the LSP to 0 (if
src-address is not configured) whenever it changes its state from up to down. So when the ingress LSP
goes to down state, reset it to 0. The script fails because the script checks for src-address to be present
for the ingress LSP session. PR1505474
• On ACX710 routers, PTP does not seem to work with vlan-map operations. PR1507809
• On ACX710 routers, unexpected delay counter values are seen under show ptp statistics detail when
upstream master stops sending the PTP packets. PR1508031
• On ACX710 routers, if the ukern is restarted with the chassis-control restart command, the state of the
PTP lock status on the Routing Engine changes among holdover/acquiring/phase locked. The clock data
is displayed accordingly. Once the Packet Forwarding Engine is up and runs after restart, clock data is
stable and correct. During the time the Packet Forwarding Engine is not up, the clock display is inconsistent
but eventually it becomes valid once the Packet Forwarding Engine is up and the clock is created and
announce packets are being generated. PR1508385
• On ACX710 routers, EXP re-marking is supported only for a single MPLS label packet. PR1509627
• On ACX710 routers, if the console cable is plugged in and the terminal connection is active and sending
characters to the interface, the system boot might be interrupted and boot will be stalled at the uboot#
prompt. PR1513553
• On ACX710 routers, local repair can be in seconds (>50 ms) during FRR convergence. If the explicit
NULL is configured on the PHP node and on the PHP node of the backup path, the link failure is observed
at PHP node. Global repair resumes the traffic flow. PR1515512
• Alarm might not be seen on ACX710 routers when the system is booted with recovery snapshot.
PR1517221
• On ACX710 routers, SyncE to 1PPS transient test results do not meet G.8273.2 SyncE to 1PPS transient
metric. PR1522796
• Even though enhanced-ip is active, the following alarm is observed during ISSU: RE0 network-service
mode mismatch between configuration and kernel setting. PR1546002
• On ACX5448 and ACX710 routers, the start session ack is delayed by 10 seconds when configured as
TWAMP server. PR1556829
• CoS remarking might not work as expected when three color policer is applied. PR1559665
• ACX Series does not delete a MAC address from the MAC table if there is traffic destined to the MAC
address or traffic sourced from the MAC address or both. The fix will allow ACX to only look at traffic
35
sourced from MAC address before deleting the MAC address entry from MAC table. So, if there is no
traffic sourced from the MAC for an interval of MAC aging timer, the MAC would be deleted from the
MAC table at the end of MAC aging timer with out taking into account the traffic destined to the MAC
address. PR1565642
• Console and auxiliary ports provide out-of-band remote access to a device. When the console and
auxiliary ports are configured as insecure, root login is not allowed to establish terminal connections,
and superusers and anyone with a user identifier (UID) of 0 are not allowed to establish terminal
connections in multiuser mode. However, ACX710 router has no auxiliary port, out-of-band access is
through console port always. By configuring set system ports auxiliary insecure statement, ACX710
router reboots with boot reason due to watchdog timeout. PR1580016
Virtual Chassis
• On the ACX5000 router, the following false positive parity error message is observed:
soc_mem_array_sbusdma_read. The SDK can raise false alarms for parity error messages like this.
PR1276970
SEE ALSO
What's New | 13
What's Changed | 22
Known Limitations | 27
Resolved Issues | 35
Documentation Updates | 41
Migration, Upgrade, and Downgrade Instructions | 42
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in the Junos OS main and maintenance releases for ACX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• The vpls-oam sessions are detected with error (RDI sent by some MEP) after changing VLANs. PR1478346
• The hardware FRR for EVPN-VPWS, EVPN-FXC, and Layer 3 VPN with a composite next hop are not
supported. PR1499483
• ACX1100, ACX2100, ACX2200, ACX2000, and ACX4000 routers might stop forwarding transit and
control traffic. PR1508534
• On the ACX5448 router, the transit DHCPv4 and DHCPv6 packets drop in a Layer 2 domain. PR1517420
• On ACX500-I routers, the show services session count command does not work as expected. PR1520305
• Interface does not come up with the auto-negotiation setting between ACX1100 router and the other
ACX Series routers, MX Series routers and QFX Series switches as the other end. PR1523418
• With the ACX5448 router with 1000 CFM, the CCM state does not go in the Ok state after loading the
configuration or restarting the Packet Forwarding Engine. PR1526626
• The l2cpd memory leak might be observed with aggregated Ethernet interface flap. PR1527853
• Packets dropped might be seen after configuring PTP transparent clock. PR1530862
• The show class-of-service routing-instance command does not show the configured classifier. PR1531413
• On ACX710 routers, the rpd process generates core file at l2ckt_vc_adv_recv, l2ckt_adv_rt_flash
(taskptr=0x4363b80, rtt=0x4418100, rtl=< optimized out>, data=< optimized out>, opcode=< optimized
out>) at ../../../../../../../../../src/junos/usr.sbin/rpd/l2vpn/l2ckt.c:7982. PR1537546
• Management Ethernet link down alarm is observed while verifying system alarms in a Virtual Chassis
setup. PR1538674
• On the ACX5448 router, unexpected behavior of the show chassis network-services command is
observed. PR1538869
• The ACX5448 router as transit for the BGP labeled unicast drops traffic. PR1547713
• PTP slave might discard the PTP packets from the primary when MPLS explicit-null is configured.
PR1547901
• The ARP packets from the CE device are added with VLAN tag if the VLAN-ID is configured in the EVPN
routing instance. PR1555679
37
• On the ACX5448 router, the unicast packets from the CE devices might be forwarded by the PE devices
with additional VLAN tag if IRB is used. PR1559084
• On the ACX5048 router, the fxpc process generates core file on the analyzer configuration. PR1559690
• The lo0 firewall is not programmed to Packet Forwarding Engine and ACX_DFW_CFG_FAILED: ACX
Error (dfw):dnx_policer_create : Policer Creation Failed No resources for operation message is seen.
PR1566417
• On the ACX5448 router, untagged traffic is being incorrectly queued and marked. PR1570899
• RFC2544 reflector feature might not work on higher port (for example, port 46). PR1571975
Layer 2 Features
• On ACX5448 routers, VPLS traffic statistics is not displayed when executing show vpls statistics command.
PR1506981
General Routing
• Policer discarded count is shown incorrectly to the enq count of the interface queue, but the traffic
behavior is as expected. PR1414887
• The gigether-options command is enabled again under the interface hierarchy. PR1430009
• While performing repeated power-off or power-on of the device, SMBUS transactions timeout is
observed. PR1463745
• On the ACX5048 router, the egress queue statistics do not work for the aggregated Ethernet interfaces.
PR1472467
• On ACX710 routers, VPLS OAM sessions are detected with error (remote defect indication sent by some
MEPs) after changing VLANs. PR1478346
• BFD over Layer 2 VPN or Layer 2 circuit does not work because of the SDK upgrade to version 6.5.16.
PR1483014
• On the ACX5048 router, traffic loss is observed during the unified ISSU upgrade. PR1483959
• On ACX5048 and ACX5096 routers, the LACP control packets might get dropped due to high CPU
utilization. PR1493518
• When 40-Gigabit Ethernet or 10-Gigabit Ethernet interface optics are inserted in 100-Gigabit Ethernet
or 25-Gigabit Ethernet interface port with 100-Gigabit Ethernet or 25-Gigabit Ethernet interface speed
configured and vice versa, the Packet Forwarding Engine log message displays a speed mismatch.
PR1494591
38
• On the ACX710 router, high convergence is observed with the EVPN-ELAN service in a scaled scenario
during FRR switchover. PR1497251
• Outbound SSH connection flaps or memory leaks occur during the push configuration to the ephemeral
database with a high rate. PR1497575
• All the autonegotiation parameters are not shown in the output of the show interface media command.
PR1499012
• On the ACX5448 router, the EXP rewrite for the Layer 3 VPN sends all traffic with incorrect EXP.
PR1500928
• The error message mpls_extra NULL might be seen when you add, change, or delete MPLS route.
PR1502385
• On the ACX500 router, the SFW sessions might not get updated on ms interfaces. PR1505089
• The wavelength changes from CLI but does not update the hardware for the tunable optics. PR1506647
• The PIC slot might shut down in less than 240 seconds due to the over temperature start time being
handled incorrectly. PR1506938
• In the PTP environment, some vendor devices acting as clients are expecting announce messages at an
interval of -3 (8pps) from the upstream master device. PR1507782
• The BFD session flaps with the following error message after a random time interval:
ACX_OAM_CFG_FAILED: ACX Error (oam):dnx_bfd_l3_egress_create : Unable to create egress object.
PR1513644
• The loopback filter cannot take more than two TCAM slices. PR1513998
• On the ACX710 router, the following error message is observed in the Packet Forwarding Engine while
the EVPN core link flaps: dnx_l2alm_add_mac_table_entry_in_hw. PR1515516
• The VM process generates a core file while running stability test in a multidimensional scenario.
PR1515835
• The l2ald process crashes during stability test with traffic on a scaled setup. PR1517074
• On the ACX710 router, whenever a copper optic interface is disabled and enabled, the speed shows 10
Gbps rather than 1 Gbps. This issue is not seen with the fiber interface. PR1518111
• The IPv6 neighbor state change causes Local Outlif to leak by two values, which leads to the following
error: DNX_NH::dnx_nh_tag_ipv4_hw_install. PR1519372
• Tagged traffic matching the vlan-list configuration in the vlan-ccc logical interface gets dropped in the
ingress interface. PR1519568
• The incompatible media type alarm is not raised when the synchronous Ethernet source is configured
over the copper SFP. PR1519615
• If the client clock candidate is configured with a virtual port, the clock class is on T-BC. PR1520204
39
• On the ACX710 router, the alarm port configuration is not cleared after deleting the alarm-port.
PR1520326
• The show class-of-service interface command does not show classifier information. PR1522941
• The vlan-id-list statement might not work as expected on the ACX5448 and ACX710 platforms.
PR1527085
• The show class-of-service routing-instance command does not show configured classifier on ACX Series
platforms. PR1531413
• Management Ethernet link down alarm is seen while verifying system alarms in a Virtual Chassis setup.
PR1538674
Routing Protocols
• The rpd process might report 100 percent CPU usage with BGP route damping enabled. PR1514635
General Routing
• Drift messages in ACX2200, which is a PTP hybrid (PTP + Synchronous Ethernet) device. PR1426910
• ACX5448-D interfaces support: The input bytes value for the show interfaces extensive command is
not at par with older ACX Series or MX Series devices. PR1430108
• On an ACX5448 device, DHCP packets are not transparent over Layer 2 circuit. PR1439518
• On an ACX5048 device, SNMP polling stops after the link is flapped or the SFP transceiver is replaced,
and ACX_COS_HALP(acx_cos_gport_sched_set_strict_priority:987): Failed to detach logs might be
seen. PR1455722
• ACX5448-D and ACX5448-M devices do not display airflow information and temperature sensors as
expected. PR1456593
• ERP might not come up properly when MSTP and ERP are enabled on the same interface. PR1473610
• On an ACX710 device, MPLS packet load balancing is done without hashing enabled. PR1475363
• FPC might continuously crash after deactivating or activating loopback filter or reboot the system after
configuring the loopback filter. PR1477740
• The dcpfe core file is generated when disabling or enabling MACsec through Toby scripts. PR1479710
40
• Link does not come up when a 100-Gigabit Ethernet port is channelized into four port 25-Gigabit Ethernet
interfaces. PR1479733
• Memory utilization enhancement on ACX platforms to reduce the memory foot print. PR1481151
• On the ACX710 router, VPLS flood group results in IPv4 traffic drop after core interface flap. PR1491261
• On the ACX710 routers, LSP (primary and standby) does not Act/Up after routing or rpd restart.
PR1494210
• During speed mismatch, QSFP28/QSFp+ optics/cables might or might not work. PR1494600
• ACX710 BFD sessions are in initialization state with CFM scale of 1000 on reboot or chassis control
restart. PR1503429
• On an ACX500-i router, SFW sessions are not getting updated on ms- interfaces. PR1505089
• On an ACX710 router, wavelength changed from CLI does not take effect in tunable optics. PR1506647
• PIC slot might be shut down in less than 240 seconds due to the over-temperature start time is handled
incorrectly. PR1506938
• BFD flaps with the error ACX_OAM_CFG_FAILED: ACX Error (oam):dnx_bfd_l3_egress_create : Unable
to create egress object after random time interval. PR1513644
41
MPLS
• BGP session might keep flapping between two directly connected BGP peers because of the incorrect
TCP-MSS in use. PR1493431
Routing Protocols
• The BGP route target family might prevent route reflector from reflecting Layer 2 VPN and Layer 3 VPN
routes. PR1492743
VPNs
• The Layer 2 circuit neighbor might be stuck in RD state at one end of the MG-LAG peer. PR1498040
• The rpd core files are generated while disabling Layer 2 circuit with connection protection, backup
neighbor configuration, and Layer 2 circuit trace logs enabled. PR1502003
SEE ALSO
What's New | 13
What's Changed | 22
Known Limitations | 27
Open Issues | 32
Documentation Updates | 41
Migration, Upgrade, and Downgrade Instructions | 42
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for ACX Series routers.
SEE ALSO
42
What's New | 13
What's Changed | 22
Known Limitations | 27
Open Issues | 32
Resolved Issues | 35
Migration, Upgrade, and Downgrade Instructions | 42
IN THIS SECTION
This section contains the upgrade and downgrade support policy for Junos OS for ACX Series routers.
Upgrading or downgrading Junos OS might take several minutes, depending on the size and configuration
of the network.
For information about software installation and upgrade, see the Installation and Upgrade Guide.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
43
For information about software installation and upgrade, see the Installation and Upgrade Guide.
SEE ALSO
What's New | 13
What's Changed | 22
Known Limitations | 27
Open Issues | 32
Resolved Issues | 35
Documentation Updates | 41
IN THIS SECTION
What’s New | 44
What's Changed | 44
Known Limitations | 45
Open Issues | 45
Resolved Issues | 45
These release notes accompany Junos OS Release 20.2R3 for the cSRX Container Firewall, a containerized
version of the SRX Series Services Gateway. They describe new and changed features, limitations, and
known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
44
What’s New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for cSRX.
What's Changed
IN THIS SECTION
Learn about what changed in the Junos OS main and maintenance releases for cSRX.
There are no changes in behavior or syntax for cSRX in Junos OS Release 20.2R3.
There are no changes in behavior or syntax for cSRX in Junos OS Release 20.2R2.
45
Known Limitations
There are no known behavior or limitation for cSRX in Junos OS Release 20.2R3.
Open Issues
Resolved Issues
IN THIS SECTION
What's New | 46
What's Changed | 55
Known Limitations | 59
Open Issues | 60
Resolved Issues | 64
Documentation Updates | 71
These release notes accompany Junos OS Release 20.2R3 for the EX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What's New
IN THIS SECTION
Learn about new features introduced in this release for EX Series switches.
NOTE: The following EX Series switches are supported in Release 20.2R3: EX2300, EX2300-C,
EX3400, EX4300, EX4600, EX4650, EX9200, EX9204, EX9208, EX9214, EX9251, and EX9253.
There are no new features or enhancements to existing features for EX Series switches in Junos OS Release
20.2R3.
There are no new features or enhancements to existing features for EX Series switches in Junos OS Release
20.2R2.
47
The DHCP server uses DHCPv6 options 59 and 17 and applicable suboptions to exchange ZTP-related
information between itself and the DHCP client.
NOTE: Only HTTP and HTTPS transport protocols are supported EX3400, EX4300, QFX5100,
and QFX5200 devices.
EVPN
• 802.1X authentication with EVPN-VXLAN (EX4300-48MP and EX4300-48MP Virtual Chassis)—Starting
in Junos OS Release 20.2R1, EX4300-48MP switches that act as access switches can use 802.1X
authentication to protect an EVPN-VXLAN network from unauthorized end devices. EX4300-48MP
switches support the following 802.1X authentication features on access and trunk ports:
• Guest VLAN
48
• Server fail
• Server reject
• Dynamic VLAN
• RADIUS accounting
• Support for firewall filtering on EVPN-VXLAN traffic (EX4300-MP)—Starting with Junos OS Release
20.2R1, you can configure firewall filters and policers on the VXLAN traffic in an EVPN network
(EVPN-VXLAN traffic). You set the rules that the devices uses to accept or discard packets by defining
the terms for a firewall filter. For filters that you would apply to a port or VLAN, configure firewall filters
at the [edit firewall family ethernet-switching] hierarchy level. For filters that you would apply to an
IRB interface, configure firewall filters at the [edit firewall family inet] hierarchy level. After a firewall
filter is defined, you can then apply it at an interface.
• Noncolored SR-TE LSPs with EVPN-MPLS (ACX5448, EX9200, MX Series, and vMX)—Starting in Junos
OS Release 20.2R1, ACX5448, EX9200, MX Series, and vMX routers support noncolored static segment
routing-traffic engineered (SR-TE) label-switched paths (LSPs) with an EVPN-MPLS core network and
the following Layer 2 services running at the edges of the network:
• E-LAN
• EVPN-ETREE
Without color, all LSPs resolve using a BGP next hop only.
The Juniper Networks routers support noncolored SR-TE LSPs in an EVPN-MPLS core network with
the following configurations:
The Juniper Networks routers also support noncolored SR-TE LSPs when functioning as a Data Center
Interconnect (DCI) device that handles EVPN Type 5 routes.
49
• MAC filtering, storm control, and port mirroring support in EVPN-VXLAN overlay networks
(EX4300-48MP)—Starting with Junos OS Release 20.2R1, EX4300-48MP switches support the following
features in an EVPN-VXLAN overlay network:
• MAC filtering
• Storm control
[See MAC Filtering, Storm Control, and Port Mirroring Support in an EVPN-VXLAN Environment.]
• Layer 2 and 3 families, encapsulation types, and VXLAN on the same physical interface (EX4600)—Starting
in Junos OS Release 20.2R1, you can configure and successfully commit the following on a physical
interface of an EX4600 switch in an EVPN-VXLAN environment:
• Layer 2 bridging (family ethernet-switching) on any logical interface unit number (unit 0 and any
nonzero unit number).
• VXLAN on any logical interface unit number (unit 0 and any nonzero unit number).
• Layer 2 bridging (family ethernet-switching and encapsulation vlan-bridge) on different logical interfaces
(unit 0 and any nonzero unit number).
• Layer 3 IPv4 routing (family inet) and VXLAN on different logical interfaces (unit 0 and any nonzero
unit number).
For these configurations to be successfully committed and work properly, you must specify the
encapsulation flexible-ethernet-services configuration statements at the physical interface level—for
example, set interfaces xe-0 /0/5 encapsulation flexible-ethernet-services.
[See language (Scripts), Develop Off-Device JET Applications, and Develop On-Device JET Applications.]
[See Mapping OpenConfig Routing Policy Commands to Junos Configuration and Mapping OpenConfig
Network Instance Commands to Junos Operation.]
• Support for OpenConfig configuration model version 4.0.1 for BGP with JTI (EX2300, EX3400, EX4300,
EX4600, and EX9200)— Junos OS Release 20.2R1 provides support for the OpenConfig version 4.0.1
data models openconfig-bgp-neighbor.yang and openconfig-bgp-policy.yang using Junos telemetry
51
interface (JTI) and remote procedure call (gRPC) services. Using JTI and gRPC services, you can stream
telemetry statistics to an outside collector.
The following major resource paths are supported with gRPC and JTI:
• /network-instances/network-instance/protocols/protocol/bgp/global/
• /network-instances/network-instance/protocols/protocol/bgp/global/afi-safis/afi-safi/
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/
• /network-instances/network-instance/protocols/protocol/bgp/peer-groups/peer-group/
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface and OpenConfig Data Model
Version.]
• Support for OpenConfig configuration model version 1.0.0 for local routing with JTI (EX2300, EX3400,
EX4300, EX4600, and EX9200)— Junos OS Release 20.2R1 provides support for the OpenConfig version
1.0.0 data model openconfig-local-routing.yang using Junos telemetry interface (JTI) and remote
procedure call (gRPC) services. Using JTI and gRPC services, you can stream telemetry statistics to an
outside collector.
The following major resource paths are supported with gRPC and JTI:
• /local-routes/static-routes/static/
• /local-routes/local-aggregates/aggregate/
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface and OpenConfig Data Model
Version.]
• Packet Forwarding Engine and Routing Engine sensor support with JTI (EX2300, EX2300-MP, and
EX3400)—Starting in Junos OS Release 20.2R1, you can use Junos telemetry interface (JTI) with remote
procedure call (gRPC) services to export Packet Forwarding Engine statistics and Routing Engine statistics
from EX2300, EX2300-MP, and EX3400 switches to an outside collector. These statistics can also be
exported through UDP (native) sensors.
• Sensor for RPD task memory utilization export (resource path /junos/task-memory-information/)
• Sensor for network discovery NDP table state (resource path /nd6-information/)
[See Understanding OpenConfig and gRPC and gNMI on Junos Telemetry Interface, sensor (Junos
Telemetry Interface), and Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface.]
Layer 2 Features
• L2PT support (EX4650 and QFX5120-48Y switches, and QFX5100 and QFX5110 switches and Virtual
Chassis)—Starting in Junos OS Release 20.2R1, you can configure Layer 2 protocol tunneling (L2PT) to
tunnel any of the following Layer 2 protocols: CDP, E-LMI, GVRP, IEEE 802.1X, IEEE 802.3AH, LACP,
LLDP, MMRP, MVRP, STP (including RSTP and MSTP), UDLD, VSTP, and VTP.
Multicast
• Static multicast route leaking for VRF and virtual router instances (EX4650 and QFX5120-48Y)—Starting
with Junos OS Release 20.2R1, you can configure the switch to statically share (leak) IPv4 multicast
routes for IGMPv3 (S,G) traffic among different virtual router or virtual routing and forwarding (VRF)
instances. You can only leak static multicast routes per group, not per source and group. The destination
prefix length must be 32.
To configure multicast route leaking to the VRF or virtual router instance routing-instance-name, configure
the next-table routing-instance-name.inet.0 statement at the [edit routing-instances routing-instance-name
routing-options static route destination-prefix/32] hierarchy level.
[See Understanding Multicast Route Leaking for VRF and Virtual Router Instances.]
• Multicast-only fast reroute (MoFRR) (EX4650 and QFX5120-48Y)—Starting in Junos OS Release 20.2R1,
you can configure MoFRR to minimize multicast packet loss in PIM domains when link failures occur.
With MoFRR enabled, the switch maintains primary and backup traffic paths, forwarding traffic from
the primary path and dropping traffic from the backup path. If the primary path fails, the switch can
quickly start forwarding the backup path stream (which becomes the primary path). The switch creates
a new backup path if it detects available alternative paths. MoFRR applies to all multicast (S,G) streams
by default, or you can configure a policy for the (S,G) entries where you want MoFRR to apply.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
• NETCONF sessions over outbound HTTPS (EX Series, MX Series, PTX1000, PTX3000, PTX5000,
PTX10001, PTX10002, PTX10008, PTX10016, QFX Series, SRX1500, SRX4100, SRX4200, SRX4600,
SRX5400, SRX5600, SRX5800, and vSRX)—Starting in Junos OS Release 20.2R1, the Junos OS with
upgraded FreeBSD software image includes a Juniper Extension Toolkit (JET) application that supports
establishing a NETCONF session using outbound HTTPS. The JET application establishes a persistent
HTTPS connection with a gRPC server over a TLS-encrypted gRPC session and authenticates the
NETCONF client using an X.509 digital certificate. A NETCONF session over outbound HTTPS enables
you to remotely manage devices that might not be accessible through other protocols, for example, if
the device is behind a firewall.
You configure this feature at the [edit firewall family mpls] hierarchy level. You can only apply a loopback
filters on family mpls in the ingress direction.
Routing Protocols
• Support for Layer 2 circuit, Layer 2 VPN, and VPLS services with BGP labeled unicast (MX Series,
EX9204, EX9208, EX9214, EX9251, and EX9253 devices)—Starting with Junos OS Release 20.2R1, MX
Series, EX9204, EX9208, EX9214, EX9251, and EX9253 devices support BGP PIC Edge protection for
Layer 2 circuit, Layer 2 VPN, and VPLS (BGP VPLS, LDP VPLS and FEC 129 VPLS) services with BGP
labeled unicast as the transport protocol. BGP PIC Edge using the BGP labeled unicast transport protocol
helps to protect traffic failures over border nodes (ABR and ASBR) in multi-domain networks. Multi-domain
networks are typically used in metro-aggregation and mobile backhaul networks designs.
A prerequisite for BGP PIC Edge protection is to program the Packet Forwarding Engine (PFE) with
expanded next-hop hierarchy.
To enable BGP PIC Edge protection, use the following CLI configuration statements:
54
[edit protocols]
user@host#set bgp group group-name family inet labeled-unicast nexthop-resolution
preserve-nexthop-hierarchy;
[edit routing-options]
user@host#set rib routing-table-name protect core;
[edit protocols]
user@host#set l2circuit resolution preserve-nexthop-hierarchy;
[edit protocols]
user@host#set l2vpn resolution preserve-nexthop-hierarchy;
SEE ALSO
What's Changed | 55
Known Limitations | 59
Open Issues | 60
Resolved Issues | 64
Documentation Updates | 71
Migration, Upgrade, and Downgrade Instructions | 72
55
What's Changed
IN THIS SECTION
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX commit scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX commit scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX event scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX event scripts. If you
56
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
[See hello-message.]
[See netconf-monitoring.]
• Changes to <commit> RPC responses in RFC-compliant NETCONF sessions (ACX Series, EX Series,
MX Series, PTX Series, QFX Series, and SRX Series)—When you configure the rfc-compliant statement
at the [edit system services netconf] hierarchy level, the NETCONF server's response for <commit>
operations includes the following changes:
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the [edit system services netconf]
hierarchy level, the NETCONF server suppresses any <commit-results> XML subtree in the response
and emits only an <ok> or <rpc-error> element.
[See export-format.]
General Routing
• IPv6 address in the prefix TIEs displayed correctly—The IPv6 address in the prefix TIEs are displayed
correctly in the show rift tie output.
Routing Protocols
• Advertising /32 secondary loopback addresses to traffic engineering database as prefixes (ACX Series,
EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—We've made changes to export multiple
loopback addresses to the lsdist.0 and lsdist.1 routing tables as prefixes. This eliminates the issue of
advertising secondary loopback addresses as router IDs instead of prefixes. In earlier releases, multiple
secondary loopback addresses in the traffic engineering database were added to the lsdist.0 and lsdist.1
routing tables as part of node characteristics and advertised as router IDs.
General Routing
• Support for full inheritance paths of configuration groups to be built into the database by default (ACX
Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—Starting with Junos OS Release
20.2R1, the persist-groups-inheritance option at the [edit system commit] hierarchy level is enabled by
default. To disable this option, use no-persist-groups-inheritance.
• Command to view summary information for resource monitor (EX9200 line of switches and MX
Series)—You can use the show system resource-monitor command to view statistics about the use of
memory resources for all line cards or for a specific line card in the device. The command also displays
information about the status of load throttling, which manages how much memory is used before the
device acts to reduce consumption.
[See show system resource-monitor and Resource Monitoring for Subscriber Management and Services.]
58
[See Develop Off-Device JET Applications and Develop On-Device JET Applications.]
• Updates to IDL for RIB service API bandwidth field (ACX Series, EX Series, MX Series, PTX Series, QFX
Series, and SRX Series)—The IDL for the RouteGateway RIB service API has been updated to document
additional rules for the bandwidth field. You must set bandwidth only if a next hop has more than one
gateway, and if you set it for one gateway on a next hop, you must set it for all gateways. If you set
bandwidth when there is only a single usable gateway, it is ignored. If you set bandwidth for one or
more gateways but not all gateways on a next hop, you see the error code
BANDWIDTH_USAGE_INVALID.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
SEE ALSO
What's New | 46
Known Limitations | 59
Open Issues | 60
Resolved Issues | 64
Documentation Updates | 71
Migration, Upgrade, and Downgrade Instructions | 72
59
Known Limitations
IN THIS SECTION
EVPN | 59
General Routing | 59
Infrastructure | 59
Learn about known limitations in this release for EX Series. For the most complete and latest information
about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.
EVPN
• When only one link is present between the leaf devices, it goes down, resulting in traffic drop. PR1480847
• InterVNI multicast is not supported in EVPN-VXLAN edge routing model on EX4650. PR1517082
General Routing
• Junos OS might hang trying to acquire the SMP IPI lock while rebooting when it is running as a VM on
Linux and QEMU hypervisor. As a workaround, you can power cycle the device. PR1385970
• The interfaces on certain EX9251 line of switches might get stuck in a down state, if the remote interface
sends invalid code to the local interface. Link might not come up even after the remote peer has begun
sending a good signal. The "Failed to complete DFE tuning" syslog might appear. This syslog message
has no functional impact. PR1473280
• On all Junos OS platforms, in a QinQ environment, xSTP is enabled on the interface having logical
interface with vlan-id-list configured, then it will only run on those logical interfaces whose vlan-id range
includes native-vlan-id configured and all others will in discarding state. This might lead to traffic drop.
PR1532992
Infrastructure
• Depending on the actual traffic pattern and the order in which the MACs are learned, the actual MAC
DB scale may vary. This is due to the way the MACs are internally stored in the hardware. PR1485319
60
• On EX-4300MP, 9000 IPv6 MC routes can be installed. If you try to add more IPv6 MC routes, error
messages will be seen. PR1493671
• EX4650 ASIC uses a static hashing and RTAG7 hash algorithm that might be alike on each chipset. Hence,
we recommend that you fine-tune hash parameters based on the traffic profile used when deviation in
load balance is observed. On TD3 chipset based platforms, the following configuration is required to
fine-tune hashing deviation; 1. set forwarding-options enhanced-hash-key hash-parameters ecmp offset
29. 2. set forwarding-options enhanced-hash-key hash-parameters ecmp preprocess. PR1516883
• Sometimes image upgrade through ZTP might fail because of the insufficient space on EX3400. For
information on how to free up the space see KB31198. PR1515013
SEE ALSO
What's New | 46
What's Changed | 55
Open Issues | 60
Resolved Issues | 64
Documentation Updates | 71
Migration, Upgrade, and Downgrade Instructions | 72
Open Issues
IN THIS SECTION
General Routing | 61
Infrastructure | 62
Layer 2 Features | 63
Routing Protocols | 64
61
Learn about open issues in Junos OS Release 20.2R3 for EX Series switches. For the most complete and
latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report
Search application.
General Routing
• On the MX204 and MX10003 routers, the following garbage value on syslog messages from craftd
demon is observed: craftd[xxxx]: fatal error, failed to open smb device: JÎÈ. PR1359929
• When VLAN is added as an action for changing the VLAN in both ingress and egress filters, the filter is
not installed. PR1362609
• On EX2300, when watchdog is induced, the last reboot reason is shown as Swizzle Reboot. PR1369924
• On an EX9208 switch, a few xe- interfaces go down with the error message if_msg_ifd_cmd_tlv_decode
ifd xe-0/0/0 #190 down with ASIC Error. PR1377840
• On EX4300-48MP, EX2300-24T, and EX4650 platforms, either unicast RPF in strict mode or ICMP
redirect does not work properly. PR1417546
• On the EX9214 device, if the MACsec-enabled link flaps after reboot, the error errorlib_set_error_log():
err_id(-1718026239) is observed. PR1448368
• On Junos OS platforms with next generation Routing Engine installed, the vehostd process might crash
without generating a core file and automatic restart might fail. PR1448413
• In overall commit time, the evaluation of mustd constraints is taking two seconds more than usual. This
is because the persist-group-inheritance feature has been made a default feature in the latest Junos OS
releases. Eventually, this feature helps improve the subsequent commit times for scaled configurations
significantly. The persist-group-inheritance feature is useful in customer scenarios where groups and
nested groups are used extensively. In those scenarios, the group inheritance paths are not built every
time, thus subsequent commits are faster. PR1457939
• EX2300-48MP Virtual Chassis is rebooted silently and randomly without generating a core file. Syslogs
and console logs are not generated before rebooting the switch, because the reboot reason is shown as
a normal reboot. PR1463583
• On EX4300 switches, when packets entering a port exceed a size of 144 bytes, they might get dropped
in few cases. PR1464365
• On EX4650 platform, after using force reboot, the output of CLI command 'show version' might show
the model as QFX5120-48y-8c and after committing the http services, J-Web of the device might be
inaccessible due to model issue. PR1480252
• On BCM Packet Forwarding Engine-based EX Series platforms frame higher than MTU+4 and lesser
then MTU+8 bytes, with invalid FCS, code error, or IEEE length check error, is treated as Jabber frame.
PR1487709
• On EX Series platforms using chipset with SFP+ implemented, interface on the platforms might be in
active status when TX or RX connector is removed. As a result, traffic might drop. PR1495564
62
• SNMP POE MIB walk produce withers no results or sometimes result from the master Virtual Chassis
whenever the Virtual Chassis is renamed as one. PR1503985
• On the EX4300-48MP device, the reboot time, FPC uptime, and interface uptime are degraded by 20
percent when compared with Junos OS Releases 19.1R3, 19.2R2, and 19.4R2. PR1514364
• Traffic not load balanced by EX4300-48MP and EX4300-VC over ESI links with evpn_vxlan configured.
PR1550305
• On the EX4300 device, script fails while committing the IPsec authentication configuration due to the
missing algorithm statement. PR1557216
• When dot1x server-fail-voip vlan-name is configured, ensure that both server-fail-voip vlan-name and
voip vlan are configured using vlan name and not by using vlan-id. PR1561323
• On EX4600 platform, internal comment 'Placeholder for QFX platform config' might be seen on show
config output. PR1567037
Infrastructure
• On EX Series switches, If you are configuring a large-scale number of firewall filters on some interfaces,
the FPC might crash and generate core files. PR1434927
• IFDE: Null uint32 set vector, ifd and IFFPC: 'IFD Ether uint32 set' (opcode 151) error message is observed
continuously in AD with base configurations. PR1485038
• Power loss during software install can leave artifacts that consume space. These need to be included in
package cleanup procedure. PR1544222
63
• After GRES, the VSTP port cost on aggregated Ethernet interfaces might get changed, leading to a
topology change. PR1174213
Layer 2 Features
• GARPs were being sent whenever there was a MAC (fdb) operation (add or delete). This is now updated
to send GARP when the interface is up and Layer 3 interface is attached to the VLAN. PR1192520
• If forward-only is set within dhcp-reply in a Juniper Networks device as a DHCP relay agent, the DHCP
DECLINE packets that are broadcasted from the DHCP client are dropped and not forwarded to the
DHCP server. PR1429456
• OSPF and OSPF3 adjacency uptime is more than expected after NSSU upgrade and outage is higher
than the expected. PR1551925
• On the EX9208 device, 33 percent degradation with MAC learning rate is observed in Junos OS Release
19.3R1 compared to Junos OS Release 18.4R1. PR1450729
• On EX4300 platforms configured with ERP, after multiple devices reboot/restart at the same time, ERP
might not revert back to the IDLE state. This issue might be seen in situations where the ERP node-id
is not configured manually and after the restart, the default node-id (switch base MAC address) might
get reset to 00:00:00:00:00:00, effectively causing multiple devices to have the same node-id. PR1461434
• The pfex_junos process generates core file at 0x01847994 in pfeman_watchdog (arg=< optimized out>)
at ../../../../src/pfe/common/applications/pfeman/pfeman_rt_pfex.c:1411.PR1535178
• Upgrading satellite devices might lead to some SDs in SyncWait state. Cascade port flap not causing the
issue. PR1556850
• "Last flapped" timestamp for interface fxp0 gets reset every time "monitor traffic interface fxp0" is
executed. PR1564323
• On all EX9200 platforms with EVPN-VXLAN configured, the next-hop memory leak in MX Series ASIC
happens whenever there is a route churn for remote MAC-IP entries learned bound to the IRB interface
in EVPN-VXLAN routing instance. When the ASIC's next-hop memory partition exhausted the FPC might
reboot. PR1571439
64
Routing Protocols
• Verifying loader only uses ECDSA256+SHA256 for integrity checks but does not say so. PR1504211
SEE ALSO
What's New | 46
What's Changed | 55
Known Limitations | 59
Resolved Issues | 64
Documentation Updates | 71
Migration, Upgrade, and Downgrade Instructions | 72
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in Junos OS main and maintenance releases for EX Series.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• IRB MAC will not be programmed in hardware when MAC persistence timer expires. PR1484440
• While verifying the last-change op-state value through XML, the rpc-reply message is inappropriate.
PR1492449
• The mge interface might still stay up while the far end of the link goes down. PR1502467
65
• DHCP traffic might not be forwarded correctly when sending DHCP unicast packets. PR1512175
• EX4300-48MP device might go out of service during a software upgrade operation. PR1526493
• On the EX2300 device, the following PoE message is observed poe_get_dev_class: Failed to get PD
class info. PR1536408
• The LLDP neighborship with the VoIP phones cannot be established. PR1538482
• On the EX3400 and EX2300 switches, the upgrade fails due to the lack of available storage. PR1539293
• FPC might not be recognized after power cycle (hard reboot). PR1540107
• DHCP discover packet might be dropped if DHCP inform packet is received first. PR1542400
• Slaac-Snoopd child process generates a core file upon multiple switchovers on the Routing Engine.
PR1543181
• On EX4300-48MP line of switches with Linux TVP architecture and Junos OS as VM, the Junos CLI
outputs do not confirm if the Junos OS and the host kernel are compatible with each other. PR1543901
• The chip on FPC linecard might crash when the system reboots. PR1545455
• "show pfe route summary hw" shows random high free and 'Used' column for 'IPv6 LPM(< 64)' routes.
PR1552623
• The statement 'action-shutdown' of storm control does not work for ARP broadcast packets. PR1552815
• Traffic might be dropped when a firewall filter rule uses 'then vlan' as the action. PR1556198
• On EX3400VC line of switches, the DAEMON-7-PVIDB throws syslog messages for every 12 to 14
minutes after you upgrade to Junos OS Release 19.1R3-S3. PR1563192
Infrastructure
• On the EX4600 and EX4300 Virtual Chassis or Virtual Chassis fabric, the VSTP configurations device
goes unreachable and becomes nonresponsive after commit. PR1520351
• Traffic related to IRB interface might be dropped when mac-persistence-timer expires PR1557229
• lldp-receive-packet-count is not getting exchanged properly in l2pt operation for lldp after configuring
protocols. PR1532721
• LLDP neighborship might not come up on EX4300 non-aggregated Ethernet interfaces. PR1538401
66
• The BGP session replication might fail to start after the session crashes on a backup Routing Engine.
PR1552603
Routing Protocols
• The OSPFv3 adjacency should not be established when IPsec authentication is enabled. PR1525870
• DCPFE crash might be observed while updating VRF for multicast routes during irb uninit. PR1546745
• Sending multicast traffic to downstream receiver on MX Series-based Virtual Chassis platforms might
fail. PR1555518
Virtual Chassis
• EX4600/EX4300 mixed VC : Error message 'ex_bcm_pic_eth_uint8_set' is seen when changing
configuration related to interface. PR1573173
• The dot1x client won't be moved to held state when the authenticated PVLAN is deleted. PR1516341
EVPN
• Unable to create a new VTEP interface. PR1520078
General Routing
• Virtual Chassis split after network topology is changed. PR1427075
• EX2300 Series: High CPU load due to receipt of specific multicast packets on Layer 2 interface
(CVE-2020-1668). PR1491905
• The fxpc might crash when renumbering the master member id value of the EX2300/EX3400 Virtual
Chassis. PR1497523
67
• Outbound SSH connection flaps or memory leaks occur during the push configuration to ephemeral
database with high rate. PR1497575
• Traffic might get dropped if the aggregated Ethernet member interface is deleted or added, or an SFP
of the aggregated Ethernet member interface is unplugged or plugged. PR1497993
• In some cases, if we have an OSPF session on the IRB over LAG interface with a 40-Gigabit Ethernet
port as member, the session gets stuck in restart. PR1498903
• On the EX4300, EX3400, and EX2300 Virtual Chassis with NSB and xSTP enabled, continuous traffic
loss might be observed while performing GRES. PR1500783
• The mge interface might still stay up while the far end of its link goes down. PR1502467
• LLDP is not acquired when native-vlan-id and tagged VLAN-ID are the same on a port. PR1504354
• LLDP might not work when PVLAN is configured on EX Series and QFX Series Virtual Chassis. PR1511073
• LACP goes down after performing Routing Engine switchover if MACsec is enabled on the LAG members
on EX4300. PR1513319
• The 100M SFP-FX is not supported on satellite device in Junos fusion setup. PR1514146
• The dcpfe (PFE) process might crash due to memory leak. PR1517030
• "Drops" and "Dropped packets" counters in the output for "show interface extensive" are double-counted.
PR1525373
Infrastructure
• The qmon-sw sensor is not supported in EX3400. PR1506710
• The IP communication between directly connected interfaces on EX4600 might fail. PR1515689
• OID ifOutDiscards reports zero and sometimes shows valid value. PR1522561
Layer 2 Features
• On the QFX5000 line of switches, traffic imbalance might be observed if hash-params is not configured.
PR1514793
• The MAC address in the hardware table might become out of synchronization between the master and
member in Virtual Chassis after the MAC flaps. PR1521324
Routing Protocols
• On EX4300-MP and EX4600, high CPU load occurs due to receipt of specific Layer 2 frames in
EVPN-VXLAN deployment. (CVE-2020-1687) & High CPU load occurs due to receipt of specific Layer
2 frames when deployed in a Virtual Chassis configuration (CVE-2020-1689). PR1495890
• The rpd might report 100 percent CPU usage with BGP route damping enabled. PR1514635
• Packet loss might be observed while verifying traffic from access to core network for IPv4/IPv6 interfaces.
PR1520059
• OSPFv3 adjacency should not be established when IPsec authentication is enabled. PR1525870
• The J-Web does not display the correct flow-control status on EX Series devices. PR1520246
Virtual Chassis
• EX4650: "kldload: an error occurred while loading the module" during booting. PR1527170
EVPN
• The ESI of IRB interfaces does not get updated after an autonomous-system number change if the
interface is down. PR1482790
• The VXLAN function might be broken due to a timing issue after the change in PR 1495098. PR1502357
Infrastructure
• Kernel core files might be observed if you deactivate the daemon on EX2300/EX3400 platforms.
PR1483644
• The MC-LAG configuration-consistency ICL configuration might fail after committing some changes.
PR1459201
69
• A stale IP address might be seen after a specific order of configuration changes under a logical-systems
scenario. PR1477084
• Loop detection might not work on extended ports in Junos fusion scenarios. PR1460209
• Issues with DHCPv6 relay processing Confirm and Reply packets. PR1496220
Layer 2 Features
• The LLDP function might fail when a Juniper device connects to a non-Juniper one. PR1462171
• EX4650/QFX5120: QinQ: The third VLAN tag is not pushed onto the stack and SWAP is being done
instead. PR1469149
MPLS
• BGP session might keep flapping between two directly connected BGP peers because of the wrong
TCP-MSS in use. PR1493431
• The switch might not be able to learn MAC addresses with dot1x and interface-mac-limit configured.
PR1470424
• EX4300: Input firewall filter attached to isolated or community VLANs not matching 802.1p bits on the
VLAN header. PR1478240
• MAC learning under bridge-domain stops after an MC-LAG interface flap. PR1488251
• The NSSU upgrade might fail on EX4300 switches due to a storage issue in the /var/tmp directory.
PR1494963
• Traffic loss might be seen with framing errors or runts if MACsec is configured on EX4300. PR1502726
• The MAC Pause frames will be incrementing in the Receive direction if half-duplex mode on 10-Mbps
or 100-Mbps speed is configured. PR1452209
70
• Link up delay and traffic drop might be seen on mixed SP L2/L3 and EP L2 type configurations. PR1456336
• MAC addresses learned on RTG may not be aged out after the aging time. PR1461293
• RTG link faces nearly 20 seconds down during backup node rebooting. PR1461554
• The jdhcpd process might consume high CPU and no further subscribers can be brought up if there are
more than 4000 DHCP relay clients in the MAC move scenario. PR1465277
• FPCs might get disconnected from the EX3400 Virtual Chassis briefly after a reboot or an upgrade.
PR1467707
• Traffic loss might be seen with framing errors or runts if MACsec is configured on EX4600 or QFX5100
platforms. PR1469663
• SSH session closes while checking for the show configuration | display set command for both local and
nonlocal users. PR1470695
• CoS 802.1p bits rewrite might not happen in Q-in-Q mode. PR1472350
• DSCP marking might not work as expected if the fixed classifiers are applied to interfaces on QFX5000
or EX4600 platforms. PR1472771
• ERP might not come up properly when MSTP and ERP are enabled on the same interface. PR1473610
• The RIPv2 packets forwarded across a Layer 2 circuit connection might be dropped. PR1473685
• On EX4300, the output of show security macsec statisitics shows high values incorrectly. PR1476719
• Trio based linecard might crash when there is bulk route update failure in a corner case. PR1478392
• TFTP installation from loader prompt may not succeed on the EX Series devices. PR1480348
• ARP request packets for an unknown host might get dropped in remote PE in EVPN-VXLAN scenario.
PR1480776
• On EX2300 switches, SNMP traps are not generated when the MAC addresses limit threshold is reached.
PR1482709
• Incorrect 'frame length' of 132 bytes might be shown in packet header. PR1487876
• Virtual Chassis ports might go down in a mixed Virtual Chassis setup of QFX5100-24Q-2P/EX4300 and
EX4600/EX4300. PR1489985
• DHCP binding fails while you verify DHCPv4 snooping functionality with P-VLAN with a firewall to
block or allow certain IPv4 packets. PR1490689
• Traffic loss could be observed in a mixed-Virtual Chassis setup of QFX5100 and EX4300. PR1493258
71
• Traffic loss could be seen in an MC-LAG scenario on QFX5120 and EX4650. PR1494507
• Traffic might get dropped if AE member interface is deleted/added or a SFP of the AE member interface
is unplugged/plugged. PR1497993
Routing Protocols
• BGP IPv4/IPv6 convergence and RIB install and delete time is degraded in Junos OS Releases 19.1R1,
19.2R1, 19.3R1, and 19.4R1. PR1414121
• MUX State in LACP interface does not go to collecting and distributing and remains attached after
enabling the ae interface. PR1484523
• FPC might go to "NotPrsnt" state after upgrading with non-TVP image in VC/VCF setup. PR1485612
• The BGP route-target family might prevent RR from reflecting Layer 2 VPN and Layer 3 VPN routes.
PR1492743
• Firewall filter could not work in certain conditions in an Virtual Chassis setup. PR1497133
SEE ALSO
What's New | 46
What's Changed | 55
Known Limitations | 59
Open Issues | 60
Documentation Updates | 71
Migration, Upgrade, and Downgrade Instructions | 72
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R2 documentation for EX Series switches.
SEE ALSO
What's New | 46
72
What's Changed | 55
Known Limitations | 59
Open Issues | 60
Resolved Issues | 64
Migration, Upgrade, and Downgrade Instructions | 72
IN THIS SECTION
This section contains the upgrade and downgrade support policy for Junos OS for EX Series switches.
Upgrading or downgrading Junos OS can take several hours, depending on the size and configuration of
the network. For information about software installation and upgrade, see the Installation and Upgrade
Guide.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://support.juniper.net/support/eol/software/junos/.
73
SEE ALSO
What's New | 46
What's Changed | 55
Known Limitations | 59
Open Issues | 60
Resolved Issues | 64
Documentation Updates | 71
IN THIS SECTION
What's New | 74
What's Changed | 75
Known Limitations | 75
Open Issues | 75
Resolved Issues | 76
Documentation Updates | 77
These release notes accompany Junos OS Release 20.2R3 for the JRR Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
74
What's New
IN THIS SECTION
Learn about what changed in Junos OS main and maintenance releases for JRR Series Route Reflectors.
There are no new features or enhancements to existing features for JRR Series in Junos OS Release 20.2R3.
There are no new features or enhancements to existing features for JRR Series in Junos OS Release 20.2R2.
Layer 2 Features
• Support for Link Layer Discovery Protocol (JRR200)—Starting in Junos OS Release 20.2R1, JRR Series
devices support Link Layer Discovery Protocol (LLDP) is supported both on the management port em0
and on the WAN ports em2 through em9. LLDP is a link-layer protocol defined in IEEE 802.1AB that
allows network devices to advertise their identity, capabilities, and configuration to other devices on
the LAN.
SEE ALSO
What's Changed | 75
Known Limitations | 75
Open Issues | 75
Resolved Issues | 76
Documentation Updates | 77
75
What's Changed
There are no changes in behavior and syntax in Junos OS Release 20.2R3 for JRR Series Route Reflectors.
SEE ALSO
What's New | 74
Known Limitations | 75
Open Issues | 75
Resolved Issues | 76
Documentation Updates | 77
Migration, Upgrade, and Downgrade Instructions | 78
Known Limitations
There are no known limitations in Junos OS Release 20.2R3 for JRR Series Route Reflectors.
SEE ALSO
What's New | 74
What's Changed | 75
Open Issues | 75
Resolved Issues | 76
Documentation Updates | 77
Migration, Upgrade, and Downgrade Instructions | 78
Open Issues
There are no open issues in Junos OS Release 20.2R3 for JRR Series Route Reflectors.
76
SEE ALSO
What's New | 74
What's Changed | 75
Known Limitations | 75
Resolved Issues | 76
Documentation Updates | 77
Migration, Upgrade, and Downgrade Instructions | 78
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in Junos OS main and maintenance releases for JRR Series Route
Reflectors.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
77
General Routing
• On the JRR200 device, four out of eight fans might not work after upgrading to Junos OS Release 19.4R1
and later. This might cause high temperature of the device eventually impacting the traffic. PR1534706
On the JRR200 device, four out of eight fans might not work after upgrading to Junos OS Release 19.4R1
and later. This might cause high temperature of the device eventually impacting the traffic. PR1534706
General Routing
• On the JRR200 routers, the firewall filter with non-zero TTL value might cause a commit error. PR1531034
General Routing
• USB install image is not working for JRR200 platform. PR1471986
• Link state of virtual em interfaces in Junos OS might not reflect the true link status of corresponding
physical interfaces in the Linux host. PR1492087
SEE ALSO
What's New | 74
What's Changed | 75
Known Limitations | 75
Open Issues | 75
Documentation Updates | 77
Migration, Upgrade, and Downgrade Instructions | 78
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for JRR200 Route Reflectors.
