Routing

 View Only
last person joined: 4 days ago 

Ask questions and share experiences about ACX Series, CTP Series, MX Series, PTX Series, SSR Series, JRR Series, and all things routing, including portfolios and protocols.
  • 1.  MS-MIC-16G stop forwarding traffic

    Posted 11-16-2014 05:30

    Hello,

     

    Have a problem with MX80 and MS-MIC-16G. Sometimes service card stop forwarding traffic.

     

    When this happens ms-0/2/0 is DOWN.

    Nov 16 14:06:24   mib2d[1488]: SNMP_TRAP_LINK_DOWN: ifIndex 601, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.0
    Nov 16 14:06:24   mib2d[1488]: SNMP_TRAP_LINK_DOWN: ifIndex 603, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.100
    Nov 16 14:06:24   mib2d[1488]: SNMP_TRAP_LINK_DOWN: ifIndex 602, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.200

     

    In the logs:

    Nov 16 14:06:22   mspd[1586]: Removed PIC connection state for fpc=0 pic=2 session=0x1890100
    Nov 16 14:06:22   datapath-traced[1589]: datapath_traced_connection_event_handler: Disconnected from MSPMAND
    Nov 16 14:06:22   (FPC Slot 0, PIC Slot 2)  ms02 kernel: 000000319e320, sig=11)
    Nov 16 14:06:22   (FPC Slot 0, PIC Slot 2)  ms02 mspsmd[176]: mspsmd_connection_shutdown: Unexpected shutdown of connection, try reconnecting.

     Similar to that card restarts.

     

    It appeared in 14.2R1.9 Junos. 

    Maybe someone has seen a similar problem?


    #MS-MIC
    #mx
    #NAT


  • 2.  RE: MS-MIC-16G stop forwarding traffic

    Posted 11-17-2014 23:35

    Hi there,

     

    we are experiencing same issue. Hardware is MX80 and MS-MIC-16G. JUN-OS is 13.2. We are facing this issue on couple of devices, not just one.

     

    Are You using IPSEC on MS-MIC and if You do so what kind (Routed or/and Proxy-ID based)?

     

    BR

     

    Stoyan



  • 3.  RE: MS-MIC-16G stop forwarding traffic

    Posted 01-18-2015 12:55

     

    The problem was with the new software version...

    14.1R2.12 stable on.

     

    On MS-MIC running NAT.



  • 4.  RE: MS-MIC-16G stop forwarding traffic

    Posted 02-16-2015 01:33

    Hi,

     

    we had similar issue, after upgrading to 14.1R4. 14.1R2 seemed to be okay.

     

    We were using the MIC only for statefull-firewall with the most primitive rule-set (acceptAll), just for testing purposes.

     

    Feb 16 08:24:56  gateout tfeb0 Prolonged flow-control asserted by MAC on ms-0/2
    Feb 16 08:24:57  gateout datapath-traced[1506]: datapath_traced_connection_event_handler: Disconnected from MSPMAND
    Feb 16 08:26:29  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 08:26:40  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered orange memory zone
    Feb 16 08:26:48  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 08:26:49  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 08:26:49  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 08:26:50  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 08:26:50  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 08:26:52  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Unexpected shutdown of connection to datapath-traced, trying to reconnect
    Feb 16 08:26:54  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: CPU zone change GREEN=>RED (99.02 %)
    Feb 16 08:26:54  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: CPU utilization (99.02 percent) exceeded threshold
    Feb 16 08:26:54  gateout /kernel: Generating Health status msg for ifd : ms-0/2/0: 0
    Feb 16 08:26:54  gateout /kernel: Generating Health status msg for ifd : mams-0/2/0: 0
    Feb 16 08:26:55  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 08:26:55  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 08:26:55  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: CPU zone change RED=>GREEN (41.62 %)
    Feb 16 08:26:55  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: CPU utilization (41.62 percent) ok

     

    After I change bootp reply helper, committed config, the MS MIC crashed again:

