[j-nsp] Going Juniper
Chris
lists at shthead.com
Mon Apr 9 23:07:06 EDT 2018
Hi,
On 10/04/2018 9:45 AM, mike+jnsp at willitsonline.com wrote:
> I see there is a terrific amount of used mx104 and mx240 out there
> and the specs all seem great. What I'm looking to do is have 2x 10g
> feeds, route bgp, do flow exporting, and do a certain amount of ingress
> filtering to protect the network from ddos.Id even like to do cgnat for
> up to 5000 users but not sure if a single box setup would be wise.
I can't speak for the MX240, but we have some deployments of the MX104,
MX80 and the vMX.
For the MX104 (and the MX80) the main limitation they have is that the
CPU on the routing engine is terribly slow. This can be a problem for
you if you are taking multiple full tables with BGP. Even without taking
full tables, the RE CPU on the MX104's I have is basically always at
100%. Commits are pretty slow as well. This shouldn't be such an issue
with the MX240 as it has a wider range of routing engines available with
much better specs.
The MX104's (and MX80's) have the MS-MIC-16G installed. We use the
MS-MIC-16G for IPSEC, NAT and stateful firewalling (service filters are
used to only send certain traffic to the stateful firewall). So far
there has only been 1 issue that I have personally encountered with the
MS-MIC-16 - the card has crashed on a previous release of JunOS when
adding a large number of IPSEC peers. Since upgraded I have not
experienced the same issue though.
I also have some vMX's deployed (they are running on top of Dell R740's
with 3 x Intel X710 cards to give 12 x 10G interfaces). The painful part
on getting the vMX to work was the host setup with KVM - the documents
are severly lacking on Junipers side (but I have written up the exact
instructions to get the most recent 18.1R1 release working on CentOS
with no issues).
So far after getting the issues with the KVM host ironed out I have been
very happy with the performance of the vMX. Since 17.4R1 you can deploy
a virtual MS-MPC (which requires extra CPU resources) which will give
you NAT support as well as stateful firewalling support. Since its
virtualised and the RE runs as a seperate VM you can assign more or less
resources to it as needed - I have 16G of RAM allocated with 6 cores and
the time to process/install a full table is only a few seconds. They
have survived some DDoS attacks that were large enough to fill up the
transit links with no issues as well. The biggest thing is to make sure
you get NIC's that support SR-IOV and make sure the CPU is fast
enough/has enough cores for your requirements (you cannot over-allocate
the cores!). For my use case, I don't think I will be buying any more
physical MX's unless I have an actual reason to need their hardware, the
vMX suites my needs just fine. Juniper does provide a (limited) demo of
the vMX, happy to send you the install guide I wrote up for getting it
working on KVM with CentOS 7.4 (Ubuntu is also supported for KVM but the
install process is basically terrible).
More information about the juniper-nsp
mailing list