SEE ALSO
78
What's New | 74
What's Changed | 75
Known Limitations | 75
Open Issues | 75
Resolved Issues | 76
Migration, Upgrade, and Downgrade Instructions | 78
IN THIS SECTION
This section contains the upgrade and downgrade support policy for Junos OS for the JRR Series Route
Reflector. Upgrading or downgrading Junos OS might take several minutes, depending on the size and
configuration of the network.
For information about software installation and upgrade, see the JRR200 Route Reflector Quick Start and
the Installation and Upgrade Guide.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
79
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
SEE ALSO
What's New | 74
What's Changed | 75
Known Limitations | 75
Open Issues | 75
Resolved Issues | 76
Documentation Updates | 77
IN THIS SECTION
What’s New | 80
What's Changed | 80
Known Limitations | 81
Open Issues | 81
Resolved Issues | 82
Documentation Updates | 83
These release notes accompany Junos OS Release 20.2R3 for the Junos fusion for enterprise. They describe
new and changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
80
What’s New
There are no new features or enhancements to existing features in Junos OS Release 20.2R3 for Junos
fusion for enterprise.
NOTE: For more information about Junos fusion for enterprise features, see the Junos Fusion
for Enterprise User Guide.
SEE ALSO
What's Changed | 80
Known Limitations | 81
Open Issues | 81
Resolved Issues | 82
Documentation Updates | 83
Migration, Upgrade, and Downgrade Instructions | 83
What's Changed
There are no changes in behavior of Junos OS features and changes in the syntax of Junos OS statements
and commands in Junos OS Release 20.2R3 for Junos fusion for enterprise.
SEE ALSO
What's New | 80
Known Limitations | 81
Open Issues | 81
Resolved Issues | 82
Documentation Updates | 83
Migration, Upgrade, and Downgrade Instructions | 83
81
Known Limitations
There are no known behaviors, system maximums, and limitations in hardware and software in Junos OS
Release 20.2R3 for Junos fusion for enterprise.
For the most complete and latest information about known Junos OS problems, use the Juniper Networks
online Junos Problem Report Search application.
SEE ALSO
What's New | 80
What's Changed | 80
Open Issues | 81
Resolved Issues | 82
Documentation Updates | 83
Migration, Upgrade, and Downgrade Instructions | 83
Open Issues
There are no known issues in hardware and software in Junos OS Release for 20.2R3 Junos fusion for
enterprise.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
SEE ALSO
What's New | 80
What's Changed | 80
Known Limitations | 81
Resolved Issues | 82
Documentation Updates | 83
Migration, Upgrade, and Downgrade Instructions | 83
82
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in the Junos OS main and maintenance releases for Junos fusion for
enterprise.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
There are no resolved issues in Junos OS Release 20.2R3 for Junos fusion for enterprise.
• The 100M SFP-FX is not supported as a satellite device in a Junos fusion setup. PR1514146
• Observing duplicate ECID values for cluster and extended ports on member ports of same cluster.
PR1408947
• Loop detection might not work on extended ports in a Junos fusion scenario. PR1460209
• The temperature sensor alarm is seen on EX4300 in a Junos fusion scenario. PR1466324
SEE ALSO
What's New | 80
What's Changed | 80
83
Known Limitations | 81
Open Issues | 81
Documentation Updates | 83
Migration, Upgrade, and Downgrade Instructions | 83
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 for documentation for Junos fusion for
enterprise.
SEE ALSO
What's New | 80
What's Changed | 80
Known Limitations | 81
Open Issues | 81
Resolved Issues | 82
Migration, Upgrade, and Downgrade Instructions | 83
IN THIS SECTION
Downgrading Junos OS | 88
84
This section contains the procedure to upgrade or downgrade Junos OS and satellite software for a Junos
fusion for enterprise. Upgrading or downgrading Junos OS and satellite software might take several hours,
depending on the size and configuration of the Junos fusion for enterprise topology.
When upgrading or downgrading Junos OS for an aggregation device, always use the junos-install package.
Use other packages (such as the jbundle package) only when so instructed by a Juniper Networks support
representative. For information about the contents of the junos-install package and details of the installation
process, see the Installation and Upgrade Guide.
NOTE: Before upgrading, back up the file system and the currently active Junos OS configuration
so that you can recover to a known, stable environment in case the upgrade is unsuccessful.
Issue the following command:
The installation process rebuilds the file system and completely reinstalls Junos OS. Configuration
information from the previous software installation is retained, but the contents of log files might
be erased. Stored files on the routing platform, such as configuration templates and shell scripts
(the only exceptions are the juniper.conf and ssh files), might be removed. To preserve the stored
files, copy them to another system before upgrading or downgrading the routing platform. See
the Junos OS Software Installation and Upgrade Guide.
1. Using a Web browser, navigate to the Download Software URL on the Juniper Networks webpage:
https://www.juniper.net/support/downloads/
2. Log in to the Juniper Networks authentication system using the username (generally your e-mail address)
and password supplied by Juniper Networks representatives.
3. Select By Technology > Junos Platform > Junos Fusion to find the software that you want to download.
4. Select the release number (the number of the software version that you want to download) from the
Version drop-down list on the right of the page.
9. Copy the software to the routing platform or to your internal software distribution site.
NOTE: We recommend that you upgrade all software packages out of band using the console
because in-band connections are lost during the upgrade process.
Customers in the United States and Canada, use the following commands, where n is the spin number.
All other customers, use the following commands, where n is the spin number.
• /pathname—For a software package that is installed from a local directory on the router.
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
• http://hostname/pathname
The validate option validates the software package against the current configuration as a prerequisite
to adding the software package to ensure that the router reboots successfully. This is the default
behavior when the software package being added is a different release.
Adding the reboot command reboots the router after the upgrade is validated and installed. When the
reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.
If the aggregation device has two Routing Engines, perform a Junos OS installation on each Routing Engine
separately to minimize disrupting network operations as follows:
86
1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine and save the
configuration change to both Routing Engines.
2. Install the new Junos OS release on the backup Routing Engine while keeping the currently running
software version on the master Routing Engine.
3. After making sure that the new software version is running correctly on the backup Routing Engine,
switch over to the backup Routing Engine to activate the new software.
4. Install the new software on the original master Routing Engine that is now active as the backup Routing
Engine.
For the detailed procedure, see the Installation and Upgrade Guide.
There are multiple methods to upgrade or downgrade satellite software in your Junos Fusion for Enterprise.
See Configuring or Expanding a Junos Fusion for Enterprise.
For satellite device hardware and software requirements, see Understanding Junos Fusion for Enterprise
Software and Hardware Requirements.
Use the following command to install Junos OS on a switch before converting it into a satellite device:
NOTE: The following conditions must be met before a Junos switch that is running Junos OS
Release 14.1X53-D43 can be converted to a satellite device when the action is initiated from
the aggregation device:
• The switch running Junos OS can be converted only to SNOS 3.1 and later.
• Either the switch must be set to factory-default configuration by using the request system
zeroize command, or the following command must be included in the configuration: set chassis
auto-satellite-conversion.
When the interim installation has completed and the switch is running a version of Junos OS that is
compatible with satellite device conversion, perform the following steps:
[edit]
user@satellite-device# request system zeroize
87
NOTE: The device reboots to complete the procedure for resetting the device.
If you are not logged in to the device using the console port connection, your connection to the device
is lost after you enter the request system zeroize command.
If you lose connection to the device, log in using the console port.
3. (EX4300 switches only) After the reboot is complete, convert the built-in 40-Gbps QSFP+ interfaces
from Virtual Chassis ports (VCPs) into network ports:
For example, to convert all four built-in 40-Gbps QSFP+ interfaces on an EX4300-24P switch into
network ports:
This step is required for the 40-Gbps QSFP+ interfaces that will be used as uplink interfaces in a Junos
fusion topology. Built-in 40-Gbps QSFP+ interfaces on EX4300 switches are configured into VCPs by
default, and the default settings are restored after the device is reset.
After this initial preparation, you can use one of three methods to convert your switches into satellite
devices—autoconversion, manual conversion, or preconfiguration. See Configuring or Expanding a Junos
Fusion for Enterprise for detailed configuration steps for each method.
If you need to convert a satellite device to a standalone device, you must install a new Junos OS software
package on the satellite device and remove it from the Junos fusion topology. For more information, see
Converting a Satellite Device to a Standalone Device.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
88
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html
Downgrading Junos OS
Junos fusion for enterprise is first supported in Junos OS Release 16.1, although you can downgrade a
standalone EX9200 switch to earlier Junos OS releases.
To downgrade Junos fusion for enterprise, follow the procedure for upgrading, but replace the 20.2
junos-install package with one that corresponds to the appropriate release.
SEE ALSO
What's New | 80
What's Changed | 80
Known Limitations | 81
Open Issues | 81
Resolved Issues | 82
Documentation Updates | 83
89
IN THIS SECTION
What's New | 89
What's Changed | 91
Known Limitations | 91
Open Issues | 92
Resolved Issues | 92
Documentation Updates | 93
These release notes accompany Junos OS Release 20.2R3 for Junos fusion for provider edge. They describe
new and changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What's New
IN THIS SECTION
Learn about new features introduced in this release for Junos fusion for provider edge.
90
There are no new features or enhancements to existing features for Junos fusion for provider edge in
Junos OS Release 20.2R3.
There are no new features or enhancements to existing features for Junos fusion for provider edge in
Junos OS Release 20.2R2.
Hardware
• Support for QFX5110 as a satellite device in a Junos fusion for provider edge on a GNF(MX480 and
MX960)—With Junos Node Slicing, you can create guest network functions (GNFs), partitions where an
aggregation device can be configured. The aggregation device on a GNF supports a maximum of 10
satellite devices. Starting in Junos OS Release 20.2R1, Junos OS supports QFX5110 switches as satellite
devices in Junos fusion for provider edge on a GNF.
[See Understanding Junos Fusion Provider Edge Software and Hardware Requirements and Junos Node
Slicing Overview.]
Junos Fusion
• MPC10E and MPC11E interoperability with Junos fusion for provider edge (MX240, MX480, MX960,
MX2010, and MX2020)—Starting in Junos OS Release 20.2R1, Junos OS supports using the MPC10E
and MPC11E alongside other MPC line cards in the same MX Series router chassis that has been
configured with Junos fusion for provider edge. The line cards can coexist in the same router chassis,
and the router passes traffic between the devices connected to the MPC10E/MPC11E and the satellite
devices that are connected to other MPC line cards through the switch fabric. You cannot use
MPC10E/MPC11E in Junos fusion, which means you cannot connect satellite devices to ports on the
MPC10E/MPC11E line cards.
Junos fusion does not support hyper mode. To support Junos fusion in an MX Series router where
MPC10E/MPC11E coexists with other MPC line cards, use the set forwarding-options no-hyper-mode
statement. In addition, you must also use an FPC slot ID in the range of 160—252 for the satellite device
interfaces. To configure the FPC slot ID, use the set chassis satellite-management fpc slot-id statement.
SEE ALSO
What's Changed | 91
91
Known Limitations | 91
Open Issues | 92
Resolved Issues | 92
Documentation Updates | 93
Migration, Upgrade, and Downgrade Instructions | 94
What's Changed
There are no changes in the behavior of Junos OS features or in the syntax of Junos OS statements and
commands in this release for Junos fusion for provider edge.
SEE ALSO
What's New | 89
Known Limitations | 91
Open Issues | 92
Resolved Issues | 92
Documentation Updates | 93
Migration, Upgrade, and Downgrade Instructions | 94
Known Limitations
There are no known behaviors, system maximums, and limitations in hardware and software in Junos OS
Release 20.2R3 for Junos fusion for provider edge.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
SEE ALSO
What's New | 89
What's Changed | 91
Open Issues | 92
Resolved Issues | 92
92
Documentation Updates | 93
Migration, Upgrade, and Downgrade Instructions | 94
Open Issues
There are no known issues in the Junos OS Release 20.2R3 for Junos fusion for provider edge.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
SEE ALSO
What's New | 89
What's Changed | 91
Known Limitations | 91
Resolved Issues | 92
Documentation Updates | 93
Migration, Upgrade, and Downgrade Instructions | 94
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in the Junos OS main and maintenance releases for Junos fusion for
provider edge.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
93
SEE ALSO
What's New | 89
What's Changed | 91
Known Limitations | 91
Open Issues | 92
Documentation Updates | 93
Migration, Upgrade, and Downgrade Instructions | 94
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for Junos fusion for provider
edge.
SEE ALSO
What's New | 89
What's Changed | 91
Known Limitations | 91
94
Open Issues | 92
Resolved Issues | 92
Migration, Upgrade, and Downgrade Instructions | 94
IN THIS SECTION
This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for
Junos OS for Junos fusion for provider edge. Upgrading or downgrading Junos OS might take several
hours, depending on the size and configuration of the network.
When upgrading or downgrading Junos OS, always use the jinstall package. Use other packages (such as
the jbundle package) only when so instructed by a Juniper Networks support representative. For information
about the contents of the jinstall package and details of the installation process, see the Installation and
Upgrade Guide.
95
NOTE: Before upgrading, back up the file system and the currently active Junos OS configuration
so that you can recover to a known, stable environment in case the upgrade is unsuccessful.
Issue the following command:
The installation process rebuilds the file system and completely reinstalls Junos OS. Configuration
information from the previous software installation is retained, but the contents of log files might
be erased. Stored files on the routing platform, such as configuration templates and shell scripts
(the only exceptions are the juniper.conf and ssh files), might be removed. To preserve the stored
files, copy them to another system before upgrading or downgrading the routing platform. See
the Installation and Upgrade Guide.
The download and installation process for Junos OS Release 20.2R1 is different from that for earlier Junos
OS releases.
1. Using a Web browser, navigate to the Download Software URL on the Juniper Networks webpage:
https://www.juniper.net/support/downloads/
2. Log in to the Juniper Networks authentication system by using the username (generally your e-mail
address) and password supplied by Juniper Networks representatives.
3. Select By Technology > Junos Platform > Junos fusion to find the software that you want to download.
4. Select the release number (the number of the software version that you want to download) from the
Version drop-down list to the right of the page.
9. Copy the software to the routing platform or to your internal software distribution site.
NOTE: We recommend that you upgrade all software packages out-of-band using the console,
because in-band connections are lost during the upgrade process.
Customers in the United States and Canada, use the following commands.
NOTE: We recommend that you use 64-bit Junos OS software when implementing Junos
fusion for provider edge.
NOTE: We recommend that you use 64-bit Junos OS software when implementing Junos
fusion for provider edge.
• /pathname—For a software package that is installed from a local directory on the router.
97
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
• http://hostname/pathname
The validate option validates the software package against the current configuration as a prerequisite
for adding the software package to ensure that the router reboots successfully. This is the default
behavior when the software package being added is for a different release.
Adding the reboot command reboots the router after the upgrade is validated and installed. When the
reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.
NOTE: After you install a Junos OS Release 20.2R1 jinstall package, you cannot return to the
previously installed software by issuing the request system software rollback command. Instead,
you must issue the request system software add validate command and specify the jinstall
package that corresponds to the previously installed software.
If the aggregation device has two Routing Engines, perform a Junos OS installation on each Routing Engine
separately as follows to minimize disrupting network operations:
1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine and save the
configuration change to both Routing Engines.
2. Install the new Junos OS release on the backup Routing Engine while keeping the currently running
software version on the master Routing Engine.
3. After making sure that the new software version is running correctly on the backup Routing Engine,
switch over to the backup Routing Engine to activate the new software.
4. Install the new software on the original master Routing Engine that is now active as the backup Routing
Engine.
For the detailed procedure, see the Installation and Upgrade Guide.
Satellite devices in a Junos fusion topology use a satellite software package that is different from the
standard Junos OS software package. Before you can install the satellite software package on a satellite
98
device, you first need to upgrade the target satellite device to an interim Junos OS software version that
can be converted to satellite software. For satellite device hardware and software requirements, see
Understanding Junos fusion Software and Hardware Requirements
NOTE: The following conditions must be met before a standalone switch that is running Junos
OS Release 14.1X53-D43 can be converted to a satellite device when the action is initiated from
the aggregation device:
• Either the switch must be set to factory-default configuration by using the request system
zeroize command, or the following command must be included in the configuration: set chassis
auto-satellite-conversion.
When the interim installation has completed and the switch is running a version of Junos and OS on one
line that is compatible with satellite device conversion, perform the following steps:
[edit]
user@satellite-device# request system zeroize
NOTE: The device reboots to complete the procedure for resetting the device.
If you are not logged in to the device by using the console port connection, your connection to the
device is lost after you enter the request system zeroize command.
If you lose your connection to the device, log in using the console port.
99
3. (EX4300 switches only) After the reboot is complete, convert the built-in 40-Gbps QSFP+ interfaces
from Virtual Chassis ports (VCPs) into network ports:
For example, to convert all four built-in 40-Gbps QSFP+ interfaces on an EX4300-24P switch into
network ports:
This step is required for the 40-Gbps QSFP+ interfaces that will be used as uplink interfaces in a Junos
fusion topology. Built-in 40-Gbps QSFP+ interfaces on EX4300 switches are configured into VCPs by
default, and the default settings are restored after the device is reset.
After this initial preparation, you can use one of three methods to convert your switches into satellite
devices—autoconversion, manual conversion, and preconfiguration. See Configuring Junos fusion for
provider edge for detailed configuration steps for each method.
If you need to convert a satellite device to a standalone device, you must install a new Junos OS software
package on the satellite device and remove the satellite device from the Junos fusion topology.
NOTE: If the satellite device is a QFX5100 switch, you need to install a PXE version of Junos
OS. The PXE version of Junos OS is software that includes pxe in the Junos OS package name
when it is downloaded from the Software Center—for example, the PXE image for Junos OS
Release 14.1X53-D43 is named install-media-pxe-qfx-5-14.1X53-D43.3-signed.tgz . If the
satellite device is an EX4300 switch, you install a standard jinstall-ex-4300 version of Junos OS.
The following steps explain how to download software, remove the satellite device from Junos fusion, and
install the Junos OS software image on the satellite device so that the device can operate as a standalone
device.
100
1. Using a Web browser, navigate to the Junos OS software download URL on the Juniper Networks
webpage:
https://www.juniper.net/support/downloads
2. Log in to the Juniper Networks authentication system by using the username (generally your e-mail
address) and password supplied by Juniper Networks representatives.
3. Select By Technology > Junos Platform > Junos fusion from the drop-down list and select the switch
platform series and model for your satellite device.
4. Select the Junos OS Release 14.1X53-D30 software image for your platform.
7. Copy the software to the routing platform or to your internal software distribution site.
8. Remove the satellite device from the automatic satellite conversion configuration.
If automatic satellite conversion is enabled for the satellite device’s member number, remove the
member number from the automatic satellite conversion configuration. The satellite device’s member
number is the same as the FPC slot ID.
[edit]
user@aggregation-device# delete chassis satellite-management auto-satellite-conversion
satellite member-number
[edit]
user@aggregation-device# delete chassis satellite-management auto-satellite-conversion
satellite 101
You can check the automatic satellite conversion configuration by entering the show command at the
[edit chassis satellite-management auto-satellite-conversion] hierarchy level.
[edit]
user@aggregation-device# commit synchronize
101
[edit]
user@aggregation-device# commit
10. Install the Junos OS software on the satellite device to convert the device to a standalone device.
[edit]
user@aggregation-device> request chassis satellite install URL-to-software-package fpc-slot
member-number
For example, to install a PXE software package stored in the /var/tmp directory on the aggregation
device onto a QFX5100 switch acting as the satellite device using FPC slot 101:
[edit]
user@aggregation-device> request chassis satellite install
/var/tmp/install-media-pxe-qfx-5-14.1X53-D43.3-signed.tgz fpc-slot 101
For example, to install a software package stored in the var/tmp directory on the aggregation device
onto an EX4300 switch acting as the satellite device using FPC slot 101:
[edit]
user@aggregation-device> request chassis satellite install
/var/tmp/jinstall-ex-4300-14.1X53-D30.3-domestic-signed.tgz fpc-slot 101
The satellite device stops participating in the Junos fusion topology after the software installation starts.
The software upgrade starts after this command is entered.
11. Wait for the reboot that accompanies the software installation to complete.
12. When you are prompted to log back into your device, uncable the device from the Junos fusion topology.
See Removing a Transceiver from a QFX Series Device or Remove a Transceiver, as needed. Your device
has been removed from Junos fusion.
NOTE: The device uses a factory-default configuration after the Junos OS installation is
complete.
When you upgrade an aggregation device to Junos OS Release 20.2R3, you must also upgrade your satellite
device to Satellite Device Software version 3.1R1.
102
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
To downgrade from Release 20.1 to another supported release, follow the procedure for upgrading, but
replace the 20.1 jinstall package with one that corresponds to the appropriate release.
SEE ALSO
What's New | 89
What's Changed | 91
Known Limitations | 91
Open Issues | 92
Resolved Issues | 92
Documentation Updates | 93
103
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for the MX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What's New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for MX Series routers.
104
There are no new features or enhancements to existing features for MX Series routers in Junos OS Release
20.2R3.
OAM
• Inline CCM Support for MPC10E (MX Series)—Starting in Junos OS Release 20.2R2S3, Junos OS extends
support for inline continuity check messages (CCM) on the MPC10E (MPC10E-10C-MRATE and
MPC10E-15C-MRATE) line cards. You can configure inline CCM for both UP MEP and Down MEP to
monitor services provided by currently deployed topologies such as INET, CCC/VPWS, Bridge, VPLS,
EVPN, and others. Junos OS extends MIP support for all current supported topologies.
Services Applications
• AMS support (MX240, MX480, MX960, MX2010, and MX2020 routers)—In Release 20.2R2S2, Junos
OS supports AMS (Aggregated Multiservices Interfaces on the MPC10E and MX2K-MPC11E line cards
to provide load balancing (LB) and high availability (HA) features for stateful firewall and NAT services.
You can configure AMS with next-hop style service-sets and with MS-MPC only.
There are no new features or enhancements to existing features for MX Series routers in Junos OS Release
20.2R2.
105
The DHCP server uses DHCPv6 options 59 and 17 and applicable suboptions to exchange ZTP-related
information between itself and the DHCP client.
NOTE: Only HTTP and HTTPS transport protocols are supported EX3400, EX4300, QFX5100,
and QFX5200 devices.
[See Assigning Rewrite Rules on a Per-Customer Basis Using Policy Maps Overview.]
EVPN
• IPv4 unicast VXLAN encapsulation optimization (MX204, MX240, MX480, MX960, MX2008, MX2010,
MX2020, MX10003, MX10008, and MX10016)—Starting in Junos OS Release 20.2R1, by default, the
listed MX Series routers optimize the IPv4 unicast VXLAN encapsulation process for the following tunnel
types:
• PIM-based VXLAN
• EVPN-VXLAN
• Static VXLAN
106
The optimized encapsulation process results in an increased throughput rate for IPv4 unicast packets
between 512 to 1500 bytes in size.
• EVPN on MPLS-over-UDP tunnels (MX Series and vMX)—Starting in Junos OS Release 20.2R1, Junos
OS supports an EVPN network with MPLS-over-UDP tunnels. EVPN uses indirect next hop while
MPLS-over-UDP tunnels use tunnel composite next hop (TCNH) in resolving routes in the routing table.
In Junos OS releases before Release 20.2R1, indirect next hops for EVPN traffic on MPLS-over-UDP
tunnels resolve into unicast next hops. With this release, the indirect next hops for EVPN traffic on
MPLS-over-UDP tunnels will resolve into TCNH.
[See EVPN Overview and Example: Configuring Next-Hop-Based MPLS-Over-UDP Dynamic Tunnels.]
• Support for inline performance monitoring services on EVPN (MX Series)—Starting in Junos OS Release
20.2R1, you can enable inline performance monitoring services on an EVPN network. With inline
performance monitoring, you can configure a greater number of performance monitoring sessions. Inline
performance monitoring applies only to delay measurements and synthetic loss measurements. You
must also enable both enhanced IP network services and enhanced CFM mode in the device.
[See Connectivity Fault Management Support for EVPN and Layer 2 VPN Overview.]
• Noncolored SR-TE LSPs with EVPN-MPLS (ACX5448, EX9200, MX Series, and vMX)—Starting in Junos
OS Release 20.2R1, ACX5448, EX9200, MX Series, and vMX routers support noncolored static segment
routing-traffic engineered (SR-TE) label-switched paths (LSPs) with an EVPN-MPLS core network and
the following Layer 2 services running at the edges of the network:
• E-LAN
• EVPN-ETREE
Without color, all LSPs resolve using a BGP next hop only.
107
The Juniper Networks routers support noncolored SR-TE LSPs in an EVPN-MPLS core network with
the following configurations:
The Juniper Networks routers also support noncolored SR-TE LSPs when functioning as a Data Center
Interconnect (DCI) device that handles EVPN Type 5 routes.
• Layer 3 gateway in an EVPN-MPLS environment (MPC10 and MPC11 line cards with MX240, MX480,
and MX960)—Starting in Junos OS Release 20.2R1, the supported MX Series routers with MPC10 and
MPC11 line cards can act as a default Layer 3 gateway for an EVPN instance (EVI), which can span a set
of routers. In this role, the MX Series routers can perform inter-subnet forwarding. With inter-subnet
forwarding, each subnet represents a distinct broadcast domain.
• IRB interfaces through which the default gateway routes IPv4 and IPv6 traffic from one bridge domain
to another [See Example: Configuring EVPN with IRB Solution.]
• Dynamic list next hop [See Configuring Dynamic List Next Hop.]
• EVPN proxy ARP and ARP suppression, and proxy NDP and NDP suppression on IRB interfaces [See
EVPN Proxy ARP and ARP Suppression, and Proxy NDP and NDP Suppression.]
• The substitution of a source MAC address with a proxy MAC address in an ARP or NDP reply [See
ARP and NDP Request with a Proxy MAC Address.]
• Data center interconnectivity using EVPN Type 5 routes [See EVPN Type-5 Route with MPLS
encapsulation for EVPN-MPLS.]
• Multihoming in an EVPN-MPLS environment (MPC10 and MPC11 line cards with MX240, MX480, and
MX960)—Starting in Junos OS Release 20.2R1, you can multihome a customer edge (CE) device to two
or more provider edge (PE) devices (the supported MX Series routers with MPC10 and MPC11 line
cards) in an EVPN-MPLS network. We support the following multihoming features:
• EVPN-VXLAN (MPC10 and MPC11 line cards with MX2010, MX2020)—Starting in Junos OS Release
20.2R1, the MX2010 and MX2020 routers with MPC10 and MPC11 line cards installed support the
following EVPN-VXLAN features:
• Layer 2 VXLAN
108
• Multihoming with active/active and active/standby modes, an Ethernet segment identifier (ESI) per
interface, and preference-based designated forwarder (DF) election
• QoS
• Prevention of broadcast, unknown unicast, and multicast (BUM) traffic loops when a leaf device is
multihomed to more than one spine device
• Layer 3 VXLAN
• IRB interfaces
• Support for OSPF, IS-IS, BGP, and static routing over IRB interfaces
• Proxy ARP and ARP suppression, and proxy NDP and NDP suppression with and without IRB
interfaces
• IPv6 underlay
• High availability
• Graceful restart from a routing process restart or Routing Engine switchover without NSR enabled
• Static VXLAN
• LACP inline support during unified ISSU for multivendor networks (MX104, MX240, MX480, MX960,
and MX10003)—Starting with Junos OS Release 20.2R1, unified ISSU supports LACP interoperability
with other vendor devices for fast periodic interval sessions. LACP sessions in full-scale scenarios with
interoperability will no longer experience timeouts during unified ISSU.
Use the set protocols lacp ppm inline command to enable LACP inline support.
• Support for failover configuration synchronization for the ephemeral database (EX Series, MX Series,
MX Series Virtual Chassis, PTX Series, and QFX Series)—Starting in Junos OS Release 20.2R1, when
you configure the commit synchronize statement at the [edit system] hierarchy level in the static
configuration database of an MX Series Virtual Chassis or dual Routing Engine device, the backup Routing
Engine will synchronize both the static and ephemeral configuration databases when it synchronizes its
configuration with the master Routing Engine. This happens, for example, when a backup Routing Engine
is newly inserted, comes back online, or changes roles. On a dual Routing Engine system, the backup
Routing Engine synchronizes both configuration databases with the master Routing Engine. In an MX
Series Virtual Chassis, the master Routing Engine on the protocol backup synchronizes both configuration
databases with the master Routing Engine on the protocol master.
• Support for VRRP on the MPC10 and MPC11 (MX240, MX480, and MX960)—Starting in Junos OS
Release 20.2R1, VRRP is supported on the MPC11 and MPC10 line cards. All VRRP features are supported.
• Unsupported hardware for unified ISSU (MX240, MX480, MX960, MX10003, and PTX3000)—The
following cards do not support unified ISSU upgrading to Junos OS Release 20.2R1:
• MPC7E-MRATE
• MPC10E-10C-MRATE
• MPC10E-15C-MRATE
• PTX5000 with 24-Port 10-Gigabit Ethernet, 40-Gigabit Ethernet PIC with QSFP+ or 15-Port 10-Gigabit,
40-Gigabit Ethernet, 100-Gigabit Ethernet PIC with QSFP28
• Transparency for untagged CFM PDU on interface with native VLAN configuration.
• Support for 400-Gbps port speed (MX240, MX480, and MX960)—In Junos OS Release 20.2R1, you can
configure port speed of 400-Gbps for MPC10E (MPC10E-10C-MRATE and MPC10E-15C-MRATE) on
MX240, MX480, and MX960 routers. Use the QSFP56-DD optics to configure 400-Gbps port speed
on:
• Support for monitoring link degradation (MX Series routers with MPC10E)—Starting in Junos OS
Release 20.2R1, you can monitor link degradation of the 10-Gigabit Ethernet interfaces, 40-Gigabit
Ethernet interfaces, and 100-Gigabit Ethernet interfaces on the MPC10E (MPC10E-15C-MRATE and
MPC10E-10C-MRATE) line cards. Link degradation monitoring enables you to monitor the quality of
physical links on interfaces and take corrective action when the link quality degrades beyond a certain
value.
To enable your device to monitor the links, use the link-degrade-monitor statement at the [edit interfaces
interface-name] hierarchy level.
• Targeted broadcast support (MPC10E and MX2K-MPC11E)—Starting in Junos OS Release 20.2R1, you
can configure targeted broadcast on broadcast interfaces on the MPC10E and MX2K-MPC11E line
cards. Targeted broadcast enables a broadcast packet, destined for a remote network, to transit across
networks until the destination network is reached. In the destination network, the packet is broadcast
as a normal broadcast packet. This feature is useful when the Routing Engine is flooded with packets to
process. You can configure targeted broadcast to forward the packets to :
To configure targeted broadcast on an interface, include the targeted-broadcast statement at the [edit
interfaces interface-name unit logical-unit-number family inet] hierarchy level.
This feature applies to all routes programmed using the rib_service JET API where an interface is
configured as a direct next hop, including interfaces that are part of a flexible tunnel. It also applies to
tunnels configured with the flexible_tunnel_service JET API.
[See rib-service (programmable-rpd), Juniper Extension Toolkit Developer Guide, and Juniper Engineering
Network website.]
• Python 3 support for JET (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS can use Python 3 to execute JET scripts. To
enable unsigned JET Python applications that support Python 3 to run on devices running Junos OS,
use the set system scripts language python3 command.
[See language (Scripts), Develop Off-Device JET Applications, and Develop On-Device JET Applications.]
[See Mapping OpenConfig Routing Policy Commands to Junos Configuration and Mapping OpenConfig
Network Instance Commands to Junos Operation.]
• ON-CHANGE BGP peer information statistics support for JTI (MX960, MX2008, MX2010, MX2020,
PTX1000, PTX5000, PTX10000, QFX5100, and QFX5200)—Junos OS Release 20.2R1 provides BGP
peer sensor support using Junos telemetry interface (JTI) and remote procedure call (gRPC) services or
gRPC Network Management Interface (gNMI) services. ON_CHANGE statistics are sent to an outside
collector.
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/active (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/received (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/sent (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/rejected (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/admin-state
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
established-transitions (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
last-established (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
received/notification (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/messages/
received/update (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
sent/notification (stream
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
sent/update (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
session-state (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
supported-capabilities (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/local-address
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/remote-address
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/remote-port
(ON_CHANGE)
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
113
• Telemetry support for LDP and MLDP traffic statistics (MX Series and PTX Series)—Starting in Junos
OS Release 20.2R1, the following LDP and multipoint LDP native sensors are added for the Junos
telemetry interface:
• /junos/services/ldp/label-switched-path/ingress/usage/
• /junos/services/ldp/label-switched-path/transit/usage/
• /junos/services/ldp/p2mp/interface/receive/usage/
• /junos/services/ldp/p2mp/interface/transmit/usage/
• /junos/services/ldp/p2mp/label-switched-path/usage/
You must enable telemetry streaming with the sensor-based-stats option at the [edit protocols ldp
traffic-statistics] hierarchy level.
The show ldp traffic-statistics command is enhanced to display upstream LDP traffic statistics and to
display multipoint LDP traffic statistics per interface.
On PTX Series routers, this feature is not supported for the following variants:
• PTX10003
• gRPC telemetry support for LDP and MLDP traffic statistics (MX Series)—Starting in Junos OS Release
20.2R1, gRPC support is available to export LDP and multipoint LDP traffic statistics. You can use the
following resource paths to export sensor data:
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• JTI sensor support for Packet Forwarding Engine and Routing Engine sensors (MX Series Virtual Chassis
and MX Series routers with dual Routing Engines)—Junos OS Release 20.2R1 extends Junos telemetry
interface (JTI) sensor support for all Packet Forwarding Engine and Routing Engine sensors currently
114
supported on MX Series routers to include MX routers with dual Routing Engines or MX Series Virtual
Chassis. The level of sensor support currently available for MX Series routers applies, whether through
streaming or ON_CHANGE statistics export, using UDP, remote procedure call (gRPC) services or gRPC
Network Management Interface (gNMI) services. Additionally, JTI operational mode commands will
provide details for all Routing Engines and MX Series Virtual Chassis, too.
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• JTI sensor support for standby Routing Engine statistics (MX480, MX960, MX10003, MX2010, and
MX2020)—Junos OS Release 20.2R1 provides Junos telemetry interface (JTI) sensor support for standby
Routing Engine statistics using remote procedure call (gRPC) services. This feature is supported on both
single chassis and virtual chassis unless otherwise indicated. Use this feature to better track the state
of software components running on a standby Routing Engine. Statistics exported to an outside collector
through the following sensors (primarily under subscriber management) provide a more complete view
of the system health and resiliency state:
• Per Routing Engine DHCP binding statistics for server or relay sensor /junos/system/
subscriber-management/chassis/routing-engines/routing-engine/dhcp-bindings/
dhcp-element[dhcp-type-name=RelayOrServer/v4] and /junos/system/subscriber-management/
chassis/routing-engines/routing-engine/dhcp-bindings/dhcp-element[dhcp-type-name=RelayOrServer/
v6]
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface) and Understanding OpenConfig
and gRPC on Junos Telemetry Interface.]
• CPU statistics support on JTI (MX960, MX2010, MX2020, PTX1000, PTX5000, PTX10000, QFX5100,
and QFX5200)—Junos OS Release 20.2R1 supports streaming various CPU statistics and process
parameters using remote procedure call (gRPC) or gRPC Network Management Interface (gNMI) services
and Junos telemetry interface (JTI). You can stream CPU usage per process (statistics are similar to output
115
from the show system process detail operational mode command), as well as CPU usage per Routing
Engine core.
To stream statistics to an outside collector, include the following resource paths in a gRPC or gNMI
subscription:
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• TARGET_DEFINED subscription mode support with JTI (MX5, MX10, MX40, MX80, MX104, MX150,
MX204, MX240, MX480, MX960, MX2008, MX2010, MX2020, MX10003, MX10008, and
MX10016)—Junos OS Release 20.2R1 adds support for TARGET-DEFINED mode for subscriptions made
using gRPC Network Management Interface (gNMI) services.
Using a gNMI subscription, an external collector stipulates how sensor data should be delivered:
• STREAMING mode periodically streams sensor data from the DUT at a specified interval.
• ON_CHANGE mode sends updates for sensor data from the DUT only when data values change.
• Newly supported TARGET_DEFINED mode (submode 0) instructs the DUT to select the relevant mode
(STREAMING or ON_CHANGE) to deliver each element (leaf) of sensor data to the external collector.
When a subscription for a sensor with submode 0 is sent from the external collector to the DUT, the
DUT responds, activating the sensor subscription so that periodic streaming does not include any of
the ON_CHANGE updates. However, the DUT will notify the collector whenever qualifying
ON_CHANGE events occur.
[See Understanding OpenConfig and gRPC and gNMI on Junos Telemetry Interface.]
• Packet Forwarding Engine sensor support with INITIAL_SYNC on JTI (MX960, MX2008, MX2010,
MX2020, PTX1000, PTX5000, PTX10000 line of routers, QFX5100, and QFX5200)—Starting in Junos
OS Release 20.2R1, you can use Junos telemetry interface (JTI) and gRPC Network Management Interface
(gNMI) services to export Packet Forwarding Engine statistics from devices to an outside collector using
gNMI submode INITIAL_SYNC. When an external collector sends a subscription request for a sensor
with INITIAL_SYNC (gnmi-submode 2), the host sends all supported target leaves (fields) under that
resource path at least once to the collector with the current value. This is valuable because:
• The collector has a complete view of the current state of every field on the device for that sensor
path.
• Event-driven data (ON_CHANGE) is received by the collector at least once before the next event is
seen. In this way, the collector is aware of the data state before the next event happens.
• Packet Forwarding Engine sensors that contain zero counter values (zero-suppressed) that normally
do not show up in streamed data are sent, ensuring that all fields from each line card (also referred to
as source) are known to the collector.
116
NOTE: ON_CHANGE data is not available for native (UDP) Packet Forwarding Engine Sensors.
INITIAL_SYNC submode requires that at least one copy to be sent to the collector; however, sending
more than one is acceptable.
• Sensor for physical interface traffic except queue statistics (resource path /junos/system/linecard/
interface/traffic/)
[See Understanding OpenConfig and gRPC and gNMI on Junos Telemetry Interface and Guidelines for
gRPC and gNMI Sensors (Junos Telemetry Interface).]
• Export data using JSON encoding format with JTI (MX5, MX10, MX40, MX80, MX104, MX150, MX204,
MX240, MX480, MX960, MX2008, MX2010, MX2020, MX10003, MX10008, and MX10016)—Junos
OS Release 20.2R1 adds support for JavaScript Object Notation (JSON) encoding to export telemetry
data using gRPC network management interface (gNMI) services and Junos telemetry interface (JTI).
JSON is an open standard file format and data interchange format that provides a good balance of
usability and performance. It uses human-readable text to store and transmit data objects consisting of
attribute–value pairs and array data types.
To export telemetry data using JSON encoding, include format json-gnmi at the [edit services analytics
export-profile profile-name] hierarchy level. This is part of the export profile CLI configuration used to
configure collector and sensor details in Junos OS.
• SR-TE statistics for uncolored SR-TE policies streaming on JTI (MX240. MX480, MX960, MX2010, and
MX2020 with MPC-10E or MPC-11E)—Junos OS Release 20.2R1 provides segment routing-traffic
engineering (SR-TE) per label-switched path (LSP) route statistics using Junos telemetry interface (JTI)
117
and remote procedure call (gRPC) services. Using JTI and gRPC services, you can stream SR-TE telemetry
statistics for uncolored SR-TE policies to an outside collector.
Ingress statistics include statistics for all traffic steered by means of an SR-TE LSP. Transit statistics
include statistics for traffic to the binding SID (BSID) of the SR-TE policy.
To enable these statistics, include the per-source per-segment-list statement at the [edit protocols
source-packet-routing telemetry statistics] hierarchy level.
If you issue the set protocols source-packet-routing telemetry statistics no-ingress command, ingress
sensors are not created.
If you issue the set protocols source-packet-routing telemetry statistics no-transit command, transit
sensors are not created. Otherwise, if BSID is configured for a tunnel, transit statistics are created.
• /junos/services/segment-routing/traffic-engineering/tunnel/lsp/ingress/usage/
• /junos/services/segment-routing/traffic-engineering/tunnel/lsp/transit/usage/
To provision the sensor to export data through gRPC services, use the telemetrySubscribe RPC.
Streaming telemetry data through gRPC or gNMI also requires the OpenConfig for Junos OS module.
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface), source-packet-routing, and
show spring-traffic-engineering lsp detail name name.]
Layer 2 VPN
• Support for Layer 2 interworking (iw0) interface on the MPC10E and MPC11E line cards (MX
Series)—Starting in Junos OS Release 20.2R1, you can connect Layer 2 networks together by configuring
a Layer 2 interworking (iw0) route with iw0 interfaces. This feature supports the following
interconnections:
[See Using the Layer 2 Interworking Interface to Interconnect a Layer 2 Circuit to a Layer 2 VPN and
Layer 2 VPN to Layer 2 VPN Connections.]
Layer 3 Features
• MPC10E interoperates with MS-MPC/MS-MICs for Layer 3 Services (MX240,MX480, and
MX960)—Starting in Junos OS Release 20.2, the MPC10E interoperates with MS-MPC/MS-MICs for
Layer 3 Services such as active flow monitoring, IPSec, NAT, RPM, and stateful firewall. [See Layer 2
and Layer 3 Features on MX Series Routers.]
Management
• Error recovery, fault handling, and resiliency support for MX2K-MPC11E (MX2010 and
MX2020)—Starting in Junos OS Release 20.2R1, the MX2010 and MX2020 routers with the
MX2K-MPC11E line card support error recovery, fault handling, and software resiliency. The
MX2K-MPC11E line cards support detecting errors, reporting them through alarms, and triggering
resultant actions. To view application-level errors, use the show trace node fpc<#> application
fabspoked-pfe command. To check the status of the card, use the show chassis fpc pic-status command.
Use the show chassis errors active command to view the fault details and the show system alarm
command to view the alarm details.
[See show chassis fpc pic-status and clear chassis fpc errors.]
MPLS
• Support to change the default re-merge behavior on the P2MP LSP (MX Series)—Starting with Junos
OS Release 20.2R1, you can change the default re-merge behavior on RSVP P2MP LSP. The term
re-merge refers to the case of an ingress (headend) or transit node (re-merge node) that creates a
re-merge branch intersecting the P2MP LSP at another node in the network. This may occur due to
events such as an error in path calculation, an error in manual configuration, or network topology changes
during the establishment of the P2MP LSP.
You can configure the no re-merge behavior on P2MP LSPs by enabling the newly introduced no-re-merge
and no-p2mp-re-merge CLI commands at the ingress (headend) and transit devices (re-merge nodes),
respectively.
• Support for MPLS ping and traceroute for segment routing (ACX Series, MX Series, and PTX
Series)—Starting in Junos OS Release 20.2R1, we extend the MPLS ping and traceroute support for all
types segment routing--traffic engineering (SR-TE) tunnels, including static segment routing tunnels,
BGP-SR-TE tunnels, and PCEP tunnels.
• FEC validation support, as defined in RFC 8287, for paths consisting of IGP segments. Target FEC
stack contains single or multiple segment ID sub-TLVs. This involves validating IPv4 IGP-Prefix Segment
and IGP-Adjacency Segment ID FEC-stack TLVs.
• BFD
[See traceroute mpls segment-routing spring-te and ping mpls segment routing spring-te.]
• MPLS support (MX Series routers with MPC10E and MPC11E)—Starting in Junos OS Release 20.2R1,
some of the MPLS features are supported on MX Series routers with MPC10E (MPC10E-15C-MRATE
and MPC10E-10C-MRATE) and MX2K-MPC11E line cards.
[See Protocols and Applications Supported by the MPC10E and Protocols and Applications Supported
by the MX2K-MPC11E.]
Multicast
• Fast failover according to flow rate (MX Series with MPC10E or MPC11E line cards)—Starting in Junos
OS Release 20.2R1, for routers operating in Enhanced IP Network Services mode, you can configure a
threshold that triggers fast failover in next-generation MVPNs with hot-root standby on the basis of
aggregate flow rate. For example, fast failover (as defined in Draft Morin L3VPN Fast Failover 05) is
triggered if the flow rate of monitored multicast traffic from the provider tunnel drops below the set
threshold.
[See min-rate.]
• mplsMldpInterfaceStatsTable
• mplsMldpFecUpstreamSessPackets
• mplsMldpFecUpstreamSessBytes
• mplsMldpFecUpstreamSessDiscontinuityTime
The multicast LDP standard MIB builds on the objects and tables that are defined in RFC3815, which
only supports LDP point-to-point label-switched paths (LSPs). This multicast LDP MIB provides support
for managing multicast LDP point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) LSPs.
[See Standard SNMP MIBs Supported by Junos OS and SNMP MIB Explorer.]
• Python 3 support for YANG scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS uses Python 3 to execute YANG action and
translation scripts that are written in Python. Junos OS does not support using Python 2.7 to execute
YANG Python scripts as of this release.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
120
• NETCONF sessions over outbound HTTPS (EX Series, MX Series, PTX1000, PTX3000, PTX5000,
PTX10001, PTX10002, PTX10008, PTX10016, QFX Series, SRX1500, SRX4100, SRX4200, SRX4600,
SRX5400, SRX5600, SRX5800, and vSRX)—Starting in Junos OS Release 20.2R1, the Junos OS with
upgraded FreeBSD software image includes a Juniper Extension Toolkit (JET) application that supports
establishing a NETCONF session using outbound HTTPS. The JET application establishes a persistent
HTTPS connection with a gRPC server over a TLS-encrypted gRPC session and authenticates the
NETCONF client using an X.509 digital certificate. A NETCONF session over outbound HTTPS enables
you to remotely manage devices that might not be accessible through other protocols, for example, if
the device is behind a firewall.
• Enhanced on-box monitoring support on the control plane (MX Series and PTX Series)—Starting in
Junos OS Release 20.2R1, you can configure traceoptions to track all events related to system-level and
process-level memory monitoring. You can also view the history of the actions taken for system-level
and process-level memory monitoring by using the show system monitor memory actions command.
• Support for HTTP Content Manager (HCM)—Starting in Junos OS Release 20.2R1, HTTP Content
Manager (HCM) is supported under Next Gen Services. HCM is an application that inspects the HTTP
traffic transmitted through port 80 (default) or any other port you use to transmit HTTP traffic. HCM
inspects HTTP traffic even if the default port 80 is not used for HTTP traffic and is interoperable with
ms, rms, and ams interface types. It supports fragmented HTTP request packets and GET, PUT, and
POST requests.
• Support for Mapping of Address and Port with Encapsulation (MAP-E) Softwires for CGNAT Next Gen
Services—Starting in Junos OS Release 20.2R1, Mapping of Address and Port with Encapsulation (MAP-E)
softwires are supported for CGNAT Next Gen Services. MAP-E is an automatic tunneling mechanism
tailored for deployment of IPv4 to end users via a service provider's IPv6 network infrastructure. Using
MAP-E technology, islands of v4 networks can be connected via v6 tunnels. The IPV4 packets are carried
in IPV4-over-IPV6 tunnels from the MAP-E Customer Edge (CE) routers to the MAP-E Border Relay(s)
(BR) (through IPV6 routing topology), where they are de-tunneled for further processing. MAP-E can be
used by Service Providers to provide IPv4 connectivity to their subscribers over the ISP's IPv6 access
network.
121
[See Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services.]
• Support for Network Address Translation and Protocol Translation for CGNAT Next Gen
Services—Starting in Junos OS Release 20.2R1, Network Address Translation and Protocol Translation
(NAT-PT) [RFC2766] are supported for CGNAT Next Gen Services. NAT-PT is a IPv4-to-IPv6 transition
mechanism that provides a way for end-nodes in IPv6 realm to communicate with end-nodes in IPv4
realm and vice versa. This is achieved using a combination of Network Address Translation and Protocol
Translation.
• Support for Port Control Protocol Support (PCP) for DS-Lite for CGNAT Next Gen Services—Starting
in Junos OS Release 20.2R1, Port Control Protocol Support (PCP) for DS-Lite is supported for CGNAT
Next Gen Services. DS-Lite is a technology which enables a broadband service provider to share IPv4
addresses among customers by combining two well-known technologies: IP in IP (IPv4-in-IPv6) and
Network Address Translation (NAT).
Typically, the home gateway embeds a Basic Bridging BroadBand (B4) capability that encapsulates IPv4
traffic into a IPv6 tunnel to the CGNAT, named the Address Family Transition Router (AFTR). AFTRs
are run by service providers.
PCP allows customer applications to create mappings in a NAT for new inbound communications destined
to machines located behind a NAT. In a DS-Lite environment, PCP servers control AFTR devices.
Junos OS supports the continuity check messages (CCM) and loopback messages as defined in IEEE
802.1ag.
In the case of denial of service (DoS) or ARP broadcast storms, ARP policers protect the Routing Engine
against malicious traffic intended to degrade the network.
Apply the ARP policer to a pseudowire interface at the [edit interfaces interface-name unit unit-number
family inet policer arp policy-name] level of the hierarchy.
122
• Support for P2MP and P2P automatic LSP policers (MX Series)—Starting in Junos OS Release 20.2R1,
support for automatic policers on point-to-multipoint (P2MP) label-switched paths (LSPs) is available on
MX240, MX480, MX960, MX2010, and MX2020 routers with MPC10E and MPC11E line cards.
P2MP MPLS LSP is either an LDP-signaled, or RSVP-signaled, LSP with a single source and multiple
destinations that can optimize packet replication at the ingress router. With it, packet replication only
occurs for packets being forwarded to two or more different destinations requiring different network
paths. Automatic LSP policing lets you provide strict service guarantees for network traffic in accordance
with the bandwidth configured for the LSPs.