    Feb 16 09:45:22  gateout mgd[1699]: UI_COMMIT_COMPLETED: commit complete
    Feb 16 09:45:23  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 09:45:23  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 09:45:24  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 09:45:24  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 09:45:32  gateout datapath-traced[1506]: datapath_traced_connection_event_handler: Disconnected from MSPMAND
    Feb 16 09:45:49  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 09:46:14  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered orange memory zone
    Feb 16 09:46:32  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: pconn_server_send_ipc: failed to send message - type 23,subtype 111
    Feb 16 09:46:32  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: msp_cmd_send_reply: Failed to write end of reply
    Feb 16 09:46:32  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: mspman_cmd_send_bulk_reply_callback: failed to send flow reply
    Feb 16 09:46:32  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: pconn_server_send_ipc: failed to send message - type 23,subtype 0
    Feb 16 09:46:32  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: msp_cmd_send_reply: Failed to write end of reply
    Feb 16 09:46:33  gateout mgd[4559]: UI_CHILD_SIGNALED: Child received signal: PID 4720, signal Terminated: 15, command='/usr/sbin/spinfo'
    Feb 16 09:47:12  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 09:47:13  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 09:47:13  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 09:47:14  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered yellow memory zone
    Feb 16 09:47:14  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Entered green memory zone
    Feb 16 09:47:16  gateout (FPC Slot 0, PIC Slot 2)  ms02 mspmand[169]: Unexpected shutdown of connection to datapath-traced, trying to reconnect
    Feb 16 09:47:18  gateout /kernel: Generating Health status msg for ifd : ms-0/2/0: 0
    Feb 16 09:47:18  gateout /kernel: Generating Health status msg for ifd : mams-0/2/0: 0
    Feb 16 09:47:20  gateout tfeb0 Prolonged flow-control asserted by MAC on ms-0/2, bringing interface down
    Feb 16 09:47:20  gateout tfeb0 ms-0/2: MAC stuck, trigger reset
    Feb 16 09:47:21  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 23, ifAdminStatus up(1), ifOperStatus down(2), ifName em1
    Feb 16 09:47:21  gateout /kernel: Generating Health status msg for ifd : ms-0/2/0: 0
    Feb 16 09:47:21  gateout /kernel: Generating Health status msg for ifd : mams-0/2/0: 0
    Feb 16 09:47:21  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 601, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0
    Feb 16 09:47:21  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 604, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.0
    Feb 16 09:47:21  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 603, ifAdminStatus up(1), ifOperStatus down(2), ifName mams-0/2/0
    Feb 16 09:47:21  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 602, ifAdminStatus up(1), ifOperStatus down(2), ifName pc-0/2/0
    Feb 16 09:47:21  gateout /kernel: if_pfe_ams_process_event: Agg Ifd doesn't exist for member (mams-0/2/0)
    Feb 16 09:47:21  gateout /kernel: pfe_listener_disconnect: conn dropped: listener idx=1, tnpaddr=0x80000310, reason: socket error
    Feb 16 09:47:28  gateout /kernel: IF_MSG_IFD_BULK_MUP_DOWN: IFD[0] idx 53276 is NULL; peer type 17 index 0 ignored
    Feb 16 09:47:28  gateout /kernel: IF_MSG_IFD_BULK_MUP_DOWN: IFD[1] idx 53277 is NULL; peer type 17 index 0 ignored
    Feb 16 09:47:28  gateout tfeb0 cmtfpc_mic_int_enable_set: NULL irq handle installed for irq 0x22
    Feb 16 09:47:33  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 601, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0
    Feb 16 09:47:33  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 603, ifAdminStatus up(1), ifOperStatus down(2), ifName mams-0/2/0
    Feb 16 09:47:47  gateout tnp.bootpd[4722]: find_pic for I2CID 0xa56 fpc-slot 0 pic-slot 2yielded bootstr boot 1
    Feb 16 09:47:47  gateout tnp.bootpd[4722]: find_pic for I2CID 0xa56 fpc-slot 0 pic-slot 2 yielded bootstr ejunos-xlp64.elf
    Feb 16 09:47:47  gateout tnp.bootpd[4722]: main for ID 0xa56 yielded bootcmd boot 1 boot file /usr/share/pfe/ejunos-xlp64.elf
    Feb 16 09:48:04  gateout dcd[4738]: parse_mix_rate_parent_ae : ifd ae0 no configured link-speed
    Feb 16 09:48:04  gateout dcd[4738]: parse_mix_rate_parent_ae : ifd ae1 no configured link-speed
    Feb 16 09:48:05  gateout dcd[4738]: parse_mix_rate_parent_ae : ifd ae2 no configured link-speed
    Feb 16 09:48:05  gateout dcd[4738]: parse_mix_rate_parent_ae : ifd ae3 no configured link-speed
    Feb 16 09:48:06  gateout ffp[4752]: "dynamic-profiles": No change to profiles
    Feb 16 09:48:13  gateout tfeb0 jnh_fib_loc_iif_lkup_tbl_delete_pfe(2683): jnh_fib_loc_iif_lkup_tbl_delete_pfe: fib_loc_iif_lkup_tbl is NULL !
    Feb 16 09:48:13  gateout tfeb0 jnh_fib_loc_iif_lkup_tbl_delete_pfe(2683): jnh_fib_loc_iif_lkup_tbl_delete_pfe: fib_loc_iif_lkup_tbl is NULL !
    Feb 16 09:48:13  gateout dcd[1519]: parse_mix_rate_parent_ae : ifd ae0 no configured link-speed
    Feb 16 09:48:13  gateout dcd[1519]: parse_mix_rate_parent_ae : ifd ae1 no configured link-speed
    Feb 16 09:48:13  gateout dcd[1519]: parse_mix_rate_parent_ae : ifd ae2 no configured link-speed
    Feb 16 09:48:13  gateout dcd[1519]: parse_mix_rate_parent_ae : ifd ae3 no configured link-speed
    Feb 16 09:48:13  gateout mgd[1699]: UI_COMMIT_COMPLETED: commit complete
    Feb 16 09:48:46  gateout mib2d[1479]: SNMP_TRAP_LINK_DOWN: ifIndex 23, ifAdminStatus up(1), ifOperStatus down(2), ifName em1
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: KDB: debugger backends: ddb
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: KDB: current backend: ddb
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: Global Paddr: 0xa0000000
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: ObjC: Sz - 0x300000000, VA - 0xcc0000000, PA - 0x100000000
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: Copyright (c) 1996-2015, Juniper Networks, Inc.
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: All rights reserved.
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: Copyright (c) 1992-2007 The FreeBSD Project.
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: The Regents of the University of California. All rights reserved.
    Feb 16 09:49:17  gateout (FPC Slot 0, PIC Slot 2)  ms02 kernel: FreeBSD is a registered trademark of

     

    ...

