Data Center Technologists
Showing results for 
Search instead for 
Do you mean 

Earlier this year, IDC analysts interviewed several Juniper Networks customers in Western Europe with the aim of quantifying the business value of Juniper Networks’ switching, routing and security solutions. IDC determined that the average ROI for customers using Juniper equipment was 349 percent over five years.


Hero Status is Waiting

by Juniper Employee ‎11-03-2016 08:00 AM - edited ‎11-03-2016 12:33 PM

In recent weeks, we’ve made the case for automation pretty clear. We’ve shown you why you need to automate your network, how to make the business case for automation and how develop a plan to get you there. Now it’s time to get the right tools and technology partner in place.


MC-LAG is dead, Long live EVPN Multi-homing

by Juniper Employee ‎10-20-2016 05:34 PM - edited ‎01-12-2017 02:44 AM


Practically every day, it seems, someone will ask me: “How can I configure MC-LAG with EVPN to provide multi-homing?


The answer, I tell them, is simple:  you don’t need to.  EVPN is a superset of MC-LAG, and it natively integrates multi-homing. It’s like the better, standard version of MC-LAG that we’ve been waiting for.


EVPN, either with VXLAN or MPLS encapsulation, natively provides N-Way multi-homing by creating the same Ethernet Segment Identifier (ESI) on multiple devices. An ESI is configured on a per-interface basis; all interfaces configured with the same ESI, on any devices within the same EVPN domain, appear as part of the same L2 segment or LAG. On top of an ESI, it’s also possible to configure LACP to provide better fault detection.


Keeping with our principle that “Your network should not get in the way of what your business wants to do,” this time, we’ll show you how to map the targeted business processes to the network and then show you how to develop a plan to begin the process of automating your network and winning the approval of management.


How to Get Junos “Speaking Whale” to Containers

by Moderator Moderator ‎09-28-2016 01:35 PM - edited ‎01-12-2017 02:37 AM


Let's look at how to setup Junos OS networking with Docker's MACVLAN networking mode and test container connectivity between hosts on various VLAN network segments.


Now when the apps team is introducing Docker container workloads into your Juniper network environment, you can keep calm and speak whale Smiley Wink in other words "Jjjjjjjjuuuuuuuu-nnnnnnooooooosssssssss"




In the first part of this blog we discussed about implementing virtual networks in OpenStack using the ML2 hierarchical port binding design. A virtual network implemented with hierarchical port binding is composed of multiple Layer 2 segments stitched together to form a single network. We also discussed that such a network is implemented using a VXLAN based core segment and VLAN based dynamic segments on the edges.


In this blog we will delve into the details of installing and configuring the ML2 EVPN VXLAN driver from Juniper Networks.


Implement EVPN VXLAN for your OpenStack cloud –Part1

by Juniper Employee ‎09-26-2016 12:02 AM - edited ‎11-17-2016 09:13 PM

Neutron ML2 drivers are used to implement Layer 2 Network connectivity between VM instances in OpenStack.


Ethernet Virtual Private Network (EVPN) service provides Layer 2 connectivity between two endpoints by encapsulating Layer 2 packets inside a transport packet. The transport packet can be tunneled over VXLAN or MPLS path.


In this two part blog we will discuss how EVPN can be used to implement a L2 segment in a multi-segment OpenStack network. The first part contrasts the EVPN VXLAN driver with the native VXLAN support in OpenStack Neutron and describes the functionality of the EVPN driver in a multi-segment network, while the second part deals with the installation and configuration of the EVPN VXLAN driver for Neutron ML2 plugin.





Juniper Neutron Plugin 2.7 enhances Openstack Neutron to provide the network administrator with the ability to allocate dedicated firewalls to his tenants. This features provides tremendous flexibility to the network adminstrator to create various security flavours to address the requirements of performance, cost and compliance for his tenants.



by Juniper Employee ‎09-21-2016 03:43 PM - edited ‎01-12-2017 06:56 AM

As organizations increasingly embrace cloud models and expand initiatives such as mobility, big data analytics and unified communications, they will need to simplify and modernize their data centers to eliminate silos and deploy architectural models that enable much higher levels of integration, automation and orchestration.  