• P2MP statistics
• Support for firewall forwarding (MX Series)—Starting in Junos OS Release 20.2R1, the following traffic
policers are supported on MX240, MX480, MX960, MX2010, and MX2020 routers with MPC10E or
MPC11E line cards:
• GRE tunnels, including encapsulation (family any), de-encapsulation, GRE-in-UDP over IPv6, and the
following sub-options: sample, forwarding class, interface group, and no-ttl-decrement
• Layer 2 policers
• Hierarchical policers
• Shared bandwidth
• Percentages
• Logical interfaces
Routing Protocols
• TI-LFA SRLG protection for IS-IS (MX Series and PTX Series)—Starting in Junos OS Release 20.2R1,
you can configure Shared Risk Link Group (SRLG) protection for segment routing to choose a fast reroute
path that does not include SRLG links in the topology-independent loop-free alternate (TI-LFA) backup
paths. This is in addition to existing fast reroute options such as link-protection, node protection, and
fate-sharing protection for segment routing. IS-IS computes the fast reroute path that is aligned with
the post-convergence path and excludes the SRLG of the protected link. All local and remote links that
are from the same SRLG as the protected link are excluded from the TI-LFA back up path. The point of
local repair (PLR) sets up the label stack for the fast reroute path with a different outgoing interface.
To enable TI-LFA SRLG protection with segment routing for IS-IS, include the srlg-protection statement
at the [edit protocols isis interface name level number post-convergence-lfa] hierarchy level.
[See Understanding Topology-Independent Loop-Free Alternate with Segment Routing for IS-IS.]
• Support for BGP-LU over SR-TE for color-based mapping of VPN Services (MX Series and PTX
Series)—Starting in Junos OS Release 20.2R1, we are extending support to BGP labeled unicast service
for color-based mapping of VPN services over Segment Routing-Traffic Engineering (SR-TE). This enables
you to advertise BGP-LU IPv6 and IPv4 prefixes with an IPv6 next-hop address in IPv6-only networks
where routers do not have any IPv4 addresses configured. With this feature, BGP-LU can now resolve
IPv4 and IPv6 routes over SR-TE core. BGP-LU constructs a colored protocol next hop, which is resolved
on a colored SR-TE tunnel in the inetcolor.0 or inet6color.0 table. Currently we support BGP IPv6 LU
over SR-TE with IS-IS underlay.
• Support for AIGP metric to MED translation (MX2010 and MX2020)—Starting in Release 20.2R1, Junos
OS supports the translation of AIGP metric to MED. You can enable this feature when you want the
end to end effective AIGP metric in order to choose the best path. Effective AIGP is the AIGP value
advertised with the route plus the IGP cost to reach the nexthop. This is especially useful in Inter-AS
MPLS VPNs solution, where customer sites are connected via two different service providers, and
customer edge routers want to take IGP metric based decision. You can configure a minimum-aigp to
prevent unnecessary update of route when effective-aigp changes past the previously known lowest
value.
The following configuration statements are introduced at the [edit protocols bgp group <group-name>
metric-out] hierarchy level:
• Support for Layer 2 circuit, Layer 2 VPN, and VPLS services with BGP labeled unicast (MX Series,
EX9204, EX9208, EX9214, EX9251, and EX9253 devices)—Starting with Junos OS Release 20.2R1, MX
Series, EX9204, EX9208, EX9214, EX9251, and EX9253 devices support BGP PIC Edge protection for
Layer 2 circuit, Layer 2 VPN, and VPLS (BGP VPLS, LDP VPLS and FEC 129 VPLS) services with BGP
124
labeled unicast as the transport protocol. BGP PIC Edge using the BGP labeled unicast transport protocol
helps to protect traffic failures over border nodes (ABR and ASBR) in multi-domain networks. Multi-domain
networks are typically used in metro-aggregation and mobile backhaul networks designs.
A prerequisite for BGP PIC Edge protection is to program the Packet Forwarding Engine (PFE) with
expanded next-hop hierarchy.
To enable BGP PIC Edge protection, use the following CLI configuration statements:
[edit protocols]
user@host#set bgp group group-name family inet labeled-unicast nexthop-resolution
preserve-nexthop-hierarchy;
[edit routing-options]
user@host#set rib routing-table-name protect core;
[edit protocols]
user@host#set l2circuit resolution preserve-nexthop-heirarchy;
[edit protocols]
user@host#set l2vpn resolution preserve-nexthop-heirarchy;
• Support for dynamic peer AS range for BGP groups (ACX Series, MX Series, PTX Series, and QFX
Series)—Starting in Junos OS Release 20.2R1, you can configure acceptable autonomous system (AS)
ranges for EBGP groups that can be used for bringing up BGP peers while establishing a BGP session.
BGP accepts a peer request based on the configured AS range and rejects a peer request if the AS does
not fall into the specified range. This allows you to control BGP peering when the neighbor’s exact IP
address is not known.
To define peer AS range for BGP groups through policy, you can include the as-list statement at the
[edit policy-options] hierarchy level. To include the specified peer AS list, include the peer-as-list
peer-as-list statement at the [edit protocols bgp group group-name] hierarchy level.
• Support for BGP-SR-TE rearchitecture (MX Series and PTX Series)—Starting in Junos OS Release 20.2R1,
Junos OS provides support for controller-based BGP segment routing--traffic engineering (SR-TE) routes
125
to be installed as source packet routing traffic-engineered (SPRING-TE) routes. BGP installs the SR-TE
policy in the routing tables bgp.inetcolor.0 and bgp.inet6color.0, and these routes are subsequently
installed in the routing tables inetcolor.0 or inet6color.0 by SPRING-TE.
In releases before Junos OS Release 20.2R1, controller-based BGP SR-TE routes are installed as BGP
routes in the routing table. To maintain consistency and for easy maintenance, all SR-TE based routes
appear as SPRING-TE routes irrespective of the source.
You need to enable source-packet-routing at the [edit protocols] hierarchy level to see the routes
installed in inetcolor.0 or inet6color.0. A new option detail is introduced under traceoptions (Protocols
Spring-TE) to trace the detailed information.
• Support for egress protection and BGP PIC features (MX Series Routers with MPC10E and
MPC11E)—Starting in Junos OS Release 20.2R1, you can configure the following egress link protection
and BGP Prefix Independent Convergence (PIC) features on MX Series devices with MPC10E and
MPC11E.
• Egress protection for BGP labeled unicast —Fast protection for egress nodes is available to services
in which BGP labeled unicast interconnects IGP areas, levels, or autonomous systems (ASs). If a provider
router detects that an egress router (AS or area border router) is down, it immediately forwards the
traffic destined to that router to a protector router that forwards the traffic downstream to the
destination.
• Provider-edge link protection for BGP labeled unicast paths—You can configure a precomputed
protection path in a Layer 3 VPN such that if a BGP labeled-unicast path between an edge router in
one AS and an edge router in another AS goes down, you can use the protection path (also known as
the backup path) between alternate edge routers in the two ASs. This is useful in a carrier-of-carriers
deployments, where a carrier can have multiple labeled-unicast paths to another carrier. In this case,
the protection path avoids disruption of service if one of the labeled-unicast paths goes down.
• BGP PIC for inet —We’ve extended the BGP Prefix Independent Convergence (PIC) support to BGP
with multiple routes in the global tables such as inet and inet6 unicast, and inet and inet6 labeled
unicast. When you enable the BGP PIC feature on a router, BGP installs to the Packet Forwarding
Engine the second best path in addition to the calculated best path to a destination. When an IGP
loses reachability to a prefix, the router uses this backup path to reduce traffic loss until the global
convergence through BGP is resolved, thereby drastically reducing the outage duration.
• BGP (PIC Edge for RSVP —With BGP PIC Edge in an MPLS VPN network, IGP failure triggers a repair
of the failing entries and causes the Packet Forwarding Engine to use the prepopulated protection
path until global convergence has re-resolved the VPN routes. The convergence time is no longer
dependent on the number of prefixes. When RSVP receives a tunnel down notification at the ingress
PE router, it sends a notification to the Packet Forwarding Engine to start making use of the tunnel
to the alternate egress PE router.
[See Egress Protection for BGP Labeled Unicast ,Understanding Provider Edge Link Protection for BGP
Labeled Unicast Paths, Use Case for BGP PIC for Inet, and show rsvp version.]
126
Services Applications
• Interoperability of MPC10E with MS-MPC and MS-MIC for Layer 3 Services ( MX240, MX480,and
MX960)—Starting in Junos OS Release 20.2R1, the MPC10E-15C-MRATE interoperates with MS-MPC
and MS-MIC-16G to support the following Layer 3 Services:
• Stateful firewall
• NAT
• IPSec
• RPM
• Support for RFC 2544-based benchmarking tests (MX Series routers with MPC10E and
MX2K-MPC11E)—Junos OS Release 20.2 extends support for the reflector function and the corresponding
RFC 2544-based benchmarking tests on MX240, MX480, and MX960 routers with MPC10E
(MPC10E-15C-MRATE and MPC10E-10C-MRATE) and MX2010 and MX2020 routers with
MX2K-MPC11E. The RFC 2544 tests are performed to measure and demonstrate the service-level
agreement (SLA) parameters before activation of the service. The tests measure throughput, latency,
frame loss rate, and back-to-back frames.
RFC 2544-based benchmarking tests on MX Series routers support the following reflection functions:
• Ethernet pseudowire reflection (ingress and egress direction) (ELINE service—supported for family
ccc)
• Layer 2 reflection (egress direction) (ELAN service—supported for family bridge, vpls)
To run the benchmarking tests on the MX Series routers, you must configure reflection (Layer 2 or
pseudowire) on the supported MPC. To configure the reflector function on the MPC, use the fpc
fpc-slot-no slamon-services rfc2544 statement at the [edit chassis] hierarchy level.
• Support for random load balancing (MX Series routers with MPC10E and MX2K-MPC11E)—Starting
in Junos OS Release 20.2R1, you can configure per packet random load balancing on MX240, MX480,
and MX960 routers with MPC10E (MPC10E-15C-MRATE and MPC10E-10C-MRATE) and MX2010
and MX2020 routers with MX2K-MPC11E. Per-packet random spray load balancing ensures that the
members of ECMP are equally loaded without taking bandwidth into consideration. Random load balancing
also eliminates traffic imbalance that occurs as a result of software errors, except for packet hash.
To configure random load balancing on the MPC, include the load-balance random statement at the
[edit policy-options policy-statement policy-name term term-name then] hierarchy level.
[See Understanding the Algorithm Used to Load Balance Traffic on MX Series Routers].
• Support for static IP tunnels (MX Series routers with MPC10E and MX2K-MPC11E)—Starting in Junos
OS Release 20.2R1, MX240, MX480, and MX960 routers with MPC10E (MPC10E-15C-MRATE and
127
MPC10E-10C-MRATE) and MX2010 and MX2020 routers with MX2K-MPC11E support static IP tunnels
with:
• IPv4-over IPv4
• IPv6-over-IPv4
• IPv4-over-IPv6
• IPv6-over-IPv6
• GNFs with MX-SPC3 support carrier-grade NAT services over abstracted fabric interfaces (MX480
and MX960)—Starting in Junos OS Release 20.2R1, guest network functions running Next Gen Services
with the MX-SPC3 card support carrier-grade NAT services.
NOTE: To support the services traffic over abstracted fabric interfaces, a GNF that has an
MX-SPC3 card assigned to it must also have a line card linked to it.
• GNFs with MX-SPC3 support various services over abstracted fabric interfaces (MX480 and
MX960)—Starting in Junos OS Release 20.2R1, guest network functions (GNFs) running Next Gen
Services with the MX-SPC3 card support the following services over abstracted fabric interfaces:
128
To support the services traffic over abstracted fabric interfaces, a GNF that has an MX-SPC3 card
assigned to it must also have a line card linked to it.
[See DNS Request Filtering for Blacklisted Website Domains and Configuring URL Filtering]
• Identifying dynamic profile versions with version aliases (MX Series)—Starting in Junos OS Release
20.2R1, you can use the versioning-alias statement to configure a text description that identifies a
particular variation of a dynamic client profile. The version alias is conveyed to the RADIUS server in
the Access-Accept message in the Juniper Networks Client-Profile-Name VSA (26–4874–174).
• IPFIX support for per-subscriber queue statistics (MX Series)—Starting in Junos OS Release 20.2R1,
you can configure the input-jti-ipfix plug-in to collect per–subscriber interface queue statistics. The
output ipfix-plugin can then export the statistics as IPFIX template and data records.
[See Telemetry Data Collection on the IPFIX Mediator for Export to an IPFIX Collector.]
• Junos Multi-Access User Plane support (MX204, MX10003)—Starting with Junos OS Release 20.2R1,
you can configure Junos Multi-Access User Plane on MX204 and MX10003 routers. Junos Multi-Access
User Plane is a software solution that turns your MX Series router into a high-capacity user plane function
called a System Architecture Evolution Gateway-User Plane (SAEGW-U). This MX Series SAEGW-U
interoperates with a third-party SAEGW-C (control plane function), according to the 3GPP Release 14
Control User Plane Separation (CUPS) architecture, to provide high-throughput 4G fixed-wireless access
service. CUPS enables independent scaling of the user and control planes, network architecture flexibility,
operational flexibility, and an easier migration path from 4G to 5G services. The CUPS architecture is
optional for 4G but inherent in 5G architecture.
System Logging
• Support to track the maximum number of routing and forwarding (RIB/FIB) routes and VRFs (MX Series
and PTX Series)—Starting in Junos OS Release 20.2R1, you can track and display the high-water mark
data of routing and forwarding (RIB/FIB) table routes and VRFs in a system (RPD) using the show route
summary CLI command. High-water mark refers to the maximum number of routing and forwarding
(RIB/FIB) table routes and VRFs that was present in the RPD system. The high-water mark data can also
be viewed in the syslog at the LOG_NOTICE level.
You can configure the interval of the high-water mark data using the highwatermark-log-interval CLI
configuration statement at the [edit routing-options] hierarchy level. The minimum time gap at which
the high-water mark data logged in the syslog is 30 seconds. You can configure the value for
highwatermark-log-interval CLI configuration statement between 5 to 1200 seconds.
System Management
• Support for the G.8275.1 Profile (MX10008 and MX10016 with line card JNP10K-LC2101)—Starting
in Junos OS Release 20.2R1, we support ITU-T G.8275.1 Full path Timing Support (FTS) Profile and
G.8273.2 Telecom Boundary Clock. The G.82751.5 Profile is a phased profile that operates with
PTP-based packet exchange for Phase and Time recovery, and Synchronous-Ethernet-based based
frequency recovery (also called Synchronous-Ethernet-based assisted PTP mode of operation). This profile
is required in TDD application deployment in both 4G and 5G networks.
The PTP operation must be two-way in this profile in order to transport phase/time synchronization
because propagation delay must be measured. Hybrid mode must be enabled for the G.8275.1 profile.
[See profile-type.]
Virtual Chassis
• MX Series Virtual Chassis support for the ephemeral database (MX480 and MX960)—Starting in Junos
OS Release 20.2R1, MX Series Virtual Chassis support configuring the ephemeral database. The ephemeral
database is an alternate configuration database that provides a fast programmatic interface for performing
configuration updates on devices running Junos OS.
SEE ALSO
What's Changed
IN THIS SECTION
Learn about what changed in Junos OS main and maintenance releases for MX Series routers.
General Routing
• Updates to ON-CHANGE and periodic dynamic subscriber interface metadata sensors (MX Series
routers and EX9200 line of switches)—We've made the following updates to the
/junos/system/subscriber-management/dynamic-interfaces/interfaces/meta-data/interfacesid='sid-value'/
sensor:
• Notifications are sent when subscribers log in on either IP demux or VLAN demux interfaces. In earlier
releases, login notifications are sent only for IP demux logins.
• The interface-set end path has been added to the logical interface metadata. The interface-set field
appears in both ON-CHANGE and periodic notifications. In earlier releases, this field is not included
in the sensor metadata or notifications.
[See gRPC Sensors for Subscriber Statistics and Queue Statistics for Dynamic Interfaces and Interface-Sets
(Junos Telemetry Interface).]
• New commit check for MC-LAG (MX Series)—We've introduced a new commit check to check the values
assigned to the redundancy group identification number on the mc-ae interface (redundancy-group-id)
and ICCP peer (redundancy-group-id-list) when you configure multichassis aggregation groups (MC-LAGs).
If the values are different, the system reports a commit check error. In previous releases, if the configured
values were different, the l2ald process would crash.
[See iccp.]
131
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX commit scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX commit scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX event scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX event scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the [edit system services netconf]
hierarchy level, the NETCONF server suppresses any <commit-results> XML subtree in the response
and emits only an <ok> or <rpc-error> element.
• Support for specifying the YANG modules to advertise in the NETCONF capabilities and supported
schema list (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—You can
configure devices to emit third-party, standard, and Junos OS native YANG modules in the capabilities
exchange of a NETCONF session by configuring the appropriate statements at the edit system services
netconf hello-message yang-module-capabilities hierarchy level. In addition, you can specify the YANG
schemas that the NETCONF server should include in its list of supported schemas by configuring the
appropriate statements at the edit system services netconf netconf-monitoring netconf-state-schemas
hierarchy level.
[See export-format.]
EVPN
• New output flag for the show bridge mac-ip table command (MX Series)—The Layer 2 address learning
process does not send updated MAC and IP address advertisements to the routing protocol process
when an IRB interface is disabled in an EVPN-VXLAN network. We have added the NAD flag in the
output of the show bridge mac-ip-table command to identify the disabled IRB entries where the MAC
and IP address advertisement will not be sent.
[See proxy-macip-advertisement.]
General Routing
• MS-MPC and MS-MIC service package (MX240, MX480, MX960, MX2008, MX2010, and MX2020)—PICs
of MS-MPC and MS-MIC do not support any other service package than extension-provider. These PICs
always come up with the extension-provider service-package, regardless of the configuration. If you try
to configure any other service package for these PICs by using the command set chassis fpc slot-number
pic pic-number adaptive-services service-package, an error is logged. Use the show chassis pic fpc-slot
slot pic-slot slot command to view the service package details of the PICs of MS-MPC and MS-MIC.
[See extension-provider.]
• Round-trip time load throttling for pseudowire interfaces (MX Series)—The Routing Engine supports
round-trip time load throttling for pseudowire (ps) interfaces. In earlier releases, only Ethernet and
aggregated Ethernet interfaces were supported.
134
• Changes to Junos XML operational RPC request tag names (MX480)—Starting in Junos OS Release,
we've updated the Junos XML request tag name for the below operational RPCs. The changes include:
• <get-ike-security-associations-information> is changed to
<get-re-ike-security-associations-information>.
Infrastructure
• Change in support for interface-transmit-statistics statement (MX Series)—You cannot configure
aggregated Ethernet interfaces to capture and report the actual transmitted load statistics by using the
interface-transmit-statistics statement. Aggregated Ethernet interfaces do not support reporting of the
transmitted load statistics. In Junos OS Release 20.2R2, the interface-transmit-statistics statement is
not supported in the aggregated Ethernet interfaces hierarchy. In earlier releases, the
interface-transmit-statistics statement was available in the aggregated Ethernet interfaces hierarchy
but not supported.
[See interface-transmit-statistics.]
Routing Protocols
• Advertising 32 secondary loopback addresses to traffic engineering database as prefixes (ACX Series,
EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—We've made changes to export multiple
loopback addresses to the lsdist.0 and lsdist.1 routing tables as prefixes. This eliminates the issue of
advertising secondary loopback addresses as router IDs instead of prefixes. In earlier releases, multiple
secondary loopback addresses in the traffic engineering database were added to the lsdist.0 and lsdist.1
routing tables as part of node characteristics and advertised as router IDs.
• Improved tunnel session limits display (MX Series)—Starting in Junos OS Release 20.2R2, the show
services l2tp tunnel extensive command displays the configured value for maximum tunnel sessions.
On both the LAC and the LNS, this value is the minimum from the global chassis value, the tunnel profile
value, and the value of the Juniper Networks VSA, Tunnel-Max-Sessions (26–33). On the LNS, the
configured host profile value is also considered.
In earlier releases, the command displayed the value 512,000 on the LAC and the configured host profile
value on the LNS.
[See Limiting the Number of L2TP Sessions Allowed by the LAC or LNS.]
General Routing
• Support for full inheritance paths of configuration groups to be built into the database by default (ACX
Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—Starting with Junos OS Release
20.2R1, the persist-groups-inheritance option at the [edit system commit] hierarchy level is enabled by
default. To disable this option, use no-persist-groups-inheritance.
• Install or activate the RIFT package to include the request rift package activate-as-top-of-fabric
option—Install or activate the RIFT package to include the request rift package activate-as-top-of-fabric
option. This option is same as the activate option but it adds additional configuration to act as a
top-of-fabric node.
• Command to view summary information for resource monitor (EX9200 line of switches and MX
Series)—You can use the show system resource-monitor command to view statistics about the use of
memory resources for all line cards or for a specific line card in the device. The command also displays
information about the status of load throttling, which manages how much memory is used before the
device acts to reduce consumption.
[See show system resource-monitor and Resource Monitoring for Subscriber Management and Services.]
keyword in the Exception block of the script. Otherwise, the application throws an exception when you
attempt to run it.
[See Develop Off-Device JET Applications and Develop On-Device JET Applications.]
• Updates to IDL for RIB service API bandwidth field (ACX Series, EX Series, MX Series, PTX Series, QFX
Series, and SRX Series)—The IDL for the RouteGateway RIB service API has been updated to document
additional rules for the bandwidth field. You must set bandwidth only if a next hop has more than one
gateway, and if you set it for one gateway on a next hop, you must set it for all gateways. If you set
bandwidth when there is only a single usable gateway, it is ignored. If you set bandwidth for one or
more gateways but not all gateways on a next hop, you see the error code
BANDWIDTH_USAGE_INVALID.
• Support for Clearing the Event at MEP Level (MX Series)—In Junos OS 20.2R1, you can define an action
profile for connectivity fault management at the local MEP level or at the remote MEP level. You define
an action profile to monitor events and thresholds and specify an action that the device performs when
the configured event occurs. When you define the action profile at the local MEP level, you can clear
the event for the configured action profile at the local MEP level by specifying only the local MEP numeric
identifier. When you define the action profile at the remote MEP level, you can clear the event for the
configured action profile at the remote MEP level by specifying the local MEP numeric identifier as well
as the remote MEP numeric identifier.
• Request support information for IPsec function (MX Series)—Starting in Release 20.2R1, Junos OS
introduces ipsec-vpn option to the existing request support information command. The request support
information ipsec-vpn command displays all the configurations, states, and statistics at Routing Engine
and Service Card level. This new option helps in debugging IPsec-VPN related issues. The information
collection is streamlined and reduces the output file size.
• Junos OS only supports using Python 3 to execute YANG Python scripts (ACX Series, EX Series, MX
Series, PTX Series, QFX Series, and SRX Series)—Starting in Junos OS Release 20.2R1, Junos OS uses
Python 3 to execute YANG action and translation scripts that are written in Python. In earlier releases,
Junos OS uses Python 2.7 to execute these scripts.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
138
Services Applications
• New option for configuring delay in IPSec SA installation—In Junos OS Releases 20.2R1 and 20.2R2,
you can configure the natt-install-interval seconds option under the [edit services ipsec-vpn rule rule-name
term term-name then dynamic] hierarchy to specify the duration of delay in installing IPSec SA in a
NAT-T scenario soon after the IPSec SA negotiation is complete. The default value is 0 seconds.
[See SNMP Trap Support: Configuring NMS Server (External Server Model).]
SEE ALSO
Known Limitations
IN THIS SECTION
Infrastructure | 140
MPLS | 140
Learn about known limitations in this release for MX Series routers. For the most complete and latest
information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search
application.
General Routing
• On the MPC11E line card, the number-of-sub-ports configuration on the 4x10GbE channelized ports
might cause the channels to go down. PR1442439
• On the MPC11E line card, the following error messages are observed when the line card is online: i2c
transaction error (0x00000002). PR1457655
• Traffic stops after reaching the volume limit but the traffic resumes after the Packet Forwarding Engine
fails. PR1463723
• The MPC11E line card might take additional time to come during the movement from one GNF to another
GNF. PR1469729
• On the MX10003 or MX204 routers, BFD or LACP might flap during the BGP convergence. PR1472587
• Dynamic SR-TE tunnels do not get automatically recreated at the new primary Routing Engine after the
Routing Engine switchover. PR1474397
• Packet Forwarding Engine lookup loop occurs when the firewall based redirection under
forwarding-options is used to perform route-lookup in a non-default routing instance for destinations
reachable over MPLSoUDP tunnels. PR1478000
• The rpd process might generate core files in the absence of an explicit route-distinguisher configuration.
PR1486922
• After executing the clear interfaces statistics all command, the value might be different from the values
of the output of the show interfaces command. PR1488758
• It takes nearly 20 minutes to display IP-IP tunnel statistics on the backup Routing Engine after GRES at
full scale of 4000 tunnels. PR1489067
• Packets do not get fragmented based on FTI interface MTU in the data path. PR1489526
• Traffic drop of around 2.5 seconds on switchover from primary physical interface is observed to backup
FTI interface with the scaled routes. PR1490070
• The sequence-numbers (initial-synchronization and regular streaming) might be in the wrong order when
multiple collectors are present. PR1490798
• The basic service set identifier (BSSID) scaling limits for IPv6 policies are 16,000 per ECMP. PR1495330
• The ppmd restart does not clear the active RFC2544 reflection sessions. PR1499285
140
• Active reflection sessions are not aborted when the delete interfaces and the delete services configuration
is committed. PR1499628
• One hundred percent traffic drop at tunnel destination is observed if fragmentation is enabled when
the incoming packet size is greater than the egress WAN MTU. PR1505209
• Changing the scaled firewall profiles on the fly does not release the TCAM resources as expected.
PR1512242
Infrastructure
• On Juniper Networks Routing Engines with Hagiwara CompactFlash card installed, after the upgrade to
Junos OS Release 15.1 and later, the following error message might appear: smartd[xxxx]: Device:
/dev/ada1, failed to read SMART Attribute Data. PR1333855
• Session fails to come up after the outer tag pop when ingress and egress logical interfaces are on the
same Packet Forwarding Engine. PR1487351
• On the MPC10 or MPC11 line card, the convergence goes up to 38 seconds for a highly scaled
configuration. PR1519373
MPLS
• The P2MP branches stay on bypass even after the link becomes functional after failure. PR1486813
• After enabling the MPLS p2mp-lsp no-re-merge set protocols on ingress, the P2MP branches fail to
come up. PR1487007
• Branches do not select the common ASBR from the available list with the single-asb command enabled
after the common ASBR failure. PR1490637
• On the MPC11E line card, the following trap message is not observed after a line card reboot when the
scaled interfaces are present: SNMP Link up. PR1507780
• PIM join message (S,G) might not be created after GRES. PR1457166
141
• Unknown unicast filter applied in the EVPN routing instance blocks unexpected traffic. PR1472511
• The JTI sensor subscription and the related TCP session are still present after the interface is deleted,
deactivated, or disabled. PR1477790
Routing Protocols
SEE ALSO
Open Issues
IN THIS SECTION
EVPN | 142
Infrastructure | 147
MPLS | 148
VPNs | 151
Learn about open issues in this release for MX Series routers. For the most complete and latest information
about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.
• When an interface attached to the aggregated Ethernet interface is decoupled and an IP address is
assigned to it, ARP resolution issues are observed. PR1504287
EVPN
• There might be a few duplicate packets seen in an active/active EVPN scenario when the remote PE
device sends packets with IM label due to MAC not being learned on remote PE device but being learned
on the active/active local PE device. The non-DF sends the IM-labeled encapsulated packet to the PE-CE
interface after MAC looks up instead of dropping the packet, which causes duplicate packets on the CE
side. PR1245316
• The VXLAN OAM host-bound packets are not throttled with DDoS policers. PR1435228
• The mustd.core process generates core file during upgrading or while committing a configuration.
PR1577548
• Packet length for ICMPv6 is shown as 0 in the output of the show firewall log detail command.
PR1184624
• The log message of Prefix-List [] in Filter [] that does not have any relevant prefixes might not be seen
when the IPv4 prefix is added on a prefix list referred by the IPv6 firewall filter. PR1395923
143
• The following syslog error message might be observed due to SSD hardware failure: Failed connecting
to DFWD, error checking reply - Operation timed out. PR1397171
• After restarting the router, the remote mask (indicating from which remote PE devices MAC IP addresses
are learned), that the routing daemon sends might be different from the existing remote mask compared
to the Layer 2 learning daemon had prior to restart. This causes a mismatch between the Layer 2 learning
and routing daemon interpretation as to where the MAC IP address entries are learned (either local or
remote) leading to the MAP IP table being out of synchronization. PR1452990
General Routing
• The host root file system and the node boot with the previous vmhost software instead of the alternate
disk. PR1281554
• Not using the chained CNH does not bring in a lot of gain because TCNH is based on an ingress rewrite
premise. Without this feature, things work just fine. PR1318984
• With regards to FPC restarts or Virtual Chassis splits, the design of MX Series Virtual Chassis infra relies
on the integrity of the TCP connections. The reactions to failure situations might not be handled gracefully,
resulting in TCP connection timeouts because of jlock hog crossing the boundary value (5 seconds),
which causes bad consequences in MX Series Virtual Chassis. Currently, there is no other easy solution
to reduce this jlock hog besides enabling marker infra in the MX Series Virtual Chassis setup. PR1332765
• In an MS-MPC or MS-MIC in ALG scenario, the MAC_STUCK message might be observed and traffic
might be dropped. PR1335956
• The backup Routing Engine might crash after GRES occurs continuously for more than 10 times.
PR1348806
• The following error messages are observed with Junos OS Release 17.3 throttle image:
localttp_offload_tx_errcheck: failed to send packet 4 times in last one second. PR1359149
• On the MX204 and MX10003 routers, the following garbage value on syslog messages from craftd
demon is observed: craftd[xxxx]: fatal error, failed to open smb device: JÎÈ. PR1359929
• On the MX2010 and MX2020 routers equipped with SFB2, some error logs might be seen. PR1363587
• Due to transient hardware condition, single-bit error (SBE) events are corrected and have no operational
impact. Reporting of those events are disabled to prevent alarms and possibly unnecessary hardware
replacements. PR1384435
• The virtio throughput remains the same for the multi-queue and single-queue deployments. PR1389338
• Revert of RLT to primary might silently discard traffic for around 10 minutes after the primary FPC is
online with primary RLT up. PR1394026
• The FPC generates core files under certain circumstances on addition and deletion of hierarchical CoS
from pseudowire devices. PR1414969
• Traffic statistics are not displayed for the hybrid access gateway session and tunnel traffic. PR1419529
144
• With the HTTP header enrichment function enabled, the processing of the window scaling option
significantly reduces the performance of HTTP sessions from 65 Mbps to less than 40 Mbps, which
results in decrease of traffic throughput. The download rate also drops. PR1420894
• Dynamic tunnel summary displays wrong count of up and total tunnels. PR1429949
• The ike-esp session are not created after enabling ike-esp-nat. PR1516655
• The ALG timeout value is displayed as default value for the child data sessions even after the configured
service set timeout values. PR1516697
• Layer 2 over GRE is not supported in Junos OS Release 19.3R1. Although, the configuration gets
committed, the feature does not work. PR1435855
• The FPC process might crash when the Packet Forwarding Engine memory is exhausted. PR1439012
• Interface hold-down timers cannot be achieved for less than 15 seconds on the MPC11E line card.
PR1444516
• Physical interface policers are not supported in Junos OS Release 19.3R1 for the MPC11 line card.
PR1452963
• After more than 2 million multicast subscribers are activated without performing GRES or bbe-smgd
restart, further multicast subscribers might be unable to log in. PR1459340
• The following CDA error message is observed: LkupAsicClient: Index Dmem block read failed, PFE:0.0.
PR1459665
• The CFM REMOTE MEP does not come up after configuration or if the MEP remains in the Start state.
PR1460555
• Need to add the Backport jemalloc profiling CLI support to all Junos OS releases where jemalloc is
present. PR1463368
• In DNS filtering when DNS requests are sent from the server and implicit filters as well as routes to the
service PIC are configured, it causes the DNS packets to loop. PR1468398
• With the BGP rib-sharding and update-threading, traffic drops 100 percent in the BGP Layer 3 VPN
streams, post the removal or restoration configuration. PR1469873
• For the MPC10E line card, the IS-IS and micro-BFD sessions do not come up during baseline. PR1474146
• Expected number of 512,000 MAC entries are not relearned in the bridge table after clearing 512,000
MAC entries from the table. PR1475205
• On the MX480 router, the following error message is seen after restore or removal with IP and MPLS
configurations: [Error] L2alm : l2alm_mac_process_hal_delete_msg:667 Ignoring MAC delete with ifl
index 355, fwd_entry has 7888. PR1475785
• A 64-bit cMGD should be used if cMGD is running on a 64-bit OS to avoid random issues. PR1481335
145
• Invalid packets are dropped by dut with TCC encapsulation configuration as intended, but the statistics
counters are incremented. PR1481698
• The following critical syslog error messages at FPC3 user.crit aftd-trio are seen during baseline: [Critical]
Em: Possible out of order deletion of AftNode #012#012#012 AftNode details - AftIndirect
token:230791 group:0 nodeMask:0xffffffffffffffff indirect:333988 hwInstall:1#012. PR1486158
• Next-hop learning command is enabled by default in the MPC10 and MPC11 line cards irrespective of
the command configuration. PR1489121
• Login or logout of high scale (around 1 million bearers) causes some sessions not to re-login. PR1489665
• Need to support upgrading of the PSM firmware on the MX2000 line of devices. PR1489939
• On the MPC10 line card, AFT crash is seen at std::default_delete< AftTermAction>::operator() (this=<
optimized out>, __ptr=0x7fb0bc5d5910) at
/volume/evo/files/opt/poky/2.2.1-22/sysroots/core2-64-poky-linux/usr/include/c++/6.2.0/bits/unique_ptr.h:76.
PR1491527
• The following error message is observed: unable to set line-side lane config (err 30). PR1492162
• On the MX2020 router, the AER image for non-correctable or correctable PCI error is needed. PR1493065
• Component sensor does not export data under components CB0 or CB1 in the expected time. PR1493579
• Backup Routing Engine reboots because of power cycle or failure when the offline and online operations
are performed on CB1. PR1497592
• The MPC11 line card is not supported in Junos OS Release 19.4R1. PR1503605
• The WAN-PHY interface continuously flaps with the default hold-time down of value 0. PR1508794
• For EVPN-VXLAN feature verification, the set chassis loopback-dynamic-tunnel command is used.
PR1509690
• On the MPC11 line card, dfw crash is seen after removing and restoring configurations on the backup
Routing Engine. PR1512770
• Sometimes external 1 pps cTE is slightly above Class B requirement of the ITU-T G.8273.2 specification.
PR1514066
• On the MX960 router, expected traffic is not received with multicast and PIM scaling configurations.
PR1514646
• On the MX480 routers, in an EVPN-VLAN scenario, the set routing-instances protocols evpn
mac-table-aging-time 30 statement does not work. PR1543238
• Even though enhanced-ip is active, the following alarm is observed during ISSU: RE0 network-service
mode mismatch between configuration and kernel setting. PR1546002
146
• The LACP state is in the Down state after enabling and disabling the exclude protocol LACP under Set
security. PR1331412
• Disabled interfaces might still transmit power after the device reboots. PR1487554
• In the output of the show interface command, the smart-sfp-present leaf is missed. PR1492551
• Traffic loss might be seen if the routing-instance is deactivated and then re-activated quickly. PR1498087
• Set of Info level cron logs is displayed from FPC every 1 minute. PR1527266
• CFM do not consider the 8021AD configuration for the rewrite and classification tables. PR1527303
• MACSEC PIC stays offline in new primary after ISSU in GNF alone. PR1534225
• On the MX2020 router, the next hops are less than a total of nhdb 4MPOST GRES. PR1539305
• On the MX480 routers, COS shaping is not adjusted as per the ANCP actual down stream rate. PR1544713
• Commit error is introduced during deactivate chassis synchronization source and smc-transmit are all
configured. PR1549051
• IGMP joins are more than the expected value while verifying the IGMP snooping membership in the CE
router. PR1560588
• Some BFD sessions get stuck in the Down or Init state after an iterative operations triggers on DUT.
PR1560772
• On the MX2010 or MX2020 routers, the following error message might be observed after switchover
with GRES/NSR: CHASSISD_IPC_FLUSH_ERROR. PR1565223
• On the MX480 routers, traffic loss is observed with a scale of 4000 tunnels 800 vrf test. PR1568414
• The mspmand process might crash if the packet flow-control issue occurs on MS-MPC/MS-MIC.
PR1569894
• CFP unplugged message is not logged in Junos OS Release 17.3 and later. PR1573209
• The rpd process on the transit node might crash when MPLS traceroute on the ingress node is performed.
PR1573517
• From the regress user shell prompt, vhclient access does not display the following error message: rcmd:
socket: Operation not permitted. PR1574240
• On the MX150 routers, the interface might take a long time to power down while rebooting, powering-off,
halting, or upgrading. PR1575328
• FPC CPU utilization gets stuck at 100 percent during the longevity case. PR1575355
• The show services service-sets statistics syslog command returns an error when the service-set does
not have a syslog configuration: usp_ipc_client_recv_ 1237: ipc_pipe_read fails! error:No error: 0(0),
tries:. PR1576044
147
• On the MX10016 routers, when Fan Tray 1 fan fails the alarm is cleared, the Fan/Blower OK SNMP
traps are generated for the Fan Tray 0 [Fan 31 - 41] and Fan Tray 1 [Fan 11 - 41]. PR1576521
• In the NAT64 scenario during session creation, the IPv6 atomic fragments are not processed correctly.
PR1581348
• MS-MIC or MS-MPC based jflow (flow-sampling) on the logical systems is not supported. PR1585824
• Unexpected XML structure change with the show system switchover command is observed. PR1158986
• Performing GRES with the interface em0 (or fxp0) disabled on the primary Routing Engine; when you
enable the interface on the new backup Routing Engine, you might not be able to access the network.
PR1372087
• During ZPL ISSU, traffic loss is observed with the IGP or BGP protocol session. PR1487144
Infrastructure
• The HSRPv2 IPv6 packets might get dropped if IGMP-snooping is enabled. PR1232403
• The following error message is seen during FTP: ftpd[14105]: bl_init: connect failed for
/var/run/blacklistd.sock(No such file or directory). PR1315605
• The following error message is observed continuously in AD with base configurations: IFDE: Null uint32
set vector, ifd and IFFPC: 'IFD Ether uint32 set' (opcode 151) failed. PR1485038
• Memory corruption of any binary in /usr/bin/ or /usr/sbin/ can be triggered by the execution of the
binary when a recovery snapshot is being copied to the OAM volume. PR1563647
• The cfmd process might continuously crash after the upgrade. PR1281073
• The SFP index in the Packet Forwarding Engine starts at 1, while the port numbering starts at 0. This
causes confusion in the log analysis. PR1412040
• Changing the framing modes on a CHE1T1 MIC between E1 and T1 on an MPC3E NG HQoS line card
causes the PIC to go offline. PR1474449
• MPLS VPN label can point to the discarded next hop after a Routing Engine switchover without NSR if
the egress interface is pp0. PR1488302
• After DUT with MPC10 or MPC11 line card takes over as vrrp primary role, the logical interface undergoes
100 seconds of traffic loss. PR1519374
• The following error message is observed while removing or adding the configurations: xolo-fpc0 ppman:
[Error] CTRL:RPC:: Cos8021pRwTableCb)::< lambda: RPC to Aftman CoS FC table request failed for
key:16783744 iflIndex:23238 status:Invalid argument. PR1527032
• The input errors counter command on the monitor interface command does not work. PR1561065
• The DHCP decline packets are not forwarded to the DHCP server when forward-only is set within
dhcp-reply. PR1429456
• the OSPF and OSPF3 adjacency uptime is more than expected after the NSSU upgrade and outage is
higher than the expected. PR1551925
MPLS
• Aggressive switchovers due to MBB or CSPF computations causes traffic loss on all branches of the tree
even if a single branch fails to come up due to remerge detection on the transit router. PR1487916
• The GRES or NSR Routing Engine switchovers followed by restart routing on the primary Routing Engine
does not honor the remerge behavior. PR1489168
• The Packet Forwarding Engine might produce error messages during interface deletions in configurations
with IRB interfaces. PR1054798
• For the bridge-domains configured under an EVPN instance, the ARP suppression is enabled by default.
This enables the EVPN to proxy the ARP and reduces the flooding of ARP in the EVPN networks. As a
result, storm-control does not effect the ARP packets on the ports under such bridge-domain. PR1438326
• The cosmetic error messages of NTP time synchronization might be observed during device booting.
PR1463622
149
• A few OAM sessions are not established with the scaled EVPN E-Tree and CFM configurations.
PR1478875
• If the interface is newly added as the CE interface, the existing broadcast, unknown unicast, and multicast
(BUM) traffic can be looped. The loop prevention feature is designed to start working whenever a new
CE interface is added by configuration. But the existing BUM traffic can be distributed to a new CE
interface earlier before enabling the loop prevention feature. PR1493650
• Upgrading satellite devices might lead to some SDs in the SyncWait state. PR1556850
• On the MX480 router, during the verification of GRES and NSR functionality with VXLAN feature, the
convergence is not as expected L2-DOMAIN-TO-L3VXLAN. PR1520626
• IPv6 VRRP sessions are not established when Duplicate Address Detection (DAD) is enabled. PR1534835
• Upgrading satellite devices might lead to some SDs in the SyncWait state. PR1556850
• Monitor traffic interface fxp0 resets the last flapped time for the interface. PR1564323
• The FPC process might crash when the next-hop memory of ASIC is exhausted in the EVPN-VXLAN
scenario. PR1571439
• The routing policy actions fail to configure neighbor-sets and tag-sets. PR1491795
Routing Protocols
• While interoperating with other vendors in a draft-rosen multicast VPN, by default Junos OS attaches
a route target to the multicast distribution tree (MDT), subsequent address family identifier (SAFI), and
network layer reachability information (NLRI) route advertisements. But some vendors do not support
attaching the route targets to the MDT-SAFI route advertisements. In this case, the MDT-SAFI route
advertisement without route-target extended communities are prevented from propagating of the
route-target fil. PR993870
• Certain BGP traceoption flags (for example, open, update, and keepalive) might result in trace logging
of debugging messages that do not fall within the specified traceoption category, which results in some
unwanted BGP debug messages being logged to the BGP traceoption file. PR1252294
• LDP OSPFs are in the Synchronization state because the IGP interface is down with ldp-synchronization
enabled for OSPF. PR1256434
• In rare cases, RIP replication might fail as a result of performing NSR Routing Engine switchovers when
the system is not NSR ready. PR1310149
150
• The show version detail command triggers the following severity error logs: mcsnoopd: INFO: krt mode
is 1" "JUNOS SYNC private vectors set". PR1315429
• On the MX2010 Series routers, the BFD session on the IS-IS step up flaps during the ISSU - FRU upgrade
stage. PR1453705
• Even when protocols mpls traffic-engineering bgp-igp command is configured, the UDP tunnel routes
are not added to inet.0. The UDP tunnel routes are added only to inet.3 table whether the command is
configured or not. PR1457426
• BGP graceful restart might have some traffic loss when sharding is enabled. PR1475773
• Some PIM join or prune packets might not be processed in the first attempt in the scaling scenario where
the PIM routers establish neighborship and immediately join the multicast group. PR1500125
• The BFD sessions might flap continuously after disruptive switchover followed by GRES. PR1518106
• BFD with authentication for BGP flaps after GRES or NSR switchover on the NG-RE and SCBE2 setup.
PR1522261
• The virtual-router option is not supported under a routing-instance in a lean RPD image. PR1494029
• Dynamic tunnels are still up after deactivatingthe BGP nexthop type UDP policy. PR1579225
Services Applications
• All the unreachable destinations are not kept in the Locked out state post GRES. PR1541271
• The Tunnel-Assignment-Id string is not present while checking the packets from coming in for the
attributes. PR1543628
• Subscriber might get stuck in the Terminating state if the Access-Challenge packet is received from the
RADIUS server during the subscriber authentication. PR1583090
• A 64-bit cMGD must be used if cMGD runs on a 64-bit OS to avoid random issues. PR1481335
• The port_speed configuration details not present in the picd configuration for ports et-0/0/128 and
et-0/0/129. PR1510486
151
VPNs
• In an MVPN environment with SPT-only option, if the source or receiver is connected directly to c-rp
PE and the MVPN data packets arrive at the c-rp PE before its transition to SPT, the MVPN data packets
might be dropped. PR1223434
• The output value of the show mvpn c-multicast inet source-pe | display xml command is not proper.
PR1509948
• The PIM (S,G) join state might stay forever when there are no MC receivers and source is inactive.
PR1536903
SEE ALSO
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in Junos OS main and maintenance releases for MX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
152
EVPN
• With dynamic list next hop configured, a forwarding problem occurs after graceful switchover. PR1513759
• no-arp-suppression is required for MAC learning across the EVPN domain on the static VTEP. PR1517591
• The BUM traffic might get dropped in the EVPN-VXLAN setup. PR1525888
• The route table shows additional paths for the same EVPN or VXLAN Type 5 destination after upgrading
from Junos OS Release 18.4R2-S3 to Junos OS Release19.4R1-S2. PR1534021
• All the ARP reply packets toward some address are flooded across the entire fabric. PR1535515
• Rpd memory leak might occur when the EVPN configuration is changed. PR1540788
• The l2ald process might generate the core file after changing the EVPN or VXLAN configuration.
PR1541904
• The rpd process might crash after adding route-target on a dual-Routing Engine system under the EVPN
multihoming scenario. PR1546992
• VLAN ID information is missed while installing the EVPN route from the BGP Type 2 Route after modifying
a routing-instance from instance-type EVPN to instance-type virtual-switch. PR1547275
• The ARP replies from the EVPN CE device might get dropped incorrectly if the EVPN routes are resolved
through the MPLS-over-UDP tunnels. PR1563802
• The commit might fail if a filter enabled with enhanced-mode to et- interface is configured. PR1524836
• The l2ald process might crash when a device configuration flaps frequently. PR1529706
• All traffic are dropped on the aggregated Ethernet interface bundle without the VLAN configuration if
the bandwidth-percent policer is configured. PR1547184
• The l2ald process might crash due to next-hop issue in the EVPN-MPLS. PR1548124
• In the VXLAN scenario, the locally originated packets have UDP source port 0. PR1571970
153
General Routing
• The max-drop-flows statement is not available. PR1375466
• The MPC2E-NG or MPC3E-NG line card with specific MIC might crash after a high rate of interface
flaps. PR1463859
• The following error message is observed after GRES: [user.err aftd-trio: [Error] IF:Unable to add member
to aggregate member list, member already exists, aggIflName:ps1.0 memberIflName:lt-3/0/0.32767].
PR1466531
• Dynamic SR-TE tunnels do not get automatically recreated at the new primary Routing Engine after the
Routing Engine switchover. PR1474397
• Fabric healing logic incorrectly makes all MPC line cards go offline in the MX2000 router while the
hardware fault is located on one specific MPC line-card slot. PR1482124
• The vmcore process crashes sometimes along with the mspmand process on MS-MPC or MS-MIC if
large-scale traffic flows are processed. PR1482400
• SNMP index in the Packet Forwarding Engine reports as 0, causing sFlow to report either IIF or OIF (not
both) as 0 in the sFlow record data at the collector. PR1484322
• Not able to forward traffic to VCP FPC after the MX Virtual Chassis reboots, FPC reboots, or adding
VCP link. PR1514583
• On the MX960 routers, the show interfaces redundancy RLT0 statement shows current status as primary
down as FPC is still in the Ready state after RLT failover (restart FPC). PR1518543
• During an upgrade, vSRX3.0 displays the following incorrect license warnings when utilizing licensable
features even if the license is present on the device: requires 'idp-sig' license. PR1519672
• The BFD session status remains down at the non-anchor FPC even though the BFD session is up after
anchor the FPC reboots. PR1523537
• Problem with static VLAN deletion with active subscribers and the FPC might be stuck at the Ready
state during restart. PR1525036
• The following error message is observed during GRES if an IRB interface is configured without a profile:
RPD_DYN_CFG_GET_PROF_NAME_FAILED. PR1526481
• The transit PTP packet might be modified unexpectedly while passing through MPC2E-NG, MPC3E-NG,
and MPC5E line cards. PR1527612
• The speed command cannot be configured under the interface hierarchy on an extended port when the
MX204 or MX10003 router works as an aggregation device. PR1529028
• The SFP-LX or SFP-SX optics on MIC-3D-20GE-SFP-E/EH might show as unsupported after ISSU.
PR1529844
154
• On the MX204 and MX10003 routers, PEM0 always shows as Absent or Empty even if PEM0 is present.
PR1531190
• On the MX150 routers, configuring the no-flow-control command under gigether-options does not
work. PR1531983
• Wavelength unlocked alarm is set as On while using the SFP+-10G-T-DWDM-ZR optics. PR1532593
• The interface with the pic-mode 10GE configuration might not come up if upgraded to Junos OS Release
18.4R3-S4 or later. PR1534281
• Some routes might get incorrectly programmed in the forwarding table in the kernel, which is no longer
present in rpd. PR1534455
• Snmp mib walk for jnxSubscriber OIDs returns a general error. PR1535754
• All SFBs might go offline due to fabric failure and fabric self-ping probes performing the disable-pfe
action. PR1535787
• The following error message might be observed when the JAM packages for the MX204, MX10003,
and MX10008 are installed: JAM: Plugin installed for summit_xxx PIC. PR1537389
• Version-alias gets missed for the subscribers that are configured with the dynamic profiles after ISSU.