     

    etc. As I wrote, the 14.1R2 looked to be more stable.

     

    Best regards Jiri

     



  • 5.  RE: MS-MIC-16G stop forwarding traffic

    Posted 03-30-2015 06:30

    Hello,

    We have the same problem and I noticed that problem occurs after these messages:

     

    Mar 29 16:49:37  MX80 tfeb0 Transient flow-control asserted by MAC on ms-0/2 for 1 seconds
    Mar 29 16:49:38  MX80 tfeb0 Transient flow-control asserted by MAC on ms-0/2 for 2 seconds
    Mar 29 16:49:39  MX80 tfeb0 Prolonged flow-control asserted by MAC on ms-0/2
    Mar 29 16:50:57  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 83
    Mar 29 16:53:47  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 84
    Mar 29 16:54:49  MX80 tfeb0 MAC flow-control cleared on ms-0/2
    Mar 29 16:55:20  MX80 /kernel: peer_input_pending_internal:[4493] VKS0 for peer type 22 indx 2 reported a so_error 60
    Mar 29 16:55:20  MX80 /kernel: peer_inputs:4760 VKS0 closing connection peer type 22 indx 2 err 5
    Mar 29 16:55:20  MX80 /kernel: pfe_send_failed(index 2, type 22), err=32
    Mar 29 16:55:20  MX80 /kernel: pfe_listener_disconnect: conn dropped: listener idx=1, tnpaddr=0x80000310, reason: generic peer error
    Mar 29 16:56:47  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 85
    Mar 29 16:58:18  MX80 authd[1532]: sdb_update_client_session_internal: Failed to update client data in client sid:333019, err=database dead locked or timeout, caller may retry
    Mar 29 16:58:18  MX80 authd[1532]: sdb_update_client_session_internal: Failed to read client sid:333019, err=database dead locked or timeout, caller may retry
    Mar 29 16:58:21  MX80 jddosd[1539]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 129 times, started at 2015-03-29 16:58:21 EEST
    Mar 29 16:58:27  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 86
    Mar 29 17:00:02  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 87
    Mar 29 17:01:57  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 88
    Mar 29 17:03:26  MX80 last message repeated 7 times
    Mar 29 17:03:26  MX80 tfeb0 MAC flow-control cleared on ms-0/2
    Mar 29 17:03:52  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 89
    Mar 29 17:04:48  MX80 jddosd[1539]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 129 times, from 2015-03-29 16:58:21 EEST to 2015-03-29 16:59:47 EEST
    Mar 29 17:05:42  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 90
    Mar 29 17:07:47  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 91
    Mar 29 17:09:47  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 92
    Mar 29 17:11:31  MX80 (FPC Slot 0, PIC Slot 2)  ms02 xntpd[173]: NTP Server Unreachable
    Mar 29 17:11:57  MX80 /kernel: Percentage memory available(19)less than threshold(20 %)- 93
    Mar 29 17:12:00  MX80 tfeb0 MAC flow-control cleared on ms-0/2
     
    and today:
     
    Mar 30 14:36:50 MX80 (FPC Slot 0, PIC Slot 2) ms02 last message repeated 8 times
    Mar 30 14:36:50 MX80 tfeb0 MAC flow-control cleared on ms-0/2
    Mar 30 14:36:52 MX80 tfeb0 Transient flow-control asserted by MAC on ms-0/2 for 1 seconds
    Mar 30 14:36:52 MX80 tfeb0 Transient flow-control asserted by MAC on ms-0/2 for 2 seconds
    Mar 30 14:36:53 MX80 tfeb0 Prolonged flow-control asserted by MAC on ms-0/2
     
    Junos 14.2R2.8
    Does not depend on connection type (DHCP/PPPoE)
    Similar that is software bug


  • 6.  RE: MS-MIC-16G stop forwarding traffic

    Posted 05-21-2015 11:51

    I am having this same problem on MX80 and 960s. What was the resolution?



  • 7.  RE: MS-MIC-16G stop forwarding traffic

    Posted 08-20-2015 01:52

    Hello.

     

    Why can appear such messages:

     

    Aug 18 14:21:59   tfeb0 jnh_fib_loc_iif_lkup_tbl_add_pfe(2645): jnh_fib_loc_iif_lkup_tbl_add_pfe: fib_loc_iif_lkup_tbl is NULL !
    Aug 18 14:26:12   last message repeated 2 times
    Aug 18 14:26:31   tfeb0 jnh_fib_loc_iif_lkup_tbl_delete_pfe(2773): jnh_fib_loc_iif_lkup_tbl_delete_pfe: fib_loc_iif_lkup_tbl is NULL !
    Aug 18 14:27:47   tfeb0 jnh_fib_loc_iif_lkup_tbl_delete_pfe(2773): jnh_fib_loc_iif_lkup_tbl_delete_pfe: fib_loc_iif_lkup_tbl is NULL !
    Aug 18 14:30:50   tfeb0 jnh_fib_loc_iif_lkup_tbl_add_pfe(2645): jnh_fib_loc_iif_lkup_tbl_add_pfe: fib_loc_iif_lkup_tbl is NULL !
    Aug 18 14:31:31   tfeb0 jnh_fib_loc_iif_lkup_tbl_delete_pfe(2773): jnh_fib_loc_iif_lkup_tbl_delete_pfe: fib_loc_iif_lkup_tbl is NULL !
    Aug 18 14:33:08   tfeb0 jnh_fib_loc_iif_lkup_tbl_add_pfe(2645): jnh_fib_loc_iif_lkup_tbl_add_pfe: fib_loc_iif_lkup_tbl is NULL !
    Aug 18 14:35:09   pfed: downward spike received from pfe for ibytes_reply:96948224 ibytes_record:97028690 for ifl:407 loc_id:000100000002
    Aug 18 14:36:20   tfeb0 jnh_fib_loc_iif_lkup_tbl_delete_pfe(2773): jnh_fib_loc_iif_lkup_tbl_delete_pfe: fib_loc_iif_lkup_tbl is NULL !