Modern data centers must move beyond racking, stacking, and cabling. Customers want access to their data instantly, anywhere in the world. And that’s exactly what ServerCentral delivers. ServerCentral offers colocation, cloud, and network infrastructure services with unwavering uptime to customers large and small, along with 24/7 live support from

real people. ServerCentral is innovative in how it builds a next- generation data center network and uses network automation to enable new levels of service that allow its customers to thrive.


The Force is with the Juniper QFX10002 Switch

by Juniper Employee ‎01-08-2016 03:20 PM - edited ‎01-20-2016 01:22 PM

The QFX10002 had a great 2015 with prodcution deployments across all our cusomter segments and industries.


The requirements list for data center switches is long, and getting longer. They must help cloud and data center operators scale up using technologies such as EVPN, VXLAN, VRF Lite, and Layer-3 VPNs. They must deliver high-capacity routing performance, both over IPv4 and IPv6. They must offer high-density options for 40G Ethernet and 100G Ethernet. And on the data plane, they must forward heavy traffic with zero frame loss. To validate the ability to meet all these requirements, Juniper Networks commissioned Network Test, an independentthird-party test lab, to assess its QFX10002-72Q data center switch.


Juniper Networks’ next-generation security solution, using SRX Series physical or vSRX virtual firewalls, provides rich perimeter, content and application security features to meet the needs of cloud deployments. Logs are one of the key sources of security information for cloud administrators, and the SRX/vSRX generate very rich security logs that help users monitor, debug and perform detailed threat analysis.


VMware vRealize Log Insight provides scalable log aggregation and indexing with near real-time search and analytics capabilities. Juniper’s content pack for vRealize Log Insight provides a common dashboard with widgets to manage syslog from switching, security and routing platforms.  The content pack also supports custom dashboards for integrating the rich log analytics features of vRealize Log Insight with the SRX/vSRX security logging capabilities, further helping cloud administrators monitor and analyze security logs.


Key Features

Juniper’s Log Insight content pack provides a rich set of built-in dashboards, predefined extracted fields, and prebuilt queries and alerts, providing monitoring and analysis of security logs.  This gives data center administrators the in-depth visibility needed in dynamic cloud environments.


Built-in dashboards: Juniper’s Log Insight content pack includes built-in dashboards for monitoring attack flows, flow sessions, bandwidth utilization and packet drops. These dashboards help cloud administrators monitor key flow level and application level behaviors, as well as detect potential attacks, threats and spam events in the network.

The Juniper Log Insight content pack dashboards include a set of widgets that report key data points related to a given area.  Dashboards are provided for attack flows, flow sessions, bandwidth details and packet drops.

The General dashboard includes the Top Flow and Events, Denied Flows, and Blocked and Permitted Websites widgets, along with other information (see screen shot below).



The Attacks Flows dashboard shows attacks by service, application and protocol types.


The Flow Sessions dashboard reports sessions created/closed by source and destination IP addresses and ports. 


The Bandwidth dashboard shows bandwidth utilization by client and server, both in the form of bytes and as a number of packets, segregated by service types.

Apart from the above default dashboards, cloud administrators can create their own personal dashboards in the Juniper Log Insight content pack to analyze and view other security log details.


Interactive Log Analysis: Juniper’s Log Insight content pack includes predefined extracted fields that provide cloud administrators with a detailed view of security logs. Users can drill down into each dashboard to view additional logs and field contents.


Predefined Alerts:  Juniper’s Log Insight content pack includes predefined alerts that continuously warn cloud administrators about potential attacks, threats and spams.



The Juniper Networks Log Insight content pack contains custom dashboards, fields and queries specific to Juniper SRX/vSRX security solutions, enabling customers to view and analyze logs from Juniper’s next-generation security solution using VMware vRealize Log Insight 3.0 GA.  With the Juniper solution, cloud administrators can now monitor, debug and perform threat analysis for applications in their data center using a single interface.


The Log Insight content pack offers common dashboards that can be used to manage Juniper switching and routing syslogs.  These capabilities can also be selectively extended through custom dashboards, fields and queries to perform detailed log analysis of Juniper switching and routing solutions deployed in cloud deployments.


How to Download

Juniper’s content pack for VMware vRealize Log Insight is available for download in the VMware vRealize Log Insight Marketplace.  The content pack can be found in the Marketplace menu for VMware vRealize Log Insight from Release 3.0 onwards (see screen shot below).



Juniper Innovators Circle