PR1537512
• Deactivating or activating PTP or synchronized Ethernet in the upstream router causes the 100GbE links
on the LC2103 to flap. PR1538122
• On the AFT based FPCs (MPC10 and MPC11 line cards), the show jnh exceptions inst command of the
Packet Forwarding Engine might cause the FPC process to crash. PR1538138
• Traffic drop might be seen while executing the request system reboot command. PR1538252
• After configuring the global system name-server configuration, commit should fail but instead the commit
is successful. PR1538514
• Upon receiving of a specific BGP FlowSpec message, network traffic might be disrupted. PR1539109
• The accounting interim-updates for subscriber does not work after GRES and subsequent reboot of
FPCs in the node-slicing setup. PR1539474
• The rpd memory leak might be observed on the backup Routing Engine due to the flapping of the link.
PR1539601
• The mspmand process leaks memory in relation to the MX Series telemetry reporting the following error
message: RLIMIT_DATA exceed. PR1540538
• With hold time configuration, the ge interfaces remain down on reboot. PR1541382
155
• Subscriber might not come up on some dynamic VLAN ranges in a subscriber management environment.
PR1541796
• The KRT queue might get stuck after the Routing Engine switchovers. PR1542280
• Port mirroring with the maximum-packet-length configuration does not work over the GRE interface.
PR1542500
• The license errors might get returned on the backup Routing Engine while trying to commit the
configuration. PR1543037
• The mspmand process might generate the core file on activating or deactivating the interface. PR1544794
• Traffic loss might be observed when the Switch Fabric Board 3 and MPC8E 3D combination is used in
the MX2010 and MX2020 routers. PR1544953
• Continuous rpd errors might be seen and new routes fails to be programmed by the rpd process.
PR1545463
• Backup Routing Engine vmcore might be seen due to the absence of the next-hop acknowledgement
infra. PR1547164
• In the syslog output, the sylog-local-tag name is truncated as SYSLOG_SF when the sylog-local-tag
name is configured as SYSLOG_SFW. PR1547505
• The verbose command unexpectedly becomes hidden after Junos OS Release 16.1 for set system
export-format json. PR1547693
• The SENSOR APP DWORD leak is observed during the period of churn for routes bound to the sensor
group. PR1547698
• The adapted sample rate might get reset to the configured sample rate without changing the sampling
rate information in sFlow datagrams after enabling sFlow technology on a new interface. PR1550603
• The rpd crash might be seen when the BGP service route is resolved over the color-only SR-TE policy.
PR1550736
• The fabric errors are observed and the FPC processes might get offline with the SCBE3, MPC3E-NG,
or MPC3E and MPC7 or MPC10 line card in the increased-bandwidth fabric mode. PR1553641
• The following message is not generated on the MPC11E line card due to no power: Chassisd SNMP trap
Fru Offline. PR1556090
• The request system software validate command might corrupt installation of the junos-openconfig
package. PR1560234
• The rpd crash might be observed during processing a huge amount of PIM prune messages. PR1561984
• PPPoE service-name-tables does not correctly count active sessions that matches agent-specifier aci/ari
used for delay. PR1565258
• On the MX150 routers, the request system software add command is disabled in Junos OS Release
19.4R3-S1, 20.1R2, and 20.4R1. PR1568273
• Family IPv6 does not come up for Layer 2 TP subscriber when additional attributes are not passed in
the Framed-IPv6-Route VSA. PR1526934
• DHCP discover packet might be dropped if the DHCP inform packet is received first. PR1542400
• The show dynamic-profile session client-id command displays only one IPv6 framed-route information.
PR1555476
• Slow response might be observed when the show | compare or commit check action in a large-scale
configuration environment is committed. PR1500988
• Transit IPv4 traffic forwarding over BGP SR-TE might not work. PR1505592
• The No response from the other routing engine for the last 2 seconds error triggers the SNMP trap
generated Fru Offline messages. PR1524390
• Multiple FRUs disconnection alarms might be displayed post the firmware upgrade. PR1529710
• The following error message for port might be observed: FAILED(-1) read of SFP eeprom. PR1529939
• The unilists are incorrectly formed and the list of forwarded next hops are not resolved properly if the
ECMP is set to 128. PR1530803
• BGP SR-TE IPv6 routes might get hidden after the chassisd restarts. PR1534511
• Snmp mib walk for jnxSubscriber OIDs returns a general error. PR1535754
• The kmd process might crash when the interface flaps. PR1544800
• The l2ald process might crash due to next-hop issue in the EVPN-MPLS. PR1548124
• The Broadcom chip FPC might crash during the system booting. PR1545455
• The performance of the Packet Forwarding Engine process on the MX204 routers might be degraded
after Junos OS Release 19.3R1. PR1545989
• Unexpected log messages appears related to the Neighbor Solicitation (NS) messages with multicast as
source address. PR1546501
• The nsd daemon might crash after configuring the inline NAT in the USF mode. PR1547647
• SR-TE might stay in the Up state when the routes are deleted through policy. PR1547933
157
• Validation of the OCSP certificate might not go through in case of certain CA servers. PR1548268
• The l2alm processes high CPU utilization might be observed in the EVPN-VXLAN environment.
PR1551025
• The following error messages are observed: Disable-pfe with intermittent ipc_pipe_get_packet():
packet_get() failed error message and CM_CMERROR_FABRIC_SELFPING failure. PR1554209
• During ISSU, BNG losses subscriber sessions without sending the Session Stop message but stay in
authd. PR1554539
• The framed route installed for a demux Interface has no MAC address. PR1556980
• ISSU are aborted and the chassisd process generates core file on the backup Routing Engine during the
Junos OS upgrade to version Junos OS Release 20.2R2-S1. PR1557413
• Packets corruption on 100G or 40G interface are configured with protocol PTP. PR1557758
• Need to allow the tunnel interface as the peer-address for ALQ. PR1567735
• On the MX204 routers, FPC might display high CPU utilization because of the JGCI background thread
that runs for a long period. PR1567797
• Core files are generated at export_svc_set_nat_idl@nsd_calloc while verifying the no-translation with
destination-nat. PR1568997
• The RPD process might crash while using BFD API to bring up the BFD sessions. PR1569040
• The agent sensor __default_fabric_sensor__ are partly applied to some FPCs, which causes zero payload
issue AGENTD received empty payload for pfe sensor __default_fabric_sensor__. PR1569167
• The MPLS traffic passed through the back-to-back PE topology might match the wrong CoS queue.
PR1569715
• OAM might not work as expected after FPC reboots or flaps. PR1569790
• The following log message might be observed: /tmp//mpci_info: No such file or directory :error[1].
PR1570135
• On the MX960 routers, the Require a Fan Tray upgrade alarm is raised when the top Fan Tray 0 is
removed, even though the enhanced Fan Tray is already used. PR1572778
• Fabric errors are observed and FPC processes might get offline when the MPC3-NG/MPC3E/SRX5K-IOC2
line cards are installed along with the MPC7/MPC10/SRX5K-IOC04 and SCBE3/SCB4 line cards operating
in an increased-bandwidth fabric mode. PR1573360
• Slow FPC heap memory leak might be triggered by flapping the subscribers terminated over multiple
pseudowires. PR1574383
• The LLDP neighbor information displays hex string instead of chassis ID when subtype 1 is used.
PR1576721
158
Infrastructure
• The output of the show interfaces extensive command might display 0 temporarily during a race condition
when SNMP query for JnxCos is issued. PR1533314
• Inline Y.1731 SLM or DM does not work in enhanced-cfm-mode for the EVPN UP MEP scenario.
PR1537381
• The following error message might occur after commit for configuration under interface hierarchy: should
have at least one member link on a different FPC. PR1539719
• After VRRP failover, the VRRP backup router keeps receiving traffic for about 2 minutes. PR1546635
• The following commit error is observed while trying to delete unit 1 logical system interfaces: ae2.1:
Only unit 0 is valid for this encapsulation. PR1547853
• An IRB interface that has large unit value over 32767 cannot be an active group for the inheriting VRRP.
PR1550993
• The VCP port is marked as administratively down on the wrong MX-VC member. PR1552588
• The dcd process might leak memory on pushing the configuration to the ephemeral database. PR1553148
• Junos device might send VRRP advertisement packets in the VRRP Init or Idle state before
startup-silent-period timer expiry on the VRRP primary device with NSR disabled after GRES. PR1558560
• MAC address entry issue might be observed after the MC-LAG interface. PR1562535
• DHCP packet drop might be seen when the DHCP relay is configured on a leaf device. PR1554992
• The Option 82 information is incorrectly cleared by the DHCP Relay agent. PR1568344
MPLS
• The rpd scheduler might slip after the link flaps. PR1516657
• The rpd process might crash when the LDP route with indirect next hop is deleted on the aggregated
Ethernet interface. PR1538124
• If link-protection is enabled for an externally provisioned LSP, any commit for the first time after
provisioning causes a break (MBB) even if the configuration is not related to the LSP. PR1546824
• A new LSP might not be up even if bypass LSP is up and setup-protection is configured. PR1555774
159
• An internal timer on the backup Routing Engine might cause an ARP storm upon GRES switchover on
the new primary (old backup) Routing Engine. PR1547583
• The following major error message might cause the Packet Forwarding Engine(s) to disable:
XQ_CMERROR_SCHED_L3_PERR_ERR. PR1538960
• The VXLAN encapsulation over IPv6 underlay might not work. PR1532144
• PE-CE OAM CFM might have issues in the aggregated Ethernet interface. PR1501656
• Flow programming issue for lt- interface in the Packet Forwarding Engine level is observed. PR1525188
• The following error message is observed when alarms after interface reset: 7836 ifl 567 chan_index 8
NOENT & jnh_ifl_topo_handler_pfe(13015): ifl=567 err=1 updating channel table nexthop. PR1525824
• PPE errors or traps might be observed in the Layer 2 flooding scenarios. PR1533767
• The FPC process might crash when the next-hop memory of ASIC is exhausted in the EVPN-MPLS
scenario. PR1533857
• Packet loss might be observed when the RFC2544 egress reflector session is configured on the non-zero
Packet Forwarding Ethernet interface. PR1538417
• The rmopd process memory leak might be seen if the TWAMP client is configured. PR1541808
• FPC might crash when the underlying Layer 2 interface for ARP over IRB interface is changed from the
physical interface to the LSI interface. PR1542211
• The RP expired timer on the backup Routing Engine is not the same as the primary Routing Engine if
the aging-timer is configured. PR1544398
• The kernel might crash if GRES is performed on either new iteration or after swapping the Routing Engine
and restoring the HA configuration. PR1549656
• The BGP session replication might fail to start after the session crashes on a backup Routing Engine.
PR1552603
• Traffic is not forwarded over IRB to a Layer 2 circuit on the lt interfaces. PR1554908
• The IPv4 EXP rewrite might not work properly when inet6-vpn is enabled. PR1559018
160
• The BUM frame might be duplicated on an aggregate device if the extended-port on the satellite device
is an aggregated Ethernet interface. PR1560788
• The DHCPv4 request packets might be wrongly dropped when DDoS attack occurs. PR1562474
• Generated route goes to the Hidden state when the protect core command is enabled. PR1562867
• Global variable policy_db_type is not set to the correct value on failure. PR1561931
Routing Protocols
• The BFD session might get stuck in the Init or Down state after the BFD session flaps. PR1474521
• With BGP rib-sharding enabled, the RPD memory exhaustion might be observed. PR1546347
• Traffic loss might be seen in the next-hop-based dynamic tunnels of the Layer 3 VPN scenario after
changing the dynamic-tunnel preference. PR1542123
• Traffic loss might occur during VRF route resolution over indirect next hop. PR1525363
• Traffic might be silently discarded when the BGP route gets deleted, which is part of multipath.
PR1514966
• The output of the show isis interface detail command might be incorrect if wide-metrics-only is enabled
for IS-IS and the ASCII representation of the metric in decimal is more than 6 characters long. PR1482983
• The rpd might crash with BGP RPKI enabled in a race condition. PR1487486
• The ppmd process generates the core file after MS-MPC restarts. PR1490918
• The BGP session with VRRP virtual address might not come up after the session flaps. PR1523075
• The VRF label is not assigned at ASBR when the inter AS is implemented. PR1523896
• The IS-IS LSP database synchronization issue might be seen while using the flood-group feature.
PR1526447
• Transit labels for Layer 3 VPN routes are pushed momentarily to the MPLS.0 table. PR1532414
• Configuring the next hop and then rejecting it on a route policy for the same route might cause the rpd
process to crash. PR1538491
• After the peer is moved out of the protection group, the path protection is not removed from the PE
device. Multipath route is still present. PR1538956
• Continuous rpd crash might be observed if a static group is added to protocol PIM. PR1542573
• The metric of prefixes in intra-area-prefix LSA might be changed to 65535 when the metric of one of
the OSPFv3 P2P interfaces is set to 65535. PR1543147
• The neighbor shutdown configuration of the BGP session does not effect the non-established peer.
PR1554569
• The changes do not get effective when the values are set under the static default hierarchy. PR1555187
• Sending multicast traffic to downstream receiver on the Trio based Virtual Chassis platforms might fail.
PR1555518
• Multipath information is displayed for BGP route even after disabling the interface for one path.
PR1557604
• All the Layer 3 VPN route resets when a VRF is added or removed. PR1560827
• Duplicate LSP next hop is shown on inet.0, inet.3, and mpls.0 route table when OSPF Traffic-Engineering
shortcuts and mpls bgp-igp-both-ribs are enabled. PR1561207
• Six PE device prefixes might not be removed from RIB upon the reception of withdrawal from a BGP
neighbor when RIB sharding is enabled. PR1556271
• Wrong SPF calculation might be observed for OSPF with ldp-synchronization hold-time configured after
the interface flaps. PR1561414
• BGP routes might be stuck in routing table in the Accepted DeletePending state when the BGP peering
session goes down. PR1562090
• VRF table does not get refreshed after a change made to maximum-prefixes in the VRF. PR1564964
• Traffic might be lost during mirror data transmit from primary ppmd/bfdd. PR1570228
• BGP session flap might be observed after the Routing Engine switchovers when the VRRP virtual address
is used as the local address for the BGP session. PR1576959
Services Applications
• Layer 2 TP subscribers might fail to establish a session on MX if the CPE is a virtual host. PR1527343
• The license errors might be returned on the backup Routing Engine when you try to commit the
configuration. PR1543037
• The verbose command unexpectedly becomes hidden after Junos OS Release 16.1 for set system
export-format json. PR1547693
VPNs
• MVPN multicast route entry might not be properly updated with the actual downstream interfaces list.
PR1546739
EVPN
• EVPN-VXLAN core isolation does not work when the system is rebooted or the routing is restarted.
PR1461795
• When a dynamic-list next-hop is referenced by more than one route, it might result in an early deletion
of the next-hop from the kernel, thereby assigning the next-hop index as 0 (next-hop type: dynamic List,
next-hop index: 0 in the output of the show route command). This would not result in a crash but an
early delete from the kernel. PR1477140
• With the EVPN-VXLAN configurations, the IRB MAC does not get removed from the route table after
disabling IRB. PR1510954
• ARP might break when multicast snooping is enabled in EVPN for the VLAN-based and VLAN-bundle
service scenarios. PR1515927
• The rpd process might crash when auto-service-id is configured in the EVPN-VPWS scenario. PR1530991
• All the ARP reply packets towards to some address are flooded across the entire fabric. PR1535515
• UTC timestamp is used in the flat-file-accounting files when a profile is configured. PR1509467
• Traffic might be dropped for not exceeding the configured bandwidth under policer. PR1511041
163
• The pfed process might crash while running the show pfe FPC x command. PR1509114
General Routing
• In some MX Series deployments running Junos OS, the following random syslog messages are observed
for FPCs: FPCx ppe_img_ucode_redistribute Failed to evict needed instr to GUMEM - xxx left. These
messages might not have a service impact. These messages are addressed as INFO level messages. On
a Packet Forwarding Engine, there are dedicated UMEM and shared GUMEM memory blocks. This
informational message indicates some evicting events between UMEN and GUMEN and can be safely
ignored. PR1298161
• The show security group-vpn member IPsec security-associations detail | display xml command is not
in the expected format. PR1349963
• On the MX2000 router, the following error message might be observed if the MPC7 line card is offline
when Routing Engine switchover occurs: Failed to get xfchip. PR1388076
• The rpd scheduler might slip upon executing the show route resolution extensive 0.0.0.0/0 | no-more
command if the number of routes in the system is large (several million). PR1425515
• The MPC9E line card does not get offline due to unreachable destinations in the phase 3 stage.
PR1443803
• The FPC process or Packet Forwarding Engine might crash with the ATM MIC installed in the FPC.
PR1453893
• Application and removal of 1-Gbps speed results in the channel being down. PR1456105
• In an MVPN instance, the traffic drops on multicast receivers within the range of 0.1 to 0.9 percent.
PR1460471
• On the MX960 router, the following error message might be observed: SCHED L4NP[0] Parity errors.
PR1464297
• On the MX150 routers, the request system halt and request system power-off commands do not work
as expected. PR1468921
• The syslog message reports simultaneous zone change reporting for all green, yellow, orange, red zones
for one or more service PICs. PR1475948
• All PPPoE subscribers might not log in after the FPC restarts. PR1479099
• Fabric healing logic incorrectly makes all MPC line cards to go offline in the MX2000 router while the
hardware fault is located on one specific MPC line card slot. PR1482124
• Any change in the nested groups might not be detected on commit and does not take effect. PR1484801
• The following error message is observed on the MPC line card in the manual mode:
clksync_as_evaluate_synce_ref: 362 - Failed to configure clk. PR1490138
• The MX10003 RCB always detects the fire temperature and shuts down in a short time after downgrade.
PR1492121
• The MPC10 or MPC11 line card might crash if the interface is configured with the firewall filter referencing
shared-bandwidth policer. PR1493084
• Heap memory leak might be seen on the MPC10 and MPC11 line cards. PR1499631
• Some of the virtual services might not come up after GRES or rpd restart. PR1499655
• After disabling and enabling the ams0 interfaces, the NAT sessions do not get synchronized back to the
current standby SDG. PR1500147
• Unexpected behavior during the show | display inheritance command is observed when the foreground
is deactivated. PR1500569
• The show services alg conversations and show services alg sip-globals commands are not supported in
the USF mode. PR1501051
• VPN traffic gets silently discarded in a cornered Layer 3 VPN scenario. PR1501935
• The packets from a non-existing source on the GRE or UDP designated tunnel might be accepted.
PR1503421
• Configuring the ranges statement for autosensed VLANs might not work on the vMX platforms.
PR1503538
• The gNMI stream does not follow the frequency on the subscription from the collector. PR1504733
• The rpd process might crash in case of a network churn when the telemetry streaming is in progress.
PR1505425
• After sending the Layer 4 or Layer 7 traffic, the HTTP redirect messages are not captured as expected.
PR1505438
• The l2cpd process might crash if the ERP configuration is added or removed, and the l2cpd process is
restarted. PR1505710
• The heap memory utilization might increase after extensive subscriber login or logout. PR1508291
165
• Outbound SSH connection flap or memory leak issues is observed during push configuration to the
ephemeral database with a high rate. PR1508324
• PFCP message acknowledgment or non-acknowledgment responses are not tracked without the fix. If
the CPF peer drops an acknowledged UPF response message and CPF retries the request, the reattempts
do not get an acknowledgment by the response cache at UPF and get silently dropped. This causes the
CPF state machine to constantly retry requests with those messages being dropped at UPF, which leads
to the Established state at both CPF and UPF. PR1511708
• Static subscribers are logged out after creating a unit under the demux0 interface. PR1511745
• Memory leak on l2ald might be seen when adding or deleting the routing-instances or bridge-domains
configuration. PR1512802
• The wavelength configured through the CLI might not be set on the SFP+-10G-T-DWDM-ZR optics
when the optics is used on the MPC7E line card. PR1513321
• Modifying the segment list of the segment-routing LSP might not work. PR1513583
• Subscribers might not be able to bind again after performing back-to-back GRES followed by an FPC
restart. PR1514154
• The MACsec session might fail to establish if the 256-bit cipher suite is configured for MACsec
connectivity association assigned to a logical interface. PR1514680
• On the MX2010 and MX2020 routers, the SPMB CPU is elevated when an SFB3 is installed. PR1516287
• Active sensor check fails while checking the show agent sensors|display xml command. PR1516290
• The MPC7E line card with QSFP installed might get rebooted when the show mtip-chmac <1|2> registers
vty command is executed. PR1517202
• There might be memory leak in cfmd if both the CFM and inet or IPv4 interfaces are configured.
PR1518744
• The vgd process might generate a core file when the OVSDB server restarts. PR1518807
• The PADI packets might be dropped when the interface encapsulation VPLS is set along with the accepted
protocol configured as PPPoE. PR1523902
• The PSM firmware upgrade must not allow multiple PSM upgrades in parallel to avoid the firmware
corruption and support multiple firmwares for different hardware. PR1524338
• Commit is successful while deactivating CB0 and CB1 interfaces with a running GNF. PR1524766
• According to the OC data model, the openconfig-alarms.yang subscription path must be used as a
system, alarms, or alarm. PR1525180
166
• Addition and removal of an aggregated Ethernet interface member link might cause the PPPoE subscriber
session and traffic to drop. PR1525585
• Commit error messages comes twice while validating the physical-cores statement. PR1527322
• The cpcdd process might generate the core file after upgrading to Junos OS Release 19.4 and later.
PR1527602
• The transit PTP packet might be modified unexpectedly when the packet is passed through MPC2E-NG,
MPC3E-NG, and MPC5E. PR1527612
• The commit confirm command might not roll back the previous configuration when the commit operation
fails. PR1527848
• In the subscriber management environment, the RADIUS interim accounting records does not get
populated with the subscriber statistics. PR1529602
• Deletion of the address of the jmgmt0 interface might fail if the shortened version of the CLI command
is used. PR1532642
• The clear ike statistics with remote gateway does not work. PR1535321
• Multicast traffic might be sent out through unexpected interfaces with distributed IGMP enabled.
PR1536149
• Version-alias is missed for subscribers configured with dynamic profiles after ISSU. PR1537512
• With hold time configuration, the ge interfaces remain down on reboot. PR1541382
• Port mirroring with the maximum-packet-length configuration does not work over GRE interface.
PR1542500
• MPC10 or MPC11 line card might crash in case of Composite Chain Nexthop creation failures. PR1538559
• During an upgrade, vSRX3.0 would display the following incorrect license warnings when utilizing
licensable features even if the license is present on the device: warning: requires 'idp-sig' license.
PR1519672
• On the MX150 router, the logical interfaces stay up during vmhost halt or power-off. PR1526855
• ERO update by the controller for branch LSP might cause issues. PR1508412
• PEM 0 always shows as absent or empty even if PEM 0 is present on the MX10003 router. PR1531190
Infrastructure
• If the serial number of the PEM starts with 1F1, the following alarm might be generated: Minor FPC
PEM Temp Sensor Failed. PR1398128
167
• Unknown MIB OID 1.3.6.1.2.1.47.2.0.30 are referenced in the SNMP trap after upgrading to Junos OS
Release 18.4R3. PR1508281
• SNMP polling might return an unexpected high value for the ifHCOutOctets counter for a physical
interface when any jnxDom OID is processed at the same time. PR1508442
• Control logical interface 32767 is not created on the VLAN-tagged IFD even after removing the VLAN
0 configuration. PR1483395
• Some of the logical interfaces might not come up with the configured vlan-bridge encapsulation.
PR1501414
• Unexpected dual VRRP backup state might occur after performing two subsequent Routing Engine
switchovers with the track priority-hold-time configured. PR1506747
• The vrrpd process might crash when the dual VLAN on VRRP interfaces is configured. PR1512658
• Commit failure is observed while deleting all the units under the ps0 interface. PR1514319
• When multiple CFM sessions are configured on IFD, the SNMP walk of ieee8021CFMStack table fails.
PR1517046
• Inline Y.1731 SLM or DM does not work in enhanced-cfm-mode for the EVPN UP MEP scenario.
PR1537381
• FPC crash might be observed with an inline mode with CFM configured. PR1500048
• The DHCPv6 lease query is not as expected while verifying the DHCPv6 server statistics. PR1506418
• The show dhcpv6 relay statistics command must display DHCPV6_LEASEQUERY_REPLY instead of
DHCPV6_LEASEQUERY_REPL for the messages sent. PR1512246
• The DHCP6 lease query is not as expected while verifying the DHCPV6v relay statistics. PR1521227
• Memory leak in jdhcpd might be seen if access-profile is configured under the dhcp-relay or
dhcp-local-server statement. PR1525052
• Receipt of the malformed DHCPv6 packets causes the jdhcpd process to crash. PR1511782
• The jdhcpd process crashes when a specific DHCPDv6 packet is processed in the DHCPv6 relay
configuration. PR1512765
MPLS
• The RSVP interface bandwidth calculation rounds up. PR1458527
• The same device responds twice for traceroute if it goes through the MPLS network under specific
conditions. PR1494665
• Traffic loss might occur if ISSU is performed when P2MP is configured for an LSP. PR1500615
• The CSPF job might get stalled for a new or an existing LSP in a high-scale LSP setup. PR1502993
• The auto-bandwidth feature might not work correctly in an MPLS scenario. PR1504916
• Activating or deactivating the LDP-sync under OSPF might cause the LDP neighborship to go down and
stay down. PR1509578
• The rpd process might crash after upgrading Junos OS Release 18.1 to a later release. PR1517018
• The SNMP trap is sent with the incorrect OID jnxSpSvcSetZoneEntered. PR1517667
• The LDP session-group might throw a commit error and flap. PR1521698
• ping mpls rsvp does not take into account for the lower MTU in the path. PR1530382
• The rpd process might crash when the LDP route with the indirect next-hop is deleted on the aggregated
Ethernet interface. PR1538124
• The inter-domain LSP with loose next-hops path might get stuck in the Down state. PR1524736
• The RPD scheduler might slip after the link flaps. PR1516657
169
• Traffic to VRRP virtual IP or MAC addresses might be dropped when ingress queuing is enabled.
PR1501014
• Traffic that originates from another subnet is sent out with 0x8100 instead of 0x88a8. PR1502867
• MPCs might crash when there is a change on routes learnt on the IRB interface configured in the VPLS
or EVPN instances. PR1503947
• Traffic loss might be seen in certain conditions under an MC-LAG setup. PR1505465
• The kernel might crash causing the router or the Routing Engine to reboot when performing virtual IP
related change. PR1511833
• During the route table object fetch failure, the FPC process might crash. PR1513509
• The output value of the show jnh qmon queues-sensor stats 0 command has no content. PR1514881
• VPLS connection might be stuck in the primary fail status when a dynamic profile is used on the VPLS
pseudowire logical interface. PR1516418
• Configured scheduler-map is not applied on the ms- interface if the service PIC is in the Offline state
during commit. PR1523881
• Packet loss might be observed when the RFC2544 egress reflector session is configured on the non-zero
Packet Forwarding Ethernet interface. PR1538417
• Trio-based FPC might crash when the underlying layer 2 interface for ARP over IRB interface is changed
from the physical interface to LSI interface. PR1542211
Routing Protocols
• Multicast traffic loss might be seen in certain conditions while enabling IGMP snooping under the
EVPN-VXLAN ERB scenario. PR1481987
• The output value of the show isis interface detail command might be incorrect if wide-metrics-only is
enabled for IS-IS and the ASCII representation of the metric in decimal is more than 6 characters.
PR1482983
• BGP RPKI ROA withdrawal might lead to an unexpected BGP route flap. PR1483097
• There might be rpd memory leak in a certain looped MSDP scenario. PR1485206
170
• The rpd process might crash in a multicast scenario with the configured BGP. PR1501722
• On all Junos OS dual-Routing Engine GRES or NSR enabled routers, the rpd process might crash on a
new primary Routing Engine if the Routing Engine switchover occurs right after massive routing-instance
deletion. PR1507638
• The rpd process might crash due to RIP updates being sent on an interface in the Down state. PR1508814
• The rpd process might crash on the backup Routing Engine if the BGP (standby) receives a route from
the peer, which is rejected due to an invalid target community. PR1508888
• The rpd process might report 100 percent CPU usage with the BGP route damping enabled. PR1514635
• ISIS-SR routes might not be updated to reflect the change in the SRMS advertisements. PR1514867
• The rpd process might crash after deleting and re-adding a BGP neighbor. PR1517498
• The rpd process might crash if there is a huge number of SA messages in the MSDP scenario. PR1517910
• Tag matching in the VRF policy does not work properly when the independent-domain option is
configured. PR1518056
• The BGP-LS NLRI handling improvements are needed for BGP-LS ID TLV. PR1521258
• The IS-IS LSP database synchronization issue might be seen while using the flood-group feature.
PR1526447
• Configuring then next-hop and then reject on a route policy for the same route might cause rpd to crash.
PR1538491
• After moving the peer out of protection group, the path protection not removed from the PE router.
PR1538956
Services Applications
• The FPC process might crash with the npc core file if the service interface is configured under service-set
in the USF mode. PR1502527
• The output value of the show services l2tp tunnel extensive command does not show the configured
session limit. PR1503436
• Destination lockout functionality does not work at the tunnel session level when CDN code is received.
PR1532750
• The LTS incorrectly sends the access-request with the Tunnel-Assignment-ID, which is not compliant
with RFC 2868. PR1502274
171
• The show network-access aaa subscribers statistics username "<>" command fails to fetch the
subscriber-specific AAA statistics information if the user name of the subscriber contains space.
PR1518016
VPNs
• MPLS label manager might allow configuration of a duplicated VPLS static label. PR1503282
• The rpd process might crash after removing the last interface configured under the Layer 2 circuit
neighbor. PR1511783
• The rpd process might crash when deleting the Layer 2 circuit configuration in a specific sequence.
PR1512834
• FTPS traffic might be dropped on MX Series platforms if FTP ALG is used. PR1483834
• The MX10008 and MX100016 routers might generate cosd core files after executing the commit/commit
check command if the policy-map configuration is set. PR1475508
• Error message GENCFG write failed (op, minor_type) = (delete, Scheduler map definition) for tbl id 2
ifl 0 TABLE Reason: No such file or directory is observed. PR1476531
• MX Series platforms with MPC1-Q and MPC2-Q line cards might report memory errors. PR1500250
EVPN
• Remote MAC address present in EVPN database might be unreachable. PR1477140
• Deleting a Layer 2 logical interface generates an error if the interface is not deleted first from EVPN.
PR1482774
• The ESI of IRB interface does not update after autonomous-system number change if the interface is
down. PR1482790
• Dead next-hops might flood in a rare scenario after remote PE devices are bounced. PR1484296
172
• The ARP entry gets deleted from the kernel after adding and deleting the virtual-gateway-address.
PR1485377
• The rpd core file might be generated when doing Routing Engine switchover after disabling BGP protocol
globally. PR1490953
• VXLAN bridge domain might lose VTEP logical interface after restarting chassisd. PR1495098
• The MAC address of the LT interface might not be installed in the EVPN database. PR1503657
• Traffic might be forwarded into the default queue instead of the correct queue when the VPLS traffic
has three or more VLAN tags with VLAN priority 5. PR1473093
• The filter might not be installed if the policy-map xx is present under the filter. PR1478964
General Routing
• Syslog error message PFEIFD: Could not decode media address with length 0 might be generated by
the Packet Forwarding Engine. PR1341610
• The nondefault routing instance is not supported correctly for NTP packets in a subscriber scenario.
PR1363034
• Egress monitored traffic is not mirrored to destination for analyzers on MX Series routers. PR1411871
• FPC x Voltage Tolerance Exceeded alarm raised and cleared upon bootup of JNP10K-LC2101. PR1415671
• Resetting the Playback Engine logs are seen on the MPC5E line cards. PR1420335
• PF core voltage is not set according to the required e-fuse value and remains as default value of 0.9V
on the JNP10008-SF and JNP10016-SF Switch Interface Boards (SIBs). PR1420864
• FPC might crash after GRES when you commit the changes in firewall filter with the next term statement
in the subscriber scenario. PR1421541
• PTP might not work on the MX104 platform if phy-timestamping is enabled. PR1421811
• When you run the show route label X | display json command, two nh keys are present in the output.
PR1424930
• PTP and show warning are disabled when hyper mode is configured. PR1429527
• Interfaces on the MPC-3D-16XGE-SFPP might go down due to CB0 clock failure. PR1433948
• ZF interrupts for out-of-range destination Packet Forwarding Engine INTR for Gnt are observed when
the MPC6 or MPC9 line card is brought up. PR1436148
173
• System reboot is required when GRES is enabled or disabled with the mobile-edge configuration.
PR1444406
• On the MPC10E-15C-MRATE with 25-Gigabit Ethernet ports, FEC statistics are not getting reset after
changing FEC mode. PR1449088
• Need to add support for drop flows when the packet drops. PR1451921
• When MVLAN interface (OIF map) is changed, the existing multicast subscribers with membership
reports in place experience loss of multicast traffic until traffic is forwarded to a new OIF map. PR1452644
• Interfaces shutdown by the disable-pfe action might not be up using MIC offline or online command.
PR1453433
• When scale configurations are applied from approximately 10 minutes, chassisd CLI will either have a
delay in response or will time out. PR1454638
• On 4-port 1-Gigabit Ethernet using QSFP28 optics, continuous logging in chassisd process occurs when
speed 1-Gigabit Ethernet is configured with pic_get_nports_inst and ch_fru_db_key. PR1456253
• On the MPC11E line card, need to add the support of optics-options low light. PR1456894
• LSP statistics are not getting reset after restart routing. PR1458107
• Inline S-BFD packets are dropped on MPC6E MIC1/PIC1 ports: 0-11. PR1459529
• Occasional warning message such as TCP Connect error can be seen during FPC reboot. PR1460153
• Multiple leaf devices and prefixes are missing when LLDP neighbor is added after streaming is started
at the global level. PR1460347
• Support of del_path for the LLDP neighbor change at various levels. PR1460621
• When you receive IPv6 over IPv4 IBGP session, the IPv6 prefix is hidden. PR1460786
• Explicit deletion notification (del_path) is not received when LLDP neighbor is lost as a result of disabling
local interface on the DUT through CLI (gNMI). PR1461236
• On the MPC10E line cards, more output packets than expected are seen when ping function is performed.
PR1461593
• The show dynamic-tunnel database CLI command output does not filter IP-IP tunnels based on
destination. PR1461659
• The CHASSISD_SNMP_TRAP6: SNMP trap generated: Power Supply failed message appears when
both DIP switches and power switch are turned off. PR1462065
• Inline BFD session might flap on renegotiation of timers from slow to aggressive interval. PR1462775
• The native-vlan-id functionality does not work and untagged traffic does not pass with the native-vlan-id
configuration. PR1463544
174
• The jdhcpd process might consume high CPU use, and no further subscribers can be brought up if there
are more than 4000 dhcp-relay clients in the MAC-MOVE scenario. PR1465277
• On the MPC10E and MPC11E line cards, the bandwidth-percent with shaping-rate might not work as
expected on aggregated Ethernet interfaces after shaping-rate change. PR1465766
• The bbe-smgd process generates core files on the backup Routing Engine. PR1466118
• ICMP error messages are still unreceived after enabling the enable-asymmetric-traffic-processing
configuration statement. PR1466135
• A few DHCP INFORM packets specific to a particular VLAN might be taking the incorrect resolve queue.
PR1467182
• On the MPC11E line card, the DOM MIB alarm for the channelized 10-Gigabit Ethernet interface is not
showing any alarm for LF/RF. PR1467446
• Daemons might not be started if commit is executed after commit check. PR1468119
• PPP IPv6 NCP fails to negotiate during the PPP login. PR1468414
• The tcp-log connections fail to reconnect and get stuck in the Reconnect-In-Progress state. PR1469575
• In rare occasions, the router might send out one extra URR quota value for a bearer. PR1470890
• Syslog message FPCX user.notice logrotate: ALERT exited abnormally with [1] pops at 04:02:01.
PR1471006
• DHCP relay with forward-only might fail to send OFFER messages when DHCP client is terminated on
logical tunnel interface. PR1471161
• Sudden FPC shutdown due to hardware failure or ungraceful removal of line card might cause major
alarms on other FPCs in the system. PR1471372
• The clksyncd crash might be seen when PTP over aggregated Ethernet is configured on the MX104
platform. PR1471466
• On the MPC11E line card, locating a specific 100-Gigabit Ethernet, 40-Gigabit Ethernet, and 10-Gigabit
Ethernet port in the card by blinking the corresponding port LED does not work. PR1471894
• Chassis alarm on BSYS might be observed: RE0 to one or many FPCs is via em1: Backup RE. PR1472313
• Manually configured ERO on NS controller might be lost when PCEP session bounces. PR1472825
• SDB goes down very frequently if the reauthenticate lease-renewal statement is enabled for DHCP.
PR1473063
• Some routes might not be installed into the FPC after it gets restarted. PR1473079
175
• On the MPC11E line card, show dynamic-tunnels database command does not show traffic statistics.
PR1473096
• On MPC11, oversubscription drops are not accounted in Routing Engine CLI under resource drops when
Flow control is disabled. PR1473191
• Dynamic-profile for VPLS-PW pseudowire incorrectly reports Dynamic Static Subscriber Base Feature
license alarm. PR1473412
• On the MPC11E line card, after doing Routing Engine switchover on BSYS, the AF interface on peer
router shows status as down with the reason being that the Packet Forwarding Engine is down on the
GNF. PR1473555
• When both MSTP and ERP are enabled on the same interface, then ERP does not come up properly.
PR1473610
• Drops counter does not increment for the aggregated Ethernet even after the member link shows the
drops. PR1473665
• Ingress multicast replication does not work with GRES configuration. PR1474094
• On the MX150 platform, core files are not seen under show system core-dumps. PR1474118
• A newly added LAG member interface might forward traffic even though its micro BFD session is down.
PR1474300
• Upon external X86 node slicing server reboot, the host SNMP configuration gets overwritten by the
JDM SNMP configuration settings. PR1474349
• When traffic loss is observed on a 100-Gigabit Ethernet logical interface, the MACsec sessions are up
and live. PR1474714
• On the MPC11E line card, basic circuit cross-connect traffic flow does not occur with the logical systems.
PR1474983
• The clksyncd process generates core file after the GRES. PR1474987
• Stateful firewall rule configuration deletion might lead to memory leak. PR1475220
• The full list should be returned. A leaf should be considered atomic, regardless of whether it is a single
value or a list for on-change event. PR1475293
• The RADIUS accounting updates of the service session have incorrect statistic data. PR1475729
• When xSTP protocols are enabled on interface all, it might run on vlan-tagging/flexible-vlan-tagging
Layer 3 interfaces and lead to blocking of SXE interface. PR1475854
• Traffic loss might be seen as backup Routing Engine takes around 20 seconds to acquire the primary
role. PR1475871
176
• Traffic drop might be observed while performing a unified ISSU on the MX2020, MX2010, and MX960
platforms. PR1476505
• On the MPC10 or MPC11 line cards, Routing Engine might not be able to send packets with
traffic-manager enhanced-priority-mode configuration enabled. PR1476683
• The host-generated packets which might get dropped at the other end. PR1476764
• Traffic loss might occur to the LNS subscribers in case the routing-service statement is enabled under
the dynamic profile. PR1476786
• Traffic loss might be seen in SAEGW scenario after the daemon restarts or after the GRES operation.
PR1477461
• In NAT-T scenario, IKE version 2 IPsec tunnel flaps if the tunnel initiator is not behind NAT. PR1477483
• The rpd process might crash when the JET RIB API is used to set the "bandwidth" attribute. PR1477745
• On the MX2010 platform, syslog message spmb0 cmty_sfb_temp_check: sfb[0] is powered OFF" &
"spmb0 cmty_sfb_voltage_check_one: sfb[0] is powered OFF is flooding even though SFBs are online.
PR1477924
• The Packet Forwarding Engine might be disabled because of the major error on MPC2E-NG, MPC3E-NG,
MPC5, MPC6, MPC7, MPC8, and MPC9. PR1478028
• The show evpn statistics instance command gets stuck in a multihomed scenario. PR1478157
• At-scale logins of both default and dedicated bearers might require retries from the control plane.
PR1478191
• The ukern-platformd process might crash on MX2000 platforms with MPC11 line card. PR1478243
• MX Series-based MPC line card might crash when there is bulk route update failure in a corner case.
PR1478392
• The FPC with vpn-localization vpn-core-facing-only configuration might be stuck in ready state.
PR1478523
• On MX240, MX480, MX960, MX2000, MX10003, MX10008, and MX10016 with the MPC7E, MPC8E,
and MPC9E line cards, hardware sensor information is logged every 30 minutes. PR1478816
• The protocol MTU might not be changed on lt- interface from the default value. PR1478822
• The TCP-log sessions might be in Established state but no logs are sent out to the syslog server.
PR1478972
177
• Mobile-edge sessions might be lost if GRES is being performed while sessions are logged in with URR
enabled. PR1478985
• The SCBE3 fabric plane gets into check state in MX Series Virtual Chassis. PR1479363
• Interface states are not showing correctly between main and shards on one of the interfaces. PR1479801
• After kmd restarts, IPsec SA comes up but the traffic fails for some time in certain scenarios. PR1480692
• 100-Gigabit interface might randomly fail to come up after maintenance operations. PR1481054
• Issue with binding non-default routing instance to existing soft-gre group. PR1481278
• After unified ISSU on the primary and the backup Routing Engine, ISSU enhanced-mode: Performing
action get-state for error /FPC/5/pfe/0/cm/0/PCIe_Error/0/PCIE_CMERROR_UNCORRECTABLE
(0x190001) error message is generated. PR1481859
• The rpd might crash when you execute the show route protocol l2-learned-host-routing or show route
protocol rift CLI command on a router. PR1481953
• Log in to some PPPoE subscribers through aggregate Ethernet interface might cause the device to reboot.
PR1482431
• Fragmentation limit and reassembly timeout configuration under services option is missing for SPC3.
PR1482968
• When checking the BFD functionality over Layer 2 VPN client, BFD session is not coming up. PR1483014
• Link errors might be seen after restarting the FPC or fabric plane. PR1483124
• Traffic impact might be seen when the policy-multipath is configured without LDP on the SPRING-TE
scenario. PR1483585
• The downstream IPv4 packet greater than BR MTU are getting dropped in MAP-E. PR1483984
• Traffic rate is not as expected on aggregated Ethernet interface when child links are from MPC11 and
MPC9 line card after applying a policer. PR1484193
• The logical tunnel interface might not work on the MPC10 line card. PR1484751
• Fix and enhancement has been done for request rift package activate for the junos-rift package.
PR1485098
• Attribute sending zero value should be compressed because it uses too much bandwidth in periodic
streaming. PR1485257
• Interface input error counters are not increasing on the MX150 platforms. PR1485706
• The krt-nexthop-ack-timeout command might not automatically be picked up on restarting the rpd
process. PR1485800
• MPC10E line card installed in the FPC slot 4 might drop host outbound traffic. PR1485942
178
• Command completion help text for LLDP-MED coordinate configuration statement contains spelling
errors. PR1486327
• The aftd process might crash when MPC10 line card is installed. PR1487416
• Incorrect frame length of 132 bytes might be captured in packet header. PR1487876
• Add support for PSM firmware upgrade on the MX2000 platform. PR1488575
• During multiple login and logout of 250,000 sessions, there can be daemon restart due to mishandling
of data. PR1489512
• NAT rule-sets processing order is not getting processed based on the order configured under service-set.
It is getting processed based on the NAT rules defined under [services nat source] hierarchy level
configuration. PR1489581
• With 4-member AMS used in the service-set, commit check fails when /30 subnet address is used as
NAT pool IP. PR1489885
• Error syslog message Failed to connect to the agentx primary agent (/var/agentx/primary): Unknown
host (/var/agentx/primary) (No such file or directory) is continuously being generated with dns-sinkholing.
PR1490487
• When NAT/SFW rule is configured with application-set with multiple applications having different TCP
inactivity-timeout, sessions are not getting TCP inactivity-timeout as per the configured application
order. PR1491036
• The DAC cable is not detected after reboot or plug out or plug in. PR1491116
• Multiple deactivating and activating of security traceoptions along with clear single NAPT44 session
could result in generation of flowd core file. PR1491540
• MS-MIC is down after loading some releases in the MX Virtual Chassis scenario. PR1491628
• FPCs might stay down or restart when you swap the MPC7, MPC8, and MPC9 line cards with the MPC10
and MPC11 line cards or vice versa in the same slot. PR1491968
• User-configured MTU might be ignored after the unified ISSU upgrade uses request vmhost software
in-service-upgrade. PR1491970
• Behavior change in clients with multiple gRPC channels to same target. PR1492088
• The delay of LT interfaces coming up is seen on MPC11E line card after you configure scaled PS interfaces
anchoring to RLT. PR1492330
• On the MX10008 platform, SNMP table entPhysicalTable does not match the PICs shown for the show
chassis hardware command. PR1492996
• DHCP subscribers do not come up as expected after deactivating the Virtual Chassis port. PR1493699
179
• The ptp-clock-global-freq-tracable leaf value becomes false and does not change to true when the
internal lock is in the Acquiring state. PR1493743
• Error message PFE_ERROR_FAIL_OPERATION: Unable to unbind cos scheduler from physical interface
147 is observed on the MPC9E line card after restarting the MPC11E line card. PR1494452
• In node slicing setup after GRES, RADIUS interim updates might not carry actual statistics. PR1494637
• Group address is not programmed back after deactivating and activating the bridge domain. PR1495480
• Flood next-hop ID is not same in both the primary and backup Routing Engines. PR1495925
• Error message PFEIFD: Could not decode media address with length 0 is generated by the Packet
Forwarding Engine when subscribers come up over a pseudowire interface. PR1496265
• Subscribers might be disconnected after one of the aggregated Ethernet participating FPCs comes online
in a Junos OS node slicing scenario. PR1498024
• SNMP polling does not show correct PSM jnxOperatingState when one of the PSM inputs failed.
PR1498538
• The rpd might crash when multiple VRFs with 'IFLs link-protection' are deleted at a single time. PR1498992
• The commit check might fail when adding IFL into a routing instance with the no-normalization statement
enabled under the [routing-instances] hierarchy. PR1499265
• The heap memory leak might be seen on the MPC10 and MPC11 line cards. PR1499631
• On the MX2010 and MX2020 routers, the pem_tiny_power_remaining message will be continuously
logged in chassisd log. PR1501108
• Application ID does not display under NAT/SFW rule configured with application ’any’ rule. PR1501109
• The show bridge statistics command does not display the statistics information for pseudowire subscriber
interfaces. PR1504409
• The l2cpd crash might be seen if you add or delete ERP configuration and then restart l2cpd. PR1505710
• The host generated packets might get dropped if the force-control-packets-on-transit-path statement
is configured. PR1509790
• The multicast traffic might be dropped if ALB is enabled on the aggregated Ethernet interface. PR1512157
180
Infrastructure
• Slow response from SNMP might be observed after an upgrade to Junos OS Release 19.2R1 and later.
PR1462986
• Decoupling of Layer 2 logical interfaces from bridge and EVPN configurations. PR1438172
• The MC-LAG configuration-consistency ICL configuration might fail after committing some changes.
PR1459201
• On the MPC11E line card, the IPv6 local stats are counted against the IPv6 transit traffic statistics as
well. PR1467236
• When you configure ESI on a physical interface, the traffic drops when you disable the logical interface
under the physical interface. PR1467855
• Traffic is not forwarded properly when traffic-control-profiles with logical interface queues are configured.
PR1475350
• Commit error is not thrown when member link is added to multiple aggregation group with different
interface specific options. PR1475634
• The interface on MIC3-100G-DWDM might go down after performing an interface flap. PR1475777
• When you delete and add a logical interface (both the logical interfaces with the same VLAN ID) in a
single commit, the configuration check fails with the error duplicate VLAN-ID. PR1477060
• A stale IP address might be seen after a specific order of configuration changes in logical systems scenario.
PR1477084
• Traffic is seen for 248 seconds when an aggregated Ethernet member link is brought down with minimum
link configuration. PR1477821
• MC-AE interface might be shown as unknown status if you add the subinterface as part of the VLAN
on the peer MC-AE node. PR1479012
• For ATM interfaces configuration, if any logical interface has the allow-any-vci configuration, then the
commit operation might fail. PR1479153
• PPPoE subscribers are not up while verifying static IPv4 subscriber in passive mode. PR1483395
181
• CFM over BD along with negative events lead to restart and CFM DM two-way verification fails.
PR1489196
• The vrrp-inherit-from change operation leads to packet loss when traffic is forwarded to the VIP gateway.
PR1489425
• When creating custom IDP signatures that match on raw bytes (hexadecimal), the commit check fails if
the administrator has configured the depth parameter. PR1506706
J-Web
• Junos OS security vulnerability in J-Web and Web-based (HTTP/HTTPS) services. PR1499280
• Loop detection might not work on extended ports in Junos fusion scenarios. PR1460209
• Member links state might be unsynchronized on a connection between a PE device and a CE device in
an EVPN active/active scenario. PR1463791
• On the MX204 platform, the Vendor-ID is set as MX10001 in factory-default configuration and DHCP
client messages. PR1488771
• With ALQ and VRRP configurations, DHCP subscribers are not coming up. PR1490907
• Issues with DHCPv6 relay processing confirm and reply packets. PR1496220
• The MC-LAG might become down after disabling and then enabling the force-up. PR1500758
182
Layer 2 Features
• Connectivity is broken through LAG because of the members configured with hold-time and force-up.