  • 8.  RE: MS-MIC-16G stop forwarding traffic

    Posted 10-04-2015 10:23

    About log messages: These are informational messages only, "-7" simply means that stats entry for the subscirbers on log out has been removed from stats data base successfully and there is no more such entry to be found.  Every successful delete may return the "-7" status eventually.



  • 9.  RE: MS-MIC-16G stop forwarding traffic

    Posted 12-28-2015 05:33

    Model: mx80-t
    Junos: 14.2R4.9

     

    Problem is actual. In the most recent versions of software card from time to time reboots...

     

    Who uses the card to the other versions of the software? What situation you?

     

    LOG:

    Dec 26 18:56:11 jun-router.tks.local jun-router.tks.local /kernel: peer_input_pending_internal:[4506] VKS0 for peer type 22 indx 2 reported a sb_state 32 = SBS_CANTRCVMORE
    Dec 26 18:56:11 jun-router.tks.local jun-router.tks.local /kernel: peer_inputs:4766 VKS0 closing connection peer type 22 indx 2 err 5
    Dec 26 18:56:11 jun-router.tks.local jun-router.tks.local /kernel: pfe_listener_disconnect: conn dropped: listener idx=1, tnpaddr=0x80000310, reason: generic peer error
    Dec 26 18:56:11 jun-router.tks.local jun-router.tks.local datapath-traced[1671]: datapath_traced_connection_event_handler: Disconnected from MSPMAND
    Dec 26 18:56:11 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: svcs_ms2_app_sigcore_exit: sending UKERN_ST_DOWN (pid=188, td=0xc000000003169640, sig=5)
    Dec 26 18:56:11 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspsmd[176]: mspsmd_connection_shutdown: Unexpected shutdown of connection, try reconnecting.
    Dec 26 18:56:12 jun-router.tks.local jun-router.tks.local /kernel: Generating Health status msg for ifd : ms-0/2/0: 0
    Dec 26 18:56:12 jun-router.tks.local jun-router.tks.local /kernel: Generating Health status msg for ifd : mams-0/2/0: 0
    Dec 26 18:56:13 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 721, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.0
    Dec 26 18:56:13 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 722, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.100
    Dec 26 18:56:13 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 723, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0.200
    Dec 26 18:56:14 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol Reject:aggregate is violated at fpc 0 for 4 times, started at 2015-12-26 18:56:13 EET
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (4) cpuid(4)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr4" (pid 69440) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (5) cpuid(5)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr5" (pid 69441) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (6) cpuid(6)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr6" (pid 69442) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (7) cpuid(7)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr7" (pid 69443) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (9) cpuid(9)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr9" (pid 69445) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (8) cpuid(8)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr8" (pid 69444) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (10) cpuid(10)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr10" (pid 69446) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (11) cpuid(11)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr11" (pid 69447) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (12) cpuid(12)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr12" (pid 69448) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (16) cpuid(16)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr16" (pid 69452) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (15) cpuid(15)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr15" (pid 69451) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (14) cpuid(14)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]139 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr14" (pid 69450) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (13) cpuid(13)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr13" (pid 69449) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (17) cpuid(17)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr17" (pid 69453) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (18) cpuid(18)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr18" (pid 69454) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (19) cpuid(19)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr19" (pid 69455) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (22) cpuid(22)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr22" (pid 69458) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (21) cpuid(21)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr21" (pid 69457) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (20) cpuid(20)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr20" (pid 69456) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (23) cpuid(23)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr23" (pid 69459) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (24) cpuid(24)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr24" (pid 69460) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (25) cpuid(25)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr25" (pid 69461) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (26) cpuid(26)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr26" (pid 69462) exited prematurely.
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (27) cpuid(27)
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [ms
    Dec 26 18:56:17 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: gring_drain_process]138 msges 
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: drained
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr27" (pid 69463) exited prematurely.
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (31) cpuid(31)
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr31" (pid 69467) exited prematurely.
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (30) cpuid(30)
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msgring_drain_process]138 msges drained
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr30" (pid 69466) exited prematurely.
