Juniper M120 Alternatives

Having slightly lost track of what everybody is using for peering routers
these days, what is the consensus about the best alternative to Juniper M
series routers?

I'm asking as the prices to upgrade to 10Gbit capable Juniper units (ie.
an M120) seem prohibitively high so I'm looking to get a feel for the
alternatives. The other obvious platform would appear to be a Cisco XR
12404 (or similar depending on line card requirements) but is anything
else in common use as a peering platform?

Cheers for any input.

Rgds

Gary

have you looked at the MX series?

Dale

Having slightly lost track of what everybody is using for peering routers
these days, what is the consensus about the best alternative to Juniper M
series routers?

have you looked at the MX series?

+1
~Chris

Having slightly lost track of what everybody is using for peering routers
these days, what is the consensus about the best alternative to Juniper M
series routers?

Juniper MX series? Works great for us. Much nicer 10G prices than M120.

Steinar Haug, Nethelp consulting, sthaug@nethelp.no

I'd think the Juniper MX series might fit, as well as the Brocade NetIron XMR. And of course the Cisco you already mentioned.

-brad

I had looked briefly, does anybody here actually use them as peering
routers? I've seen a few implementations using them in the MPLS P and PE
router roles but never as border routers.

If there is some precedent for using them in this role that's good to hear
and I'll take another look, I was loath to move away from Juniper as our
current boxes are been the model of reliability.

Cheers

Gary

I had looked briefly, does anybody here actually use them as peering
routers? I've seen a few implementations using them in the MPLS P and PE
router roles but never as border routers.

We use MX series as peering routers. They work very well.

Steinar Haug, AS 2116

Cisco's ASR9000 is supposed to be in-line with the Juniper MX offering (price-wise and feature-wise); more so than as 124xx, I hear.

* Gary Mackenzie

I had looked briefly, does anybody here actually use them as peering
routers? I've seen a few implementations using them in the MPLS P and
PE router roles but never as border routers.

We've been using the MX-es as border routers for some time now. It's a
role that suits them very well in my opinion, no problems at all so far.
I'll be very surprised if we don't end up using MX-es in our next PoP
as well.

Best regards,

Hi,

It seems that there is a major fiber cut in Italy (not really near nanog, so
just in case...)

I was just wondering if anybody has heard of any possible recovery time - as
there is none official one yet.

Thank you,

Jean-Christophe VARAILLON

Yup - even Israel is affected. Started at 16:35 (gmt+2) and the cut is inside Telecom Italia. No ETA.

-Hank

Tore Anderson wrote:

* Gary Mackenzie

I had looked briefly, does anybody here actually use them as peering routers? I've seen a few implementations using them in the MPLS P and
PE router roles but never as border routers.

We've been using the MX-es as border routers for some time now. It's a
role that suits them very well in my opinion, no problems at all so far.
I'll be very surprised if we don't end up using MX-es in our next PoP
as well.

Best regards,

We're using them as border routers and love them. As long as you don't need sonet, i think it's a great choice.

Leslie

This is still ongoing (more than 6 hours now...), and nobody can give any
ETA.

So if someone hear about something...

Thank you
Jean-Christophe

Caveat: no MAC accounting on LAGs (IEEE speak) / Aggregated Ethernet (Juniper
speak) / Etherchannels (Cisco speak).

Might or might not be important when using bundled links to public
peering fabrics.

Best regards,
Daniel

PS: and of course JUNOS still undeterministically resetting unrelated BGP
sessions for no good reason when modifying BGP configuration - so one is
well-advised to do ANY configuration changes in the area of BGP within a
maint window as it might happen that you configure a peering session and
whoops there goes your IBGP mesh... or all your other peerings, or, ...
</rant>

TI Sparkle just confirmed they are having a fault.

Email from Telecom Italia Sparkle - Seabone NOC:

Dear
We have a big fault ( fiber cut) in france 2 cuts and one in milan.

We are working to solve it asap.

Regards

———————————————- Telecom Italia Sparkle SpA
Customer Assistance/Assurance I° t Se@bone Network Operations Center Via M. Palocco, 223 – Rome, IT

Varaillon Jean Christophe wrote:

PS: and of course JUNOS still undeterministically resetting unrelated BGP
sessions for no good reason when modifying BGP configuration

cisco is deterministic. breathe on it and all sessions reset.

randy

Well to be fair, the session resetting on config change behavior is
actually quite deterministic (being EASY to determine is not part of the
requirements, technically speaking :P), and most of the resets really do
have perfectly good reasons. I'll certainly go with "really annoying and
often a giant pain in the @#$%^&*" though.

They've definitely been improving it over the years though, so much that
I almost never trigger a session reset on me unintentionally any more.
The things to watch out for are:

a) any time you change the update replication by moving a neighbor
between groups, renaming groups, or significantly changing the export
policy chain.

b) any time you change a major part of the underlying interface
configuration for an eBGP session, such as mtu or vlan tagging config.

c) any time you change something about the bgp session which really does
require a session reset to take effect, such as a new ASN, new endpoint
address, new mbgp family configuration, new md5 password, new tcp mss,
etc.

You can actually safeguard yourself from a lot of the accidental reset
behaviors while implementing other features at the same time by using
commit scripts (i.e. as a side-effect of my scripts which exist for
other reasons, I automatically protect myself against changes to the
policy chain or family configuration which might cause unintended
session flaps), though I'll certainly admit this is well into the
category of "power user" and not appropriate for most people. They are
making some progress though, you can actually turn NSR on and off now
without flapping your sessions, which is certainly an improvement over
the serious logic flaws in earlier versions (where you couldn't turn off
NSR without flapping every session, but you also couldn't commit w/NSR
enabled and the backup RE offline, effectively locking you out of config
changes without a total box flap if you didn't have both RE's running).

It would certainly be a lot more user friendly if they could tell you
what sessions would be reset as part of a "commit check" process though.

We have observed restoration around 1:30am (gmt+2). About 9 hours of outage.

-Hank

Richard A Steenbergen wrote:

They've definitely been improving it over the years though, so much that
I almost never trigger a session reset on me unintentionally any more.

They must have. This was new to me and came as a shock. I don't think I've ever seen my m120 behave any different than my cisco when it comes to flapping BGP. Things have just worked as I expected them to. Not that I go screwing with underlying interface configs or changing a peer from one group to another or changing the asn; at least not on a live session. These things would seem to indicate that the session might be subject to reset.

Perhaps it just behaves for normal users and not power users. :slight_smile:

Jack

Or for the very same goal, vendors can maybe think at making support
for L2 primitives via NetFlow v9 exports somewhat more implemented.

Cheers,
Paolo