PR1481031
MPLS
• Traffic loss might be seen if P2MP with NSR is enabled. PR1434522
• P2MP LSP might flap after VT interface in MVPN routing instance is reconfigured. PR1454987
• The rpd might crash in PCEP for the RSVP-TE scenario. PR1467278
• The fast reroute detour next-hop down event might cause the primary LSP go in the Down state in a
particular scenario. PR1469567
• The LDP and BFD sessions are not coming up in a scaled setup. PR1474204
• The RSVP LSPs might not come up in a scaled network with a very high number of LSPs if NSR is used
on the transit router. PR1476773
• The rpd process crashes on the backup Routing Engine when LDP tries to create LDP P2MP tunnel upon
receiving corrupted data from the primary Routing Engine. PR1479249
• On MX Series with MPC10E line card, rpd core files in rsvp_copy_route (rt=< optimized out>, rtparms_p=<
optimized out>) at
../../../../../../../../../../src/junos/usr.sbin/rpd/mpls_te/proto/rsvp/proto/rsvp_route.c:3033 are seen
after GRES. PR1485985
• The rpd might crash on restart of primary Routing Engine or backup Routing Engine when chain-NH has
inner and outer labels in the SR-TE scenario. PR1486077
• High CPU utilization for rpd might be seen if RSVP is implemented. PR1490163
• The rpd might crash when BGP with FEC 129 VPWS enabled flaps. PR1490952
• BGP session might keep flapping between two directly connected BGP peers because of the incorrect
TCP-MSS in use. PR1493431
• The rpd might crash in a rare condition under SR-TE scenario. PR1493721
• The rpd core files are generated during unified ISSU. PR1493969
• The rpd process might crash when SNMP polling is done using OID jnxMplsTeP2MPTunnelDestTable.
PR1497641
• The rpd process might crash with RSVP configured in a rare timing case. PR1505834
183
• With chained composite next-hop enabled, the MPLS CoS rewrite does not work for IPv6 PE device
traffic. PR1436872
• Traffic loss might be seen in case of Ethernet frame padding with VLAN. PR1452261
• Modifying the REST configuration might cause the system to become unresponsive. PR1461021
• On the MX204 platform, Packet Forwarding Engine errors might occur when incoming GRE tunnel
fragments get sampled and undergo inline reassembly. PR1463718
• The CoS might not work on MPC10E and MPC11E line cards. PR1465870
• VXLAN packet might be discarded with flow caching enabled on MX150 and vMX. PR1466470
• All the subscriber services might be unavailable on vBNG running on MX150 and vMX running in payg
mode. PR1467368
• The JNH memory leaks after CFM session flap for LSI and VT interfaces. PR1468663
• The switch might not be able to learn MAC address with dot1x and interface-mac-limit configured.
PR1470424
• SSH login might hang and the TACACS+ server closes the connection without sending any authentication
failure response. PR1478959
• Remote MEPs are not coming up as expected while verifying MIP functionality with bridge domains.
PR1484303
• The show system buffer command displays all zeros in the MX104 chassis. PR1484689
• MAC learning under bridge domain stops after MC-LAG interface flaps. PR1488251
• MAC malformation might happen in a rare scenario under MX Series Virtual Chassis setup. PR1491091
• In node slicing setup, MPLS TTL might be set to zero when the packet goes through af interface configured
with CCC family. PR1492639
• MPCs might crash when there is a change on routes learned on IRB interface configured in VPLS and
EVPN instances. PR1503947
Routing Protocols
• The BGP session might be stuck with high BGP OutQ value after GRES on both sides. PR1323306
• PIM RPF selection for the specific multicast group might get incorrectly applied to other multicast groups.
PR1443056
• TI-LFA might be unable to install backup path in the routing table in a specific case. PR1458791
• BGP NSR with more than 40,000 IPv6 peers is not qualified or supported. PR1461436
• IS-IS IPv6 routes might flap when there is an unrelated commit under protocol stanza. PR1463650
• The rpd might crash if IPv4 routes are programmed with IPv6 next-hop through JET APIs. PR1465190
• BGP peers might flap if the parameter of hold-time is set small. PR1466709
• The configured BGP damping policy might not take effect after BGP is disabled and then enabled followed
by commit. PR1466734
• The rpd might stop when both instance-import and instance-export policies contain the as-path-prepend
action. PR1471968
• Removing cluster from BGP group might cause prolonged convergence time. PR1473351
• Adjacency SID might be missed and not be advertised to peer/controller/BMP monitor in BGP-LS NLRI.
PR1473362
• SFTP does not connect properly and the following error is displayed: Received message too long.
PR1475255
• The rpd process might crash with BGP multipath and route withdraw occasionally. PR1481589
• The rpd process crashes due to specific BGP UPDATE packets. PR1481641
• The rpd process might crash when deactivating logical systems. PR1482112
• BGP multipath traffic might not fully load-balance for a while after adding a new path for load sharing.
PR1482209
• RIPv2 packets stop transmitting when changing interface-type configuration from P2MP to broadcast.
PR1483181
• The rpd process crashes if the same neighbor is set in different RIP groups. PR1485009
• The BGP-LU routes do not have the label when BGP sharding is used. PR1485422
185
• Removal of the BGP and rib-sharding configuration might cause routing protocols to become unresponsive.
PR1485720
• Layer 3 VPN RR with family route-target and no-client-reflect statements does not work as expected.
PR1485977
• Traffic loss is seen on a scaled MPLS setup after unified ISSU in enhanced mode. PR1486657
• The rpd process crashes if the BGP LLGR with RIB sharding and traceoptions for graceful-restart are
configured. PR1486703
• The rpd might crash when you perform GRES with MSDP configured. PR1487636
• High CPU utilization might be observed when the outgoing BGP updates are sent slowly. PR1487691
• The rpd process might generate core file after always-compare-med is configured for BGP path-selection.
PR1487893
• BGP RIB sharding feature cannot be run on a system with a single CPU. PR1488357
• The BGP route target family might prevent route reflector from reflecting Layer 2 VPN and Layer 3 VPN
routes. PR1492743
• The rpd might crash because of rpd resolver problem of INH. PR1494005
• The static route in inet6.0 or inet6.3 RIB might fail to delete. PR1495477
• For SPRING support SRv6, continuous rpd core files are generated at
isis_set_rt_pfx_sid_tsi,isis_route_change_rt after configuring [set protocols isis topologies ipv6-unicast].
PR1495994
• Receipt of certain genuine BGP packets from any BGP speaker causes rpd to crash. PR1497721
• The rpd might crash if the import policy is changed to accept more routes that exceed the teardown
function threshold. PR1499977
• The rpd process crashes when processing a specific BGP packet. PR1502327
• The show bgp neighbors command shows change in x-path output for input-updates value. PR1504399
• BGP might not advertise routes to peers after a peer flap. PR1507195
Services Applications
• flow-tap add function might not work after the dynamic flow capture services process is restarted.
PR1472109
• On an MX Series router, L2TP LTS fails to forward the agentCircuitId and agentRemoteId AVP toward
the LNS. PR1472775
186
• The kmd might crash due to the incorrect IKE SA establishment after the remote peer's NAT mapping
address has been changed. PR1477181
• Syslog messages pfe_tcp_listener_open_timeout: Peer info msg not received from addr: 0x6000080.
Socket 0xfffff804ad23c2e0 closed is observed. PR1474687
• The delete request of a specified service session through CoA could fail. PR1479486
• The CoA request might not be processed if it includes the proxy-state attribute. PR1479697
• The mac-address CLI option is hidden under the access profile profile-name radius options
calling-station-id-format statement. PR1480119
• The authd log events might not be sent to syslog host when destination-override is used. PR1489339
VPNs
• Traffic loss might be observed when the inter-AS next-generation MVPN VRF is disabled on one of the
ASBRs. PR1460480
• The rpd might crash when "link-protection" is added or deleted from LSP for MVPN ingress replication
selective provider tunnel. PR1469028
• On MVPN scenario, the LSP might stay down on removing all VT interfaces from a single hop egress.
PR1474830
• The MPC10E-15C-MRATE next-generation MPVN ingress replication flushing out is not proper when
in egress the ingress replication configuration is deactivated. PR1475834
• The Layer 2 circuit neighbor might be stuck in RD state at one end of MG-LAG peer. PR1498040
• The rpd core files are generated while disabling Layer 2 circuit with connection protection, backup
neighbor configuration, and Layer 2 circuit trace logs enabled. PR1502003
• The rpd might crash when you delete l2circuit configuration in a specific sequence. PR1512834
SEE ALSO
Documentation Updates
IN THIS SECTION
This section lists the errata and changes in Junos OS Release 20.2R3 documentation for MX Series.
• The Broadband Subscriber Services User Guide incorrectly stated that for Routing Engine-based,
converged HTTP redirect services, a CPCD service rule can include both a redirect term and a rewrite
term. It also incorrectly stated that you can include separate rewrite and redirect rules in the same service
profile.
SEE ALSO
IN THIS SECTION
This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for
Junos OS for the MX Series. Upgrading or downgrading Junos OS might take several minutes, depending
on the size and configuration of the network.
Starting in Junos OS 17.4R1 release, FreeBSD 11.x is the underlying OS for all Junos OS platforms which
were previously running on FreeBSD 10.x based Junos OS. FreeBSD 11.x does not introduce any new
Junos OS related modifications or features but is the latest version of FreeBSD.
The following table shows detailed information about which Junos OS can be used on which products:
MX2010, MX2020
189
NOTE: Before upgrading, back up the file system and the currently active Junos OS configuration
so that you can recover to a known, stable environment in case the upgrade is unsuccessful.
Issue the following command:
The installation process rebuilds the file system and completely reinstalls Junos OS. Configuration
information from the previous software installation is retained, but the contents of log files might
be erased. Stored files on the routing platform, such as configuration templates and shell scripts
(the only exceptions are the juniper.conf and ssh files might be removed. To preserve the stored
files, copy them to another system before upgrading or downgrading the routing platform. For
more information, see the Installation and Upgrade Guide.
For more information about the installation process, see Installation and Upgrade Guide and Upgrading
Junos OS with Upgraded FreeBSD.
1. Using a Web browser, navigate to the All Junos Platforms software download URL on the Juniper
Networks webpage:
https://www.juniper.net/support/downloads/
2. Select the name of the Junos OS platform for the software that you want to download.
3. Select the release number (the number of the software version that you want to download) from the
Release drop-down list to the right of the Download Software page.
5. In the Install Package section of the Software tab, select the software package for the release.
6. Log in to the Juniper Networks authentication system using the username (generally your e-mail address)
and password supplied by a Juniper Networks representative.
190
9. Copy the software to the routing platform or to your internal software distribution site.
NOTE: We recommend that you upgrade all software packages out of band using the console
because in-band connections are lost during the upgrade process.
All customers except the customers in the Eurasian Customs Union (currently composed of Armenia,
Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package:
Customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan,
Kyrgyzstan, and Russia) can use the following package (Limited encryption Junos package):
• /pathname—For a software package that is installed from a local directory on the router.
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
191
• http://hostname/pathname
• scp://hostname/pathname
Do not use the validate option while upgrading from Junos OS (FreeBSD 6.x) to Junos OS (FreeBSD
11.x). This is because programs in the junos-upgrade-x package are built based on FreeBSD 11.x, and
Junos OS (FreeBSD 6.x) would not be able to run these programs. You must run the no-validate option.
The no-validate statement disables the validation procedure and allows you to use an import policy
instead.
Use the reboot command to reboot the router after the upgrade is validated and installed. When the
reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.
NOTE:
• You need to install the Junos OS software package and host software package on the routers
with the RE-MX-X6 and RE-MX-X8 Routing Engines. For upgrading the host OS on these
routers with VM Host support, use the junos-vmhost-install-x.tgz image and specify the name
of the regular package in the request vmhost software add command. For more information,
see the VM Host Installation topic in the Installation and Upgrade Guide.
• Starting in Junos OS Release 20.2R3, in order to install a VM host image based on Wind River
Linux 9, you must upgrade the i40e NVM firmware on the following MX Series routers:
[See https://kb.juniper.net/TSB17603.]
NOTE: After you install a Junos OS Release 20.2R3 jinstall package, you cannot return to the
previously installed Junos OS (FreeBSD 6.x) software by issuing the request system software
rollback command. Instead, you must issue the request system software add no-validate command
and specify the jinstall package that corresponds to the previously installed software.
NOTE: Most of the existing request system commands are not supported on routers with the
RE-MX-X6 and RE-MX-X8 Routing Engines. See the VM Host Software Administrative Commands
in the Installation and Upgrade Guide.
192
1. Using a Web browser, navigate to the All Junos Platforms software download URL on the Juniper
Networks webpage:
https://www.juniper.net/support/downloads/
2. Select the name of the Junos OS platform for the software that you want to download.
3. Select the release number (the number of the software version that you want to download) from the
Release drop-down list to the right of the Download Software page.
5. In the Install Package section of the Software tab, select the software package for the release.
6. Log in to the Juniper Networks authentication system using the username (generally your e-mail address)
and password supplied by a Juniper Networks representative.
9. Copy the software to the routing platform or to your internal software distribution site.
NOTE: We recommend that you upgrade all software packages out of band using the console
because in-band connections are lost during the upgrade process.
• All customers except the customers in the Eurasian Customs Union (currently composed of Armenia,
Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package:
• Customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan,
Kyrgyzstan, and Russia) can use the following package (Limited encryption Junos OS package):
193
• /pathname—For a software package that is installed from a local directory on the router.
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
• http://hostname/pathname
• scp://hostname/pathname
The validate option validates the software package against the current configuration as a prerequisite
to adding the software package to ensure that the router reboots successfully. This is the default
behavior when the software package being added is a different release.
Use the reboot command to reboot the router after the upgrade is validated and installed. When the
reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.
NOTE: After you install a Junos OS Release 20.2R3 jinstall package, you cannot return to the
previously installed software by issuing the request system software rollback command. Instead,
you must issue the request system software add validate command and specify the jinstall
package that corresponds to the previously installed software.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
194
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
If the router has two Routing Engines, perform the following Junos OS installation on each Routing Engine
separately to avoid disrupting network operation:
1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine, and save the
configuration change to both Routing Engines.
2. Install the new Junos OS release on the backup Routing Engine while keeping the currently running
software version on the master Routing Engine.
3. After making sure that the new software version is running correctly on the backup Routing Engine,
switch over to the backup Routing Engine to activate the new software.
4. Install the new software on the original master Routing Engine that is now active as the backup Routing
Engine.
For the detailed procedure, see the Installation and Upgrade Guide.
To downgrade from Release 20.2R3 to another supported release, follow the procedure for upgrading,
but replace the 20.2R3 jinstall package with one that corresponds to the appropriate release.
SEE ALSO
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for the NFX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What’s New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for NFX Series.
196
NOTE: For information about NFX product compatibility, see NFX Product Compatibility.
There are no new features or enhancements to existing features for NFX Series devices in Junos OS
Release 20.2R3.
There are no new features or enhancements to existing features for NFX Series devices in Junos OS
Release 20.2R2.
Application Security
• AppQoE multihoming with active-active deployment (NFX150, NFX250, SRX320, SRX340, SRX345,
SRX550HM, SRX1500, SRX4100, SRX4200, and vSRX)—Starting In Junos OS Release 20.2R1, AppQoE
is enhanced to support multihoming with active/active deployment. In previous releases, AppQoE
supports multihoming with active/standby deployment.
In active/active deployment, the spoke device connects to multiple hub devices. Application traffic can
transit through any of the hub devices if the link to the hub device meets SLA requirements. Application
traffic can switch seamlessly between the hub devices in case of SLA violation or if the active hub device
is not responding.
To support active/active mode, you must enable the BGP multipath to allow the device to select multiple
equal-cost BGP paths to reach a given destination.
• Packet capture for unknown application traffic (NFX Series, SRX Series, and vSRX)—Starting in Junos
OS Release 20.2R1, you can generate packet capture information for unknown application traffic on
your security device. You can use this information to get more insight on unknown applications.
After you configure packet capture for the application traffic on your device, the packet capture function
captures the packet details and stores the information in a packet capture (.pcap) file. You can use the
packet capture details of an unknown application to define a new custom application signature and
create a security policy rule to manage the application traffic more efficiently.
You can submit the packet capture information to Juniper Networks to debug why an application is not
detected, and if required, request to create an application signature.
High Availability
• High availability on NFX250 NextGen devices—Starting in Junos OS Release 20.2R1, NFX250 NextGen
devices support the high availability feature. You can configure a cluster of two NFX250 NextGen devices
to act as primary and secondary devices for protection against device failures. The high availability
feature supports Layer 2 and Layer 3 features in dual CPE deployments.
By default, the ge-0/0/0 interface functions as the control interface. You can configure one of the
remaining front panel interfaces as the fabric interface. On the LAN, the active/backup mechanism is
used. If the primary device fails, the secondary device takes over the operation. On the WAN, both
active/active and active/backup mechanisms are supported.
Interfaces
• ADSL and VDSL interfaces on NFX350 devices—Starting in Junos OS Release 20.2R1, NFX350 devices
support ADSL and VDSL interfaces.
SEE ALSO
What's Changed
IN THIS SECTION
Learn about what changed in the Junos OS main and maintenance releases for NFX Series devices.
There are no changes in the behavior of Junos OS features or in the syntax of Junos OS statements and
commands in Junos OS Release 20.2R3 for NFX Series devices.
There are no changes in the behavior of Junos OS features or in the syntax of Junos OS statements and
commands in Junos OS Release 20.2R2 for NFX Series devices.
There are no changes in the behavior of Junos OS features or in the syntax of Junos OS statements and
commands in Junos OS Release 20.2R1 for NFX Series devices.
SEE ALSO
Known Limitations
There are no known behaviors, system maximums, and limitations in hardware and software in Junos OS
Release 20.2R3 for NFX Series devices.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
SEE ALSO
Open Issues
IN THIS SECTION
Interfaces | 200
Learn about open issues in Junos OS Release 20.2R3 for NFX Series devices.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
200
High Availability
• On an NFX150 chassis cluster device, the first packet is getting dropped while validating VLAN support
on reth interfaces and child link. PR1488462
Interfaces
• When you configure analyzers on VNF interfaces with output port as other VNF interfaces, all the
incoming and outgoing packets can be mirrored on to the designated analyzer port. However, it is noticed
that after a system reboot, this functionality stops working and no packets are mirrored on the output
analyzer port. PR1480290
• The following messages are seen during FTP: ftpd[14105]: bl_init: connect failed for
/var/run/blacklistd.sock (No such file or directory) messages are seen during FTP. PR1315605
• On NFX Series devices, while configuring vmhost vlans using vlan-id-list, the system allows duplicate
VLAN IDs in the VLAN ID list. PR1438907.
SEE ALSO
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in the Junos OS Release 20.2R3 for NFX Series devices.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• False positive TSensor errors are reported on vjunos0. PR1508580
High Availability
• On NFX150 devices, upgrade from Junos OS Release 19.4 to Junos OS Release 20.2 fails and the
/usr/sbin/boot_mgmt_fsm: line 40: echo: write error: No space left on device issue message is displayed.
PR1532334
Interfaces
• On NFX Series and MX150 devices, the following error messages are seen in the messages log file for
the interfaces that have SFP installed in them: fpc0 FAILED(-1) read of SFP eeprom for port: 13.
PR1529939
• On NFX250 devices, the l2cpd core files might be seen on reboot. This is a one-time core and does not
impact the functionality of the device. PR1561235
202
Interfaces
• On NFX350 devices, the show interfaces | no-more command output stops appearing for around 20
seconds after displaying the dl0 interface. PR1502626
• The device reads the board ID from eeprom directly using I2C upon power cycle. PR1529667
• SDWAN NFX150 HA - while upgrade from 19.4 -> 20.2 observed "/usr/sbin/boot_mgmt_fsm: line 40:
echo: write error: No space left on device issue" that is not allowing to upgrade.
Application Security
• AppQoE is sending active prob packets for the deleted active-probe-params. PR1492208
High Availability
• On NFX250 chassis cluster, L3 interfaces are not getting created after secondary automatic reboot when
control port recovery is enabled. PR1502449
Interfaces
• On NFX150 devices, no error is displayed when the commit fails after you configure native-vlan-id on
an access VNF interface. PR1438854
• On NFX250 NextGen devices, the monitor interface traffic command might not display the pps output
for SXE and physical interfaces. PR1464376
• On NFX350 devices, the clear interface statistics all command takes a longer time to execute. PR1475804
• On NFX350 devices, if you delete and add an SXE interface, the SXE interface moves to the Spanning
Tree Protocol blocking (STP BLK) state, and the traffic drops on that interface. PR1475854
203
• On NFX350 devices, if you execute the show vmhost mode command multiple times, JDM might crash
and cause the show vmhost mode commands to stop working. PR1474220
• Core files on NFX250 while adding the second LAN subnet. PR1490077
• After initiation of zeroization, the NFX250 device is going into a reboot loop. PR1491479
• The request vmhost power-off command reboots the NFX250 NextGen device instead of powering off
the device. PR1493062
SEE ALSO
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for NFX Series devices.
SEE ALSO
204
IN THIS SECTION
This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for
Junos OS for the NFX Series. Upgrading or downgrading Junos OS might take several hours, depending
on the size and configuration of the network.
NOTE: For information about NFX product compatibility, see NFX Product Compatibility.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
To upgrade or downgrade from a non-EEOL release to a release more than three releases before or after,
first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release to your
target release.
For more information on EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
205
When upgrading or downgrading Junos OS, use the jinstall package. For information about the contents
of the jinstall package and details of the installation process, see the Installation and Upgrade Guide. Use
other packages, such as the jbundle package, only when so instructed by a Juniper Networks support
representative.
NOTE: The installation process rebuilds the file system and completely reinstalls Junos OS.
Configuration information from the previous software installation is retained, but the contents
of log files might be erased. Stored files on the device, such as configuration templates and shell
scripts (the only exceptions are the juniper.conf and ssh files), might be removed. To preserve
the stored files, copy them to another system before upgrading or downgrading the device. For
more information, see the Software Installation and Upgrade Guide.
NOTE: We recommend that you upgrade all software packages out of band using the console
because in-band connections are lost during the upgrade process.
1. Using a Web browser, navigate to the All Junos Platforms software download URL on the Juniper
Networks webpage:
https://www.juniper.net/support/downloads/
2. Select the name of the Junos OS platform for the software that you want to download.
4. Select the release number (the number of the software version that you want to download) from the
Version drop-down list to the right of the Download Software page.
5. In the Install Package section of the Software tab, select the software package for the release.
6. Log in to the Juniper Networks authentication system using the username (generally your e-mail address)
and password supplied by Juniper Networks representatives.
9. Copy the software to the device or to your internal software distribution site.
SEE ALSO
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for the PTX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
207
What's New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for PTX Series.
There are no new features or enhancements to existing features for PTX Series routers in Junos OS Release
20.2R3.
There are no new features or enhancements to existing features for PTX Series routers in Junos OS Release
20.2R2.
• Unsupported hardware for unified ISSU (MX240, MX480, MX960, MX10003, and PTX3000)—The
following cards do not support unified ISSU upgrading to Junos OS Release 20.2R1:
208
• MPC7E-MRATE
• MPC10E-10C-MRATE
• MPC10E-15C-MRATE
• PTX5000 with 24-Port 10-Gigabit Ethernet, 40-Gigabit Ethernet PIC with QSFP+ or 15-Port 10-Gigabit,
40-Gigabit Ethernet, 100-Gigabit Ethernet PIC with QSFP28
By default, the QFX1000-60S-6Q line card (ports 0 to 59) operates at 10-Gbps speed.
[See QFX10000 Line Cards for details on the combination of modes supported on the ports.]
This feature applies to all routes programmed using the rib_service JET API where an interface is
configured as a direct next hop, including interfaces that are part of a flexible tunnel. It also applies to
tunnels configured with the flexible_tunnel_service JET API.
[See rib-service (programmable-rpd), Juniper Extension Toolkit Developer Guide, and Juniper Engineering
Network website.]
• Python 3 support for JET (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS can use Python 3 to execute JET scripts. To
enable unsigned JET Python applications that support Python 3 to run on devices running Junos OS,
use the set system scripts language python3 command.
209
[See language (Scripts), Develop Off-Device JET Applications, and Develop On-Device JET Applications.]
[See Mapping OpenConfig Routing Policy Commands to Junos Configuration and Mapping OpenConfig
Network Instance Commands to Junos Operation.]
• ON-CHANGE BGP peer information statistics support for JTI (MX960, MX2008, MX2010, MX2020,
PTX1000, PTX5000, PTX10000, QFX5100, and QFX5200)—Junos OS Release 20.2R1 provides BGP
peer sensor support using Junos telemetry interface (JTI) and remote procedure call (gRPC) services or
gRPC Network Management Interface (gNMI) services. ON_CHANGE statistics are sent to an outside
collector.
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/active (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/received (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/sent (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/rejected (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/admin-state
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
established-transitions (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
last-established (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
received/notification (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/messages/
received/update (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
sent/notification (stream)
210
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
sent/update (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
session-state (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
supported-capabilities (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/local-address
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/remote-address
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/remote-port
(ON_CHANGE)
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• Telemetry support for LDP and MLDP traffic statistics (MX Series and PTX Series)—Starting in Junos
OS Release 20.2R1, the following LDP and multipoint LDP native sensors are added for the Junos
telemetry interface:
• /junos/services/ldp/label-switched-path/ingress/usage/
• /junos/services/ldp/label-switched-path/transit/usage/
• /junos/services/ldp/p2mp/interface/receive/usage/
• /junos/services/ldp/p2mp/interface/transmit/usage/
• /junos/services/ldp/p2mp/label-switched-path/usage/
You must enable telemetry streaming with the sensor-based-stats option at the [edit protocols ldp
traffic-statistics] hierarchy level.
The show ldp traffic-statistics command is enhanced to display upstream LDP traffic statistics and to
display multipoint LDP traffic statistics per interface.
On PTX Series routers, this feature is not supported for the following variants:
• PTX10003
• CPU statistics support on JTI (MX960, MX2010, MX2020, PTX1000, PTX5000, PTX10000, QFX5100,
and QFX5200)—Junos OS Release 20.2R1 supports streaming various CPU statistics and process
parameters using remote procedure call (gRPC) or gRPC Network Management Interface (gNMI) services
211
and Junos telemetry interface (JTI). You can stream CPU usage per process (statistics are similar to output
from the show system process detail operational mode command), as well as CPU usage per Routing
Engine core.
To stream statistics to an outside collector, include the following resource paths in a gRPC or gNMI
subscription:
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• Packet Forwarding Engine sensor support with INITIAL_SYNC on JTI (MX960, MX2008, MX2010,
MX2020, PTX1000, PTX5000, PTX10000 line of routers, QFX5100, and QFX5200)—Starting in Junos
OS Release 20.2R1, you can use Junos telemetry interface (JTI) and gRPC Network Management Interface
(gNMI) services to export Packet Forwarding Engine statistics from devices to an outside collector using
gNMI submode INITIAL_SYNC. When an external collector sends a subscription request for a sensor
with INITIAL_SYNC (gnmi-submode 2), the host sends all supported target leaves (fields) under that
resource path at least once to the collector with the current value. This is valuable because:
• The collector has a complete view of the current state of every field on the device for that sensor
path.
• Event-driven data (ON_CHANGE) is received by the collector at least once before the next event is
seen. In this way, the collector is aware of the data state before the next event happens.
• Packet Forwarding Engine sensors that contain zero counter values (zero-suppressed) that normally
do not show up in streamed data are sent, ensuring that all fields from each line card (also referred to
as source) are known to the collector.
NOTE: ON_CHANGE data is not available for native (UDP) Packet Forwarding Engine sensors.
INITIAL_SYNC submode requires that at least one copy to be sent to the collector; however, sending
more than one is acceptable.
• Sensor for physical interface traffic except queue statistics (resource path /junos/system/linecard/
interface/traffic/)
[See Understanding OpenConfig and gRPC and gNMI on Junos Telemetry Interface and Guidelines for
gRPC and gNMI Sensors (Junos Telemetry Interface).]
MPLS
• Support for MPLS ping and traceroute for segment routing (ACX Series, MX Series, and PTX
Series)—Starting in Junos OS Release 20.2R1, we extend the MPLS ping and traceroute support for all
types segment routing--traffic engineering (SR-TE) tunnels, including static segment routing tunnels,
BGP-SR-TE tunnels, and PCEP tunnels.
• FEC validation support, as defined in RFC 8287, for paths consisting of IGP segments. Target FEC
stack contains single or multiple segment ID sub-TLVs. This involves validating IPv4 IGP-Prefix Segment
and IGP-Adjacency Segment ID FEC-stack TLVs.
• BFD
[See traceroute mpls segment-routing spring-te and ping mpls segment routing spring-te.]
• mplsMldpInterfaceStatsTable
• mplsMldpFecUpstreamSessPackets
• mplsMldpFecUpstreamSessBytes
• mplsMldpFecUpstreamSessDiscontinuityTime
213
The multicast LDP standard MIB builds on the objects and tables that are defined in RFC3815, which
only supports LDP point-to-point label-switched paths (LSPs). This multicast LDP MIB provides support
for managing multicast LDP point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) LSPs.
[See Standard SNMP MIBs Supported by Junos OS and SNMP MIB Explorer.]
• Python 3 support for YANG scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS uses Python 3 to execute YANG action and
translation scripts that are written in Python. Junos OS does not support using Python 2.7 to execute
YANG Python scripts as of this release.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
• NETCONF sessions over outbound HTTPS (EX Series, MX Series, PTX1000, PTX3000, PTX5000,
PTX10001, PTX10002, PTX10008, PTX10016, QFX Series, SRX1500, SRX4100, SRX4200, SRX4600,
SRX5400, SRX5600, SRX5800, and vSRX)—Starting in Junos OS Release 20.2R1, the Junos OS with
upgraded FreeBSD software image includes a Juniper Extension Toolkit (JET) application that supports
establishing a NETCONF session using outbound HTTPS. The JET application establishes a persistent
HTTPS connection with a gRPC server over a TLS-encrypted gRPC session and authenticates the
NETCONF client using an X.509 digital certificate. A NETCONF session over outbound HTTPS enables
you to remotely manage devices that might not be accessible through other protocols, for example, if
the device is behind a firewall.
• Enhanced on-box monitoring support on the control plane (MX Series and PTX Series)—Starting in
Junos OS Release 20.2R1, you can configure traceoptions to track all events related to system-level and
process-level memory monitoring. You can also view the history of the actions taken for system-level
and process-level memory monitoring by using the show system monitor memory actions command.
You can use route filter lists to group individual route filters created at the [edit policy-options] hierarchy
level. Each item in a list consists of a complete route filter statement, including a destination prefix, a
match type, and an optional action. Reuse the list in different policies, adding whatever qualifiers you
need, instead of re-creating a different one for every use case.
[See Understanding Route Filters for Use in Routing Policy Match Conditions.]
Routing Protocols
• TI-LFA SRLG protection for IS-IS (MX Series and PTX Series)—Starting in Junos OS Release 20.2R1,
you can configure Shared Risk Link Group (SRLG) protection in topology-independent loop free alternate
(TI-LFA) networks. IS-IS computes the fast reroute path that is aligned with the post-convergence path
and excludes the SRLG of the protected link. All local and remote links that share any SRLG with the
214
protecting link are excluded. The point of local repair (PLR) sets up the label stack for the fast reroute
path with a different outgoing interface.
To enable TI-LFA SRLG protection with segment routing for IS-IS, include the srlg-protection statement
at the [edit protocols isis interface name level number post-convergence-lfa] hierarchy level.
[See Understanding Topology-Independent Loop-Free Alternate with Segment Routing for IS-IS.]
• Support for BGP-LU over SR-TE for color-based mapping of VPN Services (MX Series and PTX
Series)—Starting in Junos OS Release 20.2R1, we are extending support to BGP labeled unicast service
for color-based mapping of VPN services over Segment Routing-Traffic Engineering (SR-TE). This enables
you to advertise BGP-LU IPv6 and IPv4 prefixes with an IPv6 next-hop address in IPv6-only networks
where routers do not have any IPv4 addresses configured. With this feature, BGP-LU can now resolve
IPv4 and IPv6 routes over the SR-TE core. BGP-LU constructs a colored protocol next hop, which is
resolved on a colored SR-TE tunnel in the inetcolor.0 or inet6color.0 table. Currently, we support BGP
IPv6 LU over SR-TE with IS-IS underlay.
• Support for BGP-SR-TE rearchitecture (MX Series and PTX Series)—Starting in Junos OS Release 20.2R1,
Junos OS provides support for controller-based BGP segment routing--traffic engineering (SR-TE) routes
to be installed as source packet routing traffic-engineered (SPRING-TE) routes. BGP installs the SR-TE
policy in the routing tables bgp.inetcolor.0 and bgp.inet6color.0, and these routes are subsequently
installed in the routing tables inetcolor.0 or inet6color.0 by SPRING-TE.
In releases before Junos OS Release 20.2R1, controller-based BGP SR-TE routes are installed as BGP
routes in the routing table. To maintain consistency and for easy maintenance, all SR-TE based routes
appear as SPRING-TE routes irrespective of the source.
You need to enable source-packet-routing at the [edit protocols] hierarchy level to see the routes
installed in inetcolor.0 or inet6color.0. A new option detail is introduced under traceoptions (Protocols
Spring-TE) to trace the detailed information.
System Logging
• Support to track the maximum number of routing and forwarding (RIB/FIB) routes and VRFs (MX Series
and PTX Series)—Starting in Junos OS Release 20.2R1, you can track and display the high-water mark
data of routing and forwarding (RIB/FIB) table routes and VRFs in a system (RPD) using the show route
summary CLI command. High-water mark refers to the maximum number of routing and forwarding
(RIB/FIB) table routes and VRFs that were present in the RPD system. The high-water mark data can
also be viewed in the syslog at the LOG_NOTICE level.
You can configure the interval of the high-water mark data using the highwatermark-log-interval CLI
configuration statement at the [edit routing-options] hierarchy level. The minimum time gap at which
the high-water mark data logged in the syslog is 30 seconds. You can configure the value for
highwatermark-log-interval CLI configuration statement between 5 and 1200 seconds.
SEE ALSO
What's Changed
IN THIS SECTION
Learn about what changed in Junos OS main and maintenance releases for PTX Series routers.
216
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX commit scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX commit scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX event scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX event scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are included in system log files.
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
217
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the [edit system services netconf]
hierarchy level, the NETCONF server suppresses any <commit-results> XML subtree in the response
and emits only an <ok> or <rpc-error> element.
• PTX10003 routers do not support set chassis fpc fpc-slot power on—The PTX10003-80C and
PTX10003-160C routers do not support the set chassis fpc fpc-slot power on command. Executing this
command on an FPC which is offline could cause unintended reboots of the router.
[See export-format.]
General Routing
• Trigger alarms when a PTX10008 or PTX10016 router has a mix of AC and DC power supplies—If you
insert a mix of AC and DC power supply units (PSUs) into a PTX10008 or PTX10016 router, Junos OS
raises an alarm to indicate that there is a mix of AC and DC power supplies in the router. To fix this
alarm, you need to ensure that the router has the same type of power supplies.
• Control plane DDoS protection packet type option for ARP traffic (PTX Series and QFX Series)—Starting
in this release, the arp-snoop packet type option in the edit system ddos-protection protocols arp
protocol group is renamed simply arp. This packet type option enables you to change default control
plane DDoS protection policer parameters for ARP traffic. After this change, the edit system
ddos-protection protocols arp protocol group includes aggregate, arp, and unclassified packet type
options.
• PTX10001-36MR, PTX10008, and PTX10016 routers support a maximum of two drop profile pairs
(PTX Series)—Pair one drop probability must be less than or equal to 25%. Point two drop probability
value must be greater than point one drop probability value. Pair two fill level must be greater than or
equal to 1.2 times the pair one fill level.
218
• IPv6 address in the prefix TIEs displayed correctly—The IPv6 address in the prefix TIEs are displayed
correctly in the show rift tie output.
MPLS
• Change in auto bandwidth adjustment (PTX5000)—If auto bandwidth adjustment fails because of
bandwidth unavailable error, the router tries to bring up the LSP with the same bandwidth during the
subsequent reoptimization. In earlier releases, when the auto bandwidth adjustment fails, the current
bandwidth is reset to the bandwidth that was already active.
[See rsvp-error-hold-time.]
Routing Protocols
• Advertising 32 secondary loopback addresses to traffic engineering database as prefixes (ACX Series,
EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—We've made changes to export multiple
loopback addresses to the lsdist.0 and lsdist.1 routing tables as prefixes. This eliminates the issue of
advertising secondary loopback addresses as router IDs instead of prefixes. In earlier releases, multiple
secondary loopback addresses in the traffic engineering database were added to the lsdist.0 and lsdist.1
routing tables as part of node characteristics and advertised them as the router ID.
SEE ALSO
Known Limitations
IN THIS SECTION
MPLS | 219
Learn about known limitations in Junos OS Release 20.2R3 for PTX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• On the PTX10008 or PTX10016 routers, the GRES takes more than 3 minutes to complete when
shutdown is initiated by the internal vmhost init 0 command. PR1312065
• The filter-based GRE encapsulation does not work in the egress direction when the filter attachment
interface and the interface to reach the next hop are the same. PR1465837
• During reconfigurations and link events at the physical interface level, the
pe.ipw.misc_int.status:iq_disabled error message can be seen. This does not impact traffic. PR1476553
• The sflow record command shows incorrect output interface for the egress sampling during the incoming
MPLS|IPv4 and outgoing IPv4 with ECMP. PR1478012
• The PTX10000 routers include the incoming MPLS label stack length also in the jvision counters when
acting as the PE device egress counter. PR1482408
• On the PTX1000 routers, the following error message is observed when the sampling MPLS+IPv4/IPv6
traffic is forwarded over the IP-IP tunnel: dlu.ucode.jflow_not_routable pechip. PR1485770
• The following error messages are seen after configuring set chassis maximum-ecmp 64:
JPRDS_NH:jprds_nh_alloc(),990: JNH[3] failed to grab new region for EGRESS. PR1490813
• The show dynamic-tunnels database statistics <dest> command must be structured so that the statistics
are fetched deterministically for the IPv4 and IPv6 based tunnels. PR1488715
MPLS
• Traffic outage during FRR is observed with ingress node logs data errors. PR1430361
Routing Protocols
• Router receives and discards traffic for three-and-a-half minutes after bootup when IGP overload is
configured. PR1495435
SEE ALSO
Open Issues
IN THIS SECTION
Infrastructure | 223
MPLS | 223
Learn about open issues in the Junos OS Release 20.2R3 for PTX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• When CFP2-DCO-T-WDM-1 is plugged in to a PTX Series PIC, after FPC restarts, the carrier frequency
offset TCA is raised even when TCA is not enabled. PR1301471
• The PTX Series platform drops the wireless access point (WAP) heartbeat packets; as a result, the WAP
cannot work. PR1352805
221
• Due to transient hardware condition, single-bit error (SBE) events are corrected and have no operational
impact. Reporting of those events had been disabled to prevent alarms and possibly unnecessary hardware
replacements. This change applies to all platforms using Hybrid Memory Controller (HMC). PR1384435
• On the PTX10000 Series platform, the CPU overuse on priority-based flow control might be observed
if the adaptive feature is enabled to load-balance for an aggregated Ethernet interface. PR1399369
• On the PTX3000 routers, the firewall counter for lo0 does not increment. PR1420560
• The em2 interface configuration causes FPC to crash during initialization and FPC does not come online.
After deleting the em2 configuration and restarting the router, FPC comes online. PR1429212
• When the firewall filter has Port-Mirror as an action along with discard action, the mirrored packet will
have two L2 headers. The first L2 header will be the original L2 header and the second L2 header will
be egress interface L2 header. This causes packet corruption and discard. PR1437546
• On Junos OS platforms with next generation Routing Engine installed, the process vehostd may crash
without the core file and automatic restart of vehostd may fail. Vehostd is a mib2d MIB II process for
managing the lifecycle of system-critical Junos OS VMs in the system. If the process vehostd gets in a
crash state, it will impact the management of Junos OS VMs. PR1448413
• With auto-channelization support, an optic speed mismatch connection might cause the
auto-channelization to get into an infinite loop trying to match a proper speed. In this case, due to some
memory leaks, the resources get exhausted, resulting in system crash. The traffic gets disrupted when
the system dcpfe restarts. PR1484336
• The Layer 2 VPN with asynchronous-notification might flap when the link goes up between the PE
device and CE device. After Layer 2 VPN flaps, the interfaces with asynchronous-notification might
show - Inf dBm laser output power even if the Layer 2 VPN is in the up status. PR1486181
• Traceroute on IPoIP tunnel might not work if decap and encap routes are present in two different routing
instances. PR1488379
• On PTX1000 and PTX10001 routers, the port mirror will not work when the port-mirroring is configured
with the firewall filter. PR1491789
• Dynamic-tunnels traceoptions might cause scheduler slips with single underlay route bounce for large
scale. PR1493236
• On a Junos OS platform, the output of Aggregate Ethernet (AE) interface statistic does not include its
member links' statistics. PR1505596
• Add Python 3.x modules that are missing from the library. PR1508626
• MPLS sensor does not receive Junos Telemetry Interface data on the server. PR1514959
• When you continuously run the sync (using the show interfaces aex extensive command) and the async
(using SNMP polling) queries in parallel on aggregated Ethernet interfaces, you might notice spikes in
aggregated Ethernet interface framing errors counter in between correct values. PR1539537
222
• On PTX Junos OS platforms, there might be traffic drop when default EXP classifier maps traffic to FC
with no schedulers.PR1554266
• On PTX10002-60C platform, after disabling the standalone and non-channelized port (e.g. port 6,
16,26,36,46,56), then another port on that port group will aslo be disabled. For example, disable et-0/0/36,
port et-0/0/30 is going to down as well. This issue is only exposed when using DAC cables. PR1568294
• On PTX platforms, when Inline Jflow is configured and high sampling rate (more than 4000 per second)
is set, high CPU utilization might be observed and this might result in relevant impacts on traffic analysis
and billing. PR1569229
• On PTX5000 with '15x100GE/15x40GE/60x10GE QSFP28' PIC on FPC type 3, when the port is
configured in 4x10G mode (using QSFP+) and one of the 10G channels detected a clear of Rx LOS (Loss
Of Signal), the traffic might be dropped on all the four 10G channels. PR1578511
• On PTX Series routers, the traffic from TACACS port 49 might not be classified into a proper DDoS
queue. When the issue happens, it might cause the unclassified traffic to get dropped when the CPU
utilization is very high. PR1578579
• On PTX platforms, BFD sessions might flap during traffic spikes. PR1578599
• On PTX platforms with vlan-ccc configured, if it acts as a provider edge device and forwards the IS-IS
packet between CEs over the Layer 2 circuit tunnel, the IS-IS packet might be corrupted. In this case,
the IS-IS adjacency might not be formed. PR1580047
• The packets might be dropped by Packet Forwarding Engine of PTX5000 after changing the queue of
IEEE-802.1ad classifier on FPC-PTX-P1-A or FPC2-PTX-P1A.PR1584042
• Memory corruption of a binary from /usr/bin/ or /usr/sbin/ directory can occur if such binary is invoked
when a recovery snapshot creation is in progress. The exact symptoms will be different depending on
the exact binary and JUNOS version - some programs will show an error, and some programs will crash
every time it is executed. Such memory corruption will be persistent until the affected routing engine
is restarted. PR1563647
223
Infrastructure
• Memory corruption of a binary from /usr/bin/ or /usr/sbin/ directory can occur if such binary is invoked
when a recovery snapshot creation is in progress. The exact symptoms will be different depending on
the exact binary and JUNOS version - some programs will show an error, and some programs will crash
every time it is executed. Such memory corruption will be persistent until the affected routing engine
is restarted. PR1563647
• Upgrading Junos OS Release 14.2R5 and later maintenance releases and Junos OS Release 16.1 and
later mainline releases with a CFM configuration might cause the cfmd process to crash after the upgrade.
This is because of the presence of an old version of /var/db/cfm.db. PR1281073
• It is observed rarely that issuing request system zeroize did not trigger zero-touch provisioning. A
workaround is to re-initiate the ZTP. PR1529246
MPLS
• At high scale, LSP setup rate will be relatively slower in IP-in-IP networks. PR1457992
• On all Junos OS platforms, the rpd process on the transit node might crash when MPLS traceroute on
the ingress node is performed. PR1573517
• On Junos OS, upon receipt of specific sequences of genuine packets destined to the device the kernel
will crash and restart (vmcore). PR1557881
Routing Protocols
• With an aggregated Ethernet interface with BFD configured, the aggregated Ethernet interface and BFD
session remain down after the interface is disabled or enabled. PR1354409
• The show dynamic-tunnels database command does not show the current value of traffic statistics. It
shows the cached value of traffic statistics, which might not be equal to the current value. PR1445705
224
SEE ALSO
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in Junos OS main and maintenance releases for PTX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
General Routing
• Flexible PIC concentrator reboot might be observed in the events of J-Lock hog for more than 5 seconds.
PR1439929
• On PTX10016 routers, if aggregated Ethernet member or interface flow control is in disabled state, then
it does not enable its own. PR1478715
• SNMP index in the Packet Forwarding Engine reports as 0. This causes the sFlow records to have either
IIF (Input interface value) or OIF (Output interface value) as 0 value in sFlow record data at collector.
PR1484322
• PTX10008: FPC UKERN core dump is not transferred to Routing Engine in scaled setup. PR1500418
• Error messages t6e_dfe_tuning_state:et-6/0/0 - Failed to dfe tuning count 10might be seen after links
flap PR1512919
225
• TCP connection going through Packet Forwarding Engine might not be closed at the remote end because
there is no TCP FIN segment sent out when the local device is rebooted. PR1517154
• In PTX1000, after upgrading, configured firewall filters might be applied on incorrect interfaces
(CVE-2021-31382). PR1517804
• FPC crash might be observed during both deleting and reaping the configuration. PR1519868
• Packet drops might be seen with all commit events with 1G speed configured interface. PR1524614
• Multiple FRUs disconnection alarms might be displayed post the firmware upgrade. PR1529710
• PTX1000 might become unreachable with no console access after performing vmhost reboot post image
upgrade. PR1530529
• The LACP member link might be down if LFM is deleted from it. PR1531235
• The rpd memory leak might be observed on the backup Routing Engine due to the flapping of the link.
PR1539601
• The Packet Forwarding Engine might crash in an MPLS IPv6-tunneling scenario when the next hop
changes. PR1540793
• Optimize PTX PE Chip EPW CRC error reporting - PE Error code: 0x2101aa. PR1542580
• Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow
sampling is enabled (CVE-2021-0263). PR1546143
• On the PTX10000 platforms, traffic might get dropped when the set routing-options forwarding-table
no-ecmp-fast-reroute configuration is changed to 128 ECMP entries. PR1547457
• Traffic might drop silently after swapping an FPC Type 3 card with an FPC Type 1 card in the same slot
on a PTX3000 router. PR1547790
• The rpd crash might be seen when BGP service route is resolved over color-only SR-TE. PR1550736
• Interface filter with source-port 0 is matching everything instead of just port 0. PR1551305
• Packet drop might happen on the aggregated Ethernet bundle which have the single child member only.
PR1551736
• The lcmd process might consume memory until all of the free memory available to VMHOST gets
exhausted. PR1555386
• The micro BFD session might flap with DDoS policer. PR1557782
226
• Junos OS: Upon receipt of specific packets BFD sessions might flap due to DDoS policer implementation
in Packet Forwarding Engine (CVE-2021-0280). PR1564807
• Upgrading PTX1000 with unified SSDs (2x32G SSD) might result in boot loop in certain scenario.
PR1571275
Infrastructure
• Output drops in show interfaces extensive might display 0 temporarily during a race condition when
SNMP query for JnxCos is also issued PR1533314
• Interface drop counters might display 0 during a race condition when VOQ statistics are also polled
simultaneously. PR1537960
• Invalid statistics value might be observed when multiple mib2d/cosd requests for the same IFD arrive
within 1 second. PR1541579
• The kernel crash with core file might be seen if churn happens for a flood composite next hopPR1548545
• The traffic loss might be observed on an interface when configuring the non-related to the interface.
PR1541835
MPLS
• On Junos OS, receipt of a specific LDP message might cause a Denial of Service (CVE-2021-31363).
PR1552041
• Traffic sent over an LSP might be dropped if two consecutive PLRs along the LSP perform local repair
and bypass protecting the second PLR fails. PR1566101
Multicast
• FPC might crash in a multicast scenario. PR1569957
• The mib2d process crashes and generates a core dump on backup Routing Engine. PR1557384
227
• The BGP session replication might fail to start after the session crashes on a backup Routing Engine.
PR1552603
Routing Protocols
• Traffic loss about 2-3 seconds might be seen if anycast IP is used as an abstract next-hop in BGP EPTE.
PR1450366
• The rpd might crash with BGP RPKI enabled in a race condition. PR1487486
• Traffic might be silently discarded when the BGP route gets deleted, which is part of multipath.
PR1514966
• ECMP load-balance might not work as expected in SR ISIS scenario on PTX platforms. PR1532390
• The rpd memory leak might be seen in the BGP scenario. PR1547273
• Traffic loss might occur for stitched traffic from SR towards LDP if no-eligible-backup is configured.
PR1558565
VPNs
• The Layer 2 circuit local-switching end interface might get stuck in XX (Unknown) state upon vlan-id-list
configuration change PR1528809
• The rpd might crash during a race condition under BGP multipath scenario. PR1567918
General Routing
• On PTX5000 and PTX10008 routers, the output of the show filter index number counter command
shows value as zero at 28-02-HOSTBOUND_NDP_DISCARD_TERM. PR1420057
• The show snmp mib walk jnxContentsDescr command output does not show the fan controllers.
PR1455640
228
• On PTX10016 routers, after device reboot, the FPC takes a long time to come up and hence MKA session
establishment is delayed. The error message Frame 08: sp = 0x48d222b8, pc = 0x10fad3bc , blaze fpc2
SCHED: Thread 59 (PFE Manager) ran for 2177 ms without yielding is observed. PR1477585
• Any change in nested groups might not be detected on commit and does not take effect. PR1484801
• Outbound SSH connection flaps or a memory leak issue is observed during the push configuration to
the ephemeral database with a high rate. PR1497575
• The error message mpls_extra NULL might be seen when you add, change, or delete MPLS route.
PR1502385
• ERO update by the controller for branch LSP might cause issues. PR1508412
• On PTX3000 and PTX5000 routers, unable to bring the ports up when plugging in the optic
QSFP-100G-LR4-T2 (740-061409). PR1511492
• The route update might fail because of an HMC memory issue and traffic impact might be seen.