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: msgring_drain_process: bind thread to hwtid (29) cpuid(29)
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [mmsgring_drain_process]138 msges drained
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr29" (pid 69465) exited prematurely.
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: sgring_drain_process: bind thread to hwtid (28) cpuid(28)
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: [msg
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: cpuid = 26
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: isu error 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: lsu error 0x0, 0x76c65103c4
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: l2 err 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: l3 err 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: addr err 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: tag ecc addr err 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: timeout err 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: cop0 regs st 0x50809ce1, ca 0x8, bv 0xc0000000023ed064, epc 0xffffffff80575a9c
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: ecc regs 0x0, 0x0, 0x0, 0x0
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: ring_drain_process]138 msges drained
    Dec 26 18:56:18 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "msgdrainthr28" (pid 69464) exited prematurely.
    Dec 26 18:56:23 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 msppmond[172]: msppmond : process mspmand, pid 188, thread id 0 missed heartbeat (action logging)
    Dec 26 18:58:00 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 336578 too big.. Flushing SHM to DB
    Dec 26 18:58:04 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xx.2 to 193.xx.85 (359)
    Dec 26 18:58:06 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xx.2 to 193.xx.85 (359)
    Dec 26 18:58:26 jun-router.tks.local jun-router.tks.local last message repeated 10 times
    Dec 26 19:01:02 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: mspmand (PID 175) exited with status=133 
    Dec 26 19:01:02 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: mspmand (PID 69674) started
    Dec 26 19:01:03 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[69678]: Restart of MSPMAND is not supported. Rebooting
    Dec 26 19:01:04 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Waiting (max 60 seconds) for system process `vnlru_mem' to stop...done
    Dec 26 19:01:04 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Waiting (max 60 seconds) for system process `vnlru' to stop...done
    Dec 26 19:01:04 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Waiting (max 60 seconds) for system process `bufdaemon' to stop...
    Dec 26 19:01:04 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: done
    Dec 26 19:01:04 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Waiting (max 60 seconds) for system process `syncer' to stop...
    Dec 26 19:01:05 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: 
    Dec 26 19:01:05 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Syncing disks, vnodes remaining...3 
    Dec 26 19:01:14 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:01:18 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:01:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: 
    Dec 26 19:01:26 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:01:42 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:01:59 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1672 times, from 2015-12-26 18:53:25 EET to 2015-12-26 18:56:58 EET
    Dec 26 19:02:07 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: timed out
    Dec 26 19:02:07 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: 
    Dec 26 19:02:07 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: syncing disks... Syncing disks, buffers remaining... 159 154 153 153 153 153 153 153 153 153 153 153 
    Dec 26 19:02:07 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: 153 
    Dec 26 19:02:13 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:02:15 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 last message repeated 9 times
    Dec 26 19:02:15 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: 
    Dec 26 19:02:15 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Giving up on 153 buffers
    Dec 26 19:02:16 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:02:22 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 23, ifAdminStatus up(1), ifOperStatus down(2), ifName em1
    Dec 26 19:02:22 jun-router.tks.local jun-router.tks.local /kernel: Generating Health status msg for ifd : ms-0/2/0: 0
    Dec 26 19:02:22 jun-router.tks.local jun-router.tks.local /kernel: Generating Health status msg for ifd : mams-0/2/0: 0
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_IFDEV_DETACH_PIC: ifdev_detach_pic(0/2)
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local /kernel: if_pfe_ams_process_event: Agg Ifd doesn't exist for member (mams-0/2/0) 
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 719, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 3495, ifAdminStatus up(1), ifOperStatus down(2), ifName mams-0/2/0
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 724, ifAdminStatus down(2), ifOperStatus down(2), ifName pc-0/2/0.16383
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 725, ifAdminStatus down(2), ifOperStatus down(2), ifName pc-0/2/0.16384
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 718, ifAdminStatus down(2), ifOperStatus down(2), ifName pc-0/2/0
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power off (jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 3, jnxFruL3Index 0, jnxFruName PIC: MS-MIC-16G @ 0/2/*, jnxFruType 11, jnxFruSlot 0, jnxFruOfflineReason 8, jnxFruLastPowerOff 187091905, jnxFruLastPowerOn 56797808)
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_SNMP_TRAP3: ENTITY trap generated: entStateOperDisabled (entPhysicalIndex 11, entStateAdmin 2, entStateAlarm 0)
    Dec 26 19:02:23 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power off (jnxFruContentsIndex 20, jnxFruL1Index 1, jnxFruL2Index 2, jnxFruL3Index 0, jnxFruName MIC: MS-MIC-16G @ 0/1/*, jnxFruType 11, jnxFruSlot 0, jnxFruOfflineReason 7, jnxFruLastPowerOff 187091905, jnxFruLastPowerOn 56798788)
