Elevate

Welcome to the Juniper Elevate Community

hero image

Promoted

Promo tile background

Check out the new TechPost 

Bits and Bytes Articles on Automated WAN Solutions, from Network Engineers to Network Engineers.

Browse Posts

Promoted

Promo tile background

Check out the New CN2 Community

With the new era and edition of Contrail, we have launched the Cloud-Native Contrail Networking (CN2) Community.

Join the CN2 Community

Latest Discussions

  • Posted in: Routing

    You can filter this network using firewall configuration. Look at this example (make your necessary adjustments): set policy-options prefix-list BLOCK-NETWORKS 10.82.1.0/24 set firewall family inet filter BLOCK term BLOCK-NETWORKS from prefix-list BLOCK-NETWORKS set firewall family inet filter ...

  • Profile Picture

    Question on ISSU

    Posted in: Junos OS

    Hi. Before executing ISSU, do I need the Junos image copied to both REs, or just the master RE? Thanks, Deepak Juniper Business Use Only

  • Hello Adam, Yes you are right and I would like to thank you guys again for the generous offer, came in the right time :) Regards... ------------------------------ Sajjad Ghaffoori ------------------------------

  • Posted in: Junos OS

    The trusted-key gives you the ability to use different keys for different servers . Example . 3 keys 3 different servers. Also it give the ability to schedule rolling key changes authentication-key 30 type sha256 value "$w"; ## SECRET-DATA authentication-key 35 type sha256 value "$q"; ## SECRET-DATA ...

  • Posted in: SRX

    You configuration seems exactly like the sample. Could you try the connections both inbound and outbound and see what sessions exist using show security flow session source-prefix show security flow session destination-prefix These will confirm which policy is being used for the session and what ...

  • Posted in: SD-WAN

    Hi Latif, No you don't need any license for WireGuard. And you need active SSR license to download or upgrade the plugin. Cheers, Ivan ------------------------------ Ivan Stanev ------------------------------

  • Posted in: SRX

    Hello, Can you try out the below option and get me the output ? >show security match-policies from-zone <> to-zone <> source-ip <> destination-ip <> source-port 10.1.10.6 destination-port <> protocol 6 >show security nat static rule all Also, did we test any other traffic and confirmed working ? ...

Latest Articles

  • Posted to: TechPost Blogs

    What a true IBN system is? How relational and graph databases are different? And why graph databases are ideal for network infrastructure? Introduction This post will look at what Intent-Based Networking truly is, and what an Intent-Based Networking System (IBNS) looks like. We’ll then take a bit of a detour and talk about databases - it ...

  • Blog Entry
    Posted to: TechPost Blogs

    Let's verify we can support 8,000 VPLS instances in the ACX7000 products with 640,000 MAC addresses. Introduction This is the fifth article in the ACX7k Metro Validation Series: 1. EVPN MAC-VRF (E-LAN) 2. EVPN VPWS 3. L3VPN, 6VPE 4. L2VPN 5. VPLS 6. L2 MAC Scale and Learning ...

  • Posted to: TechPost Blogs

    We verify ACX7000 platforms support 700,000 MAC addresses with a learning rate of 14,000 entries per second. Introduction This is the sixth and last article in the ACX7k Metro Validation Series: 1. EVPN MAC-VRF (E-LAN) 2. EVPN VPWS 3. L3VPN, 6VPE 4. L2VPN ...

Top Contributors of the Week