PR1515092
• On PTX1000 and PTX10002-60C routers, sFlow adaptive-sampling, with rate limiter statement enabled,
crosses the sampling rate 65535. PR1525589
• EOAM IEEE802.3ah link discovery state is Down instead of Active Send Local after deactivating interfaces
on routers. PR1532979
MPLS
• SNMP trap is observed with incorrect OID jnxSpSvcSetZoneEntered. PR1517667
Routing Protocols
• On PTX3000 and PTX5000 routers, the ppmd process generates a core file after configuring the S-BFD
responder on the RE-DUO-2600. PR1477525
• The rpd process might report 100 percent CPU usage with BGP route damping enabled. PR1514635
General Routing
• PTX interface stays down after the maintenance. PR1412126
• With Junos OS Release 19.4R1 on PTX10008 device along with 4x1GE feature, continuous logging in
the chassisd file is observed. PR1456253
229
• Upgrading fails due to communication failure between the Junos VM and host OS. PR1438219
• The PTX1000 or PTX10002 router might discard traffic silently after the transient SIB or FPC voltage
alarms. PR1460406
• On the PTX5000 for FPC3, optics-options syslog and link-down do not work as expected. PR1461404
• The sample, syslog, or log action in the output firewall filter with packet size less than 128 might cause
ASIC wedge (all packet loss). PR1462634
• On modifying TNL DST NETWORK (more specific TNL DST NETWORK), the IP-IP tunnel gets flushed
but fails to get created even though a less specific matching TNL DST NETWORK exists. PR1462805
• On the PTX10000 line of routers, FPC might restart during runtime. PR1464119
• The PTX5000 SIB3 might fail to come up in the slot 0 with or without slot 8 when the Routing Engine
1 is the master. PR1471178
• The input-vlan-map or output-vlan-map might not work properly in the Layer 2 circuit local-switching
scenario. PR1474876
• Sampling process might crash when the MPLS or MPLS over the UDP traffic is sampled. PR1477445
• Multicast routes add or delete events might cause adjacency and LSPs to go down. PR1479789
• FPC might crash when dealing with the invalid next hops. PR1484255
• In the StrictPriority mode, the MedH and MedL should be of separate priorities; StrcH and High become
one priority. PR1490505
• The BFD sessions flap when the firewall filter in the loopback0 is changed. PR1491575
• Traffic impact might be seen when policy-multipath is configured without LDP on the Spring-TE scenario.
PR1483585
• On a dual Routing Engine GRES or NSR enabled PTX10008 or PTX10016 router, a few TCP-based
application sessions like BGP or LDP might flap upon Routing Engine primary-role switch. PR1503169
• The router might become nonresponsive and bring traffic down when the disk space becomes full.
PR1470217
• Unable to bring the ports up when plugging the optic QSFP-100G-LR4-T2(740-061409) to PTX3000
or PTX5000. PR1511492
• PHP device has NH mis-programming for members of ECMP for SR label route used for reaching the
IPV6 destinations. PR1457230
• Kernel Routing Table (KRT) queue gets stuck after the J-Flow samples a malformed packet. PR1495788
230
Infrastructure
• Slow response from SNMP might be observed after an upgrade to Junos OS Release 19.2R1 and later.
PR1462986
MPLS
• Kernel crash and device restart might occur. PR1478806
• The BGP session might keep flapping between two directly connected BGP peers because of the wrong
usage of the TCP-MSS. PR1493431
• The rpd process might crash in a rare condition under the SR-TE scenario. PR1493721
Routing Protocols
• The BGP NSR must be able to synchronize 4000 or more IPv6 sessions. PR1461436
• On the PTX3000 or PTX5000 line of routers, the ppmd process generates a core file after configuring
the sbfd responder on the RE-DUO-2600. PR1477525
• The rpd process might crash with the BGP multipath and route withdraw occasionally. PR1481589
• The BGP route-target family might prevent RR from reflecting Layer 2 VPN and Layer 3 VPN routes.
PR1492743
• BGP multi-path traffic might not fully load-balance for a while after adding a new path for the load
sharing. PR1482209
• LSP auto-bandwidth adjust-interval change does not get detected on commit in some cases. PR1484801
SEE ALSO
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for PTX Series routers.
SEE ALSO
IN THIS SECTION
This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for
Junos OS for the PTX Series. Upgrading or downgrading Junos OS might take several hours, depending
on the size and configuration of the network.
When upgrading or downgrading Junos OS, use the jinstall package. For information about the contents
of the jinstall package and details of the installation process, see the Installation and Upgrade Guide. Use
other packages, such as the jbundle package, only when so instructed by a Juniper Networks support
representative.
232
NOTE: Back up the file system and the currently active Junos OS configuration before upgrading
Junos OS. This allows you to recover to a known, stable environment if the upgrade is
unsuccessful. Issue the following command:
NOTE: The installation process rebuilds the file system and completely reinstalls Junos OS.
Configuration information from the previous software installation is retained, but the contents
of log files might be erased. Stored files on the router, such as configuration templates and shell
scripts (the only exceptions are the juniper.conf and ssh files), might be removed. To preserve
the stored files, copy them to another system before upgrading or downgrading the routing
platform. For more information, see the Installation and Upgrade Guide.
NOTE: We recommend that you upgrade all software packages out of band using the console
because in-band connections are lost during the upgrade process.
1. Using a Web browser, navigate to the All Junos Platforms software download URL on the Juniper
Networks webpage:
https://support.juniper.net/support/downloads/
2. Select the name of the Junos OS platform for the software that you want to download.
3. Select the release number (the number of the software version that you want to download) from the
Release drop-down list to the right of the Download Software page.
5. In the Install Package section of the Software tab, select the software package for the release.
6. Log in to the Juniper Networks authentication system by using the username (generally your e-mail
address) and password supplied by Juniper Networks representatives.
9. Copy the software to the routing platform or to your internal software distribution site.
NOTE: We recommend that you upgrade all software packages out of band using the console
because in-band connections are lost during the upgrade process.
All customers except the customers in the Eurasian Customs Union (currently composed of Armenia,
Belarus, Kazakhstan, Kyrgyzstan, and Russia) can use the following package:
Customers in the Eurasian Customs Union (currently composed of Armenia, Belarus, Kazakhstan,
Kyrgyzstan, and Russia) can use the following package (limited encryption Junos OS package):
• /pathname—For a software package that is installed from a local directory on the router.
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
• http://hostname/pathname
• scp://hostname/pathname
The validate option validates the software package against the current configuration as a prerequisite
to adding the software package to ensure that the router reboots successfully. This is the default
behavior when the software package being added is a different release.
Adding the reboot command reboots the router after the upgrade is validated and installed. When the
reboot is complete, the router displays the login prompt. The loading process might take 5 to 10 minutes.
NOTE: You need to install the Junos OS software package and host software package on the
routers with the RE-PTX-X8 Routing Engine. For upgrading the host OS on this router with VM
Host support, use the junos-vmhost-install-x.tgz image and specify the name of the regular
package in the request vmhost software add command. For more information, see the VM Host
Installation topic in the Installation and Upgrade Guide.
NOTE: After you install a Junos OS Release 20.2 jinstall package, you cannot return to the
previously installed software by issuing the request system software rollback command. Instead,
you must issue the request system software add validate command and specify the jinstall
package that corresponds to the previously installed software.
NOTE: Most of the existing request system commands are not supported on routers with
RE-PTX-X8 Routing Engines. See the VM Host Software Administrative Commands in the
Installation and Upgrade Guide.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4. However, you cannot upgrade directly from a non-EEOL release
that is more than three releases ahead or behind.
To upgrade or downgrade from a non-EEOL release to a release more than three releases before or after,
first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release to your
target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://support.juniper.net/support/eol/software/junos/.
235
If the router has two Routing Engines, perform a Junos OS installation on each Routing Engine separately
to avoid disrupting network operation as follows:
1. Disable graceful Routing Engine switchover (GRES) on the master Routing Engine and save the
configuration change to both Routing Engines.
2. Install the new Junos OS release on the backup Routing Engine while keeping the currently running
software version on the master Routing Engine.
3. After making sure that the new software version is running correctly on the backup Routing Engine,
switch over to the backup Routing Engine to activate the new software.
4. Install the new software on the original master Routing Engine that is now active as the backup Routing
Engine.
For the detailed procedure, see the Installation and Upgrade Guide.
SEE ALSO
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for the QFX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What's New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for QFX Series
switches.
NOTE: The following QFX Series platforms are supported in Release 20.2R3: QFX5100, QFX5110
(32Q and 48S), QFX5120, QFX5200, QFX5210, QFX10002, QFX10002-60C, QFX10008, and
QFX10016.
Junos on White Box runs on Accton Edgecore AS7816-64X switches in this release. The software
is based on Junos OS running on QFX5210 switches, so release-note items that apply to QFX5210
switches also apply to Junos on White Box.
237
There are no new features or enhancements to existing features for QFX Series Junos OS Release 20.2R3.
There are no new features or enhancements to existing features for QFX Series Junos OS Release 20.2R2.
set forwarding-options enhanced-hash-key flex-hashing name ethtype mpls num_labels source-port hash-offset
offset1 base_offset1 offset1_value offset1_mask offset2 base_offset2 offset2_value offset2_mask
To configure a conditional match (repeat the command below with values for offsets and match data
2-4):
To enable load balancing on VXLAN transit traffic based on the outer UDP header:
Limitations:
• If you are using conditional matches, configure the conditions before you attach them to the flex-hashing
entry.
• An aggregated Ethernet (AE), or LAG, interface is not supported as an input interface. You can configure
input interfaces on LAGs by configuring the same user-defined flex-hashing data and the same
conditional-match data on all member interfaces of a LAG interface. Use unique flex-data profile names
and unique conditional-data profile names for each member interface—for example:
The DHCP server uses DHCPv6 options 59 and 17 and applicable suboptions to exchange ZTP-related
information between itself and the DHCP client.
NOTE: Only HTTP and HTTPS transport protocols are supported on EX3400, EX4300,
QFX5100, and QFX5200 devices.
Hardware
240
• New QFX5120-48T Ethernet Switch (QFX Series)—Starting with Junos OS Release 20.2R1, the
QFX5120-48T is a 10GbE/100GbE data center switch offering 48 10GbE RJ-45 ports and six
40GbE/100GbE QSFP28/QFSP+ ports. The 48 copper ports support 1-Gbps and 10-Gbps speeds and
the last 6 ports (port 48 to 53) support 40-Gbps and 100-Gbps speeds. By default, the first 48 ports
operate at 10-Gbps speed and the last six ports 100-Gbps speed.
QFX5120-48T switches supports both manual and auto-channelization, but manual CLI channelization
always takes precedence. [See Port Settings.]
To install the QFX5120-48T switch hardware and perform initial software configuration, routine
maintenance, and troubleshooting, see the QFX5120 Switch Hardware Guide. See Feature Explorer for
the complete list of features for any platform.
Table 2 on page 240 summarizes the software features supported in this release.
Feature Description
Authentication and • IEEE 802.1X authentication support. [See User Access and Authentication User Guide.]
Access Control • IP source guard. [See Configuring IP Source Guard (ELS).]
• Local password authentication support for password change policy.
• Storm control support (broadcast, unicast, and multicast). [See Understanding Storm Control.]
• Radius and TACACS+ authentication. [See Authentication Order for RADIUS, TACACS+,
and Local Password.]
• Role-based access control (RBAC), and role-based CLI management.
BGP • Support for BGP Monitoring Protocol (BMP) Version 3 and IPv6 BGP standards. [See
Understanding the BGP Monitoring Protocol and Supported IPv6 Standards.]
• BGP advertising aggregate bandwidth across external BGP links for load balancing. [See Load
Balancing for a BGP Session.]
• Support for BGP large communities, link-state distribution, multipath at global level, and
support for 4-byte autonomous system numbers. [See Routing Policies for BGP Communities.]
• EBGP route support, multiprotocol BGP (MBGP) extensions, and frequent BGP keepalive
messages with a short BGP hold time. [See BGP Overview.]
• Routing protocol process (rpd) recursive resolution over multipath. [See BGP Overview.]
• BGP labeled-unicast. [See labeled-unicast (Protocols BGP.]
241
Feature Description
Class of Service • Standard class of service (CoS) feature support including configuring classification, rewrite,
queuing, shaping, buffering, and scheduling parameters for traffic management. [See CoS
Support on QFX Series Switches.]
• IEEE 802.1p rewrite and classification.
• Class-based queuing with prioritization. [See Understanding CoS Output Queue Schedulers.]
• Single-rate two-color marking, single-rate three-color marking, and two-rate three-color
marking. [See Overview of Policers.]
• Separate unicast and multi-destination classifiers, forwarding classes, and output queues.
[See Understanding Junos CoS Components.]
• Direct port scheduling. [See Understanding CoS Port Schedulers on QFX Switches.]
• Queue shaping using the shaping-rate statement. [See Understanding CoS Priority Group
Shaping and Queue Shaping (Maximum Bandwidth).]
• Priority-based flow control (PFC) with 802.3x Ethernet PAUSE and explicit congestion
notification (ECN). [See Understanding CoS Flow Control (Ethernet PAUSE and PFC) and
Understanding CoS Explicit Congestion Notification.]
• CoS support for link aggregation groups (LAGs).
• Weighted random early detection (WRED) packet drop profiles and tail drop. [See
Understanding CoS Congestion Management and Understanding CoS WRED Drop Profiles.]
• Rewrite rule (marking) of bridged packets. [See Understanding Junos CoS Components.]
• Policing or rate limiting of traffic to apply limits to traffic flow. [See Overview of Policers.]
DHCP • Client link-layer address option 79 for DHCPv6. [See mac-address (DHCP Relay Agent).]
• DHCP server, DHCP smart relay configuration, DHCP relay with DHCP server, and DHCP
client in separate routing instances. [See DHCP Message Exchange Between DHCP Clients
and DHCP Server in Different Virtual Routing Instances.]
• DHCP relay with option 82 for Layer 2 VLANs and Layer 3 interface. [See DHCP Relay Agent
Information Option (Option 82).]
• DHCP and DHCPv6 snooping. [See DHCP Snooping.]
• DHCP static addresses. [See Configuring Static DHCP IP Addresses.]
• Extended DHCP (also referred to as virtual router (VR) aware DHCP). [See Legacy DHCP
and Extended DHCP.]
• Textual interface description using DHCP relay agent option 82 (circuit ID). [See DHCP Relay
Agent Information Option (Option 82).]
242
Feature Description
EVPN and VXLAN • EVPN proxy ARP and ARP suppression. [See EVPN Proxy ARP and ARP Suppression Proxy.]
• EVPN control plane and VXLAN data plane support. [See Understanding EVPN with VXLAN
Data Plane Encapsulation.]
• EVPN pure type-5 route support. [See EVPN Type-5 Route with VXLAN encapsulation for
EVPN-VXLAN.]
• LACP in EVPN active-active multihoming. [See Example: Configuring LACP for EVPN VXLAN
Active-Active Multihoming.]
• Automatically generated Ethernet segment identifiers in EVPN-VXLAN and EVPN-MPLS
networks. [See Understanding Automatically Generated and Assigned ESIs in EVPN Networks.]
• EVPN-VXLAN support of Virtual Chassis and Virtual Chassis Fabric. [See Integrating a Virtual
Chassis Fabric into an EVPN-VXLAN Environment.]
• Support for VMTO for ingress traffic. [See Configuring EVPN Routing Instances.]
• MAC filtering, storm control, and port mirroring support in EVPN-VXLAN overlay networks.
[See MAC Filtering, Storm Control, and Port Mirroring Support in an EVPN-VXLAN
Environment.]
• Layer 2 and 3 families, encapsulation types, and VXLAN on the same physical interface. See
[Understanding Flexible Ethernet Services Support With EVPN-VXLAN.]
• Support for multihomed proxy advertisement. [See EVPN Multihoming Overview.]
• Tunneling Q-in-Q traffic through an EVPN-VXLAN overlay network. [See Examples: Tunneling
Q-in-Q Traffic in an EVPN-VXLAN Overlay Network.]
• Support for graceful restart and graceful restart protocol extension support for unicast and
type 5 messages on EVPN-VXLAN. [See Graceful Restart in EVPN.]
• Standard class-of-service (CoS) features—classifiers, rewrite rules, and schedulers are
supported on VXLAN interfaces. [See Understanding CoS on OVSDB-Managed VXLAN
Interfaces.]
• Firewall filtering and policing on EVPN-VXLAN traffic. [See Understanding VXLANs and
Overview of Firewall Filters.]
• Configurable VXLAN UDP port.
• Support for IGMP snooping for EVPN-VXLAN in a multihomed environment. [See Overview
of Multicast Forwarding with IGMP Snooping in an EVPN-VXLAN Environment.]
• Support for OSPF, IS-IS, BGP, and static routing on IRB interfaces in EVPN-VXLAN networks.
[See Supported Protocols on an IRB Interface in EVPN-VXLAN .]
• VXLAN Layer 2 gateway (static, OVSDB, EVPN), Q-in-Q tag manipulation, dynamic load
balance, and hashing options. [See OVSDB-VXLAN User Guide for QFX Series Switches.]
• BPDU protection in EVPN-VXLAN. [See Supported Protocols on an IRB Interface in
EVPN-VXLAN.]
243
Feature Description
Firewall Filters and • Support for firewall filters on interfaces, VLANs, routed VLAN interfaces (RVIs), link
Policers aggregation groups (LAGs), and loopback interfaces. [See Overview of Firewall Filters.]
• Single-rate two-color marking, single-rate three-color marking, and two-rate three-color
marking. [See Overview of Policers.]
• Dynamic allocation of firewall filters.
• Enhanced filter classification of CPU-generated packets.
• Firewall filter actions. [See Firewall Filter Match Conditions and Actions (QFX and EX Series
Switches.]
• Firewall filter flexible match conditions and firewall filters on loopback and management
interface. [See Firewall Filter Flexible Match Conditions.]
• Port firewall filters (egress and ingress) and routed firewall filters (egress and ingress). [See
Firewall Filter Match Conditions and Actions (QFX and EX Series Switches).]
• VLAN firewall filters (egress and ingress). [See Firewall Filter Match Conditions and Actions
(QFX and EX Series Switches).]
• TCP/UDP port ranges in classification. [See Firewall Filter Match Conditions and Actions
(QFX and EX Series Switches).]
• Filter-based GRE de-encapsulation. [See Configuring a Firewall Filter to De-Encapsulate GRE
Traffic.]
• Loopback firewall filter scale optimization. [See Planning the Number of Firewall Filters to
Create.]
High Availability • Automatic recovery for port error disable condition. [See disable-timeout (Port Error Disable).]
(HA) and Resiliency • Operating system resiliency to recover the Junos OS software using device recovery mode.
[See Rescue Configuration.]
• Partial resiliency for errors, machine-check exception (MCE), and advanced error reporting
(AER).
• Ethernet ring protection switching (ERPS). [See Ethernet Ring Protection Switching Overview.]
• Graceful protocol restart for BGP and OSPF. [See Understanding Graceful Restart for BGP,
graceful-restart (Protocols BGP) and Configuring Graceful Restart for OSPF.]
• Nonstop software upgrade (NSSU), Nonstop bridging, and Nonstop active routing (NSR) for
IPv6 and OSPFv2.
• Virtual Chassis support. [See Understanding QFX Series Virtual Chassis.]
• Virtual Chassis with NSSU support. You can interconnect two QFX5120-48T switches into
a Virtual Chassis that operates as one logical device managed as a single chassis. [See Virtual
Chassis Overview for Switches.]
• Network Device Collaborative Protection Profile (NDcPP) certification.
244
Feature Description
Interfaces and • Dynamic ARP inspection (DAI) and static ARP support. [See Understanding and Using Dynamic
Chassis ARP Inspection (DAI).]
• Support for dynamic load balancing. [See Understanding Load Balancing for Aggregated
Ethernet Interfaces.]
• Proxy ARP per VLAN and unrestricted proxy ARP. [See Restricted and Unrestricted Proxy
ARP Overview.]
• Link protection support on aggregated Ethernet interfaces and updated behavior in static
link protection mode.
• Automatic detection of MDI and MDIX port connections. Auto MDI/MDIX is enabled by
default. [See no-auto-mdix.]
• Digital optical monitoring (DOM). [See show interfaces diagnostics optics.]
• Support for fiber channel over Ethernet (FCoE), FCoE initialization protocol (FIP), FIP snooping,
and up to 2500 total FIP snooping sessions supported on an interface. [See Understanding
VN_Port to VF_Port FIP Snooping on an FCoE Transit Switch.]
• Filter-based GRE decapsulation.
• IPv4 generic routing encapsulation (GRE) support. [See Configuring Generic Routing
Encapsulation Tunneling.]
• Auto-negotiation and port speed. [See auto-negotiation.]
• Configure speed of Gigabit Ethernet copper SFP interfaces. [See Gigabit Ethernet Interface.]
• IEEE 802.3ah link fault management (LFM). [See OAM Link Fault Management.]
• Interface ranges. [See Interface Ranges.]
• Jumbo frames (up to 9216 bytes) and jumbo frames on routed VLAN interfaces (RVIs). [See
Configuring Routed VLAN Interfaces on Switches (CLI Procedure).]
• Layer 3 logical interfaces. [See Layer 3 Logical Interfaces.]
• Support for network-to-network interface (NNI) and user network interface (UNI) on the
same physical interface. [See Configuring Q-in-Q Tunneling.]
• Channelizing Ethernet interfaces. [See Channelizing Interfaces Overview.]
• Dynamic port swap from 40G to 100G without restarting the Packet Forwarding Engine.
• PVLAN and Q-in-Q on the same interface. [See Configuring Q-in-Q Tunneling on QFX Series
Switches.]
• Link aggregation static and dynamic with LACP (fast and slow LACP), LLDP, and MC-LAG
with configuration sync.
• Uplink failure detection debounce interval. [See Uplink Failure Detection.]
245
Feature Description
IPv6 • BGP support for advertising multiple paths to IPv6 addresses. [See Example: Advertising
Multiple Paths in BGP.]
• Configure per-interface neighbor discovery protocol (NDP) cache protection. [See Neighbor
Discovery Cache Protection Overview.]
• IPv6 specific SSH and Telnet.
• Support for IPv6 filter-based forwarding. [See Understanding Filter-Based Forwarding.]
• Firewall filter support for IPv6 traffic: IPv6 fields for ingress port and VLAN firewall filters
and policer action for MPLS firewall filters. [See Firewall Filter Match Conditions for IPv6
Traffic.]
• Support for IPv6 L3 forwarding, IPv6 Layer 3 VPNs, IPv6 traceroute, IPv6 tunneling, and
IPv6 attributes in RADIUS message and stateless auto configuration.
• Support for IPv6 OSPFv3, IPv6 ping, secure IPv6 neighbor discovery protocol (NDP), and
IPv6 source guard. [See OSPF Version 3 for IPv6 and IPv6 Neighbor Discovery User Guide.]
• IPv6 access security (IPv6 neighbor discovery inspection, IPv6 stateless address
auto-configuration (SLAAC) snooping, and understanding IPv6 router advertisement guard).
[See IPv6 Neighbor Discovery Inspection,IPv6 Stateless Address Auto-configuration (SLAAC)
Snooping and Understanding IPv6 Router Advertisement Guard.]
• Support for IPv6 over MPLS (6PE), IPv6 over MPLS LSPs, IPv6 static routing, IS-IS for IPv6,
path MTU discovery, SNMP, NTP, and DNS. [See Configuring Junos OS for IPv6 Path MTU
Discovery.]
• Virtual Router Redundancy Protocol (VRRP) and support for VRRP on IPv6 networks. [See
VRRP and VRRP for IPv6 Overview.]
Junos OS XML API • Scripts: Python, SLAX, and XSLT commit, event, op, SNMP, and open-source Python modules
and Scripting supported in automation enhancement.
• Support for REST API interfaces.
• JET for Junos: modern programmatic interface for developers of third-party applications.
[See Understanding JET Interaction with Junos OS.]
• Configuration management: JSON format for configuration data. [See Defining the Format
of Configuration Data to Upload in a Junos XML Protocol Session.]
246
Feature Description
Junos Telemetry • Support for the Junos Telemetry Interface [See. Understanding OpenConfig and gRPC.]
Interface (JTI) • Sensor level statistics support on Junos Telemetry Interface (JTI). [Guidelines for gRPC and
gNMI Sensors.]
• gNMI support for routing engine statistics for JTI. [See Guidelines for gRPC and gNMI
Sensors.]
• Enhancements to the sensor for BGP peer information.
• Sensor for network discovery protocol (NDP) and Address Resolution Protocol table state
information for IPv6 routes.
• Sensor for memory utilization for routing protocol tasks. [See Guidelines for gRPC and gNMI
Sensors.]
• Sensor for LSP events and properties, LSP statistics, and gRPC streaming for LSP statistics.
[See Guidelines for gRPC and gNMI Sensors.]
• Packet Forwarding Engine statistics export using gNMI and JTI.
• Aggregated Ethernet interfaces configured with the link aggregation control protocol (LACP),
Ethernet interfaces configured with the link layer discovery protocol (LLDP), BGP peers, and
RSVP interface events. [See Understanding OpenConfig and gRPC on Junos Telemetry
Interface.]
• OpenConfig LLDP model (v0.1.0). [See OpenConfig Data Model Version.]
• OpenConfig to support operational models for VLANs.
• OpenConfig Junos OS, OpenConfig, and Network Agent packages are delivered in a single
TAR file. [See Installing the OpenConfig Package.]
247
Feature Description
Layer 2 Features • Data center bridging (DCB) application protocol TLV exchange.
• Data Center Bridging Capability Exchange Protocol (DCBX) version support for IEEE DCBX
version 1.01. [See Understanding DCBX.]
• MAC address filtering, MAC table aging, and static MAC address assignment for interface.
[See MAC Addresses and MAC Table Aging.]
• Disable MAC learning, persistent MAC learning, MAC address limit per port, MAC limiting,
MAC move limiting, MAC notification, and per VLAN (VLAN membership MAC limit). [See
Understanding MAC Limiting and MAC Move Limiting for Port Security.]
• Enhanced Layer 2 Software (ELS). [See Layer 2 Networking.]
• IP directed broadcast traffic forwarding.
• VLAN support, Link layer discovery protocol (LLDP), and Q-in-Q tunneling support. [See
Configuring Q-in-Q Tunneling.]
• Static LAG link protection. [See link-protection (Static LSPs).]
• Redundant trunk groups (link redundancy). [See Understanding Redundant Trunk Links
(Legacy RTG Configuration).]
• L2PT, UDLD, 802.1AE/802.1x, Ethernet Local Management Interface (E-LMI), and Multiple
MAC Registration Protocol (MMRP). [See layer2-protocol-tunneling.]
Layer 3 Features • Configuring the GTP-TEID field for GTP traffic. [See Traffic Sampling, Forwarding, and
Monitoring User Guide.]
• Equal-cost multipath (ECMP) flow-based forwarding: 64 ECMP paths. [See Traffic Sampling,
Forwarding, and Monitoring User Guide.]
• Support to control traceroute over Layer 3 VPN.
• Virtual routing and forwarding (VRF) support in IRB interfaces in a Layer 3 VPN.
• Support for VRF-lite, BGP, IGMP, IS-IS, OSPF, PIM, and RIP.
248
Feature Description
MPLS • MPLS support for label edge routers (LER) and label switch routers (LSR). [See MPLS Overview
for Switches.]
• Support for MPLS signaling protocols LDP and RSVP. [See LDP Overview and RSVP
Overview.]
• Fast reroute (FRR) support (a component of MPLS local protection for both one-to-one and
many-to-one local protection).
• Static LSPs. [See LSP Overview.]
• MPLS node protection, link protection, and statistics for static LSPs.
• MPLS OAM (LSP ping).
• MPLS statistics. [See statistics (Protocols MPLS).]
• MPLS automatic bandwidth allocation and dynamic count sizing.
• MPLS with RSVP-based LSPs.
• Support for IRB interfaces over an MPLS core network. [See Example: Configuring IRB
Interfaces on QFX5100 Switches over an MPLS Core Network.]
• MPLS stitching for virtual machine connections. [See Using MPLS Stitching with BGP to
Connect Virtual Machines.]
• MPLS over Layer 3 subinterfaces. [See MPLS Limitations on QFX Series and EX4600
Switches.]
• Resource reservation protocol-traffic engineering (RSVP-TE), traffic engineering extensions
(OSPF-TE, IS-IS-TE), Path Computation Element Protocol (PCEP), and PCE-initiated LSPs for
the PCEP implementation. [See MPLS Applications User Guide.]
• Equal-cost multipath (ECMP) operation on MPLS using firewall filters.
Multichassis Link • Resilient hashing support for link aggregation group (LAG) routes. [See Resilient Hashing on
Aggregation LAGs and ECMP groups.]
• Keep a link up on a multichassis link aggregation group (MC-LAG) when LACP is not configured
on one of the MC-LAG peers. [See Forcing MC-LAG Links or Interfaces with Limited LACP
Capability to Be Up.]
• Layer 3 unicast and multicast support for MC-LAG. [See Advanced MC-LAG Concepts.]
249
Feature Description
Network • IEEE 802.1ag OAM connectivity fault management. [See Understanding Ethernet OAM
Management Connectivity Fault Management for Switches.]
• Port mirroring (local and remote) and remote port mirroring to IP address (GRE). [See
Understanding Port Mirroring and Analyzers.]
• sFlow technology support. [See Understanding How to Use sFlow Technology for Network
Monitoring on a Switch.]
• Chef for Junos OS support. [See Chef for Junos OS Getting Started Guide.]
• Puppet for Junos OS support. [See Puppet for Junos OS Administration Guide.]
• Adding non-native YANG modules to the Junos OS schema. [See Understanding the
Management of Nonnative YANG Modules on Devices Running Junos OS.]
• Enforcing RFC-compliant behavior in NETCONF sessions. [See Configuring RFC-Compliant
NETCONF Sessions.]
• Configuring the ephemeral database using the NETCONF and Junos XML protocols. [See
Committing an Instance of the Ephemeral Configuration Database Using the NETCONF or
Junos XML Protocol.]
• Simple network management protocol (SNMP) remote monitoring (RMON) events, alarms,
and history. [See SNMP MIB Explorer.]
• Real-time performance monitoring (RPM). [See Understanding Real-Time Performance
Monitoring on Switches.]
Open vSwitch • Automatic configuration of OVSDB-managed VXLANs with trunk interfaces. [See
Database (OVSDB) Understanding Dynamically Configured VXLANs in an OVSDB Environment.]
• BFD in a VMware NSX for vSphere environment with OVSDB and VXLAN. [See Understanding
BFD in a VMware NSX Environment with OVSDB and VXLAN.]
• CoS on OVSDB-managed VXLAN interfaces. [See Configuring CoS on OVSDB-Managed
VXLAN Interfaces.]
• Firewall filters on OVSDB-managed interfaces. [See Understanding Firewall Filters on
OVSDB-Managed Interfaces.]
• MAC limiting on OVSDB managed interfaces. [See Features Supported on OVSDB-Managed
Interfaces.]
• OVSDB commit failures, schema updates, and support with Contrail.
• OVSDB software in Junos OS software package.
• OVSDB support with VMware NSX for vSphere. See [Understanding the Junos OS
Implementation of OVSDB and VXLAN in a VMware NSX for vSphere Environment.]
• Policers and storm control on OVSDB-managed interfaces. [See Understanding Firewall
Filters on OVSDB-Managed Interfaces.]
250
Feature Description
Routing Protocols • Bidirectional forwarding detection (BFD) support for BGP, IS-IS, and PIM. [See Example:
Configuring BFD for BGP and Example: Configuring BFD for IS-IS.]
• Static routing. [See Protocol-Independent Routing Properties User Guide.]
• Unified Forwarding Table (UFT). [See Understanding the Unified Forwarding Table.]
• IPv4 over GRE tunnels—encapsulation and de-encapsulation support.
• IGMP version (v1/v2/v3), IGMP filter, IGMP snooping, proxy (relay), and querier. [See
Understanding IGMP, IGMP Snooping Overview, and igmp-querier.]
• Remote support for LDP in IS-IS, static adjacency segment identifier for IS-IS, and alternate
loop-free routes and topology-independent loop-free alternate for IS-IS. [See Understanding
Remote LFA over LDP Tunnels in IS-IS Networks.]
• Multicast Listener Discovery version 1 and 2. [See Configuring MLD.]
• Multicast Source Discovery Protocol (MSDP) and multicast-only fast reroute (MoFRR). [See
source (Protocols MSDP).]
• IPv6 protocol independent multicast (PIM), PIM Static RP and PIM dense mode (PIM DM),
PIM source-specific multicast (PIM SSM), and PIM sparse mode (PIM SM). [See PIM Overview.]
• Support for static multicast route leaking for VRF and virtual-router instances. [See
Understanding Multicast Route Leaking for VRF and Virtual-Router Instances.]
• Virtual routing instances for multicast and unicast protocols. [See Configuring Virtual Router
Routing Instances.]
• Remote LFA support for LDP tunnels in OSPF and alternate loop-free routes for OSPF and
protocol independent multicast (PIM). [See Configuring Loop-Free Alternate Routes for
OSPF.]
Spanning Tree • Support for IEEE 802.1s Multiple Spanning Tree Protocol (MSTP), IEEE 802.1w rapid spanning
Protocols tree protocol (RSTP), IEEE 802.1D Spanning Tree Protocol (STP), and IEEE 802.1ak multiple
VLAN Registration Protocol (MVRP). [See Spanning-Tree Protocols User Guide.]
• VSTP and RSTP and concurrent configuration. [See Configuring VSTP Protocol.]
• Bridge protocol data unit (BPDU) protection, loop protection, and root protection. [See BPDU
Protection for Spanning-Tree Protocols, Loop Protection for Spanning-Tree Protocols and
Understanding Root Protection for STP, RSTP, VSTP, and MSTP.]
System Logging • Support for forwarding structured system log messages to a remote system log server. [See
Directing System Log Messages to a Remote Machine or the Other Routing Engine.]
• System logging (syslog) over IPv4 and IPv6.
251
Feature Description
System Management • Automatic software download, fast reboot, configuration and image rollback, commit process
split into two steps, and rescue configuration. [See Software Installation and Upgrade Guide.]
• Support for Precision Time Protocol (PTP) transparent clock. [See Configuring Transparent
Clock Mode for Precision Time Protocol.]
• Online insertion and removal (OIR). [See Removing an Expansion Module from a QFX5100
Device.]
• Device recovery mode introduced with upgraded FreeBSD. [See How to Recover Junos OS
with Upgraded FreeBSD.]
• IPv4 support for Telnet. [See Configuring Telnet Service for Remote Access to a Switch.]
• Secure boot with system security enhancement: secure boot. [See Software Installation and
Upgrade Guide.]
• Common BIOS support.
• Licensing enhancements. [See Licenses for QFX Series.]
• Zero touch provisioning (ZTP). [See Understanding Zero Touch Provisioning.]
Time Management • Network Time Protocol (NTP). [See Understanding NTP Time Servers.]
• Enhancement to NTP authentication method. [See Configuring NTP Authentication Keys.]
VLANs • Configure tagged VLANs using the 802.1Q standard. [See Configuring Tagged VLANs.]
• Default VLAN and multiple VLAN range support, dual VLAN tag translation, routed VLAN
interfaces, and jumbo frames.
• Support for 4096 VLAN IDs. [See 802.1Q VLAN IDs.]
• Support to exclude RVIs from state calculations. [See Excluding a Routed VLAN Interface
from State Calculations.]
• Support for IRB interfaces on Q-in-Q VLANs. [See Configuring Q-in-Q Tunneling and VLAN
Q-in-Q Tunneling and VLAN Translation.]
• Static MAC address assignment for physical interface.
• Support for Private VLANs and Q-in-Q on the same interface. [See Understanding Private
VLANs.]
• VLAN support for configuration and operational state models in Openconfig. [See OpenConfig
Overview.]
252
Feature Description
To view the hardware compatibility matrix for optical interfaces, transceivers, and DACs supported across all platforms,
see the Hardware Compatibility Tool.
Class of Service
• CoS support in EVPN-VXLAN overlay networks (QFX10002, QFX10008, and QFX10016
switches)—Starting with Junos OS Release 20.2R1, QFX10002, QFX10008, and QFX10016 switches
support CoS in EVPN-VXLAN overlay networks, namely ingress and egress classification, scheduling,
and rewrite rules based on IEEE 802.1p/DSCP code points.
EVPN
• EVPN-VXLAN multicast support (QFX10002-60C)—Starting in Junos OS Release 20.2R1, the
QFX10002-60C switch supports the following multicast features:
• Internet Group Management Protocol version 2 (IGMPv2) and IGMP snooping [See Overview of
Multicast Forwarding with IGMP Snooping in an EVPN-VXLAN Environment.]
With the support of these multicast features, the QFX10002-60C switch can now perform the following:
• A PIM gateway connected through a Layer 2 multicast VLAN (MVLAN) or a Layer 3 interface
253
With this adapter, the QSFP Ports on QFX10002, QFX10008, and QFX10016 switches support the
following transceiver types— 100-Mbps, 1-Gbps, 10-Gbps SFP+: SR, LR, ER, ZR, CWDM, DAC and
T-SFP+.
NOTE: For this adapter to work on the QSFP+ ports on the QFX10000-36Q line card in the
QFX10008, you need to channelize the ports using the CLI command set fpc fpc-slot pic
pic-number port port-number port speed 10G.
• Support for multiple speeds and autonegotiation (QFX5120-48Y, QFX5110-48S, and QFX5100-48S
with the JNP-SFPP-10GE-T transceiver)—Starting in Junos OS Release 20.2R1, you can configure your
switch to operate at multiple speeds when the JNP-SFPP-10GE-T transceiver is installed.
On the QFX5110-48S and QFX5100-48S switches, you can configure 100-Mbps, 1-Gbps, and 10-Gbps
speeds on the mge-0/0/z port by using the set interfaces mge-0/0/z speed (100m|1g|10g) command.
254
The switch ports operate at the configured speed and they can also switch to a supported lower speed
(automatically) with the same transceiver installed, based on peer capability.
The QFX5120 operates at only two speeds–10 Gbps and 1 Gbps–when this transceiver is installed. By
default, the switch comes up with 10-Gbps speed. To operate at 1-Gbps speed, use the set chassis fpc
0 pic 0 port port-number speed 1G command. Due to hardware limitations, you can configure the
port-number value only in multiples of four, starting from port 0. You must also configure sets of four
consecutive ports (for example, 0-3, 4-7, and so on) to operate at the common speed. After setting
1-Gbps speed, to revert to 10-Gbps speed, simply delete the 1G speed configuration.
NOTE: Only QFX5110-48S and QFX5100-48S switches support the multi-rate Gigabit Ethernet
(mge) interface.
[See language (Scripts), Develop Off-Device JET Applications, and Develop On-Device JET Applications.]
[See Mapping OpenConfig Routing Policy Commands to Junos Configuration and Mapping OpenConfig
Network Instance Commands to Junos Operation.]
• ON-CHANGE BGP peer information statistics support for JTI (MX960, MX2008, MX2010, MX2020,
PTX1000, PTX5000, PTX10000, QFX5100, and QFX5200)—Junos OS Release 20.2R1 provides BGP
peer sensor support using Junos telemetry interface (JTI) and remote procedure call (gRPC) services or
gRPC Network Management Interface (gNMI) services. ON_CHANGE statistics are sent to an outside
collector.
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/active (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes (ON_CHANGE)
255
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/received (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/sent (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/afi-safis/afi-safi/
state/prefixes/rejected (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/admin-state
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
established-transitions (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
last-established (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
received/notification (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/messages/
received/update (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
sent/notification (stream
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/messages/
sent/update (stream)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
session-state (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/neighbors/neighbor/state/
supported-capabilities (ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/local-address
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/remote-address
(ON_CHANGE)
• /network-instances/network-instance/protocols/protocol/bgp/transport/state/remote-port
(ON_CHANGE)
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• EVPN statistics export using JTI (QFX5100, QFX5110, QFX5120, QFX5200, QFX10002-60C, QFX10002,
QFX10008, and QFX10016)—Starting in Junos OS Release 20.2R1, you can use Junos telemetry interface
(JTI) and using remote procedure call (gRPC) services to export EVPN statistics from devices to an outside
collector.
• Sensor for global resource counters and current usage (resource path /junos/evpn/
evpn-smet-forwarding/)
• Sensor for EVPN IGMP snooping database (type 6) (resource path /network-instances/
network-instance[instance-name='name']/protocols/protocol/evpn/sg-db/)
• Sensor for EVPN IGMP join sync (type 7) ad leave sync (type 8) (resource path /network-instances/
network-instance[instance-name='name']/protocols/protocol/evpn/sg-db/sgdb-esi)
• Sensor to relate selected replicator on AR leaf on QFX5100, QFX5110, QFX5120, and QFX5200
switches (resource path /network-instances/network-instance[instance-name='name']/protocols/
protocol/evpn/assisted-replication/)
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface.]
• CPU statistics support on JTI (MX960, MX2010, MX2020, PTX1000, PTX5000, PTX10000, QFX5100,
and QFX5200)—Junos OS Release 20.2R1 supports streaming various CPU statistics and process
parameters using remote procedure call (gRPC) or gRPC Network Management Interface (gNMI) services
and Junos telemetry interface (JTI). You can stream CPU usage per process (statistics are similar to output
from the show system process detail operational mode command), as well as CPU usage per Routing
Engine core.
To stream statistics to an outside collector, include the following resource paths in a gRPC or gNMI
subscription:
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface).]
• Packet Forwarding Engine sensor support with INITIAL_SYNC on JTI (MX960, MX2008, MX2010,
MX2020, PTX1000, PTX5000, PTX10000 line of routers, QFX5100, and QFX5200)—Starting in Junos
OS Release 20.2R1, you can use Junos telemetry interface (JTI) and gRPC Network Management Interface
(gNMI) services to export Packet Forwarding Engine statistics from devices to an outside collector using
gNMI submode INITIAL_SYNC. When an external collector sends a subscription request for a sensor
with INITIAL_SYNC (gnmi-submode 2), the host sends all supported target leaves (fields) under that
resource path at least once to the collector with the current value. This is valuable because:
• The collector has a complete view of the current state of every field on the device for that sensor
path.
• Event-driven data (ON_CHANGE) is received by the collector at least once before the next event is
seen. In this way, the collector is aware of the data state before the next event happens.
• Packet Forwarding Engine sensors that contain zero counter values (zero-suppressed) that normally
do not show up in streamed data are sent, ensuring that all fields from each line card (also referred to
as source) are known to the collector.
NOTE: ON_CHANGE data is not available for native (UDP) Packet Forwarding Engine Sensors.
258
INITIAL_SYNC submode requires that at least one copy to be sent to the collector; however, sending
more than one is acceptable.
• Sensor for physical interface traffic except queue statistics (resource path /junos/system/linecard/
interface/traffic/)
[See Understanding OpenConfig and gRPC and gNMI on Junos Telemetry Interface and Guidelines for
gRPC and gNMI Sensors (Junos Telemetry Interface).]
Layer 2 Features
• L2PT support (EX4650 and QFX5120-48Y switches, and QFX5100 and QFX5110 switches and Virtual
Chassis)—Starting in Junos OS Release 20.2R1, you can configure Layer 2 protocol tunneling (L2PT) to
tunnel any of the following Layer 2 protocols: CDP, E-LMI, GVRP, IEEE 802.1X, IEEE 802.3AH, LACP,
LLDP, MMRP, MVRP, STP (including RSTP and MSTP), UDLD, VSTP, and VTP.
Multicast
• Static multicast route leaking for VRF and virtual router instances (EX4650 and QFX5120-48Y)—Starting
with Junos OS Release 20.2R1, you can configure the switch to statically share (leak) IPv4 multicast
routes for IGMPv3 (S,G) traffic among different virtual router or virtual routing and forwarding (VRF)
instances. You can only leak static multicast routes per group, not per source and group. The destination
prefix length must be 32.
To configure multicast route leaking to the VRF or virtual router instance routing-instance-name, configure
the next-table routing-instance-name.inet.0 statement at the [edit routing-instances routing-instance-name
routing-options static route destination-prefix/32] hierarchy level.
[See Understanding Multicast Route Leaking for VRF and Virtual Router Instances.]
259
• Multicast-only fast reroute (MoFRR) (EX4650 and QFX5120-48Y)—Starting in Junos OS Release 20.2R1,
you can configure MoFRR to minimize multicast packet loss in PIM domains when link failures occur.
With MoFRR enabled, the switch maintains primary and backup traffic paths, forwarding traffic from
the primary path and dropping traffic from the backup path. If the primary path fails, the switch can
quickly start forwarding the backup path stream (which becomes the primary path). The switch creates
a new backup path if it detects available alternative paths. MoFRR applies to all multicast (S,G) streams
by default, or you can configure a policy for the (S,G) entries where you want MoFRR to apply.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
• NETCONF sessions over outbound HTTPS (EX Series, MX Series, PTX1000, PTX3000, PTX5000,
PTX10001, PTX10002, PTX10008, PTX10016, QFX Series, SRX1500, SRX4100, SRX4200, SRX4600,
SRX5400, SRX5600, SRX5800, and vSRX)—Starting in Junos OS Release 20.2R1, the Junos OS with
upgraded FreeBSD software image includes a Juniper Extension Toolkit (JET) application that supports
establishing a NETCONF session using outbound HTTPS. The JET application establishes a persistent
HTTPS connection with a gRPC server over a TLS-encrypted gRPC session and authenticates the
NETCONF client using an X.509 digital certificate. A NETCONF session over outbound HTTPS enables
you to remotely manage devices that might not be accessible through other protocols, for example, if
the device is behind a firewall.
You configure this feature at the [edit firewall family mpls] hierarchy level. You can only apply a loopback
filters on family mpls in the ingress direction.
Virtual Chassis
• Virtual Chassis with NSSU support (QFX5120-48T)—Starting in Junos OS Release 20.2R1, you can
interconnect two QFX5120-48T switches into a Virtual Chassis that operates as one logical device
managed as a single chassis. The Virtual Chassis:
260
• Has both switches in Routing Engine role (one master and one backup)
• Supports 100GbE QSFP28 or 40GbE QSFP+ ports (48 through 53) as Virtual Chassis ports (VCPs)
• Supports NSSU
A QFX5120-48T Virtual Chassis supports the same protocols and features as a standalone switch in
Junos OS Release 20.2R1 except for the following:
• EVPN-VXLAN
Configuration parameters and operation are the same as for other non-mixed QFX Series Virtual Chassis.
• 802.1X authentication, Layer 2 port security, and MPLS support in a Virtual Chassis (QFX5120-48Y
Virtual Chassis)—Starting in Junos OS Release 20.2R1, the following protocol features are supported
on a QFX5120-48Y Virtual Chassis:
• Layer 2 port security features, including IP source guard, IPv6 router advertisement (RA) guard, DHCP,
and DHCP snooping
• MPLS
Configuration and operation are the same on the Virtual Chassis as on the standalone switch.
[See 802.1X Authentication, MPLS Overview, DHCP Snooping, Understanding DHCP Snooping (ELS),
Understanding IP Source Guard for Port Security on Switches, and Understanding IPv6 Router
Advertisement Guard.]
SEE ALSO
What's Changed
IN THIS SECTION
Learn about what changed in Junos OS main and maintenance releases for QFX Series Switches.
General Routing
• Support only for manual channelization on QSFP-100G-SR4-T2 optics (QFX5120-48T and
QFX5120-32C)— We recommend that you use the active optical cable (AOC) for auto-channelization.
The QSFP-100G-SR4-T2 cables do not support auto-channelization. To use the QSFP-100G-SR4-T2
optics with an external breakout cable, you must configure the channelization manually by running the
channel-speed statement at the edit chassis fpc slot-number pic pic-number (port port-number |
port-range port-range-low port-range-high) hierarchy level.
[See channel-speed.]
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX commit scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in Stylesheet Language Alternative
262
Syntax (SLAX) commit scripts. If you include the parameter, the function does not generate and log
UI_LOGIN_EVENT and UI_LOGOUT_EVENT messages when the script logs in as root to execute the
specified remote procedure call (RPC). If you omit the parameter, the function behaves as in earlier
releases where the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT messages are included in system
log files.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX event scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in Stylesheet Language Alternative
Syntax (SLAX) event scripts. If you include the parameter, the function does not generate and log
UI_LOGIN_EVENT and UI_LOGOUT_EVENT messages when the script logs in as root to execute the
specified remote procedure call (RPC). If you omit the parameter, the function behaves as in earlier
releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT messages are included in system
log files.
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the [edit system services netconf]
hierarchy level, the NETCONF server suppresses any <commit-results> XML subtree in the response
and emits only an <ok> or <rpc-error> element.
263
[See export-format.]
• IPv6 address in the prefix TIEs displayed correctly—The IPv6 address in the prefix TIEs are displayed
correctly in the show rift tie output.
Routing Protocols
• Advertising 32 secondary loopback addresses to traffic engineering database as prefixes (ACX Series,
EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—We've made changes to export multiple
loopback addresses to the lsdist.0 and lsdist.1 routing tables as prefixes. This eliminates the issue of
advertising secondary loopback addresses as router IDs instead of prefixes. In earlier releases, multiple
secondary loopback addresses in the traffic engineering database were added to the lsdist.0 and lsdist.1
routing tables as part of node characteristics and advertised them as the router ID.
General Routing
• Support for full inheritance paths of configuration groups to be built into the database by default (ACX
Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—Starting with Junos OS Release
20.2R1, the persist-groups-inheritance option at the [edit system commit] hierarchy level is enabled by
default. To disable this option, use no-persist-groups-inheritance.
• Priority-based flow control (PFC) support (QFX5120-32C)—We provide support for priority-based flow
control (PFC) using Differentiated Services code points (DSCPs) at Layer 3 for untagged traffic.
In the earlier Junos OS releases, incorrect autonegotiation status was displayed even when autonegotiation
was disabled.
[See Develop Off-Device JET Applications and Develop On-Device JET Applications.]