    Dec 26 19:02:24 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on (jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 3, jnxFruL3Index 0, jnxFruName PIC: MS-MIC-16G @ 0/2/*, jnxFruType 11, jnxFruSlot 0, jnxFruOfflineReason 2, jnxFruLastPowerOff 187091905, jnxFruLastPowerOn 187092009)
    Dec 26 19:02:24 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_SNMP_TRAP3: ENTITY trap generated: entStateOperEnabled (entPhysicalIndex 11, entStateAdmin 4, entStateAlarm 0)
    Dec 26 19:02:24 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:02:30 jun-router.tks.local jun-router.tks.local /kernel: IF_MSG_IFD_BULK_MUP_DOWN: IFD[0] idx 53276 is NULL; peer type 17 index 0 ignored
    Dec 26 19:02:30 jun-router.tks.local jun-router.tks.local /kernel: IF_MSG_IFD_BULK_MUP_DOWN: IFD[1] idx 53277 is NULL; peer type 17 index 0 ignored
    Dec 26 19:02:34 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_IFDEV_CREATE_NOTICE: create_pics: created interface device for pc-0/2/0
    Dec 26 19:02:34 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_IFDEV_CREATE_NOTICE: create_pics: created interface device for ms-0/2/0
    Dec 26 19:02:34 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_IFDEV_CREATE_NOTICE: create_pics: created interface device for mams-0/2/0
    Dec 26 19:02:34 jun-router.tks.local jun-router.tks.local chassisd[1592]: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on (jnxFruContentsIndex 20, jnxFruL1Index 1, jnxFruL2Index 2, jnxFruL3Index 0, jnxFruName MIC: MS-MIC-16G @ 0/1/*, jnxFruType 11, jnxFruSlot 0, jnxFruOfflineReason 2, jnxFruLastPowerOff 187091905, jnxFruLastPowerOn 56798788)
    Dec 26 19:02:36 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 719, ifAdminStatus up(1), ifOperStatus down(2), ifName ms-0/2/0
    Dec 26 19:02:36 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 3495, ifAdminStatus up(1), ifOperStatus down(2), ifName mams-0/2/0
    Dec 26 19:02:40 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 19:02:49 jun-router.tks.local jun-router.tks.local tnp.bootpd[73309]: find_pic for I2CID 0xa56 fpc-slot 0 pic-slot 2yielded bootstr boot 1
    Dec 26 19:02:49 jun-router.tks.local jun-router.tks.local tnp.bootpd[73309]: find_pic for I2CID 0xa56 fpc-slot 0 pic-slot 2 yielded bootstr ejunos-xlp64.elf
    Dec 26 19:02:49 jun-router.tks.local jun-router.tks.local tnp.bootpd[73309]: main for ID 0xa56 yielded bootcmd boot 1 boot file /usr/share/pfe/ejunos-xlp64.elf
    Dec 26 19:03:04 jun-router.tks.local jun-router.tks.local dcd[1694]: sdb_free_snapshot_handle: trying to free an already freed snapshot
    Dec 26 19:03:06 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1673 times, started at 2015-12-26 19:03:06 EET
    Dec 26 19:03:49 jun-router.tks.local jun-router.tks.local mib2d[1954]: SNMP_TRAP_LINK_DOWN: ifIndex 23, ifAdminStatus up(1), ifOperStatus down(2), ifName em1
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: KDB: debugger backends: ddb
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: KDB: current backend: ddb
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Global Paddr: 0xa0000000
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: ObjC: Sz - 0x300000000, VA - 0xcc0000000, PA - 0x100000000
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Copyright (c) 1996-2015, Juniper Networks, Inc.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: All rights reserved.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Copyright (c) 1992-2007 The FreeBSD Project.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: The Regents of the University of California. All rights reserved.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: FreeBSD is a registered trademark of The FreeBSD Foundation.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: JUNOS 14.2R4.9 #0: 2015-08-25 23:58:29 UTC
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: builder@orth.juniper.net:/volume/build/junos/14.2/release/14.2R4.9/obj/xlp64/junos/bsd/kernels/EJUNOS_XLP64/kernel
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Running Netstack mpsafe.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: platform_set_properties: Setting max IFL to 262142
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: JUNOS 14.2R4.9 #0: 2015-08-25 23:58:29 UTC
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: builder@orth.juniper.net:/volume/build/junos/14.2/release/14.2R4.9/obj/xlp64/junos/bsd/kernels/EJUNOS_XLP64/kernel
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: real memory  = 16879923200 (16484300K bytes)
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: avail memory = 1723133952 (1643MB)
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: FreeBSD/SMP: Multiprocessor System Detected: 32 CPUs
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Security policy loaded: Junos MAC/veriexec (mac_veriexec)
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: MAC/veriexec fingerprint module loaded: SHA256
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: MAC/veriexec fingerprint module loaded: SHA1
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: : BRCM's XLP CPU Rev. 0.5 with no FPU implemented
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: L1 Cache: I size 64kb(32 line), D size 8kb(32 line), two way.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: L2 Cache: Size 2048kb, eight way
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: 16550A, console
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Entering ggsn_lbus_setup_intr: irq_num 3
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: picnic_identify
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: picnic_probe
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: picnic_attach
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: irq 2, irt_index 147
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Loading ucore image.. size 205 words
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Completed network hardware initialization
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: SAE Current Frequency = 250
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: SAE Updated Frequency = 500
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Timecounter "mips" frequency 800000000 Hz quality 0
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: ###PCB Group initialized for udppcbgroup
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: ###PCB Group initialized for tcppcbgroup
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Kernel thread "wkupdaemon" (pid 62) exited prematurely.
