Dhcp External Server; Dhcp Server; Dos Protection - Juniper JUNOSE 10.0.3 - RELEASE NOTES 4-30-2010 Release Note

For e series broadband services routers
Table of Contents

Advertisement

JUNOSe 10.0.3 Release Notes

DHCP External Server

DHCP Server

DoS Protection

38
Known Problems and Limitations
The ip auto-detect ip-subscriber command is configured to enable packet
detection (packet triggering) and to trigger creation of dynamic subscriber
interfaces.
Work-around: To avoid this defect, do all of the following:
Do not use the ip auto-detect ip-subscriber command to enable packet
triggering and to create dynamic subscriber interfaces.
Ensure that DHCP external server is configured in the virtual router.
Ensure that the set dhcp relay inhibit-access-route-creation command is
configured in the virtual router to prevent DHCP relay from installing host
routes by default.
The DHCP renew counter and release counter (displayed with the show ip
dhcp-external statistics command) are doubled rather than incremented for
each renew and release sent. [Defect ID 78802]
When DHCP clients on an S-VLAN over bridged Ethernet stack send a decline
message to a router that has DHCP relay and DHCP external server configured
in the same VR, the clients bindings are not removed from the DHCP external
server. [Defect ID 87086]
When DHCP relay and DHCP external server are configured in the same VR
with server-sync enabled, bindings are not created in the DHCP external server
when DHCP clients on an ATM bulk configuration interface stack and dynamic
VLAN over Ethernet stack sends a renew message. [Defect ID 87087]
With the unique client ID option enabled, when two clients with the same MAC
address or client ID are on an interface (where one client is connected over a
router and relay and the other client is connected directly). sending a release
request from one of the clients might terminate another client. [Defect ID
179759]
ES2 10G LM traffic does not flow across all 16K back-back interfaces when
policies are attached on all interfaces. [Defect ID 86925]
A Telnet session closes when sending ipLocalBGP protocol traffic at a rate in
the range 4096–4200 packets per second (pps) with suspicious control flow
detection enabled. [Defect ID 81974]
Work-around: When the traffic drops below 4096 pps, open a new Telnet
session.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 10.0.3

Table of Contents