• Updates to IDL for RIB service API bandwidth field (ACX Series, EX Series, MX Series, PTX Series, QFX
Series, and SRX Series)—The IDL for the RouteGateway RIB service API has been updated to document
additional rules for the bandwidth field. You must set bandwidth only if a next hop has more than one
gateway, and if you set it for one gateway on a next hop, you must set it for all gateways. If you set
bandwidth when there is only a single usable gateway, it is ignored. If you set bandwidth for one or
more gateways but not all gateways on a next hop, you see the error code
BANDWIDTH_USAGE_INVALID.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
Routing Protocol
• IGMP snooping in EVPN-VXLAN multihoming environments (QFX5110)— In an EVPN-VXLAN multihoming
environment on QFX5110 switches, you can now selectively enable IGMP snooping only on those VLANs
that might have interested listeners. In earlier releases, you must enable IGMP snooping on all VLANs
associated with any configured VXLANs because all the VXLANs share VXLAN tunnel endpoints (VTEPs)
between the same multihoming peers and require the same settings. This is no longer a configuration
limitation.
SEE ALSO
Known Limitations
IN THIS SECTION
Learn about known limitations in Junos OS Release 20.2R3 for QFX Series Switches. For the most complete
and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem
Report Search application.
• On the QFX5100 devices, ISSU does not support Junos OS Release 20.1 and later. PR1479439
Layer 2 Features
• On the QFX5000 devices with storm control, significant difference between the configured rate and
actual rate is observed. PR1526906
• If the configuration or image file name has special characters such as #, %, or @, ZTP over HTTP or
HTTPS does not work. PR1503588
• After configuring and deleting the Ethernet loopback configuration, the interface goes down and does
not come up. PR1353734
• The QFX5000 device gets stuck in the database prompt state after rebooting. PR1411826
• On the QFX10000 line of switches, the analyzer does not mirror after adding the child member to an
aggregated Ethernet interface. PR1417694
• On the QFX5120 line of switches, one of the VCP ports of the throughput test result for most of the
frame sizes is not close to 100 percent. PR1453709
• After changing the VLAN name on the trunk interface, the local host MAC learning does not hold for
more than 30 seconds. PR1454274
• On the QFX5120-48T device, convergence delay for the link-protected MPLS LSP is more than 50
minutes. PR1478584
• On the QFX5120 device, the following error message is observed while performing NSSU: syntax error:
request-package-validate message. PR1479753
• There is no option to upgrade firmware for the backup Routing Engine. PR1479925
• The output of the show snmp mib walk jnxFruName command has an extra entry for the Routing Engine.
PR1483384
267
• On the QFX5120 Virtual Chassis, the output of the show chassis alarm command displays incorrect
PEM status after multiple GRES events. PR1486736
• On the QFX10000 devices, traffic drop for more than 50 minutes is observed on bringing down the
aggregated Etherent interface. PR1486853
• A 100 percent Layer 2 MAC scaling traffic loss is observed in the QFX10002-60C switch after loading
the EVPN-VXLAN collapsed profile configurations. PR1489753
• Data corruption might occur while abrupt power cycles are performed. PR1507750
• Changing the scaled firewall profiles on the fly does not release the TCAM resources as expected.
PR1512242
• On the QFX10000 device, the interface encapsulation ethernet-bridge for EVPN is not supported.
PR1538852
Routing Protocols
• The multicast route and pim (s,g) are incorrectly populated. PR1483732
• On QFX5100 devices not running the QFX-5E codes (non TVP architecture), when image with Broadcom
SDK upgrade (6.5.X) is installed, the CPU utilization might go up by around 5 percent. PR1534234
• On the QFX10002 device, the S,G convergence on the remote PE devices are very slow, taking around
30 minutes to converge completely. PR1542675
SEE ALSO
Open Issues
IN THIS SECTION
EVPN | 268
Infrastructure | 268
Learn about open issues in Junos OS Release 20.2R3 for QFX Series Switches. For the most complete and
latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report
Search application.
EVPN
• In the ERB scale setup powering up, a leaf might cause ingress traffic loss upto 250 seconds. PR1544204
• After changing VNID, it takes about 7 minutes for the control plane to populate remote VTEPs in the
VLAN. PR1550163
• On the QFX5200-32C devices, the reboot time is degraded from 205 seconds in Junos OS Release
20.2R1 to 260 seconds in Junos OS Release 20.3R1. PR1511607
Infrastructure
• The following error message is seen during FTP: ftpd[14105]: bl_init: connect failed for
/var/run/blacklistd.sock(No such file or directory). PR1315605
• Device goes to database prompt with panic: ffs_valloc: dup alloc during powering on of the device.
PR1480185
269
• On the QFX5110 MC-LAG, flooding of the multicast packets for around 16 to 20 seconds is observed
after disabling and enabling a member link of ICL after reboot. PR1422473
Layer 2 Features
• On the QFX5000 Virtual Chassis, multicast traffic gets flooded even when the IGMP report times out.
PR1431893
• New tenant addition and deletion leads to intra-VNI traffic drop for a few milliseconds. PR1455654
• On QFX5110 and QFX5120 platforms, changing lo0 IP address might sometimes either result in stale
entry of IP in mpls_entry table or missing IP entry, which results in traffic drop for VXLAN traffic.
PR1472333
• Traffic does not get load balanced by QFX5000 platforms over ESI links with EVPN_VXLAN configured.
PR1551543
• The DHCP decline packets are not forwarded to the DHCP server when forward-only is set within
dhcp-reply. PR1429456
• ZTP not getting activated after returning the device to zero was observed once or twice. PR1529246
• On the QFX10000 devices, source MAC and TTL values are not updated for routed multicast packets
in EVPN-VXLAN. PR1346894
• The backup Routing Engine might crash after GRES occurs continuously for more than 10 times.
PR1348806
• On the QFX10000 line of switches, the Aruba wireless access point (AP) heartbeat packets get dropped.
As a result, the Aruba wireless AP cannot work. PR1352805
• Due to the transient hardware condition, single-bit error (SBE) events are corrected and have no
operational impact. Those reported events had been disabled to prevent alarms and possibly unnecessary
hardware replacements. PR1384435
• The DRAM and buffer utilization fields are not correct. PR1394978
• The IPv6 communication issue might be observed after passing through the QFX10002-60C devices.
PR1424244
• When spine underlay is tagged and untagged, the inner packet comes over the TYPE-2 tunnel and goes
over the TYPE-2 tunnel resulting in IPv4 to silently discard traffic on PECHIP. PR1435864
• On the QFX10000 line of switches, removal of the EVPN-VXLAN Layer 3 gateway on the IRB interface
from the spine switches might cause traffic to be silently discarded. PR1446291
• On the QFX5000 line of switches, misleading ISSU logs are printed during the NSSU process even when
the box does not perform ISSU. PR1451375
• Interface sends mirrored traffic out even after it is removed from the output VLAN. PR1452459
• 9.51 percent of degradation with commit time and 12 percent of degradation with VLAN commit
convergence are observed while comparing 19.4DCB with 19.3DCB. PR1457939
• On the QFX5110 line of switches, the VXLAN VNI (mcast) scaling causes traffic issue. PR1462548
• On the QFX10002-60C line of switches, the Packet Forwarding Engine installation or deletion, and link
flap convergence time are reduced in Junos OS Release 19.4 compared to Junos OS Releases 19.3R1
and 19.2R1. PR1464572
• On the QFX5120-48T devices, finding discrepancy in the output of the show chassis environment pem
command can be seen in the backup member as well. PR1474520
• On the QFX5220 devices, the lo0 firewall filter might affect the Layer 3 forwarding traffic. PR1475620
• On the QFX10000 devices, the loopback-based filter with decap GRE does not work as expected.
PR1479613
• The output of the app-engin command displays a command that does not display information about the
backup member. PR1479900
• On the QFX5120-48T devices, the JTI exports in the fan state as Online for a failed fan module.
PR1480259
• On the QFX5110 and QFX5120 devices, the ICMP redirect messages are not generated. PR1481020
• On the QFX5000 device, dcpfe does not come up in an abrupt power-off or power-on situation.
PR1481176
• Disabled interfaces might still transmit power after the device reboots. PR1487554
271
• On the QFX5120-48T devices, commit fails on the backup device of the Virtual Chassis while removing
storm control with HA configured. Warning messages are also observed as patch removes the statement
that is not empty. PR1488847
• Interface on platforms using Broadcom chipset might have an abnormal status. PR1495564
• The interfaces on the EX4600-EM-8F device expansion module do not come up on the QFX5100-24Q
device with the QFX5E image. PR1502237
• On the QFX5100 devices, degradation is observed during the system reboot time and FPC online time.
PR1513540
• On the QFX10002-60C devices, degradation during system reboot time is observed. PR1516086
• The dcpfe process generates the core file after adding IRB in the same routing instance as that of the
underlay VTEP interface. PR1519651
• Higher token allocation with the arp-enhanced-scale command due to kernel global token leakage is
observed. PR1530947
• On QFX5100 which is working on 5e image, LED is not working well on 40G port and channelized port.
PR1536395
• The BFD neighborship fails with the EVPN_VXLAN configuration after the Layer 2 learning restarts.
PR1538600
• On the QFX5000 devices, route leaking does not work for the IPv4 routes if mask is less than 16 and
for the IPV6 routes if mask is less than 64. PR1538853
• On the QFX10002-60C devices, ARP or token scale is lower than the QFX10002 and QFX10008 devices
that causes the dcpfe process to generate the core file at a high scale. PR1541686
• On the QFX5000 Virtual Chassis fan, traffic loss might be seen after swapping the primary and backup
Routing Engines. PR1544353
• BD creation fails for few VLANs while switching from the script configuration to profile configuration.
PR1545517
• Need to move WRL7 to RCPL31 for the QFX-10-M and QFX-10-F devices. PR1547565
• After 12 hours of longevity with events, the Layer 3 traffic with destination to local host is dropped.
PR1548740
• Traffic does not get load-balanced by the QFX10002 device over ESI links with EVPN-VXLAN configured.
PR1550305
• PRBS (psuedorandom binary sequence) test on the QFX5200 device fails for 100GbE interfaces with
the default settings. PR1560086
• On the QFX5100 device, the following internal comment is displayed: Placeholder for QFX platform
configuration. PR1567037
• The Packet Forwarding Engine might produce error messages while deleting an interface in configurations
with IRB interfaces. PR1054798
• If the interface is newly added as the CE interface, the existing broadcast, unknown unicast, and multicast
(BUM) traffic can be looped. The loop prevention feature is designed to start working whenever a new
CE interface is added by configuration. But the existing BUM traffic can be distributed to a new CE
interface earlier before enabling the loop prevention feature. PR1493650
• Upgrading satellite devices may lead to some SDs in SyncWait state. Cascade port flap not causing the
issue. PR1556850
Routing Protocols
• On the QFX5100 Virtual Chassis, instability issues due to disabling DDoS protection is observed.
PR1238875
• On the QFX5100 Virtual Chassis or Virtual Chassis fan, the following error is observed in the hardware
with the mini-PDT base configurations: BRCM_NH-,brcm_nh_bdvlan_ucast_uninstall(), 128:l3 nh 6594
unintsall failed. PR1407175
• The remaining BFD sessions of the aggregated Ethernet interface flap continuously if one of the BFD
sessions is deleted. PR1516556
• The BFD sessions might flap continuously after disruptive switchover followed by GRES. PR1518106
• Sometimes when we perform deactivate protocols bgp on the QFX5000 RIOT devices, we may see
BRCM-VIRTUAL,brcm_vxlan_riot_destroy_nh(),1494:Failed to delete egr_if(400138) err-Operation still
running error messages during arp_ndp clean up stage and these are harmless. PR1529240
• BFD for BGP protocol flaps with sub-second timers with certain events performed in the fabric.
PR1539085
Virtual Chassis
• On the QFX5000 Virtual Chassis, the DDoS violations that occur on the backup are not reported to the
Routing Engine. PR1490552
SEE ALSO
Resolved Issues
IN THIS SECTION
Learn which issues were resolved in Junos OS main and maintenance releases for QFX Series Switches.
For the most complete and latest information about known Junos OS defects, use the Juniper online Junos
Problem Report Search application.
EVPN
• On the QFX5000 device used on EVPN-VXLAN scenarios, load-balancing traffic (inter VLAN) might not
work for multiple ESI-VTEP pairs with the underlay aggregated Ethernet interface between leaf and
spines. PR1512253
• All the ARP reply packets toward some address are flooded across the entire fabric. PR1535515
• EVPN-VXLAN registers MAC-move counters under system statistics bridge even though there is no
actual MAC-move for the multihome clients. PR1538117
• The l2ald process might generate core file if the EVPN-VXLAN configuration is changed. PR1541904
• The l2ald daemon might crash when forwarding-options evpn-vxlan shared-tunnels is configured.
PR1548502
Infrastructure
• The output of the show interfaces extensive command might display 0 temporarily during a race condition
when SNMP query is issued. PR1533314
Layer 2 Features
• Traffic might be forwarded incorrectly on an interface with VXLAN enabled and the hold-time up xxx
command statement configured. PR1550918
• On the QFX10000 devices, the chassisd process might generate core files on the backup Routing Engine
after committing due to CHASSISD_MAIN_THREAD_STALLED for 200 seconds. PR1481143
• SNMP index in the Packet Forwarding Engine reports as 0, causing sFlow to report either IIF or OIF (not
both) as 0 in the sFlow record data at the collector. PR1484322
• IRB MAC is not be programmed in hardware when the MAC persistence timer expires. PR1484440
• Slow response might be observed if the show | compare or commit check action in a large-scale
configuration environment is committed. PR1500988
• On the QFX5000 line of switches, multicast traffic loss is observed due to few multicast routes missing
in the spine node. PR1510794
• The DHCP traffic might not be forwarded correctly while sending the DHCP unicast packets. PR1512175
• In a Virtual Chassis environment, the output of the show chassis forwarding-options command displays
incorrect value when num-65-127-prefix value is configured for the FPC that is not local (backup and
line card members of the Virtual Chassis). PR1512712
• On the QFX5100 devices, cprod timeout triggers high CPU utilization. PR1520956
275
• The output interface index in the sFLOW packet is zero when the transit traffic is observed on the IRB
interface with VRRP enabled. PR1521732
• On the QFX10000 devices, channelizing the 40GbE port to 10GbE port might bring down another
interface. PR1527814
• Packet loss is observed while validating the policer after restarting the chassis control. PR1531095
• QFX10k2 / Firewall log incorrectly populating from Packet Forwarding Engine. PR1533814
• High rate of ARP or NS packets might be observed between a device that runs Junos OS and host when
the device that runs Junos OS receives an ARP or NS packet on an interface in transition. PR1534796
• Software recovery or installation using the Bootable USB Flash Drive option might fail. PR1536799
• The interfaces on QFX5100-48T switch might stay up when the peer device is rebooting. PR1538071
• On the QFX5100-48T devices, interfaces are not created after channel-speed 10Gbps is applied across
ports 48 to 53. PR1538340
• The Management Ethernet link down alarm is seen while verifying the system alarms in a Virtual Chassis
setup. PR1538674
• ARP request might be dropped in the leaf in the EVPN-VXLAN scenario. PR1539278
• The rpd memory leak might be observed on the backup Routing Engine due to link flaps. PR1539601
• Not able to take RSI properly due to the authentication error. PR1539654
• FPC might not be recognized after power cycle (hard reboot). PR1540107
• On the QFX5100 Virtual Chassis, the End segment Not Present message is not reported for the ping
overlay function with the local host MAC. PR1542226
• On the QFX5000 devices running EVPN-VXLAN, the Packet Forwarding Engine related error message
might be observed: bd_platform_irb_ifl_attach_detach: platform specific irb ifl attach/detach failed (-1).
PR1543812
• The Broadcom chip FPC might crash during system bootup. PR1545455
• OSPFv3 session may keep flapping and OSPFv3 hellos might be dropped in the host-path. PR1547032
• On the QFX10000 devices, traffic might get dropped while changing the configuration to set
routing-options forwarding-table no-ecmp-fast-reroute with 128 ECMP entries. PR1547457
• On the QFX5100 Virtual Chassis, the backup Routing Engine clears the reporting alarm for a PEM failure
intermittently for a missing power source. PR1548079
• The 40GbE interface might be channelized after the Virtual Chassis member restarts. PR1548267
• Interface filter with source-port 0 matches everything instead of just port 0. PR1551305
• On the QFX5110 and QFX5120 devices, the DHCPv6 traffic received over VTEP might not be forwarded.
PR1551710
• The action-shutdown command of storm control does not work for the ARP broadcast packets.
PR1552815
• The traffic might not be passed because VLAN tag 2 is added while passing through the Virtual Chassis
port. PR1555835
• Traffic might be dropped when a firewall filter rule uses the then vlan action. PR1556198
• Analyzer might cause traffic storm due to the flapping of the link. PR1557274
• Licenses for the VRRP, CFM, QINQ, VXLAN, MCLAG, ESI-LAG, LFM/Ethernet-OAM features might
incorrectly show as invalid licenses. PR1558017
• On the QFX5000 devices, the firewall filter might fail to work. PR1558320
• Amber LEDs are observed for fan modules in the QFX5120 devices after upgrading to Junos OS Release
20.2R1. PR1558407
• Few IPv6 ARP resolutions might fail after loading the base configurations. PR1560161
• When configuring the static MAC and static ARP on the EVPN core aggregate interface the underlay
next-hop programming might not be updated in the Packet Forwarding Engine. PR1561084
• On the QFX5110-48S-4C devices, the PTP lock status gets stuck at the Acquiring state instead at the
Phase aligned state. PR1561372
• On the QFX5000 devices, port mirroring might not work as expected. PR1562607
• On the QFX5120 devices, storm control with IRB interface might not work correctly. PR1564020
• QFX10K: Firewall log incorrectly populating from PFE for IPv6 traffic. PR1569120
Routing Protocols
• On the QFX 5100-48T-6Q Virtual Chassis or Virtual Chassis fan, the following error message is observed
while copying the image to the Virtual Chassis fan member and trying to downgrade the image: rcp for
member 14, failed. PR1486632
• Traffic might be silently discarded when the clear bgp neighbor all command is executed on a router and
also on the corresponding Rroute reflector in succession. PR1514966
• The dcpfe process might crash while updating VRF instances for multicast routes during IRB uninit.
PR1546745
• BGP LU session might flap when the Accumulated Interior Gateway protocol is used. PR1558102
277
• On the QFX5110-32Q device, the following syslog error message is observed after loading the NC T5
EVPN-VXLAN configuration: LBCM-L2,pfe_bcm_l2_sp_bridge_port_tpid_set() Config TPID New/Old
(8100:8100) Other-Tpid's ba49, 4aa0, 80f. PR1558189
• The dcpfe process might crash when the size of the Local Bias Filter Bitmap string exceeds 256 characters.
PR1568159
• On the QFX5210-64C device, ping does not work while verifying the native VLAN behavior on the
Q-n-Q interface. PR1568533
• On the QFX5120-48Y line of switches, amber LED lightsare on continuously displayed on the fan modules
even though thereare no fault in the fan after upgrading to Junos OS Release 20.2R1and later. PR1558407
• Traffic might be forwarded to the incorrect queue when a fixed classifier is used. PR1510365
EVPN
• EVPN-VXLAN core isolation is not working when the system is rebooted or the routing is restarted.
PR1461795
• ARP table might not be updated after performing VMotion or a network loop. PR1521526
• All the ARP reply packets towards to some address are flooded across the entire fabric. PR1535515
Infrastructure
• OID ifOutDiscards reports zero and sometimes shows valid value. PR1522561
• The aggregated Ethernet interface sometimes might not come up after switch is rebooted. PR1505523
278
Layer 2 Features
• Flow control is enabled in PFE irrespective of interface configuration and the fix causes a very small
amount of packet loss when a parameter related to an interface such as "interface description" on any
port is changed. PR1496766
• On the QFX5000 line of switches, traffic imbalance might be observed if hash-params is not configured.
PR1514793
• The MAC address in the hardware table might become out of synchronization between the primary and
backup in Virtual Chassis after the MAC flaps. PR1521324
• On the QFX5000 line of switches, the dcpfe process crashes due to the usage of data that is not null
getting terminated. PR1454527
• On the QFX5100 switches, the interface output counter is double counted for self-generated traffic.
PR1462748
• The sFlow could not work correctly if the received traffic goes out of more than one interface. PR1475082
• Egress port mirroring might not work when the analyzer port and mirrored port belong to a different
FPC. PR1477956
• QFX5100: If more than one UDF filter/term is configured, then only the first filter/term will be
programmed in hardware. This is due to SDK 6.5.16 upgrade. PR1487679
• Junos OS: EX2300 Series: High CPU load due to receipt of specific multicast packets on layer 2 interface
(CVE-2020-1668). PR1491905
• Virtual Chassis is not stable with 100-Gigabit Ethernet and 40-Gigabit Ethernet interfaces. PR1497563
• Outbound SSH connection flaps or memory leaks during the push configuration to ephemeral database
with high rate. PR1497575
• Traffic might get dropped if the aggregated Ethernet member interface is deleted or added, or a SFP of
the aggregated Ethernet member interface is unplugged or plugged. PR1497993
• BFD sessions flap after deactivating or activating the aggregated Ethernet interface or executing GRES.
PR1500798
• The following error message might be observed during MPLS route add, change, or delete operation:
mpls_extra NULL. PR1502385
• The interface becomes physically down after changing to the FEC-none mode. PR1502959
• LLDP is not acquired when native-vlan-id and tagged VLAN-ID are the same on a port. PR1504354
279
• "Media type" in show interface command is displayed as "Fiber" for SFP-10G-T. PR1504630
• The l2cpd process might crash if the ERP configuration is added or removed, and the l2cpd process is
restarted. PR1505710
• The fxpc may crash and restart with a fxpc core file created while installing image through ZTP.
PR1508611
• ARP replies might be flooded through the EVPN-VXLAN network as unknown unicast ARP reply.
PR1510329
• On the QFX5000 line of switches, multicast traffic loss is observed due to few multicast routes missing
in the spine node. PR1510794
• The QFX10000-36Q line card used on QFX10008/QFX10016 platforms may fail to detect any QSFP.
PR1511155
• In the VXLAN configuration, the firewall filters might not be loaded into the TCAM with the following
message due to TCAM overflow after upgrading to Releases 18.1R3-S1, 18.2R1, and later : DFWE
ERROR DFW: Cannot program filter. PR1514710
• The routes update might fail upon the HMC memory issue and traffic impact might be seen. PR1515092
• The 100-Gigabit Ethernet AOC non-breakout port might be auto-channelized to other speed. PR1515487
• The MAC learning might not work properly after multiple MTU changes on the access port in the VXLAN
scenario. PR1516653
• The vgd process might generate a core file when the OVSDB server restarts. PR1518807
• Traffic forwarding might be affected when adding, removing, or modifying the VLAN or VNI configurations
such as VLAN-ID, VNI-ID, and Ingress-Replication command. PR1519019
• Output interface index in sFLOW packet are zero when transit traffic are observed on the IRB interface
with VRRP enabled. PR1521732
• On the QFX10002, QFX10008, and QFX10016 line of switches, the following error message is observed
during specific steps while clearing and loading the scaled configuration again:
PRDS_SLU_SAL:jprds_slu_sal_update_lrncnt(),1379: jprds_slu_sal_update_lrncnt call failed. PR1522852
• Sampling with the rate limiter command enabled, crosses the sample rate 65535. PR1525589
• Packet loss is observed while validating the policer after restarting the chassis control. PR1531095
280
• High rate of ARP or NS packets might be observed between a device that runs Junos OS and host when
the device that runs Junos OS receives an ARP or NS packet on an interface in transition. PR1534796
• Management Ethernet link down alarm seen while verifying system alarms in Virtual Chassis setup.
PR1538674
Routing Protocols
• On the QFX 5100-48T-6Q Virtual Chassis or Virtual Chassis fan, the following error message is observed
while copying image to the Virtual Chassis fan member and trying to downgrade the image: rcp for
member 14, failed. PR1486632
• EX4300-MP/EX4600/QFX5000 Series: High CPU load due to receipt of specific layer 2 frames in
EVPN-VXLAN deployment. (CVE-2020-1687) & High CPU load due to receipt of specific layer 2 frames
when deployed in a Virtual Chassis configuration (CVE-2020-1689). PR1495890
• The rpd might report 100% CPU usage with BGP route damping enabled. PR1514635
• Enabling Ipv6 flow based Packet forwarding Engine hashing gives commit error. PR1519018
• Firewall "sample" configuration gives the warning as unsupported on QFX10002-36q and will not work.
PR1521763
• On the QFX5000 line of switches, the fxpc process might crash if the VXLAN interface flaps. PR1528490
Virtual Chassis
• On QFX5120 and QFX5210 platforms unexpected storm control events might happen. PR1519893
EVPN
• The ESI of IRB interfaces does not update after autonomous-system number change if the interface is
down. PR1482790
• QFX10002-60C EVPN-VXLAN multicast: The show command issued for the VTEP interface did not
show mesh-group id. PR1498052
General Routing
• The following error message is generated while booting: CMQFX: Error requesting SET BOOLEAN,
illegal setting 66. PR1385954
• The configuration statement show chassis errors active detail is not supported for QFK5000 platforms.
PR1386255
• The 10G fiber interfaces might flap frequently when they are connected to other vendor's switch.
PR1409448
• The statement show interface indicates Media type: Fiber on QFX5100-48T running ’-qfx-5e-’ Junos
OS image. PR1419732
• The default logical interfaces on channelized physical interfaces might not be created after ISSU/ISSR.
PR1439358
• CRC error might be seen on the VCPs of the QFX5100 Virtual Chassis. PR1449406
• On QFX5000 no warning or error is shown when dual VLAN tag feature is configured on physical
interface. PR1450455
• Members might stay disconnected from a QFX5120-32C and QFX5120-48T Virtual Chassis after a
full-stack reboot. PR1453399
• Changing the VLAN name associated with access ports might prevent MAC addresses from being learned
in an EVPN-VXLAN scenario. PR1454095
• The cosd crash might be observed if forwarding-class-set is directly applied on the child interface of an
aggregated Ethernet interface. PR1455357
• Telemetry traffic might not be sent out when the telemetry server is reachable through a different routing
instance. PR1456282
• Link up delay and traffic drop might be seen on mixed SP L2/L3 and EP L2 type configurations. PR1456336
• QFX5110 QSFP-100GBASE-SR4 made by the third party cannot link up. PR1457266
• An FPC might restart during runtime on the QFX10000 line of devices. PR1464119
• EPR iCRC errors in QFX10000 platforms might cause protocols to go down. PR1466810
• A few of DHCP INFORM packets specific to a particular VLAN might be taking the wrong resolve queue.
PR1467182
• Traffic loss might be seen with framing errors or runts if MACsec is configured on EX4600/QFX5100
platforms. PR1469663
282
• The traffic loss might occur when VTEP source interface is configured in multiple routing instances.
PR1471465
• Egress ACL filter entries will be only 512 in Junos OS Release 19.4R1 on QFX5000. PR1472206
• DSCP marking might not work as expected if the fixed classifiers are applied to interfaces on
QFX5000/EX4600 platforms. PR1472771
• The detached interface in LAG might process the xSTP BPDUs. PR1473313
• ERP might not come up properly when MSTP and ERP are enabled on the same interface. PR1473610
• The RIPv2 packets forwarded across a L2 circuit connection might be dropped. PR1473685
• Continuous error log messages might be raised on QFX5000 platforms in EVPN-VXLAN scenario.
PR1474545
• On QFX Series platforms the system might stop new MAC learning and have impact on Layer 2 traffic
forwarding. PR1475005
• DAC cables are not being properly detected in Packet Forwarding Engine in QFX5200. PR1475249
• There might be a traffic drop on QFX5110 and QFX5120 switches acting as leaf switches in a multicast
environment with VXLAN. PR1475430
• FPC major error is seen after system boot up or FPC restart. PR1475851
• QFX Series platforms are exhibiting invalid Packet Forwarding Engine PG counter pairs to copy, src
0xfffff80, dst 0. PR1476829
• The default Virtual Chassis MAC persistence timer is incorrectly set to 20 seconds instead of 20 minutes.
PR1478905
• The remaining interface might be still in down state even though the number of channelized interfaces
is no more than 5. PR1480480
• ARP request packets for unknown host might get dropped in remote PE device in EVPN-VXLAN scenario.
PR1480776
• On QFX10000 and QFX5000, in SP style configuration, BUM traffic incorrectly gets blocked, while
disabling or enabling a different logical interface. PR1482202
283
• On QFX5110, whenever the autonegotation is toggled on the interface, explicitly set the link-mode as
well as the speed for the configuration to take effect. PR1484715
• The dcpfe core file might be seen with non-oversubscribed mode. PR1485854
• The 10GbE VCP ports will not be active in a QFX5100 Virtual Chassis scenario. PR1486002
• Virtual Chassis ports might go down in a mixed Virtual Chassis setup of QFX5100-24Q-2P/EX4300 and
EX4600/EX4300. PR1489985
• After ISSU/ISSR, a port using SR4/LR4 optics might not come up. PR1490799
• BFD sessions start to flap when the firewall filter in the loopback0 is changed. PR1491575
• Traffic loss could be observed in a mixed Virtual Chassis setup of QFX5100 and EX4300. PR1493258
• SNMP polling for CPU utilization and CPU state of backup Routing Engine does not show in a two-member
Virtual Chassis. PR1495384
• Extra carrier transitions are seen on the peer when negative triggers are performed on QFX5100 and
QFX5110. PR1497380
• Traffic might get dropped if aggregated Ethernet member interface is deleted and then added or a SFP
of the aggregated Ethernet member interface is unplugged/plugged. PR1497993
• On QFX5210, unexpected behavior is seen for Port LED after upgrade. PR1498175
• Inter-VNI/VRF and intra-VNI/VRF traffic is dropped between the CE devices when the interfaces
connected between TOR and multihomed PE devices are disabled. PR1498863
• The l2cpd crash might be seen while adding or deleting ERP configuration and then restarting l2cpd.
PR1505710
• ARP replies might be flooded through the EVPN-VxLAN network as unknown unicast ARP reply.
PR1510329
• Executing commit might hang up because dcd process gets stuck. PR1470622
• Commit error is not thrown when member link is added to multiple aggregation group with different
interface specific options. PR1475634
284
• MC-LAG consistency check fails if multiple IRB units are configured with the same VRRP group.
PR1488681
• Error message is not getting generated while verifying GRE limitation. PR1495543
• Member links state might be asychronized on a connection between PE and CE devices in an EVPN A/A
scenario. PR1463791
• Issues with DHCPv6 relay processing confirm and reply packets. PR1496220
Layer 2 Features
• MAC learning might not work correctly on QFX5120. PR1441186
• The LLDP function might fail when a Juniper Networks device connects to a non-Juniper one. PR1462171
• A few MAC addresses might be missing from the MAC table in software on QFX5000 platform.
PR1467466
• On QFX5120 switches QinQ, the third VLAN tag is not pushed onto the stack and SWAP is being done
instead. PR1469149
MPLS
• Traffic might silently get dropped or discarded on the PE device when the CE device sends traffic to the
PE device and the destination is resolved with two LSPs through one upstream interface. PR1475395
• The traffic might be lost over QFX5100 switch acting as a transit PHP node in the MPLS network.
PR1477301
• BGP session might keep flapping between two directly connected BGP peers because of the incorrect
TCP-MSS in use. PR1493431
• Traceroute monitor with mtr version v.69 shows a false 10 percent loss. PR1493824
285
Routing Protocols
• OSPF VRF sessions take a long time to come up when the host table is full and host routes are in LPM
table. PR1358289
• BGP IPv4 or IPv6 convergence and RIB install/delete time degraded in Junos OS Release 19.1R1 and
later mainline releases. PR1414121
• PIM (S,G) joins can cause MSDP to incorrectly announce source-active messages in some cases.
PR1443713
• The core files might occur during adding or removing EVPN Type 5 routing instance. PR1455547
• [pfe_loadbalance] [pfeloadtag] flows not falling back to single link when inactivity-interval is set higher
than IFG. PR1471729
• Traffic might not be forwarded over ECMP link in EVPN-VXLAN scenario. PR1475819
• ARP packets are always sent to CPU regardless of whether the storm-control is activated. PR1476708
• MUX State in LACP interface does not go to "collecting and distributing" and remains attached after
enabling the ae interface. PR1484523
• FPC might go to "NotPrsnt" state after upgrading with non-QFX5100-24Q image in a Virtual
Chassis/Virtual Chassis fabric setup. PR1485612
• CPU port queue gets full due to excessive pause frames being received on interfaces. This causes control
packets from the CPU to all ports to be dropped. PR1487707
• The BGP route-target family might prevent RR from reflecting L2 VPN and L3 VPN routes. PR1492743
• The rpd might crash on QFX10000 due to rpd resolver problem of INH. PR1494005
• Firewall filter might not work in certain conditions under Virtual Chassis setup. PR1497133
• Traffic drop might be observed after modifying FBF firewall filter. PR1499918
• Change in x-path output for value "input-updates" in show bgp neighbors. PR1504399
SEE ALSO
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for the QFX Series Switches.
SEE ALSO
IN THIS SECTION
This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for
Junos OS. Upgrading or downgrading Junos OS can take several hours, depending on the size and
configuration of the network.
When upgrading or downgrading Junos OS, always use the jinstall package. Use other packages (such as
the jbundle package) only when so instructed by a Juniper Networks support representative. For information
about the contents of the jinstall package and details of the installation process, see the Installation and
Upgrade Guide and Junos OS Basics in the QFX Series documentation.
If you are not familiar with the download and installation process, follow these steps:
1. In a browser, go to https://www.juniper.net/support/downloads/junos.html.
2. In the QFX Series section of the Junos Platforms Download Software page, select the QFX Series
platform for which you want to download the software.
3. Select 20.2 in the Release pull-down list to the right of the Software tab on the Download Software
page.
4. In the Install Package section of the Software tab, select the QFX Series Install Package for the 20.2
release.
5. In the Alert box, click the link to the PSN document for details about the software, and click the link
to download it.
6. Log in to the Juniper Networks authentication system using the username (generally your e-mail address)
and password supplied by Juniper Networks representatives.
8. Copy the software to the device or to your internal software distribution site.
NOTE: We recommend that you upgrade all software packages out of band using the console,
because in-band connections are lost during the upgrade process.
Customers in the United States and Canada use the following command:
• /pathname—For a software package that is installed from a local directory on the switch.
• For software packages that are downloaded and installed from a remote location:
• ftp://hostname/pathname
• http://hostname/pathname
Adding the reboot command reboots the switch after the upgrade is installed. When the reboot is
complete, the switch displays the login prompt. The loading process can take 5 to 10 minutes.
NOTE: After you install a Junos OS Release 20.2 jinstall package, you can issue the request
system software rollback command to return to the previously installed software.
289
This section explains how to upgrade the software, which includes both the host OS and the Junos OS.
This upgrade requires that you use a VM host package—for example, a junos-vmhost-install-x.tgz .
During a software upgrade, the alternate partition of the SSD is upgraded, which will become primary
partition after a reboot .If there is a boot failure on the primary SSD, the switch can boot using the snapshot
available on the alternate SSD.
NOTE: The QFX10002-60C switch supports only the 64-bit version of Junos OS.
NOTE: If you have important files in directories other than /config and /var, copy the files to a
secure location before upgrading. The files under /config and /var (except /var/etc) are preserved
after the upgrade.
If the installation package resides locally on the switch, execute the request vmhost software add
<pathname><source> command.
For example:
If the Install Package resides remotely from the switch, execute the request vmhost software add
<pathname><source> command.
For example:
After the reboot has finished, verify that the new version of software has been properly installed by
executing the show version command.
NOTE: If you are upgrading from a version of software that does not have the FreeBSD 10
kernel (15.1X53-D30, for example), you will need to upgrade from Junos OS Release 15.1X53-D30
to Junos OS Release 15.1X53-D32. After you have installed Junos OS Release 15.1X53-D32,
you can upgrade to Junos OS Release 15.1X53-D60 or Junos OS Release 18.3R1.
NOTE: On the switch, use the force-host option to force-install the latest version of the Host
OS. However, by default, if the Host OS version is different from the one that is already installed
on the switch, the latest version is installed without using the force-host option.
If the installation package resides locally on the switch, execute the request system software add
<pathname><source> reboot command.
For example:
If the Install Package resides remotely from the switch, execute the request system software add
<pathname><source> reboot command.
For example:
After the reboot has finished, verify that the new version of software has been properly installed by
executing the show version command.
NOTE: Before you install the software, back up any critical files in /var/home. For more
information regarding how to back up critical files, contact Customer Support at
https://www.juniper.net/support.
The switch contains two Routing Engines, so you will need to install the software on each Routing Engine
(re0 and re1).
If the installation package resides locally on the switch, execute the request system software add
<pathname><source> command.
If the Install Package resides remotely from the switch, execute the request system software add
<pathname><source> re0 command.
For example:
If the Install Package resides remotely from the switch, execute the request system software add
<pathname><source> re1 command.
For example:
For example:
After the reboot has finished, verify that the new version of software has been properly installed by
executing the show version command.
Because the switch has two Routing Engines, perform a Junos OS installation on each Routing Engine
separately to avoid disrupting network operation.
NOTE: Before you install the software, back up any critical files in /var/home. For more
information regarding how to back up critical files, contact Customer Support at
https://www.juniper.net/support.
For more information about logging in to the Routing Engine through the console port, see the specific
hardware guide for your switch.
user@switch> configure
4. Disable nonstop-bridging:
user@switch# exit
294
After the switch has been prepared, you first install the new Junos OS release on the backup Routing
Engine, while keeping the currently running software version on the master Routing Engine. This enables
the master Routing Engine to continue operations, minimizing disruption to your network.
After making sure that the new software version is running correctly on the backup Routing Engine,
you are ready to switch routing control to the backup Routing Engine, and then upgrade or downgrade
the software version on the other Routing Engine.
7. Log in to the console port on the other Routing Engine (currently the backup).
For more information about logging in to the Routing Engine through the console port, see the specific
hardware guide for your switch.
8. Install the new software package using the request system software add command:
For more information about the request system software add command, see the CLI Explorer.
9. Reboot the switch to start the new software using the request system reboot command:
NOTE: You must reboot the switch to load the new installation of Junos OS on the switch.
To abort the installation, do not reboot your switch. Instead, finish the installation and then
issue the request system software delete <package-name> command. This is your last chance
to stop the installation.
All the software is loaded when you reboot the switch. Installation can take between 5 and 10 minutes.
The switch then reboots from the boot device on which the software was just installed. When the
reboot is complete, the switch displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing the installation
is not sending traffic.
10.Log in and issue the show version command to verify the version of the software installed.
Once the software is installed on the backup Routing Engine, you are ready to switch routing control
to the backup Routing Engine, and then upgrade or downgrade the master Routing Engine software.
295
For more information about logging in to the Routing Engine through the console port, see the specific
hardware guide for your switch.
For more information about the request chassis routing-engine master command, see the CLI Explorer.
13.Verify that the backup Routing Engine (slot 1) is the master Routing Engine:
14.Install the new software package using the request system software add command:
For more information about the request system software add command, see the CLI Explorer.
296
15.Reboot the Routing Engine using the request system reboot command:
NOTE: You must reboot to load the new installation of Junos OS on the switch.
To abort the installation, do not reboot your system. Instead, finish the installation and then
issue the request system software delete jinstall <package-name> command. This is your
last chance to stop the installation.
The software is loaded when you reboot the system. Installation can take between 5 and 10 minutes.
The switch then reboots from the boot device on which the software was just installed. When the
reboot is complete, the switch displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing the installation
does not send traffic.
16.Log in and issue the show version command to verify the version of the software installed.
For more information about the request chassis routing-engine master command, see the CLI Explorer.
18.Verify that the master Routing Engine (slot 0) is indeed the master Routing Engine:
You can use unified ISSU to upgrade the software running on the switch with minimal traffic disruption
during the upgrade.
297
• Ensure that nonstop active routing (NSR), nonstop bridging (NSB), and graceful Routing Engine switchover
(GRES) are enabled. NSB and GRES enable NSB-supported Layer 2 protocols to synchronize protocol
information between the master and backup Routing Engines.
NOTE: If nonstop active routing is enabled, then graceful Routing Engine switchover is enabled.
If nonstop active routing is not enabled (Stateful Replication is Disabled), see Configuring Nonstop Active
Routing on Switches for information about how to enable it.
• Enable nonstop bridging (NSB). See Configuring Nonstop Bridging on Switches (CLI Procedure) for information
on how to enable it.
• (Optional) Back up the system software—Junos OS, the active configuration, and log files—on the switch
to an external storage device with the request system snapshot command.
This procedure describes how to upgrade the software running on a standalone switch.
298
1. Download the software package by following the procedure in the Downloading Software Files with
a Browser section in Installing Software Packages on QFX Series Devices.
2. Copy the software package or packages to the switch. We recommend that you copy the file to the
/var/tmp directory.
3. Log in to the console connection. Using a console connection allows you to monitor the progress of
the upgrade.
NOTE: During the upgrade, you cannot access the Junos OS CLI.
The switch displays status messages similar to the following messages as the upgrade executes:
warning: Do NOT use /user during ISSU. Changes to /user during ISSU may get
lost!
ISSU: Validating Image
ISSU: Preparing Backup RE
Prepare for ISSU
ISSU: Backup RE Prepare Done
Extracting jinstall-host-qfx-5-f-x86-64-18.3R1.n-secure-signed.tgz ...
Install jinstall-host-qfx-5-f-x86-64-19.2R1.n-secure-signed.tgz completed
Spawning the backup RE
Spawn backup RE, index 0 successful
GRES in progress
GRES done in 0 seconds
Waiting for backup RE switchover ready
GRES operational
Copying home directories
Copying home directories successful
Initiating Chassis In-Service-Upgrade
Chassis ISSU Started
ISSU: Preparing Daemons
ISSU: Daemons Ready for ISSU
299
NOTE: A unified ISSU might stop, instead of abort, if the FPC is at the warm boot stage. Also,
any links that go down and up will not be detected during a warm boot of the Packet
Forwarding Engine (PFE).
NOTE: If the unified ISSU process stops, you can look at the log files to diagnose the problem.
The log files are located at /var/log/vjunos-log.tgz.
5. Log in after the reboot of the switch completes. To verify that the software has been upgraded, enter
the following command:
6. Ensure that the resilient dual-root partitions feature operates correctly, by copying the new Junos OS
image into the alternate root partitions of all of the switches:
Resilient dual-root partitions allow the switch to boot transparently from the alternate root partition
if the system fails to boot from the primary root partition.
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
300
provide direct upgrade and downgrade paths—you can upgrade directly from one EEOL release to the
next EEOL release even though EEOL releases generally occur in increments beyond three releases.
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
SEE ALSO
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for the SRX Series. They describe new and
changed features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What’s New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for SRX Series
devices.
There are no new features in Junos OS Release 20.2R3 for the SRX Series devices.
There are no new features in Junos OS Release 20.2R2 for the SRX Series devices.
Application Security
• AppQoE multihoming with active/active deployment (NFX150, NFX250, SRX320, SRX340, SRX345,
SRX550HM, SRX1500, SRX4100, SRX4200, and vSRX)—Starting In Junos OS Release 20.2R1, AppQoE
is enhanced to support multihoming with active/active deployment. Previously, AppQoE supported
multihoming with active/standby deployment.
In active/active deployment, the spoke device connects to multiple hub devices. Application traffic can
transit through any of the hub devices if the link to the hub device meets SLA requirements. Application
traffic can switch seamlessly between the hub devices in case of service-level agreement (SLA) violation
or the active hub device is not responding.
302
To support active/active mode, you must enable the BGP multipath to allow the device to select multiple
equal-cost BGP paths to reach a given destination.
• Packet capture of unknown application traffic (NFX Series, SRX Series, and vSRX)—Starting in Junos
OS Release 20.2R1, we’ve added new capability to your security device that allows you to capture
unknown application traffic.
Once you have configured the packet capture options on your security device, the unknown application
traffic information is gathered and stored on the device in a packet capture file (.pcap). You can use the
packet capture of an unknown application to define a new custom application signature. You can use
this custom application signature in a security policy to manage the application traffic more efficiently.
You can also send the .pcap file to Juniper Networks in cases where the traffic is incorrectly classified,
or to request for the creation of an application signature.
The SRX4600 supports AppQoE in both the hub-and-spoke and the full mesh topologies.
AppQoE support is already available on SRX300, SRX320, SRX340, SRX345, SRX550HM, SRX1500,
SRX4100, SRX4200, and vSRX.
You can search the user identity information and validate the authentication source to provide access
to the device. You can request JIMS to retrieve the group list for the Active Directory domain for identity
information of an individual user.
[See Configure Juniper Identity Management Service to Obtain User Identity Information.]
• Must-IE check: Use this function to check for the presence of IEs in GTPv1-C and GTPv2-C messages
that helps to verify message integrity. The device check for the presence of Must-IEs of specific GTP
messages and forwards the messages only if Must-IEs are present.
• IE removal: Use this function to remove IEs from GTPv1-C and GTPv2-C. This function helps to retain
interoperability between Second-Generation Partnership Project (2GPP) and Third-Generation
Partnership Project (3GPP) networks.
[See Example: Configure Must-IE check for GTPv1 and GTPv2, and Example: Configure IE removal for
GTPV1 and GTPv2.]
When traffic matches the feed data, IDP provides feed update to add the IP information in the Security
Intelligence (SecIntel) module.
This feature allows the SRX Series device to identify threats, and propagate intelligence for real-time
enforcement and provides the ability to perform endpoint classification.
[See IDP Policy Rules and IDP Rule Bases, security-intelligence, and Encrypted Traffic Analysis Overview.]
304
• Signature Language Constructs (SRX Series)—Starting in Junos OS 20.2R1, the following signature
language constructs are supported in the IDP engine code to write more efficient signatures that help
reduce false attacks:
• Byte extract
• Byte test
• Byte jump
• Byte math
• Is-data-at
• Detection filter
Using JTI and gRPC or gNMI services, you can stream telemetry statistics to an outside collector.
These Routing Engine sensors are supported using gNMI services (previously, only gRPC services were
supported):
• Operational state of Routing Engines, power supply modules, Switch Fabric Boards, Control Boards,
Switch Interface Boards, Modular Interface Cards, and Physical Interface Cards (resource path /
components/).
• Address Resolution Protocol (ARP) statistics for IPv4 routes (resource path /arp-information/).
• Network Discovery Protocol (NDP) table state information for IPv6 routes (resource path /
nd6-information/).
305
[See Guidelines for gRPC and gNMI Sensors (Junos Telemetry Interface.]
[See language (Scripts), Develop Off-Device JET Applications, and Develop On-Device JET Applications.]
J-Web
• Improved VPN usability (SRX Series)—Starting in Junos OS Release 20.2R1, we’ve refreshed the IPsec
VPN page. You can see a new improved site-to-site VPN workflow configuration.
• Pass-through tunnel inspection is supported in TAP mode (SRX 300 line of devices, SRX550M, SRX1500,
SRX4100, and SRX4200)—Starting in Junos OS Release 20.2R1, the J-Web Setup Wizard TAP mode
supports pass-through tunnel inspection. This allows the SRX Series device to inspect pass-through
traffic over an IP-IP tunnel or GRE tunnel.
• HTTP X-Forwarded for header support in IDP (SRX Series)—Starting in Junos OS Release 20.2R1, IDP
supports the HTTP X-Forwarded option. When you enable this option, during traffic flow, IDP saves
the source IP addresses (IPv4 or IPv6) from the HTTP and SMTP traffic contexts and displays them in
the attack logs.
• By default, the priority for the custom application is set to Low. This allows a predefined application
to take precedence. If you want to override a predefined application, you must set the priority to High.
• Depth option is supported. Use this byte limit for Application Identification (App ID) to identify custom
application patterns for applications running over TCP or UDP or Layer 7 applications.
• Custom Application Byte Limit is supported in Global Settings. This byte limit helps in understanding
when to stop the identification of custom applications.
ATP Cloud
• Support for adaptive threat profiling—Starting in Junos OS Release 20.2R1, you can configure adaptive
threat profiling in Juniper Sky ATP. Adaptive Threat Profiling allows SRX Series devices to generate,
propagate, and consume threat feeds based on their own advanced detection and policy-match events.
You can generate adaptive threat profiling feeds with traditional policies, unified policies with application
identification (AppID) or URL-based match criteria, and IDP. Navigate to Configure > Adaptive Threat
Profiling in Juniper Sky ATP UI to configure adaptive threat profiling.
[See Adaptive Threat Profiling Overview and Add Threat Feed for Adaptive Threat Profiling.]
• Support for encrypted traffic analysis—Starting in Junos OS Release 20.2R1, encrypted traffic analysis
is supported in Juniper Networks Sky ATP. Encrypted traffic analysis helps you to detect malicious
threats that are hidden in encrypted traffic without intercepting and decrypting the traffic. Navigate to
Monitor > Encrypted Traffic in Juniper Sky ATP UI to view detailed information about encrypted traffic
analysis-based detections. To configure encrypted traffic analysis, use the security-metadata-streaming
command at [edit services] hierarchy level. Use the show services security-metadata-streaming statistics
command to view the statistics of the sessions.
[See Encrypted Traffic Analysis Overview and Encrypted Traffic Analysis Details.]
• User authentication support for tenant systems (SRX Series)—Starting in Release 20.2R1, Junos OS
introduces the following authentication support for tenant systems:
• address-assignment pools: Creates centralized IPv4 and IPv6 address pools independent of the client
applications that use the pools.
• clear network-access aaa subscribers: Clears AAA subscriber statistics and logs out subscribers. You
can log out subscribers based on the username or on the subscriber session identifier.
Multicast
• Strict packet order for multicast traffic (SRX345 and SRX1500)—Starting in Junos OS Release 20.2R1,
we have introduced a new mechanism to maintain multicast traffic order and resolve packet drop issue.
Use the strict-packet-order command at the [edit security flow] hierarchy level to maintain the packet
order.