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Trying to mount root from ufs:/dev/md0
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: Trying to mount root from cd9660:/dev/md0
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: WARNING: preposterous time in file system
    Dec 26 19:04:24 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: WARNING: No TOD clock, believing file system.
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: msppmond (PID 172) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: ntp (PID 173) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: inet-process (PID 174) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: mspmand (PID 175) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: mspsmd (PID 176) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: mount_re (PID 177) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: mount_pkg (PID 178) started
    Dec 26 19:04:25 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 init: Starting of initial processes complete
    Dec 26 19:04:26 jun-router.tks.local jun-router.tks.local mspd[1666]: Inserted PIC connection state for fpc=0 pic=2 session=0x1890100
    Dec 26 19:04:27 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 xntpd[173]: ntpd 4.2.0-a Tue Aug 25 22:55:08 UTC 2015 (1)
    Dec 26 19:04:27 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 xntpd[173]: mlockall(): Resource temporarily unavailable
    Dec 26 19:04:53 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337025 too big.. Flushing SHM to DB
    Dec 26 19:05:05 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[188]: jsf_jflow_log_init: SHM handle is 0xcf0000028.
    Dec 26 19:05:05 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[188]: jsf_jflow_log_register_plugin: Assigning Index 0 for plugin_id 13
    Dec 26 19:05:06 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[188]: msvcs_nat_data_init: initializing mapping table
    Dec 26 19:05:06 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[188]: jsf_jflow_log_register_plugin: Assigning Index 1 for plugin_id 5
    Dec 26 19:05:16 jun-router.tks.local jun-router.tks.local /kernel: pic_listener_connect: conn established: mgmt addr=0x80000310,
    Dec 26 19:05:16 jun-router.tks.local jun-router.tks.local /kernel: msp_peer_init:overriding peertype_module
    Dec 26 19:05:16 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 kernel: itable16: inserting illegal index (36736)
    Dec 26 19:05:16 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[188]: MSPMAN: route table add failed in adding kernel entry for 36736, family 2 error 12
    Dec 26 19:05:33 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337082 too big.. Flushing SHM to DB
    Dec 26 19:05:40 jun-router.tks.local jun-router.tks.local /kernel: Generating Health status msg for ifd : ms-0/2/0: 0
    Dec 26 19:05:40 jun-router.tks.local jun-router.tks.local /kernel: Generating Health status msg for ifd : mams-0/2/0: 0
    Dec 26 19:05:45 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337100 too big.. Flushing SHM to DB
    Dec 26 19:06:32 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 mspmand[188]: illegal replication threshold: 0
    Dec 26 19:08:25 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.4xxx2 to 193.xxx.85 (359)
    Dec 26 19:08:37 jun-router.tks.local jun-router.tks.local last message repeated 6 times
    Dec 26 19:08:48 jun-router.tks.local jun-router.tks.local last message repeated 5 times
    Dec 26 19:09:33 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337302 too big.. Flushing SHM to DB
    Dec 26 19:11:11 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337364 too big.. Flushing SHM to DB
    Dec 26 19:11:59 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1673 times, from 2015-12-26 19:03:06 EET to 2015-12-26 19:06:58 EET
    Dec 26 19:12:06 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1674 times, started at 2015-12-26 19:12:05 EET
    Dec 26 19:13:43 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337460 too big.. Flushing SHM to DB
    Dec 26 19:18:30 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.3xxx85 (359)
    Dec 26 19:18:36 jun-router.tks.local jun-router.tks.local last message repeated 3 times
    Dec 26 19:18:52 jun-router.tks.local jun-router.tks.local last message repeated 8 times
    Dec 26 19:19:29 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337562 too big.. Flushing SHM to DB
    Dec 26 19:19:51 jun-router.tks.local jun-router.tks.local (FPC Slot 0, PIC Slot 2)  ms02 xntpd[173]: kernel time sync enabled 2001
    Dec 26 19:28:02 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 1xxxx (359)
    Dec 26 19:28:06 jun-router.tks.local jun-router.tks.local last message repeated 2 times
    Dec 26 19:28:07 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337695 too big.. Flushing SHM to DB
    Dec 26 19:28:08 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95xxx.2 to 193.xxx85 (359)
    Dec 26 19:28:24 jun-router.tks.local jun-router.tks.local last message repeated 8 times
    Dec 26 19:30:10 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1675 times, started at 2015-12-26 19:30:09 EET
    Dec 26 19:37:40 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 19:37:56 jun-router.tks.local jun-router.tks.local last message repeated 8 times
    Dec 26 19:37:58 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337822 too big.. Flushing SHM to DB
    Dec 26 19:37:58 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 19:38:03 jun-router.tks.local jun-router.tks.local last message repeated 2 times
    Dec 26 19:42:53 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 134.147.203.115 to 91.209.1.246 (378)
    Dec 26 19:45:51 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337901 too big.. Flushing SHM to DB
    Dec 26 19:48:26 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 19:48:36 jun-router.tks.local jun-router.tks.local last message repeated 5 times
    Dec 26 19:48:38 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337926 too big.. Flushing SHM to DB
    Dec 26 19:48:38 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 19:48:48 jun-router.tks.local jun-router.tks.local last message repeated 5 times
    Dec 26 19:50:53 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337951 too big.. Flushing SHM to DB
    Dec 26 19:53:30 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 337981 too big.. Flushing SHM to DB
    Dec 26 19:58:02 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 19:58:06 jun-router.tks.local jun-router.tks.local last message repeated 2 times
    Dec 26 19:58:24 jun-router.tks.local jun-router.tks.local last message repeated 9 times
    Dec 26 19:59:04 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1675 times, from 2015-12-26 19:30:09 EET to 2015-12-26 19:54:03 EET
    Dec 26 19:59:24 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1676 times, started at 2015-12-26 19:59:24 EET
    Dec 26 19:59:41 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: nsa_log_community: unauthorized SNMP community from 10.66.88.6 to 10.66.88.27 (3ngEt)
    Dec 26 20:00:11 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: nsa_log_community: unauthorized SNMP community from 10.66.88.6 to 10.66.88.27 (3ngEt)
    Dec 26 20:07:43 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 20:10:37 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338132 too big.. Flushing SHM to DB
    Dec 26 20:16:20 jun-router.tks.local jun-router.tks.local last message repeated 2 times
    Dec 26 20:16:27 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338187 too big.. Flushing SHM to DB
    Dec 26 20:17:07 jun-router.tks.local jun-router.tks.local authd[1656]: ../../../../../../src/junos/usr.sbin/authd/plugin/radius/authd_plugin_radius_module.cc:1777 Failed to get Cos-Shaping-Rate attribute
    Dec 26 20:17:19 jun-router.tks.local jun-router.tks.local last message repeated 2 times
    Dec 26 20:18:26 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 20:18:36 jun-router.tks.local jun-router.tks.local last message repeated 5 times
    Dec 26 20:18:48 jun-router.tks.local jun-router.tks.local last message repeated 6 times
    Dec 26 20:24:14 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1676 times, from 2015-12-26 19:59:24 EET to 2015-12-26 20:19:13 EET
    Dec 26 20:24:52 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1677 times, started at 2015-12-26 20:24:51 EET
    Dec 26 20:27:11 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338268 too big.. Flushing SHM to DB
    Dec 26 20:27:36 jun-router.tks.local jun-router.tks.local last message repeated 11 times
    Dec 26 20:39:15 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 20:39:37 jun-router.tks.local jun-router.tks.local last message repeated 11 times
    Dec 26 20:41:37 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338383 too big.. Flushing SHM to DB
    Dec 26 20:43:54 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1677 times, from 2015-12-26 20:24:51 EET to 2015-12-26 20:38:54 EET
    Dec 26 20:46:27 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338425 too big.. Flushing SHM to DB
    Dec 26 20:49:15 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 20:49:38 jun-router.tks.local jun-router.tks.local last message repeated 11 times
    Dec 26 20:53:42 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1679 times, started at 2015-12-26 20:53:41 EET
    Dec 26 20:58:29 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 20:58:37 jun-router.tks.local jun-router.tks.local last message repeated 4 times
    Dec 26 20:58:52 jun-router.tks.local jun-router.tks.local last message repeated 7 times
    Dec 26 21:04:09 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1679 times, from 2015-12-26 20:53:41 EET to 2015-12-26 20:59:09 EET
    Dec 26 21:06:05 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338570 too big.. Flushing SHM to DB
    Dec 26 21:07:41 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 21:08:01 jun-router.tks.local jun-router.tks.local last message repeated 10 times
    Dec 26 21:08:01 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1680 times, started at 2015-12-26 21:08:01 EET
    Dec 26 21:08:03 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 21:14:08 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338624 too big.. Flushing SHM to DB
    Dec 26 21:16:15 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 106.xxx.220 to 195.xxx.10 (370)
    Dec 26 21:17:09 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1680 times, from 2015-12-26 21:08:01 EET to 2015-12-26 21:12:09 EET
    Dec 26 21:18:54 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 21:19:07 jun-router.tks.local jun-router.tks.local last message repeated 6 times
    Dec 26 21:19:17 jun-router.tks.local jun-router.tks.local last message repeated 5 times
    Dec 26 21:27:27 jun-router.tks.local jun-router.tks.local authd[1656]: sdb_update_client_session_internal session 338709 too big.. Flushing SHM to DB
    Dec 26 21:27:33 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1681 times, started at 2015-12-26 21:27:32 EET
    Dec 26 21:28:02 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 95.xxx.2 to 193.xxx.85 (359)
    Dec 26 21:28:06 jun-router.tks.local jun-router.tks.local last message repeated 2 times
    Dec 26 21:28:24 jun-router.tks.local jun-router.tks.local last message repeated 9 times
    Dec 26 21:36:02 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: agent_io_reader: failed input interface authorization from 106.75.199.220 to 193.xxx.14 (375)
    Dec 26 21:36:34 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_CLEAR: Protocol DHCPv4:bad-packets has returned to normal. Violated at fpc 0 for 1681 times, from 2015-12-26 21:27:32 EET to 2015-12-26 21:31:34 EET
    Dec 26 21:39:06 jun-router.tks.local jun-router.tks.local last message repeated 7 times
    Dec 26 21:39:14 jun-router.tks.local jun-router.tks.local last message repeated 4 times
    Dec 26 21:40:49 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: nsa_log_community: unauthorized SNMP community from 10.xxx.6 to 10.xxx.27 (3ngEt)
    Dec 26 21:41:00 jun-router.tks.local jun-router.tks.local jddosd[1663]: DDOS_PROTOCOL_VIOLATION_SET: Protocol DHCPv4:bad-packets is violated at fpc 0 for 1682 times, started at 2015-12-26 21:41:00 EET
    Dec 26 21:41:19 jun-router.tks.local jun-router.tks.local snmpd[1692]: SNMPD_AUTH_FAILURE: nsa_log_community: unauthorized SNMP community from 10.xxx.6 to 10.xxx.27 (3ngEt)

    #NAT
    #bras
    #CGNAT
    #Crash
    #mx


  • 10.  RE: MS-MIC-16G stop forwarding traffic

    Posted 12-28-2015 11:43

    Hello,

    Please post Your sanitized config.

    Are You using SIP ALG? Are You using PBA? 

    If at least one "yes" then JUNOS 14.2R5 has lots of fixes for SIP ALG and PBA.

    Thx

    Alex