As part of this enhancement, you can configure the multicast route next-hop resolve attempts. When
a multicast route next-hop resolve is unsuccessful, the SRX Series device attempts to resolve the next-hop
route based on the specified retry counts. Use the multicast-nh-resolve-retry command at the [edit
security flow] hierarchy level to specify the number of retry counts.
[See flow.]
• When you disable interim log, you can increase the size of port block allocation from 64 to 8 .
• When you enable interim log, you can increase the size of port block allocation from 128 to 8.
If you configure the port block allocation size less than 8, the system displays the warning message
warning: To save system memory, the block size is recommended to be no less than 8.
[See Guidelines for Configuring Secured Port Block Allocation and Configure Port Block Allocation Size.]
• Python 3 support for YANG scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX
Series)—Starting in Junos OS Release 20.2R1, Junos OS uses Python 3 to execute YANG action and
translation scripts that are written in Python. Junos OS does not support using Python 2.7 to execute
YANG Python scripts as of this release.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
• Traffic log enhancement (SRX Series)—Starting in Junos OS Release 20.2R1, we’ve enhanced the traffic
log by supporting:
308
• Escape in stream log forwarding and on-box reporting to avoid parsing errors. Stream mode supports
escape in sd-syslog and binary format. Event mode supports escape only in binary format.
• Stream-event mode.
• Increased maximum length of the stream mode sd-syslog format syslog message to 4*1472 bytes.
• CPU usage monitoring (SRX5400, SRX5600, and SRX5800)—Starting in Junos OS Release 20.2R1, you
can use the following operational commands to monitor the average CPU usage information for the last
minute, hour, or day of an SPC3 card:
• show security monitoring performance spu summary fpc fpc-slot-number pic pic-slot-number
• show security monitoring performance spu summary fpc fpc-slot-number pic pic-slot-number thread
thread-number
You can monitor the CPU usage information only when the PIC is online.
[See show snmp mib and show security monitoring performance spu.]
309
[See Security Policy for Controlling Traffic for VRF Routing-Instance, Flow Management in SRX Series
Devices Using VRF Routing-Instance, Understanding ALG Support for VRF Routing-Instance, and Network
Address Translation for VRF Routing-Instance.]
Port Security
• Media Access Control Security (MACsec) (SRX380)—Starting in Junos OS Release 20.2R1, MACsec is
supported on high availability (HA) control and fabric ports of SRX380 devices in chassis cluster mode.
MACsec provides secure communication for almost all types of Layer 2 traffic on Ethernet links. MACsec
is capable of identifying and preventing most security threats at Layer 2 and can be used in combination
with other security protocols to provide end-to-end network security. MACsec is standardized in IEEE
802.1AE.
Security
• Support for security feeds in security policies (SRX Series and vSRX)—Starting in Junos OS Release
20.2R1, you can add source and destination addresses to the security intelligence (SecIntel) profiles to
generate security feeds in a security policy. You can accomplish this by configuring the
security-intelligence configuration statements. After the feeds are generated, you can configure other
security policies to use the feeds as a dynamic-address˝˙þ to match designated traffic and perform policy
actions.
You can configure the security-intelligence configuration statements as permit, deny, or reject match
conditions in a security policy at the following hierarchy levels:
[edit security policies from-zone zone-name to-zone zone-name policy policy-name then permit
application-services]
[edit security policies from-zone zone-name to-zone zone-name policy policy-name then deny application-services]
[edit security policies from-zone zone-name to-zone zone-name policy policy-name then reject application-services]
• Enhancements to configuring security policies (SRX Series and vSRX)—Starting in Junos OS Release
20.2R1, we have added advanced connection tracking options to security policies.
You can configure the advanced-connection-tracking command at the[edit security zones security-zone
zone name] hierarchy levels to generate a connection track table using source IP, destination IP (optional),
and destination port (optional) during session creation stage when traffic enters a given zone. This
connection track mapping table also appears on the backup node in high availability (HA) pair.
310
You can configure the advanced-connection-tracking option under [edit security policies from-zone
zone-name to-zone zone-name policy policy-name then permit] to mandate that traffic matching given
policy do a lookup in the to-zone’s connection track mapping table using the new session’s key information.
If there is no match, a new connection is not created.
[See advanced-connection-tracking.]
• test security utm enhanced-web-filtering url-check <test-url>: Checks the category of a test string.
• test security utm web-filtering profile <profile-name><test-url>: Checks the reputation of a test string.
Junos OS introduces the following test command for the antispam feature:
• test security utm anti-spam ip-check <test-IP>: Checks whether the IP address is a spam source.
• CDF mode and inline-tap mode for AV—Starting in Release 20.2R1, Junos OS introduces continuous
delivery function (CDF) and inline-tap mode at the existing [edit security utm default-configuration
anti-virus] hierarchy level. Continuous delivery function holds the last packet and sends out the other
packets. This reduces system memory usage and speeds up the traffic. Inline-tap mode permits the traffic
even if it is infected. Use inline-tap mode to check the antivirus feature without blocking or modifying
the traffic.
• Safe search enhancement for Web filtering (SRX Series and vSRX)—Starting in Junos OS Release 20.2R1,
we’ve introduced safe search UTM Web filtering on well-known search engines. This safe search
enhancement enforces the safest Web browsing mode available, by default. You can disable the safe
search option at the Web filtering-level and profile-level configurations. You can also block search engine
311
cache on the well-known search engines. By blocking the search engine cache, you can hide your
Web-browsing activities from other users if you are a part of an organization that has multiple Web
users in educational, financial, health-care, banking, and corporate segments.
[See Safe Search Enhancement for Web Filtering, feature-profile, websense-redirect, and juniper-local.]
SEE ALSO
What's Changed
IN THIS SECTION
Learn about what changed in the Junos OS main and maintenance releases for SRX Series.
• Self-generated IKE packets chooses outgoing interface matching source IP Address (SRX Series) — A
self-generated Internet Key Exchange (IKE) packet always select the ECMP outgoing interface that
matches source IP address. Note that filter-based forwarding for self-generated traffic with rerouting
is not supported.
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX commit scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX commit scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are logged in system log files.
• The jcs:invoke() function supports suppression of root login and logout events in system log files for
SLAX event scripts (ACX Series, EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—The
jcs:invoke() extension function supports the no-login-logout parameter in SLAX event scripts. If you
include the parameter, the function does not generate and log UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages when the script logs in as root to execute the specified RPC. If you omit the parameter, the
function behaves as in earlier releases in which the root UI_LOGIN_EVENT and UI_LOGOUT_EVENT
messages are logged in system log files.
• Unable to Upgrade a Chassis Cluster Using In-Service Software Upgrade (SRX5400)—In chassis cluster
mode, the backup router's destination address for IPv4 and IPv6 routers using the commands [edit
system backup-router address destination destination-address] and [edit system inet6-backup-router
address destination destination-address] must not be same as interface address configured for IPv4
and IPv6 using the commands [edit interfaces interface-name unit logical-unit-number family inet
313
address ipv4-address] and [edit interfaces interface-name unit logical-unit-number family inet6 address
ipv6-address].
• If a successful <commit> operation returns a response with one or more warnings, the warnings are
redirected to the system log file, in addition to being omitted from the response.
• The NETCONF server response emits the <source-daemon> element as a child of the <error-info>
element instead of the <rpc-error> element.
• If you also configure the flatten-commit-results statement at the [edit system services netconf]
hierarchy level, the NETCONF server suppresses any <commit-results> XML subtree in the response
and emits only an <ok> or <rpc-error> element.
314
[See export-format.]
J-Web
• Change in the J-Web browser tab title (SRX Series)—The J-Web browser tab title displays the device
model and the hostname. The same details are displayed when you hover over the J-Web browser tab.
For example, when you access J-Web for an SRX320 device with a host name srx320-xyz, the J-Web
browser tab displays the title as J-Web (srx320 – srx320-xyz).
If the hostname is not configured, you can see the host URL or IP address in the J-Web browser tab
title. For example, J-Web (srx320 – <device IP address>).
Routing Protocols
• Advertising 32 secondary loopback addresses to traffic engineering database as prefixes (ACX Series,
EX Series, MX Series, PTX Series, QFX Series, and SRX Series)—We've made changes to export multiple
loopback addresses to the lsdist.0 and lsdist.1 routing tables as prefixes. This eliminates the issue of
advertising secondary loopback addresses as router IDs instead of prefixes. In earlier releases, multiple
secondary loopback addresses in the traffic engineering database were added to the lsdist.0 and lsdist.1
routing tables as part of node characteristics and advertised them as the router ID.
System Log
• Support fully qualified domain name (FQDN) for log server (SRX Series)—In Junos OS, you can configure
TTL value for a DNS server cache with hostname or IP address.
VPNs
• The junos-ike package installed by default (SRX5000 Series devices)— For SRX5000 Series devices with
RE3 installed, the junos-ike package is installed by default. As a result, iked and ikemd process runs on
the Routing Engine by default instead of IPsec key management daemon (kmd). In earlier Junos OS
Releases, junos-ike package is an optional package for SRX5000 Series devices with RE3 and IPsec Key
Management Daemon (KMD) runs by default.
[See Enabling IPsec VPN Feature Set on SRX5K-SPC3 Services Processing Card.]
• IKE Index displayed in show security ipsec security-associations detail Output (SRX5400,SRX5600,
SRX5800)— When you execute the show security ipsec security-associations detail command, a new
output field IKE SA Index corresponding to every IPsec Security Association (SA) within a tunnel is
displayed under each IPsec SA information.
Application Security
• Junos OS Release 20.2R1 introduces a new CLI configuration statement depth under set services
application-identification application application-name over application signature signature-name member
number hierarchy. You can use this configuration statement to specify the byte limit for application
identification (AppID) to identify the custom application pattern for the applications running over TCP
or UDP or Layer 7 applications.
Starting in Junos OS Release 20.2R1, you can display the configured depth value in J-Web using the
show services application-identification application detail command.
In the above sample, you can see the configured value of the depth is displayed as 4.
317
• Starting in Junos OS Release 20.2R1, the syntax of the commands used for displaying the SLA profile
details is changed as following:
Syntax in Junos OS Release Prior to 20.2R1 Syntax in Junos OS Release 20.2R1 or Later
show security advance-policy-based-routing sla profile show security advance-policy-based-routing sla profile
sla-profile-name application application-name profile-name application application-name next-hop
destination-group-name destination-group-name status next-hop-id status
show security advance-policy-based-routing sla profile show security advance-policy-based-routing sla profile
sla-profile-name application application-name profile-name application application-name next-hop
destination-group-name destination-group-name next-hop-id
[See show security advance-policy-based-routing sla profile (Application Name), show security
advance-policy-based-routing sla profile (Next-Hop), and show security advance-policy-based-routing sla
profile (Status).]
When you change the logic, the session reroute skips only the packets received from the chassis interface.
So we can make sure the session continues as the backup session even after you reroute and change
the out-going interface. Otherwise, reroute cannot be skipped for backup sessions.
• Simplified HA (SRX Series)—Starting in Junos OS Release 20.2R1, on SRX Series devices in a simplified
HA setup, when you clear the session using the clear security flow session command, some warm sessions
exist for an extended duration. To clear these warm sessions, a new CLI command clear security flow
session session-state warm is introduced.
[See Develop Off-Device JET Applications and Develop On-Device JET Applications.]
• Updates to IDL for RIB service API bandwidth field (ACX Series, EX Series, MX Series, PTX Series, QFX
Series, and SRX Series)—The IDL for the RouteGateway RIB service API has been updated to document
additional rules for the bandwidth field. You must set bandwidth only if a next hop has more than one
gateway, and if you set it for one gateway on a next hop, you must set it for all gateways. If you set
bandwidth when there is only a single usable gateway, it is ignored. If you set bandwidth for one or
more gateways but not all gateways on a next hop, you see the error code
BANDWIDTH_USAGE_INVALID.
• Junos OS only supports using Python 3 to execute YANG Python scripts (ACX Series, EX Series, MX
Series, PTX Series, QFX Series, and SRX Series)—Starting in Junos OS Release 20.2R1, Junos OS uses
Python 3 to execute YANG action and translation scripts that are written in Python. In earlier releases,
Junos OS uses Python 2.7 to execute these scripts.
[See Understanding Python Automation Scripts for Devices Running Junos OS.]
VPNs
• New vendor ID for Internet Key Exchange (SRX Series)—In Junos OS Release 20.2R1, we’ve introduced
a new vendor ID Juniper Networks for Internet IKEv1 and IKEv2 which is advertised to the peer.
• Change in CLI options help text description (SRX Series)—Starting in Junos OS Release 20.2R1, we’ve
changed the help text description as NOT RECOMMENDED for the following CLI options under [edit
319
security ike proposal proposal-name], [edit security ike policy policy-name], [edit security ipsec proposal
proposal-name], and [edit security ipsec policy policy-name] hierarchies.
• Change in thread ID configuration (SRX Series)—Starting in Junos OS Release 20.2R1, when you add,
change, or delete the thread ID from distribution profile at [edit security distribution-profile profile-name
fpc slot-number pic slot-number thread-id], all tunnels part of modified distribution profile anchored on
modified SPU member of distribution profile are teared down and re-negotiated.
[See distribution-profile.]
SEE ALSO
Known Limitations
IN THIS SECTION
J-Web | 321
VPNs | 321
321
Learn about known limitations in this release for SRX Series devices.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
• Due to internal message failures between the Routing Engine and Packet Forwarding Engine, some
packets get missed in the PCAP files while using the JDPI unknown packet capture feature. PR1491919
• Committing a large number of custom applications with a single member, a single context, and a varying
pattern might result in significant time taken for completion of commit. Commit status can be checked
using show services application-identification commit-status. PR1493127
J-Web
• When a dynamic application is created for an edited policy rule, the list of services is blank when the
Services tab is clicked and then the policy grid is autorefreshed. As a workaround, create a dynamic
application as the last action while modifying the policy rule and click the Save button to avoid loss of
configuration changes made to the policy rule. PR1460214
• For a spoke device in a hub-and-spoke topology, J-Web shows the VPN topology as Site to Site.
PR1495973
VPNs
• When multiple traffic selectors are configured on a particular VPN, the iked process checks for a maximum
of 1 DPD probe that is sent to the peer for the configured DPD interval. The DPD probe is sent to the
peer if traffic flows over even one of the tunnels for the given VPN object. PR1366585
• On the SRX5000 line of devices with an SPC3 card, sometimes IKE SA is not seen on the device when
the st0 binding on the VPN configuration object is changed from one interface to another (for example,
st0.x to st0.y). PR1441411
• On SRX5400, SRX5600, and SRX5800 devices with an SPC3 card, with 60,000 tunnels up, when RG0
failover happens while an IPsec and/or IKE rekey is in progress, those rekeying tunnels might go down
and traffic loss might be seen until the tunnel is reestablished. PR1471499
• In SPC2 and SPC3 mixed-mode HA deployments, tunnel per second (TPS) is getting affected while dead
peer detection (DPD) is being served on existing tunnels. This limitation is due to a large chunk of CPU
being occupied by infrastructure (gencfg) used by IKED to synchronize its DPD state to the backup
nodes. PR1473482
• On SRX Series devices, the accounting stop message is not being sent after deactivating the access
profile under the security IKE gateway. PR1485732
322
SEE ALSO
Open Issues
IN THIS SECTION
J-Web | 323
VPNs | 323
Learn about open issues in this release for SRX Series devices.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
• Use an antireplay window size of 512 for IPv6 in fat-tunnel. The ESP sequence check might otherwise
report out-of-order packets if the fat-tunnel parallel encryption is within 384 packets (12 cores * 32
packets in one batch). Hence, there are no out-of-order packets with 512 antireplay window size.
PR1470637
• You need to configure the default IPv6 route (egress is fxp0) if you use IPv6 GRE or IP-IP tunnel and
dynamic route protocol (BGP, OSPF, and so on) in Layer 3 HA. Use the following configuration example
(2010::1 is in the same sub network with fxp0):
323
• set groups global routing-options rib inet6.0 static route 0::0/0 next-hop 2010::1
set groups global routing-options rib inet6.0 static route 0::0/0 retain
set groups global routing-options rib inet6.0 static route 0::0/0 no-readvertise
PR1482616
J-Web
• On the SRX5000 line of devices, J-Web might not be responsive sometimes when you commit
configuration changes after adding a new dynamic application while creating a new firewall rule. J-Web
displays a warning while validating the configuration due to dynamic application or any other configuration
changes. As a workaround, refresh the J-Web page. PR1460001
• Configuration of global settings options of IPsec VPN such as TCP encap profile, IPsec power mode and
IKE package installation are not supported from J-Web. PR1496439
• When the cli show security match-policy command is used with url-category as a match item and the
destination IP address cannot be divided by 3, an incorrect result may be returned. PR1483251
VPNs
• In the output of the show security ipsec inactive-tunnels command, Tunnel Down Reason is not displayed
as this functionality is not supported in Junos OS Release 18.2R2 and later. PR1383329
• On SRX5400, SRX5600, and SRX5800 devices with an SPC3 card, a new behavior has been introduced
that differs from the behavior on the older SPC2 card. The SRX Series device with AutoVPN configuration
can now accept multiple IPsec tunnels from a peer device (with the same source IP address and port
number) using different IKE IDs. PR1407356
• On the SRX5000 line of devices with an SPC3 card, sometimes IKE SA is not seen on the device when
the st0 binding on the VPN configuration object is changed from one interface to another (for example,
st0.x to st0.y). PR1441411
• Tunnel debugging configuration is not synchronized to the backup node. It needs to be configured again
after RG0 failover. PR1450393
• On the SRX5000 line of devices with SPC3 and SPC2 mixed mode, with a very large number of IKE peers
(60,000) with dead peer detection (DPD) enabled, IPsec tunnels might flap in some cases when IKE and
IPsec rekeys are happening at the same time. PR1473523
• Some TCP connections going through IPsec tunnels are getting stuck after RG1 failover. PR1477184
324
• During 10,000 tunnel ramp-up, sometimes, IKED generates a core file. PR1479548
• The SRX5000 line of devices with SPC3 was not supporting simultaneous IKE negotiation in Junos OS
Releases 19.2, 19.3, 19.4, and 20.1. PR1497297
SEE ALSO
Resolved Issues
Learn which issues were resolved in the Junos OS main and maintenance releases for SRX Series devices.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
Chassis Clustering
• Disabled node on SRX chassis cluster sends out ARP request packets. PR1548173
• Traffic loss might be seen when a big number of applications or addresses is referenced by one policy.
PR1576038
325
General Routing
• The TCP packet might be dropped if syn-proxy protection is enabled. PR1521325
• On SRX Series devices with chassis cluster, high CPU usage might be seen due to the llmd process.
PR1521794
• Certificate validation might fail when OCSP is used and the OCSP server is a dual-stack device. PR1525924
• On the SRX1500 device, the traffic rate shown in the CLI command is not accurate. PR1527511
• The MAC table is null in Layer 2 mode after one pass-through session is created successfully. PR1528286
• Junos OS: Memory leak when querying Aggregated Ethernet (AE) interface statistics (CVE-2021-0230).
PR1528605
• On SRX4100 and SRX4200 devices, four out of eight fans might not work. PR1534706
• Junos OS: SRX Series: An assertion failure in BIND can be used to trigger a Denial of Service (DoS)
(CVE-2020-8622). PR1537737
• The firewall filter SA and DA tags are not in the log messages as expected in port details. PR1539338
• Packet drop might be seen when a packet with destination port 0 is received on the SRX380 device.
PR1540414
• The JNH memory might leak on the Trio-based line cards. PR1542882
• Tail drops might occur on SRX Series devices if shaping-rate is configured on lt interface. PR1542931
• The nsd process might crash when DNS-based allowlisting is configured under SSL proxy. PR1542942
• The flowd process might generate core files when the user changes the flow mode configuration to
packet mode. PR1546653
• On SRX4100 and SRX4200, if PEM0 is removed, the output of jnxOperatingDescr.2 might be incomplete.
PR1547053
• Advanced anti-malware file or email statistics does not get incremented with the latest PB version.
PR1547094
• On vSRX2.0, vSRX3.0, SRX1500, SRX4100, SRX4200, SRX4600 running chassis cluster in Junos OS
Release 18.3 or later releases, multiple messages of "LCC: ch_cluster_lcc_set_context:564: failed to lock
chassis_vmx mutex 11" are generated in the chassisd log file. These messages may recur after every few
seconds and they do not have any impact on system operation. PR1547953
• Lcmd log "gw_cb_presence:136: PEM(slot = 0): error detecting presence ( fruid = 15, drv_id = 30, status
= -11 )" generates every second on the SRX4100 and SRX4200 devices. PR1550249
• The speed mismatch error is seen while trying to commit reth0 with gigether-options. PR1553888
326
• An IPFD core might be generated when using adaptive threat profiling. PR1554556
• When Junos OS software is upgraded to Junos OS Release 20.3, you might see the error "ERROR: Failed
to setup symlinks in alternate root". PR1548626
• The dumpdisklabel command fails with message "ERROR: Unknown platform srx550m". PR1557311
• Application identification unknown packet capture utility does not function on SRX Series devices when
the enhanced-services mode is enabled. PR1558812
• The pkid process runs at 100 percent when the device is unable to connect to a particular URL.
PR1560374
• Backup Routing Engine or backup node may stuck in bad status with improper "backup-router"
configuration. PR1530935
• IDP policy load might fail post image upgrade for Junos OS 15.1x49 releases. PR1546542
• The idpd process might stop and generates a core files. PR1547610
• The idpd process might stop when committing IDP configuration under logical systems and tenant
systems during RGs failover. PR1561298
• The flowd process might stop and generates a core files if Jflow V9 is configured. PR1567871
• Wi-Fi mPIM on SRX Series devices is reaching out to NTP and DNS servers. PR1569680
• Traffic going through the VRRP interface might be dropped when VRRP enabled IRB interface goes
down. PR1572920
J-Web
• The "+" button is not shown in the J-Web interface menu. PR1550755
• The commit might not fail as expected when the reth interface is deleted. PR1538273
327
• Traffic might be dropped unexpectedly when the url-category match condition is used on a security
policy. PR1546120
• Global policies working with multi-zones cause high PFE CPU utilization. PR1549366
• Policy configured with "route-active-on" condition may incorrectly work for local routes. PR1549592
• The junos-defaults construct within a unified-policies application match criteria now restricts the ports
and protocols of a flow on a per-dynamic-application basis. PR1551984
• On the SRX5000 line of devices, the secondary node might get stuck in performing ColdSync after a
reboot, upgrade, or if ISSU is performed. PR1558382
• The traffic might dropped due to inserting one global policy above others on SRX Series devices.
PR1558827
• UTM license expiry event loss may cause the device to not quit the advanced service mode and
maximum-sessions is decreased by half. PR1563874
VPNs
• IPsec SA is missing the keyword NULL after RG failover. PR1507270
• On all SRX Series devices using IPsec with NAT traversal, MTU size for the external interface might be
changed after IPsec SA is re-established. PR1530684
• The flowd process might stop during IPsec SA renegotiation on SRX5000 line of devices. PR1545916
• After the IPsec tunnel using policy-based VPN is overwritten by another VPN client, traffic using this
IPsec tunnel will be dropped. PR1546537
• Traffic going through policy-based IPsec tunnel might be dropped after RG0 failover. PR1550232
• A session might be closed when the session is created during the IPsec rekey. PR1564444
• When there are multiple IPsec SA, backup SA start IPsec rekey. PR1565132
• With the NCP remote access solution, in a PathFinder case (for example, where IPsec traffic has to be
encapsulated as TCP packets), TCP encapsulation for transit traffic is failing. PR1442145
• ECMP load balancing does not happen when RG1 node 0 is secondary. PR1475853
• On SRX4100 and SRX4200 devices with chassis cluster in transparent mode, when a failover occurs for
RG1, the interface on the new secondary node flaps as expected to let the switch update its MAC address
table. PR1490291
• Not able to clear the warm sessions on the peer SRX Series devices. PR1493174
• Outbound SSH connection flap or memory leak issue might be observed while pushing the configuration
to the ephemeral DB with a high rate. PR1497575
• The srxpfe or flowd process might stop due to memory corruption within JDPI. PR1500938
• The downloads might permanently get stuck or not complete when TCP proxy is used on SRX Series
devices. PR1502977
• Fabric interface might be monitored down after chassis cluster reboot. PR1503075
• SOF asymmetric scenario is not working with the phase 1 solution. PR1507865
• TAP mode behavior has been improved and the configuration has been greatly simplified. PR1521066
• In a dual CPE scenario, if the rule match is completed before application identification is done, AppQoE
moves the session to other node. PR1514973
• VRRP does not work on the redundant Ethernet interface with a VLAN ID greater than 1023. PR1515046
• PCAP file generated using packet capture was improper on the SRX5000 line of devices. PR1515691
• A logic issue was corrected in SSL proxy that could lead to an srxpfe or flowd core file under load.
PR1516903
• The PPPoE session does not come up after return to zero on SRX Series devices. PR1518709
• FQDN-based security log stream does not dynamically update the IP address. PR1520071
• Adaptive Threat Profiling would stop submitting new IP addresses to a feed after a limit of 10,000 has
been reached. PR1524284
329
• Adaptive Threat Profiling incorrectly classifies hosts when Server-to-Client (S2C) IDP signatures are
used. PR1533116
J-Web
• While creating a firewall policy rule, the list of available dynamic applications is empty in HA on the
Select Dynamic Application page. PR1490346
• The parameters show another LSYS at J-Web in a multiple LSYS scenario. PR1518675
• Junos OS upgrade may encounter failure in certain conditions when enabling ATP. PR1519222
• The show security dynamic-address feed-name command could not list secprofiling feed. PR1537714
VPNs
• On a SRX4200 device, 35 percent of drop is seen in all TPS cases. PR1481625
• On SRX Series devices with SPC3, when overlapping traffic-selectors are configured, multiple IPsec SAs
get negotiated with the peer device. PR1482446
330
• The flowd or srxpfe process might stop when an ALG creates a gate with an incorrect protocol value.
PR1474942
• SIP messages that need to be fragmented might be dropped by SIP ALG. PR1475031
• FTPS traffic might get dropped on SRX Series or MX Series devices if FTP ALG is used. PR1483834
• The trusted-ca and root-ca names or IDs should not be the same within an SSL proxy configuration.
PR1420859
• Introduction of default inspection limits for application identification to optimize CPU usage and improve
resistance to evasive applications. PR1454180
• TCP session might not time out properly upon receiving TCP RESET packet. PR1467654
• RPM test probe fails to show that round-trip time has been exceeded. PR1471606
• An unhealthy node might become primary in SRX4600 devices with chassis cluster scenario. PR1474233
• Packet drop might be observed on the SRX300 line of devices when adding or removing an interface
from MACsec. PR1474674
• Stateful firewall rule configuration deletion might lead to memory leak. PR1475220
• The flowd or srxpfe process might stop when deleting user firewall local authentication table entry.
PR1477627
• MPCs might stop when there is bulk route update failure in a corner case. PR1478392
• The nsd process pause might be seen during device reboots if dynamic application groups are configured
in policy. PR1478608
• The flowd process core files might be seen when there is mixed NAT-T traffic or non-NAT-T traffic with
PMI enabled. PR1478812
• When SRX5K-SPC3s or MX-SPC3s are installed in slots 0 or 1 in SRX5800 or MX960 devices, EMI
radiated emissions are observed to be higher than regulatory compliance requirements. PR1479001
331
• The show mape rule statistics command might display negative values. PR1479165
• The wl-interface stays in ready status after you execute request chassis fpc restart command in Layer
2 mode. PR1479396
• Recent changes to JDPI's classification mechanism caused a considerable performance regression (more
than 30 percent). PR1479684
• The flowd or srxpfe process might stop when advanced anti-malware service is used. PR1480005
• On Web proxy, memory leak in association hash table and DNS hash table. PR1480760
• The jsqlsyncd process synchronizes its databases every second even there is no change. PR1482428
• IMAP curl sessions get stuck in the active state if AAMW IMAP block mode is configured. PR1484692
• The show chassis temperature-thresholds command displays extensive FPC 0 output. PR1485224
• The configuration set chassis psu redundancy n-plus-n needs support on in high availability (HA) mode.
PR1486746
• Commit does not work after the installation through boot loader. PR1487831
• If a cluster ID of 16 or multiples of 16 is used, the chassis cluster might not come up. PR1487951
• CPU board inlet increases after OS upgrade from Junos OS Release 15.1X49 to Junos OS Release 18.x.
PR1488203
• All interfaces remain in the down status after the SRX300 line of devices power up or reboot. PR1488348
• There is a risk of service interruption on all SRX Series devices with a dual stacked CA server. PR1489249
• GRE or IPSec tunnel might not come up when set security flow no-local-favor-ecmp command is
configured. PR1489276
• Sometimes multiple flowd core files are generated on both nodes of chassis cluster at the same time
when changing media MTU. PR1489494
• Continuous drops seen in control traffic, with high data queues in one SPC2 PIC. PR1490216
• Phone client stop seen while doing SRX345 device ZTP with CSO. PR1496650
• Traffic interruption happens due to MAC address duplication between two devices running Junos OS.
PR1497956
• Don't use capital characters for source-identity when using show security match-policies command.
PR1499090
• J-Flow version 9 does not display correct outgoing interface for APBR traffic. PR1502432
332
• The cfmd core observed when LTM is triggered for the session configured on ethernet-switching interface
without bridge domain configuration. PR1503696
J-Web
• You cannot configure redundant PSU and power budget statistics on the SRX380 device that is in high
availability (HA) mode through J-Web. PR1493713
• The J-Web users might not be able to configure PPPoE using PPPoE wizard. PR1502657
• On SRX1500 and the SRX4000 line of devices, physically disconnecting the cable from fxp0 interface
causes hardware monitor failure and redundancy group failover, when the device is the primary node
in a chassis cluster. PR1467376
• The RGx might fail over after RG0 failover in a rare case. PR1479255
• The /usr/libexec/ui/yang-pkg and /usr/libexec/ui/pyang files not found in SRX Series devices during
YANG installation. PR1496577
333
• Support for dynamic tunnels on SRX Series devices was mistakenly removed. PR1476530
• TCP proxy was mistakenly engaged in unified policies when Web filtering was configured in potential
match policies. PR1492436
Routing Protocols
• The rpd might stop when both instance-import and instance-export policies contain as-path-prepend
action. PR1471968
VPNs
• IKE SA does not get cleared and is showing very long lifetime. PR1439338
• IKED is treating all re-transmission of first IKE_INIT request packets as new connections when acting
as responder. PR1460907
• The iked might crash when the IKE SA expires and the IPsec tunnel of expired IKE SAs still exists.
PR1463501
• The newly configured IPsec tunnels might be stuck in VPNM verify-path state in a tunnel scaled scenario.
PR1464353
• IPsec tunnels might flap when one secondary node is coming online after reboot in SRX Series high
availability environment. PR1471243
• The kmd process might crash continually after the chassis cluster failover in the IPsec ADVPN scenario.
PR1479738
• Some options under IKE and IPsec policy and proposal help text description should change to NOT
RECOMMENDED. PR1487515
• Use different XML tags for local and remote IKE ID to avoid confusion. PR1493368
• Issue with XML rpc show security ipsec tunnel-distribution summary output. PR1494274
SEE ALSO
334
Documentation Updates
There are no errata or changes in Junos OS Release 20.2R3 documentation for the SRX Series.
SEE ALSO
This section contains the procedure to upgrade Junos OS, and the upgrade and downgrade policies for
Junos OS. Upgrading or downgrading Junos OS can take several hours, depending on the size and
configuration of the network.
Upgrade and Downgrade Support Policy for Junos OS Releases and Extended End-Of-Life
Releases
Support for upgrades and downgrades that span more than three Junos OS releases at a time is not
provided, except for releases that are designated as Extended End-of-Life (EEOL) releases. EEOL releases
provide direct upgrade and downgrade paths. You can upgrade directly from one EEOL release to the next
EEOL release even though EEOL releases generally occur in increments beyond three releases.
335
You can upgrade or downgrade to the EEOL release that occurs directly before or after the currently
installed EEOL release, or to two EEOL releases before or after. For example, Junos OS Releases 19.2,
19.3, and 19.4 are EEOL releases. You can upgrade from Junos OS Release 19.2 to Release 19.3 or from
Junos OS Release 19.2 to Release 19.4.
You cannot upgrade directly from a non-EEOL release to a release that is more than three releases ahead
or behind. To upgrade or downgrade from a non-EEOL release to a release more than three releases before
or after, first upgrade to the next EEOL release and then upgrade or downgrade from that EEOL release
to your target release.
For more information about EEOL releases and to review a list of EEOL releases, see
https://www.juniper.net/support/eol/junos.html.
For information about software installation and upgrade, see the Installation and Upgrade Guide for Security
Devices.
For information about ISSU, see the Chassis Cluster User Guide for Security Devices.
SEE ALSO
IN THIS SECTION
Licensing | 338
These release notes accompany Junos OS Release 20.2R3 for vMX. They describe new and changed
features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
What’s New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for vMX.
What's Changed
IN THIS SECTION
Learn about what changed in the Junos OS main and maintenance releases for vMX.
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
There are no changes in behavior or syntax for vMX in Junos OS Release 20.2R2.
Known Limitations
There are no known behaviors and limitations for vMX in Junos OS Release 20.2R3.
338
Open Issues
Resolved Issues
Learn which issues were resolved in the Junos OS main and maintenance releases for vMX.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
Licensing
Starting in Junos OS Release 19.2R1, Juniper Agile Licensing introduces a new capability that significantly
improves the ease of license management network wide. The Juniper Agile License Manager is a software
application that runs on your network and provides an on-premise repository of licenses that are dynamically
consumed by Juniper Networks devices and applications as required. Integration with Juniper's Entitlement
Management System and Portal provides an intuitive extension of the existing user experience that enables
you to manage all your licenses.
• The Agile License Manager is a new option that provides more efficient management of licenses, but
you can continue to use individual license keys for each device if required.
• To use vMX or vBNG feature licenses in Junos OS Release 19.2R1 version, you need new license keys.
Previous license keys will continue to be supported for previous Junos OS releases, but for the Junos
OS 19.2R1 Release and later you need to carry out a one-time migration of existing licenses. Contact
Customer Care to exchange previous licenses. Note that you can choose to use individual license keys
for each device, or to deploy Agile License Manager for more efficient management of licenses.
339
• For more information about Agile Licensing keys and capabilities, see Juniper Agile Licensing portal FAQ.
See Juniper Agile Licensing Guide for more details on how to obtain, install, and use the License Manager.
Upgrade Instructions
You cannot upgrade Junos OS for the vMX router from earlier releases using the request system software
add command.
You must deploy a new vMX instance using the downloaded software package.
Remember to prepare for upgrades with new license keys and/or deploying Agile License Manager.
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for vRR. They describe new and changed
features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
340
What’s New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for vRR.
To learn about common BGP or routing Junos features supported on vRR for Junos OS 20.2R3, see What's
New for MX Series routers.
To learn about common BGP or routing Junos features supported on vRR for Junos OS 20.2R2, see What's
New for MX Series routers.
What's Changed
IN THIS SECTION
Learn about what changed in the Junos OS main and maintenance releases for vRR.
There are no changes in behavior or syntax for vRR in Junos OS Release 20.2R3.
341
To learn more about common BGP or routing changes in behavior or syntax in Junos OS 20.2R3, see
What's Changed for MX Series routers.
There are no changes in behavior or syntax for vRR in Junos OS Release 20.2R2.
To learn more about common BGP or routing changes in behavior or syntax in Junos OS 20.2R2, see
What's Changed for MX Series routers.
Known Limitations
To learn more about common BGP or routing known limitation in Junos OS 20.2R3, see Known Limitations
for MX Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
Open Issues
To learn more about common BGP or routing open issues in Junos OS 20.2R3, see Open Issues for MX
Series routers.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
Resolved Issues
Learn which issues were resolved in the Junos OS main and maintenance releases for vRR.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
342
To learn more about common BGP or routing resolved issues in Junos OS 20.2R3, see Resolved Issues for
MX Series routers.
CLI
• If output-queue-priority expedited update-tokens is configured, rpd might crash might upon BGP
flapping. PR1545837
• Six PE device prefixes might not be removed from RIB upon reception of withdrawal from a BGP neighbor
when the RIB sharding is enabled. PR1556271
IN THIS SECTION
These release notes accompany Junos OS Release 20.2R3 for vSRX. They describe new and changed
features, limitations, and known and resolved problems in the hardware and software.
You can also find these release notes on the Juniper Networks Junos OS Documentation webpage, located
at https://www.juniper.net/documentation/product/en_US/junos-os.
343
What’s New
IN THIS SECTION
Learn about new features introduced in the Junos OS main and maintenance releases for vSRX.
What's Changed
IN THIS SECTION
Learn about what changed in the Junos OS main and maintenance releases for vSRX.
344
When you refresh a script using the request system scripts refresh-from operational mode command,
include the cert-file option and specify the certificate path. Before you refresh a script using the set
refresh or set refresh-from configuration mode command, first configure the cert-file statement under
the hierarchy level where you configure the script. The certificate must be in Privacy-Enhanced Mail
(PEM) format.
If the vSRX is still operating, then delete the /var/log/waagent.log directly or run the clear log waagent.log
all command to clear the log file.
Or you can run the set groups azure-provision system syslog file waagent.log archive size 1m and set
groups azure-provision system syslog file waagent.log archive files 10 commands to prevent the growing
of the waagent logs. These configurations will cause the rotation of log of waagent with the size bigger
than 1MB and set a maximum of 10 backups.
• vSRX 3.0 instances with AWS Key Management Service (KMS)—On vSRX 3.0 instances with AWS Key
Management Service (KMS), if the MEK is changed, then the keypairs will be re-encrypted using the
newly set Master Encryption Key (MEK).
345
Known Limitations
IN THIS SECTION
J-Web | 345
Learn about known limitations in Junos OS Release 20.2R3 for vSRX Series. For the most complete and
latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report
Search application.
J-Web
• When a dynamic application is created for an edited policy rule, the list of services is blank when the
Services tab is clicked and then the policy grid is autorefreshed. As a workaround, create a dynamic
application as the last action while modifying the policy rule and click the Save button to avoid loss of
configuration changes made to the policy rule. PR1460214
• For a spoke device in a hub-and-spoke topology, J-Web shows the VPN topology as Site to Site.
PR1495973
Open Issues
IN THIS SECTION
J-Web | 346
Learn about open issues in Junos OS Release 20.2R3 for vSRX Series. For the most complete and latest
information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search
application.
346
• IDP database file format or convention has changed in Junos OS Release 15.1X49 and later releases.
So, if the IDP configuration contains some predefined attacks or attack-groups related configurations,
then the system will go to amnesiac mode after upgrade. This is due to the failure in IDP configuration
commit. PR1455125
J-Web
• Configuration of global settings options of IPsec VPN such as TCP encap profile, IPsec power mode, and
IKE package installation are not supported from J-Web. PR1496439
• On vSRX 3.0 on Azure, with Microsoft Azure Hardware Security Module (HSM) enabled, keypair
generation fails if the user reuses the certificate ID for creating a new keypair, even if the previous
keypair has been deleted. PR1490558
• When using Juniper vSRX deployment script deploy-azure-vsrx.sh to create new vSRX instance, if the
same user was defined in both parameter.json file and YAML file (using write_files module), both passwords
will be configured in different configuration groups in the running configuration of vSRX. The password
defined in the YAML file will be considered. PR1491074
• vSRX instances starts to support using cloud feed as source address or destination address in the security
policy. Due to the dynamic nature of cloud provisioning, we use warning instead of error when the
policy's source address or destination address is not found. PR1521739
Resolved Issues
Learn which issues were resolved in the Junos OS main and maintenance releases for vSRX.
For the most complete and latest information about known Junos OS defects, use the Juniper Networks
online Junos Problem Report Search application.
347
• The control link might be broken when there is excessive traffic load on the control link in vSRX cluster
deployment. PR1524243
• The master-password configuration is rejected if master encryption password is not set. PR1537251
• The srxpfe process might crash when Application Identification Packet-Capture functionality is enabled.
PR1538991
• Configuration integrity mismatch is observed error in vSRX3.0 running on Azure with key-vault integrated.
PR1551419
• High CPU usage on pkid process might be seen when the device is unable to connect to a particular CRL
URL. PR1560374
J-Web
• While creating a firewall policy rule, the list of available dynamic applications is empty in HA on the
Select Dynamic Application page. PR1490346
• Changes to the configuration command for assigning more vCPUs to the Routing Engine. PR1505724
• In vSRX3.0 on Azure with keyvault enabled, change in MEK results in deletion of certificates. PR1513456
348
• With CSO SD-WAN configuration loaded, flowd process generates core files while deleting the GRE
IPsec configuration. PR1513461
• The flowd or srxpfe process might crash when SSL proxy and AppSecure process traffic simultaneously.
PR1516969
• Junos OS upgrade may encounter failure in certain conditions when enabling ATP. PR1519222
VPNs
• On vSRX3.0 instances, when ECMP routes are configured to load balance over multiple IPSec VPNs
connected to a single multipoint tunnel interface, the traffic may not flow. PR1438311
IN THIS SECTION
This section contains information about how to upgrade Junos OS for vSRX using the CLI. Upgrading or
downgrading Junos OS can take several hours, depending on the size and configuration of the network.
You also can upgrade to Junos OS Release 20.2R3 for vSRX using J-Web (see J-Web) or the Junos Space
Network Management Platform (see Junos Space).
Direct upgrade of vSRX from Junos OS 15.1X49 Releases to Junos OS Releases 17.4, 18.1, 18.2, 18.3,
18.4, 19.1, or 19.2 is supported.
• Direct upgrade of vSRX from Junos OS 15.1X49 Releases to Junos OS Release 19.3 and higher is not
supported. For upgrade between other combinations of Junos OS Releases in vSRX and vSRX 3.0, the
general Junos OS upgrade policy applies.
• The file system mounted on /var usage must be below 14% of capacity.
349
Using the request system storage cleanup command might help reach that percentage.
• The Junos OS upgrade image must be placed in the directory /var/host-mnt/var/tmp/. Use the request
system software add /var/host-mnt/var/tmp/<upgrade_image>
• We recommend that you deploy a new vSRX virtual machine (VM) instead of performing a Junos OS
upgrade. That also gives you the option to move from vSRX to the newer and more recommended vSRX
3.0.
• Ensure to back up valuable items such as configurations, license-keys, certificates, and other files that
you would like to keep.
NOTE: For ESXi deployments, the firmware upgrade from Junos OS Release 15.1X49-Dxx to
Junos OS releases 17.x, 18.x, or 19.x is not recommended if there are more than three network
adapters on the 15.1X49-Dxx vSRX instance. If there are more than three network adapters and
you want to upgrade, then we recommend that you either delete all the additional network
adapters and add the network adapters after the upgrade or deploy a new vSRX instance on the
targeted OS version.
1. Download the Junos OS Release 20.2R3 for vSRX .tgz file from the Juniper Networks website. Note
the size of the software image.
2. Verify that you have enough free disk space on the vSRX instance to upload the new software image.
NOTE: If this command does not free up enough disk space, see [SRX] Common and safe
files to remove in order to increase available system storage for details on safe files you can
manually remove from vSRX to free up disk space.
4. Use FTP, SCP, or a similar utility to upload the Junos OS Release 20.2R3 for vSRX .tgz file to
/var/crash/corefiles/ on the local file system of your vSRX VM. For example:
./upgrade_platform
./HOST_COMPAT_VERSION
./version.txt
./initrd.cpio.gz
./linux.checksum
./host-version
bzImage-intel-x86-64.bin: OK
initramfs.cpio.gz: OK
version.txt: OK
upgrade_platform: Checksum verified and OK...
upgrade_platform: Staging of
/var/tmp/junos-srx-mr-vsrx-20.2R3-2021-02-02.0_RELEASE_20.2R3_THROTTLE-linux.tgz
completed
upgrade_platform: System need *REBOOT* to complete the upgrade
upgrade_platform: Run upgrade_platform with option -r | --rollback to rollback
the upgrade
Host OS upgrade staged. Reboot the system to complete installation!
WARNING: A REBOOT IS REQUIRED TO LOAD THIS SOFTWARE CORRECTLY. Use the
WARNING: 'request system reboot' command when software installation is
WARNING: complete. To abort the installation, do not reboot your system,
WARNING: instead use the 'request system software rollback'
WARNING: command as soon as this operation completes.
NOTICE: 'pending' set will be activated at next reboot...
Rebooting. Please wait ...
shutdown: [pid 13050]
Shutdown NOW!
*** FINAL System shutdown message from root@ ***
System going down IMMEDIATELY
Shutdown NOW!
System shutdown time has arrived\x07\x07
If no errors occur, Junos OS reboots automatically to complete the upgrade process. You have
successfully upgraded to Junos OS Release 20.2R3 for vSRX.
NOTE: Starting in Junos OS Release 17.4R1, upon completion of the vSRX image upgrade,
the original image is removed by default as part of the upgrade process.
6. Log in and use the show version command to verify the upgrade.
If you have downloaded a vSRX .ova image and need to validate it, see Validating the vSRX .ova File for
VMware.
Note that only .ova (VMware platform) vSRX images can be validated. The .qcow2 vSRX images for use
with KVM cannot be validated the same way. File checksums for all software images are, however, available
on the download page.
In-service software upgrade (ISSU) enables you to upgrade between two different
Junos OS releases with no disruption on the control plane and with minimal disruption of traffic.
For additional information about using ISSU on routing and switching devices, see the High Availability
User Guide.
For additional information about using ISSU on security devices, see the Chassis Cluster User Guide for
SRX Series Devices.
For information about ISSU support across platforms and Junos OS releases, see the In-Service Software
Upgrade (ISSU) Web application.
Licensing
Starting in 2020, Juniper Networks introduced a new software licensing model. The Juniper Flex Program
comprises a framework, a set of policies, and various tools that help unify and thereby simplify the multiple
product-driven licensing and packaging approaches that we’ve developed at Juniper Networks over the
past several years.
• A focus on customer segments (enterprise, service provider, and cloud) and use cases for Juniper Networks
hardware and software products.
• The introduction of a common three-tiered model (standard, advanced, and premium) for all Juniper
Networks software products.
• The introduction of subscription licenses and subscription portability for all Juniper Networks products,
including Junos OS and Contrail.
356
For information about the list of supported products, see Juniper Flex Program.
Compliance Advisor
For regulatory compliance information about Common Criteria, FIPS, Homologation, RoHS2, and USGv6
for Juniper Networks products, see the Juniper Networks Compliance Advisor.
• Feature Explorer—Juniper Networks Feature Explorer helps you in exploring software feature information
to find the right software release and product for your network. https://apps.juniper.net/feature-explorer/
• PR Search Tool—Keep track of the latest and additional information about Junos OS open defects and
issues resolved. prsearch.juniper.net.
• Hardware Compatibility Tool—Determine optical interfaces and transceivers supported across all
platforms. apps.juniper.net/hct/home
NOTE: To obtain information about the components that are supported on the devices, and
the special compatibility guidelines with the release, see the Hardware Guide for the product.
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can improve the
documentation. You can provide feedback by using either of the following methods:
• Online feedback system—Click TechLibrary Feedback, on the lower right of any page on the Juniper
Networks TechLibrary site, and do one of the following:
357
• Click the thumbs-up icon if the information on the page was helpful to you.
• Click the thumbs-down icon if the information on the page was not helpful to you or if you have
suggestions for improvement, and use the pop-up form to provide feedback.
Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC).
If you are a customer with an active Juniper Care or Partner Support Services support contract, or are
covered under warranty, and need post-sales technical support, you can access our tools and resources
online or open a case with JTAC.
• JTAC policies—For a complete understanding of our JTAC procedures and policies, review the JTAC User
Guide located at https://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day, 7 days a week,
365 days a year.
For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called
the Customer Support Center (CSC) that provides you with the following features:
• Find solutions and answer questions using our Knowledge Base: https://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool:
https://entitlementsearch.juniper.net/entitlementsearch/
359
You can create a service request with JTAC on the Web or by telephone.
• Visit https://myjuniper.juniper.net.
Revision History
29 July 2022—Revision 9, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos Fusion
Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series, vMX,
vRR, and vSRX.
24 March 2022—Revision 7, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
16 December 2021—Revision 6, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
7 October 2021—Revision 5, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
2 September 2021—Revision 4, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
15 July 2021—Revision 3, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos Fusion
Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series, vMX,
vRR, and vSRX.
22 April 2021—Revision 2, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
1 April 2021—Revision 1, Junos OS Release 20.2R3– ACX Series, cSRX, EX Series, JRR Series, Junos Fusion
Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series, vMX,
vRR, and vSRX.
360
13 January 2021—Revision 3, Junos OS Release 20.2R2– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
10 December 2020—Revision 2, Junos OS Release 20.2R2– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
9 November 2020—Revision 1, Junos OS Release 20.2R2– ACX Series, cSRX, EX Series, JRR Series, Junos
Fusion Enterprise, Junos Fusion Provider Edge, MX Series, NFX Series, PTX Series, QFX Series, SRX Series,
vMX, vRR, and vSRX.
8 October 2020—Revision 7, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series,
PTX Series, QFX Series, SRX Series, and Junos Fusion.
10 September 2020—Revision 6, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series,
PTX Series, QFX Series, SRX Series, and Junos Fusion.
3 September 2020—Revision 5, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series,
PTX Series, QFX Series, SRX Series, and Junos Fusion.
13 August 2020—Revision 1, Junos OS Release 20.2R1-S1– EX Series, MX Series, and QFX Series.
30 July 2020—Revision 4, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series, PTX
Series, QFX Series, SRX Series, and Junos Fusion.
15 July 2020—Revision 3, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series, PTX
Series, QFX Series, SRX Series, and Junos Fusion.
9 July 2020—Revision 2, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series, PTX
Series, QFX Series, SRX Series, and Junos Fusion.
30 June 2020—Revision 1, Junos OS Release 20.2R1– ACX Series, EX Series, MX Series, NFX Series, PTX
Series, QFX Series, SRX Series, and Junos Fusion.